Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
IzFEtXcext.dll

Overview

General Information

Sample name:IzFEtXcext.dll
renamed because original name is a hash value
Original sample name:932d230145cf8e5e9ca547606a6db8780eccc235.dll
Analysis ID:1578342
MD5:4515c43cca35f7436a01b8d8b795000b
SHA1:932d230145cf8e5e9ca547606a6db8780eccc235
SHA256:dde0053e594c5d97aa8c0030938a6c245b4516483cb401d785f91f8d621ff0fd
Tags:dlluser-NDA0E
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Found large amount of non-executed APIs
One or more processes crash
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 2968 cmdline: loaddll32.exe "C:\Users\user\Desktop\IzFEtXcext.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 5040 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6200 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\IzFEtXcext.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 6716 cmdline: rundll32.exe "C:\Users\user\Desktop\IzFEtXcext.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • WerFault.exe (PID: 6284 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 632 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • regsvr32.exe (PID: 1416 cmdline: regsvr32.exe /s C:\Users\user\Desktop\IzFEtXcext.dll MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
    • rundll32.exe (PID: 6728 cmdline: rundll32.exe C:\Users\user\Desktop\IzFEtXcext.dll,AlgUninstall MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7296 cmdline: rundll32.exe C:\Users\user\Desktop\IzFEtXcext.dll,DllCanUnloadNow MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7524 cmdline: rundll32.exe C:\Users\user\Desktop\IzFEtXcext.dll,DllGetClassObject MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 7560 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7524 -s 652 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
IzFEtXcext.dllEquation_Kaspersky_TripleFantasy_LoaderEquation Group Malware - TripleFantasy LoaderFlorian Roth
  • 0x0:$mz: 4D 5A
  • 0x2714:$x1: Original Innovations, LLC
  • 0x2850:$x1: Original Innovations, LLC
  • 0x2770:$x2: Moniter Resource Protocol
  • 0x28f0:$x2: Moniter Resource Protocol
  • 0x27f4:$x3: ahlhcib.dll
  • 0x28b0:$x3: ahlhcib.dll
  • 0x32e5:$s0: hnetcfg.HNetGetSharingServicesPage
  • 0x34fc:$s1: hnetcfg.IcfGetOperationalMode
  • 0x34df:$s2: hnetcfg.IcfGetDynamicFwPorts
  • 0x324f:$s3: hnetcfg.HNetFreeFirewallLoggingSettings
  • 0x32bf:$s4: hnetcfg.HNetGetShareAndBridgeSettings
  • 0x329b:$s5: hnetcfg.HNetGetFirewallSettingsPage
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: IzFEtXcext.dllAvira: detected
Source: IzFEtXcext.dllReversingLabs: Detection: 68%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 88.3% probability
Source: IzFEtXcext.dllJoe Sandbox ML: detected
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_7002145D GetProcessHeap,CryptAcquireContextA,CryptAcquireContextA,GetLastError,GetLastError,CryptAcquireContextA,GetLastError,RtlAllocateHeap,memcpy,CryptImportKey,CryptDecrypt,GetLastError,GetLastError,HeapFree,4_2_7002145D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_7002145D GetProcessHeap,CryptAcquireContextA,CryptAcquireContextA,GetLastError,GetLastError,CryptAcquireContextA,GetLastError,RtlAllocateHeap,memcpy,CryptImportKey,CryptDecrypt,GetLastError,GetLastError,HeapFree,15_2_7002145D
Source: IzFEtXcext.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: IzFEtXcext.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: Amcache.hve.10.drString found in binary or memory: http://upx.sf.net
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_7002145D GetProcessHeap,CryptAcquireContextA,CryptAcquireContextA,GetLastError,GetLastError,CryptAcquireContextA,GetLastError,RtlAllocateHeap,memcpy,CryptImportKey,CryptDecrypt,GetLastError,GetLastError,HeapFree,4_2_7002145D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_7002145D GetProcessHeap,CryptAcquireContextA,CryptAcquireContextA,GetLastError,GetLastError,CryptAcquireContextA,GetLastError,RtlAllocateHeap,memcpy,CryptImportKey,CryptDecrypt,GetLastError,GetLastError,HeapFree,15_2_7002145D

System Summary

barindex
Source: IzFEtXcext.dll, type: SAMPLEMatched rule: Equation Group Malware - TripleFantasy Loader Author: Florian Roth
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 632
Source: IzFEtXcext.dllBinary or memory string: OriginalFilenameahlhcib.dllT vs IzFEtXcext.dll
Source: IzFEtXcext.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: IzFEtXcext.dll, type: SAMPLEMatched rule: Equation_Kaspersky_TripleFantasy_Loader date = 2015/02/16, author = Florian Roth, description = Equation Group Malware - TripleFantasy Loader, reference = http://goo.gl/ivt8EW, hash = 4ce6e77a11b443cc7cbe439b71bf39a39d3d7fa3
Source: classification engineClassification label: mal72.winDLL@16/9@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5040:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6716
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7524
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\d6241a85-f2f5-44f5-b598-e52ed0d5f638Jump to behavior
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\IzFEtXcext.dll",#1
Source: IzFEtXcext.dllReversingLabs: Detection: 68%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\IzFEtXcext.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\IzFEtXcext.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\IzFEtXcext.dll
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\IzFEtXcext.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\IzFEtXcext.dll,AlgUninstall
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 632
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\IzFEtXcext.dll,DllCanUnloadNow
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\IzFEtXcext.dll,DllGetClassObject
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7524 -s 652
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\IzFEtXcext.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\IzFEtXcext.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\IzFEtXcext.dll,AlgUninstallJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\IzFEtXcext.dll,DllCanUnloadNowJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\IzFEtXcext.dll,DllGetClassObjectJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\IzFEtXcext.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: hnetcfg.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: hnetcfg.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: gpapi.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: IzFEtXcext.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_70039EF0 EntryPoint,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,VirtualProtect,4_2_70039EF0
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\IzFEtXcext.dll
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_7002290B push ecx; ret 4_2_7002291B
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_7003922F push esp; ret 4_2_70039231
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_70022C4D push ecx; ret 4_2_70022C60
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_700251A0 push eax; ret 4_2_70025151
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_700250F0 push eax; ret 4_2_70025151
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_700398FD push eax; ret 4_2_700398FE
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_7002290B push ecx; ret 15_2_7002291B
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_7003922F push esp; ret 15_2_70039231
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_70022C4D push ecx; ret 15_2_70022C60
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_700251A0 push eax; ret 15_2_70025151
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_700250F0 push eax; ret 15_2_70025151
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_700398FD push eax; ret 15_2_700398FE
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 8.1 %
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 8.1 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: Amcache.hve.10.drBinary or memory string: VMware
Source: Amcache.hve.10.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.10.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.10.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.10.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.10.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.10.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.10.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: Amcache.hve.10.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.10.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.10.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.10.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.10.drBinary or memory string: vmci.sys
Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.10.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.10.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.10.drBinary or memory string: VMware20,1
Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.10.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.10.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.10.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.10.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.10.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.10.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.10.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.10.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.10.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_70039EF0 EntryPoint,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,VirtualProtect,4_2_70039EF0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_70021AF8 GetProcessHeap,GetLastError,LoadLibraryW,memset,GetProcAddress,HeapFree,4_2_70021AF8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_7002291C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_7002291C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_7002291C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,15_2_7002291C
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\IzFEtXcext.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_70022C86 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,4_2_70022C86
Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
11
Process Injection
11
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Obfuscated Files or Information
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Regsvr32
NTDS2
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Rundll32
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Software Packing
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1578342 Sample: IzFEtXcext.dll Startdate: 19/12/2024 Architecture: WINDOWS Score: 72 24 Malicious sample detected (through community Yara rule) 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 Multi AV Scanner detection for submitted file 2->28 30 2 other signatures 2->30 8 loaddll32.exe 1 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 rundll32.exe 8->12         started        14 regsvr32.exe 8->14         started        16 3 other processes 8->16 process5 18 rundll32.exe 10->18         started        20 WerFault.exe 2 16 12->20         started        process6 22 WerFault.exe 23 16 18->22         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
IzFEtXcext.dll68%ReversingLabsWin32.Backdoor.Tripfant
IzFEtXcext.dll100%AviraHEUR/AGEN.1303018
IzFEtXcext.dll100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
ax-0001.ax-msedge.net
150.171.27.10
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netAmcache.hve.10.drfalse
      high
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1578342
      Start date and time:2024-12-19 15:47:37 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 35s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:30
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:IzFEtXcext.dll
      renamed because original name is a hash value
      Original Sample Name:932d230145cf8e5e9ca547606a6db8780eccc235.dll
      Detection:MAL
      Classification:mal72.winDLL@16/9@0/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 6
      • Number of non-executed functions: 18
      Cookbook Comments:
      • Found application associated with file extension: .dll
      • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 20.189.173.22, 23.50.252.137, 23.50.131.196, 20.190.147.2, 13.107.246.63, 20.190.177.85, 20.199.58.43, 2.16.158.43, 20.12.23.50, 150.171.27.10, 2.16.158.187, 20.223.35.26
      • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, onedsblobprdwus17.westus.cloudapp.azure.com, tse1.mm.bing.net, ctldl.windowsupdate.com, g.bing.com, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net, ocsp.digicert.com, login.live.com, e16604.g.akamaiedge.net, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net
      • Not all processes where analyzed, report is missing behavior information
      • VT rate limit hit for: IzFEtXcext.dll
      TimeTypeDescription
      09:48:40API Interceptor2x Sleep call for process: WerFault.exe modified
      09:48:42API Interceptor1x Sleep call for process: loaddll32.exe modified
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      ax-0001.ax-msedge.netslifdgjsidfg19.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
      • 150.171.28.10
      1AqzGcCKey.exeGet hashmaliciousQuasarBrowse
      • 150.171.27.10
      kqeGVKtpy2.exeGet hashmaliciousQuasarBrowse
      • 150.171.28.10
      22054200882739718047.jsGet hashmaliciousStrela DownloaderBrowse
      • 150.171.27.10
      bPkG0wTVon.exeGet hashmaliciousUnknownBrowse
      • 150.171.27.10
      https://pdf.ac/4lLzbtGet hashmaliciousUnknownBrowse
      • 150.171.28.10
      https://www.bing.com/ck/a?!&&p=24da94b1cbc4e30be5abd9acb5737b3bdb775a56c39aac0141dd9c17c937dea1JmltdHM9MTczMzI3MDQwMA&ptn=3&ver=2&hsh=4&fclid=1bf8b81c-3b95-652f-24ec-ad573a81643b&u=a1aHR0cHM6Ly93d3cueXV4aW5na2V0YW5nLmNvbS9jb2xsZWN0aW9ucy90aHJvdy1ibGFua2V0cw#aHR0cHM6Ly9Uby5lZW1qaGl1bHoucnUvek83UkZORy8=Get hashmaliciousUnknownBrowse
      • 150.171.28.10
      vOizfcQSGf.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
      • 150.171.27.10
      tasktow.exeGet hashmaliciousUnknownBrowse
      • 150.171.27.10
      R4qP4YM0QX.lnkGet hashmaliciousUnknownBrowse
      • 150.171.27.10
      No context
      No context
      No context
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.8712161294243119
      Encrypted:false
      SSDEEP:96:V8qFj86iawhVyjsj94sWKYfXQXIDcQvc6QcEVcw3cE/O/a/z+HbHg/BQAS/YyNlR:VXzibOj60BU/wjeTnzuiFXZ24IO8dci
      MD5:D5820A0B8FA574E093D963B80557918C
      SHA1:D7B2D13737FC57A3672C0EB845C35813B82F3912
      SHA-256:150D85CEB9529D07EB565268D04A259C28CA3F523245F468F2608C12AC938F0E
      SHA-512:42A30FABDD645FBF4024A6FC12BC499F37295E2D39FBB95768B487D9A02EB5F56226C4E7BA246B6B83955927A45C386BCE6FF58D781534B80FD6C2E668273834
      Malicious:false
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.0.9.3.3.1.4.6.8.3.9.1.0.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.0.9.3.3.1.5.3.5.5.7.8.6.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.1.6.0.5.3.a.a.-.5.6.8.c.-.4.7.0.1.-.9.9.c.d.-.f.a.b.6.1.8.4.2.d.f.5.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.b.e.9.1.0.4.9.-.e.1.9.3.-.4.f.a.3.-.8.2.6.9.-.f.d.8.d.5.d.d.e.3.4.6.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.3.c.-.0.0.0.1.-.0.0.1.5.-.a.7.6.4.-.e.5.1.3.2.5.5.2.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.8713598234561436
      Encrypted:false
      SSDEEP:96:JaF5u6i7hVyVsj94svyeUfgQXIDcQvc6QcEVcw3cE/O/a/z+HbHg/BQAS/YyNl4M:Q/i7OVKM0BU/wjeTnzuiFXZ24IO8dci
      MD5:7E924E3F97AB661AE90D09040ED42793
      SHA1:B1C1772CD61F226E3EA1AFC8FB2680242797A8CD
      SHA-256:4E07C86A6DCC62AF10BB6871276870CB7129D96E7953D7344E82F169C731F293
      SHA-512:E2F0DE5CB47952550634550F9EC202458E32BC15726396011889EE53D6E50FB48EA5F8A62A4F4631FCF93830D116481B7E0063DA4116620B50B12113671EFD00
      Malicious:false
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.0.9.3.3.2.0.2.0.6.2.8.1.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.0.9.3.3.2.0.5.1.8.7.8.0.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.b.6.5.7.a.5.b.-.e.1.f.6.-.4.f.a.0.-.9.d.9.5.-.e.d.9.9.5.4.c.6.a.1.3.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.4.9.b.b.7.8.7.-.e.6.7.d.-.4.e.1.d.-.9.4.4.a.-.d.3.3.a.3.2.e.8.3.f.d.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.6.4.-.0.0.0.1.-.0.0.1.5.-.0.e.0.3.-.7.f.1.7.2.5.5.2.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Mini DuMP crash report, 14 streams, Thu Dec 19 14:48:34 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):42536
      Entropy (8bit):2.0149278252846283
      Encrypted:false
      SSDEEP:192:XFlBTYO5H4xmqICk5/eX6DH9I2R+ZyCqYWS1wIANp:55HaInl6OdI8wyCkI
      MD5:796648BA43565E158323CAF1FFA06DAF
      SHA1:64EBFA95D91CC69EBB8F13F708E8CAA314C3FED4
      SHA-256:2C042C40FB44B0A5C16F54C5D0CB845AB92BF1D0E840EE52DE44A51F541FF240
      SHA-512:FE926C7729D4C0A025B5E78646E181D00601A36BAAA26E96CD2A6458E13AF9E8AC51578D431DAD690A7C1616516B849FB474A2EF12CBA0A58B1046B95AD62201
      Malicious:false
      Preview:MDMP..a..... .......B2dg........................x................*..........T.......8...........T...........8...........................................................................................................eJ..............GenuineIntel............T.......<...A2dg.............................0..=...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8270
      Entropy (8bit):3.6890324148615474
      Encrypted:false
      SSDEEP:192:R6l7wVeJDjX6INrT6YPDF6kgmfToRFprG89bLFsfD5m:R6lXJvX6INv6Y7F6kgmfToRnLefg
      MD5:CF766BDA49942A7957683E841313567A
      SHA1:3AE45A7E82E03587F136FF6F25CB62E54ECAF87A
      SHA-256:50558730CBB6AFBC49D60D0D1A3CA27D8576E242C4CF42C5D8F1FA0107BDE33F
      SHA-512:440421EA7B29ECB0A8BED929D2E473925BD32DB88B2354ADB3FF40CAD1E193EEDA99835D09D06C57597CBA50F07ECFFE8833CC5B0E63DC70151858F058022C72
      Malicious:false
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.1.6.<./.P.i.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4658
      Entropy (8bit):4.458644910919505
      Encrypted:false
      SSDEEP:48:cvIwWl8zsLJg77aI9aNWpW8VYy+Ym8M4JCdPPFDoP+q8/4V2GScSQd:uIjflI7c87VFJvx2J3Qd
      MD5:EB9273035F36F1BE41F2C717ED20288E
      SHA1:66DCFF1EB97DEEB42E719D2A6F43470446210517
      SHA-256:EF0157CDF0C5842E0386730170A3CB5A1AF3AB0A19A72C5F1CDAA7CD11750D05
      SHA-512:8D9754E566D7BC468B0490959A107B16D0190B4789AFCF6F9FE0DF1082A09C26A9BF0D9BFD0389DB1D9C551F297D13594F52DFDB1733AF01951DBDE5D1C38EE2
      Malicious:false
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="638271" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Mini DuMP crash report, 14 streams, Thu Dec 19 14:48:40 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):43096
      Entropy (8bit):1.9909085218283005
      Encrypted:false
      SSDEEP:192:1ilUACXO5H4r+C4uKC2ypwbN2/rLjJ/OZR7N1:T+5H+UyGbN2D2R7
      MD5:E1D8B3318E1639211E028526F6A62691
      SHA1:C90237D8EFB7C31A731571223D60CBACBDC3F82D
      SHA-256:A49E759DC6C57BCEF3CEAF0F6C4201D99FCE084C46263D24053C4D855F66B270
      SHA-512:320E6964379AC3D7A701C971C020381ACD2ECFF970CE58C802E5868C9ABD51F7FFC3C77B3AECD23A2F61A0FA68AD1684B14664227B7CD32BA6695893F2C23655
      Malicious:false
      Preview:MDMP..a..... .......H2dg........................x................*..........T.......8...........T......................................................................................................................eJ..............GenuineIntel............T.......d...G2dg.............................0..=...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8272
      Entropy (8bit):3.6908295696004862
      Encrypted:false
      SSDEEP:192:R6l7wVeJBC6INQ6YvF6dgmfTDasFprG89bYosf1Im:R6lXJU6INQ6Yt6dgmfTDasHYbff
      MD5:ACBCB89C20337424FF933D41C276E20E
      SHA1:C47C6BB65A42AE24CEE7C540D934606F45B564EA
      SHA-256:2F877CDA13E00927105C859B4047FD6669F12E03752C90FDE338BCAF34F29C5F
      SHA-512:9B8D46A4696E96D7C1B5E9A9AECE434B35D8D69F500C7F4A9A96040D46ED9A0D7140AF010FCA5312FA2F8114459E48614ED0F3DC1389819966D6C47354E9F290
      Malicious:false
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.2.4.<./.P.i.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4660
      Entropy (8bit):4.461997528110649
      Encrypted:false
      SSDEEP:48:cvIwWl8zsLJg77aI9aNWpW8VYAFYm8M4JCdPEFa+q8/khGScSrd:uIjflI7c87VgJOjJ3rd
      MD5:65F5E0D1581BCB9FA742F7224E37C0A8
      SHA1:2E4074B890EAA8A62AE99F66BBACC29023B3A750
      SHA-256:E5E7C078309E590253D427B704FF78615843EB7A381FB8D156C3FFEA62D6E84B
      SHA-512:A9951A466D5AFD34AFE7C57EFA4763A4376FA45A5F3246D25557696BCA794C5D1B6F77C99B585E85E14EDF6099144886EE7822E7ACC68303873271FEABC21BA7
      Malicious:false
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="638271" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:MS Windows registry file, NT/2000 or above
      Category:dropped
      Size (bytes):1835008
      Entropy (8bit):4.46938292780555
      Encrypted:false
      SSDEEP:6144:azZfpi6ceLPx9skLmb0fYZWSP3aJG8nAgeiJRMMhA2zX4WABluuNFjDH5S:8ZHtYZWOKnMM6bFpHj4
      MD5:8D585BCFD6F6549B23D833989ADD5112
      SHA1:2DD5422F95CA7F0BEBAF09A597BE9E4DB806D7CA
      SHA-256:CAB02F466319F077F26B6DBF7D64A34ED029B8F16232460AB307E48BECC2BF2D
      SHA-512:7632426F69B8D4495CD77C6EBCB3C303164FE8612BB874FE9C16F803951916358B3889A05047BD74C0784B30E2093B41DB37E125F496C041C3598E72292F9BE3
      Malicious:false
      Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmR|O.%R...............................................................................................................................................................................................................................................................................................................................................DY ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
      Entropy (8bit):6.949016542225932
      TrID:
      • Win32 Dynamic Link Library (generic) (1002004/3) 96.66%
      • UPX compressed Win32 Executable (30571/9) 2.95%
      • Generic Win/DOS Executable (2004/3) 0.19%
      • DOS Executable Generic (2002/1) 0.19%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:IzFEtXcext.dll
      File size:14'375 bytes
      MD5:4515c43cca35f7436a01b8d8b795000b
      SHA1:932d230145cf8e5e9ca547606a6db8780eccc235
      SHA256:dde0053e594c5d97aa8c0030938a6c245b4516483cb401d785f91f8d621ff0fd
      SHA512:e3c036a5f5cb56a6e4806300f9e8bda1acad5620d4fe173860db7f53231a426e6dee20f74775b9e156279c4ea9750ad77bdf32798263647a106f889b083b58f1
      SSDEEP:192:/GomsOhWi4ai7+YtjrT8Z22QGmhSJHEVEA0s9k4eUOAYReqOwTNYv1eok27:/G7rHiM22XOP9kDUoW
      TLSH:35526BCDB27A4516F29F6F346BFB1366812AB50051634FDF39AA400D98D26AC8FE1311
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;.S.UQS.UQS.UQ.L+QR.UQtN(QU.UQtN.QQ.UQtN;Q\.UQtN8Qm.UQS.UQQ.UQ..FQT.UQS.TQ>.UQ<..QT.UQtN+QR.UQ<..QR.UQ<..QR.UQ<..QR.UQRichS.U
      Icon Hash:7ae282899bbab082
      Entrypoint:0x10019ef0
      Entrypoint Section:UPX1
      Digitally signed:false
      Imagebase:0x10000000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
      Time Stamp:0x4987029F [Mon Feb 2 14:26:39 2009 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:5
      OS Version Minor:1
      File Version Major:5
      File Version Minor:1
      Subsystem Version Major:5
      Subsystem Version Minor:1
      Import Hash:6bd2700562ffdb62092d7dd437dc94b3
      Instruction
      cmp byte ptr [esp+08h], 00000001h
      jne 00007F075CC2ED1Fh
      pushad
      mov esi, 10018000h
      lea edi, dword ptr [esi-00017000h]
      push edi
      jmp 00007F075CC2EB72h
      nop
      nop
      nop
      nop
      nop
      nop
      mov al, byte ptr [esi]
      inc esi
      mov byte ptr [edi], al
      inc edi
      add ebx, ebx
      jne 00007F075CC2EB69h
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      jc 00007F075CC2EB4Fh
      mov eax, 00000001h
      add ebx, ebx
      jne 00007F075CC2EB69h
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      adc eax, eax
      add ebx, ebx
      jnc 00007F075CC2EB51h
      jne 00007F075CC2EB6Bh
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      jnc 00007F075CC2EB46h
      xor ecx, ecx
      sub eax, 03h
      jc 00007F075CC2EB6Fh
      shl eax, 08h
      mov al, byte ptr [esi]
      inc esi
      xor eax, FFFFFFFFh
      je 00007F075CC2EBD6h
      mov ebp, eax
      add ebx, ebx
      jne 00007F075CC2EB69h
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      adc ecx, ecx
      add ebx, ebx
      jne 00007F075CC2EB69h
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      adc ecx, ecx
      jne 00007F075CC2EB82h
      inc ecx
      add ebx, ebx
      jne 00007F075CC2EB69h
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      adc ecx, ecx
      add ebx, ebx
      jnc 00007F075CC2EB51h
      jne 00007F075CC2EB6Bh
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      jnc 00007F075CC2EB46h
      add ecx, 02h
      cmp ebp, FFFFF300h
      adc ecx, 01h
      lea edx, dword ptr [edi+ebp]
      cmp ebp, FFFFFFFCh
      jbe 00007F075CC2EB71h
      mov al, byte ptr [edx]
      inc edx
      mov byte ptr [edi], al
      inc edi
      dec ecx
      jne 00007F075CC2EB59h
      jmp 00007F075CC2EAC8h
      nop
      mov eax, dword ptr [edx]
      add edx, 00000000h
      Programming Language:
      • [ASM] VS2005 build 50727
      • [IMP] VS2005 build 50727
      • [C++] VS2005 build 50727
      • [ C ] VS2005 build 50727
      • [ C ] VS2010 build 30319
      • [ASM] VS2010 build 30319
      • [EXP] VS2010 build 30319
      • [LNK] VS2010 build 30319
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x1b4d40xc74.rsrc
      IMAGE_DIRECTORY_ENTRY_IMPORT0x1b3cc0x108.rsrc
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x1b0000x3cc.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1c1480xc.rsrc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      UPX00x10000x170000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      UPX10x180000x30000x22006458836e1e22fdadf6e2bbd0f4c9374bFalse0.9401424632352942data7.702461371549278IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x1b0000x20000x120094731cef3ac522f95dbeaffb662efb25False0.3528645833333333data4.9186824754753244IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_VERSION0x1b05c0x370data0.41704545454545455
      DLLImport
      ADVAPI32.dllCryptDecrypt
      KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect
      msvcrt.dllfree
      ntdll.dllmemcpy
      NameOrdinalAddress
      AlgUninstall490x1001bbb2
      DllCanUnloadNow500x1001bbc7
      DllGetClassObject510x1001bbdf
      DllRegisterServer520x1001bbf9
      DllUnregisterServer530x1001bc13
      HNetDeleteRasConnection540x1001bc2f
      HNetFreeFirewallLoggingSettings550x1001bc4f
      HNetFreeSharingServicesPage560x1001bc77
      HNetGetFirewallSettingsPage570x1001bc9b
      HNetGetShareAndBridgeSettings580x1001bcbf
      HNetGetSharingServicesPage590x1001bce5
      HNetSetShareAndBridgeSettings600x1001bd08
      HNetSharedAccessSettingsDlg610x1001bd2e
      HNetSharingAndFirewallSettingsDlg620x1001bd52
      IcfChangeNotificationCreate630x1001bd7c
      IcfChangeNotificationDestroy640x1001bda0
      IcfCheckAppAuthorization650x1001bdc5
      IcfCloseDynamicFwPort660x1001bde6
      IcfConnect670x1001be04
      IcfDisconnect680x1001be17
      IcfFreeAdapters690x1001be2d
      IcfFreeDynamicFwPorts700x1001be45
      IcfFreeProfile710x1001be63
      IcfFreeString720x1001be7a
      IcfFreeTickets730x1001be90
      IcfGetAdapters740x1001bea7
      IcfGetCurrentProfileType750x1001bebe
      IcfGetDynamicFwPorts760x1001bedf
      IcfGetOperationalMode770x1001befc
      IcfGetProfile780x1001bf1a
      IcfGetTickets790x1001bf30
      IcfIsIcmpTypeAllowed800x1001bf46
      IcfIsPortAllowed810x1001bf63
      IcfOpenDynamicFwPort820x1001bf7c
      IcfOpenDynamicFwPortWithoutSocket830x1001bf99
      IcfOpenFileSharingPorts840x1001bfc3
      IcfRefreshPolicy850x1001bfe3
      IcfRemoveDisabledAuthorizedApp860x1001bffc
      IcfSetProfile870x1001c023
      IcfSetServicePermission880x1001c039
      IcfSubNetsGetScope890x1001c059
      IcfSubNetsIsStringValid900x1001c074
      IcfSubNetsToString910x1001c094
      RegisterClassObjects920x1001c0af
      ReleaseSingletons930x1001c0cc
      RevokeClassObjects940x1001c0e6
      WinBomConfigureHomeNet950x1001c101
      WinBomConfigureWindowsFirewall960x1001c120
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Dec 19, 2024 15:48:59.805536985 CET1.1.1.1192.168.2.60x4542No error (0)g-bing-com.ax-0001.ax-msedge.netax-0001.ax-msedge.netCNAME (Canonical name)IN (0x0001)false
      Dec 19, 2024 15:48:59.805536985 CET1.1.1.1192.168.2.60x4542No error (0)ax-0001.ax-msedge.net150.171.27.10A (IP address)IN (0x0001)false
      Dec 19, 2024 15:48:59.805536985 CET1.1.1.1192.168.2.60x4542No error (0)ax-0001.ax-msedge.net150.171.28.10A (IP address)IN (0x0001)false

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:09:48:33
      Start date:19/12/2024
      Path:C:\Windows\System32\loaddll32.exe
      Wow64 process (32bit):true
      Commandline:loaddll32.exe "C:\Users\user\Desktop\IzFEtXcext.dll"
      Imagebase:0x390000
      File size:126'464 bytes
      MD5 hash:51E6071F9CBA48E79F10C84515AAE618
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:1
      Start time:09:48:33
      Start date:19/12/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff66e660000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:2
      Start time:09:48:33
      Start date:19/12/2024
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\IzFEtXcext.dll",#1
      Imagebase:0x1c0000
      File size:236'544 bytes
      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:09:48:33
      Start date:19/12/2024
      Path:C:\Windows\SysWOW64\regsvr32.exe
      Wow64 process (32bit):true
      Commandline:regsvr32.exe /s C:\Users\user\Desktop\IzFEtXcext.dll
      Imagebase:0x2e0000
      File size:20'992 bytes
      MD5 hash:878E47C8656E53AE8A8A21E927C6F7E0
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:4
      Start time:09:48:33
      Start date:19/12/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\IzFEtXcext.dll",#1
      Imagebase:0x280000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:5
      Start time:09:48:33
      Start date:19/12/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe C:\Users\user\Desktop\IzFEtXcext.dll,AlgUninstall
      Imagebase:0x280000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:10
      Start time:09:48:34
      Start date:19/12/2024
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 632
      Imagebase:0x920000
      File size:483'680 bytes
      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:12
      Start time:09:48:36
      Start date:19/12/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe C:\Users\user\Desktop\IzFEtXcext.dll,DllCanUnloadNow
      Imagebase:0x280000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:15
      Start time:09:48:39
      Start date:19/12/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe C:\Users\user\Desktop\IzFEtXcext.dll,DllGetClassObject
      Imagebase:0x280000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:17
      Start time:09:48:40
      Start date:19/12/2024
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7524 -s 652
      Imagebase:0x920000
      File size:483'680 bytes
      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:7.3%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:14.6%
        Total number of Nodes:302
        Total number of Limit Nodes:7
        execution_graph 1070 70022706 1073 70022462 1070->1073 1072 70022717 1074 70022471 _XcptFilter 1073->1074 1075 7002247e 1073->1075 1074->1072 1075->1072 1247 70021fc4 1250 70021fcc 1247->1250 1248 7002204f 1250->1248 1251 7002209c RtlUnwind 1250->1251 1251->1250 1252 700226c4 1253 70022462 _XcptFilter 1252->1253 1254 700226d5 1253->1254 1080 7002118e 1087 70021ce1 1080->1087 1083 700211bf 1088 70021cf7 1087->1088 1089 700211a5 1087->1089 1088->1089 1090 70021d02 GetProcessHeap 1088->1090 1089->1083 1114 70021a20 1089->1114 1091 70021d17 RtlAllocateHeap 1090->1091 1092 70021ead GetLastError 1090->1092 1093 70021d2c 1091->1093 1096 70021ea4 1091->1096 1092->1096 1094 70021d73 1093->1094 1095 70021d49 RtlAllocateHeap 1093->1095 1098 70021db1 1094->1098 1099 70021d87 RtlAllocateHeap 1094->1099 1095->1094 1097 70021d5f memcpy 1095->1097 1096->1089 1142 7002169b 1096->1142 1097->1094 1102 70021dc5 RtlAllocateHeap 1098->1102 1108 70021def 1098->1108 1099->1098 1101 70021d9d memcpy 1099->1101 1101->1098 1107 70021ddb memcpy 1102->1107 1102->1108 1103 70021e03 RtlAllocateHeap 1106 70021e2d 1103->1106 1109 70021e19 memcpy 1103->1109 1105 70021e6b 1105->1096 1112 70021e7f RtlAllocateHeap 1105->1112 1106->1105 1110 70021e41 RtlAllocateHeap 1106->1110 1107->1108 1108->1103 1108->1106 1109->1106 1110->1105 1111 70021e57 memcpy 1110->1111 1111->1105 1112->1096 1113 70021e95 memcpy 1112->1113 1113->1089 1115 70021a4a 1114->1115 1121 700211b5 1114->1121 1156 7002145d 1115->1156 1118 70021f0e 7 API calls 1120 70021a6d 1118->1120 1131 70021acd 1120->1131 1172 700215bb 1120->1172 1132 7002177c 1121->1132 1122 70021adf 1122->1121 1123 70021eed 2 API calls 1122->1123 1123->1121 1126 7002145d 12 API calls 1127 70021a9f 1126->1127 1127->1131 1183 70021bda 1127->1183 1131->1122 1195 70021eed 1131->1195 1133 70021798 GetProcessHeap 1132->1133 1140 7002178e 1132->1140 1134 700217a5 1133->1134 1135 7002180f GetLastError 1133->1135 1136 700217c9 1134->1136 1137 700217c0 HeapFree 1134->1137 1135->1140 1138 700217e6 1136->1138 1139 700217dd HeapFree 1136->1139 1137->1136 1138->1140 1141 700217fa HeapFree 1138->1141 1139->1138 1140->1083 1141->1140 1143 700216b7 GetProcessHeap 1142->1143 1144 700216ad HeapFree 1142->1144 1145 700216c8 1143->1145 1146 7002176c GetLastError 1143->1146 1144->1089 1147 700216ec 1145->1147 1149 700216e3 HeapFree 1145->1149 1146->1144 1148 70021709 1147->1148 1150 70021700 HeapFree 1147->1150 1151 70021726 1148->1151 1152 7002171d HeapFree 1148->1152 1149->1147 1150->1148 1153 70021743 1151->1153 1154 7002173a HeapFree 1151->1154 1152->1151 1153->1144 1155 70021757 HeapFree 1153->1155 1154->1153 1155->1144 1157 700214ef 1156->1157 1158 7002147b 1156->1158 1157->1118 1157->1131 1158->1157 1159 7002148d GetProcessHeap 1158->1159 1160 7002149e CryptAcquireContextA 1159->1160 1161 7002157f GetLastError 1159->1161 1162 700214d6 1160->1162 1163 700214b4 GetLastError 1160->1163 1171 70021567 1161->1171 1162->1157 1165 700214fb RtlAllocateHeap 1162->1165 1163->1162 1164 700214c3 CryptAcquireContextA 1163->1164 1164->1162 1166 700214d4 GetLastError 1164->1166 1165->1157 1167 70021513 memcpy CryptImportKey 1165->1167 1166->1162 1168 70021575 GetLastError 1167->1168 1169 7002154e CryptDecrypt 1167->1169 1168->1171 1169->1168 1169->1171 1170 700215a1 HeapFree 1170->1157 1171->1157 1171->1170 1173 700215d1 1172->1173 1182 7002165e 1172->1182 1174 700215f2 GetProcessHeap 1173->1174 1173->1182 1175 70021672 GetLastError 1174->1175 1176 70021601 CreateFileW 1174->1176 1175->1182 1176->1175 1177 7002161f GetFileSize 1176->1177 1177->1175 1178 7002162c RtlAllocateHeap 1177->1178 1179 70021640 ReadFile 1178->1179 1178->1182 1180 70021662 HeapFree 1179->1180 1181 70021657 1179->1181 1180->1175 1181->1180 1181->1182 1182->1126 1182->1131 1184 70021ab6 1183->1184 1185 70021bf0 1183->1185 1184->1131 1190 700213e4 1184->1190 1185->1184 1186 70021c24 GetProcessHeap 1185->1186 1187 70021cc7 GetLastError 1186->1187 1188 70021c35 RtlAllocateHeap 1186->1188 1187->1184 1188->1184 1189 70021c46 6 API calls 1188->1189 1189->1184 1191 700213f0 1190->1191 1192 70021406 VirtualProtect 1191->1192 1194 7002141a 1191->1194 1193 7002144a GetLastError 1192->1193 1192->1194 1193->1194 1194->1131 1196 70021ef6 GetProcessHeap 1195->1196 1197 70021f0c 1195->1197 1196->1197 1198 70021f00 HeapFree 1196->1198 1197->1122 1198->1197 1258 70021fcc 1259 70021fe6 1258->1259 1260 7002204f 1258->1260 1259->1260 1262 7002209c RtlUnwind 1259->1262 1262->1259 1263 700227d1 1264 700227d6 1263->1264 1265 700224c8 10 API calls 1264->1265 1266 7002282e __except_handler4 1264->1266 1265->1266 1202 70021a17 1203 70021a4a 1202->1203 1212 70021a40 1202->1212 1204 7002145d 12 API calls 1203->1204 1205 70021a58 1204->1205 1207 70021f0e 7 API calls 1205->1207 1219 70021acd 1205->1219 1206 70021adf 1210 70021eed 2 API calls 1206->1210 1206->1212 1209 70021a6d 1207->1209 1208 70021eed 2 API calls 1208->1206 1211 700215bb 7 API calls 1209->1211 1209->1219 1210->1212 1213 70021a89 1211->1213 1214 7002145d 12 API calls 1213->1214 1213->1219 1215 70021a9f 1214->1215 1216 70021bda 9 API calls 1215->1216 1215->1219 1217 70021ab6 1216->1217 1218 700213e4 2 API calls 1217->1218 1217->1219 1218->1219 1219->1206 1219->1208 981 7002271a 982 70022722 981->982 984 70022896 __except_handler4 982->984 994 700211c8 982->994 986 7002277b 989 700211c8 23 API calls 986->989 987 7002280e 987->984 993 700227bb 987->993 988 700224c8 10 API calls 992 7002282e 988->992 990 7002278c 989->990 1011 700224c8 990->1011 992->984 993->987 993->988 995 700211e6 994->995 996 700211dd 994->996 995->986 995->987 1031 70021af8 996->1031 998 700211e2 998->995 999 700211f0 GetModuleFileNameW 998->999 1000 70021222 _wcslwr 999->1000 1001 70021214 GetLastError 999->1001 1003 7002122d 1000->1003 1009 7002127f 1000->1009 1002 700212b4 1001->1002 1002->995 1049 70021114 1003->1049 1007 70021250 1008 70021288 CreateThread 1007->1008 1007->1009 1008->1009 1010 7002129c GetLastError 1008->1010 1009->1002 1056 70021000 memset free 1009->1056 1010->1009 1012 700224d4 1011->1012 1013 70022518 __except_handler4 1012->1013 1014 700225d1 1012->1014 1015 700224fd 1012->1015 1013->993 1014->1013 1018 700225f5 InterlockedCompareExchange 1014->1018 1016 70022530 InterlockedCompareExchange 1015->1016 1017 70022538 1015->1017 1021 70022523 Sleep 1015->1021 1016->1015 1016->1017 1022 7002254d _amsg_exit 1017->1022 1025 70022556 __initterm_e 1017->1025 1019 700225e8 Sleep 1018->1019 1020 700225fe 1018->1020 1019->1018 1023 70022608 _amsg_exit 1020->1023 1030 70022612 1020->1030 1021->1016 1024 70022592 1022->1024 1023->1013 1024->1013 1027 7002259a InterlockedExchange 1024->1027 1025->1013 1028 7002257c _initterm 1025->1028 1026 7002264c InterlockedExchange 1026->1013 1027->1013 1028->1024 1029 70022636 free 1029->1026 1030->1026 1030->1029 1057 700228d0 1031->1057 1033 70021b04 GetProcessHeap 1034 70021b31 1033->1034 1035 70021b1f GetLastError 1033->1035 1036 70021114 2 API calls 1034->1036 1037 70021b28 1035->1037 1038 70021b3b 1036->1038 1039 70021bd1 1037->1039 1040 70021bc4 HeapFree 1037->1040 1058 70021f0e 1038->1058 1039->998 1040->1039 1044 70021b58 1044->1037 1045 70021b65 LoadLibraryW 1044->1045 1045->1037 1046 70021b7d memset 1045->1046 1047 70021b93 1046->1047 1047->1037 1048 70021b9d GetProcAddress 1047->1048 1048->1037 1048->1047 1050 70021121 1049->1050 1051 70021187 wcsrchr 1049->1051 1050->1051 1052 70021128 malloc 1050->1052 1051->1007 1052->1051 1053 70021139 1052->1053 1053->1051 1054 70021145 malloc 1053->1054 1055 7002115b 1053->1055 1054->1051 1055->1051 1056->1002 1057->1033 1059 70021f20 1058->1059 1061 70021b4a 1058->1061 1060 70021f27 ExpandEnvironmentStringsW 1059->1060 1059->1061 1062 70021f38 GetProcessHeap 1060->1062 1063 70021f99 GetLastError 1060->1063 1069 70021000 memset free 1061->1069 1062->1063 1064 70021f45 RtlAllocateHeap 1062->1064 1063->1061 1064->1061 1065 70021f58 ExpandEnvironmentStringsW 1064->1065 1065->1061 1066 70021f6b GetLastError 1065->1066 1067 70021f80 HeapFree 1066->1067 1068 70021f79 1066->1068 1067->1061 1068->1067 1068->1068 1069->1044 1267 700226d8 1268 700226e0 1267->1268 1269 700224c8 10 API calls 1268->1269 1270 7002282e __except_handler4 1268->1270 1271 70022701 1269->1271 1271->1270 1272 700211c8 23 API calls 1271->1272 1274 70022744 1272->1274 1273 700227bb 1273->1270 1275 700224c8 10 API calls 1273->1275 1274->1273 1276 700211c8 23 API calls 1274->1276 1275->1270 1277 7002278c 1276->1277 1278 700224c8 10 API calls 1277->1278 1278->1273 1220 7002291c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 1279 7002275d 1280 70022765 1279->1280 1281 700227bb 1280->1281 1283 700211c8 23 API calls 1280->1283 1282 700224c8 10 API calls 1281->1282 1286 7002282e __except_handler4 1281->1286 1282->1286 1284 7002278c 1283->1284 1285 700224c8 10 API calls 1284->1285 1285->1281 1221 700227a2 1222 700227a7 1221->1222 1223 700224c8 10 API calls 1222->1223 1224 700227bb 1223->1224 1225 700224c8 10 API calls 1224->1225 1226 7002282e __except_handler4 1224->1226 1225->1226 1287 70022c61 1290 700222e0 1287->1290 1289 70022c81 1292 7002230b __except_handler4 1290->1292 1293 70022382 __except_handler4 1292->1293 1294 700222a2 RtlUnwind 1292->1294 1293->1289 1294->1293 1227 700224a6 malloc 1228 700224c0 1227->1228 1295 70022669 1296 70022675 __except_handler4 1295->1296 1298 700224c8 10 API calls 1296->1298 1301 70022701 1296->1301 1306 70022695 __except_handler4 1296->1306 1297 700211c8 23 API calls 1299 70022744 1297->1299 1298->1301 1300 700227bb 1299->1300 1303 700211c8 23 API calls 1299->1303 1302 700224c8 10 API calls 1300->1302 1300->1306 1301->1297 1301->1306 1302->1306 1304 7002278c 1303->1304 1305 700224c8 10 API calls 1304->1305 1305->1300 972 70039ef0 973 70039efb 972->973 980 7003a0ab 972->980 974 7003a00a LoadLibraryA 973->974 979 7003a046 VirtualProtect VirtualProtect 973->979 975 7003a021 974->975 975->973 976 7003a028 GetProcAddress 975->976 976->975 978 7003a040 976->978 979->980 980->980 1232 70021bb6 1233 70021bbf 1232->1233 1234 70021bd1 1233->1234 1235 70021bc4 HeapFree 1233->1235 1235->1234 1236 700228b8 1237 700228c3 1236->1237 1238 700228c8 1236->1238 1240 70022c86 1237->1240 1241 70022cb5 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 1240->1241 1242 70022ca5 1240->1242 1243 70022cac 1241->1243 1242->1241 1242->1243 1243->1238 1313 700219f9 1314 70021a66 1313->1314 1315 70021a6d 1314->1315 1316 70021f0e 7 API calls 1314->1316 1318 700215bb 7 API calls 1315->1318 1328 70021acd 1315->1328 1316->1315 1317 70021adf 1320 70021eed 2 API calls 1317->1320 1322 70021af0 1317->1322 1321 70021a89 1318->1321 1319 70021eed 2 API calls 1319->1317 1320->1322 1323 7002145d 12 API calls 1321->1323 1321->1328 1324 70021a9f 1323->1324 1325 70021bda 9 API calls 1324->1325 1324->1328 1326 70021ab6 1325->1326 1327 700213e4 2 API calls 1326->1327 1326->1328 1327->1328 1328->1317 1328->1319

        Callgraph

        • Executed
        • Not Executed
        • Opacity -> Relevance
        • Disassembly available
        callgraph 0 Function_70021000 1 Function_70022B00 2 Function_70022A00 3 Function_70025300 4 Function_70039900 5 Function_70022706 35 Function_70022462 5->35 6 Function_70022806 30 Function_70022C4D 6->30 68 Function_700228AD 6->68 84 Function_700224C8 6->84 7 Function_7002290B 8 Function_70022C08 9 Function_70021909 10 Function_70021F0E 11 Function_70039A0C 12 Function_70022210 38 Function_7002216E 12->38 48 Function_70022180 12->48 13 Function_70025211 14 Function_70021A17 14->10 33 Function_7002145D 14->33 73 Function_700215BB 14->73 89 Function_70021BDA 14->89 96 Function_700213E4 14->96 98 Function_70021EED 14->98 15 Function_70021114 19 Function_7002102B 15->19 47 Function_70021083 15->47 16 Function_7002271A 16->30 16->68 83 Function_700211C8 16->83 16->84 17 Function_7002291C 18 Function_70021A20 18->10 18->33 18->73 18->89 18->96 18->98 20 Function_7003922F 21 Function_70039A2D 22 Function_7002142D 23 Function_70022833 23->35 24 Function_7002143B 24->7 25 Function_70022138 26 Function_70022B46 26->1 26->8 26->30 87 Function_70022AD0 26->87 27 Function_70022847 27->30 27->68 28 Function_70022749 28->35 29 Function_7002504E 31 Function_7003994C 32 Function_70022256 32->48 34 Function_7002275D 34->30 34->68 34->83 34->84 36 Function_70022C61 94 Function_700222E0 36->94 37 Function_70022669 37->8 37->30 37->68 37->83 37->84 39 Function_70022272 40 Function_70039C71 41 Function_70039070 42 Function_70022877 42->35 43 Function_7002207A 92 Function_700220DE 43->92 44 Function_7002177C 45 Function_70022482 46 Function_70039D83 64 Function_70022AA1 48->64 78 Function_70022AC0 48->78 49 Function_70022C86 50 Function_70039087 51 Function_70025286 52 Function_7002288B 52->30 52->68 53 Function_70022289 53->64 54 Function_7002118E 54->18 54->44 95 Function_70021CE1 54->95 55 Function_7002278E 55->35 56 Function_70022B8C 57 Function_7002169B 58 Function_70022A98 59 Function_7002209C 60 Function_700222A2 61 Function_700227A2 61->30 61->68 61->84 62 Function_70022BA0 62->30 63 Function_700251A0 65 Function_700395A7 66 Function_700224A6 67 Function_700218AF 69 Function_70021BB2 70 Function_700399B2 71 Function_70021BB6 71->7 72 Function_700251B6 74 Function_700228B8 74->49 75 Function_700222BC 75->48 76 Function_700220BC 77 Function_700227BD 77->35 79 Function_70022BC0 80 Function_70021FC4 80->59 80->92 81 Function_700226C4 81->35 82 Function_700218C5 83->0 83->15 102 Function_70021AF8 83->102 84->26 84->45 85 Function_70021FCC 85->59 85->92 86 Function_700228D0 88 Function_700227D1 88->30 88->68 88->84 90 Function_700226D8 90->30 90->68 90->83 90->84 91 Function_700393D8 93 Function_700382DD 94->26 94->39 94->60 94->75 95->57 96->7 96->86 97 Function_700390EA 99 Function_700227F2 99->35 100 Function_700250F0 101 Function_70039EF0 102->0 102->7 102->10 102->15 102->86 103 Function_700219F9 103->10 103->33 103->73 103->89 103->96 103->98 104 Function_700398FD

        Control-flow Graph

        APIs
        • GetProcessHeap.KERNEL32(70023140,00000018,700211E2), ref: 70021B12
        • GetLastError.KERNEL32 ref: 70021B1F
        • LoadLibraryW.KERNELBASE(?), ref: 70021B68
        • memset.NTDLL ref: 70021B88
        • GetProcAddress.KERNEL32(00000000,00000030), ref: 70021BA2
        • HeapFree.KERNEL32(?,00000000,?), ref: 70021BCB
        Memory Dump Source
        • Source File: 00000004.00000002.2237037908.0000000070021000.00000040.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 00000004.00000002.2237020495.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237037908.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237090067.0000000070039000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237110280.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70020000_rundll32.jbxd
        Similarity
        • API ID: Heap$AddressErrorFreeLastLibraryLoadProcProcessmemset
        • String ID:
        • API String ID: 2140647643-0
        • Opcode ID: 14acff810782e71c14224ff260e87a868309313b422d00374aa60877441a24ce
        • Instruction ID: e79b9779fb92b3ce18c0766488f1603c043ea4e33a0d59d7e591b0056d27b24e
        • Opcode Fuzzy Hash: 14acff810782e71c14224ff260e87a868309313b422d00374aa60877441a24ce
        • Instruction Fuzzy Hash: 60213E71D00214DFDB129FA2AC46AEDFAF5FF58B73F30051AE551A2261E7750A428F60

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 50 70039ef0-70039ef5 51 7003a0b4 50->51 52 70039efb-70039f08 50->52 51->51 53 70039f1a-70039f1f 52->53 54 70039f21 53->54 55 70039f23 54->55 56 70039f10-70039f15 54->56 58 70039f28-70039f2a 55->58 57 70039f16-70039f18 56->57 57->53 57->54 59 70039f33-70039f37 58->59 60 70039f2c-70039f31 58->60 59->58 61 70039f39 59->61 60->59 62 70039f44-70039f49 61->62 63 70039f3b-70039f42 61->63 64 70039f4b-70039f54 62->64 65 70039f58-70039f5a 62->65 63->58 63->62 66 70039f56 64->66 67 70039fca-70039fcd 64->67 68 70039f63-70039f67 65->68 69 70039f5c-70039f61 65->69 66->65 70 70039fd2-70039fd5 67->70 71 70039f70-70039f72 68->71 72 70039f69-70039f6e 68->72 69->68 75 70039fd7-70039fd9 70->75 73 70039f94-70039fa3 71->73 74 70039f74 71->74 72->71 78 70039fa5-70039fac 73->78 79 70039fb4-70039fc1 73->79 77 70039f75-70039f77 74->77 75->70 76 70039fdb-70039fde 75->76 76->70 80 70039fe0-70039ffc 76->80 81 70039f80-70039f84 77->81 82 70039f79-70039f7e 77->82 78->78 83 70039fae 78->83 79->79 84 70039fc3-70039fc5 79->84 80->75 85 70039ffe 80->85 81->77 86 70039f86 81->86 82->81 83->57 84->57 87 7003a004-7003a008 85->87 88 70039f91 86->88 89 70039f88-70039f8f 86->89 90 7003a046-7003a049 87->90 91 7003a00a-7003a020 LoadLibraryA 87->91 88->73 89->77 89->88 93 7003a04c-7003a053 90->93 92 7003a021-7003a026 91->92 92->87 94 7003a028-7003a037 GetProcAddress 92->94 95 7003a077-7003a0a7 VirtualProtect * 2 93->95 96 7003a055-7003a057 93->96 97 7003a040-7003a043 94->97 98 7003a039-7003a03e 94->98 101 7003a0ab-7003a0af 95->101 99 7003a06a-7003a075 96->99 100 7003a059-7003a068 96->100 98->92 99->100 100->93 101->101 102 7003a0b1 101->102 102->51
        Memory Dump Source
        • Source File: 00000004.00000002.2237090067.0000000070039000.00000080.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 00000004.00000002.2237020495.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237037908.0000000070021000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237037908.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237110280.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70020000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 67ab821521b22a61d0f9c30bdfd193e4fda862af6fb7720b3fb97f9bf772daf2
        • Instruction ID: 236dce6cd106e0db8358fe983b89641dd764f37ff08c0d24f007ec16dfb1ab46
        • Opcode Fuzzy Hash: 67ab821521b22a61d0f9c30bdfd193e4fda862af6fb7720b3fb97f9bf772daf2
        • Instruction Fuzzy Hash: 645105716042525FD3139AB8CC80799FBE6EB42A74FA8073CD5E6C73C9E7A4580687A0

        Control-flow Graph

        APIs
          • Part of subcall function 70021AF8: GetProcessHeap.KERNEL32(70023140,00000018,700211E2), ref: 70021B12
          • Part of subcall function 70021AF8: GetLastError.KERNEL32 ref: 70021B1F
          • Part of subcall function 70021AF8: HeapFree.KERNEL32(?,00000000,?), ref: 70021BCB
        • GetModuleFileNameW.KERNEL32(00000000,c:\windows\syswow64\rundll32.exe,00008000), ref: 7002120A
        • GetLastError.KERNEL32 ref: 70021214
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2237037908.0000000070021000.00000040.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 00000004.00000002.2237020495.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237037908.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237090067.0000000070039000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237110280.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70020000_rundll32.jbxd
        Similarity
        • API ID: ErrorHeapLast$FileFreeModuleNameProcess
        • String ID: /$c:\windows\syswow64\rundll32.exe
        • API String ID: 1384422278-378053207
        • Opcode ID: f4120d827ec82d291f5f4c23126745437c2036600ec98bfecc7bf404677898d8
        • Instruction ID: 7190e14b37b1b6236759c01c43043a3f47a2661c00b8fbc48be92d2c46aa4321
        • Opcode Fuzzy Hash: f4120d827ec82d291f5f4c23126745437c2036600ec98bfecc7bf404677898d8
        • Instruction Fuzzy Hash: 2921DE72600105EEE7009B65AD85BDFB2EEAF35BBB7700129F602D2341E7308E5A8664

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 264 7002145d-70021475 265 700215b1 264->265 266 7002147b-7002147e 264->266 267 700215b6-700215ba 265->267 266->265 268 70021484-70021487 266->268 268->265 269 7002148d-70021498 GetProcessHeap 268->269 270 7002149e-700214b2 CryptAcquireContextA 269->270 271 7002157f GetLastError 269->271 273 700214e7-700214ed 270->273 274 700214b4-700214c1 GetLastError 270->274 272 70021585 271->272 279 70021588-7002158a 272->279 277 700214fb-70021511 RtlAllocateHeap 273->277 278 700214ef-700214f6 273->278 275 700214c3-700214d2 CryptAcquireContextA 274->275 276 700214d6-700214d9 274->276 282 700214d4 GetLastError 275->282 283 700214db 275->283 284 700214de-700214e1 276->284 285 70021513-7002154c memcpy CryptImportKey 277->285 286 7002156c-70021573 277->286 280 700215ac-700215af 278->280 279->280 281 7002158c-7002158f 279->281 280->267 281->280 287 70021591-70021598 281->287 282->276 283->284 284->273 284->280 288 70021575-7002157d GetLastError 285->288 289 7002154e-70021565 CryptDecrypt 285->289 286->280 290 700215a1-700215a6 HeapFree 287->290 291 7002159a-7002159f 287->291 288->272 289->288 292 70021567-7002156a 289->292 290->280 291->290 291->291 292->279
        APIs
        • GetProcessHeap.KERNEL32(?,?,00000000,?,?,00000000), ref: 7002148D
        • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,00000040,?,?,00000000,?,?,00000000), ref: 700214AE
        • GetLastError.KERNEL32(?,?,00000000,?,?,00000000), ref: 700214BA
        • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,00000048,?,?,00000000,?,?,00000000), ref: 700214CD
        • GetLastError.KERNEL32(?,?,00000000,?,?,00000000), ref: 700214D4
        • RtlAllocateHeap.NTDLL(?,00000008,?), ref: 70021507
        • memcpy.NTDLL(0000000C,?,?,?,?,00000000,?,?,00000000), ref: 7002152E
        • CryptImportKey.ADVAPI32(00000000,00000000,?,00000000,00000001,?,?,?,00000000,?,?,00000000), ref: 70021543
        • CryptDecrypt.ADVAPI32(?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,00000000), ref: 7002155C
        • GetLastError.KERNEL32(?,?,00000000,?,?,00000000), ref: 70021575
        • GetLastError.KERNEL32(?,?,00000000,?,?,00000000), ref: 7002157F
        • HeapFree.KERNEL32(?,00000000,00000000,?,?,00000000,?,?,00000000), ref: 700215A6
        Memory Dump Source
        • Source File: 00000004.00000002.2237037908.0000000070021000.00000040.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 00000004.00000002.2237020495.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237037908.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237090067.0000000070039000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237110280.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70020000_rundll32.jbxd
        Similarity
        • API ID: CryptErrorLast$Heap$AcquireContext$AllocateDecryptFreeImportProcessmemcpy
        • String ID:
        • API String ID: 1755895236-0
        • Opcode ID: d51fbb49215f81f6da2d7d3adee05bb00a1167204d42b8f992171681b330320d
        • Instruction ID: c64bbb4e0cda2c7b3a83edabc1f09f468d339b81105af104d079fdba3ffd4708
        • Opcode Fuzzy Hash: d51fbb49215f81f6da2d7d3adee05bb00a1167204d42b8f992171681b330320d
        • Instruction Fuzzy Hash: 4541A371D00629EFDB119F91DDC4ADDBBBAFB54B66F2044A9E607A7210D3309E418B60

        Control-flow Graph

        APIs
        • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 70022CBA
        • GetCurrentProcessId.KERNEL32 ref: 70022CC6
        • GetCurrentThreadId.KERNEL32 ref: 70022CCE
        • GetTickCount.KERNEL32 ref: 70022CD6
        • QueryPerformanceCounter.KERNEL32(?), ref: 70022CE2
        Memory Dump Source
        • Source File: 00000004.00000002.2237037908.0000000070021000.00000040.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 00000004.00000002.2237020495.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237037908.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237090067.0000000070039000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237110280.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70020000_rundll32.jbxd
        Similarity
        • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
        • String ID:
        • API String ID: 1445889803-0
        • Opcode ID: 45c2a7b538529b5e88aa009e70076c8ccff8047cf1876331daccd2f795eb5a42
        • Instruction ID: 15aeb10c9ecf14f32a9a8b4ed8c02d0ca7528da8134d5da13857d9d66a64b29b
        • Opcode Fuzzy Hash: 45c2a7b538529b5e88aa009e70076c8ccff8047cf1876331daccd2f795eb5a42
        • Instruction Fuzzy Hash: 24014073C00214AFDB209BF9DC8879EB7F9FB48366F720555D802E7111D7309A428B94

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 221 70021ce1-70021cf1 222 70021cf7-70021cfc 221->222 223 70021ee4 221->223 222->223 225 70021d02-70021d11 GetProcessHeap 222->225 224 70021ee9-70021eec 223->224 226 70021d17-70021d26 RtlAllocateHeap 225->226 227 70021ead-70021eb3 GetLastError 225->227 228 70021ea4-70021eab 226->228 229 70021d2c-70021d47 226->229 230 70021eb6-70021eba 227->230 228->230 231 70021d7a-70021d7f 229->231 232 70021d49-70021d5d RtlAllocateHeap 229->232 233 70021ede-70021ee2 230->233 234 70021ebc-70021ec1 230->234 238 70021d81-70021d85 231->238 239 70021db8-70021dbd 231->239 236 70021d73 232->236 237 70021d5f-70021d71 memcpy 232->237 233->224 234->233 235 70021ec3-70021ec7 234->235 235->233 240 70021ec9-70021edc call 7002169b HeapFree 235->240 236->231 237->231 238->239 241 70021d87-70021d9b RtlAllocateHeap 238->241 242 70021df6-70021dfb 239->242 243 70021dbf-70021dc3 239->243 240->233 245 70021db1 241->245 246 70021d9d-70021daf memcpy 241->246 248 70021e34-70021e39 242->248 249 70021dfd-70021e01 242->249 243->242 247 70021dc5-70021dd9 RtlAllocateHeap 243->247 245->239 246->239 254 70021ddb-70021ded memcpy 247->254 255 70021def 247->255 252 70021e72-70021e77 248->252 253 70021e3b-70021e3f 248->253 249->248 250 70021e03-70021e17 RtlAllocateHeap 249->250 256 70021e19-70021e2b memcpy 250->256 257 70021e2d 250->257 252->230 259 70021e79-70021e7d 252->259 253->252 258 70021e41-70021e55 RtlAllocateHeap 253->258 254->242 255->242 256->248 257->248 260 70021e57-70021e69 memcpy 258->260 261 70021e6b 258->261 259->234 262 70021e7f-70021e93 RtlAllocateHeap 259->262 260->252 261->252 262->228 263 70021e95-70021ea2 memcpy 262->263 263->233
        APIs
        • GetProcessHeap.KERNEL32(?,?,?,?,?,?,700211A5,70021820,00000000), ref: 70021D06
        • RtlAllocateHeap.NTDLL(00000000,00000008,00000039), ref: 70021D1C
        • RtlAllocateHeap.NTDLL(?,00000008,?), ref: 70021D4F
        • memcpy.NTDLL(?,?,?,?,?,?,?,?,?,700211A5,70021820,00000000), ref: 70021D64
        • RtlAllocateHeap.NTDLL(?,00000008,?), ref: 70021D8D
        • memcpy.NTDLL(?,?,?,?,?,?,?,?,?,700211A5,70021820,00000000), ref: 70021DA2
        • RtlAllocateHeap.NTDLL(?,00000008,?), ref: 70021DCB
        • memcpy.NTDLL(?,?,?,?,?,?,?,?,?,700211A5,70021820,00000000), ref: 70021DE0
        • RtlAllocateHeap.NTDLL(?,00000008,?), ref: 70021E09
        • memcpy.NTDLL(?,?,?,?,?,?,?,?,?,700211A5,70021820,00000000), ref: 70021E1E
        • RtlAllocateHeap.NTDLL(?,00000008,?), ref: 70021E47
        • memcpy.NTDLL(?,?,?,?,?,?,?,?,?,700211A5,70021820,00000000), ref: 70021E5C
        • RtlAllocateHeap.NTDLL(?,00000008,?), ref: 70021E85
        • memcpy.NTDLL(?,?,?,?,?,?,?,?,?,700211A5,70021820,00000000), ref: 70021E9A
        • GetLastError.KERNEL32(?,?,?,?,?,?,700211A5,70021820,00000000), ref: 70021EAD
        • HeapFree.KERNEL32(?,00000000,?,?,?,?,?,?,?,700211A5,70021820,00000000), ref: 70021ED6
        Memory Dump Source
        • Source File: 00000004.00000002.2237037908.0000000070021000.00000040.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 00000004.00000002.2237020495.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237037908.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237090067.0000000070039000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237110280.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70020000_rundll32.jbxd
        Similarity
        • API ID: Heap$Allocate$memcpy$ErrorFreeLastProcess
        • String ID:
        • API String ID: 3236361993-0
        • Opcode ID: 6edcf7b8c769d60f924944f156100f837ee0bf068b37502f061bdea09cf28303
        • Instruction ID: bb68cad212365f0c5b6aefef2e52ee5730e588a549c1adcfe4c1073aea12ce1b
        • Opcode Fuzzy Hash: 6edcf7b8c769d60f924944f156100f837ee0bf068b37502f061bdea09cf28303
        • Instruction Fuzzy Hash: 57714670A01214EFDF18CF54DD94F9E7BB6AF18B22F22409CE802AB365C771AA45DB10

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 293 700224c8-700224d2 294 700224e2-700224f7 293->294 295 700224d4-700224da 293->295 298 700225d1-700225d4 294->298 299 700224fd-70022516 294->299 296 70022518-7002251a 295->296 297 700224dc 295->297 303 70022665-70022666 296->303 297->294 300 700225da-700225e6 298->300 301 7002265f-70022661 298->301 302 70022530-70022536 InterlockedCompareExchange 299->302 307 700225f5-700225fc InterlockedCompareExchange 300->307 306 70022662-70022664 301->306 304 70022538 302->304 305 7002251f-70022521 302->305 308 70022541-7002254b 304->308 311 70022523-7002252e Sleep 305->311 312 7002253a 305->312 306->303 309 700225e8-700225f3 Sleep 307->309 310 700225fe-70022606 307->310 313 70022556-70022573 call 70022482 308->313 314 7002254d-70022554 _amsg_exit 308->314 309->307 315 70022612-7002261a 310->315 316 70022608-70022610 _amsg_exit 310->316 311->302 312->308 325 70022575-70022577 313->325 326 7002257c-7002258c _initterm 313->326 317 70022592-70022598 314->317 319 7002264c-70022659 InterlockedExchange 315->319 320 7002261c-70022625 315->320 316->301 322 700225a2-700225a8 317->322 323 7002259a-7002259c InterlockedExchange 317->323 319->301 324 70022632-70022634 320->324 327 700225c6-700225cc 322->327 328 700225aa-700225b7 call 70022b46 322->328 323->322 329 70022636-7002264b free 324->329 330 70022627-7002262b 324->330 325->306 326->317 327->301 328->327 335 700225b9-700225bd 328->335 329->319 331 7002262f 330->331 332 7002262d 330->332 331->324 332->331 335->327
        APIs
        • Sleep.KERNEL32(000003E8), ref: 70022528
        • InterlockedCompareExchange.KERNEL32(700357EC,?,00000000), ref: 70022532
        • _amsg_exit.MSVCRT ref: 7002254F
        • __initterm_e.LIBCMT ref: 7002256A
        • _initterm.MSVCRT ref: 70022586
        • InterlockedExchange.KERNEL32(700357EC,00000000), ref: 7002259C
        • Sleep.KERNEL32(000003E8), ref: 700225ED
        • InterlockedCompareExchange.KERNEL32(700357EC,00000001,00000000), ref: 700225F8
        • _amsg_exit.MSVCRT ref: 7002260A
        • free.MSVCRT ref: 70022637
        • InterlockedExchange.KERNEL32(700357EC,00000000), ref: 70022659
        Memory Dump Source
        • Source File: 00000004.00000002.2237037908.0000000070021000.00000040.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 00000004.00000002.2237020495.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237037908.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237090067.0000000070039000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237110280.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70020000_rundll32.jbxd
        Similarity
        • API ID: ExchangeInterlocked$CompareSleep_amsg_exit$__initterm_e_inittermfree
        • String ID:
        • API String ID: 293963189-0
        • Opcode ID: 0fd5a9c3fbe3d8822e861f2995a75c6ef9bd6f87cefe8c9e9905cfb0378d5d1a
        • Instruction ID: 4130a5bd196add67c0e9f268afd4045757259e08db433cae2023839b579c5b9e
        • Opcode Fuzzy Hash: 0fd5a9c3fbe3d8822e861f2995a75c6ef9bd6f87cefe8c9e9905cfb0378d5d1a
        • Instruction Fuzzy Hash: AF41A133604201FFE7129FB6FC95B1D77AAEB40B77F30802DF906891A1DB7499418A60

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 336 70021bda-70021bea 337 70021cd2 336->337 338 70021bf0-70021bf5 336->338 340 70021cd9-70021ce0 337->340 338->337 339 70021bfb-70021c13 338->339 339->337 341 70021c19-70021c1e 339->341 341->337 342 70021c24-70021c2f GetProcessHeap 341->342 343 70021cc7-70021cd0 GetLastError 342->343 344 70021c35-70021c44 RtlAllocateHeap 342->344 343->340 345 70021c46-70021cbc memcpy * 6 344->345 346 70021cbe-70021cc5 344->346 345->340 346->340
        APIs
        • GetProcessHeap.KERNEL32(00000000,?,00000000,?,?,70021AB6,?,?), ref: 70021C24
        • RtlAllocateHeap.NTDLL(00000000,00000008,?), ref: 70021C3A
        • memcpy.NTDLL(-00000021,?,00000000,?,?,70021AB6,?,?), ref: 70021C5D
        • memcpy.NTDLL(00000000,?,?,-00000021,?,00000000,?,?,70021AB6,?,?), ref: 70021C6F
        • memcpy.NTDLL(?,?,?,00000000,?,?,-00000021,?,00000000,?,?,70021AB6,?,?), ref: 70021C7E
        • memcpy.NTDLL(?,?,?,?,?,?,00000000,?,?,-00000021,?,00000000,?,?,70021AB6,?), ref: 70021C8D
        • memcpy.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,-00000021,?,00000000), ref: 70021C9C
        • memcpy.NTDLL(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,-00000021), ref: 70021CAD
        • GetLastError.KERNEL32(?,?,70021AB6,?,?), ref: 70021CC7
        Memory Dump Source
        • Source File: 00000004.00000002.2237037908.0000000070021000.00000040.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 00000004.00000002.2237020495.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237037908.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237090067.0000000070039000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237110280.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70020000_rundll32.jbxd
        Similarity
        • API ID: memcpy$Heap$AllocateErrorLastProcess
        • String ID:
        • API String ID: 3271386352-0
        • Opcode ID: d7349cab97d0b1fa9266ab912c592eba20f318ced029c39187618c9dc58683f5
        • Instruction ID: f59bb803cbd0afb2dcffc75edb518eb9017ac6fa1c99299adf7220363da91aa4
        • Opcode Fuzzy Hash: d7349cab97d0b1fa9266ab912c592eba20f318ced029c39187618c9dc58683f5
        • Instruction Fuzzy Hash: B3313C76500204EFCF118FA5EDC1A8A7BB5FF08B65B254094ED0AAF21BC731E960DB64

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 347 700215bb-700215cb 348 70021681 347->348 349 700215d1-700215d6 347->349 351 70021686-70021688 348->351 349->348 350 700215dc-700215e1 349->350 350->348 354 700215e7-700215ec 350->354 352 70021696-7002169a 351->352 353 7002168a-7002168f 351->353 353->352 355 70021691-70021694 353->355 354->348 356 700215f2-700215ff GetProcessHeap 354->356 355->352 357 70021672-70021678 GetLastError 356->357 358 70021601-7002161d CreateFileW 356->358 357->351 358->357 359 7002161f-7002162a GetFileSize 358->359 359->357 360 7002162c-7002163e RtlAllocateHeap 359->360 361 70021640-70021655 ReadFile 360->361 362 7002167a-7002167f 360->362 363 70021662-70021670 HeapFree 361->363 364 70021657-7002165c 361->364 362->351 363->357 364->363 365 7002165e-70021660 364->365 365->352
        APIs
        • GetProcessHeap.KERNEL32(00000000,?,00000000,?,?,?,70021A89,?,00000000,?,00000000,?,00000000), ref: 700215F4
        • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,00000000,00000000,?,70021A89,?,00000000,?,00000000,?,00000000), ref: 7002160F
        • GetFileSize.KERNEL32(00000000,00000000,?,70021A89,?,00000000,?,00000000,?,00000000), ref: 70021621
        • RtlAllocateHeap.NTDLL(?,00000008,00000000), ref: 70021634
        • ReadFile.KERNEL32(70021A89,00000000,?,00000000,00000000,?,70021A89,?,00000000,?,00000000,?,00000000), ref: 7002164D
        • HeapFree.KERNEL32(?,00000000,00000000,?,70021A89,?,00000000,?,00000000,?,00000000), ref: 70021668
        • GetLastError.KERNEL32(?,70021A89,?,00000000,?,00000000,?,00000000), ref: 70021672
        Memory Dump Source
        • Source File: 00000004.00000002.2237037908.0000000070021000.00000040.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 00000004.00000002.2237020495.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237037908.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237090067.0000000070039000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237110280.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70020000_rundll32.jbxd
        Similarity
        • API ID: FileHeap$AllocateCreateErrorFreeLastProcessReadSize
        • String ID:
        • API String ID: 3933022082-0
        • Opcode ID: a086982794e01a2890ea47983f42d651e29e94475284d6378b5c32a39a9ded34
        • Instruction ID: c9d25fd044c06dd307ab4b0a6587b4bbd6cf54c5ec4d5c2bb22f361f847ee6ad
        • Opcode Fuzzy Hash: a086982794e01a2890ea47983f42d651e29e94475284d6378b5c32a39a9ded34
        • Instruction Fuzzy Hash: 3E217A70201224AFDB128F65DC8CADE7BBAEF15F72B250408F803D62A4D3309D61CBA0

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 366 70021f0e-70021f1a 367 70021fa3 366->367 368 70021f20-70021f25 366->368 370 70021fa8-70021fae 367->370 368->367 369 70021f27-70021f36 ExpandEnvironmentStringsW 368->369 371 70021f38-70021f43 GetProcessHeap 369->371 372 70021f99-70021fa1 GetLastError 369->372 371->372 373 70021f45-70021f56 RtlAllocateHeap 371->373 372->370 374 70021f92-70021f97 373->374 375 70021f58-70021f65 ExpandEnvironmentStringsW 373->375 374->370 376 70021f67-70021f69 375->376 377 70021f6b-70021f77 GetLastError 375->377 376->370 378 70021f80-70021f90 HeapFree 377->378 379 70021f79-70021f7e 377->379 378->370 379->378 379->379
        APIs
        • ExpandEnvironmentStringsW.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,?,70021A6D,?,?,?,00000000), ref: 70021F2C
        • GetProcessHeap.KERNEL32(?,?,70021A6D,?,?,?,00000000), ref: 70021F38
        • RtlAllocateHeap.NTDLL(00000000,00000008,00000000), ref: 70021F4C
        • ExpandEnvironmentStringsW.KERNEL32(?,00000000,00000000,?,?,70021A6D,?,?,?,00000000), ref: 70021F5D
        • GetLastError.KERNEL32(?,?,70021A6D,?,?,?,00000000), ref: 70021F6B
        • HeapFree.KERNEL32(?,00000000,70021A6D,?,?,70021A6D,?,?,?,00000000), ref: 70021F87
        • GetLastError.KERNEL32(?,?,70021A6D,?,?,?,00000000), ref: 70021F99
        Memory Dump Source
        • Source File: 00000004.00000002.2237037908.0000000070021000.00000040.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 00000004.00000002.2237020495.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237037908.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237090067.0000000070039000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237110280.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70020000_rundll32.jbxd
        Similarity
        • API ID: Heap$EnvironmentErrorExpandLastStrings$AllocateFreeProcess
        • String ID:
        • API String ID: 4255420659-0
        • Opcode ID: e8027c9dcacad6fe719729571e1321909a090a3d8d230b2d79cf9303c7c678d0
        • Instruction ID: 3256f14598197a1ac38d44f4a251c5148d9bc9a9f0318d5d9c1334a26dac07cc
        • Opcode Fuzzy Hash: e8027c9dcacad6fe719729571e1321909a090a3d8d230b2d79cf9303c7c678d0
        • Instruction Fuzzy Hash: B511B231600200AFE7625F65DE88B9E7AF9FF98B62F304038B956D6351D7748C418A70

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 380 7002169b-700216ab 381 700216b7-700216c2 GetProcessHeap 380->381 382 700216ad-700216b2 380->382 384 700216c8-700216d4 381->384 385 7002176c-70021772 GetLastError 381->385 383 70021778-7002177b 382->383 387 700216d6-700216db 384->387 388 700216ec-700216f1 384->388 386 70021775 385->386 386->383 391 700216e3-700216ea HeapFree 387->391 392 700216dd-700216e1 387->392 389 700216f3-700216f8 388->389 390 70021709-7002170e 388->390 393 70021700-70021707 HeapFree 389->393 394 700216fa-700216fe 389->394 395 70021710-70021715 390->395 396 70021726-7002172b 390->396 391->388 392->391 392->392 393->390 394->393 394->394 397 70021717-7002171b 395->397 398 7002171d-70021724 HeapFree 395->398 399 70021743-70021748 396->399 400 7002172d-70021732 396->400 397->397 397->398 398->396 403 70021760-70021763 399->403 404 7002174a-7002174f 399->404 401 70021734-70021738 400->401 402 7002173a-70021741 HeapFree 400->402 401->401 401->402 402->399 405 70021764-70021768 403->405 406 70021751-70021755 404->406 407 70021757-7002175e HeapFree 404->407 405->405 408 7002176a 405->408 406->406 406->407 407->403 408->386
        APIs
        • GetProcessHeap.KERNEL32(00000000,?,?,?,70021ECF,00000000,?,?,?,?,?,?,700211A5,70021820,00000000), ref: 700216B7
        • HeapFree.KERNEL32(?,00000000,?,?,?,?,70021ECF,00000000,?,?,?,?,?,?,700211A5,70021820), ref: 700216EA
        • HeapFree.KERNEL32(?,00000000,?,?,?,?,70021ECF,00000000,?,?,?,?,?,?,700211A5,70021820), ref: 70021707
        • HeapFree.KERNEL32(?,00000000,?,?,?,?,70021ECF,00000000,?,?,?,?,?,?,700211A5,70021820), ref: 70021724
        • HeapFree.KERNEL32(?,00000000,?,?,?,?,70021ECF,00000000,?,?,?,?,?,?,700211A5,70021820), ref: 70021741
        • HeapFree.KERNEL32(?,00000000,?,?,?,?,70021ECF,00000000,?,?,?,?,?,?,700211A5,70021820), ref: 7002175E
        Memory Dump Source
        • Source File: 00000004.00000002.2237037908.0000000070021000.00000040.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 00000004.00000002.2237020495.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237037908.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237090067.0000000070039000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237110280.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70020000_rundll32.jbxd
        Similarity
        • API ID: Heap$Free$Process
        • String ID:
        • API String ID: 2719409998-0
        • Opcode ID: a3bf90a1c613f77d26156df95df6720141e13b8691b88f963a188f5158d1edeb
        • Instruction ID: 7aa43be940aa377f2528f6c39e5040ec6be48b7e9f22baf724df6496d53cc487
        • Opcode Fuzzy Hash: a3bf90a1c613f77d26156df95df6720141e13b8691b88f963a188f5158d1edeb
        • Instruction Fuzzy Hash: 0931D531208649AFCB128F95EDD08ADBBFBEFB4A65760052DE18786B20C331AC45CB50

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 416 7002177c-7002178c 417 70021798-700217a3 GetProcessHeap 416->417 418 7002178e-70021793 416->418 420 700217a5-700217b1 417->420 421 7002180f-70021815 GetLastError 417->421 419 7002181b-7002181e 418->419 423 700217b3-700217b8 420->423 424 700217c9-700217ce 420->424 422 70021818 421->422 422->419 425 700217c0-700217c7 HeapFree 423->425 426 700217ba-700217be 423->426 427 700217d0-700217d5 424->427 428 700217e6-700217eb 424->428 425->424 426->425 426->426 429 700217d7-700217db 427->429 430 700217dd-700217e4 HeapFree 427->430 431 70021803-70021806 428->431 432 700217ed-700217f2 428->432 429->429 429->430 430->428 433 70021807-7002180b 431->433 434 700217f4-700217f8 432->434 435 700217fa-70021801 HeapFree 432->435 433->433 436 7002180d 433->436 434->434 434->435 435->431 436->422
        APIs
        • GetProcessHeap.KERNEL32(00000000,?,?,?,700211BF,00000000,00000000), ref: 70021798
        • HeapFree.KERNEL32(?,00000000,?,?,?,?,?,700211BF,00000000,00000000), ref: 700217C7
        • HeapFree.KERNEL32(?,00000000,?,?,?,?,?,700211BF,00000000,00000000), ref: 700217E4
        • HeapFree.KERNEL32(?,00000000,?,?,?,?,?,700211BF,00000000,00000000), ref: 70021801
        Memory Dump Source
        • Source File: 00000004.00000002.2237037908.0000000070021000.00000040.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 00000004.00000002.2237020495.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237037908.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237090067.0000000070039000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2237110280.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70020000_rundll32.jbxd
        Similarity
        • API ID: Heap$Free$Process
        • String ID:
        • API String ID: 2719409998-0
        • Opcode ID: b9e4f109976dd7628ad279cb3e808e2ea696357d44cfa643136886fad7c03fbf
        • Instruction ID: 56cdb7f88d5dc377d70ba9e65414dfcb295b49ec61f8c1ebc3c38e11fa3051d0
        • Opcode Fuzzy Hash: b9e4f109976dd7628ad279cb3e808e2ea696357d44cfa643136886fad7c03fbf
        • Instruction Fuzzy Hash: 7721E732108149AFDB118F99EDD08AEBBFBEF64A66720483DE14797B20C331AD45CB50

        Execution Graph

        Execution Coverage:7.3%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:0%
        Total number of Nodes:302
        Total number of Limit Nodes:7
        execution_graph 1070 70022706 1073 70022462 1070->1073 1072 70022717 1074 70022471 _XcptFilter 1073->1074 1075 7002247e 1073->1075 1074->1072 1075->1072 1247 70021fc4 1250 70021fcc 1247->1250 1248 7002204f 1250->1248 1251 7002209c RtlUnwind 1250->1251 1251->1250 1252 700226c4 1253 70022462 _XcptFilter 1252->1253 1254 700226d5 1253->1254 1080 7002118e 1087 70021ce1 1080->1087 1083 700211bf 1088 70021cf7 1087->1088 1089 700211a5 1087->1089 1088->1089 1090 70021d02 GetProcessHeap 1088->1090 1089->1083 1114 70021a20 1089->1114 1091 70021d17 RtlAllocateHeap 1090->1091 1092 70021ead GetLastError 1090->1092 1093 70021d2c 1091->1093 1096 70021ea4 1091->1096 1092->1096 1094 70021d73 1093->1094 1095 70021d49 RtlAllocateHeap 1093->1095 1098 70021db1 1094->1098 1099 70021d87 RtlAllocateHeap 1094->1099 1095->1094 1097 70021d5f memcpy 1095->1097 1096->1089 1142 7002169b 1096->1142 1097->1094 1102 70021dc5 RtlAllocateHeap 1098->1102 1108 70021def 1098->1108 1099->1098 1101 70021d9d memcpy 1099->1101 1101->1098 1107 70021ddb memcpy 1102->1107 1102->1108 1103 70021e03 RtlAllocateHeap 1106 70021e2d 1103->1106 1109 70021e19 memcpy 1103->1109 1105 70021e6b 1105->1096 1112 70021e7f RtlAllocateHeap 1105->1112 1106->1105 1110 70021e41 RtlAllocateHeap 1106->1110 1107->1108 1108->1103 1108->1106 1109->1106 1110->1105 1111 70021e57 memcpy 1110->1111 1111->1105 1112->1096 1113 70021e95 memcpy 1112->1113 1113->1089 1115 70021a4a 1114->1115 1121 700211b5 1114->1121 1156 7002145d 1115->1156 1118 70021f0e 7 API calls 1120 70021a6d 1118->1120 1131 70021acd 1120->1131 1172 700215bb 1120->1172 1132 7002177c 1121->1132 1122 70021adf 1122->1121 1123 70021eed 2 API calls 1122->1123 1123->1121 1126 7002145d 12 API calls 1127 70021a9f 1126->1127 1127->1131 1183 70021bda 1127->1183 1131->1122 1195 70021eed 1131->1195 1133 70021798 GetProcessHeap 1132->1133 1140 7002178e 1132->1140 1134 700217a5 1133->1134 1135 7002180f GetLastError 1133->1135 1136 700217c9 1134->1136 1137 700217c0 HeapFree 1134->1137 1135->1140 1138 700217e6 1136->1138 1139 700217dd HeapFree 1136->1139 1137->1136 1138->1140 1141 700217fa HeapFree 1138->1141 1139->1138 1140->1083 1141->1140 1143 700216b7 GetProcessHeap 1142->1143 1144 700216ad HeapFree 1142->1144 1145 700216c8 1143->1145 1146 7002176c GetLastError 1143->1146 1144->1089 1147 700216ec 1145->1147 1149 700216e3 HeapFree 1145->1149 1146->1144 1148 70021709 1147->1148 1150 70021700 HeapFree 1147->1150 1151 70021726 1148->1151 1152 7002171d HeapFree 1148->1152 1149->1147 1150->1148 1153 70021743 1151->1153 1154 7002173a HeapFree 1151->1154 1152->1151 1153->1144 1155 70021757 HeapFree 1153->1155 1154->1153 1155->1144 1157 700214ef 1156->1157 1158 7002147b 1156->1158 1157->1118 1157->1131 1158->1157 1159 7002148d GetProcessHeap 1158->1159 1160 7002149e CryptAcquireContextA 1159->1160 1161 7002157f GetLastError 1159->1161 1162 700214d6 1160->1162 1163 700214b4 GetLastError 1160->1163 1171 70021567 1161->1171 1162->1157 1165 700214fb RtlAllocateHeap 1162->1165 1163->1162 1164 700214c3 CryptAcquireContextA 1163->1164 1164->1162 1166 700214d4 GetLastError 1164->1166 1165->1157 1167 70021513 memcpy CryptImportKey 1165->1167 1166->1162 1168 70021575 GetLastError 1167->1168 1169 7002154e CryptDecrypt 1167->1169 1168->1171 1169->1168 1169->1171 1170 700215a1 HeapFree 1170->1157 1171->1157 1171->1170 1173 700215d1 1172->1173 1182 7002165e 1172->1182 1174 700215f2 GetProcessHeap 1173->1174 1173->1182 1175 70021672 GetLastError 1174->1175 1176 70021601 CreateFileW 1174->1176 1175->1182 1176->1175 1177 7002161f GetFileSize 1176->1177 1177->1175 1178 7002162c RtlAllocateHeap 1177->1178 1179 70021640 ReadFile 1178->1179 1178->1182 1180 70021662 HeapFree 1179->1180 1181 70021657 1179->1181 1180->1175 1181->1180 1181->1182 1182->1126 1182->1131 1184 70021ab6 1183->1184 1185 70021bf0 1183->1185 1184->1131 1190 700213e4 1184->1190 1185->1184 1186 70021c24 GetProcessHeap 1185->1186 1187 70021cc7 GetLastError 1186->1187 1188 70021c35 RtlAllocateHeap 1186->1188 1187->1184 1188->1184 1189 70021c46 6 API calls 1188->1189 1189->1184 1191 700213f0 1190->1191 1192 70021406 VirtualProtect 1191->1192 1194 7002141a 1191->1194 1193 7002144a GetLastError 1192->1193 1192->1194 1193->1194 1194->1131 1196 70021ef6 GetProcessHeap 1195->1196 1197 70021f0c 1195->1197 1196->1197 1198 70021f00 HeapFree 1196->1198 1197->1122 1198->1197 1258 70021fcc 1259 70021fe6 1258->1259 1260 7002204f 1258->1260 1259->1260 1262 7002209c RtlUnwind 1259->1262 1262->1259 1263 700227d1 1264 700227d6 1263->1264 1265 700224c8 10 API calls 1264->1265 1266 7002282e __except_handler4 1264->1266 1265->1266 1202 70021a17 1203 70021a4a 1202->1203 1212 70021a40 1202->1212 1204 7002145d 12 API calls 1203->1204 1205 70021a58 1204->1205 1207 70021f0e 7 API calls 1205->1207 1219 70021acd 1205->1219 1206 70021adf 1210 70021eed 2 API calls 1206->1210 1206->1212 1209 70021a6d 1207->1209 1208 70021eed 2 API calls 1208->1206 1211 700215bb 7 API calls 1209->1211 1209->1219 1210->1212 1213 70021a89 1211->1213 1214 7002145d 12 API calls 1213->1214 1213->1219 1215 70021a9f 1214->1215 1216 70021bda 9 API calls 1215->1216 1215->1219 1217 70021ab6 1216->1217 1218 700213e4 2 API calls 1217->1218 1217->1219 1218->1219 1219->1206 1219->1208 981 7002271a 982 70022722 981->982 984 70022896 __except_handler4 982->984 994 700211c8 982->994 986 7002277b 989 700211c8 23 API calls 986->989 987 7002280e 987->984 993 700227bb 987->993 988 700224c8 10 API calls 992 7002282e 988->992 990 7002278c 989->990 1011 700224c8 990->1011 992->984 993->987 993->988 995 700211e6 994->995 996 700211dd 994->996 995->986 995->987 1031 70021af8 996->1031 998 700211e2 998->995 999 700211f0 GetModuleFileNameW 998->999 1000 70021222 _wcslwr 999->1000 1001 70021214 GetLastError 999->1001 1003 7002122d 1000->1003 1009 7002127f 1000->1009 1002 700212b4 1001->1002 1002->995 1049 70021114 1003->1049 1007 70021250 1008 70021288 CreateThread 1007->1008 1007->1009 1008->1009 1010 7002129c GetLastError 1008->1010 1009->1002 1056 70021000 memset free 1009->1056 1010->1009 1012 700224d4 1011->1012 1013 70022518 __except_handler4 1012->1013 1014 700225d1 1012->1014 1015 700224fd 1012->1015 1013->993 1014->1013 1018 700225f5 InterlockedCompareExchange 1014->1018 1016 70022530 InterlockedCompareExchange 1015->1016 1017 70022538 1015->1017 1021 70022523 Sleep 1015->1021 1016->1015 1016->1017 1022 7002254d _amsg_exit 1017->1022 1025 70022556 __initterm_e 1017->1025 1019 700225e8 Sleep 1018->1019 1020 700225fe 1018->1020 1019->1018 1023 70022608 _amsg_exit 1020->1023 1030 70022612 1020->1030 1021->1016 1024 70022592 1022->1024 1023->1013 1024->1013 1027 7002259a InterlockedExchange 1024->1027 1025->1013 1028 7002257c _initterm 1025->1028 1026 7002264c InterlockedExchange 1026->1013 1027->1013 1028->1024 1029 70022636 free 1029->1026 1030->1026 1030->1029 1057 700228d0 1031->1057 1033 70021b04 GetProcessHeap 1034 70021b31 1033->1034 1035 70021b1f GetLastError 1033->1035 1036 70021114 2 API calls 1034->1036 1037 70021b28 1035->1037 1038 70021b3b 1036->1038 1039 70021bd1 1037->1039 1040 70021bc4 HeapFree 1037->1040 1058 70021f0e 1038->1058 1039->998 1040->1039 1044 70021b58 1044->1037 1045 70021b65 LoadLibraryW 1044->1045 1045->1037 1046 70021b7d memset 1045->1046 1047 70021b93 1046->1047 1047->1037 1048 70021b9d GetProcAddress 1047->1048 1048->1037 1048->1047 1050 70021121 1049->1050 1051 70021187 wcsrchr 1049->1051 1050->1051 1052 70021128 malloc 1050->1052 1051->1007 1052->1051 1053 70021139 1052->1053 1053->1051 1054 70021145 malloc 1053->1054 1055 7002115b 1053->1055 1054->1051 1055->1051 1056->1002 1057->1033 1059 70021f20 1058->1059 1061 70021b4a 1058->1061 1060 70021f27 ExpandEnvironmentStringsW 1059->1060 1059->1061 1062 70021f38 GetProcessHeap 1060->1062 1063 70021f99 GetLastError 1060->1063 1069 70021000 memset free 1061->1069 1062->1063 1064 70021f45 RtlAllocateHeap 1062->1064 1063->1061 1064->1061 1065 70021f58 ExpandEnvironmentStringsW 1064->1065 1065->1061 1066 70021f6b GetLastError 1065->1066 1067 70021f80 HeapFree 1066->1067 1068 70021f79 1066->1068 1067->1061 1068->1067 1068->1068 1069->1044 1267 700226d8 1268 700226e0 1267->1268 1269 700224c8 10 API calls 1268->1269 1270 7002282e __except_handler4 1268->1270 1271 70022701 1269->1271 1271->1270 1272 700211c8 23 API calls 1271->1272 1274 70022744 1272->1274 1273 700227bb 1273->1270 1275 700224c8 10 API calls 1273->1275 1274->1273 1276 700211c8 23 API calls 1274->1276 1275->1270 1277 7002278c 1276->1277 1278 700224c8 10 API calls 1277->1278 1278->1273 1220 7002291c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 1279 7002275d 1280 70022765 1279->1280 1281 700227bb 1280->1281 1283 700211c8 23 API calls 1280->1283 1282 700224c8 10 API calls 1281->1282 1286 7002282e __except_handler4 1281->1286 1282->1286 1284 7002278c 1283->1284 1285 700224c8 10 API calls 1284->1285 1285->1281 1221 700227a2 1222 700227a7 1221->1222 1223 700224c8 10 API calls 1222->1223 1224 700227bb 1223->1224 1225 700224c8 10 API calls 1224->1225 1226 7002282e __except_handler4 1224->1226 1225->1226 1287 70022c61 1290 700222e0 1287->1290 1289 70022c81 1292 7002230b __except_handler4 1290->1292 1293 70022382 __except_handler4 1292->1293 1294 700222a2 RtlUnwind 1292->1294 1293->1289 1294->1293 1227 700224a6 malloc 1228 700224c0 1227->1228 1295 70022669 1296 70022675 __except_handler4 1295->1296 1298 700224c8 10 API calls 1296->1298 1301 70022701 1296->1301 1306 70022695 __except_handler4 1296->1306 1297 700211c8 23 API calls 1299 70022744 1297->1299 1298->1301 1300 700227bb 1299->1300 1303 700211c8 23 API calls 1299->1303 1302 700224c8 10 API calls 1300->1302 1300->1306 1301->1297 1301->1306 1302->1306 1304 7002278c 1303->1304 1305 700224c8 10 API calls 1304->1305 1305->1300 972 70039ef0 973 70039efb 972->973 980 7003a0ab 972->980 974 7003a00a LoadLibraryA 973->974 979 7003a046 VirtualProtect VirtualProtect 973->979 975 7003a021 974->975 975->973 976 7003a028 GetProcAddress 975->976 976->975 978 7003a040 976->978 979->980 980->980 1232 70021bb6 1233 70021bbf 1232->1233 1234 70021bd1 1233->1234 1235 70021bc4 HeapFree 1233->1235 1235->1234 1236 700228b8 1237 700228c3 1236->1237 1238 700228c8 1236->1238 1240 70022c86 1237->1240 1241 70022cb5 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 1240->1241 1242 70022ca5 1240->1242 1243 70022cac 1241->1243 1242->1241 1242->1243 1243->1238 1313 700219f9 1314 70021a66 1313->1314 1315 70021a6d 1314->1315 1316 70021f0e 7 API calls 1314->1316 1318 700215bb 7 API calls 1315->1318 1328 70021acd 1315->1328 1316->1315 1317 70021adf 1320 70021eed 2 API calls 1317->1320 1322 70021af0 1317->1322 1321 70021a89 1318->1321 1319 70021eed 2 API calls 1319->1317 1320->1322 1323 7002145d 12 API calls 1321->1323 1321->1328 1324 70021a9f 1323->1324 1325 70021bda 9 API calls 1324->1325 1324->1328 1326 70021ab6 1325->1326 1327 700213e4 2 API calls 1326->1327 1326->1328 1327->1328 1328->1317 1328->1319

        Callgraph

        • Executed
        • Not Executed
        • Opacity -> Relevance
        • Disassembly available
        callgraph 0 Function_70021000 1 Function_70022B00 2 Function_70022A00 3 Function_70025300 4 Function_70039900 5 Function_70022706 35 Function_70022462 5->35 6 Function_70022806 30 Function_70022C4D 6->30 68 Function_700228AD 6->68 84 Function_700224C8 6->84 7 Function_7002290B 8 Function_70022C08 9 Function_70021909 10 Function_70021F0E 11 Function_70039A0C 12 Function_70022210 38 Function_7002216E 12->38 48 Function_70022180 12->48 13 Function_70025211 14 Function_70021A17 14->10 33 Function_7002145D 14->33 73 Function_700215BB 14->73 89 Function_70021BDA 14->89 96 Function_700213E4 14->96 98 Function_70021EED 14->98 15 Function_70021114 19 Function_7002102B 15->19 47 Function_70021083 15->47 16 Function_7002271A 16->30 16->68 83 Function_700211C8 16->83 16->84 17 Function_7002291C 18 Function_70021A20 18->10 18->33 18->73 18->89 18->96 18->98 20 Function_7003922F 21 Function_70039A2D 22 Function_7002142D 23 Function_70022833 23->35 24 Function_7002143B 24->7 25 Function_70022138 26 Function_70022B46 26->1 26->8 26->30 87 Function_70022AD0 26->87 27 Function_70022847 27->30 27->68 28 Function_70022749 28->35 29 Function_7002504E 31 Function_7003994C 32 Function_70022256 32->48 34 Function_7002275D 34->30 34->68 34->83 34->84 36 Function_70022C61 94 Function_700222E0 36->94 37 Function_70022669 37->8 37->30 37->68 37->83 37->84 39 Function_70022272 40 Function_70039C71 41 Function_70039070 42 Function_70022877 42->35 43 Function_7002207A 92 Function_700220DE 43->92 44 Function_7002177C 45 Function_70022482 46 Function_70039D83 64 Function_70022AA1 48->64 78 Function_70022AC0 48->78 49 Function_70022C86 50 Function_70039087 51 Function_70025286 52 Function_7002288B 52->30 52->68 53 Function_70022289 53->64 54 Function_7002118E 54->18 54->44 95 Function_70021CE1 54->95 55 Function_7002278E 55->35 56 Function_70022B8C 57 Function_7002169B 58 Function_70022A98 59 Function_7002209C 60 Function_700222A2 61 Function_700227A2 61->30 61->68 61->84 62 Function_70022BA0 62->30 63 Function_700251A0 65 Function_700395A7 66 Function_700224A6 67 Function_700218AF 69 Function_70021BB2 70 Function_700399B2 71 Function_70021BB6 71->7 72 Function_700251B6 74 Function_700228B8 74->49 75 Function_700222BC 75->48 76 Function_700220BC 77 Function_700227BD 77->35 79 Function_70022BC0 80 Function_70021FC4 80->59 80->92 81 Function_700226C4 81->35 82 Function_700218C5 83->0 83->15 102 Function_70021AF8 83->102 84->26 84->45 85 Function_70021FCC 85->59 85->92 86 Function_700228D0 88 Function_700227D1 88->30 88->68 88->84 90 Function_700226D8 90->30 90->68 90->83 90->84 91 Function_700393D8 93 Function_700382DD 94->26 94->39 94->60 94->75 95->57 96->7 96->86 97 Function_700390EA 99 Function_700227F2 99->35 100 Function_700250F0 101 Function_70039EF0 102->0 102->7 102->10 102->15 102->86 103 Function_700219F9 103->10 103->33 103->73 103->89 103->96 103->98 104 Function_700398FD

        Control-flow Graph

        APIs
          • Part of subcall function 70021AF8: GetProcessHeap.KERNEL32(70023140,00000018,700211E2), ref: 70021B12
          • Part of subcall function 70021AF8: GetLastError.KERNEL32 ref: 70021B1F
          • Part of subcall function 70021AF8: HeapFree.KERNEL32(?,00000000,?), ref: 70021BCB
        • GetModuleFileNameW.KERNEL32(00000000,c:\windows\syswow64\rundll32.exe,00008000), ref: 7002120A
        • GetLastError.KERNEL32 ref: 70021214
        Strings
        Memory Dump Source
        • Source File: 0000000F.00000002.2255814130.0000000070021000.00000040.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 0000000F.00000002.2255783568.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255814130.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255872765.0000000070039000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255897494.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_70020000_rundll32.jbxd
        Similarity
        • API ID: ErrorHeapLast$FileFreeModuleNameProcess
        • String ID: /$c:\windows\syswow64\rundll32.exe
        • API String ID: 1384422278-378053207
        • Opcode ID: f4120d827ec82d291f5f4c23126745437c2036600ec98bfecc7bf404677898d8
        • Instruction ID: 7190e14b37b1b6236759c01c43043a3f47a2661c00b8fbc48be92d2c46aa4321
        • Opcode Fuzzy Hash: f4120d827ec82d291f5f4c23126745437c2036600ec98bfecc7bf404677898d8
        • Instruction Fuzzy Hash: 2921DE72600105EEE7009B65AD85BDFB2EEAF35BBB7700129F602D2341E7308E5A8664

        Control-flow Graph

        APIs
        • GetProcessHeap.KERNEL32(70023140,00000018,700211E2), ref: 70021B12
        • GetLastError.KERNEL32 ref: 70021B1F
        • LoadLibraryW.KERNELBASE(?), ref: 70021B68
        • memset.NTDLL ref: 70021B88
        • GetProcAddress.KERNEL32(00000000,00000030), ref: 70021BA2
        • HeapFree.KERNEL32(?,00000000,?), ref: 70021BCB
        Memory Dump Source
        • Source File: 0000000F.00000002.2255814130.0000000070021000.00000040.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 0000000F.00000002.2255783568.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255814130.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255872765.0000000070039000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255897494.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_70020000_rundll32.jbxd
        Similarity
        • API ID: Heap$AddressErrorFreeLastLibraryLoadProcProcessmemset
        • String ID:
        • API String ID: 2140647643-0
        • Opcode ID: 14acff810782e71c14224ff260e87a868309313b422d00374aa60877441a24ce
        • Instruction ID: e79b9779fb92b3ce18c0766488f1603c043ea4e33a0d59d7e591b0056d27b24e
        • Opcode Fuzzy Hash: 14acff810782e71c14224ff260e87a868309313b422d00374aa60877441a24ce
        • Instruction Fuzzy Hash: 60213E71D00214DFDB129FA2AC46AEDFAF5FF58B73F30051AE551A2261E7750A428F60

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 50 70039ef0-70039ef5 51 7003a0b4 50->51 52 70039efb-70039f08 50->52 51->51 53 70039f1a-70039f1f 52->53 54 70039f21 53->54 55 70039f23 54->55 56 70039f10-70039f15 54->56 58 70039f28-70039f2a 55->58 57 70039f16-70039f18 56->57 57->53 57->54 59 70039f33-70039f37 58->59 60 70039f2c-70039f31 58->60 59->58 61 70039f39 59->61 60->59 62 70039f44-70039f49 61->62 63 70039f3b-70039f42 61->63 64 70039f4b-70039f54 62->64 65 70039f58-70039f5a 62->65 63->58 63->62 66 70039f56 64->66 67 70039fca-70039fcd 64->67 68 70039f63-70039f67 65->68 69 70039f5c-70039f61 65->69 66->65 70 70039fd2-70039fd5 67->70 71 70039f70-70039f72 68->71 72 70039f69-70039f6e 68->72 69->68 75 70039fd7-70039fd9 70->75 73 70039f94-70039fa3 71->73 74 70039f74 71->74 72->71 78 70039fa5-70039fac 73->78 79 70039fb4-70039fc1 73->79 77 70039f75-70039f77 74->77 75->70 76 70039fdb-70039fde 75->76 76->70 80 70039fe0-70039ffc 76->80 81 70039f80-70039f84 77->81 82 70039f79-70039f7e 77->82 78->78 83 70039fae 78->83 79->79 84 70039fc3-70039fc5 79->84 80->75 85 70039ffe 80->85 81->77 86 70039f86 81->86 82->81 83->57 84->57 87 7003a004-7003a008 85->87 88 70039f91 86->88 89 70039f88-70039f8f 86->89 90 7003a046-7003a049 87->90 91 7003a00a-7003a020 LoadLibraryA 87->91 88->73 89->77 89->88 93 7003a04c-7003a053 90->93 92 7003a021-7003a026 91->92 92->87 94 7003a028-7003a037 GetProcAddress 92->94 95 7003a077-7003a0a7 VirtualProtect * 2 93->95 96 7003a055-7003a057 93->96 97 7003a040-7003a043 94->97 98 7003a039-7003a03e 94->98 101 7003a0ab-7003a0af 95->101 99 7003a06a-7003a075 96->99 100 7003a059-7003a068 96->100 98->92 99->100 100->93 101->101 102 7003a0b1 101->102 102->51
        Memory Dump Source
        • Source File: 0000000F.00000002.2255872765.0000000070039000.00000080.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 0000000F.00000002.2255783568.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255814130.0000000070021000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255814130.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255897494.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_70020000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 67ab821521b22a61d0f9c30bdfd193e4fda862af6fb7720b3fb97f9bf772daf2
        • Instruction ID: 236dce6cd106e0db8358fe983b89641dd764f37ff08c0d24f007ec16dfb1ab46
        • Opcode Fuzzy Hash: 67ab821521b22a61d0f9c30bdfd193e4fda862af6fb7720b3fb97f9bf772daf2
        • Instruction Fuzzy Hash: 645105716042525FD3139AB8CC80799FBE6EB42A74FA8073CD5E6C73C9E7A4580687A0

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 264 7002145d-70021475 265 700215b1 264->265 266 7002147b-7002147e 264->266 267 700215b6-700215ba 265->267 266->265 268 70021484-70021487 266->268 268->265 269 7002148d-70021498 GetProcessHeap 268->269 270 7002149e-700214b2 CryptAcquireContextA 269->270 271 7002157f GetLastError 269->271 273 700214e7-700214ed 270->273 274 700214b4-700214c1 GetLastError 270->274 272 70021585 271->272 279 70021588-7002158a 272->279 277 700214fb-70021511 RtlAllocateHeap 273->277 278 700214ef-700214f6 273->278 275 700214c3-700214d2 CryptAcquireContextA 274->275 276 700214d6-700214d9 274->276 282 700214d4 GetLastError 275->282 283 700214db 275->283 284 700214de-700214e1 276->284 285 70021513-7002154c memcpy CryptImportKey 277->285 286 7002156c-70021573 277->286 280 700215ac-700215af 278->280 279->280 281 7002158c-7002158f 279->281 280->267 281->280 287 70021591-70021598 281->287 282->276 283->284 284->273 284->280 288 70021575-7002157d GetLastError 285->288 289 7002154e-70021565 CryptDecrypt 285->289 286->280 290 700215a1-700215a6 HeapFree 287->290 291 7002159a-7002159f 287->291 288->272 289->288 292 70021567-7002156a 289->292 290->280 291->290 291->291 292->279
        APIs
        • GetProcessHeap.KERNEL32(?,?,00000000,?,?,00000000), ref: 7002148D
        • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,00000040,?,?,00000000,?,?,00000000), ref: 700214AE
        • GetLastError.KERNEL32(?,?,00000000,?,?,00000000), ref: 700214BA
        • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,00000048,?,?,00000000,?,?,00000000), ref: 700214CD
        • GetLastError.KERNEL32(?,?,00000000,?,?,00000000), ref: 700214D4
        • RtlAllocateHeap.NTDLL(?,00000008,?), ref: 70021507
        • memcpy.NTDLL(0000000C,?,?,?,?,00000000,?,?,00000000), ref: 7002152E
        • CryptImportKey.ADVAPI32(00000000,00000000,?,00000000,00000001,?,?,?,00000000,?,?,00000000), ref: 70021543
        • CryptDecrypt.ADVAPI32(?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,00000000), ref: 7002155C
        • GetLastError.KERNEL32(?,?,00000000,?,?,00000000), ref: 70021575
        • GetLastError.KERNEL32(?,?,00000000,?,?,00000000), ref: 7002157F
        • HeapFree.KERNEL32(?,00000000,00000000,?,?,00000000,?,?,00000000), ref: 700215A6
        Memory Dump Source
        • Source File: 0000000F.00000002.2255814130.0000000070021000.00000040.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 0000000F.00000002.2255783568.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255814130.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255872765.0000000070039000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255897494.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_70020000_rundll32.jbxd
        Similarity
        • API ID: CryptErrorLast$Heap$AcquireContext$AllocateDecryptFreeImportProcessmemcpy
        • String ID:
        • API String ID: 1755895236-0
        • Opcode ID: d51fbb49215f81f6da2d7d3adee05bb00a1167204d42b8f992171681b330320d
        • Instruction ID: c64bbb4e0cda2c7b3a83edabc1f09f468d339b81105af104d079fdba3ffd4708
        • Opcode Fuzzy Hash: d51fbb49215f81f6da2d7d3adee05bb00a1167204d42b8f992171681b330320d
        • Instruction Fuzzy Hash: 4541A371D00629EFDB119F91DDC4ADDBBBAFB54B66F2044A9E607A7210D3309E418B60

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 221 70021ce1-70021cf1 222 70021cf7-70021cfc 221->222 223 70021ee4 221->223 222->223 225 70021d02-70021d11 GetProcessHeap 222->225 224 70021ee9-70021eec 223->224 226 70021d17-70021d26 RtlAllocateHeap 225->226 227 70021ead-70021eb3 GetLastError 225->227 228 70021ea4-70021eab 226->228 229 70021d2c-70021d47 226->229 230 70021eb6-70021eba 227->230 228->230 231 70021d7a-70021d7f 229->231 232 70021d49-70021d5d RtlAllocateHeap 229->232 233 70021ede-70021ee2 230->233 234 70021ebc-70021ec1 230->234 238 70021d81-70021d85 231->238 239 70021db8-70021dbd 231->239 236 70021d73 232->236 237 70021d5f-70021d71 memcpy 232->237 233->224 234->233 235 70021ec3-70021ec7 234->235 235->233 240 70021ec9-70021edc call 7002169b HeapFree 235->240 236->231 237->231 238->239 241 70021d87-70021d9b RtlAllocateHeap 238->241 242 70021df6-70021dfb 239->242 243 70021dbf-70021dc3 239->243 240->233 245 70021db1 241->245 246 70021d9d-70021daf memcpy 241->246 248 70021e34-70021e39 242->248 249 70021dfd-70021e01 242->249 243->242 247 70021dc5-70021dd9 RtlAllocateHeap 243->247 245->239 246->239 254 70021ddb-70021ded memcpy 247->254 255 70021def 247->255 252 70021e72-70021e77 248->252 253 70021e3b-70021e3f 248->253 249->248 250 70021e03-70021e17 RtlAllocateHeap 249->250 256 70021e19-70021e2b memcpy 250->256 257 70021e2d 250->257 252->230 259 70021e79-70021e7d 252->259 253->252 258 70021e41-70021e55 RtlAllocateHeap 253->258 254->242 255->242 256->248 257->248 260 70021e57-70021e69 memcpy 258->260 261 70021e6b 258->261 259->234 262 70021e7f-70021e93 RtlAllocateHeap 259->262 260->252 261->252 262->228 263 70021e95-70021ea2 memcpy 262->263 263->233
        APIs
        • GetProcessHeap.KERNEL32(?,?,?,?,?,?,700211A5,70021820,00000000), ref: 70021D06
        • RtlAllocateHeap.NTDLL(00000000,00000008,00000039), ref: 70021D1C
        • RtlAllocateHeap.NTDLL(?,00000008,?), ref: 70021D4F
        • memcpy.NTDLL(?,?,?,?,?,?,?,?,?,700211A5,70021820,00000000), ref: 70021D64
        • RtlAllocateHeap.NTDLL(?,00000008,?), ref: 70021D8D
        • memcpy.NTDLL(?,?,?,?,?,?,?,?,?,700211A5,70021820,00000000), ref: 70021DA2
        • RtlAllocateHeap.NTDLL(?,00000008,?), ref: 70021DCB
        • memcpy.NTDLL(?,?,?,?,?,?,?,?,?,700211A5,70021820,00000000), ref: 70021DE0
        • RtlAllocateHeap.NTDLL(?,00000008,?), ref: 70021E09
        • memcpy.NTDLL(?,?,?,?,?,?,?,?,?,700211A5,70021820,00000000), ref: 70021E1E
        • RtlAllocateHeap.NTDLL(?,00000008,?), ref: 70021E47
        • memcpy.NTDLL(?,?,?,?,?,?,?,?,?,700211A5,70021820,00000000), ref: 70021E5C
        • RtlAllocateHeap.NTDLL(?,00000008,?), ref: 70021E85
        • memcpy.NTDLL(?,?,?,?,?,?,?,?,?,700211A5,70021820,00000000), ref: 70021E9A
        • GetLastError.KERNEL32(?,?,?,?,?,?,700211A5,70021820,00000000), ref: 70021EAD
        • HeapFree.KERNEL32(?,00000000,?,?,?,?,?,?,?,700211A5,70021820,00000000), ref: 70021ED6
        Memory Dump Source
        • Source File: 0000000F.00000002.2255814130.0000000070021000.00000040.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 0000000F.00000002.2255783568.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255814130.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255872765.0000000070039000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255897494.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_70020000_rundll32.jbxd
        Similarity
        • API ID: Heap$Allocate$memcpy$ErrorFreeLastProcess
        • String ID:
        • API String ID: 3236361993-0
        • Opcode ID: 6edcf7b8c769d60f924944f156100f837ee0bf068b37502f061bdea09cf28303
        • Instruction ID: bb68cad212365f0c5b6aefef2e52ee5730e588a549c1adcfe4c1073aea12ce1b
        • Opcode Fuzzy Hash: 6edcf7b8c769d60f924944f156100f837ee0bf068b37502f061bdea09cf28303
        • Instruction Fuzzy Hash: 57714670A01214EFDF18CF54DD94F9E7BB6AF18B22F22409CE802AB365C771AA45DB10

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 293 700224c8-700224d2 294 700224e2-700224f7 293->294 295 700224d4-700224da 293->295 298 700225d1-700225d4 294->298 299 700224fd-70022516 294->299 296 70022518-7002251a 295->296 297 700224dc 295->297 303 70022665-70022666 296->303 297->294 300 700225da-700225e6 298->300 301 7002265f-70022661 298->301 302 70022530-70022536 InterlockedCompareExchange 299->302 307 700225f5-700225fc InterlockedCompareExchange 300->307 306 70022662-70022664 301->306 304 70022538 302->304 305 7002251f-70022521 302->305 308 70022541-7002254b 304->308 311 70022523-7002252e Sleep 305->311 312 7002253a 305->312 306->303 309 700225e8-700225f3 Sleep 307->309 310 700225fe-70022606 307->310 313 70022556-70022573 call 70022482 308->313 314 7002254d-70022554 _amsg_exit 308->314 309->307 315 70022612-7002261a 310->315 316 70022608-70022610 _amsg_exit 310->316 311->302 312->308 325 70022575-70022577 313->325 326 7002257c-7002258c _initterm 313->326 317 70022592-70022598 314->317 319 7002264c-70022659 InterlockedExchange 315->319 320 7002261c-70022625 315->320 316->301 322 700225a2-700225a8 317->322 323 7002259a-7002259c InterlockedExchange 317->323 319->301 324 70022632-70022634 320->324 327 700225c6-700225cc 322->327 328 700225aa-700225b7 call 70022b46 322->328 323->322 329 70022636-7002264b free 324->329 330 70022627-7002262b 324->330 325->306 326->317 327->301 328->327 335 700225b9-700225bd 328->335 329->319 331 7002262f 330->331 332 7002262d 330->332 331->324 332->331 335->327
        APIs
        • Sleep.KERNEL32(000003E8), ref: 70022528
        • InterlockedCompareExchange.KERNEL32(700357EC,?,00000000), ref: 70022532
        • _amsg_exit.MSVCRT ref: 7002254F
        • __initterm_e.LIBCMT ref: 7002256A
        • _initterm.MSVCRT ref: 70022586
        • InterlockedExchange.KERNEL32(700357EC,00000000), ref: 7002259C
        • Sleep.KERNEL32(000003E8), ref: 700225ED
        • InterlockedCompareExchange.KERNEL32(700357EC,00000001,00000000), ref: 700225F8
        • _amsg_exit.MSVCRT ref: 7002260A
        • free.MSVCRT ref: 70022637
        • InterlockedExchange.KERNEL32(700357EC,00000000), ref: 70022659
        Memory Dump Source
        • Source File: 0000000F.00000002.2255814130.0000000070021000.00000040.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 0000000F.00000002.2255783568.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255814130.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255872765.0000000070039000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255897494.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_70020000_rundll32.jbxd
        Similarity
        • API ID: ExchangeInterlocked$CompareSleep_amsg_exit$__initterm_e_inittermfree
        • String ID:
        • API String ID: 293963189-0
        • Opcode ID: 0fd5a9c3fbe3d8822e861f2995a75c6ef9bd6f87cefe8c9e9905cfb0378d5d1a
        • Instruction ID: 4130a5bd196add67c0e9f268afd4045757259e08db433cae2023839b579c5b9e
        • Opcode Fuzzy Hash: 0fd5a9c3fbe3d8822e861f2995a75c6ef9bd6f87cefe8c9e9905cfb0378d5d1a
        • Instruction Fuzzy Hash: AF41A133604201FFE7129FB6FC95B1D77AAEB40B77F30802DF906891A1DB7499418A60

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 336 70021bda-70021bea 337 70021cd2 336->337 338 70021bf0-70021bf5 336->338 340 70021cd9-70021ce0 337->340 338->337 339 70021bfb-70021c13 338->339 339->337 341 70021c19-70021c1e 339->341 341->337 342 70021c24-70021c2f GetProcessHeap 341->342 343 70021cc7-70021cd0 GetLastError 342->343 344 70021c35-70021c44 RtlAllocateHeap 342->344 343->340 345 70021c46-70021cbc memcpy * 6 344->345 346 70021cbe-70021cc5 344->346 345->340 346->340
        APIs
        • GetProcessHeap.KERNEL32(00000000,?,00000000,?,?,70021AB6,?,?), ref: 70021C24
        • RtlAllocateHeap.NTDLL(00000000,00000008,?), ref: 70021C3A
        • memcpy.NTDLL(-00000021,?,00000000,?,?,70021AB6,?,?), ref: 70021C5D
        • memcpy.NTDLL(00000000,?,?,-00000021,?,00000000,?,?,70021AB6,?,?), ref: 70021C6F
        • memcpy.NTDLL(?,?,?,00000000,?,?,-00000021,?,00000000,?,?,70021AB6,?,?), ref: 70021C7E
        • memcpy.NTDLL(?,?,?,?,?,?,00000000,?,?,-00000021,?,00000000,?,?,70021AB6,?), ref: 70021C8D
        • memcpy.NTDLL(?,?,?,?,?,?,?,?,?,00000000,?,?,-00000021,?,00000000), ref: 70021C9C
        • memcpy.NTDLL(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,-00000021), ref: 70021CAD
        • GetLastError.KERNEL32(?,?,70021AB6,?,?), ref: 70021CC7
        Memory Dump Source
        • Source File: 0000000F.00000002.2255814130.0000000070021000.00000040.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 0000000F.00000002.2255783568.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255814130.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255872765.0000000070039000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255897494.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_70020000_rundll32.jbxd
        Similarity
        • API ID: memcpy$Heap$AllocateErrorLastProcess
        • String ID:
        • API String ID: 3271386352-0
        • Opcode ID: d7349cab97d0b1fa9266ab912c592eba20f318ced029c39187618c9dc58683f5
        • Instruction ID: f59bb803cbd0afb2dcffc75edb518eb9017ac6fa1c99299adf7220363da91aa4
        • Opcode Fuzzy Hash: d7349cab97d0b1fa9266ab912c592eba20f318ced029c39187618c9dc58683f5
        • Instruction Fuzzy Hash: B3313C76500204EFCF118FA5EDC1A8A7BB5FF08B65B254094ED0AAF21BC731E960DB64

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 347 700215bb-700215cb 348 70021681 347->348 349 700215d1-700215d6 347->349 351 70021686-70021688 348->351 349->348 350 700215dc-700215e1 349->350 350->348 354 700215e7-700215ec 350->354 352 70021696-7002169a 351->352 353 7002168a-7002168f 351->353 353->352 355 70021691-70021694 353->355 354->348 356 700215f2-700215ff GetProcessHeap 354->356 355->352 357 70021672-70021678 GetLastError 356->357 358 70021601-7002161d CreateFileW 356->358 357->351 358->357 359 7002161f-7002162a GetFileSize 358->359 359->357 360 7002162c-7002163e RtlAllocateHeap 359->360 361 70021640-70021655 ReadFile 360->361 362 7002167a-7002167f 360->362 363 70021662-70021670 HeapFree 361->363 364 70021657-7002165c 361->364 362->351 363->357 364->363 365 7002165e-70021660 364->365 365->352
        APIs
        • GetProcessHeap.KERNEL32(00000000,?,00000000,?,?,?,70021A89,?,00000000,?,00000000,?,00000000), ref: 700215F4
        • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,00000000,00000000,?,70021A89,?,00000000,?,00000000,?,00000000), ref: 7002160F
        • GetFileSize.KERNEL32(00000000,00000000,?,70021A89,?,00000000,?,00000000,?,00000000), ref: 70021621
        • RtlAllocateHeap.NTDLL(?,00000008,00000000), ref: 70021634
        • ReadFile.KERNEL32(70021A89,00000000,?,00000000,00000000,?,70021A89,?,00000000,?,00000000,?,00000000), ref: 7002164D
        • HeapFree.KERNEL32(?,00000000,00000000,?,70021A89,?,00000000,?,00000000,?,00000000), ref: 70021668
        • GetLastError.KERNEL32(?,70021A89,?,00000000,?,00000000,?,00000000), ref: 70021672
        Memory Dump Source
        • Source File: 0000000F.00000002.2255814130.0000000070021000.00000040.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 0000000F.00000002.2255783568.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255814130.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255872765.0000000070039000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255897494.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_70020000_rundll32.jbxd
        Similarity
        • API ID: FileHeap$AllocateCreateErrorFreeLastProcessReadSize
        • String ID:
        • API String ID: 3933022082-0
        • Opcode ID: a086982794e01a2890ea47983f42d651e29e94475284d6378b5c32a39a9ded34
        • Instruction ID: c9d25fd044c06dd307ab4b0a6587b4bbd6cf54c5ec4d5c2bb22f361f847ee6ad
        • Opcode Fuzzy Hash: a086982794e01a2890ea47983f42d651e29e94475284d6378b5c32a39a9ded34
        • Instruction Fuzzy Hash: 3E217A70201224AFDB128F65DC8CADE7BBAEF15F72B250408F803D62A4D3309D61CBA0

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 366 70021f0e-70021f1a 367 70021fa3 366->367 368 70021f20-70021f25 366->368 370 70021fa8-70021fae 367->370 368->367 369 70021f27-70021f36 ExpandEnvironmentStringsW 368->369 371 70021f38-70021f43 GetProcessHeap 369->371 372 70021f99-70021fa1 GetLastError 369->372 371->372 373 70021f45-70021f56 RtlAllocateHeap 371->373 372->370 374 70021f92-70021f97 373->374 375 70021f58-70021f65 ExpandEnvironmentStringsW 373->375 374->370 376 70021f67-70021f69 375->376 377 70021f6b-70021f77 GetLastError 375->377 376->370 378 70021f80-70021f90 HeapFree 377->378 379 70021f79-70021f7e 377->379 378->370 379->378 379->379
        APIs
        • ExpandEnvironmentStringsW.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,?,70021A6D,?,?,?,00000000), ref: 70021F2C
        • GetProcessHeap.KERNEL32(?,?,70021A6D,?,?,?,00000000), ref: 70021F38
        • RtlAllocateHeap.NTDLL(00000000,00000008,00000000), ref: 70021F4C
        • ExpandEnvironmentStringsW.KERNEL32(?,00000000,00000000,?,?,70021A6D,?,?,?,00000000), ref: 70021F5D
        • GetLastError.KERNEL32(?,?,70021A6D,?,?,?,00000000), ref: 70021F6B
        • HeapFree.KERNEL32(?,00000000,70021A6D,?,?,70021A6D,?,?,?,00000000), ref: 70021F87
        • GetLastError.KERNEL32(?,?,70021A6D,?,?,?,00000000), ref: 70021F99
        Memory Dump Source
        • Source File: 0000000F.00000002.2255814130.0000000070021000.00000040.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 0000000F.00000002.2255783568.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255814130.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255872765.0000000070039000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255897494.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_70020000_rundll32.jbxd
        Similarity
        • API ID: Heap$EnvironmentErrorExpandLastStrings$AllocateFreeProcess
        • String ID:
        • API String ID: 4255420659-0
        • Opcode ID: e8027c9dcacad6fe719729571e1321909a090a3d8d230b2d79cf9303c7c678d0
        • Instruction ID: 3256f14598197a1ac38d44f4a251c5148d9bc9a9f0318d5d9c1334a26dac07cc
        • Opcode Fuzzy Hash: e8027c9dcacad6fe719729571e1321909a090a3d8d230b2d79cf9303c7c678d0
        • Instruction Fuzzy Hash: B511B231600200AFE7625F65DE88B9E7AF9FF98B62F304038B956D6351D7748C418A70

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 380 7002169b-700216ab 381 700216b7-700216c2 GetProcessHeap 380->381 382 700216ad-700216b2 380->382 384 700216c8-700216d4 381->384 385 7002176c-70021772 GetLastError 381->385 383 70021778-7002177b 382->383 387 700216d6-700216db 384->387 388 700216ec-700216f1 384->388 386 70021775 385->386 386->383 391 700216e3-700216ea HeapFree 387->391 392 700216dd-700216e1 387->392 389 700216f3-700216f8 388->389 390 70021709-7002170e 388->390 393 70021700-70021707 HeapFree 389->393 394 700216fa-700216fe 389->394 395 70021710-70021715 390->395 396 70021726-7002172b 390->396 391->388 392->391 392->392 393->390 394->393 394->394 397 70021717-7002171b 395->397 398 7002171d-70021724 HeapFree 395->398 399 70021743-70021748 396->399 400 7002172d-70021732 396->400 397->397 397->398 398->396 403 70021760-70021763 399->403 404 7002174a-7002174f 399->404 401 70021734-70021738 400->401 402 7002173a-70021741 HeapFree 400->402 401->401 401->402 402->399 405 70021764-70021768 403->405 406 70021751-70021755 404->406 407 70021757-7002175e HeapFree 404->407 405->405 408 7002176a 405->408 406->406 406->407 407->403 408->386
        APIs
        • GetProcessHeap.KERNEL32(00000000,?,?,?,70021ECF,00000000,?,?,?,?,?,?,700211A5,70021820,00000000), ref: 700216B7
        • HeapFree.KERNEL32(?,00000000,?,?,?,?,70021ECF,00000000,?,?,?,?,?,?,700211A5,70021820), ref: 700216EA
        • HeapFree.KERNEL32(?,00000000,?,?,?,?,70021ECF,00000000,?,?,?,?,?,?,700211A5,70021820), ref: 70021707
        • HeapFree.KERNEL32(?,00000000,?,?,?,?,70021ECF,00000000,?,?,?,?,?,?,700211A5,70021820), ref: 70021724
        • HeapFree.KERNEL32(?,00000000,?,?,?,?,70021ECF,00000000,?,?,?,?,?,?,700211A5,70021820), ref: 70021741
        • HeapFree.KERNEL32(?,00000000,?,?,?,?,70021ECF,00000000,?,?,?,?,?,?,700211A5,70021820), ref: 7002175E
        Memory Dump Source
        • Source File: 0000000F.00000002.2255814130.0000000070021000.00000040.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 0000000F.00000002.2255783568.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255814130.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255872765.0000000070039000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255897494.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_70020000_rundll32.jbxd
        Similarity
        • API ID: Heap$Free$Process
        • String ID:
        • API String ID: 2719409998-0
        • Opcode ID: a3bf90a1c613f77d26156df95df6720141e13b8691b88f963a188f5158d1edeb
        • Instruction ID: 7aa43be940aa377f2528f6c39e5040ec6be48b7e9f22baf724df6496d53cc487
        • Opcode Fuzzy Hash: a3bf90a1c613f77d26156df95df6720141e13b8691b88f963a188f5158d1edeb
        • Instruction Fuzzy Hash: 0931D531208649AFCB128F95EDD08ADBBFBEFB4A65760052DE18786B20C331AC45CB50

        Control-flow Graph

        APIs
        • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 70022CBA
        • GetCurrentProcessId.KERNEL32 ref: 70022CC6
        • GetCurrentThreadId.KERNEL32 ref: 70022CCE
        • GetTickCount.KERNEL32 ref: 70022CD6
        • QueryPerformanceCounter.KERNEL32(?), ref: 70022CE2
        Memory Dump Source
        • Source File: 0000000F.00000002.2255814130.0000000070021000.00000040.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 0000000F.00000002.2255783568.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255814130.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255872765.0000000070039000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255897494.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_70020000_rundll32.jbxd
        Similarity
        • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
        • String ID:
        • API String ID: 1445889803-0
        • Opcode ID: 45c2a7b538529b5e88aa009e70076c8ccff8047cf1876331daccd2f795eb5a42
        • Instruction ID: 15aeb10c9ecf14f32a9a8b4ed8c02d0ca7528da8134d5da13857d9d66a64b29b
        • Opcode Fuzzy Hash: 45c2a7b538529b5e88aa009e70076c8ccff8047cf1876331daccd2f795eb5a42
        • Instruction Fuzzy Hash: 24014073C00214AFDB209BF9DC8879EB7F9FB48366F720555D802E7111D7309A428B94

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 416 7002177c-7002178c 417 70021798-700217a3 GetProcessHeap 416->417 418 7002178e-70021793 416->418 420 700217a5-700217b1 417->420 421 7002180f-70021815 GetLastError 417->421 419 7002181b-7002181e 418->419 423 700217b3-700217b8 420->423 424 700217c9-700217ce 420->424 422 70021818 421->422 422->419 425 700217c0-700217c7 HeapFree 423->425 426 700217ba-700217be 423->426 427 700217d0-700217d5 424->427 428 700217e6-700217eb 424->428 425->424 426->425 426->426 429 700217d7-700217db 427->429 430 700217dd-700217e4 HeapFree 427->430 431 70021803-70021806 428->431 432 700217ed-700217f2 428->432 429->429 429->430 430->428 433 70021807-7002180b 431->433 434 700217f4-700217f8 432->434 435 700217fa-70021801 HeapFree 432->435 433->433 436 7002180d 433->436 434->434 434->435 435->431 436->422
        APIs
        • GetProcessHeap.KERNEL32(00000000,?,?,?,700211BF,00000000,00000000), ref: 70021798
        • HeapFree.KERNEL32(?,00000000,?,?,?,?,?,700211BF,00000000,00000000), ref: 700217C7
        • HeapFree.KERNEL32(?,00000000,?,?,?,?,?,700211BF,00000000,00000000), ref: 700217E4
        • HeapFree.KERNEL32(?,00000000,?,?,?,?,?,700211BF,00000000,00000000), ref: 70021801
        Memory Dump Source
        • Source File: 0000000F.00000002.2255814130.0000000070021000.00000040.00000001.01000000.00000003.sdmp, Offset: 70020000, based on PE: true
        • Associated: 0000000F.00000002.2255783568.0000000070020000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255814130.0000000070038000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255872765.0000000070039000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000F.00000002.2255897494.000000007003B000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_15_2_70020000_rundll32.jbxd
        Similarity
        • API ID: Heap$Free$Process
        • String ID:
        • API String ID: 2719409998-0
        • Opcode ID: b9e4f109976dd7628ad279cb3e808e2ea696357d44cfa643136886fad7c03fbf
        • Instruction ID: 56cdb7f88d5dc377d70ba9e65414dfcb295b49ec61f8c1ebc3c38e11fa3051d0
        • Opcode Fuzzy Hash: b9e4f109976dd7628ad279cb3e808e2ea696357d44cfa643136886fad7c03fbf
        • Instruction Fuzzy Hash: 7721E732108149AFDB118F99EDD08AEBBFBEF64A66720483DE14797B20C331AD45CB50