Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ZaPNN51vQo.dll

Overview

General Information

Sample name:ZaPNN51vQo.dll
renamed because original name is a hash value
Original sample name:f222320a45dad46987e5600556f42a49.dll
Analysis ID:1579300
MD5:f222320a45dad46987e5600556f42a49
SHA1:0bc94ccb35d2dd80954b6dde717bcce305597ce6
SHA256:a6c578970637169d77ab319744ba4ef283bfe55816013ee2f3e5036332b3d27d
Tags:dllGh0stRATuser-abuse_ch
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Submitted sample is a known malware sample
AI detected suspicious sample
Contains functionality to access PhysicalDrive, possible boot sector overwrite
Contains functionality to detect sleep reduction / modifications
Contains functionality to infect the boot sector
Found evasive API chain (may stop execution after checking mutex)
Found stalling execution ending in API Sleep call
Machine Learning detection for sample
Tries to delay execution (extensive OutputDebugStringW loop)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Internet Provider seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 5376 cmdline: loaddll32.exe "C:\Users\user\Desktop\ZaPNN51vQo.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 5264 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1816 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ZaPNN51vQo.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 5772 cmdline: rundll32.exe "C:\Users\user\Desktop\ZaPNN51vQo.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • WerFault.exe (PID: 2200 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5772 -s 672 MD5: C31336C1EFC2CCB44B4326EA793040F2)
        • WerFault.exe (PID: 4160 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5772 -s 676 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 5780 cmdline: rundll32.exe C:\Users\user\Desktop\ZaPNN51vQo.dll,loop MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 3128 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5780 -s 664 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • WerFault.exe (PID: 2104 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5780 -s 668 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 1532 cmdline: rundll32.exe C:\Users\user\Desktop\ZaPNN51vQo.dll,mydoor MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6188 cmdline: rundll32.exe "C:\Users\user\Desktop\ZaPNN51vQo.dll",loop MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 2820 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6188 -s 664 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 5988 cmdline: rundll32.exe "C:\Users\user\Desktop\ZaPNN51vQo.dll",mydoor MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-21T14:17:09.486589+010020169221Malware Command and Control Activity Detected192.168.2.549709162.210.196.168443TCP
2024-12-21T14:17:35.962286+010020169221Malware Command and Control Activity Detected192.168.2.549764162.210.196.168443TCP
2024-12-21T14:18:02.474110+010020169221Malware Command and Control Activity Detected192.168.2.549824162.210.196.168443TCP
2024-12-21T14:18:29.159467+010020169221Malware Command and Control Activity Detected192.168.2.549883162.210.196.168443TCP
2024-12-21T14:18:55.809706+010020169221Malware Command and Control Activity Detected192.168.2.549943162.210.196.168443TCP
2024-12-21T14:19:22.654246+010020169221Malware Command and Control Activity Detected192.168.2.549994162.210.196.168443TCP
2024-12-21T14:19:49.169615+010020169221Malware Command and Control Activity Detected192.168.2.549995162.210.196.168443TCP
2024-12-21T14:20:15.674833+010020169221Malware Command and Control Activity Detected192.168.2.549996162.210.196.168443TCP
2024-12-21T14:20:42.268921+010020169221Malware Command and Control Activity Detected192.168.2.549997162.210.196.168443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ZaPNN51vQo.dllAvira: detected
Source: ZaPNN51vQo.dllVirustotal: Detection: 82%Perma Link
Source: ZaPNN51vQo.dllReversingLabs: Detection: 68%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: ZaPNN51vQo.dllJoe Sandbox ML: detected
Source: ZaPNN51vQo.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0453D880 lstrcpyW,FindFirstFileW,FindClose,FindClose,3_2_0453D880
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0453D570 lstrlenW,wsprintfW,FindFirstFileW,wsprintfW,wsprintfW,wcslen,?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z,??2@YAPAXI@Z,??3@YAXPAX@Z,FindNextFileW,FindClose,3_2_0453D570
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0453D930 FindFirstFileW,FindClose,CreateFileW,CloseHandle,3_2_0453D930
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0453D120 wsprintfW,FindFirstFileW,DeleteFileW,wsprintfW,wsprintfW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,3_2_0453D120
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0453CFA0 LocalAlloc,wsprintfW,FindFirstFileW,LocalReAlloc,lstrcmpW,lstrcmpW,lstrlenW,FindNextFileW,LocalFree,FindClose,3_2_0453CFA0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C4D880 lstrcpyW,FindFirstFileW,FindClose,FindClose,4_2_04C4D880
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C4CFA0 LocalAlloc,wsprintfW,FindFirstFileW,LocalReAlloc,lstrcmpW,lstrcmpW,lstrlenW,FindNextFileW,LocalFree,FindClose,4_2_04C4CFA0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C4D570 lstrlenW,wsprintfW,FindFirstFileW,wsprintfW,wsprintfW,wcslen,?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z,??2@YAPAXI@Z,??3@YAXPAX@Z,FindNextFileW,FindClose,4_2_04C4D570
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C4D120 wsprintfW,FindFirstFileW,DeleteFileW,wsprintfW,wsprintfW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,4_2_04C4D120
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C4D930 FindFirstFileW,FindClose,CreateFileW,CloseHandle,4_2_04C4D930
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0321CFA0 LocalAlloc,wsprintfW,FindFirstFileW,LocalReAlloc,lstrcmpW,lstrcmpW,lstrlenW,FindNextFileW,LocalFree,FindClose,17_2_0321CFA0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0321D120 wsprintfW,FindFirstFileW,DeleteFileW,wsprintfW,wsprintfW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,17_2_0321D120
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0321D930 FindFirstFileW,FindClose,CreateFileW,CloseHandle,17_2_0321D930
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0321D570 lstrlenW,wsprintfW,FindFirstFileW,wsprintfW,wsprintfW,wcslen,?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z,??2@YAPAXI@Z,??3@YAXPAX@Z,FindNextFileW,FindClose,17_2_0321D570
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0321D880 lstrcpyW,FindFirstFileW,FindClose,FindClose,17_2_0321D880
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0471D880 lstrcpyW,FindFirstFileW,FindClose,FindClose,18_2_0471D880
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0471D570 lstrlenW,FindFirstFileW,wcslen,?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z,??2@YAPAXI@Z,??3@YAXPAX@Z,FindNextFileW,FindClose,18_2_0471D570
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0471D930 FindFirstFileW,FindClose,CreateFileW,CloseHandle,18_2_0471D930
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0471D120 FindFirstFileW,DeleteFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,18_2_0471D120
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0471CFA0 LocalAlloc,FindFirstFileW,LocalReAlloc,lstrcmpW,lstrcmpW,lstrlenW,FindNextFileW,LocalFree,FindClose,18_2_0471CFA0

Networking

barindex
Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.5:49709 -> 162.210.196.168:443
Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.5:49764 -> 162.210.196.168:443
Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.5:49824 -> 162.210.196.168:443
Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.5:49883 -> 162.210.196.168:443
Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.5:49943 -> 162.210.196.168:443
Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.5:49997 -> 162.210.196.168:443
Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.5:49995 -> 162.210.196.168:443
Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.5:49994 -> 162.210.196.168:443
Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.5:49996 -> 162.210.196.168:443
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 162.210.196.168 443Jump to behavior
Source: Joe Sandbox ViewASN Name: LEASEWEB-USA-WDCUS LEASEWEB-USA-WDCUS
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04541A20 InternetOpenW,InternetOpenUrlW,CreateFileW,InternetReadFile,WriteFile,CloseHandle,InternetCloseHandle,InternetCloseHandle,3_2_04541A20
Source: global trafficDNS traffic detected: DNS query: safebrow.flnet.org
Source: Amcache.hve.9.drString found in binary or memory: http://upx.sf.net
Source: unknownNetwork traffic detected: HTTP traffic on port 49997 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49997
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49996
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49995
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49994
Source: unknownNetwork traffic detected: HTTP traffic on port 49995 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49996 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49883
Source: unknownNetwork traffic detected: HTTP traffic on port 49994 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 49883 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49943 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49824
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49943

Operating System Destruction

barindex
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_045405D0 CreateFileW on filename \\.\PHYSICALDRIVE03_2_045405D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C505D0 CreateFileW on filename \\.\PHYSICALDRIVE04_2_04C505D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_032205D0 CreateFileW on filename \\.\PHYSICALDRIVE017_2_032205D0

System Summary

barindex
Source: ZaPNN51vQo.dllInitial file: MD5: f222320a45dad46987e5600556f42a49 Family: APT17 Alias: Aurora Panda, APT 17, Deputy Dog, Group 8, Hidden Lynx, Tailgater Team, Axiom, Winnti Group, Group 72, Group72, Tailgater, Ragebeast, Blackfly, Lead, Wicked Spider, APT 17, Dogfish, Wicked Panda, Barium, APT17 Description: APT17 is said to be a China-based threat group that has conducted network intrusions against U.S. government entities, the defense industry, law firms, information technology companies, mining companies, and non-government organizations. References: http://www.fireeye.com/blog/technical/cyber-exploits/2013/09/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.htmlhttp://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/hidden_lynx.pdfhttps://www2.fireeye.com/rs/fireye/images/APT17_Report.pdfData Source: https://github.com/RedDrip7/APT_Digital_Weapon
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_045405D0: CreateFileW,DeviceIoControl,CloseHandle,3_2_045405D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0453E730 ExitWindowsEx,3_2_0453E730
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C4E730 ExitWindowsEx,4_2_04C4E730
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0321E730 ExitWindowsEx,17_2_0321E730
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\SysWOW64\KB1035627.datJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_045444603_2_04544460
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04545AC03_2_04545AC0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04541E803_2_04541E80
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_045455403_2_04545540
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_045437103_2_04543710
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04542D203_2_04542D20
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_045471D03_2_045471D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04543DDD3_2_04543DDD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_045431C03_2_045431C0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_045461903_2_04546190
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04543B8E3_2_04543B8E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C55AC04_2_04C55AC0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C51E804_2_04C51E80
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C544604_2_04C54460
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C531C04_2_04C531C0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C571D04_2_04C571D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C53DDD4_2_04C53DDD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C53B8E4_2_04C53B8E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C561904_2_04C56190
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C555404_2_04C55540
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C52D204_2_04C52D20
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0322371017_2_03223710
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_03223B8E17_2_03223B8E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_03221E8017_2_03221E80
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_03225AC017_2_03225AC0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_03222D2017_2_03222D20
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0322554017_2_03225540
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0322619017_2_03226190
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_032231C017_2_032231C0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_032271D017_2_032271D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_03223DDD17_2_03223DDD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0322446017_2_03224460
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0472446018_2_04724460
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_04725AC018_2_04725AC0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_04721E8018_2_04721E80
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0472554018_2_04725540
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_04722D2018_2_04722D20
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0472371018_2_04723710
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_047271D018_2_047271D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_04723DDD18_2_04723DDD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_047231C018_2_047231C0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0472619018_2_04726190
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_04723B8E18_2_04723B8E
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5772 -s 672
Source: ZaPNN51vQo.dllBinary or memory string: OriginalFilenamedllload.dll vs ZaPNN51vQo.dll
Source: ZaPNN51vQo.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
Source: classification engineClassification label: mal100.evad.winDLL@19/21@1/1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0453E6A0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,3_2_0453E6A0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C4E6A0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,4_2_04C4E6A0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0321E6A0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,17_2_0321E6A0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0453CDA0 LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,SHGetFileInfo,GetDiskFreeSpaceExA,3_2_0453CDA0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04541760 _wcsrev,LoadLibraryW,LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,CreateToolhelp32Snapshot,lstrcmpiW,CloseHandle,CloseHandle,3_2_04541760
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5780
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6188
Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\IEPASS
Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\UpdateWindow
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5772
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5264:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\43674aa7-5c7b-447f-a5c3-7a5cda7ac0c6Jump to behavior
Source: ZaPNN51vQo.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\ZaPNN51vQo.dll,loop
Source: ZaPNN51vQo.dllVirustotal: Detection: 82%
Source: ZaPNN51vQo.dllReversingLabs: Detection: 68%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\ZaPNN51vQo.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ZaPNN51vQo.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\ZaPNN51vQo.dll,loop
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ZaPNN51vQo.dll",#1
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5772 -s 672
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5780 -s 664
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\ZaPNN51vQo.dll,mydoor
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5772 -s 676
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5780 -s 668
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ZaPNN51vQo.dll",loop
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ZaPNN51vQo.dll",mydoor
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6188 -s 664
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ZaPNN51vQo.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\ZaPNN51vQo.dll,loopJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\ZaPNN51vQo.dll,mydoorJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ZaPNN51vQo.dll",loopJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ZaPNN51vQo.dll",mydoorJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ZaPNN51vQo.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0453EB90 LoadLibraryA,LoadLibraryA,GetProcAddress,LdrInitializeThunk,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryW,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,Lo3_2_0453EB90
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04547600 push eax; ret 3_2_0454762E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_045476A4 push eax; ret 3_2_045476C2
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C576A4 push eax; ret 4_2_04C576C2
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C57600 push eax; ret 4_2_04C5762E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_04922C60 push eax; ret 17_2_04922C8E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_03227600 push eax; ret 17_2_0322762E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_032276A4 push eax; ret 17_2_032276C2
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_03214288 push eax; ret 17_2_032142B6
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_04727600 push eax; ret 18_2_0472762E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_047276A4 push eax; ret 18_2_047276C2

Persistence and Installation Behavior

barindex
Source: C:\Windows\SysWOW64\rundll32.exeCode function: CreateFileW,DeviceIoControl,CloseHandle, \\.\PHYSICALDRIVE03_2_045405D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: CreateFileW,DeviceIoControl,CloseHandle, \\.\PHYSICALDRIVE04_2_04C505D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: CreateFileW,DeviceIoControl,CloseHandle, \\.\PHYSICALDRIVE017_2_032205D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: DeviceIoControl, \\.\PHYSICALDRIVE018_2_047205D0

Boot Survival

barindex
Source: C:\Windows\SysWOW64\rundll32.exeCode function: CreateFileW,DeviceIoControl,CloseHandle, \\.\PHYSICALDRIVE03_2_045405D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: CreateFileW,DeviceIoControl,CloseHandle, \\.\PHYSICALDRIVE04_2_04C505D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: CreateFileW,DeviceIoControl,CloseHandle, \\.\PHYSICALDRIVE017_2_032205D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: DeviceIoControl, \\.\PHYSICALDRIVE018_2_047205D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0453EB90 LoadLibraryA,LoadLibraryA,GetProcAddress,LdrInitializeThunk,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryW,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,Lo3_2_0453EB90
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_045410263_2_04541026
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_045413D83_2_045413D8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C510264_2_04C51026
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C513D84_2_04C513D8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0322102617_2_03221026
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_032213D817_2_032213D8
Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_3-3558
Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_18-4467
Source: C:\Windows\SysWOW64\rundll32.exeStalling execution: Execution stalls by calling Sleepgraph_17-4647
Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: OutputDebugStringW count: 141
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 651Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 9215Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: foregroundWindowGot 1775Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_3-3886
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_032213D817_2_032213D8
Source: C:\Windows\SysWOW64\rundll32.exe TID: 2000Thread sleep count: 651 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 2000Thread sleep time: -325500s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 2000Thread sleep count: 9215 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 2000Thread sleep time: -4607500s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0453D880 lstrcpyW,FindFirstFileW,FindClose,FindClose,3_2_0453D880
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0453D570 lstrlenW,wsprintfW,FindFirstFileW,wsprintfW,wsprintfW,wcslen,?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z,??2@YAPAXI@Z,??3@YAXPAX@Z,FindNextFileW,FindClose,3_2_0453D570
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0453D930 FindFirstFileW,FindClose,CreateFileW,CloseHandle,3_2_0453D930
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0453D120 wsprintfW,FindFirstFileW,DeleteFileW,wsprintfW,wsprintfW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,3_2_0453D120
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0453CFA0 LocalAlloc,wsprintfW,FindFirstFileW,LocalReAlloc,lstrcmpW,lstrcmpW,lstrlenW,FindNextFileW,LocalFree,FindClose,3_2_0453CFA0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C4D880 lstrcpyW,FindFirstFileW,FindClose,FindClose,4_2_04C4D880
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C4CFA0 LocalAlloc,wsprintfW,FindFirstFileW,LocalReAlloc,lstrcmpW,lstrcmpW,lstrlenW,FindNextFileW,LocalFree,FindClose,4_2_04C4CFA0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C4D570 lstrlenW,wsprintfW,FindFirstFileW,wsprintfW,wsprintfW,wcslen,?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z,??2@YAPAXI@Z,??3@YAXPAX@Z,FindNextFileW,FindClose,4_2_04C4D570
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C4D120 wsprintfW,FindFirstFileW,DeleteFileW,wsprintfW,wsprintfW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,4_2_04C4D120
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C4D930 FindFirstFileW,FindClose,CreateFileW,CloseHandle,4_2_04C4D930
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0321CFA0 LocalAlloc,wsprintfW,FindFirstFileW,LocalReAlloc,lstrcmpW,lstrcmpW,lstrlenW,FindNextFileW,LocalFree,FindClose,17_2_0321CFA0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0321D120 wsprintfW,FindFirstFileW,DeleteFileW,wsprintfW,wsprintfW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,17_2_0321D120
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0321D930 FindFirstFileW,FindClose,CreateFileW,CloseHandle,17_2_0321D930
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0321D570 lstrlenW,wsprintfW,FindFirstFileW,wsprintfW,wsprintfW,wcslen,?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z,??2@YAPAXI@Z,??3@YAXPAX@Z,FindNextFileW,FindClose,17_2_0321D570
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 17_2_0321D880 lstrcpyW,FindFirstFileW,FindClose,FindClose,17_2_0321D880
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0471D880 lstrcpyW,FindFirstFileW,FindClose,FindClose,18_2_0471D880
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0471D570 lstrlenW,FindFirstFileW,wcslen,?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z,??2@YAPAXI@Z,??3@YAXPAX@Z,FindNextFileW,FindClose,18_2_0471D570
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0471D930 FindFirstFileW,FindClose,CreateFileW,CloseHandle,18_2_0471D930
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0471D120 FindFirstFileW,DeleteFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,18_2_0471D120
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0471CFA0 LocalAlloc,FindFirstFileW,LocalReAlloc,lstrcmpW,lstrcmpW,lstrlenW,FindNextFileW,LocalFree,FindClose,18_2_0471CFA0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04540AC0 GetVersionExW,getsockname,GetVersionExW,lstrcpyW,lstrcpyW,GetSystemInfo,wsprintfW,GlobalMemoryStatus,GetTickCount,wsprintfW,wsprintfW,wsprintfW,wsprintfW,lstrcpyW,lstrlenW,mbstowcs,mbstowcs,lstrcpyW,mbstowcs,3_2_04540AC0
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: Amcache.hve.9.drBinary or memory string: VMware
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.9.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.9.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.9.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.9.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.9.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.9.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.9.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.9.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.9.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: rundll32.exe, 00000011.00000002.4489395546.0000000002E46000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: Amcache.hve.9.drBinary or memory string: vmci.sys
Source: Amcache.hve.9.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.9.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.9.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.9.drBinary or memory string: VMware20,1
Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.9.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.9.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.9.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.9.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.9.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.9.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.9.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_3-3559
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_4-4048
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_17-4643
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_17-4480
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_18-3923
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_18-4470
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0453EB90 LoadLibraryA,LoadLibraryA,GetProcAddress,LdrInitializeThunk,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryW,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,Lo3_2_0453EB90
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0453EB90 LoadLibraryA,LoadLibraryA,GetProcAddress,LdrInitializeThunk,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryW,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,Lo3_2_0453EB90
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0453F9CC LoadLibraryW,GetProcAddress,GetProcAddress,GetProcessHeap,HeapFree,3_2_0453F9CC

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 162.210.196.168 443Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ZaPNN51vQo.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04541026 __EH_prolog,GetInputState,GetCurrentThreadId,PostThreadMessageW,GetMessageW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,Sleep,GetTickCount,wsprintfW,strstr,WinExec,SetErrorMode,atoi,sprintf,OutputDebugStringA,Sleep,Sleep,Sleep,GetLocalTime,sprintf,OpenEventW,Sleep,Sleep,CloseHandle,atoi,atoi,atoi,atoi,GetTickCount,sprintf,GetTickCount,Sleep,GetTickCount,OpenEventW,WaitForSingleObject,Sleep,CloseHandle,SetErrorMode,3_2_04541026
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04540AC0 GetVersionExW,getsockname,GetVersionExW,lstrcpyW,lstrcpyW,GetSystemInfo,wsprintfW,GlobalMemoryStatus,GetTickCount,wsprintfW,wsprintfW,wsprintfW,wsprintfW,lstrcpyW,lstrlenW,mbstowcs,mbstowcs,lstrcpyW,mbstowcs,3_2_04540AC0
Source: rundll32.exeBinary or memory string: avcenter.exe
Source: rundll32.exeBinary or memory string: kxetray.exe
Source: rundll32.exeBinary or memory string: avp.exe
Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: rundll32.exeBinary or memory string: ashdisp.exe
Source: Amcache.hve.9.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: rundll32.exeBinary or memory string: mcshield.exe
Source: rundll32.exeBinary or memory string: 360tray.exe
Source: rundll32.exeBinary or memory string: tmbmsrv.exe
Source: rundll32.exeBinary or memory string: ravmond.exe
Source: Amcache.hve.9.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
Native API
2
Bootkit
1
Access Token Manipulation
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
12
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
111
Process Injection
121
Virtualization/Sandbox Evasion
LSASS Memory141
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Access Token Manipulation
Security Account Manager121
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
Process Injection
NTDS1
Process Discovery
Distributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
Bootkit
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Rundll32
DCSync5
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1579300 Sample: ZaPNN51vQo.dll Startdate: 21/12/2024 Architecture: WINDOWS Score: 100 33 safebrow.flnet.org 2->33 37 Suricata IDS alerts for network traffic 2->37 39 Antivirus / Scanner detection for submitted sample 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 3 other signatures 2->43 9 loaddll32.exe 1 2->9         started        signatures3 process4 process5 11 rundll32.exe 9->11         started        14 rundll32.exe 1 9->14         started        17 cmd.exe 1 9->17         started        19 3 other processes 9->19 dnsIp6 45 Found evasive API chain (may stop execution after checking mutex) 11->45 47 Found stalling execution ending in API Sleep call 11->47 49 Contains functionality to access PhysicalDrive, possible boot sector overwrite 11->49 53 3 other signatures 11->53 21 WerFault.exe 20 16 11->21         started        23 WerFault.exe 16 11->23         started        35 safebrow.flnet.org 162.210.196.168, 443, 49709, 49764 LEASEWEB-USA-WDCUS United States 14->35 51 System process connects to network (likely due to code injection or exploit) 14->51 25 WerFault.exe 16 14->25         started        27 rundll32.exe 17->27         started        signatures7 process8 process9 29 WerFault.exe 16 27->29         started        31 WerFault.exe 16 27->31         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ZaPNN51vQo.dll83%VirustotalBrowse
ZaPNN51vQo.dll68%ReversingLabsWin32.Backdoor.Moudoor
ZaPNN51vQo.dll100%AviraHEUR/AGEN.1329518
ZaPNN51vQo.dll100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
safebrow.flnet.org
162.210.196.168
truetrue
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netAmcache.hve.9.drfalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      162.210.196.168
      safebrow.flnet.orgUnited States
      30633LEASEWEB-USA-WDCUStrue
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1579300
      Start date and time:2024-12-21 14:16:08 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 7m 50s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:24
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:ZaPNN51vQo.dll
      renamed because original name is a hash value
      Original Sample Name:f222320a45dad46987e5600556f42a49.dll
      Detection:MAL
      Classification:mal100.evad.winDLL@19/21@1/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 39
      • Number of non-executed functions: 227
      Cookbook Comments:
      • Found application associated with file extension: .dll
      • Override analysis time to 240000 for current running targets taking high CPU consumption
      • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 20.189.173.20, 20.190.177.148, 172.202.163.200, 13.107.246.63
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size exceeded maximum capacity and may have missing behavior information.
      • Report size getting too big, too many NtQueryValueKey calls found.
      TimeTypeDescription
      08:17:04API Interceptor1x Sleep call for process: loaddll32.exe modified
      08:17:29API Interceptor2x Sleep call for process: WerFault.exe modified
      08:17:40API Interceptor6164940x Sleep call for process: rundll32.exe modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      162.210.196.168https://www.afghanhayatrestaurant.com.au/Get hashmaliciousUnknownBrowse
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        LEASEWEB-USA-WDCUShttps://fsharetv.ioGet hashmaliciousUnknownBrowse
        • 162.210.199.65
        loligang.x86.elfGet hashmaliciousMiraiBrowse
        • 108.62.121.120
        Opportunity Offering Pure Home Improvement Unique Guest Post Websites A... (107Ko).msgGet hashmaliciousUnknownBrowse
        • 162.210.199.153
        sora.sh4.elfGet hashmaliciousMiraiBrowse
        • 209.50.246.222
        arm.elfGet hashmaliciousMiraiBrowse
        • 108.62.17.4
        x86_64.nn.elfGet hashmaliciousMirai, OkiruBrowse
        • 64.131.85.12
        ns3.jpg.elfGet hashmaliciousMuhstik, TsunamiBrowse
        • 207.58.188.113
        nklmips.elfGet hashmaliciousUnknownBrowse
        • 216.38.56.139
        la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
        • 207.244.103.181
        http://www.bollywoodhungama.comGet hashmaliciousUnknownBrowse
        • 162.210.196.208
        No context
        No context
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):0.8981412292614579
        Encrypted:false
        SSDEEP:192:CXiOO2L0BU/wjeTS1wmzuiFjZ24IO8dci:CiP2YBU/wjeTmzuiFjY4IO8dci
        MD5:AAE8C9BC4A36B28DB991EFA2B1109FFE
        SHA1:94C7AC22C39B233CFCD7C0DE0C6B6EAB3BFCDA93
        SHA-256:0BF25A1CEA14B9ECFA64EDA03310B0203FE2C005A3F1BFC00EEE211FD26A06E5
        SHA-512:5E66B693171F363EAFDF4DC9964A97D0061B82E928066F567671AAAF58C5E4F3684B31C9E1A0E0C6ACAC9DE74F7FCA67DD5A761E0B19EAFCA436FCCBFFFF833D
        Malicious:false
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.2.6.0.6.2.2.4.4.9.0.1.1.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.2.6.0.6.2.2.9.8.0.2.6.1.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.d.a.c.1.6.4.9.-.4.c.8.6.-.4.d.4.c.-.9.0.6.d.-.3.3.f.6.a.6.f.c.8.d.c.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.e.0.3.3.1.2.3.-.7.0.b.e.-.4.7.c.a.-.9.2.5.e.-.0.d.d.6.7.7.4.3.a.c.4.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.8.c.-.0.0.0.1.-.0.0.1.4.-.8.a.a.d.-.6.7.9.d.a.a.5.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):0.8982755158591433
        Encrypted:false
        SSDEEP:192:9Rii0OdL0BU/wjeTS1wmzuiFjZ24IO8dci:7iiFdYBU/wjeTmzuiFjY4IO8dci
        MD5:BA981C48FD83893B1A33FE0B2448EDEB
        SHA1:7CD9FB6B0D7EAFF015B42099DA5EE18CA8E80D97
        SHA-256:B3A33A96A56C4107B4008E0EB611108BF897765EF487971FB691A82F3DDC9C2B
        SHA-512:A85F8D3C54888A60FA9B20F5828F56075C8BC65791DA3D8975247561AEB4635DFFDF60661574B61AFD5396AF8F7B83932C32AA3711F5B054CAAA54C0B3870A78
        Malicious:false
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.2.6.0.6.2.2.4.7.1.8.5.0.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.2.6.0.6.2.3.0.0.3.1.0.1.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.f.d.9.5.e.3.a.-.1.a.5.5.-.4.9.e.1.-.b.8.b.1.-.e.7.f.f.8.7.4.c.4.1.1.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.5.c.4.8.9.8.7.-.6.e.2.f.-.4.1.b.5.-.a.8.c.c.-.d.0.8.a.a.d.0.0.7.8.c.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.9.4.-.0.0.0.1.-.0.0.1.4.-.1.8.0.8.-.6.6.9.d.a.a.5.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):0.8985970150865458
        Encrypted:false
        SSDEEP:192:QiOOZE0+5f6kjeTMVcmzuiFJZ24IO8dci:QiPZ/+5f6kjejmzuiFJY4IO8dci
        MD5:70C7FD0341E07ACDFE511FE50561AB1B
        SHA1:F1C01C42DCE193571C56A2132977BAD2E2EB9322
        SHA-256:0BEDCA58174C384406135B9AC5BACDD657D45252C5CAF21100EE2187FB5402DD
        SHA-512:1B271E20AA6B3C6CFAF35386119D6437F8A40EB2C59891D99C883D69D437D7EB27CAB17C2D29D03DBEA2C4109380B44C45D07D43936A24EA5094FC08965FB2BA
        Malicious:false
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.2.6.0.6.2.1.5.2.1.4.0.0.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.c.3.9.4.c.0.e.-.1.9.0.d.-.4.0.0.1.-.9.5.1.d.-.d.3.c.6.e.b.b.d.4.3.e.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.e.1.6.9.d.b.7.-.2.9.e.e.-.4.0.3.7.-.a.4.4.6.-.2.6.6.7.7.0.f.7.1.d.b.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.8.c.-.0.0.0.1.-.0.0.1.4.-.8.a.a.d.-.6.7.9.d.a.a.5.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.2.d.7.!.r.u.n.d.l.l.3.2...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.6././.0.8././.2.6.:.1.6.:.5.8.:.3.3.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):0.8990606993300633
        Encrypted:false
        SSDEEP:192:Xi0O7E0+5f6kjeTMVcmzuiFJZ24IO8dci:XiF7/+5f6kjejmzuiFJY4IO8dci
        MD5:0ACA1E1F853E6F1FE99C0A10C40960C9
        SHA1:0B94113765E7C63D3CB9C4401BF9EC0753A4475D
        SHA-256:063590DD82DD8C93175A4D8878629208EEDDA6D387E02F8A6296027AC0D5D3DE
        SHA-512:4D3AE32FAA199EFEBA49754F4729D30BB300CE74467069C161B55A23EBAF892B339E01291081CEC0B15555BFAE2B704D53BD09DA567C459D5928AEDD6CFFA718
        Malicious:false
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.2.6.0.6.2.1.5.0.5.3.5.3.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.e.7.6.7.2.8.d.-.9.6.7.1.-.4.2.f.5.-.b.f.3.4.-.d.5.d.b.f.d.1.4.8.a.f.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.7.2.f.8.7.b.8.-.3.a.2.4.-.4.4.8.1.-.9.1.5.0.-.f.6.f.0.d.4.4.9.e.1.d.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.9.4.-.0.0.0.1.-.0.0.1.4.-.1.8.0.8.-.6.6.9.d.a.a.5.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.2.d.7.!.r.u.n.d.l.l.3.2...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.6././.0.8././.2.6.:.1.6.:.5.8.:.3.3.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):0.8987801899816464
        Encrypted:false
        SSDEEP:192:2inO1E0+5f6kjeT8VcmzuiFJZ24IO8dci:2iO1/+5f6kjezmzuiFJY4IO8dci
        MD5:96E97F2B2D7D203E5AD2836F2B813323
        SHA1:E639714104274EE485B21168BD76C93E753FB228
        SHA-256:18DF8AABF6B48B017FA7A0DFA59815EEB1045771E1320FA6A8C2BA185F2E3BFB
        SHA-512:A2ABCFB2765129C742DFCB227A06E2C7EAC0F131A3DD21362B6DCC3B12DC741AD91CA78A93A2548C721260493D7EF2EBB8C9B3B5EE5F6CF1DA05FDDF010B9651
        Malicious:false
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.2.6.0.6.2.7.2.2.4.5.5.9.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.1.2.8.7.5.f.2.-.d.b.8.9.-.4.a.d.2.-.8.b.b.a.-.5.c.0.2.8.5.c.5.5.5.f.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.7.1.3.5.c.e.6.-.6.e.a.c.-.4.3.5.e.-.a.a.1.a.-.a.f.c.d.5.f.d.8.7.b.4.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.2.c.-.0.0.0.1.-.0.0.1.4.-.7.9.4.b.-.0.5.a.1.a.a.5.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.2.d.7.!.r.u.n.d.l.l.3.2...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.6././.0.8././.2.6.:.1.6.:.5.8.:.3.3.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Mini DuMP crash report, 15 streams, Sat Dec 21 13:17:01 2024, 0x1205a4 type
        Category:dropped
        Size (bytes):56812
        Entropy (8bit):1.8855354698986597
        Encrypted:false
        SSDEEP:96:5R8ttm2k45NE/uDz04GFrJ8v6J8M0hlSoi75I4v4kVGLnzrNzmR9Tndv9dpcHr60:8oRe6JcDO5H4hmzJFKVSxVkJdu3TCoI
        MD5:FF9B5FB07B12C68EE3905F395608DEA8
        SHA1:976E57918B69A35D2399B0B348A7BA762E76E377
        SHA-256:10098F05D688B2E3F700CFE2C77234C01BDFB23231878D6A4F24D630AC638941
        SHA-512:9B4865885526CCEE88A45062065B8026FB28860A4BC10D21D21204DC1FE0C84E82CBEA6D402F209993C8F5B116BE8E1051C1AF678AB46CAA9B600743A9AC2116
        Malicious:false
        Preview:MDMP..a..... ........fg....................................$...........T....1..........`.......8...........T...........x...t.......................................................................................................eJ......l.......GenuineIntel............T............fg.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Mini DuMP crash report, 15 streams, Sat Dec 21 13:17:01 2024, 0x1205a4 type
        Category:dropped
        Size (bytes):59928
        Entropy (8bit):1.81903967441323
        Encrypted:false
        SSDEEP:192:86xTe6JN+O5H4De5NDzqBt4nEBkeP15MZrbFs:dy6p5HOenDzat4nsN1Ya
        MD5:9CBAC63E081042135349E1E6C2FCFCFB
        SHA1:8E73E7081D13B50D9090B246E1406CE8FD0C4FB6
        SHA-256:51F514100CDB2D741AC5379614F140CCE3DBE87EAD602B34D244CED5008582B2
        SHA-512:8CAC1F281FA8AE562050C87AEA7BBC1F9B75CBC93FEC89A028D87A8A1C2FF782688A737B299244DCD186ADB4A06841FAB6BEF02F541C812F53A954D2443F7048
        Malicious:false
        Preview:MDMP..a..... ........fg....................................$...........t....1..........`.......8...........T...............P.......................................................................................................eJ......l.......GenuineIntel............T............fg.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8306
        Entropy (8bit):3.6974605904552393
        Encrypted:false
        SSDEEP:192:R6l7wVeJSQ6IgA6Y1P6ogmfTwdpB789b7esfUJm:R6lXJ16IgA6Y96ogmfTwO7dfX
        MD5:F4114CD731B0A59717C309E61A2144D9
        SHA1:3A9CBA62EB1607EA80ADE87E72B2BA0BF4AE8353
        SHA-256:A131B2C75E828C6557663170785BD5F8E74846016B6CAA160CB2CA2900CFDFB5
        SHA-512:39E0F650CDE35C2E14AE0D0C017601B93EC1F42993A5F001E5E1619128C198F54FE777B89C77AA475ECB6CADE607CE30401B61DEE87AA58F1E8D3367A0C3FEDC
        Malicious:false
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.7.7.2.<./.P.i.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8312
        Entropy (8bit):3.699094155473116
        Encrypted:false
        SSDEEP:192:R6l7wVeJ/26IodLgq6Y9p6ugmfTwdpBx89b7isfhJm:R6lXJ+6I4B6YT6ugmfTws7hfe
        MD5:965F370D7B7212510B35A7A248922CAC
        SHA1:4A6CD789359A5912E5A483FA7D3FADBEFF291326
        SHA-256:DD5FFB3EEE4B0BD5A4E5830BC90A107070BF7CC30275D10426CA1143B71C8D75
        SHA-512:B15BC0A6CC448FBE394CD86B3A8F0A83616B6CE17BD2C067FF0B99CF94DFCD1A360C89F5AD46E61D17DA7040D1487C2350D863C74DA5034D20DA2BEA1AA23E5C
        Malicious:false
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.7.8.0.<./.P.i.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4690
        Entropy (8bit):4.4942237715465225
        Encrypted:false
        SSDEEP:48:cvIwWl8zsBtJg77aI9B2WpW8VYwYm8M4JCdPTFTlQg+q8/ARGScS1d:uIjfBHI7fX7VoJ+KglJ31d
        MD5:899638CF0FBD6F972E90DADBCDEC5140
        SHA1:2D5E888CEC2BA8387AF8D9861F7A45CD3493B6F1
        SHA-256:D1B6E25C1BD1002CD934D7E7969051FCBAB4835F6B3C2E713E19E7FAB1F61E7E
        SHA-512:7AF1593147D9102E17FD9F36EC08D456394E2B4112156869F6B0CEC7A5854B0595256C97C2DDCFBCBBD5C3C3B0E1A6EF6FB9CA2C3BBAC7DB8766C3A07B81412B
        Malicious:false
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="641059" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Mini DuMP crash report, 15 streams, Sat Dec 21 13:17:02 2024, 0x1205a4 type
        Category:dropped
        Size (bytes):94960
        Entropy (8bit):1.226480291800688
        Encrypted:false
        SSDEEP:192:PDCL68O5H4p5N7VecH/w3bsGBk/xyLALjJQ3o+B5D7:mOz5HqnwXbsWMygQ3Rz/
        MD5:12D75D6696397A8ACFF34FEC5140D1E8
        SHA1:1CC657230C98025294FF840829128982F7C3ED98
        SHA-256:5280D98D910584D4D8647D0D7E932E1FFB0A341E33080BD38A405154D89D4ED5
        SHA-512:6117D102C07FC00ACACABEFEC13BE06BACAA89C0F622D9803C1FA276FE2771951A24344229DF7973BFA033A71E2150D43F2AD3B467860AC3131FB50B839D6D17
        Malicious:false
        Preview:MDMP..a..... ........fg........................P...........$...(.......t...`...........`.......8...........T...............PX..........L...........8...............................................................................eJ..............GenuineIntel............T............fg.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Mini DuMP crash report, 15 streams, Sat Dec 21 13:17:02 2024, 0x1205a4 type
        Category:dropped
        Size (bytes):91084
        Entropy (8bit):1.2659719255211135
        Encrypted:false
        SSDEEP:192:Pir6OQ9O5H48JWTxwvZaF72+jjUYyUcXF9nGjiTpYo:6uOQw5HjJWTxwgB7fUYyUcXF9nwiP
        MD5:41CA4096AB92B4AA4EB4445026BA5455
        SHA1:8F5C1CE72FF0C3BDB654E84685B46FEED754FB2B
        SHA-256:EB757696DE9C3E3A8269D4DF97A87DB2193AF5D22386310BC8499FA2EF0BCDCD
        SHA-512:47F83874ACAC7754C9A6CABE33E3AF5DD73D90000113387CD71EC68BCEE1C110EA246CA05C2EC992E36171150CDDCFDDA859A74814A38213E962F680F5A42A8A
        Malicious:false
        Preview:MDMP..a..... ........fg........................P...........$...(.......T...`...........`.......8...........T...........P...|I..........L...........8...............................................................................eJ..............GenuineIntel............T............fg.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8306
        Entropy (8bit):3.7006622341924853
        Encrypted:false
        SSDEEP:192:R6l7wVeJSA6IgC26Y1K6ogmfTdmprQ89bAesfEgm:R6lXJl6Igz6YY6ogmfTdeAdfy
        MD5:D691B52EDF05FC1BF81AD28B9B577A8C
        SHA1:0B97DF3019C55CD8E9A31B9CEF2925650BDEE72A
        SHA-256:21207020CEABFD3440E1D8841C41F9ABC89F20B8FEDC616B329B8C7AE58C9808
        SHA-512:935E0AF7CFC16EC219D4AD1EE91FA4C9759AA74067AC1C768E5744EB92CBE4E9F4738B099121D182DE055232864E4E7324693902A9E15D70DE9CFB343F2C3AC3
        Malicious:false
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.7.7.2.<./.P.i.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8312
        Entropy (8bit):3.6993079000322466
        Encrypted:false
        SSDEEP:192:R6l7wVeJ/q6IodR6Y9ET6LgmfTdmprT89bAisfetgm:R6lXJi6I4R6YuT6LgmfTdHAhfef
        MD5:F935F436F342F6E99D745675913E27B2
        SHA1:3E512E600A437D3FB15B50B4351A2720AA6C6A92
        SHA-256:DE64CC78921C74813900B526638C2C655513863B6567E6805FB6C13CE282255D
        SHA-512:4BE55F198C0083550A9847D29C904FE30CC9D827566F9DF15F06A463A049355BA7898BDE7FAE884E54AD0B80F2FF4953FB6485437A6AF61EBFFBEF27A388CD2F
        Malicious:false
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.7.8.0.<./.P.i.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4690
        Entropy (8bit):4.494005484603059
        Encrypted:false
        SSDEEP:48:cvIwWl8zsBtJg77aI9B2WpW8VYVYm8M4JCdPgF77B+q8/JDGScSid:uIjfBHI7fX7VhJ97BkJ3id
        MD5:0A0575527129D7BB4E943B0D22AFC866
        SHA1:AD40A6ABFC62E6D033B44E092518C8E24CDDED7C
        SHA-256:9084A9825DD6E041EE665EA7C7295A2D3B76E1B365B3273B167428C2BAC14D56
        SHA-512:FAF0F26B193862A648409EC211014CB2791287C331CDCF2DBF2B9C3F72A01B8A2ABAFD70F79672350A76AB88C97F4F67582C699DE89CDB6A6D186B636D2DEE0C
        Malicious:false
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="641059" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4690
        Entropy (8bit):4.49436272265196
        Encrypted:false
        SSDEEP:48:cvIwWl8zsBtJg77aI9B2WpW8VY+Ym8M4JCdPgFtHy+q8/JRGScS1d:uIjfBHI7fX7VuJbSCJ31d
        MD5:777D85E7795ED078F7FF77851DED8A46
        SHA1:0D08413D67350FC52F2CBF412419CC0F0BA49A6C
        SHA-256:FA23D0137B107D8AED790CF4E2CD3EA54E04449CE7E0EF6ED49A2DD08432895B
        SHA-512:16ABBA95CB789BA1F8B531A3F5684C25567DF1FDAEF9AA6C0663EC08B939DAF2F7C78E63CD06D3A8C6EBCC5EA9B6D93075249E5C638C8FE08B826D3F5EB38D36
        Malicious:false
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="641059" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Mini DuMP crash report, 15 streams, Sat Dec 21 13:17:07 2024, 0x1205a4 type
        Category:dropped
        Size (bytes):56996
        Entropy (8bit):1.8872469928293278
        Encrypted:false
        SSDEEP:192:m/7e69qO5H4Jgizkhp6pBXmi0DWg8gTW71:B6X5HKzkS3mXDWgC
        MD5:B110056552437A7991C949809395783B
        SHA1:7705477328FB2EC6137BC6F19220B91D7200A213
        SHA-256:75E6ED0CCB72C74A8D6AF0855A97765F87279BB0077CA3B3E0E095E51EB38701
        SHA-512:D214E5B85D14CBA9CA0F69EC5DE816607943D673E6AAD3E383A15F1648F97FF52B5E591E85B2781E17D5351EDA283D3B35D9FABF7BB8FE95D2EB541E32263304
        Malicious:false
        Preview:MDMP..a..... ........fg....................................$...........t....1..........`.......8...........T...........x...,.......................................................................................................eJ......l.......GenuineIntel............T.......,....fg.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8302
        Entropy (8bit):3.6983704414288825
        Encrypted:false
        SSDEEP:192:R6l7wVeJSk6IpX6Y1c6TgmfTwdpBO89bhbcosfhbjm:R6lXJB6IpX6YO6TgmfTw1hbcbfd6
        MD5:55813847C40652A68115D70BDE7BE47E
        SHA1:0E54C281C1996B7FA3C284CEE7205905BD3062A3
        SHA-256:51408961F03A9CA3222184B90E07893E8C708067D8F11FE9F07CC1A7E9AC30C1
        SHA-512:89098FF63FD811641DD2E5C2231150854A8F80DAE0D1C8880D7C6CF4B228F7F0598DEEAFA2D32A7ED41F868BB764581BEE760CBEB0D91D8F5C1B7990726D6ABC
        Malicious:false
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.1.8.8.<./.P.i.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4690
        Entropy (8bit):4.49303445300261
        Encrypted:false
        SSDEEP:48:cvIwWl8zsBtJg77aI9B2WpW8VY2Ym8M4JCdPTFZ+q8/AgXGScSld:uIjfBHI7fX7VyJsUJ3ld
        MD5:50309C44188CE6F599FFC2F76F5870CA
        SHA1:B9E2437B278F40AE1A096913C52DD0A3525775E7
        SHA-256:9B09CC51B6BDE15305F224548A3B57FF0BB104F3C08919A6B95726D31823283A
        SHA-512:30FF9716FE0F7BF9B06B17863285166F301E7BE658A73B46F0A53018CC8946D0501D25A822366A92B8D5A399A7A19904FB68929D18DEC2B07370CE176C3E4851
        Malicious:false
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="641059" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
        Process:C:\Windows\SysWOW64\rundll32.exe
        File Type:data
        Category:dropped
        Size (bytes):33
        Entropy (8bit):4.0895524525606675
        Encrypted:false
        SSDEEP:3:aG2sqUq4Bgxf5wn:KsqUqc02n
        MD5:6086D1EEEEA7CCF5C7310ECE395A935C
        SHA1:F516E32F8EE8590C91B5F9DACDE2A58AF1B656F7
        SHA-256:C5CE9696D9AFC5532775BB106AB18E1FB738BE397AA2EFC12FB0BB466C996B9E
        SHA-512:CB7F7EA3D64D22A3D93C8488E409259B4E211DBA3B0C11285BD2109962EF0DDC6D8D65D129501F4A0F928D7450A1A79EDFBB72EB0F0E413912439206E3127DC9
        Malicious:false
        Preview:.........Z@........N.....N...ZTTS
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:MS Windows registry file, NT/2000 or above
        Category:dropped
        Size (bytes):1835008
        Entropy (8bit):4.422282233604746
        Encrypted:false
        SSDEEP:6144:FSvfpi6ceLP/9skLmb0OTyWSPHaJG8nAgeMZMMhA2fX4WABlEnNP0uhiTw:MvloTyW+EZMM6DFyl03w
        MD5:C84C586CAE823675310E60F4539A40C7
        SHA1:44541EFFE579C1833B26C724575438438DA4DC53
        SHA-256:D2F06293C6A01585CDC41AA8B66E07F480C7AB968E882FEA9BD4210BAC765EB6
        SHA-512:73568AB7A37A7D7C8C3B1FB8AC712C09CEC4D3A8AAC343CBE6D81AF7CA0600A10ADDA783EE48425B0592A987BB2FA0AF581D1FC87511B2ABD3E1D484EBE3AA83
        Malicious:false
        Preview:regf?...?....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...S...............................................................................................................................................................................................................................................................................................................................................V..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
        Entropy (8bit):7.180102052260079
        TrID:
        • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
        • Generic Win/DOS Executable (2004/3) 0.20%
        • DOS Executable Generic (2002/1) 0.20%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:ZaPNN51vQo.dll
        File size:71'168 bytes
        MD5:f222320a45dad46987e5600556f42a49
        SHA1:0bc94ccb35d2dd80954b6dde717bcce305597ce6
        SHA256:a6c578970637169d77ab319744ba4ef283bfe55816013ee2f3e5036332b3d27d
        SHA512:8e3fffd667dad3a39ca73a818ac540c0c35cc5026995be67694cbb629bb1843c71edc6fd0b696efa6545e6b16b4b4b46e11cd4c8f5a12de8aaa3343540ad6415
        SSDEEP:1536:oXqWFQB0qJsjjhCc/tydPXM/193cPehWXlCiG8O+4ER06ou9F5hF:UJFQBQfhh6fMttcPbXEihB0d0Fb
        TLSH:8863E1A5DFED11B8E31F053C6CF3A27FA96E940B9594C1D78EC09A251CF01596C20B6B
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Mb..Mb..Mb...m..Ob.."}..Lb...~..Lb.."}..Ib..Mb..^b.."}..Nb...A..Ib...d..Lb...B..Lb..RichMb..........................PE..L..
        Icon Hash:7ae282899bbab082
        Entrypoint:0x10001cf1
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x10000000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
        DLL Characteristics:
        Time Stamp:0x4ECF4B3B [Fri Nov 25 08:00:59 2011 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:0421f871b79c3f74c54fb55e887e4204
        Instruction
        push ebp
        mov ebp, esp
        push ebx
        mov ebx, dword ptr [ebp+08h]
        push esi
        mov esi, dword ptr [ebp+0Ch]
        push edi
        mov edi, dword ptr [ebp+10h]
        test esi, esi
        jne 00007F0BB8B37DCBh
        cmp dword ptr [10003374h], 00000000h
        jmp 00007F0BB8B37DE8h
        cmp esi, 01h
        je 00007F0BB8B37DC7h
        cmp esi, 02h
        jne 00007F0BB8B37DE4h
        mov eax, dword ptr [1000337Ch]
        test eax, eax
        je 00007F0BB8B37DCBh
        push edi
        push esi
        push ebx
        call eax
        test eax, eax
        je 00007F0BB8B37DCEh
        push edi
        push esi
        push ebx
        call 00007F0BB8B37CDAh
        test eax, eax
        jne 00007F0BB8B37DC6h
        xor eax, eax
        jmp 00007F0BB8B37E10h
        push edi
        push esi
        push ebx
        call 00007F0BB8B37334h
        cmp esi, 01h
        mov dword ptr [ebp+0Ch], eax
        jne 00007F0BB8B37DCEh
        test eax, eax
        jne 00007F0BB8B37DF9h
        push edi
        push eax
        push ebx
        call 00007F0BB8B37CB6h
        test esi, esi
        je 00007F0BB8B37DC7h
        cmp esi, 03h
        jne 00007F0BB8B37DE8h
        push edi
        push esi
        push ebx
        call 00007F0BB8B37CA5h
        test eax, eax
        jne 00007F0BB8B37DC5h
        and dword ptr [ebp+0Ch], eax
        cmp dword ptr [ebp+0Ch], 00000000h
        je 00007F0BB8B37DD3h
        mov eax, dword ptr [1000337Ch]
        test eax, eax
        je 00007F0BB8B37DCAh
        push edi
        push esi
        push ebx
        call eax
        mov dword ptr [ebp+0Ch], eax
        mov eax, dword ptr [ebp+0Ch]
        pop edi
        pop esi
        pop ebx
        pop ebp
        retn 000Ch
        jmp dword ptr [1000203Ch]
        jmp dword ptr [10002034h]
        jmp dword ptr [10002030h]
        jmp dword ptr [10002028h]
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        mov eax, 1000212Ch
        jmp 00007F0BB9B37C3Bh
        Programming Language:
        • [EXP] VC++ 6.0 SP5 build 8804
        • [LNK] VC++ 6.0 SP5 build 8804
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x23700x54.rdata
        IMAGE_DIRECTORY_ENTRY_IMPORT0x21980x3c.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000xf90c.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x140000x1b4.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x20000x54.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000xdca0xe004289c8cb1f962ddd2260d277ff6c0a88False0.6160714285714286data6.160781249961882IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0x20000x3c40x400b1628e5095c4270f1807d1f041acdce2False0.5068359375data4.074530964216063IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0x30000x3880x400435bbf1f6172d6f1649360a5998efae0False0.373046875data3.6502615445783313IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rsrc0x40000xf90c0xfa0028c52f39f08d495f87e5c4cb1ed52ac5False0.880171875data7.285714604095285IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x140000x1ea0x2009cf0dbc735e4272d675d3e4b44d56963False0.83984375data5.636323256414432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        BIN0x40b00xf542data0.889497658713726
        RT_VERSION0x135f40x318dataChineseChina0.45202020202020204
        DLLImport
        MSVCRT.dllmalloc, _initterm, free, ??1type_info@@UAE@XZ, ??3@YAXPAX@Z, _onexit, __dllonexit, _CxxThrowException, __CxxFrameHandler, _adjust_fdiv, ??2@YAPAXI@Z
        KERNEL32.dllVirtualProtect, CreateMutexA, GetLastError, ReleaseMutex, LoadLibraryA, GetProcAddress, FreeLibrary, GetModuleHandleA
        NameOrdinalAddress
        loop10x100010d0
        mydoor20x10001150
        Language of compilation systemCountry where language is spokenMap
        ChineseChina
        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
        2024-12-21T14:17:09.486589+01002016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1192.168.2.549709162.210.196.168443TCP
        2024-12-21T14:17:35.962286+01002016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1192.168.2.549764162.210.196.168443TCP
        2024-12-21T14:18:02.474110+01002016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1192.168.2.549824162.210.196.168443TCP
        2024-12-21T14:18:29.159467+01002016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1192.168.2.549883162.210.196.168443TCP
        2024-12-21T14:18:55.809706+01002016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1192.168.2.549943162.210.196.168443TCP
        2024-12-21T14:19:22.654246+01002016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1192.168.2.549994162.210.196.168443TCP
        2024-12-21T14:19:49.169615+01002016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1192.168.2.549995162.210.196.168443TCP
        2024-12-21T14:20:15.674833+01002016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1192.168.2.549996162.210.196.168443TCP
        2024-12-21T14:20:42.268921+01002016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1192.168.2.549997162.210.196.168443TCP
        TimestampSource PortDest PortSource IPDest IP
        Dec 21, 2024 14:17:09.365159035 CET49709443192.168.2.5162.210.196.168
        Dec 21, 2024 14:17:09.365207911 CET44349709162.210.196.168192.168.2.5
        Dec 21, 2024 14:17:09.366478920 CET49709443192.168.2.5162.210.196.168
        Dec 21, 2024 14:17:09.486588955 CET49709443192.168.2.5162.210.196.168
        Dec 21, 2024 14:17:09.486602068 CET44349709162.210.196.168192.168.2.5
        Dec 21, 2024 14:17:09.486720085 CET44349709162.210.196.168192.168.2.5
        Dec 21, 2024 14:17:35.880342960 CET49764443192.168.2.5162.210.196.168
        Dec 21, 2024 14:17:35.880382061 CET44349764162.210.196.168192.168.2.5
        Dec 21, 2024 14:17:35.880470991 CET49764443192.168.2.5162.210.196.168
        Dec 21, 2024 14:17:35.962285995 CET49764443192.168.2.5162.210.196.168
        Dec 21, 2024 14:17:35.962305069 CET44349764162.210.196.168192.168.2.5
        Dec 21, 2024 14:17:35.962400913 CET44349764162.210.196.168192.168.2.5
        Dec 21, 2024 14:18:02.364625931 CET49824443192.168.2.5162.210.196.168
        Dec 21, 2024 14:18:02.364666939 CET44349824162.210.196.168192.168.2.5
        Dec 21, 2024 14:18:02.364742994 CET49824443192.168.2.5162.210.196.168
        Dec 21, 2024 14:18:02.474109888 CET49824443192.168.2.5162.210.196.168
        Dec 21, 2024 14:18:02.474134922 CET44349824162.210.196.168192.168.2.5
        Dec 21, 2024 14:18:02.474268913 CET44349824162.210.196.168192.168.2.5
        Dec 21, 2024 14:18:29.006131887 CET49883443192.168.2.5162.210.196.168
        Dec 21, 2024 14:18:29.006153107 CET44349883162.210.196.168192.168.2.5
        Dec 21, 2024 14:18:29.006316900 CET49883443192.168.2.5162.210.196.168
        Dec 21, 2024 14:18:29.159466982 CET49883443192.168.2.5162.210.196.168
        Dec 21, 2024 14:18:29.159492016 CET44349883162.210.196.168192.168.2.5
        Dec 21, 2024 14:18:29.159555912 CET44349883162.210.196.168192.168.2.5
        Dec 21, 2024 14:18:55.708470106 CET49943443192.168.2.5162.210.196.168
        Dec 21, 2024 14:18:55.708498955 CET44349943162.210.196.168192.168.2.5
        Dec 21, 2024 14:18:55.708592892 CET49943443192.168.2.5162.210.196.168
        Dec 21, 2024 14:18:55.809705973 CET49943443192.168.2.5162.210.196.168
        Dec 21, 2024 14:18:55.809726000 CET44349943162.210.196.168192.168.2.5
        Dec 21, 2024 14:18:55.809897900 CET44349943162.210.196.168192.168.2.5
        Dec 21, 2024 14:19:22.354424953 CET49994443192.168.2.5162.210.196.168
        Dec 21, 2024 14:19:22.354470015 CET44349994162.210.196.168192.168.2.5
        Dec 21, 2024 14:19:22.354554892 CET49994443192.168.2.5162.210.196.168
        Dec 21, 2024 14:19:22.654246092 CET49994443192.168.2.5162.210.196.168
        Dec 21, 2024 14:19:22.654275894 CET44349994162.210.196.168192.168.2.5
        Dec 21, 2024 14:19:22.654346943 CET44349994162.210.196.168192.168.2.5
        Dec 21, 2024 14:19:49.068340063 CET49995443192.168.2.5162.210.196.168
        Dec 21, 2024 14:19:49.068382025 CET44349995162.210.196.168192.168.2.5
        Dec 21, 2024 14:19:49.068450928 CET49995443192.168.2.5162.210.196.168
        Dec 21, 2024 14:19:49.169615030 CET49995443192.168.2.5162.210.196.168
        Dec 21, 2024 14:19:49.169630051 CET44349995162.210.196.168192.168.2.5
        Dec 21, 2024 14:19:49.169672966 CET44349995162.210.196.168192.168.2.5
        Dec 21, 2024 14:20:15.568362951 CET49996443192.168.2.5162.210.196.168
        Dec 21, 2024 14:20:15.568413019 CET44349996162.210.196.168192.168.2.5
        Dec 21, 2024 14:20:15.568512917 CET49996443192.168.2.5162.210.196.168
        Dec 21, 2024 14:20:15.674833059 CET49996443192.168.2.5162.210.196.168
        Dec 21, 2024 14:20:15.674856901 CET44349996162.210.196.168192.168.2.5
        Dec 21, 2024 14:20:15.674926043 CET44349996162.210.196.168192.168.2.5
        Dec 21, 2024 14:20:42.115001917 CET49997443192.168.2.5162.210.196.168
        Dec 21, 2024 14:20:42.115056038 CET44349997162.210.196.168192.168.2.5
        Dec 21, 2024 14:20:42.115133047 CET49997443192.168.2.5162.210.196.168
        Dec 21, 2024 14:20:42.268920898 CET49997443192.168.2.5162.210.196.168
        Dec 21, 2024 14:20:42.268949032 CET44349997162.210.196.168192.168.2.5
        Dec 21, 2024 14:20:42.269105911 CET44349997162.210.196.168192.168.2.5
        TimestampSource PortDest PortSource IPDest IP
        Dec 21, 2024 14:17:08.518476963 CET5372853192.168.2.51.1.1.1
        Dec 21, 2024 14:17:09.359138966 CET53537281.1.1.1192.168.2.5
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Dec 21, 2024 14:17:08.518476963 CET192.168.2.51.1.1.10xca44Standard query (0)safebrow.flnet.orgA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Dec 21, 2024 14:17:09.359138966 CET1.1.1.1192.168.2.50xca44No error (0)safebrow.flnet.org162.210.196.168A (IP address)IN (0x0001)false

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:08:16:58
        Start date:21/12/2024
        Path:C:\Windows\System32\loaddll32.exe
        Wow64 process (32bit):true
        Commandline:loaddll32.exe "C:\Users\user\Desktop\ZaPNN51vQo.dll"
        Imagebase:0xb70000
        File size:126'464 bytes
        MD5 hash:51E6071F9CBA48E79F10C84515AAE618
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:1
        Start time:08:16:58
        Start date:21/12/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff6d64d0000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:2
        Start time:08:16:58
        Start date:21/12/2024
        Path:C:\Windows\SysWOW64\cmd.exe
        Wow64 process (32bit):true
        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ZaPNN51vQo.dll",#1
        Imagebase:0x790000
        File size:236'544 bytes
        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:3
        Start time:08:16:58
        Start date:21/12/2024
        Path:C:\Windows\SysWOW64\rundll32.exe
        Wow64 process (32bit):true
        Commandline:rundll32.exe C:\Users\user\Desktop\ZaPNN51vQo.dll,loop
        Imagebase:0x420000
        File size:61'440 bytes
        MD5 hash:889B99C52A60DD49227C5E485A016679
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:4
        Start time:08:16:58
        Start date:21/12/2024
        Path:C:\Windows\SysWOW64\rundll32.exe
        Wow64 process (32bit):true
        Commandline:rundll32.exe "C:\Users\user\Desktop\ZaPNN51vQo.dll",#1
        Imagebase:0x420000
        File size:61'440 bytes
        MD5 hash:889B99C52A60DD49227C5E485A016679
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:9
        Start time:08:17:01
        Start date:21/12/2024
        Path:C:\Windows\SysWOW64\WerFault.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5772 -s 672
        Imagebase:0xdf0000
        File size:483'680 bytes
        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:10
        Start time:08:17:01
        Start date:21/12/2024
        Path:C:\Windows\SysWOW64\WerFault.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5780 -s 664
        Imagebase:0xdf0000
        File size:483'680 bytes
        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:11
        Start time:08:17:01
        Start date:21/12/2024
        Path:C:\Windows\SysWOW64\rundll32.exe
        Wow64 process (32bit):true
        Commandline:rundll32.exe C:\Users\user\Desktop\ZaPNN51vQo.dll,mydoor
        Imagebase:0x420000
        File size:61'440 bytes
        MD5 hash:889B99C52A60DD49227C5E485A016679
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:14
        Start time:08:17:02
        Start date:21/12/2024
        Path:C:\Windows\SysWOW64\WerFault.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5772 -s 676
        Imagebase:0xdf0000
        File size:483'680 bytes
        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:15
        Start time:08:17:02
        Start date:21/12/2024
        Path:C:\Windows\SysWOW64\WerFault.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5780 -s 668
        Imagebase:0xdf0000
        File size:483'680 bytes
        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:17
        Start time:08:17:04
        Start date:21/12/2024
        Path:C:\Windows\SysWOW64\rundll32.exe
        Wow64 process (32bit):true
        Commandline:rundll32.exe "C:\Users\user\Desktop\ZaPNN51vQo.dll",loop
        Imagebase:0x420000
        File size:61'440 bytes
        MD5 hash:889B99C52A60DD49227C5E485A016679
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Has exited:false

        Target ID:18
        Start time:08:17:04
        Start date:21/12/2024
        Path:C:\Windows\SysWOW64\rundll32.exe
        Wow64 process (32bit):true
        Commandline:rundll32.exe "C:\Users\user\Desktop\ZaPNN51vQo.dll",mydoor
        Imagebase:0x420000
        File size:61'440 bytes
        MD5 hash:889B99C52A60DD49227C5E485A016679
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Has exited:true

        Target ID:21
        Start time:08:17:07
        Start date:21/12/2024
        Path:C:\Windows\SysWOW64\WerFault.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6188 -s 664
        Imagebase:0xdf0000
        File size:483'680 bytes
        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Has exited:true

        Reset < >

          Execution Graph

          Execution Coverage:5%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:20%
          Total number of Nodes:868
          Total number of Limit Nodes:1
          execution_graph 3932 4540e54 3933 4540e59 3932->3933 3936 45475e2 3933->3936 3939 45475b6 3936->3939 3938 4540e72 3940 45475bf _onexit 3939->3940 3941 45475cb __dllonexit 3939->3941 3940->3938 3941->3938 4039 453c710 4044 453c730 4039->4044 4042 453c728 4043 453c71f ??3@YAXPAX 4043->4042 4045 453c76a ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N ??3@YAXPAX 4044->4045 4049 453c79c 4044->4049 4045->4045 4045->4049 4046 453c7f2 ??3@YAXPAX 4058 453ea60 CloseHandle 4046->4058 4048 453c718 4048->4042 4048->4043 4049->4046 4052 453ddf0 4049->4052 4055 453ddfa 4052->4055 4057 453de06 4052->4057 4053 453de36 ??3@YAXPAX 4054 453c7de ??3@YAXPAX 4053->4054 4054->4046 4054->4049 4056 453de0d ??3@YAXPAX 4055->4056 4055->4057 4056->4057 4057->4053 4057->4054 4058->4048 4126 453b6d0 4127 453b6e0 4126->4127 4128 453b708 ??3@YAXPAX 4127->4128 4130 453b77b 4127->4130 4128->4127 4129 453b726 ??3@YAXPAX 4128->4129 4129->4127 4181 453c090 4187 453c09a 4181->4187 4182 453c15a 4183 453c0cc select 4184 453c153 4183->4184 4183->4187 4214 453c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4184->4214 4185 453c0fd recv 4185->4184 4185->4187 4187->4182 4187->4183 4187->4185 4189 453c143 4187->4189 4190 453c190 4187->4190 4191 453c1c4 4190->4191 4192 453c1dc 4190->4192 4215 453c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4191->4215 4194 453c223 4192->4194 4197 453c1f2 4192->4197 4196 453b370 7 API calls 4194->4196 4195 453c1c9 4195->4187 4201 453c232 4196->4201 4198 453c450 22 API calls 4197->4198 4199 453c210 4198->4199 4199->4187 4200 453c269 _CxxThrowException 4200->4201 4201->4195 4201->4200 4204 453c392 _CxxThrowException 4201->4204 4206 453b3f0 8 API calls 4201->4206 4210 453c37d _CxxThrowException 4201->4210 4211 453b660 6 API calls 4201->4211 4212 453b370 7 API calls 4201->4212 4213 453c366 ??3@YAXPAX ??3@YAXPAX 4201->4213 4216 453b3f0 EnterCriticalSection 4201->4216 4203 453c2d3 ??2@YAPAXI ??2@YAPAXI 4203->4201 4203->4204 4205 453b660 6 API calls 4204->4205 4207 453c3b2 4205->4207 4206->4201 4208 453c450 22 API calls 4207->4208 4209 453c3bd 4208->4209 4209->4187 4210->4204 4211->4201 4212->4201 4213->4201 4214->4182 4215->4195 4217 453b40b 4216->4217 4218 453b413 LeaveCriticalSection 4217->4218 4219 453b423 4217->4219 4218->4203 4220 453b47b 4219->4220 4221 453b45d memmove 4219->4221 4222 453b590 4 API calls 4220->4222 4221->4220 4223 453b48a LeaveCriticalSection 4222->4223 4223->4203 4131 45404d0 4132 45404ff Sleep 4131->4132 4133 4540507 PeekNamedPipe 4132->4133 4133->4132 4134 4540527 4133->4134 4134->4132 4135 454052f LocalAlloc ReadFile 4134->4135 4136 453ea90 22 API calls 4135->4136 4137 454056f LocalFree 4136->4137 4137->4133 4224 4540490 4225 454049d 4224->4225 4226 45404ae WriteFile 4224->4226 4225->4226 4227 45404a6 4225->4227 4230 453eb40 SetEvent 4227->4230 4229 45404ab 4230->4229 4231 4544590 calloc 4138 45413d8 4139 45413da GetTickCount 4138->4139 4140 4540ac0 136 API calls 4139->4140 4166 4541154 4140->4166 4141 453e400 lstrcpyW 4141->4166 4142 4541454 Sleep 4142->4166 4143 4541478 GetTickCount 4145 454147e OpenEventW WaitForSingleObject Sleep 4143->4145 4144 4541159 atoi 4146 454116b sprintf OutputDebugStringA Sleep 4144->4146 4147 45414b8 4145->4147 4145->4166 4146->4146 4146->4166 4171 453c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4147->4171 4149 45411c8 Sleep 4149->4149 4149->4166 4150 45414c3 CloseHandle SetErrorMode 4154 453e450 3 API calls 4150->4154 4151 45411ee Sleep 4151->4151 4151->4166 4152 454121e GetLocalTime sprintf 4152->4166 4153 45412f9 atoi atoi atoi GetTickCount 4156 453bf20 65 API calls 4153->4156 4155 45414df 4154->4155 4158 453b880 11 API calls 4155->4158 4156->4166 4157 45412ab OpenEventW 4159 45412c4 Sleep 4157->4159 4157->4166 4160 45414ee 4158->4160 4159->4157 4159->4166 4161 45412d7 Sleep 4161->4166 4162 4541391 sprintf 4164 4540e7e 6 API calls 4162->4164 4169 45413b4 4164->4169 4165 45412f2 CloseHandle 4165->4153 4166->4141 4166->4142 4166->4143 4166->4144 4166->4145 4166->4149 4166->4151 4166->4152 4166->4153 4166->4157 4166->4161 4166->4162 4167 453bf20 65 API calls 4166->4167 4170 453c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4166->4170 4167->4166 4168 4547870 7 API calls 4168->4169 4169->4139 4169->4168 4170->4165 4171->4150 3942 453ea40 3947 453ea60 CloseHandle 3942->3947 3944 453ea48 3945 453ea58 3944->3945 3946 453ea4f ??3@YAXPAX 3944->3946 3946->3945 3947->3944 4172 453dec0 4173 453dec8 4172->4173 4174 453ded8 4173->4174 4175 453decf ??3@YAXPAX 4173->4175 4175->4174 4232 453e180 4233 453b780 6 API calls 4232->4233 4234 453e1a4 4233->4234 4235 453bf20 65 API calls 4234->4235 4236 453e1c3 4235->4236 4237 453e1c7 4236->4237 4238 453e1f5 4236->4238 4239 453b880 11 API calls 4237->4239 4249 4540100 4238->4249 4241 453e1db 4239->4241 4244 453e214 4245 4540390 12 API calls 4244->4245 4246 453e225 4245->4246 4247 453b880 11 API calls 4246->4247 4248 453e239 4247->4248 4250 453ea10 CreateEventW 4249->4250 4251 4540132 LoadLibraryA GetProcAddress CreatePipe 4250->4251 4252 45401f3 CreatePipe 4251->4252 4261 453e203 4251->4261 4253 4540229 GetStartupInfoW GetSystemDirectoryW lstrcatW lstrcatW CreateProcessW 4252->4253 4252->4261 4254 45402f3 4253->4254 4253->4261 4255 453ea90 22 API calls 4254->4255 4256 4540314 4255->4256 4264 453eb00 WaitForSingleObject Sleep 4256->4264 4258 454031b 4259 45416e0 17 API calls 4258->4259 4260 4540330 4259->4260 4262 45416e0 17 API calls 4260->4262 4263 453c170 WaitForSingleObject 4261->4263 4262->4261 4263->4244 4264->4258 4059 4547e00 ??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE 4265 4540580 WaitForMultipleObjects TerminateThread TerminateProcess 4268 453c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4265->4268 4267 45405c7 4268->4267 3948 4540f4d mbstowcs 3953 4541a20 InternetOpenW 3948->3953 3950 4540fb3 3951 4540fe8 3950->3951 3952 4540fba CreateProcessW 3950->3952 3952->3951 3954 4541a52 3953->3954 3955 4541a5f InternetOpenUrlW 3953->3955 3954->3950 3956 4541a7c 3955->3956 3957 4541a89 CreateFileW 3955->3957 3956->3950 3958 4541b15 InternetCloseHandle InternetCloseHandle 3957->3958 3959 4541aab InternetReadFile 3957->3959 3958->3950 3960 4541ad2 3959->3960 3961 4541adb WriteFile 3959->3961 3960->3961 3962 4541b00 CloseHandle 3960->3962 3961->3959 3961->3962 3962->3958 3964 4540e74 3965 4547840 3964->3965 3966 4547864 3965->3966 3967 4547853 VirtualFree 3965->3967 3967->3966 4176 453def0 4177 453def9 4176->4177 4178 453defe 4176->4178 4180 453eb40 SetEvent 4177->4180 4180->4178 4269 453e3b0 4270 453e450 3 API calls 4269->4270 4271 453e3b8 4270->4271 4272 453e3c8 4271->4272 4273 453e3bf ??3@YAXPAX 4271->4273 4273->4272 3968 4540370 3973 4540390 7 API calls 3968->3973 3971 454037f ??3@YAXPAX 3972 4540388 3971->3972 3974 454041c DisconnectNamedPipe 3973->3974 3975 454041f 3973->3975 3974->3975 3976 4540426 DisconnectNamedPipe 3975->3976 3977 4540429 3975->3977 3976->3977 3978 4540430 DisconnectNamedPipe 3977->3978 3979 4540433 3977->3979 3978->3979 3980 454043a DisconnectNamedPipe 3979->3980 3981 454043d 3979->3981 3980->3981 3984 453ea60 CloseHandle 3981->3984 3983 4540378 3983->3971 3983->3972 3984->3983 4274 45445b0 free 4060 454763c ??1type_info@@UAE 4061 4547652 4060->4061 4062 454764b ??3@YAXPAX 4060->4062 4062->4061 3985 453b860 3986 453b880 11 API calls 3985->3986 3987 453b868 3986->3987 3988 453b878 3987->3988 3989 453b86f ??3@YAXPAX 3987->3989 3989->3988 3990 453e260 3991 453b780 6 API calls 3990->3991 3992 453e284 3991->3992 3993 453bf20 65 API calls 3992->3993 3994 453e2a3 3993->3994 3995 453e2a7 3994->3995 3996 453e2d5 3994->3996 3997 453b880 11 API calls 3995->3997 4005 453de50 3996->4005 3999 453e2bb 3997->3999 4000 453e2e3 4014 453c170 WaitForSingleObject 4000->4014 4002 453e2f4 4003 453b880 11 API calls 4002->4003 4004 453e319 4003->4004 4006 453ea10 CreateEventW 4005->4006 4007 453de77 4006->4007 4015 453df10 OutputDebugStringA 4007->4015 4011 453de93 4019 453dfa0 GetSystemDirectoryW lstrcatW CreateFileW 4011->4019 4013 453de9a Sleep 4013->4000 4014->4002 4026 453ea90 4015->4026 4018 453eb00 WaitForSingleObject Sleep 4018->4011 4020 453e082 CloseHandle 4019->4020 4021 453dffb GetFileSize ??2@YAPAXI ReadFile 4019->4021 4020->4013 4022 453e026 4021->4022 4023 453e034 mbstowcs 4021->4023 4022->4022 4022->4023 4029 453df40 LocalAlloc 4023->4029 4025 453e076 ??3@YAXPAX 4025->4020 4027 453c450 22 API calls 4026->4027 4028 453de8c 4027->4028 4028->4018 4030 453ea90 22 API calls 4029->4030 4031 453df80 LocalFree 4030->4031 4031->4025 4032 453db60 4033 453dba3 ??3@YAXPAX 4032->4033 4034 453db6f 4032->4034 4035 453db70 ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N ??3@YAXPAX 4034->4035 4035->4035 4036 453dba2 4035->4036 4036->4033 4063 453e820 4064 453e834 4063->4064 4090 453e946 4063->4090 4065 453e933 4064->4065 4066 453e8f1 4064->4066 4067 453e911 4064->4067 4068 453e856 4064->4068 4069 453e93f 4064->4069 4070 453e843 InterlockedExchange 4064->4070 4071 453e921 4064->4071 4072 453e8e1 4064->4072 4073 453e901 4064->4073 4074 453e884 OutputDebugStringA 4064->4074 4075 453e8ce 4064->4075 4064->4090 4107 453c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4065->4107 4082 453e4d0 12 API calls 4066->4082 4076 453e4d0 12 API calls 4067->4076 4084 45416e0 17 API calls 4068->4084 4108 453e760 wcstombs OutputDebugStringA sprintf WinExec strstr 4069->4108 4102 453e730 4071->4102 4097 453e4d0 wcstombs 4072->4097 4083 453e4d0 12 API calls 4073->4083 4074->4068 4094 453e340 wsprintfW lstrlenW 4075->4094 4085 453e91a 4076->4085 4091 453e8fa 4082->4091 4092 453e90a 4083->4092 4093 453e8ad 4084->4093 4088 453e93b 4089 453e8ea 4111 453ff30 7 API calls 4094->4111 4096 453e397 4098 453e541 4097->4098 4099 453e525 atoi 4097->4099 4100 453e54a 10 API calls 4098->4100 4101 453e654 4098->4101 4099->4089 4100->4089 4101->4089 4115 453e6a0 GetCurrentProcess OpenProcessToken 4102->4115 4104 453e73c ExitWindowsEx 4105 453e6a0 6 API calls 4104->4105 4106 453e758 4105->4106 4107->4088 4109 453e803 ExitProcess 4108->4109 4110 453e80b 4108->4110 4110->4090 4112 454001f 4111->4112 4113 453ffc3 4111->4113 4112->4096 4113->4112 4114 454003c lstrlenW 4113->4114 4114->4112 4116 453e6c1 4115->4116 4117 453e6c6 LookupPrivilegeValueW AdjustTokenPrivileges GetLastError 4115->4117 4116->4104 4118 453e70f CloseHandle 4117->4118 4119 453e70d 4117->4119 4118->4104 4119->4118 4120 453b320 4121 453b340 2 API calls 4120->4121 4122 453b328 4121->4122 4123 453b338 4122->4123 4124 453b32f ??3@YAXPAX 4122->4124 4124->4123 4275 453b6a0 4276 453b6a5 4275->4276 4277 45475e2 2 API calls 4276->4277 4278 453b6ca 4277->4278 4279 453c8a0 4280 453c8b7 4279->4280 4314 453c993 4279->4314 4281 453c971 4280->4281 4282 453c910 4280->4282 4283 453c8f6 4280->4283 4284 453c935 4280->4284 4285 453c8be 4280->4285 4286 453c91d 4280->4286 4287 453c903 4280->4287 4288 453c942 4280->4288 4289 453c962 4280->4289 4290 453c8e0 4280->4290 4291 453c980 LoadLibraryW 4280->4291 4292 453c8cb DeleteFileW 4280->4292 4293 453c92a 4280->4293 4294 453c94f 4280->4294 4295 453c98c 4280->4295 4280->4314 4296 453cba0 13 API calls 4281->4296 4377 453db10 4282->4377 4349 453d440 lstrlenW 4283->4349 4395 453daf0 4284->4395 4326 453cfa0 LocalAlloc wsprintfW FindFirstFileW 4285->4326 4382 453db30 lstrlenW MoveFileW 4286->4382 4364 453d2e0 4287->4364 4398 453d880 lstrcpyW 4288->4398 4411 453cba0 wcsrchr 4289->4411 4342 453d120 wsprintfW FindFirstFileW 4290->4342 4339 453d430 4292->4339 4385 453d7c0 4293->4385 4408 453da50 CreateFileW SetFilePointer WriteFile CloseHandle 4294->4408 4423 453c830 OutputDebugStringW CreateFileW 4295->4423 4312 453c97c 4296->4312 4313 453c8e9 4324 453d430 22 API calls 4313->4324 4316 453c90c 4321 453c94b 4322 453c8c7 4325 453c8f2 4324->4325 4327 453d027 4326->4327 4328 453d007 4326->4328 4331 453d039 LocalReAlloc 4327->4331 4332 453d04f lstrcmpW 4327->4332 4329 453ea90 22 API calls 4328->4329 4330 453d01a 4329->4330 4330->4322 4331->4332 4333 453d063 lstrcmpW 4332->4333 4334 453d0e2 FindNextFileW 4332->4334 4333->4334 4335 453d077 lstrlenW 4333->4335 4334->4327 4336 453d0f6 4334->4336 4335->4334 4337 453ea90 22 API calls 4336->4337 4338 453d101 LocalFree FindClose 4337->4338 4338->4322 4340 453ea90 22 API calls 4339->4340 4341 453c8dc 4340->4341 4343 453d163 4342->4343 4344 453d171 4342->4344 4343->4313 4345 453d1cf FindNextFileW 4344->4345 4347 453d192 wsprintfW 4344->4347 4348 453d1b4 wsprintfW DeleteFileW 4344->4348 4345->4344 4346 453d1df FindClose RemoveDirectoryW 4345->4346 4346->4313 4347->4344 4348->4345 4350 453d491 wcslen ?assign@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PBGI 4349->4350 4351 453d470 4349->4351 4439 453dbc0 ??2@YAPAXI 4350->4439 4426 453d570 lstrlenW 4351->4426 4356 453d511 4455 453d200 lstrcpyW CreateFileW 4356->4455 4357 453d485 4359 453d7c0 27 API calls 4357->4359 4362 453c8ff 4359->4362 4360 453d4ea 4360->4356 4363 453d518 ??3@YAXPAX 4360->4363 4363->4356 4365 453d2f1 4364->4365 4366 453d2fe CreateFileW 4364->4366 4460 453d3c0 ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N ??3@YAXPAX 4365->4460 4368 453d321 4366->4368 4369 453d329 SetFilePointer LocalAlloc ReadFile CloseHandle 4366->4369 4368->4316 4371 453d3a1 4369->4371 4372 453d385 4369->4372 4370 453d2f6 4370->4316 4374 453d3c0 32 API calls 4371->4374 4373 453ea90 22 API calls 4372->4373 4376 453d38f LocalFree 4373->4376 4375 453d3a6 LocalFree 4374->4375 4375->4316 4376->4316 4467 453c9f0 lstrlenW malloc 4377->4467 4379 453db1d 4380 453d430 22 API calls 4379->4380 4381 453c919 4380->4381 4383 453d430 22 API calls 4382->4383 4384 453c926 4383->4384 4386 453d86c 4385->4386 4391 453d7d0 4385->4391 4387 453d430 22 API calls 4386->4387 4388 453c931 4387->4388 4389 453d801 ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG 4389->4391 4392 453d80f ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG 4389->4392 4390 453d845 ??3@YAXPAX 4390->4386 4390->4391 4391->4386 4391->4389 4391->4390 4481 453dc00 ??3@YAXPAX 4391->4481 4392->4391 4393 453d820 ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG 4392->4393 4393->4390 4482 453d930 4395->4482 4397 453c93e 4399 453c9f0 11 API calls 4398->4399 4400 453d8c6 FindFirstFileW 4399->4400 4401 453d907 4400->4401 4402 453d8d9 4400->4402 4403 453d930 26 API calls 4401->4403 4402->4401 4405 453d8eb 4402->4405 4404 453d90e FindClose 4403->4404 4404->4321 4406 453d430 22 API calls 4405->4406 4407 453d8f4 FindClose 4406->4407 4407->4321 4409 453ea90 22 API calls 4408->4409 4410 453c95e 4409->4410 4412 453c96d 4411->4412 4413 453cbe8 lstrcpyW LoadLibraryW GetProcAddress GetProcAddress GetProcAddress 4411->4413 4414 453cc3d 4413->4414 4414->4412 4415 453cc5f wsprintfW 4414->4415 4416 453cca5 4415->4416 4416->4412 4417 453ccd9 wcsstr 4416->4417 4418 453ccf2 wcsstr 4417->4418 4419 453cd28 lstrcpyW 4417->4419 4418->4419 4420 453cd05 lstrcatW lstrcatW 4418->4420 4421 453cd37 CreateProcessW 4419->4421 4420->4421 4421->4412 4424 453c892 CloseHandle 4423->4424 4425 453c867 GetFileSize ??2@YAPAXI ReadFile 4423->4425 4424->4314 4425->4424 4427 453d5b6 wsprintfW FindFirstFileW 4426->4427 4429 453d478 4427->4429 4437 453d608 4427->4437 4429->4356 4429->4357 4430 453d742 FindNextFileW 4433 453d75a FindClose 4430->4433 4430->4437 4431 453d62a wsprintfW 4434 453d570 7 API calls 4431->4434 4432 453d64f wsprintfW wcslen ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N 4435 453d6b7 ??2@YAPAXI 4432->4435 4432->4437 4433->4429 4434->4437 4435->4437 4436 453dc10 7 API calls 4436->4437 4437->4430 4437->4431 4437->4432 4437->4435 4437->4436 4438 453d71f ??3@YAXPAX 4437->4438 4438->4437 4440 453d4d4 4439->4440 4441 453dc10 4440->4441 4442 453dc40 4441->4442 4447 453dd44 4441->4447 4443 453dc68 4442->4443 4450 453dcdb 4442->4450 4445 453dc74 ?_Split@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@ 4443->4445 4446 453dc6e ?_Xran@std@ 4443->4446 4444 453dd35 ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N 4444->4447 4448 453dc85 4445->4448 4446->4445 4447->4360 4449 453dcc0 ?_Split@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@ 4448->4449 4452 453dca1 ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N 4448->4452 4449->4360 4450->4444 4451 453dcf5 ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N 4450->4451 4453 453dd06 4451->4453 4452->4449 4454 453dcb7 ?_Eos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXI 4452->4454 4453->4360 4454->4449 4456 453d243 4455->4456 4457 453d24d GetFileSize CloseHandle lstrlenW LocalAlloc lstrlenW 4455->4457 4456->4362 4458 453ea90 22 API calls 4457->4458 4459 453d2c8 LocalFree 4458->4459 4459->4362 4461 453d3f9 4460->4461 4463 453d405 4460->4463 4462 453d430 22 API calls 4461->4462 4464 453d402 4462->4464 4465 453d200 30 API calls 4463->4465 4464->4370 4466 453d421 4465->4466 4466->4370 4468 453ca42 lstrcpyW 4467->4468 4469 453cb76 4467->4469 4470 453ca55 4468->4470 4476 453caa7 4468->4476 4469->4379 4472 453ca82 4470->4472 4475 453ca77 CharNextW 4470->4475 4470->4476 4471 453cb3e free 4471->4379 4471->4469 4472->4476 4479 453ca9c CharNextW 4472->4479 4473 453cb30 CharNextW 4473->4476 4474 453cae8 GetFileAttributesW 4474->4476 4477 453cafb CreateDirectoryW 4474->4477 4475->4470 4476->4471 4476->4473 4476->4474 4480 453cb1c free 4476->4480 4477->4476 4478 453cb08 GetLastError 4477->4478 4478->4476 4479->4472 4480->4469 4481->4390 4483 453d944 FindFirstFileW 4482->4483 4486 453d98d FindClose CreateFileW 4483->4486 4487 453da2a CloseHandle 4486->4487 4488 453da0d 4486->4488 4489 453ea90 22 API calls 4487->4489 4488->4397 4490 453da3f 4489->4490 4490->4397 4491 453e0a0 4492 453b780 6 API calls 4491->4492 4493 453e0c4 4492->4493 4494 453bf20 65 API calls 4493->4494 4495 453e0e3 4494->4495 4496 453e0e7 4495->4496 4497 453e115 4495->4497 4499 453b880 11 API calls 4496->4499 4508 453c690 4497->4508 4500 453e0fb 4499->4500 4503 453e137 4504 453c730 7 API calls 4503->4504 4505 453e14b 4504->4505 4506 453b880 11 API calls 4505->4506 4507 453e15f 4506->4507 4509 453ea10 CreateEventW 4508->4509 4510 453c6b7 ??2@YAPAXI 4509->4510 4514 453cda0 8 API calls 4510->4514 4513 453c170 WaitForSingleObject 4513->4503 4520 453ce1d 4514->4520 4515 453cf7f 4516 453ea90 22 API calls 4515->4516 4517 453c6f8 4516->4517 4517->4513 4518 453ce73 SHGetFileInfo 4518->4520 4519 453ceb9 GetDiskFreeSpaceExA 4519->4520 4520->4515 4520->4518 4520->4519 4037 453cb66 free 4038 453cb76 4037->4038 3498 45415a3 3503 453eb90 288 API calls 3498->3503 3500 45415b4 CreateThread 3504 4541501 7 API calls 3500->3504 3505 4541026 3500->3505 3502 45415d0 GetWindowsDirectoryA DeleteFileA 3503->3500 3504->3502 3506 4541030 __EH_prolog 3505->3506 3557 453eb90 288 API calls 3506->3557 3508 4541046 GetInputState GetCurrentThreadId PostThreadMessageW GetMessageW 3558 4540ff1 CreateMutexA GetLastError 3508->3558 3511 4541090 GetProcAddress 3512 45410a5 GetProcAddress 3511->3512 3513 45410b5 3512->3513 3514 45410ba Sleep GetTickCount wsprintfW strstr 3512->3514 3513->3514 3515 4541122 SetErrorMode 3514->3515 3516 45410f3 3514->3516 3568 453b780 3515->3568 3562 4540f2c 3516->3562 3520 4541135 3577 453e3d0 3520->3577 3521 4541110 3565 45416e0 CreateEventW 3521->3565 3522 4541103 WinExec 3522->3515 3525 454111f 3525->3515 3526 4541159 atoi 3527 454116b sprintf OutputDebugStringA Sleep 3526->3527 3527->3527 3536 454114a 3527->3536 3528 45411c8 Sleep 3528->3528 3528->3536 3529 45411ee Sleep 3529->3529 3529->3536 3530 454121e GetLocalTime sprintf 3530->3536 3531 45412f9 atoi atoi atoi GetTickCount 3581 453bf20 3531->3581 3533 45412ab OpenEventW 3534 45412c4 Sleep 3533->3534 3533->3536 3534->3533 3534->3536 3535 45412d7 Sleep 3535->3536 3536->3526 3536->3528 3536->3529 3536->3530 3536->3531 3536->3533 3536->3535 3537 4541391 sprintf 3536->3537 3541 453bf20 65 API calls 3536->3541 3547 4541454 Sleep 3536->3547 3548 4541478 GetTickCount 3536->3548 3549 454147e OpenEventW WaitForSingleObject Sleep 3536->3549 3580 453c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 3536->3580 3640 453e400 3536->3640 3600 4540e7e GetSystemDirectoryW lstrcatW CreateFileW ??2@YAPAXI 3537->3600 3540 45412f2 CloseHandle 3540->3531 3541->3536 3543 45413b4 3544 45413da GetTickCount 3543->3544 3603 4547870 3543->3603 3617 4540ac0 GetVersionExW 3544->3617 3547->3536 3548->3549 3549->3536 3550 45414b8 3549->3550 3643 453c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 3550->3643 3552 45414c3 CloseHandle SetErrorMode 3644 453e450 3552->3644 3557->3508 3559 4541015 ReleaseMutex ExitProcess 3558->3559 3560 4541010 3558->3560 3560->3559 3561 4541024 LoadLibraryW GetProcAddress 3560->3561 3561->3511 3563 4540f33 GetFileAttributesW 3562->3563 3564 4540f42 3562->3564 3563->3564 3564->3521 3564->3522 3662 4541630 CreateThread 3565->3662 3567 4541731 WaitForSingleObject CloseHandle 3567->3525 3685 453b270 LoadLibraryW LoadLibraryW GetProcAddress 3568->3685 3570 453b7aa 3571 453b270 4 API calls 3570->3571 3572 453b7bd 3571->3572 3573 453b270 4 API calls 3572->3573 3574 453b7cd 3573->3574 3575 453b270 4 API calls 3574->3575 3576 453b7dd WSAStartup CreateEventW 3575->3576 3576->3520 3687 453ea10 3577->3687 3579 453e3dd 3579->3536 3580->3540 3691 453c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 3581->3691 3583 453bf2e ResetEvent socket 3584 453bf65 gethostbyname 3583->3584 3585 453bf59 3583->3585 3586 453bf82 htons connect 3584->3586 3587 453bf76 3584->3587 3585->3536 3589 453bfd0 3586->3589 3590 453bff9 setsockopt 3586->3590 3587->3536 3692 453bb70 3589->3692 3592 453c059 3590->3592 3593 453c01d WSAIoctl 3590->3593 3594 45416e0 17 API calls 3592->3594 3593->3592 3596 453c075 3594->3596 3595 453bfde 3595->3590 3713 453b940 RegOpenKeyExW 3595->3713 3596->3536 3598 453bfeb 3598->3590 3599 453bfef 3598->3599 3599->3536 3601 4540f00 WriteFile CloseHandle 3600->3601 3602 4540eef 3600->3602 3601->3543 3602->3601 3604 454787d 3603->3604 3605 4547886 3603->3605 3604->3543 3606 454789b 3605->3606 3607 45478b6 VirtualAlloc 3605->3607 3606->3543 3608 45478cc 3607->3608 3609 45478d3 3607->3609 3608->3543 3728 4547a10 3609->3728 3612 4547907 VirtualFree 3612->3543 3613 454791d VirtualProtect 3614 4547945 3613->3614 3615 454796d 3614->3615 3616 454794f VirtualFree 3614->3616 3615->3543 3616->3543 3733 4540a70 gethostname MultiByteToWideChar lstrlenW 3617->3733 3619 4540b2a getsockname 3734 4540630 LoadLibraryW GetProcAddress GetProcAddress GetProcAddress 3619->3734 3622 4540bd4 GetSystemInfo wsprintfW 3625 4540bfa 3622->3625 3623 4540bb8 3623->3622 3624 4540bc3 lstrcpyW 3623->3624 3624->3625 3738 45406c0 LoadLibraryW GetProcAddress 3625->3738 3629 4540c1e 3630 4540c48 6 API calls 3629->3630 3745 4540730 _wcsrev 3630->3745 3634 4540d4d lstrlenW 3635 4540db0 3634->3635 3636 4540d68 mbstowcs 3634->3636 3637 4540dc0 lstrcpyW mbstowcs 3635->3637 3636->3637 3801 453c450 3637->3801 3639 4540e26 3639->3536 3641 453e416 3640->3641 3642 453e40b lstrcpyW 3640->3642 3641->3536 3642->3641 3643->3552 3645 453e484 3644->3645 3646 453e4ad 3644->3646 3647 453e48b TerminateThread CloseHandle 3645->3647 3912 453ea60 CloseHandle 3646->3912 3647->3646 3647->3647 3649 453e4bd 3650 453b880 WaitForSingleObject 3649->3650 3651 453b8d2 CloseHandle CloseHandle WSACleanup 3650->3651 3652 453b8cb 3650->3652 3914 453b340 3651->3914 3913 453c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 3652->3913 3655 453b8fd 3656 453b340 2 API calls 3655->3656 3657 453b90a 3656->3657 3658 453b340 2 API calls 3657->3658 3659 453b917 3658->3659 3660 453b340 2 API calls 3659->3660 3661 453b927 3660->3661 3662->3567 3663 4541660 SetEvent 3662->3663 3664 45416a2 3663->3664 3665 45416a9 3663->3665 3667 45419b0 LoadLibraryW GetProcAddress 3664->3667 3668 45419dc OpenDesktopW 3667->3668 3669 45419e5 3667->3669 3668->3669 3670 45419ed 3669->3670 3677 4541910 LoadLibraryW GetProcAddress GetProcAddress GetCurrentThreadId 3669->3677 3670->3665 3672 45419f6 3673 45419fd CloseDesktop 3672->3673 3674 4541a09 3672->3674 3673->3665 3675 4541a14 3674->3675 3676 4541a0d FreeLibrary 3674->3676 3675->3665 3676->3675 3678 454194a GetUserObjectInformationW 3677->3678 3679 454196f 3678->3679 3680 454197a 3678->3680 3679->3672 3681 4541981 3680->3681 3682 454198c CloseDesktop 3680->3682 3681->3672 3683 4541997 FreeLibrary 3682->3683 3684 454199e 3682->3684 3683->3684 3684->3672 3686 453b30a FreeLibrary 3685->3686 3686->3570 3690 453c680 3687->3690 3689 453ea26 CreateEventW 3689->3579 3690->3689 3691->3583 3693 453bb93 3692->3693 3727 453c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 3693->3727 3695 453bba5 ResetEvent socket 3696 453bce0 3695->3696 3697 453bbd4 3695->3697 3696->3595 3698 453bce5 3697->3698 3699 453bc2f InternetQueryOptionA 3697->3699 3698->3696 3701 453bcfa strchr strncpy 3698->3701 3699->3696 3700 453bc5e strchr strncpy 3699->3700 3700->3696 3702 453bcb4 atoi 3700->3702 3701->3696 3703 453bd44 atoi 3701->3703 3702->3696 3704 453bd6a gethostbyname 3702->3704 3703->3696 3703->3704 3704->3696 3705 453bd81 htons connect 3704->3705 3705->3696 3706 453bdb8 sprintf OutputDebugStringA send 3705->3706 3708 453be43 select 3706->3708 3709 453bebb recv strstr 3708->3709 3710 453be99 closesocket 3708->3710 3709->3710 3712 453bef8 3709->3712 3710->3696 3712->3595 3714 453b9a6 RegQueryValueExA 3713->3714 3715 453ba9f 3713->3715 3714->3715 3716 453b9da strncpy RegCloseKey strstr 3714->3716 3715->3598 3716->3715 3717 453ba18 InternetOpenW 3716->3717 3717->3715 3718 453ba31 InternetOpenUrlA 3717->3718 3718->3715 3719 453ba4b malloc InternetReadFile InternetCloseHandle InternetCloseHandle 3718->3719 3720 453ba91 free 3719->3720 3721 453baad _strupr strstr 3719->3721 3720->3715 3722 453baea strchr 3721->3722 3723 453bb4e free 3721->3723 3722->3723 3724 453baff 3722->3724 3723->3598 3724->3723 3725 453bb70 24 API calls 3724->3725 3726 453bb3c strstr 3724->3726 3725->3724 3726->3722 3726->3723 3727->3695 3729 4547903 3728->3729 3731 4547a2b 3728->3731 3729->3612 3729->3613 3730 4547a9b LoadLibraryA GetModuleHandleA 3730->3729 3730->3731 3731->3729 3731->3730 3732 4547ad8 GetProcAddress 3731->3732 3732->3729 3732->3731 3733->3619 3735 4540684 3734->3735 3736 45406b3 GetVersionExW 3735->3736 3737 45406ac FreeLibrary 3735->3737 3736->3622 3736->3623 3737->3736 3741 45406e9 3738->3741 3739 4540714 3742 45405d0 CreateFileW 3739->3742 3740 454070d FreeLibrary 3740->3739 3741->3739 3741->3740 3743 45405f5 DeviceIoControl CloseHandle 3742->3743 3744 45405f0 3742->3744 3743->3629 3744->3629 3831 4541760 6 API calls 3745->3831 3747 4540754 3748 4540781 _wcsrev 3747->3748 3749 4540763 lstrcatW lstrcatW 3747->3749 3750 4541760 9 API calls 3748->3750 3749->3748 3751 454078e 3750->3751 3752 4540795 lstrcatW lstrcatW 3751->3752 3753 45407b3 _wcsrev 3751->3753 3752->3753 3754 4541760 9 API calls 3753->3754 3755 45407c0 3754->3755 3756 45407e5 _wcsrev 3755->3756 3757 45407c7 lstrcatW lstrcatW 3755->3757 3758 4541760 9 API calls 3756->3758 3757->3756 3759 45407f2 3758->3759 3760 4540817 _wcsrev 3759->3760 3761 45407f9 lstrcatW lstrcatW 3759->3761 3762 4541760 9 API calls 3760->3762 3761->3760 3763 4540824 3762->3763 3764 4540849 _wcsrev 3763->3764 3765 454082b lstrcatW lstrcatW 3763->3765 3766 4541760 9 API calls 3764->3766 3765->3764 3767 4540856 3766->3767 3768 454085d lstrcatW lstrcatW 3767->3768 3769 454087b _wcsrev 3767->3769 3768->3769 3770 4541760 9 API calls 3769->3770 3771 4540888 3770->3771 3772 45408ad _wcsrev 3771->3772 3773 454088f lstrcatW lstrcatW 3771->3773 3774 4541760 9 API calls 3772->3774 3773->3772 3775 45408ba 3774->3775 3776 45408c1 lstrcatW lstrcatW 3775->3776 3777 45408df _wcsrev 3775->3777 3776->3777 3778 4541760 9 API calls 3777->3778 3779 45408ec 3778->3779 3780 4540911 _wcsrev 3779->3780 3781 45408f3 lstrcatW lstrcatW 3779->3781 3782 4541760 9 API calls 3780->3782 3781->3780 3783 454091e 3782->3783 3784 4540925 lstrcatW lstrcatW 3783->3784 3785 4540943 _wcsrev 3783->3785 3784->3785 3786 4541760 9 API calls 3785->3786 3787 4540950 3786->3787 3788 4540975 _wcsrev 3787->3788 3789 4540957 lstrcatW lstrcatW 3787->3789 3790 4541760 9 API calls 3788->3790 3789->3788 3791 4540982 3790->3791 3792 45409a7 wcsstr 3791->3792 3793 4540989 lstrcatW lstrcatW 3791->3793 3794 45409be lstrcatW 3792->3794 3795 45409ca lstrcpyW 3792->3795 3793->3792 3794->3795 3796 45409e0 wsprintfW 3795->3796 3838 453fa30 6 API calls 3796->3838 3798 4540a49 lstrlenW 3799 4540a5e lstrlenW 3798->3799 3800 4540a59 3798->3800 3799->3634 3800->3799 3877 453b660 EnterCriticalSection 3801->3877 3803 453c467 3804 453c473 _ftol ??2@YAPAXI 3803->3804 3805 453c5a4 3803->3805 3806 453c4b1 3804->3806 3807 453c4a7 3804->3807 3808 453b370 7 API calls 3805->3808 3811 453c4e3 3806->3811 3812 453c4cd ??3@YAXPAX 3806->3812 3807->3639 3809 453c5b4 3808->3809 3810 453b660 6 API calls 3809->3810 3813 453c5be 3810->3813 3880 453b370 EnterCriticalSection 3811->3880 3812->3639 3814 453b370 7 API calls 3813->3814 3820 453c578 3814->3820 3816 453c4fe 3817 453b370 7 API calls 3816->3817 3818 453c50c 3817->3818 3819 453b370 7 API calls 3818->3819 3821 453c51a 3819->3821 3886 453c5d0 3820->3886 3822 453b370 7 API calls 3821->3822 3824 453c527 ??3@YAXPAX ??2@YAPAXI 3822->3824 3826 453b660 6 API calls 3824->3826 3827 453c55e 3826->3827 3828 453b370 7 API calls 3827->3828 3829 453c56b 3828->3829 3829->3820 3830 453c56f ??3@YAXPAX 3829->3830 3830->3820 3832 45418a2 3831->3832 3833 45418f9 3831->3833 3834 45418f2 CloseHandle 3832->3834 3835 45418bd lstrcmpiW 3832->3835 3837 45418d9 CloseHandle 3832->3837 3833->3747 3834->3833 3835->3832 3836 45418ed 3835->3836 3836->3834 3837->3747 3862 453f7e0 9 API calls 3838->3862 3841 453fc33 3850 453fb14 3841->3850 3855 453fc6a wsprintfW 3841->3855 3842 453fde2 wsprintfW 3845 453fe7a lstrcatW 3842->3845 3843 453fe17 wsprintfW 3843->3845 3844 453fd55 3844->3850 3856 453fdce 3844->3856 3845->3798 3846 453fe45 wsprintfW 3846->3845 3847 453fb47 3847->3850 3868 453f7b0 3847->3868 3848 453fcce 3848->3850 3857 453fd1f wsprintfW lstrcatW 3848->3857 3853 453feb4 3850->3853 3854 453fead FreeLibrary 3850->3854 3851 453fb33 3851->3841 3851->3842 3851->3843 3851->3845 3851->3846 3851->3847 3851->3850 3861 453fba4 3851->3861 3853->3798 3854->3853 3855->3850 3856->3842 3856->3843 3856->3845 3856->3846 3857->3848 3859 453fc1c lstrcpyW 3859->3850 3861->3850 3861->3859 3865 453f8b1 3862->3865 3866 453f918 GetProcessHeap HeapAlloc 3865->3866 3867 453f938 3865->3867 3866->3867 3872 453f9cc LoadLibraryW GetProcAddress GetProcAddress 3867->3872 3869 453f7bb 3868->3869 3871 453f7d5 lstrcpyW 3869->3871 3876 453f6f0 CompareStringW 3869->3876 3871->3850 3873 453f9f7 3872->3873 3874 453f9af 3873->3874 3875 453fa01 GetProcessHeap HeapFree 3873->3875 3874->3841 3874->3842 3874->3843 3874->3844 3874->3845 3874->3846 3874->3847 3874->3848 3874->3850 3874->3851 3874->3861 3875->3874 3876->3869 3893 453b590 3877->3893 3879 453b680 LeaveCriticalSection 3879->3803 3881 453b38b 3880->3881 3904 453b4c0 3881->3904 3883 453b399 3884 453b3ae LeaveCriticalSection 3883->3884 3885 453b39e LeaveCriticalSection 3883->3885 3884->3816 3885->3816 3887 453c63a 3886->3887 3888 453c5ee 3886->3888 3890 453c640 send 3887->3890 3892 453c59a 3887->3892 3889 453c5f6 send 3888->3889 3891 453c620 Sleep 3888->3891 3888->3892 3889->3888 3890->3887 3890->3892 3891->3887 3891->3888 3892->3639 3894 453b59c 3893->3894 3895 453b5a4 3894->3895 3896 453b5ae ceil _ftol 3894->3896 3895->3879 3897 453b5e4 3896->3897 3898 453b5f2 VirtualAlloc 3897->3898 3899 453b5e8 3897->3899 3902 453b4b0 3898->3902 3899->3879 3903 453b4b7 VirtualFree 3902->3903 3903->3879 3905 453b4cd 3904->3905 3906 453b4e0 ceil _ftol VirtualAlloc 3905->3906 3907 453b4d5 3905->3907 3908 453b535 3906->3908 3909 453b529 3906->3909 3907->3883 3910 453b56e 3908->3910 3911 453b55c VirtualFree 3908->3911 3909->3883 3910->3883 3911->3910 3912->3649 3913->3651 3915 453b350 VirtualFree 3914->3915 3916 453b35e DeleteCriticalSection 3914->3916 3915->3916 3916->3655 3917 454776e 3919 454778a 3917->3919 3921 4547781 3917->3921 3918 45476c3 3 API calls 3918->3921 3919->3918 3919->3921 3924 45477b2 3919->3924 3920 45477d2 3920->3924 3925 45476c3 3920->3925 3921->3920 3922 45476c3 3 API calls 3921->3922 3921->3924 3922->3920 3926 45476cb 3925->3926 3927 45476ec malloc 3926->3927 3929 4547701 3926->3929 3930 454772b 3926->3930 3928 4547705 _initterm 3927->3928 3927->3929 3928->3929 3929->3924 3930->3929 3931 4547758 free 3930->3931 3931->3929

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 0 453eb90-453f6e6 LoadLibraryA LdrInitializeThunk LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress
          APIs
          • LoadLibraryA.KERNEL32(kernel32.dll,OutputDebugStringA,?,?,045415B4), ref: 0453EBA2
          • LdrInitializeThunk.NTDLL(00000000), ref: 0453EBAB
          • LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatus,?,?,045415B4), ref: 0453EBBC
          • GetProcAddress.KERNEL32(00000000), ref: 0453EBBF
          • LoadLibraryA.KERNEL32(kernel32.dll,DeviceIoControl,?,?,045415B4), ref: 0453EBD0
          • GetProcAddress.KERNEL32(00000000), ref: 0453EBD3
          • LoadLibraryA.KERNEL32(kernel32.dll,GetSystemInfo,?,?,045415B4), ref: 0453EBE4
          • GetProcAddress.KERNEL32(00000000), ref: 0453EBE7
          • LoadLibraryA.KERNEL32(kernel32.dll,GetVersionExW,?,?,045415B4), ref: 0453EBF8
          • GetProcAddress.KERNEL32(00000000), ref: 0453EBFB
          • LoadLibraryA.KERNELBASE(wininet.dll,InternetQueryOptionA,?,?,045415B4), ref: 0453EC0C
          • GetProcAddress.KERNEL32(00000000), ref: 0453EC0F
          • LoadLibraryA.KERNEL32(USER32.dll,PostThreadMessageW,?,?,045415B4), ref: 0453EC20
          • GetProcAddress.KERNEL32(00000000), ref: 0453EC23
          • LoadLibraryA.KERNEL32(USER32.dll,GetInputState,?,?,045415B4), ref: 0453EC34
          • GetProcAddress.KERNEL32(00000000), ref: 0453EC37
          • LoadLibraryA.KERNEL32(USER32.dll,OpenDesktopW,?,?,045415B4), ref: 0453EC48
          • GetProcAddress.KERNEL32(00000000), ref: 0453EC4B
          • LoadLibraryA.KERNEL32(USER32.dll,GetUserObjectInformationW,?,?,045415B4), ref: 0453EC5C
          • GetProcAddress.KERNEL32(00000000), ref: 0453EC5F
          • LoadLibraryA.KERNEL32(USER32.dll,CloseDesktop,?,?,045415B4), ref: 0453EC70
          • GetProcAddress.KERNEL32(00000000), ref: 0453EC73
          • LoadLibraryA.KERNEL32(USER32.dll,wsprintfW,?,?,045415B4), ref: 0453EC84
          • GetProcAddress.KERNEL32(00000000), ref: 0453EC87
          • LoadLibraryA.KERNEL32(USER32.dll,CharNextW,?,?,045415B4), ref: 0453EC98
          • GetProcAddress.KERNEL32(00000000), ref: 0453EC9B
          • LoadLibraryW.KERNEL32(gdi32.dll,CreateCompatibleBitmap,?,?,045415B4), ref: 0453ECB2
          • GetProcAddress.KERNEL32(00000000), ref: 0453ECB5
          • LoadLibraryW.KERNEL32(gdi32.dll,GetDIBits,?,?,045415B4), ref: 0453ECC6
          • GetProcAddress.KERNEL32(00000000), ref: 0453ECC9
          • LoadLibraryW.KERNEL32(gdi32.dll,BitBlt,?,?,045415B4), ref: 0453ECDA
          • GetProcAddress.KERNEL32(00000000), ref: 0453ECDD
          • LoadLibraryW.KERNEL32(gdi32.dll,DeleteDC,?,?,045415B4), ref: 0453ECEE
          • GetProcAddress.KERNEL32(00000000), ref: 0453ECF1
          • LoadLibraryW.KERNEL32(gdi32.dll,DeleteObject,?,?,045415B4), ref: 0453ED02
          • GetProcAddress.KERNEL32(00000000), ref: 0453ED05
          • LoadLibraryW.KERNEL32(gdi32.dll,CreateCompatibleDC,?,?,045415B4), ref: 0453ED16
          • GetProcAddress.KERNEL32(00000000), ref: 0453ED19
          • LoadLibraryW.KERNEL32(gdi32.dll,CreateDIBSection,?,?,045415B4), ref: 0453ED2A
          • GetProcAddress.KERNEL32(00000000), ref: 0453ED2D
          • LoadLibraryW.KERNEL32(gdi32.dll,SelectObject,?,?,045415B4), ref: 0453ED3E
          • GetProcAddress.KERNEL32(00000000), ref: 0453ED41
          • LoadLibraryW.KERNEL32(kernel32.dll,RemoveDirectoryW,?,?,045415B4), ref: 0453ED52
          • GetProcAddress.KERNEL32(00000000), ref: 0453ED55
          • LoadLibraryW.KERNEL32(kernel32.dll,FindClose,?,?,045415B4), ref: 0453ED66
          • GetProcAddress.KERNEL32(00000000), ref: 0453ED69
          • LoadLibraryW.KERNEL32(kernel32.dll,FindNextFileW,?,?,045415B4), ref: 0453ED7A
          • GetProcAddress.KERNEL32(00000000), ref: 0453ED7D
          • LoadLibraryW.KERNEL32(kernel32.dll,FindFirstFileW,?,?,045415B4), ref: 0453ED8E
          • GetProcAddress.KERNEL32(00000000), ref: 0453ED91
          • LoadLibraryW.KERNEL32(kernel32.dll,GetDriveTypeA,?,?,045415B4), ref: 0453EDA2
          • GetProcAddress.KERNEL32(00000000), ref: 0453EDA5
          • LoadLibraryW.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,?,?,045415B4), ref: 0453EDB6
          • GetProcAddress.KERNEL32(00000000), ref: 0453EDB9
          • LoadLibraryW.KERNEL32(kernel32.dll,GetVolumeInformationA,?,?,045415B4), ref: 0453EDCA
          • GetProcAddress.KERNEL32(00000000), ref: 0453EDCD
          • LoadLibraryW.KERNEL32(kernel32.dll,GetLogicalDriveStringsA,?,?,045415B4), ref: 0453EDDE
          • GetProcAddress.KERNEL32(00000000), ref: 0453EDE1
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateDirectoryW,?,?,045415B4), ref: 0453EDF2
          • GetProcAddress.KERNEL32(00000000), ref: 0453EDF5
          • LoadLibraryW.KERNEL32(kernel32.dll,GetFileAttributesW,?,?,045415B4), ref: 0453EE06
          • GetProcAddress.KERNEL32(00000000), ref: 0453EE09
          • LoadLibraryW.KERNEL32(kernel32.dll,UnmapViewOfFile,?,?,045415B4), ref: 0453EE1A
          • GetProcAddress.KERNEL32(00000000), ref: 0453EE1D
          • LoadLibraryW.KERNEL32(kernel32.dll,MapViewOfFile,?,?,045415B4), ref: 0453EE2E
          • GetProcAddress.KERNEL32(00000000), ref: 0453EE31
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateFileMappingW,?,?,045415B4), ref: 0453EE42
          • GetProcAddress.KERNEL32(00000000), ref: 0453EE45
          • LoadLibraryW.KERNEL32(kernel32.dll,SetFilePointer,?,?,045415B4), ref: 0453EE56
          • GetProcAddress.KERNEL32(00000000), ref: 0453EE59
          • LoadLibraryW.KERNEL32(user32.dll,GetForegroundWindow,?,?,045415B4), ref: 0453EE6A
          • GetProcAddress.KERNEL32(00000000), ref: 0453EE6D
          • LoadLibraryW.KERNEL32(kernel32.dll,GetCurrentThreadId,?,?,045415B4), ref: 0453EE7E
          • GetProcAddress.KERNEL32(00000000), ref: 0453EE81
          • LoadLibraryW.KERNEL32(kernel32.dll,TerminateThread,?,?,045415B4), ref: 0453EE92
          • GetProcAddress.KERNEL32(00000000), ref: 0453EE95
          • LoadLibraryW.KERNELBASE(avicap32.dll,capGetDriverDescriptionW,?,?,045415B4), ref: 0453EEA6
          • GetProcAddress.KERNEL32(00000000), ref: 0453EEA9
          • LoadLibraryW.KERNEL32(avicap32.dll,capCreateCaptureWindowW,?,?,045415B4), ref: 0453EEBA
          • GetProcAddress.KERNEL32(00000000), ref: 0453EEBD
          • LoadLibraryW.KERNEL32(user32.dll,GetClipboardData,?,?,045415B4), ref: 0453EECE
          • GetProcAddress.KERNEL32(00000000), ref: 0453EED1
          • LoadLibraryW.KERNEL32(user32.dll,CloseClipboard,?,?,045415B4), ref: 0453EEE2
          • GetProcAddress.KERNEL32(00000000), ref: 0453EEE5
          • LoadLibraryW.KERNEL32(user32.dll,SetClipboardData,?,?,045415B4), ref: 0453EEF6
          • GetProcAddress.KERNEL32(00000000), ref: 0453EEF9
          • LoadLibraryW.KERNEL32(user32.dll,EmptyClipboard,?,?,045415B4), ref: 0453EF0A
          • GetProcAddress.KERNEL32(00000000), ref: 0453EF0D
          • LoadLibraryW.KERNEL32(user32.dll,SendMessageW,?,?,045415B4), ref: 0453EF1E
          • GetProcAddress.KERNEL32(00000000), ref: 0453EF21
          • LoadLibraryW.KERNEL32(user32.dll,GetSystemMetrics,?,?,045415B4), ref: 0453EF32
          • GetProcAddress.KERNEL32(00000000), ref: 0453EF35
          • LoadLibraryW.KERNEL32(user32.dll,OpenClipboard,?,?,045415B4), ref: 0453EF46
          • GetProcAddress.KERNEL32(00000000), ref: 0453EF49
          • LoadLibraryW.KERNEL32(user32.dll,SystemParametersInfoW,?,?,045415B4), ref: 0453EF5A
          • GetProcAddress.KERNEL32(00000000), ref: 0453EF5D
          • LoadLibraryW.KERNEL32(user32.dll,BlockInput,?,?,045415B4), ref: 0453EF6E
          • GetProcAddress.KERNEL32(00000000), ref: 0453EF71
          • LoadLibraryW.KERNEL32(kernel32.dll,InterlockedExchange,?,?,045415B4), ref: 0453EF82
          • GetProcAddress.KERNEL32(00000000), ref: 0453EF85
          • LoadLibraryW.KERNEL32(kernel32.dll,VirtualFree,?,?,045415B4), ref: 0453EF96
          • GetProcAddress.KERNEL32(00000000), ref: 0453EF99
          • LoadLibraryW.KERNEL32(kernel32.dll,VirtualAlloc,?,?,045415B4), ref: 0453EFAA
          • GetProcAddress.KERNEL32(00000000), ref: 0453EFAD
          • LoadLibraryW.KERNEL32(kernel32.dll,ReleaseMutex,?,?,045415B4), ref: 0453EFBE
          • GetProcAddress.KERNEL32(00000000), ref: 0453EFC1
          • LoadLibraryW.KERNEL32(kernel32.dll,CloseHandle,?,?,045415B4), ref: 0453EFD2
          • GetProcAddress.KERNEL32(00000000), ref: 0453EFD5
          • LoadLibraryW.KERNEL32(kernel32.dll,GetLastError,?,?,045415B4), ref: 0453EFE6
          • GetProcAddress.KERNEL32(00000000), ref: 0453EFE9
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateMutexA,?,?,045415B4), ref: 0453EFFA
          • GetProcAddress.KERNEL32(00000000), ref: 0453EFFD
          • LoadLibraryW.KERNEL32(kernel32.dll,WinExec,?,?,045415B4), ref: 0453F00E
          • GetProcAddress.KERNEL32(00000000), ref: 0453F011
          • LoadLibraryW.KERNEL32(kernel32.dll,InitializeCriticalSection,?,?,045415B4), ref: 0453F022
          • GetProcAddress.KERNEL32(00000000), ref: 0453F025
          • LoadLibraryW.KERNEL32(kernel32.dll,DeleteCriticalSection,?,?,045415B4), ref: 0453F036
          • GetProcAddress.KERNEL32(00000000), ref: 0453F039
          • LoadLibraryW.KERNEL32(kernel32.dll,LeaveCriticalSection,?,?,045415B4), ref: 0453F04A
          • GetProcAddress.KERNEL32(00000000), ref: 0453F04D
          • LoadLibraryW.KERNEL32(kernel32.dll,EnterCriticalSection,?,?,045415B4), ref: 0453F05E
          • GetProcAddress.KERNEL32(00000000), ref: 0453F061
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateFileW,?,?,045415B4), ref: 0453F072
          • GetProcAddress.KERNEL32(00000000), ref: 0453F075
          • LoadLibraryW.KERNEL32(kernel32.dll,WriteFile,?,?,045415B4), ref: 0453F086
          • GetProcAddress.KERNEL32(00000000), ref: 0453F089
          • LoadLibraryW.KERNEL32(kernel32.dll,MoveFileW,?,?,045415B4), ref: 0453F09A
          • GetProcAddress.KERNEL32(00000000), ref: 0453F09D
          • LoadLibraryW.KERNEL32(kernel32.dll,DeleteFileW,?,?,045415B4), ref: 0453F0AE
          • GetProcAddress.KERNEL32(00000000), ref: 0453F0B1
          • LoadLibraryW.KERNEL32(advapi32.dll,OpenSCManagerW,?,?,045415B4), ref: 0453F0C2
          • GetProcAddress.KERNEL32(00000000), ref: 0453F0C5
          • LoadLibraryW.KERNEL32(advapi32.dll,OpenServiceW,?,?,045415B4), ref: 0453F0D6
          • GetProcAddress.KERNEL32(00000000), ref: 0453F0D9
          • LoadLibraryW.KERNEL32(advapi32.dll,ChangeServiceConfigW,?,?,045415B4), ref: 0453F0EA
          • GetProcAddress.KERNEL32(00000000), ref: 0453F0ED
          • LoadLibraryW.KERNEL32(advapi32.dll,ControlService,?,?,045415B4), ref: 0453F0FE
          • GetProcAddress.KERNEL32(00000000), ref: 0453F101
          • LoadLibraryW.KERNEL32(kernel32.dll,Sleep,?,?,045415B4), ref: 0453F112
          • GetProcAddress.KERNEL32(00000000), ref: 0453F115
          • LoadLibraryW.KERNEL32(advapi32.dll,StartServiceW,?,?,045415B4), ref: 0453F126
          • GetProcAddress.KERNEL32(00000000), ref: 0453F129
          • LoadLibraryW.KERNEL32(advapi32.dll,CloseServiceHandle,?,?,045415B4), ref: 0453F13A
          • GetProcAddress.KERNEL32(00000000), ref: 0453F13D
          • LoadLibraryW.KERNEL32(kernel32.dll,GetModuleFileNameW,?,?,045415B4), ref: 0453F14E
          • GetProcAddress.KERNEL32(00000000), ref: 0453F151
          • LoadLibraryW.KERNEL32(kernel32.dll,GetTempPathW,?,?,045415B4), ref: 0453F162
          • GetProcAddress.KERNEL32(00000000), ref: 0453F165
          • LoadLibraryW.KERNEL32(kernel32.dll,GetSystemDirectoryW,?,?,045415B4), ref: 0453F176
          • GetProcAddress.KERNEL32(00000000), ref: 0453F179
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateProcessW,?,?,045415B4), ref: 0453F18A
          • GetProcAddress.KERNEL32(00000000), ref: 0453F18D
          • LoadLibraryW.KERNEL32(wininet.dll,InternetOpenW,?,?,045415B4), ref: 0453F19E
          • GetProcAddress.KERNEL32(00000000), ref: 0453F1A1
          • LoadLibraryW.KERNEL32(wininet.dll,InternetCloseHandle,?,?,045415B4), ref: 0453F1B2
          • GetProcAddress.KERNEL32(00000000), ref: 0453F1B5
          • LoadLibraryW.KERNEL32(wininet.dll,InternetGetConnectedState,?,?,045415B4), ref: 0453F1C6
          • GetProcAddress.KERNEL32(00000000), ref: 0453F1C9
          • LoadLibraryW.KERNEL32(wininet.dll,InternetOpenUrlA,?,?,045415B4), ref: 0453F1DA
          • GetProcAddress.KERNEL32(00000000), ref: 0453F1DD
          • LoadLibraryW.KERNEL32(wininet.dll,InternetOpenUrlW,?,?,045415B4), ref: 0453F1EE
          • GetProcAddress.KERNEL32(00000000), ref: 0453F1F1
          • LoadLibraryW.KERNEL32(wininet.dll,InternetReadFile,?,?,045415B4), ref: 0453F202
          • GetProcAddress.KERNEL32(00000000), ref: 0453F205
          • LoadLibraryW.KERNEL32(user32.dll,mouse_event,?,?,045415B4), ref: 0453F216
          • GetProcAddress.KERNEL32(00000000), ref: 0453F219
          • LoadLibraryW.KERNEL32(user32.dll,keybd_event,?,?,045415B4), ref: 0453F22A
          • GetProcAddress.KERNEL32(00000000), ref: 0453F22D
          • LoadLibraryW.KERNEL32(user32.dll,EnumWindows,?,?,045415B4), ref: 0453F23E
          • GetProcAddress.KERNEL32(00000000), ref: 0453F241
          • LoadLibraryW.KERNEL32(user32.dll,SetCursorPos,?,?,045415B4), ref: 0453F252
          • GetProcAddress.KERNEL32(00000000), ref: 0453F255
          • LoadLibraryW.KERNEL32(user32.dll,WindowFromPoint,?,?,045415B4), ref: 0453F266
          • GetProcAddress.KERNEL32(00000000), ref: 0453F269
          • LoadLibraryW.KERNEL32(user32.dll,SetCapture,?,?,045415B4), ref: 0453F27A
          • GetProcAddress.KERNEL32(00000000), ref: 0453F27D
          • LoadLibraryW.KERNEL32(user32.dll,GetWindowTextW,?,?,045415B4), ref: 0453F28E
          • GetProcAddress.KERNEL32(00000000), ref: 0453F291
          • LoadLibraryW.KERNEL32(user32.dll,IsWindowVisible,?,?,045415B4), ref: 0453F2A2
          • GetProcAddress.KERNEL32(00000000), ref: 0453F2A5
          • LoadLibraryW.KERNEL32(user32.dll,GetWindowThreadProcessId,?,?,045415B4), ref: 0453F2B6
          • GetProcAddress.KERNEL32(00000000), ref: 0453F2B9
          • LoadLibraryW.KERNEL32(user32.dll,ExitWindowsEx,?,?,045415B4), ref: 0453F2CA
          • GetProcAddress.KERNEL32(00000000), ref: 0453F2CD
          • LoadLibraryW.KERNEL32(advapi32.dll,OpenProcessToken,?,?,045415B4), ref: 0453F2DE
          • GetProcAddress.KERNEL32(00000000), ref: 0453F2E1
          • LoadLibraryW.KERNEL32(advapi32.dll,LookupPrivilegeValueW,?,?,045415B4), ref: 0453F2F2
          • GetProcAddress.KERNEL32(00000000), ref: 0453F2F5
          • LoadLibraryW.KERNEL32(advapi32.dll,AdjustTokenPrivileges,?,?,045415B4), ref: 0453F306
          • GetProcAddress.KERNEL32(00000000), ref: 0453F309
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateToolhelp32Snapshot,?,?,045415B4), ref: 0453F31A
          • GetProcAddress.KERNEL32(00000000), ref: 0453F31D
          • LoadLibraryW.KERNEL32(kernel32.dll,Process32FirstW,?,?,045415B4), ref: 0453F32E
          • GetProcAddress.KERNEL32(00000000), ref: 0453F331
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateThread,?,?,045415B4), ref: 0453F342
          • GetProcAddress.KERNEL32(00000000), ref: 0453F345
          • LoadLibraryW.KERNEL32(kernel32.dll,CopyFileW,?,?,045415B4), ref: 0453F356
          • GetProcAddress.KERNEL32(00000000), ref: 0453F359
          • LoadLibraryW.KERNEL32(kernel32.dll,SetFileAttributesW,?,?,045415B4), ref: 0453F36A
          • GetProcAddress.KERNEL32(00000000), ref: 0453F36D
          • LoadLibraryW.KERNEL32(kernel32.dll,WaitForSingleObject,?,?,045415B4), ref: 0453F37E
          • GetProcAddress.KERNEL32(00000000), ref: 0453F381
          • LoadLibraryW.KERNEL32(kernel32.dll,OpenEventW,?,?,045415B4), ref: 0453F392
          • GetProcAddress.KERNEL32(00000000), ref: 0453F395
          • LoadLibraryW.KERNEL32(kernel32.dll,ReadFile,?,?,045415B4), ref: 0453F3A6
          • GetProcAddress.KERNEL32(00000000), ref: 0453F3A9
          • LoadLibraryW.KERNEL32(shell32.dll,ShellExecuteW,?,?,045415B4), ref: 0453F3BA
          • GetProcAddress.KERNEL32(00000000), ref: 0453F3BD
          • LoadLibraryW.KERNEL32(kernel32.dll,TerminateProcess,?,?,045415B4), ref: 0453F3CE
          • GetProcAddress.KERNEL32(00000000), ref: 0453F3D1
          • LoadLibraryW.KERNEL32(kernel32.dll,OpenProcess,?,?,045415B4), ref: 0453F3E2
          • GetProcAddress.KERNEL32(00000000), ref: 0453F3E5
          • LoadLibraryW.KERNEL32(user32.dll,GetAsyncKeyState,?,?,045415B4), ref: 0453F3F6
          • GetProcAddress.KERNEL32(00000000), ref: 0453F3F9
          • LoadLibraryW.KERNEL32(user32.dll,GetKeyState,?,?,045415B4), ref: 0453F40A
          • GetProcAddress.KERNEL32(00000000), ref: 0453F40D
          • LoadLibraryW.KERNEL32(user32.dll,FindWindowW,?,?,045415B4), ref: 0453F41E
          • GetProcAddress.KERNEL32(00000000), ref: 0453F421
          • LoadLibraryW.KERNEL32(user32.dll,PostMessageW,?,?,045415B4), ref: 0453F432
          • GetProcAddress.KERNEL32(00000000), ref: 0453F435
          • LoadLibraryW.KERNEL32(user32.dll,GetMessageW,?,?,045415B4), ref: 0453F446
          • GetProcAddress.KERNEL32(00000000), ref: 0453F449
          • LoadLibraryW.KERNEL32(user32.dll,DispatchMessageW,?,?,045415B4), ref: 0453F45A
          • GetProcAddress.KERNEL32(00000000), ref: 0453F45D
          • LoadLibraryW.KERNEL32(user32.dll,TranslateMessage,?,?,045415B4), ref: 0453F46E
          • GetProcAddress.KERNEL32(00000000), ref: 0453F471
          • LoadLibraryW.KERNEL32(advapi32.dll,RegCloseKey,?,?,045415B4), ref: 0453F482
          • GetProcAddress.KERNEL32(00000000), ref: 0453F485
          • LoadLibraryW.KERNEL32(advapi32.dll,RegCreateKeyW,?,?,045415B4), ref: 0453F496
          • GetProcAddress.KERNEL32(00000000), ref: 0453F499
          • LoadLibraryW.KERNEL32(advapi32.dll,RegOpenKeyW,?,?,045415B4), ref: 0453F4AA
          • GetProcAddress.KERNEL32(00000000), ref: 0453F4AD
          • LoadLibraryW.KERNEL32(advapi32.dll,RegOpenKeyExW,?,?,045415B4), ref: 0453F4BE
          • GetProcAddress.KERNEL32(00000000), ref: 0453F4C1
          • LoadLibraryW.KERNEL32(advapi32.dll,RegQueryValueExA,?,?,045415B4), ref: 0453F4D2
          • GetProcAddress.KERNEL32(00000000), ref: 0453F4D5
          • LoadLibraryW.KERNEL32(advapi32.dll,RegQueryValueW,?,?,045415B4), ref: 0453F4E6
          • GetProcAddress.KERNEL32(00000000), ref: 0453F4E9
          • LoadLibraryW.KERNEL32(advapi32.dll,RegSetValueW,?,?,045415B4), ref: 0453F4FA
          • GetProcAddress.KERNEL32(00000000), ref: 0453F4FD
          • LoadLibraryW.KERNEL32(advapi32.dll,RegSetValueExW,?,?,045415B4), ref: 0453F50E
          • GetProcAddress.KERNEL32(00000000), ref: 0453F511
          • LoadLibraryW.KERNEL32(advapi32.dll,SetServiceStatus,?,?,045415B4), ref: 0453F522
          • GetProcAddress.KERNEL32(00000000), ref: 0453F525
          • LoadLibraryW.KERNEL32(advapi32.dll,RegisterServiceCtrlHandlerW,?,?,045415B4), ref: 0453F536
          • GetProcAddress.KERNEL32(00000000), ref: 0453F539
          • LoadLibraryW.KERNEL32(advapi32.dll,QueryServiceStatus,?,?,045415B4), ref: 0453F54A
          • GetProcAddress.KERNEL32(00000000), ref: 0453F54D
          • LoadLibraryW.KERNEL32(advapi32.dll,DeleteService,?,?,045415B4), ref: 0453F55E
          • GetProcAddress.KERNEL32(00000000), ref: 0453F561
          • LoadLibraryW.KERNEL32(advapi32.dll,RegCreateKeyExW,?,?,045415B4), ref: 0453F572
          • GetProcAddress.KERNEL32(00000000), ref: 0453F575
          • LoadLibraryW.KERNEL32(kernel32.dll,Process32NextW,?,?,045415B4), ref: 0453F586
          • GetProcAddress.KERNEL32(00000000), ref: 0453F589
          • LoadLibraryW.KERNEL32(advapi32.dll,RegEnumValueW,?,?,045415B4), ref: 0453F59A
          • GetProcAddress.KERNEL32(00000000), ref: 0453F59D
          • LoadLibraryW.KERNEL32(advapi32.dll,RegDeleteKeyW,?,?,045415B4), ref: 0453F5AE
          • GetProcAddress.KERNEL32(00000000), ref: 0453F5B1
          • LoadLibraryW.KERNEL32(advapi32.dll,RegDeleteValueW,?,?,045415B4), ref: 0453F5C2
          • GetProcAddress.KERNEL32(00000000), ref: 0453F5C5
          • LoadLibraryW.KERNEL32(advapi32.dll,RegEnumKeyExW,?,?,045415B4), ref: 0453F5D6
          • GetProcAddress.KERNEL32(00000000), ref: 0453F5D9
          • LoadLibraryW.KERNEL32(advapi32.dll,SetNamedSecurityInfoW,?,?,045415B4), ref: 0453F5EA
          • GetProcAddress.KERNEL32(00000000), ref: 0453F5ED
          • LoadLibraryW.KERNEL32(advapi32.dll,BuildExplicitAccessWithNameW,?,?,045415B4), ref: 0453F5FE
          • GetProcAddress.KERNEL32(00000000), ref: 0453F601
          • LoadLibraryW.KERNEL32(advapi32.dll,GetNamedSecurityInfoW,?,?,045415B4), ref: 0453F612
          • GetProcAddress.KERNEL32(00000000), ref: 0453F615
          • LoadLibraryW.KERNEL32(advapi32.dll,SetEntriesInAclW,?,?,045415B4), ref: 0453F626
          • GetProcAddress.KERNEL32(00000000), ref: 0453F629
          • LoadLibraryW.KERNEL32(advapi32.dll,ClearEventLogW,?,?,045415B4), ref: 0453F63A
          • GetProcAddress.KERNEL32(00000000), ref: 0453F63D
          • LoadLibraryW.KERNEL32(advapi32.dll,OpenEventLogW,?,?,045415B4), ref: 0453F64E
          • GetProcAddress.KERNEL32(00000000), ref: 0453F651
          • LoadLibraryW.KERNEL32(advapi32.dll,CloseEventLog,?,?,045415B4), ref: 0453F662
          • GetProcAddress.KERNEL32(00000000), ref: 0453F665
          • LoadLibraryW.KERNEL32(advapi32.dll,FreeSid,?,?,045415B4), ref: 0453F676
          • GetProcAddress.KERNEL32(00000000), ref: 0453F679
          • LoadLibraryW.KERNEL32(advapi32.dll,LookupAccountSidW,?,?,045415B4), ref: 0453F68A
          • GetProcAddress.KERNEL32(00000000), ref: 0453F68D
          • LoadLibraryW.KERNEL32(advapi32.dll,GetTokenInformationW,?,?,045415B4), ref: 0453F69E
          • GetProcAddress.KERNEL32(00000000), ref: 0453F6A1
          • LoadLibraryW.KERNELBASE(psapi.dll,EnumProcessModules,?,?,045415B4), ref: 0453F6B2
          • GetProcAddress.KERNEL32(00000000), ref: 0453F6B5
          • LoadLibraryW.KERNEL32(psapi.dll,GetModuleFileNameExW,?,?,045415B4), ref: 0453F6C6
          • GetProcAddress.KERNEL32(00000000), ref: 0453F6C9
          • LoadLibraryW.KERNEL32(shell32.dll,SHGetFileInfoA,?,?,045415B4), ref: 0453F6DA
          • GetProcAddress.KERNEL32(00000000), ref: 0453F6DD
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: LibraryLoad$AddressProc$InitializeThunk
          • String ID: AdjustTokenPrivileges$BitBlt$BlockInput$BuildExplicitAccessWithNameW$ChangeServiceConfigW$CharNextW$ClearEventLogW$CloseClipboard$CloseDesktop$CloseEventLog$CloseHandle$CloseServiceHandle$ControlService$CopyFileW$CreateCompatibleBitmap$CreateCompatibleDC$CreateDIBSection$CreateDirectoryW$CreateFileMappingW$CreateFileW$CreateMutexA$CreateProcessW$CreateThread$CreateToolhelp32Snapshot$DeleteCriticalSection$DeleteDC$DeleteFileW$DeleteObject$DeleteService$DeviceIoControl$DispatchMessageW$EmptyClipboard$EnterCriticalSection$EnumProcessModules$EnumWindows$ExitWindowsEx$FindClose$FindFirstFileW$FindNextFileW$FindWindowW$FreeSid$GetAsyncKeyState$GetClipboardData$GetCurrentThreadId$GetDIBits$GetDiskFreeSpaceExA$GetDriveTypeA$GetFileAttributesW$GetForegroundWindow$GetInputState$GetKeyState$GetLastError$GetLogicalDriveStringsA$GetMessageW$GetModuleFileNameExW$GetModuleFileNameW$GetNamedSecurityInfoW$GetSystemDirectoryW$GetSystemInfo$GetSystemMetrics$GetTempPathW$GetTokenInformationW$GetUserObjectInformationW$GetVersionExW$GetVolumeInformationA$GetWindowTextW$GetWindowThreadProcessId$GlobalMemoryStatus$InitializeCriticalSection$InterlockedExchange$InternetCloseHandle$InternetGetConnectedState$InternetOpenUrlA$InternetOpenUrlW$InternetOpenW$InternetQueryOptionA$InternetReadFile$IsWindowVisible$LeaveCriticalSection$LookupAccountSidW$LookupPrivilegeValueW$MapViewOfFile$MoveFileW$OpenClipboard$OpenDesktopW$OpenEventLogW$OpenEventW$OpenProcess$OpenProcessToken$OpenSCManagerW$OpenServiceW$OutputDebugStringA$PostMessageW$PostThreadMessageW$Process32FirstW$Process32NextW$QueryServiceStatus$ReadFile$RegCloseKey$RegCreateKeyExW$RegCreateKeyW$RegDeleteKeyW$RegDeleteValueW$RegEnumKeyExW$RegEnumValueW$RegOpenKeyExW$RegOpenKeyW$RegQueryValueExA$RegQueryValueW$RegSetValueExW$RegSetValueW$RegisterServiceCtrlHandlerW$ReleaseMutex$RemoveDirectoryW$SHGetFileInfoA$SelectObject$SendMessageW$SetCapture$SetClipboardData$SetCursorPos$SetEntriesInAclW$SetFileAttributesW$SetFilePointer$SetNamedSecurityInfoW$SetServiceStatus$ShellExecuteW$Sleep$StartServiceW$SystemParametersInfoW$TerminateProcess$TerminateThread$TranslateMessage$USER32.dll$UnmapViewOfFile$VirtualAlloc$VirtualFree$WaitForSingleObject$WinExec$WindowFromPoint$WriteFile$advapi32.dll$avicap32.dll$capCreateCaptureWindowW$capGetDriverDescriptionW$gdi32.dll$kernel32.dll$kernel32.dll$keybd_event$mouse_event$psapi.dll$shell32.dll$user32.dll$wininet.dll$wininet.dll$wsprintfW
          • API String ID: 227929070-3174654482
          • Opcode ID: be0f6cdd73e787d38914da70fcaaef04a4c43ae9adffbde9b77914c7fd7d49c9
          • Instruction ID: 521eb5822bc08067e3a323642b3674a07659640ecaf19a90b5b5fef702034e28
          • Opcode Fuzzy Hash: be0f6cdd73e787d38914da70fcaaef04a4c43ae9adffbde9b77914c7fd7d49c9
          • Instruction Fuzzy Hash: 54326FA8E80B9877CF21BBB25D0ED4B2F58F9D1A5A3054956F1049B100DEBDB805FFA4

          Control-flow Graph

          APIs
          • VirtualQuery.KERNEL32(delloader,00000000,0000001C), ref: 04541523
          • VirtualProtect.KERNELBASE(00000000,?,00000020,?), ref: 0454153B
          • GetModuleHandleA.KERNEL32(kernel32.dll,HeapDestroy), ref: 0454154F
          • GetProcAddress.KERNEL32(00000000), ref: 04541556
          • VirtualProtect.KERNELBASE(00000000,00000003,00000040,?), ref: 0454156A
          • FreeLibrary.KERNELBASE(?), ref: 0454157E
          • VirtualProtect.KERNELBASE(00000000,?,00000040,?), ref: 04541599
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: Virtual$Protect$AddressFreeHandleLibraryModuleProcQuery
          • String ID: HeapDestroy$kernel32.dll
          • API String ID: 1044237551-3302499733
          • Opcode ID: e45379331f5ef4966778066fc29bbf365835edbd7ae0b79bebda41c61f343914
          • Instruction ID: e69677f33a6d2c60839c1b367f4679076b5246f0272276970ff8d599839f20f1
          • Opcode Fuzzy Hash: e45379331f5ef4966778066fc29bbf365835edbd7ae0b79bebda41c61f343914
          • Instruction Fuzzy Hash: D8110772900218BFDF01DBE4DC45EEEBBB9FB48716F104052F605B7250D2B5AA099B64

          Control-flow Graph

          APIs
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(kernel32.dll,OutputDebugStringA,?,?,045415B4), ref: 0453EBA2
            • Part of subcall function 0453EB90: LdrInitializeThunk.NTDLL(00000000), ref: 0453EBAB
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatus,?,?,045415B4), ref: 0453EBBC
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EBBF
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(kernel32.dll,DeviceIoControl,?,?,045415B4), ref: 0453EBD0
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EBD3
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(kernel32.dll,GetSystemInfo,?,?,045415B4), ref: 0453EBE4
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EBE7
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(kernel32.dll,GetVersionExW,?,?,045415B4), ref: 0453EBF8
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EBFB
            • Part of subcall function 0453EB90: LoadLibraryA.KERNELBASE(wininet.dll,InternetQueryOptionA,?,?,045415B4), ref: 0453EC0C
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EC0F
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(USER32.dll,PostThreadMessageW,?,?,045415B4), ref: 0453EC20
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EC23
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(USER32.dll,GetInputState,?,?,045415B4), ref: 0453EC34
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EC37
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(USER32.dll,OpenDesktopW,?,?,045415B4), ref: 0453EC48
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EC4B
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(USER32.dll,GetUserObjectInformationW,?,?,045415B4), ref: 0453EC5C
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EC5F
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(USER32.dll,CloseDesktop,?,?,045415B4), ref: 0453EC70
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EC73
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(USER32.dll,wsprintfW,?,?,045415B4), ref: 0453EC84
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EC87
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(USER32.dll,CharNextW,?,?,045415B4), ref: 0453EC98
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EC9B
            • Part of subcall function 0453EB90: LoadLibraryW.KERNEL32(gdi32.dll,CreateCompatibleBitmap,?,?,045415B4), ref: 0453ECB2
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453ECB5
            • Part of subcall function 0453EB90: LoadLibraryW.KERNEL32(gdi32.dll,GetDIBits,?,?,045415B4), ref: 0453ECC6
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453ECC9
            • Part of subcall function 0453EB90: LoadLibraryW.KERNEL32(gdi32.dll,BitBlt,?,?,045415B4), ref: 0453ECDA
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453ECDD
          • CreateThread.KERNELBASE(00000000,00000000,04541026,00000000,00000000,00000000), ref: 045415C0
            • Part of subcall function 04541501: VirtualQuery.KERNEL32(delloader,00000000,0000001C), ref: 04541523
            • Part of subcall function 04541501: VirtualProtect.KERNELBASE(00000000,?,00000020,?), ref: 0454153B
            • Part of subcall function 04541501: GetModuleHandleA.KERNEL32(kernel32.dll,HeapDestroy), ref: 0454154F
            • Part of subcall function 04541501: GetProcAddress.KERNEL32(00000000), ref: 04541556
            • Part of subcall function 04541501: VirtualProtect.KERNELBASE(00000000,00000003,00000040,?), ref: 0454156A
            • Part of subcall function 04541501: FreeLibrary.KERNELBASE(?), ref: 0454157E
            • Part of subcall function 04541501: VirtualProtect.KERNELBASE(00000000,?,00000040,?), ref: 04541599
          • GetWindowsDirectoryA.KERNEL32(?,?), ref: 045415F4
          • DeleteFileA.KERNELBASE(?), ref: 04541616
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: Library$AddressLoadProc$Virtual$Protect$CreateDeleteDirectoryFileFreeHandleInitializeModuleQueryThreadThunkWindows
          • String ID: \up.bak
          • API String ID: 651909140-1981547893
          • Opcode ID: 59a4c5835b5af5ad352b5f31d33b8a5bc6bdd192855b12f3291fb9624ee9ef6b
          • Instruction ID: 885ea45469ef060c54e50096e7bf75b5c8c041f929d756a8fb8a3db1de8c1e75
          • Opcode Fuzzy Hash: 59a4c5835b5af5ad352b5f31d33b8a5bc6bdd192855b12f3291fb9624ee9ef6b
          • Instruction Fuzzy Hash: CA01A9B550051CAFE7949B78DC86ADB3BFCFB44355F0004A1F605E6180DA749E485AB0

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 88 4541026 89 454102b-45410b3 call 45476a4 call 4547600 call 453eb90 GetInputState GetCurrentThreadId PostThreadMessageW GetMessageW call 4540ff1 LoadLibraryW GetProcAddress * 3 88->89 99 45410b5 89->99 100 45410ba-45410f1 Sleep GetTickCount wsprintfW strstr 89->100 99->100 101 4541122-4541151 SetErrorMode call 453b780 call 453e3d0 100->101 102 45410f3-4541101 call 4540f2c 100->102 113 4541154-4541157 101->113 107 4541110-454111f call 45416e0 102->107 108 4541103-454110e WinExec 102->108 107->101 108->101 114 45411b5-45411c2 113->114 115 4541159-4541169 atoi 113->115 117 45411c4-45411c6 114->117 118 45411e1-45411e8 114->118 116 454116b-45411b3 sprintf OutputDebugStringA Sleep 115->116 116->114 116->116 121 45411c8-45411d9 Sleep 117->121 122 45411db 117->122 119 4541207-4541218 118->119 120 45411ea-45411ec 118->120 125 454129e-45412a1 119->125 126 454121e-454126b GetLocalTime sprintf 119->126 123 4541201 120->123 124 45411ee-45411ff Sleep 120->124 121->121 121->122 122->118 123->119 124->123 124->124 127 45412a3-45412a7 125->127 128 45412f9-4541341 atoi * 3 GetTickCount call 453bf20 125->128 129 454126d-4541273 126->129 127->128 130 45412a9 127->130 142 4541343-454135d call 453bf20 128->142 143 454138e 128->143 131 4541275-4541277 129->131 132 454128f-4541291 129->132 134 45412ab-45412c2 OpenEventW 130->134 135 4541279-4541281 131->135 136 454128b-454128d 131->136 138 4541294-4541296 132->138 139 45412c4-45412d3 Sleep 134->139 140 45412e7-45412f3 call 453c3d0 CloseHandle 134->140 135->132 141 4541283-4541289 135->141 136->138 144 45412d7-45412e2 Sleep 138->144 145 4541298-454129c 138->145 139->134 146 45412d5 139->146 140->128 141->129 141->136 154 454135f-4541379 call 453bf20 142->154 155 4541389-454138c 142->155 147 4541391-4541443 sprintf call 4540e7e call 4540e40 call 4547870 GetTickCount call 4540ac0 call 453e400 call 453c680 143->147 144->113 145->125 146->128 171 4541445-4541452 call 453ea00 147->171 160 4541384-4541387 154->160 161 454137b-454137f 154->161 155->147 160->147 161->113 174 4541454-4541463 Sleep 171->174 175 4541465-4541472 call 453ea00 171->175 174->171 174->175 175->113 178 4541478 GetTickCount 175->178 179 454147e-45414ad OpenEventW WaitForSingleObject Sleep 178->179 180 45414af-45414b1 179->180 181 45414b8-45414fe call 453c3d0 CloseHandle SetErrorMode call 453e450 call 453b880 179->181 180->179 183 45414b3 180->183 183->113
          APIs
          • __EH_prolog.LIBCMT ref: 0454102B
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(kernel32.dll,OutputDebugStringA,?,?,045415B4), ref: 0453EBA2
            • Part of subcall function 0453EB90: LdrInitializeThunk.NTDLL(00000000), ref: 0453EBAB
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatus,?,?,045415B4), ref: 0453EBBC
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EBBF
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(kernel32.dll,DeviceIoControl,?,?,045415B4), ref: 0453EBD0
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EBD3
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(kernel32.dll,GetSystemInfo,?,?,045415B4), ref: 0453EBE4
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EBE7
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(kernel32.dll,GetVersionExW,?,?,045415B4), ref: 0453EBF8
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EBFB
            • Part of subcall function 0453EB90: LoadLibraryA.KERNELBASE(wininet.dll,InternetQueryOptionA,?,?,045415B4), ref: 0453EC0C
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EC0F
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(USER32.dll,PostThreadMessageW,?,?,045415B4), ref: 0453EC20
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EC23
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(USER32.dll,GetInputState,?,?,045415B4), ref: 0453EC34
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EC37
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(USER32.dll,OpenDesktopW,?,?,045415B4), ref: 0453EC48
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EC4B
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(USER32.dll,GetUserObjectInformationW,?,?,045415B4), ref: 0453EC5C
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EC5F
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(USER32.dll,CloseDesktop,?,?,045415B4), ref: 0453EC70
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EC73
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(USER32.dll,wsprintfW,?,?,045415B4), ref: 0453EC84
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EC87
            • Part of subcall function 0453EB90: LoadLibraryA.KERNEL32(USER32.dll,CharNextW,?,?,045415B4), ref: 0453EC98
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453EC9B
            • Part of subcall function 0453EB90: LoadLibraryW.KERNEL32(gdi32.dll,CreateCompatibleBitmap,?,?,045415B4), ref: 0453ECB2
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453ECB5
            • Part of subcall function 0453EB90: LoadLibraryW.KERNEL32(gdi32.dll,GetDIBits,?,?,045415B4), ref: 0453ECC6
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453ECC9
            • Part of subcall function 0453EB90: LoadLibraryW.KERNEL32(gdi32.dll,BitBlt,?,?,045415B4), ref: 0453ECDA
            • Part of subcall function 0453EB90: GetProcAddress.KERNEL32(00000000), ref: 0453ECDD
          • GetInputState.USER32 ref: 04541046
          • GetCurrentThreadId.KERNEL32 ref: 04541051
          • PostThreadMessageW.USER32(00000000), ref: 04541058
          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 04541068
            • Part of subcall function 04540FF1: CreateMutexA.KERNEL32(00000000,00000001,UpdateWindow,?,04541073), ref: 04540FFB
            • Part of subcall function 04540FF1: GetLastError.KERNEL32(?,04541073), ref: 04541003
            • Part of subcall function 04540FF1: ReleaseMutex.KERNEL32(00000000,?,04541073), ref: 04541016
            • Part of subcall function 04540FF1: ExitProcess.KERNEL32 ref: 0454101E
          • LoadLibraryW.KERNEL32(user32.dll), ref: 04541078
          • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 0454108C
          • GetProcAddress.KERNEL32(00000000,OpenWindowStationW), ref: 04541096
          • GetProcAddress.KERNEL32(00000000,SetProcessWindowStation), ref: 045410AE
          • Sleep.KERNEL32(00000032), ref: 045410BC
          • GetTickCount.KERNEL32 ref: 045410C2
          • wsprintfW.USER32 ref: 045410D5
          • strstr.MSVCRT ref: 045410E6
          • WinExec.KERNEL32(c:\windows\httpd.exe,00000000), ref: 04541108
          • SetErrorMode.KERNEL32(00000001), ref: 04541124
          • atoi.MSVCRT(?), ref: 0454115F
          • sprintf.MSVCRT ref: 0454118E
          • OutputDebugStringA.KERNEL32(?), ref: 0454119E
          • Sleep.KERNEL32(000003E8), ref: 045411A9
          • Sleep.KERNEL32(000003E8), ref: 045411CD
          • Sleep.KERNEL32(000003E8), ref: 045411F3
            • Part of subcall function 045416E0: CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?,?,?,0454133F), ref: 04541704
            • Part of subcall function 045416E0: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,00000000), ref: 0454173D
            • Part of subcall function 045416E0: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 04541748
          • GetLocalTime.KERNEL32(?), ref: 04541236
          • sprintf.MSVCRT ref: 0454125C
          • OpenEventW.KERNEL32(001F0003,00000000,?), ref: 045412B8
          • Sleep.KERNEL32(0000001E), ref: 045412C6
          • Sleep.KERNEL32(000003E8), ref: 045412DC
          • CloseHandle.KERNEL32(00000000), ref: 045412F3
          • atoi.MSVCRT(443,?), ref: 04541304
          • atoi.MSVCRT ref: 04541310
          • atoi.MSVCRT ref: 0454131C
          • GetTickCount.KERNEL32 ref: 04541322
          • sprintf.MSVCRT ref: 045413A8
          • GetTickCount.KERNEL32 ref: 045413E1
            • Part of subcall function 04540AC0: GetVersionExW.KERNEL32 ref: 04540AEE
            • Part of subcall function 04540AC0: getsockname.WS2_32(?), ref: 04540B5F
            • Part of subcall function 04540AC0: GetVersionExW.KERNEL32(?), ref: 04540BA0
            • Part of subcall function 04540AC0: lstrcpyW.KERNEL32(?,04538D54), ref: 04540BD0
            • Part of subcall function 04540AC0: GlobalMemoryStatus.KERNEL32 ref: 04540C63
            • Part of subcall function 04540AC0: GetTickCount.KERNEL32 ref: 04540C77
            • Part of subcall function 0453E400: lstrcpyW.KERNEL32(?,?,04549970,04541431,?,?,?,?,?), ref: 0453E410
          • Sleep.KERNEL32(000003E8,?,?,?,?,?,?), ref: 04541459
          • GetTickCount.KERNEL32 ref: 04541478
          • OpenEventW.KERNEL32(001F0003,00000000,?), ref: 0454148B
          • WaitForSingleObject.KERNEL32(?,00000064), ref: 04541498
          • Sleep.KERNEL32(000001F4), ref: 045414A5
          • CloseHandle.KERNEL32(00000000), ref: 045414C4
          • SetErrorMode.KERNEL32(00000000), ref: 045414CB
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$LibraryLoad$Sleep$CountTick$atoi$CloseErrorEventHandlesprintf$CreateMessageModeMutexObjectOpenSingleThreadVersionWaitlstrcpy$CurrentDebugExecExitGlobalH_prologInitializeInputLastLocalMemoryOutputPostProcessReleaseStateStatusStringThunkTimegetsocknamestrstrwsprintf
          • String ID: %d:%d:%d:%d$443$443$443$GetProcessWindowStation$Global\X %d$OpenWindowStationW$SetProcessWindowStation$c:\windows\httpd.exe$c:\windows\httpd.exe$connected: %s:%d$http://$safebrow$safebrow.flnet.org$safebrow.flnet.org$safebrow.flnet.org$time=%d$user32.dll$winsta0
          • API String ID: 3353853401-2481499505
          • Opcode ID: 616d5a100b991b124a732ffb9468cbdd0c48d70227ecee41b8ca8f22e9acad49
          • Instruction ID: 11631b1efa847048ba6bc332d9b34abd389880ab3488361f487dc912cb12d4ad
          • Opcode Fuzzy Hash: 616d5a100b991b124a732ffb9468cbdd0c48d70227ecee41b8ca8f22e9acad49
          • Instruction Fuzzy Hash: 9DD1C475900619AFDB11ABB4DC49AEE7BB9FF88309F000465F509EB141DB356E88FB60

          Control-flow Graph

          APIs
          • LoadLibraryW.KERNEL32 ref: 045417D0
          • LoadLibraryW.KERNEL32(?,?), ref: 0454182B
          • GetProcAddress.KERNEL32(00000000), ref: 04541834
          • LoadLibraryW.KERNEL32(00000032,04549100), ref: 0454188B
          • GetProcAddress.KERNEL32(00000000), ref: 0454188E
          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 04541897
          • lstrcmpiW.KERNEL32(?,?), ref: 045418C3
          • CloseHandle.KERNEL32(00000000), ref: 045418DA
          • CloseHandle.KERNEL32(00000000), ref: 045418F3
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: LibraryLoad$AddressCloseHandleProc$CreateSnapshotToolhelp32lstrcmpi
          • String ID: .$2$2$2$3$3$3$F$N$P$P$W$W$c$c$d$e$e$e$i$k$n$o$o$r$r$r$r$t$t$x
          • API String ID: 3120855396-1187982173
          • Opcode ID: 2ec65c6b25c6dd19cc9bc07bc080bdc99c39b14f9da2c47579a0919a4fa8a0ad
          • Instruction ID: 154a99b99d6c837ac9c87928af438232f66650282f76928df50175a27a910e81
          • Opcode Fuzzy Hash: 2ec65c6b25c6dd19cc9bc07bc080bdc99c39b14f9da2c47579a0919a4fa8a0ad
          • Instruction Fuzzy Hash: 6D413B2041C7C099E311DB699888B5FBFE9AFD6308F44195DF4C897252D3BA960CC76B

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 255 45413d8 256 45413da-4541443 GetTickCount call 4540ac0 call 453e400 call 453c680 255->256 263 4541445-4541452 call 453ea00 256->263 266 4541454-4541463 Sleep 263->266 267 4541465-4541472 call 453ea00 263->267 266->263 266->267 270 4541154-4541157 267->270 271 4541478 GetTickCount 267->271 272 45411b5-45411c2 270->272 273 4541159-4541169 atoi 270->273 274 454147e-45414ad OpenEventW WaitForSingleObject Sleep 271->274 278 45411c4-45411c6 272->278 279 45411e1-45411e8 272->279 275 454116b-45411b3 sprintf OutputDebugStringA Sleep 273->275 276 45414af-45414b1 274->276 277 45414b8-45414fe call 453c3d0 CloseHandle SetErrorMode call 453e450 call 453b880 274->277 275->272 275->275 276->274 283 45414b3 276->283 284 45411c8-45411d9 Sleep 278->284 285 45411db 278->285 281 4541207-4541218 279->281 282 45411ea-45411ec 279->282 289 454129e-45412a1 281->289 290 454121e-454126b GetLocalTime sprintf 281->290 287 4541201 282->287 288 45411ee-45411ff Sleep 282->288 283->270 284->284 284->285 285->279 287->281 288->287 288->288 291 45412a3-45412a7 289->291 292 45412f9-4541341 atoi * 3 GetTickCount call 453bf20 289->292 294 454126d-4541273 290->294 291->292 295 45412a9 291->295 310 4541343-454135d call 453bf20 292->310 311 454138e 292->311 297 4541275-4541277 294->297 298 454128f-4541291 294->298 300 45412ab-45412c2 OpenEventW 295->300 302 4541279-4541281 297->302 303 454128b-454128d 297->303 305 4541294-4541296 298->305 306 45412c4-45412d3 Sleep 300->306 307 45412e7-45412f3 call 453c3d0 CloseHandle 300->307 302->298 309 4541283-4541289 302->309 303->305 312 45412d7-45412e2 Sleep 305->312 313 4541298-454129c 305->313 306->300 314 45412d5 306->314 307->292 309->294 309->303 322 454135f-4541379 call 453bf20 310->322 323 4541389-454138c 310->323 315 4541391-45413d0 sprintf call 4540e7e call 4540e40 call 4547870 311->315 312->270 313->289 314->292 315->256 328 4541384-4541387 322->328 329 454137b-454137f 322->329 323->315 328->315 329->270
          APIs
          • atoi.MSVCRT(?), ref: 0454115F
          • sprintf.MSVCRT ref: 0454118E
          • OutputDebugStringA.KERNEL32(?), ref: 0454119E
          • Sleep.KERNEL32(000003E8), ref: 045411A9
          • Sleep.KERNEL32(000003E8), ref: 045411CD
          • Sleep.KERNEL32(000003E8), ref: 045411F3
          • GetLocalTime.KERNEL32(?), ref: 04541236
          • GetTickCount.KERNEL32 ref: 045413E1
            • Part of subcall function 04540AC0: GetVersionExW.KERNEL32 ref: 04540AEE
            • Part of subcall function 04540AC0: getsockname.WS2_32(?), ref: 04540B5F
            • Part of subcall function 04540AC0: GetVersionExW.KERNEL32(?), ref: 04540BA0
            • Part of subcall function 04540AC0: lstrcpyW.KERNEL32(?,04538D54), ref: 04540BD0
            • Part of subcall function 04540AC0: GlobalMemoryStatus.KERNEL32 ref: 04540C63
            • Part of subcall function 04540AC0: GetTickCount.KERNEL32 ref: 04540C77
            • Part of subcall function 0453E400: lstrcpyW.KERNEL32(?,?,04549970,04541431,?,?,?,?,?), ref: 0453E410
          • Sleep.KERNEL32(000003E8,?,?,?,?,?,?), ref: 04541459
          • GetTickCount.KERNEL32 ref: 04541478
          • OpenEventW.KERNEL32(001F0003,00000000,?), ref: 0454148B
          • WaitForSingleObject.KERNEL32(?,00000064), ref: 04541498
          • Sleep.KERNEL32(000001F4), ref: 045414A5
          • CloseHandle.KERNEL32(00000000), ref: 045414C4
          • SetErrorMode.KERNEL32(00000000), ref: 045414CB
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: Sleep$CountTick$Versionlstrcpy$CloseDebugErrorEventGlobalHandleLocalMemoryModeObjectOpenOutputSingleStatusStringTimeWaitatoigetsocknamesprintf
          • String ID: %d:%d:%d:%d$443$443$443$safebrow$safebrow.flnet.org$safebrow.flnet.org$safebrow.flnet.org$time=%d
          • API String ID: 206305499-2868102726
          • Opcode ID: ffd23c07203b38b96f78b392605ab64cdabb2f0df927ffeb5eb23c91b84ce656
          • Instruction ID: a458ea06426f71bb5be41f8236ef2dbddb54a32c826c800b6fc0690eb38bf4b1
          • Opcode Fuzzy Hash: ffd23c07203b38b96f78b392605ab64cdabb2f0df927ffeb5eb23c91b84ce656
          • Instruction Fuzzy Hash: 3481C571D00669ABDF21AFA4EC486ED77F9FB88309F000465F549EB140DB356989FB50

          Control-flow Graph

          APIs
          • GetVersionExW.KERNEL32 ref: 04540AEE
            • Part of subcall function 04540A70: gethostname.WS2_32(00000000,00000032), ref: 04540A8F
            • Part of subcall function 04540A70: MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000032,?,00000032), ref: 04540AA7
            • Part of subcall function 04540A70: lstrlenW.KERNEL32(?), ref: 04540AAE
          • getsockname.WS2_32(?), ref: 04540B5F
            • Part of subcall function 04540630: LoadLibraryW.KERNEL32(ADVAPI32.dll,?,?,?,0000011C,?,?,?,?,04549970,?,00000000), ref: 04540649
            • Part of subcall function 04540630: GetProcAddress.KERNEL32(00000000,RegQueryValueExW), ref: 0454065D
            • Part of subcall function 04540630: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 04540667
            • Part of subcall function 04540630: GetProcAddress.KERNEL32(00000000,RegOpenKeyW), ref: 04540671
            • Part of subcall function 04540630: FreeLibrary.KERNEL32(00000000,?,?,?,?,04549970,?,00000000), ref: 045406AD
          • GetVersionExW.KERNEL32(?), ref: 04540BA0
          • lstrcpyW.KERNEL32(?,04538D54), ref: 04540BD0
          • GetSystemInfo.KERNEL32(?), ref: 04540BD9
          • wsprintfW.USER32 ref: 04540BF1
          • GlobalMemoryStatus.KERNEL32 ref: 04540C63
          • GetTickCount.KERNEL32 ref: 04540C77
          • wsprintfW.USER32 ref: 04540C95
          • wsprintfW.USER32 ref: 04540CB5
          • wsprintfW.USER32 ref: 04540CDA
          • wsprintfW.USER32 ref: 04540D05
          • lstrcpyW.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 04540D1C
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 04540D58
          • mbstowcs.MSVCRT ref: 04540D99
          • lstrcpyW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 04540DC0
          • mbstowcs.MSVCRT ref: 04540DF3
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: wsprintf$AddressProclstrcpy$LibraryVersionlstrlenmbstowcs$ByteCharCountFreeGlobalInfoLoadMemoryMultiStatusSystemTickWidegethostnamegetsockname
          • String ID: $f
          • API String ID: 3780208771-2452994617
          • Opcode ID: d32ee6e323f2c70a028d73cd7b15f2f5b3b54e5713c0a6234e9a5a3fb550ec25
          • Instruction ID: aaf23b3f28d592399c5dab1c6669e257e8e800d86a7833cacb17a094d542d7c7
          • Opcode Fuzzy Hash: d32ee6e323f2c70a028d73cd7b15f2f5b3b54e5713c0a6234e9a5a3fb550ec25
          • Instruction Fuzzy Hash: 6B814FB5508385ABE334DB64C844AEBB7E9FFC8708F004D1DF68997240DB75A908DB62

          Control-flow Graph

          APIs
          • LoadLibraryW.KERNEL32(kernel32.dll,GetVolumeInformationA), ref: 0453CDBE
          • GetProcAddress.KERNEL32(00000000), ref: 0453CDC7
          • LoadLibraryW.KERNEL32(kernel32.dll,GetLogicalDriveStringsA), ref: 0453CDD7
          • GetProcAddress.KERNEL32(00000000), ref: 0453CDDA
          • LoadLibraryW.KERNEL32(kernel32.dll,GetDriveTypeA), ref: 0453CDE8
          • GetProcAddress.KERNEL32(00000000), ref: 0453CDEB
          • LoadLibraryW.KERNEL32(kernel32.dll,lstrlenA), ref: 0453CDFB
          • GetProcAddress.KERNEL32(00000000), ref: 0453CDFE
          • SHGetFileInfo.SHELL32(?,00000080,?,000002DC,00000410), ref: 0453CE8B
          • GetDiskFreeSpaceExA.KERNEL32(00000001,?,?,00000000), ref: 0453CEC6
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: AddressLibraryLoadProc$DiskFileFreeInfoSpace
          • String ID: GetDriveTypeA$GetLogicalDriveStringsA$GetVolumeInformationA$g$kernel32.dll$lstrlenA
          • API String ID: 2694536233-2593926017
          • Opcode ID: 53967c13dce6179372caa5a16382b4b99416df5fcf02c712afca449cec3386c0
          • Instruction ID: 6e2f8961e638520bcf2505a49b9725310ab23f1eac9197c82053350b5a10edae
          • Opcode Fuzzy Hash: 53967c13dce6179372caa5a16382b4b99416df5fcf02c712afca449cec3386c0
          • Instruction Fuzzy Hash: AC5117715083499FD715DF64C844AAFBBE9FFC8704F44492DF989A7200CB74AA09DBA2
          APIs
          • lstrlenW.KERNEL32(?,?,?,?), ref: 0453D5A8
          • wsprintfW.USER32 ref: 0453D5DC
          • FindFirstFileW.KERNEL32(?,?), ref: 0453D5F2
          • wsprintfW.USER32 ref: 0453D632
          • wsprintfW.USER32 ref: 0453D657
          • wcslen.MSVCRT ref: 0453D679
          • ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z.MSVCP60(00000000,00000001), ref: 0453D68B
          • ??2@YAPAXI@Z.MSVCRT(00000018), ref: 0453D6C6
          • ??3@YAXPAX@Z.MSVCRT(?), ref: 0453D723
          • FindNextFileW.KERNEL32(?,?), ref: 0453D74C
          • FindClose.KERNEL32(?), ref: 0453D75F
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: Findwsprintf$File$??2@??3@CloseFirstG@2@@std@@G@std@@Grow@?$basic_string@NextU?$char_traits@V?$allocator@lstrlenwcslen
          • String ID: %s%s%s$%s%s*.*$.
          • API String ID: 315284584-1343461528
          • Opcode ID: 245df24d992e0dc9e8f9eb2e8dce64309dc8df3b920ee4829a72916e196422d8
          • Instruction ID: 656f8d21944002b0517c715eaa17169e2b4d181667bfa689910e6974587dcfa5
          • Opcode Fuzzy Hash: 245df24d992e0dc9e8f9eb2e8dce64309dc8df3b920ee4829a72916e196422d8
          • Instruction Fuzzy Hash: A05191B14083809FC320DF29D884AABBBF4FFC8319F444A1DF59997251E774A909DB92
          APIs
          • LocalAlloc.KERNEL32(00000040,00002800), ref: 0453CFC3
          • wsprintfW.USER32 ref: 0453CFE0
          • FindFirstFileW.KERNEL32(?,?), ref: 0453CFF6
          • LocalReAlloc.KERNEL32(00000000,000025D0,00000042), ref: 0453D047
          • lstrcmpW.KERNEL32(?,045314C4), ref: 0453D059
          • lstrcmpW.KERNEL32(?,045314BC), ref: 0453D06D
          • lstrlenW.KERNEL32(?), ref: 0453D087
          • FindNextFileW.KERNEL32(00000000,?), ref: 0453D0E8
          • LocalFree.KERNEL32(00000000), ref: 0453D104
          • FindClose.KERNEL32(00000000), ref: 0453D10B
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: FindLocal$AllocFilelstrcmp$CloseFirstFreeNextlstrlenwsprintf
          • String ID: %s\*.*$h
          • API String ID: 2194070967-1052742963
          • Opcode ID: 581ac4f71401d6ba3a569d30c967feb8c7c6b3361458451b2bbf0fca3a62115b
          • Instruction ID: 87ef34b7afcfeff6ee4575c5137f598cbedf9ac469eec11798c859c3e700b568
          • Opcode Fuzzy Hash: 581ac4f71401d6ba3a569d30c967feb8c7c6b3361458451b2bbf0fca3a62115b
          • Instruction Fuzzy Hash: C641A1716043449BC710DF64E884B5BBBF4FB88701F04451DF94597381EB7DAA09DBA5
          APIs
          • InternetOpenW.WININET(Mozilla/4.0 (compatible),00000000,00000000,00000000,00000000), ref: 04541A46
          • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 04541A70
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: InternetOpen
          • String ID: MZ$Mozilla/4.0 (compatible)$c:\windows\httpd.exe
          • API String ID: 2038078732-2593800607
          • Opcode ID: 6385574a56e4a7d4a589578bf6c72955f5767af77a5d4f70cf3d26d9f20e27b6
          • Instruction ID: c4ed9bb76c7a1713edbdacf27a125afe4aa5270f399d5f272422c567c8558db6
          • Opcode Fuzzy Hash: 6385574a56e4a7d4a589578bf6c72955f5767af77a5d4f70cf3d26d9f20e27b6
          • Instruction Fuzzy Hash: 7931E475104340ABD320DF62EC48E9BBBFDFBC5B54F00491DF98586140D779A949D7A1
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: Find$Filewsprintf$CloseDirectoryFirstNextRemove
          • String ID: %s\%s$%s\*.*$.
          • API String ID: 2470771279-1471744235
          • Opcode ID: 49c8e0031fda4fa3783261922265be2f8b5556e763204b4b2136a5824655c324
          • Instruction ID: a56a3a4b655a84b0ac03b7ce0bb83a250e279421d1c1958337d43239bbfaba5e
          • Opcode Fuzzy Hash: 49c8e0031fda4fa3783261922265be2f8b5556e763204b4b2136a5824655c324
          • Instruction Fuzzy Hash: 6F21C376104344ABD360EB74E888EFF77BCFBC4316F404919E94982140EB79A91CEB62
          APIs
          • LoadLibraryW.KERNEL32(ADVAPI32.dll,0453F9AF), ref: 0453F9D1
          • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 0453F9DF
          • GetProcAddress.KERNEL32(00000000,FreeSid), ref: 0453F9EA
          • GetProcessHeap.KERNEL32(00000000,?), ref: 0453FA04
          • HeapFree.KERNEL32(00000000), ref: 0453FA0B
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: AddressHeapProc$FreeLibraryLoadProcess
          • String ID: ADVAPI32.dll$FreeSid$RegCloseKey
          • API String ID: 2518100794-3304832375
          • Opcode ID: 5371e4125cfadc96a7695fece2c8ef5bbe4ae9cdddac66dab011956bbda41c76
          • Instruction ID: 2e03b58b1e0cd894fc41bb2c0ff420b838197adca5875a0ab5fca90223ba6946
          • Opcode Fuzzy Hash: 5371e4125cfadc96a7695fece2c8ef5bbe4ae9cdddac66dab011956bbda41c76
          • Instruction Fuzzy Hash: CDF05E75A00618ABDB10EBF5AC84E9EBBECBF48642B154126F800F3200CA74AC00AE70
          APIs
          • GetCurrentProcess.KERNEL32(00000028), ref: 0453E6B0
          • OpenProcessToken.ADVAPI32(00000000), ref: 0453E6B7
          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 0453E6E5
          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,00000010,00000000,00000000), ref: 0453E6FD
          • GetLastError.KERNEL32 ref: 0453E703
          • CloseHandle.KERNEL32(?), ref: 0453E714
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue
          • String ID:
          • API String ID: 3398352648-0
          • Opcode ID: e86c337edc20b1586817166094bb0a8942f263e8309f59043ce3b5a8099ddd55
          • Instruction ID: 06828240ab20f0b95d6dbe2ebc6774ea4c43cd6635df061d5496ac93a1fc1672
          • Opcode Fuzzy Hash: e86c337edc20b1586817166094bb0a8942f263e8309f59043ce3b5a8099ddd55
          • Instruction Fuzzy Hash: D60171796043106BD314EB64DC4AB9B77A8FB84B05F44891CF68A9A280D778E9089B95
          APIs
          • FindFirstFileW.KERNEL32(00000021,?,00000000,00000001,00000021), ref: 0453D96F
          • FindClose.KERNEL32(00000000), ref: 0453D9E9
          • CreateFileW.KERNEL32(00000021,40000000,00000002,00000000,00000002,00000080,00000000), ref: 0453DA01
          • CloseHandle.KERNEL32(00000000), ref: 0453DA2B
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: CloseFileFind$CreateFirstHandle
          • String ID: p
          • API String ID: 3283578348-2181537457
          • Opcode ID: 8018d4c64fd46d6cd8ac6a48963a5dbfb4286178813b37ca71edd733af85aa51
          • Instruction ID: c417acce48d4dc11a5f3d0e97aac6a1b3b5723310450bb80e6492dcb1741b6b1
          • Opcode Fuzzy Hash: 8018d4c64fd46d6cd8ac6a48963a5dbfb4286178813b37ca71edd733af85aa51
          • Instruction Fuzzy Hash: C9310A72D083119BD724DF18984576A77B5BBC4326F048A3EF8999B3C0D638A84CA792
          APIs
          • CreateFileW.KERNEL32(\\.\PHYSICALDRIVE0,00000000,00000003,00000000,00000003,00000000,00000000,?,?,04540C1E,?,?,?,?,04549970), ref: 045405E3
          • DeviceIoControl.KERNEL32(00000000,00070000,00000000,00000000,?,00000018,?,00000000), ref: 0454060E
          • CloseHandle.KERNEL32(00000000,?,?,?,04549970,?,00000000), ref: 04540617
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: CloseControlCreateDeviceFileHandle
          • String ID: \\.\PHYSICALDRIVE0
          • API String ID: 33631002-1557481562
          • Opcode ID: 99ceba633913282a40fe8afa99f0e07fc6809749c8e0aa17e2c91b0d0fc09d2a
          • Instruction ID: b039b23db13ac81751e5497604aa9b7a4113573bab422923d983792945bb813d
          • Opcode Fuzzy Hash: 99ceba633913282a40fe8afa99f0e07fc6809749c8e0aa17e2c91b0d0fc09d2a
          • Instruction Fuzzy Hash: E5F0A07A3803207AE2306268AC0BFC72698EBC4F32F300225F702EE0C0C6E469046368
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID:
          • String ID: incorrect data check$incorrect header check$invalid window size$need dictionary$unknown compression method
          • API String ID: 0-2151277842
          • Opcode ID: d9927052f920db8b73d08d053719b88cf685044b11ef129012439a189b1e758c
          • Instruction ID: 9f028800a4e5202e3c635183fee35774dc5dd4a751b78a74efc78d096b6dacf0
          • Opcode Fuzzy Hash: d9927052f920db8b73d08d053719b88cf685044b11ef129012439a189b1e758c
          • Instruction Fuzzy Hash: F8E1D3B5600A018FD324CF19D890A12FBF2FF89314B25C9AEE59ACB761D731E846DB50
          APIs
          • lstrcpyW.KERNEL32(00000021,?,?,00000001), ref: 0453D8A5
            • Part of subcall function 0453C9F0: lstrlenW.KERNEL32(?), ref: 0453CA21
            • Part of subcall function 0453C9F0: malloc.MSVCRT ref: 0453CA2C
            • Part of subcall function 0453C9F0: lstrcpyW.KERNEL32(00000000,?), ref: 0453CA44
            • Part of subcall function 0453C9F0: CharNextW.USER32(00000000), ref: 0453CA78
            • Part of subcall function 0453C9F0: CharNextW.USER32(00000000), ref: 0453CA9D
            • Part of subcall function 0453C9F0: GetFileAttributesW.KERNEL32(00000000), ref: 0453CAEE
            • Part of subcall function 0453C9F0: CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0453CAFE
            • Part of subcall function 0453C9F0: GetLastError.KERNEL32 ref: 0453CB08
            • Part of subcall function 0453C9F0: free.MSVCRT ref: 0453CB1D
          • FindFirstFileW.KERNEL32(00000021,?,?,00000001), ref: 0453D8CC
          • FindClose.KERNEL32(00000000,0000006D,?,00000001), ref: 0453D8F5
          • FindClose.KERNEL32(00000000,?,00000001), ref: 0453D90F
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: Find$CharCloseFileNextlstrcpy$AttributesCreateDirectoryErrorFirstLastfreelstrlenmalloc
          • String ID:
          • API String ID: 3327165776-0
          • Opcode ID: 90caae407aef5513eb5e6e54d081a351bcf6503626941cb8f36b8b37f6055e5f
          • Instruction ID: 1515759dc5c5359d7b7a4e42fc40e80413f44d8fd0057ab6c3dfa321f4531866
          • Opcode Fuzzy Hash: 90caae407aef5513eb5e6e54d081a351bcf6503626941cb8f36b8b37f6055e5f
          • Instruction Fuzzy Hash: 2A01BE762005509BD7145B68EC8CABEB3B9FBC432BF10462AE956C3290DB3D781D9761
          Strings
          • invalid bit length repeat, xrefs: 045441D1
          • too many length or distance symbols, xrefs: 045440E2
          • invalid stored block lengths, xrefs: 04543F96
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID:
          • String ID: invalid bit length repeat$invalid stored block lengths$too many length or distance symbols
          • API String ID: 0-949635641
          • Opcode ID: da87bdd6e2315836312124624b57bc50dfd7e44c8636d48e2639c1819455d3bd
          • Instruction ID: 0ba222dd70944200bc4190a1dbc0b1424c07a286ad7e94ba6a811b4beded2ca4
          • Opcode Fuzzy Hash: da87bdd6e2315836312124624b57bc50dfd7e44c8636d48e2639c1819455d3bd
          • Instruction Fuzzy Hash: 2B924BB5A043018FCB08CF19D88062ABBF5FFC9314F14896EE9998B365E731E945DB91
          APIs
            • Part of subcall function 0453E6A0: GetCurrentProcess.KERNEL32(00000028), ref: 0453E6B0
            • Part of subcall function 0453E6A0: OpenProcessToken.ADVAPI32(00000000), ref: 0453E6B7
          • ExitWindowsEx.USER32(?,00000000), ref: 0453E746
            • Part of subcall function 0453E6A0: LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 0453E6E5
            • Part of subcall function 0453E6A0: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,00000010,00000000,00000000), ref: 0453E6FD
            • Part of subcall function 0453E6A0: GetLastError.KERNEL32 ref: 0453E703
            • Part of subcall function 0453E6A0: CloseHandle.KERNEL32(?), ref: 0453E714
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: ProcessToken$AdjustCloseCurrentErrorExitHandleLastLookupOpenPrivilegePrivilegesValueWindows
          • String ID: SeShutdownPrivilege
          • API String ID: 3672536310-3733053543
          • Opcode ID: bfdecc2054a05fb156ce8685728d48a72073e58a34250823f1294dc005e4b36d
          • Instruction ID: 6aeaee21232116297c5d5886823ca4fcf8dd73b2922a1cc0128f5b6b6227fdd2
          • Opcode Fuzzy Hash: bfdecc2054a05fb156ce8685728d48a72073e58a34250823f1294dc005e4b36d
          • Instruction Fuzzy Hash: 93C012B8E90B00B7EA503BA87C0BF8933807BC0A0BFE48800B605691C0D4A57018EA66
          Strings
          • invalid literal/length code, xrefs: 0454672F
          • invalid distance code, xrefs: 0454677D
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID:
          • String ID: invalid distance code$invalid literal/length code
          • API String ID: 0-1393003055
          • Opcode ID: 3025467fe1d2e10f240eeecb962008c434b22caa58aa0fc85cd2e3dcb70b3dcd
          • Instruction ID: 9871aaaf58b2f9726035dc8009de5e96833503162983638b2ea3c041cebb1914
          • Opcode Fuzzy Hash: 3025467fe1d2e10f240eeecb962008c434b22caa58aa0fc85cd2e3dcb70b3dcd
          • Instruction Fuzzy Hash: 001213B46087028FC708CF29D590A2ABBE1FBC9318F148A6DE48ACB751E734E944DF55
          Strings
          • invalid literal/length code, xrefs: 0454753A
          • invalid distance code, xrefs: 0454745E
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID:
          • String ID: invalid distance code$invalid literal/length code
          • API String ID: 0-1393003055
          • Opcode ID: 589c43d5209b07f347acd0a438e24ba9d2ad554e275229effd3c41b5677d7b70
          • Instruction ID: de6b987771e42aecf3a0c3a6e9c2ec74ae3e8b23b6097fb323e8d54df5f008eb
          • Opcode Fuzzy Hash: 589c43d5209b07f347acd0a438e24ba9d2ad554e275229effd3c41b5677d7b70
          • Instruction Fuzzy Hash: 0AD1AB716083918FC718CF2CD49026ABBE1FBCD314F198A6DE9DA97746C730A819CB85
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e94ee705bcfd0eb0447525013974fe16abecceb808232d21bcff859e457b1f54
          • Instruction ID: d3f56ff51951a81b12c4c206552235e393ff41e57f8de6527eaee1cfa1c1f0b8
          • Opcode Fuzzy Hash: e94ee705bcfd0eb0447525013974fe16abecceb808232d21bcff859e457b1f54
          • Instruction Fuzzy Hash: 42125DB17083018FCB18CF19D89062ABBE6FBC9304F14896DE8898F759E771E945DB91
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: b1056ec6cdf0ea22c2e4f45ff490300fc390fc8a354c728a19c5387903fde31f
          • Instruction ID: e52937de8788f7a5c52a72f75e3c84563a4174cb241c8a36f2a1df6736fa2fd4
          • Opcode Fuzzy Hash: b1056ec6cdf0ea22c2e4f45ff490300fc390fc8a354c728a19c5387903fde31f
          • Instruction Fuzzy Hash: C5125DB17083018FCB18CF19D89062ABBE6FBC9304F14896DE8898F759E771E945DB91
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: d4bfdb248b3fb90f8076a3fe4a1e75f7bd1b50aa5aafde52d762773f77742459
          • Instruction ID: e69ff8cf59d4b024e62b4dffc3450aadb566c9626a092c0b2886e46bca078963
          • Opcode Fuzzy Hash: d4bfdb248b3fb90f8076a3fe4a1e75f7bd1b50aa5aafde52d762773f77742459
          • Instruction Fuzzy Hash: E3F1AE725092418FC3098F18D5989E27BE2FFA8754B1F46F9D44A9F363E732A841CB91
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 1846ab586be1285614f030050bf9c1c5f67b49948b9685392a548286c0effe5d
          • Instruction ID: 610bcf5e595df0870192606221605e4c40db4d66c983e3384e944357c2d0468d
          • Opcode Fuzzy Hash: 1846ab586be1285614f030050bf9c1c5f67b49948b9685392a548286c0effe5d
          • Instruction Fuzzy Hash: F6D11475314B418FD328CF29D880AA7B7E5FF89308B18892DD8D68BB65DA35F845DB40
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c8e8d1845508916e110a5e6bb7fa9cff5b8adde8c94410d0761408eb9dce039d
          • Instruction ID: 1064e0556e8cc8b2a9bab15496e9844ef6bd97c652df56c9071d6a09984ba376
          • Opcode Fuzzy Hash: c8e8d1845508916e110a5e6bb7fa9cff5b8adde8c94410d0761408eb9dce039d
          • Instruction Fuzzy Hash: 49D18B756082558FC319CF18E5D88E27BE1BFA8740B0E46F8D98A8F323E731A945CB55
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 146c89af0a770acb79764a54ab2087afe7525973790fda81db81def86427c168
          • Instruction ID: 2ac4d531c4080e3ddcef3b3e2fb908a1475860d9d248a2a835b5887e3f1f8399
          • Opcode Fuzzy Hash: 146c89af0a770acb79764a54ab2087afe7525973790fda81db81def86427c168
          • Instruction Fuzzy Hash: 25B13735214B518FD328CF29D9909A7B7E6BFC9308B18896DE4DACBB51E631F841DB40
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0b4f27dd10139f30faea009d98bf7d04ad43b169fe1efa635cf320682f8d45aa
          • Instruction ID: 7cc62d3b361586933fe961b06aaa6cb7888138e7ed348378206cb7760973a27c
          • Opcode Fuzzy Hash: 0b4f27dd10139f30faea009d98bf7d04ad43b169fe1efa635cf320682f8d45aa
          • Instruction Fuzzy Hash: 52316D3374548203FB1DCE2F9CA13BAEAD74FC622872DD57E98C98B316ECBA94164104

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 37 4540730-454074e _wcsrev 38 454074f call 4541760 37->38 39 4540754-4540761 38->39 40 4540781-4540788 _wcsrev 39->40 41 4540763-454077f lstrcatW * 2 39->41 42 4540789 call 4541760 40->42 41->40 43 454078e-4540793 42->43 44 4540795-45407b1 lstrcatW * 2 43->44 45 45407b3-45407ba _wcsrev 43->45 44->45 46 45407bb call 4541760 45->46 47 45407c0-45407c5 46->47 48 45407e5-45407ec _wcsrev 47->48 49 45407c7-45407e3 lstrcatW * 2 47->49 50 45407ed call 4541760 48->50 49->48 51 45407f2-45407f7 50->51 52 4540817-454081e _wcsrev 51->52 53 45407f9-4540815 lstrcatW * 2 51->53 54 454081f call 4541760 52->54 53->52 55 4540824-4540829 54->55 56 4540849-4540850 _wcsrev 55->56 57 454082b-4540847 lstrcatW * 2 55->57 58 4540851 call 4541760 56->58 57->56 59 4540856-454085b 58->59 60 454085d-4540879 lstrcatW * 2 59->60 61 454087b-4540882 _wcsrev 59->61 60->61 62 4540883 call 4541760 61->62 63 4540888-454088d 62->63 64 45408ad-45408b4 _wcsrev 63->64 65 454088f-45408ab lstrcatW * 2 63->65 66 45408b5 call 4541760 64->66 65->64 67 45408ba-45408bf 66->67 68 45408c1-45408dd lstrcatW * 2 67->68 69 45408df-45408e6 _wcsrev 67->69 68->69 70 45408e7 call 4541760 69->70 71 45408ec-45408f1 70->71 72 4540911-4540918 _wcsrev 71->72 73 45408f3-454090f lstrcatW * 2 71->73 74 4540919 call 4541760 72->74 73->72 75 454091e-4540923 74->75 76 4540925-4540941 lstrcatW * 2 75->76 77 4540943-454094a _wcsrev 75->77 76->77 78 454094b call 4541760 77->78 79 4540950-4540955 78->79 80 4540975-454097c _wcsrev 79->80 81 4540957-4540973 lstrcatW * 2 79->81 82 454097d call 4541760 80->82 81->80 83 4540982-4540987 82->83 84 45409a7-45409bc wcsstr 83->84 85 4540989-45409a5 lstrcatW * 2 83->85 86 45409be-45409c8 lstrcatW 84->86 87 45409ca-45409d2 84->87 85->84 86->87
          APIs
          • _wcsrev.MSVCRT(exe.yart063,?,?,7595F860,04540D13,?,?,?,?,?,?,?,?,?,?,?), ref: 0454074C
            • Part of subcall function 04541760: LoadLibraryW.KERNEL32 ref: 045417D0
            • Part of subcall function 04541760: LoadLibraryW.KERNEL32(?,?), ref: 0454182B
            • Part of subcall function 04541760: GetProcAddress.KERNEL32(00000000), ref: 04541834
            • Part of subcall function 04541760: LoadLibraryW.KERNEL32(00000032,04549100), ref: 0454188B
            • Part of subcall function 04541760: GetProcAddress.KERNEL32(00000000), ref: 0454188E
            • Part of subcall function 04541760: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 04541897
            • Part of subcall function 04541760: lstrcmpiW.KERNEL32(?,?), ref: 045418C3
          • lstrcatW.KERNEL32(04549100,360,7595F860,04540D13,?,?,?,?,?,?,?,?,?,?,?), ref: 04540773
          • lstrcatW.KERNEL32(04549100,045313CC,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0454077F
            • Part of subcall function 04541760: CloseHandle.KERNEL32(00000000), ref: 045418DA
          • _wcsrev.MSVCRT(exe.pva,7595F860,04540D13,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 04540786
          • lstrcatW.KERNEL32(04549100,kaba), ref: 045407A5
          • lstrcatW.KERNEL32(04549100,045313CC), ref: 045407B1
          • _wcsrev.MSVCRT(exe.pxnomvk,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 045407B8
          • lstrcatW.KERNEL32(04549100,jiangmi), ref: 045407D7
          • lstrcatW.KERNEL32(04549100,045313CC), ref: 045407E3
          • _wcsrev.MSVCRT(exe.dnomvar), ref: 045407EA
          • lstrcatW.KERNEL32(04549100,rixing), ref: 04540809
          • lstrcatW.KERNEL32(04549100,045313CC), ref: 04540815
          • _wcsrev.MSVCRT(exe.ds063), ref: 0454081C
          • lstrcatW.KERNEL32(04549100,360sd), ref: 0454083B
          • lstrcatW.KERNEL32(04549100,045313CC), ref: 04540847
          • _wcsrev.MSVCRT(exe.dleihscm), ref: 0454084E
          • lstrcatW.KERNEL32(04549100,macfee), ref: 0454086D
          • lstrcatW.KERNEL32(04549100,045313CC), ref: 04540879
          • _wcsrev.MSVCRT(exe.iuge), ref: 04540880
          • lstrcatW.KERNEL32(04549100,NOD32), ref: 0454089F
          • lstrcatW.KERNEL32(04549100,045313CC), ref: 045408AB
          • _wcsrev.MSVCRT(exe.yartexk), ref: 045408B2
          • lstrcatW.KERNEL32(04549100,jinshan), ref: 045408D1
          • lstrcatW.KERNEL32(04549100,045313CC), ref: 045408DD
          • _wcsrev.MSVCRT(exe.yartdsnk), ref: 045408E4
          • lstrcatW.KERNEL32(04549100,kenu), ref: 04540903
          • lstrcatW.KERNEL32(04549100,045313CC), ref: 0454090F
          • _wcsrev.MSVCRT(exe.vrsmbmt), ref: 04540916
          • lstrcatW.KERNEL32(04549100,qushi), ref: 04540935
          • lstrcatW.KERNEL32(04549100,045313CC), ref: 04540941
          • _wcsrev.MSVCRT(exe.retnecva), ref: 04540948
          • lstrcatW.KERNEL32(04549100,avira), ref: 04540967
          • lstrcatW.KERNEL32(04549100,045313CC), ref: 04540973
          • _wcsrev.MSVCRT(exe.psidhsa), ref: 0454097A
          • lstrcatW.KERNEL32(04549100,avast), ref: 04540999
          • lstrcatW.KERNEL32(04549100,045313CC), ref: 045409A5
          • wcsstr.MSVCRT ref: 045409B1
          • lstrcatW.KERNEL32(04549100,NotFound), ref: 045409C8
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: lstrcat$_wcsrev$LibraryLoad$AddressProc$CloseCreateHandleSnapshotToolhelp32lstrcmpiwcsstr
          • String ID: 360$360sd$NOD32$NotFound$avast$avira$exe.dleihscm$exe.dnomvar$exe.ds063$exe.iuge$exe.psidhsa$exe.pva$exe.pxnomvk$exe.retnecva$exe.vrsmbmt$exe.yart063$exe.yartdsnk$exe.yartexk$jiangmi$jinshan$kaba$kenu$macfee$qushi$rixing
          • API String ID: 1578094470-4042984187
          • Opcode ID: 272ea3df3eb441ee28b9d476c9e982ae9519a21f26281d335c1fbad9c922b215
          • Instruction ID: 07ccafed2b550538c41827f411891f97c33a9214b29468b8ef866193efca46f6
          • Opcode Fuzzy Hash: 272ea3df3eb441ee28b9d476c9e982ae9519a21f26281d335c1fbad9c922b215
          • Instruction Fuzzy Hash: 92513FF4F8171E77A91437726D4FD2B2EC4B8C0EAF7141411F5089EA42DAA5B908FDA2

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 200 453fa30-453fb12 LoadLibraryW GetProcAddress * 5 call 453f7e0 204 453fb20-453fb26 200->204 205 453fb14-453fb1b 200->205 206 453fe9d-453feab call 453fece 204->206 207 453fb2c 204->207 205->206 228 453feb4-453fec7 206->228 229 453fead-453feae FreeLibrary 206->229 207->206 208 453fb33-453fb3a 207->208 209 453fc33-453fc64 207->209 210 453fdf0-453fdf7 207->210 211 453fe17-453fe43 wsprintfW 207->211 212 453fd55-453fdc8 207->212 213 453fe7a-453fe92 lstrcatW 207->213 214 453fb98-453fb9f 207->214 215 453fe5c-453fe70 207->215 216 453fde2-453fdee 207->216 217 453fb47-453fb78 207->217 218 453fe45-453fe5a 207->218 219 453fba4-453fbd5 207->219 220 453fc8f-453fcbc 207->220 221 453fcce 207->221 208->206 226 453fb40 208->226 209->206 235 453fc6a-453fc8a wsprintfW 209->235 227 453fdfc-453fe15 wsprintfW 210->227 211->213 239 453fe97 212->239 240 453fdce-453fdd5 212->240 214->206 223 453fe71-453fe77 wsprintfW 215->223 216->227 217->206 238 453fb7e-453fb92 call 453f7b0 lstrcpyW 217->238 218->223 219->206 241 453fbdb 219->241 220->206 236 453fcc2-453fcc9 220->236 225 453fcd1-453fd19 221->225 223->213 225->239 242 453fd1f-453fd50 wsprintfW lstrcatW 225->242 226->206 226->209 226->210 226->211 226->213 226->215 226->216 226->217 226->218 226->219 226->220 227->213 229->228 235->206 236->206 238->214 239->206 240->213 244 453fddb 240->244 245 453fbe1-453fbf1 241->245 242->225 244->210 244->211 244->213 244->215 244->216 244->218 246 453fbf3-453fc1a call 453f790 * 2 call 453f710 245->246 247 453fc1c-453fc2e lstrcpyW 245->247 246->245 247->206
          APIs
          • LoadLibraryW.KERNEL32(ADVAPI32.dll,0453153C,?,?), ref: 0453FA86
          • GetProcAddress.KERNEL32(00000000,RegQueryValueExW), ref: 0453FAA0
          • GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 0453FAAE
          • GetProcAddress.KERNEL32(00000000,RegEnumValueW), ref: 0453FABC
          • GetProcAddress.KERNEL32(00000000,RegEnumKeyExW), ref: 0453FACA
          • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 0453FAD8
            • Part of subcall function 0453F7E0: LoadLibraryW.KERNEL32(ADVAPI32.dll,00000000,00000000,00000000), ref: 0453F831
            • Part of subcall function 0453F7E0: GetProcAddress.KERNEL32(00000000,GetLengthSid), ref: 0453F848
            • Part of subcall function 0453F7E0: GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 0453F853
            • Part of subcall function 0453F7E0: GetProcAddress.KERNEL32(00000000,SetSecurityDescriptorDacl), ref: 0453F860
            • Part of subcall function 0453F7E0: GetProcAddress.KERNEL32(00000000,InitializeSecurityDescriptor), ref: 0453F86B
            • Part of subcall function 0453F7E0: GetProcAddress.KERNEL32(00000000,InitializeAcl), ref: 0453F876
            • Part of subcall function 0453F7E0: GetProcAddress.KERNEL32(00000000,AddAccessAllowedAce), ref: 0453F881
            • Part of subcall function 0453F7E0: GetProcAddress.KERNEL32(00000000,AllocateAndInitializeSid), ref: 0453F88C
            • Part of subcall function 0453F7E0: GetProcAddress.KERNEL32(00000000,RegSetKeySecurity), ref: 0453F897
          • FreeLibrary.KERNEL32(00000000), ref: 0453FEAE
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$Library$Load$Free
          • String ID: %-24s %-15s $%-24s %-15s %s $%-24s %-15s 0x%x(%d) $ADVAPI32.dll$REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_SZ$RegCloseKey$RegEnumKeyExW$RegEnumValueW$RegOpenKeyExW$RegQueryValueExW$[%s]
          • API String ID: 314858353-258588721
          • Opcode ID: 2632c83337fed556d0521b4cad2aa554fe20132255fb8fabf54ee8c29eb5602b
          • Instruction ID: 0c07a9952ef37910cbf6b7fc4afec37d77fe0df5c21866659922bd102db093f8
          • Opcode Fuzzy Hash: 2632c83337fed556d0521b4cad2aa554fe20132255fb8fabf54ee8c29eb5602b
          • Instruction Fuzzy Hash: 46C141B6D00218ABDB64CF94DC85FEA7779FB44701F00859AF609A7240D774AE48EFA4

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 332 453bb70-453bbce call 4547600 call 453c3d0 ResetEvent socket 337 453bea6-453beb8 332->337 338 453bbd4-453bc29 332->338 339 453bce5-453bcf4 338->339 340 453bc2f-453bc58 InternetQueryOptionA 338->340 339->337 342 453bcfa-453bd3e strchr strncpy 339->342 340->337 341 453bc5e-453bcae strchr strncpy 340->341 341->337 343 453bcb4-453bcda atoi 341->343 342->337 344 453bd44-453bd64 atoi 342->344 345 453bce0 343->345 346 453bd6a-453bd7b gethostbyname 343->346 344->337 344->346 345->337 346->337 347 453bd81-453bdb2 htons connect 346->347 347->337 348 453bdb8-453be3d sprintf OutputDebugStringA send 347->348 349 453be43-453be45 348->349 350 453be47-453be56 349->350 351 453be5d 349->351 354 453be5b 350->354 355 453be58-453be59 350->355 352 453be5f-453be62 351->352 353 453be7e-453be97 select 351->353 352->353 356 453be64-453be78 352->356 357 453bebb-453beed recv strstr 353->357 358 453be99-453be9f 353->358 354->351 355->349 356->353 360 453bef8-453bf0a 357->360 361 453beef-453bef6 357->361 359 453bea0 closesocket 358->359 359->337 361->359
          APIs
            • Part of subcall function 0453C3D0: setsockopt.WS2_32(?,0000FFFF,00000080,00000000,00000004), ref: 0453C3FA
            • Part of subcall function 0453C3D0: CancelIo.KERNEL32(?), ref: 0453C407
            • Part of subcall function 0453C3D0: InterlockedExchange.KERNEL32(?,00000000), ref: 0453C416
            • Part of subcall function 0453C3D0: closesocket.WS2_32(?), ref: 0453C423
            • Part of subcall function 0453C3D0: SetEvent.KERNEL32(?), ref: 0453C430
          • ResetEvent.KERNEL32(?,00000000,?,?,?,00000000,04547DA0,000000FF,?,0453BFDE,04548D88,?,?), ref: 0453BBAC
          • socket.WS2_32 ref: 0453BBBF
          • InternetQueryOptionA.WININET(00000000,00000026,00000000,00001000), ref: 0453BC3D
          • strchr.MSVCRT ref: 0453BC61
          • strncpy.MSVCRT ref: 0453BC90
          • atoi.MSVCRT(?), ref: 0453BCCD
          • strchr.MSVCRT ref: 0453BCFD
          • strncpy.MSVCRT ref: 0453BD26
          • atoi.MSVCRT(?), ref: 0453BD57
          • gethostbyname.WS2_32(?), ref: 0453BD71
          • htons.WS2_32 ref: 0453BD88
          • connect.WS2_32(?,00000002,00000010), ref: 0453BDA9
          • sprintf.MSVCRT ref: 0453BDEF
          • OutputDebugStringA.KERNEL32(?), ref: 0453BDFF
          • send.WS2_32(?,?,?,00000000), ref: 0453BE26
          • select.WS2_32(00000000,?,00000000,00000000,00000000), ref: 0453BE8F
          • closesocket.WS2_32(?), ref: 0453BEA0
          • recv.WS2_32(?,?,00000258,00000000), ref: 0453BED0
          • strstr.MSVCRT ref: 0453BEE2
          Strings
          • Connection established, xrefs: 0453BEDC
          • HTTP/1.1Accept: */*Content-Type: text/htmlProxy-Connection: Keep-AliveContent-length: 0, xrefs: 0453BDD6
          • %s%s:%d%s, xrefs: 0453BDE9
          • CONNECT , xrefs: 0453BDDE
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: Eventatoiclosesocketstrchrstrncpy$CancelDebugExchangeInterlockedInternetOptionOutputQueryResetStringconnectgethostbynamehtonsrecvselectsendsetsockoptsocketsprintfstrstr
          • String ID: HTTP/1.1Accept: */*Content-Type: text/htmlProxy-Connection: Keep-AliveContent-length: 0$%s%s:%d%s$CONNECT $Connection established
          • API String ID: 2042499094-4200791392
          • Opcode ID: 59ad9b37cfd84d77c0879b51f89239671d68330fcac1b886d135134ea857676b
          • Instruction ID: 9660e3f417b8d350572aed1b034a0e2f57e0419dae7e09aa793ae7158c487220
          • Opcode Fuzzy Hash: 59ad9b37cfd84d77c0879b51f89239671d68330fcac1b886d135134ea857676b
          • Instruction Fuzzy Hash: 8AA1F531A006049FD728CB78CC84BEE77A9FB84322F10465DF62AD72C1DBB5AE459B50

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 362 453b940-453b9a0 RegOpenKeyExW 363 453b9a6-453b9d4 RegQueryValueExA 362->363 364 453ba9f-453baaa 362->364 363->364 365 453b9da-453ba12 strncpy RegCloseKey strstr 363->365 365->364 366 453ba18-453ba2f InternetOpenW 365->366 366->364 367 453ba31-453ba49 InternetOpenUrlA 366->367 367->364 368 453ba4b-453ba8f malloc InternetReadFile InternetCloseHandle * 2 367->368 369 453ba91-453ba9c free 368->369 370 453baad-453bae8 _strupr strstr 368->370 369->364 371 453baea-453bafd strchr 370->371 372 453bb4e-453bb67 free 370->372 371->372 373 453baff-453bb0b 371->373 374 453bb0d-453bb15 373->374 374->374 375 453bb17-453bb3a call 453bb70 374->375 375->372 378 453bb3c-453bb4c strstr 375->378 378->371 378->372
          APIs
          • RegOpenKeyExW.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Internet Settings,00000000,00000001,?), ref: 0453B998
          • RegQueryValueExA.ADVAPI32(?,AutoConfigURL,00000000,?,00000000,?), ref: 0453B9CC
          • strncpy.MSVCRT ref: 0453B9E9
          • RegCloseKey.ADVAPI32(?,00000000,?,?), ref: 0453B9F7
          • strstr.MSVCRT ref: 0453BA07
          • InternetOpenW.WININET(IE6.0,00000000,00000000,00000000,00000000), ref: 0453BA25
          • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 0453BA3F
          • malloc.MSVCRT ref: 0453BA50
          • InternetReadFile.WININET(00000000,00000000,0000C440,?), ref: 0453BA77
          • InternetCloseHandle.WININET(00000000), ref: 0453BA80
          • InternetCloseHandle.WININET(00000000), ref: 0453BA87
          • free.MSVCRT ref: 0453BA96
          • _strupr.MSVCRT ref: 0453BAB2
          • strstr.MSVCRT ref: 0453BADF
          • strchr.MSVCRT ref: 0453BAF0
          • strstr.MSVCRT ref: 0453BB43
          • free.MSVCRT ref: 0453BB53
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: Internet$CloseOpenstrstr$Handlefree$FileQueryReadValue_struprmallocstrchrstrncpy
          • String ID: "PROXY $AutoConfigURL$IE6.0$Software\Microsoft\Windows\CurrentVersion\Internet Settings$pac
          • API String ID: 3082613322-1950214214
          • Opcode ID: 84bef71c66d6a25579105049f2d166ff9d38c53c7daef9feaa52d1bf7f5c06f9
          • Instruction ID: 65229d59a9eaac0e2a37d431849c32f331f6df3abfa7d6adfc9bf6da011004ec
          • Opcode Fuzzy Hash: 84bef71c66d6a25579105049f2d166ff9d38c53c7daef9feaa52d1bf7f5c06f9
          • Instruction Fuzzy Hash: B451D6352047456BD320DB24DC05BEB77E4FBC8702F044528FA85D7381EAB5B908EBA6

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 379 453cba0-453cbe2 wcsrchr 380 453cd85-453cd91 379->380 381 453cbe8-453cc3f lstrcpyW LoadLibraryW GetProcAddress * 3 379->381 381->380 383 453cc45-453cca7 wsprintfW 381->383 383->380 387 453ccad-453ccf0 wcsstr 383->387 390 453ccf2-453cd03 wcsstr 387->390 391 453cd28-453cd31 lstrcpyW 387->391 390->391 392 453cd05-453cd26 lstrcatW * 2 390->392 393 453cd37-453cd55 391->393 392->393 394 453cd57 393->394 395 453cd5f-453cd7f CreateProcessW 393->395 394->395 395->380
          APIs
          • wcsrchr.MSVCRT ref: 0453CBD7
          • lstrcpyW.KERNEL32(?,00000000), ref: 0453CBEE
          • LoadLibraryW.KERNEL32(ADVAPI32.dll), ref: 0453CBF9
          • GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 0453CC0D
          • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 0453CC17
          • GetProcAddress.KERNEL32(00000000,RegQueryValueW), ref: 0453CC21
          • wsprintfW.USER32 ref: 0453CC81
          • wcsstr.MSVCRT ref: 0453CCE9
          • wcsstr.MSVCRT ref: 0453CCFC
          • lstrcatW.KERNEL32(?,045313CC), ref: 0453CD15
          • lstrcatW.KERNEL32(?,?), ref: 0453CD24
          • lstrcpyW.KERNEL32(00000000,?,?,?), ref: 0453CD31
          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 0453CD7F
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$lstrcatlstrcpywcsstr$CreateLibraryLoadProcesswcsrchrwsprintf
          • String ID: "%1$%s\shell\open\command$ADVAPI32.dll$D$RegCloseKey$RegOpenKeyExW$RegQueryValueW$WinSta0\Default
          • API String ID: 4134440835-86666626
          • Opcode ID: c9cec31c3039b883e38ae7b7c031bc30403da04269948d51dcf86bec918d261b
          • Instruction ID: 9d20fb1ec34378b1448c765784ab8436ec6c12bcc129b9e427042c5fa33309a4
          • Opcode Fuzzy Hash: c9cec31c3039b883e38ae7b7c031bc30403da04269948d51dcf86bec918d261b
          • Instruction Fuzzy Hash: 03517B72248745ABE720DB71DC45FABB7E9FFC4705F00091DB68493140EAB5E908DBA2

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 396 453f7e0-453f8b3 LoadLibraryW GetProcAddress * 8 398 453f9a0 396->398 399 453f8b9-453f8da 396->399 400 453f9a3-453f9c2 call 453f9cc 398->400 399->398 404 453f8e0-453f901 399->404 404->398 406 453f907-453f936 GetProcessHeap HeapAlloc 404->406 406->400 409 453f938-453f941 406->409 409->400 411 453f943-453f956 409->411 411->400 413 453f958-453f967 411->413 413->400 415 453f969-453f974 413->415 415->400 417 453f976-453f984 415->417 417->400 419 453f986-453f995 417->419 419->400 421 453f997-453f99e 419->421 421->400
          APIs
          • LoadLibraryW.KERNEL32(ADVAPI32.dll,00000000,00000000,00000000), ref: 0453F831
          • GetProcAddress.KERNEL32(00000000,GetLengthSid), ref: 0453F848
          • GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 0453F853
          • GetProcAddress.KERNEL32(00000000,SetSecurityDescriptorDacl), ref: 0453F860
          • GetProcAddress.KERNEL32(00000000,InitializeSecurityDescriptor), ref: 0453F86B
          • GetProcAddress.KERNEL32(00000000,InitializeAcl), ref: 0453F876
          • GetProcAddress.KERNEL32(00000000,AddAccessAllowedAce), ref: 0453F881
          • GetProcAddress.KERNEL32(00000000,AllocateAndInitializeSid), ref: 0453F88C
          • GetProcAddress.KERNEL32(00000000,RegSetKeySecurity), ref: 0453F897
          • GetProcessHeap.KERNEL32(00000000,00000018), ref: 0453F922
          • HeapAlloc.KERNEL32(00000000), ref: 0453F929
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$Heap$AllocLibraryLoadProcess
          • String ID: ADVAPI32.dll$AddAccessAllowedAce$AllocateAndInitializeSid$GetLengthSid$InitializeAcl$InitializeSecurityDescriptor$RegOpenKeyExW$RegSetKeySecurity$SetSecurityDescriptorDacl
          • API String ID: 3190449858-3036209889
          • Opcode ID: c835df2584a36deee255767bcb9e020f1db494d0de77aecdaa35a44c68e98ebb
          • Instruction ID: e7c151e4b68d7b4202a47eef1155c2abaeb119d535f8ac654c47a3246dd0554b
          • Opcode Fuzzy Hash: c835df2584a36deee255767bcb9e020f1db494d0de77aecdaa35a44c68e98ebb
          • Instruction Fuzzy Hash: 75513A72E40658ABDB10DBA9DC45FEEBBB8BF48705F004129F904F6280D7B5A901DBA5
          APIs
          • LoadLibraryW.KERNEL32(ADVAPI32.dll), ref: 0453FF5F
          • GetProcAddress.KERNEL32(00000000,RegCreateKeyExW), ref: 0453FF73
          • GetProcAddress.KERNEL32(00000000,RegSetValueExW), ref: 0453FF7E
          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyW), ref: 0453FF89
          • GetProcAddress.KERNEL32(00000000,RegDeleteValueW), ref: 0453FF94
          • GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 0453FF9F
          • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 0453FFA9
          • lstrlenW.KERNEL32(?), ref: 04540040
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$LibraryLoadlstrlen
          • String ID: ADVAPI32.dll$RegCloseKey$RegCreateKeyExW$RegDeleteKeyW$RegDeleteValueW$RegOpenKeyExW$RegSetValueExW
          • API String ID: 1729337914-2216571892
          • Opcode ID: 68e090c334db5bc91855204ad6956a680479a90d3f987fcbab7646748a93ca1d
          • Instruction ID: 0338ce5c6ab83c6437384d1a66967e3221b727ce9cc8a6e08706cedeb79a0d3e
          • Opcode Fuzzy Hash: 68e090c334db5bc91855204ad6956a680479a90d3f987fcbab7646748a93ca1d
          • Instruction Fuzzy Hash: 21516171A40619BBDB10EFA5DC85FEFB7B8FF88B04F504105FA04AB280D775A9409BA0
          APIs
            • Part of subcall function 0453EA10: CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,0453E3DD,?,7591F550,0454114A,?), ref: 0453EA2E
          • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle,?), ref: 0454014B
          • GetProcAddress.KERNEL32(00000000), ref: 04540152
          • CreatePipe.KERNEL32 ref: 045401CA
          • CreatePipe.KERNEL32(00000068,00000064,?,00000000), ref: 045401FF
          • GetStartupInfoW.KERNEL32(0000000C), ref: 0454024D
          • GetSystemDirectoryW.KERNEL32 ref: 04540288
          • lstrcatW.KERNEL32(?,\cmd.e,?,?,?,?,?,?,?,?,?,?,?,00000118), ref: 0454029E
          • lstrcatW.KERNEL32(?,045321C0,?,?,?,?,?,?,?,?,?,?,?,00000118), ref: 045402AA
          • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000001,00000020,00000000,00000000,0000000C,?), ref: 045402CC
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: Create$Pipelstrcat$AddressDirectoryEventInfoLibraryLoadProcProcessStartupSystem
          • String ID: CloseHandle$D$\cmd.e$kernel32.dll$s
          • API String ID: 2063449080-2709968139
          • Opcode ID: bb0b453f8f6c9d9fbf079625ecb5c2a00871d47b06c3e6b918e890de8c689af6
          • Instruction ID: c30e5bdeb30861d8739cc63f7f10ef4d78cff942146259dadb1db4753fe5640c
          • Opcode Fuzzy Hash: bb0b453f8f6c9d9fbf079625ecb5c2a00871d47b06c3e6b918e890de8c689af6
          • Instruction Fuzzy Hash: A9716B71608745AFE324CF65C884B5BBBE4FFC8B04F10491DF6899B290D7B4A5089F56
          APIs
          • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle,?,?,?,?,00000000,04547F38,000000FF,0453E225,?), ref: 045403C7
          • GetProcAddress.KERNEL32(00000000), ref: 045403CE
          • TerminateThread.KERNEL32(?,00000000,?,?,?,?,00000000,04547F38,000000FF,0453E225,?), ref: 045403E2
          • TerminateProcess.KERNEL32(?,00000000,?,?,?,?,00000000,04547F38,000000FF,0453E225,?), ref: 045403EA
          • TerminateThread.KERNEL32(?,00000000,?,?,?,?,00000000,04547F38,000000FF,0453E225,?), ref: 045403F6
          • WaitForSingleObject.KERNEL32(?,000007D0,?,?,?,?,00000000,04547F38,000000FF,0453E225,?), ref: 04540401
          • TerminateThread.KERNEL32(?,00000000,?,?,?,?,00000000,04547F38,000000FF,0453E225,?), ref: 0454040D
          • DisconnectNamedPipe.KERNEL32(?,?,?,?,?,00000000,04547F38,000000FF,0453E225,?), ref: 0454041D
          • DisconnectNamedPipe.KERNEL32(?,?,?,?,?,00000000,04547F38,000000FF,0453E225,?), ref: 04540427
          • DisconnectNamedPipe.KERNEL32(?,?,?,?,?,00000000,04547F38,000000FF,0453E225,?), ref: 04540431
          • DisconnectNamedPipe.KERNEL32(?,?,?,?,?,00000000,04547F38,000000FF,0453E225,?), ref: 0454043B
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: DisconnectNamedPipeTerminate$Thread$AddressLibraryLoadObjectProcProcessSingleWait
          • String ID: CloseHandle$kernel32.dll
          • API String ID: 2122371937-3978267401
          • Opcode ID: 7d6589618ac96eeeb5cd3ac99c00cf32191502a7ca94c95362d79721af511949
          • Instruction ID: d83b2c485d12b0937ab8de62d9aa4cb823f2598959fb43c4d02f727139ff8ead
          • Opcode Fuzzy Hash: 7d6589618ac96eeeb5cd3ac99c00cf32191502a7ca94c95362d79721af511949
          • Instruction Fuzzy Hash: 1131AB75600B40ABD620DB7ADC85F17F3E8BF98A11F544A1DF24AD3690CA78F8059B64
          APIs
          • LoadLibraryW.KERNEL32 ref: 0453B2ED
          • LoadLibraryW.KERNEL32(00000000,InitializeCriticalSection), ref: 0453B2FB
          • GetProcAddress.KERNEL32(00000000), ref: 0453B2FE
          • FreeLibrary.KERNEL32(00000000), ref: 0453B30B
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: Library$Load$AddressFreeProc
          • String ID: .$2$3$InitializeCriticalSection$d$k$n$r
          • API String ID: 2632591731-2400524468
          • Opcode ID: 9a4e13b79db5dc4f0c91bf3811215d6762a7f0737349e9ca86bdbe5b933dbdc4
          • Instruction ID: 523d453a31c9734b5883308c9bf6c4284fbc39377d8da0704af686b83629e609
          • Opcode Fuzzy Hash: 9a4e13b79db5dc4f0c91bf3811215d6762a7f0737349e9ca86bdbe5b933dbdc4
          • Instruction Fuzzy Hash: 7C1127651287419BC310EF65D84494BB7F5FF88705F009D1EE59AD3221E3B9960CCBAB
          APIs
          • LoadLibraryW.KERNEL32(ADVAPI32.dll,?,?,?,0000011C,?,?,?,?,04549970,?,00000000), ref: 04540649
          • GetProcAddress.KERNEL32(00000000,RegQueryValueExW), ref: 0454065D
          • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 04540667
          • GetProcAddress.KERNEL32(00000000,RegOpenKeyW), ref: 04540671
          • FreeLibrary.KERNEL32(00000000,?,?,?,?,04549970,?,00000000), ref: 045406AD
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$Library$FreeLoad
          • String ID: ADVAPI32.dll$HARDWARE\DESCRIPTION\System\CentralProcessor\0$RegCloseKey$RegOpenKeyW$RegQueryValueExW$~MHz
          • API String ID: 2449869053-3996806929
          • Opcode ID: 118d03c6b9125c4c8640605c49c3723a0e597056d627a07289f33c3aa0b084a1
          • Instruction ID: fa4318cbd346e6b4d428b3e00223d097eec25dae5fc78fe14b5094a62986551b
          • Opcode Fuzzy Hash: 118d03c6b9125c4c8640605c49c3723a0e597056d627a07289f33c3aa0b084a1
          • Instruction Fuzzy Hash: FB0180716407156BD300EBB9DC45DABB7E8FFC5601F00491AB940A3201E674F909DAA6
          APIs
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: atoi$DebugOutputString$strchrstrncpy$wcstombs
          • String ID:
          • API String ID: 2034632737-0
          • Opcode ID: 49fcbc0ab35dc065ad987768bb227c822030831cc73aa4866838467f52cf9632
          • Instruction ID: b9d664c4ee3e99bbe3752fe86e0eebfdd080c67bd67316492444990cbd7ea4b6
          • Opcode Fuzzy Hash: 49fcbc0ab35dc065ad987768bb227c822030831cc73aa4866838467f52cf9632
          • Instruction Fuzzy Hash: B851D3761006049FD314DF78E8459AA77D8FB84321F504A2EF962C32D1EE7AEA0D8B51
          APIs
          • GetSystemDirectoryW.KERNEL32(?,00000230), ref: 0453DFBF
          • lstrcatW.KERNEL32(?,\KB1035627.dat), ref: 0453DFCF
          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0453DFEA
          • GetFileSize.KERNEL32(00000000,00000000), ref: 0453DFFE
          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0453E007
          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0453E01A
          • mbstowcs.MSVCRT ref: 0453E058
          • ??3@YAXPAX@Z.MSVCRT(00000000,?), ref: 0453E079
          • CloseHandle.KERNEL32(00000000), ref: 0453E083
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: File$??2@??3@CloseCreateDirectoryHandleReadSizeSystemlstrcatmbstowcs
          • String ID: \KB1035627.dat
          • API String ID: 2808364958-3026359696
          • Opcode ID: 3fc7f02cb3f6c9b03430ab32f536645ae78125763a85ee853ada7755908ef77b
          • Instruction ID: 562118e023b5a0865a36f55f5d7cd128e1d1e79cd3f97e84f8f3baaccaf83fd5
          • Opcode Fuzzy Hash: 3fc7f02cb3f6c9b03430ab32f536645ae78125763a85ee853ada7755908ef77b
          • Instruction Fuzzy Hash: 0021D671504654AFE3209B34EC88FAB7BECFBC8755F000A29F949D6241E635AD0CD7A2
          APIs
          • LoadLibraryW.KERNEL32(user32.dll,00000000,00000000,?,?), ref: 0454191F
          • GetProcAddress.KERNEL32(00000000,SetThreadDesktop), ref: 04541933
          • GetProcAddress.KERNEL32(00000000,GetThreadDesktop), ref: 0454193D
          • GetCurrentThreadId.KERNEL32 ref: 04541941
          • GetUserObjectInformationW.USER32(?,00000002,?,00000100,?,?,?), ref: 04541965
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$CurrentInformationLibraryLoadObjectThreadUser
          • String ID: GetThreadDesktop$SetThreadDesktop$user32.dll
          • API String ID: 813802599-2914630085
          • Opcode ID: e06580283c3d398941ec5a671d0302dbbb54819599c03abf3028795f92b3261e
          • Instruction ID: 7d70972a31bd609863b29d5e86ba11a589f421536b2b0805fdc3f3fc55478475
          • Opcode Fuzzy Hash: e06580283c3d398941ec5a671d0302dbbb54819599c03abf3028795f92b3261e
          • Instruction Fuzzy Hash: 2C01D23630061467D32027A5BC89AFB775CFBC0B62F440022FA05C2200EABE6849A5B5
          APIs
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: CharNext$free$AttributesCreateDirectoryErrorFileLastlstrcpylstrlenmalloc
          • String ID:
          • API String ID: 3289936468-0
          • Opcode ID: 4d7e206350e7f8c44a67a3ede79ad687f67e37954960538332cd2632c3b82a24
          • Instruction ID: 4b873528d2ad3c247628b5b5ecb371172b970382d489949294f93baa780add2b
          • Opcode Fuzzy Hash: 4d7e206350e7f8c44a67a3ede79ad687f67e37954960538332cd2632c3b82a24
          • Instruction Fuzzy Hash: 1B41C6BAC00215DFCB22EF58D8047EABBB4FF45752F404269E955B7380E7382941EBA5
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: CancelEventExchangeInterlockedclosesocketsetsockopt
          • String ID: bad Allocate$bad buffer
          • API String ID: 1486965892-2913219628
          • Opcode ID: 3f9736546ecb0dd5b3160662e0339b208d037a8ff8b9a78ca0bce8f85d8419c5
          • Instruction ID: e46193f2faf549c3606a1b7e2568116502b40e1f831c88d6bfd6d855d9ffddfd
          • Opcode Fuzzy Hash: 3f9736546ecb0dd5b3160662e0339b208d037a8ff8b9a78ca0bce8f85d8419c5
          • Instruction Fuzzy Hash: 7851B872A00509ABDF14EF64D850BEF77B5FFC8619F008429E909AB341DB34B905DBA1
          APIs
            • Part of subcall function 0453C3D0: setsockopt.WS2_32(?,0000FFFF,00000080,00000000,00000004), ref: 0453C3FA
            • Part of subcall function 0453C3D0: CancelIo.KERNEL32(?), ref: 0453C407
            • Part of subcall function 0453C3D0: InterlockedExchange.KERNEL32(?,00000000), ref: 0453C416
            • Part of subcall function 0453C3D0: closesocket.WS2_32(?), ref: 0453C423
            • Part of subcall function 0453C3D0: SetEvent.KERNEL32(?), ref: 0453C430
          • ResetEvent.KERNEL32(?,04549908,safebrow.flnet.org,?,00000000,?,?,?,?,?,?,0454133F,safebrow.flnet.org,?), ref: 0453BF35
          • socket.WS2_32(00000002,00000001,00000006), ref: 0453BF48
          • gethostbyname.WS2_32(?), ref: 0453BF6A
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: Event$CancelExchangeInterlockedResetclosesocketgethostbynamesetsockoptsocket
          • String ID: safebrow.flnet.org
          • API String ID: 513860241-719919387
          • Opcode ID: 97d38a8b3393e0cffff465f50d3771d2e2403501e89cd0c0608f49e7a7cc1ecd
          • Instruction ID: 706c06a409a4a95b01fe6e9a5e06f3e5de88385933908acdf211c71b8b225962
          • Opcode Fuzzy Hash: 97d38a8b3393e0cffff465f50d3771d2e2403501e89cd0c0608f49e7a7cc1ecd
          • Instruction Fuzzy Hash: C54127323447007BD3209F65EC85F9BB7A4FF89756F004509F6859B281D7B6B8489B61
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: DebugExecExitOutputProcessStringsprintfstrstrwcstombs
          • String ID: cmd.exe /c %s$killme
          • API String ID: 587452862-2010447487
          • Opcode ID: 7c123baca2cbccf7d36db8565c6772c1bc699b0efe23dc42c4925a817f0d6f00
          • Instruction ID: 8d15d10acc6dd80d360004a77fd3bb91295da8138f53a60e6722f7d83df4e6ff
          • Opcode Fuzzy Hash: 7c123baca2cbccf7d36db8565c6772c1bc699b0efe23dc42c4925a817f0d6f00
          • Instruction Fuzzy Hash: 8211C835108B81BBD3209774DC05B9B77A8FB84747F00482CE689C2280E7B99B1CDF92
          APIs
          • GetSystemDirectoryW.KERNEL32(?,00000230), ref: 04540E96
          • lstrcatW.KERNEL32(?,\KB1035627.dat), ref: 04540EA8
          • CreateFileW.KERNEL32(?,40000000,00000002,00000000,00000002,00000080,00000000), ref: 04540EC7
          • ??2@YAPAXI@Z.MSVCRT ref: 04540EE3
          • WriteFile.KERNEL32(045413B4,00000000,?,?,00000000), ref: 04540F18
          • CloseHandle.KERNEL32(045413B4,?,?,00000000), ref: 04540F21
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: File$??2@CloseCreateDirectoryHandleSystemWritelstrcat
          • String ID: \KB1035627.dat
          • API String ID: 476129920-3026359696
          • Opcode ID: fdd9fabc6de839c83a2d0e27fe231ed995e01df95ef28cbd84f92e7678490f2d
          • Instruction ID: a4b05a461c7beb0e2199c38387534cf451c70a8fa9d01d3e320d62650e03afe1
          • Opcode Fuzzy Hash: fdd9fabc6de839c83a2d0e27fe231ed995e01df95ef28cbd84f92e7678490f2d
          • Instruction Fuzzy Hash: DE110471540218BFEB10ABB8DC4DFEE7B78FB44366F10426AF501AA1D1DA74AE44DB60
          APIs
          • LoadLibraryW.KERNEL32(user32.dll,?,?,045416A9,00000000), ref: 045419B7
          • GetProcAddress.KERNEL32(00000000,OpenInputDesktop), ref: 045419C5
          • OpenDesktopW.USER32(?,00000000,00000000,400001CF), ref: 045419DD
            • Part of subcall function 04541910: LoadLibraryW.KERNEL32(user32.dll,00000000,00000000,?,?), ref: 0454191F
            • Part of subcall function 04541910: GetProcAddress.KERNEL32(00000000,SetThreadDesktop), ref: 04541933
            • Part of subcall function 04541910: GetProcAddress.KERNEL32(00000000,GetThreadDesktop), ref: 0454193D
            • Part of subcall function 04541910: GetCurrentThreadId.KERNEL32 ref: 04541941
            • Part of subcall function 04541910: GetUserObjectInformationW.USER32(?,00000002,?,00000100,?,?,?), ref: 04541965
          • CloseDesktop.USER32(00000000), ref: 045419FE
          • FreeLibrary.KERNEL32(00000000), ref: 04541A0E
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: AddressLibraryProc$DesktopLoad$CloseCurrentFreeInformationObjectOpenThreadUser
          • String ID: OpenInputDesktop$user32.dll
          • API String ID: 1994081172-2568742042
          • Opcode ID: 5631214a15a03c3d466a46feffc91e68ee3c8c3e10717b5cd0186df41d2f0ec9
          • Instruction ID: 90dd155b6a71b3fcb12646e769ec8c737c62923944a13849d5c68158eee8d0d9
          • Opcode Fuzzy Hash: 5631214a15a03c3d466a46feffc91e68ee3c8c3e10717b5cd0186df41d2f0ec9
          • Instruction Fuzzy Hash: 7BF0F63A200E207BE75126BAB80CBEE3715FBC162AF004125F906DA144E734AC82A0A5
          APIs
          • lstrcpyW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0453D21D
          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,?,?), ref: 0453D236
          • GetFileSize.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?), ref: 0453D255
          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?), ref: 0453D260
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?), ref: 0453D267
          • LocalAlloc.KERNEL32(00000040,0000000B,?,?,?,?,?,?), ref: 0453D274
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?), ref: 0453D2A2
          • LocalFree.KERNEL32(00000000,?,?,?,?,?,?), ref: 0453D2CB
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: FileLocallstrlen$AllocCloseCreateFreeHandleSizelstrcpy
          • String ID:
          • API String ID: 4036129025-0
          • Opcode ID: 1ad3227f3cc6eb37595f2f2f03aba8c12e1b9eff082a8ccf1699a1e53c6fa49a
          • Instruction ID: a943f5dc4550c8b4ca201074a89c91a4cd649b08d965b995148e5a0fa866c94e
          • Opcode Fuzzy Hash: 1ad3227f3cc6eb37595f2f2f03aba8c12e1b9eff082a8ccf1699a1e53c6fa49a
          • Instruction Fuzzy Hash: E421F131200614AFD714DF38EC49FABB7E9FB88716F044429F606D7380DA75A909CB61
          APIs
          • ?_Xran@std@@YAXXZ.MSVCP60(?,?,?,00000000,?,-00000008,04547E51,000000FF,0453D4EA,-00000008,?,?,?), ref: 0453DC6E
          • ?_Split@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXXZ.MSVCP60(?,?,?,00000000,?,-00000008,04547E51,000000FF,0453D4EA,-00000008,?,?,?), ref: 0453DC76
          • ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z.MSVCP60(?,00000000), ref: 0453DCAD
          • ?_Eos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXI@Z.MSVCP60(?), ref: 0453DCBA
          • ?_Split@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXXZ.MSVCP60 ref: 0453DCC2
          • ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z.MSVCP60(00000001,?,?,?,00000000,?,-00000008,04547E51,000000FF,0453D4EA,-00000008,?,?,?), ref: 0453DCF9
          • ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z.MSVCP60(?,00000001,?,?,?,00000000,?,-00000008,04547E51,000000FF,0453D4EA,-00000008,?,?,?), ref: 0453DD3A
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: G@2@@std@@G@std@@U?$char_traits@V?$allocator@$Grow@?$basic_string@Split@?$basic_string@$Eos@?$basic_string@Tidy@?$basic_string@Xran@std@@
          • String ID:
          • API String ID: 2613176527-0
          • Opcode ID: a46259817e5167c4053ad3059cbd10e5029b6c5408540c4950602e80101a4a64
          • Instruction ID: b6f6413a3c7c49a1f92644e57114c2a6ed6dba4fc7d3cc185a27b1b52c3ebed0
          • Opcode Fuzzy Hash: a46259817e5167c4053ad3059cbd10e5029b6c5408540c4950602e80101a4a64
          • Instruction Fuzzy Hash: 9941AF71600B049FC720CF29D484AAAF7F2FB88B12F54896DE4568B751DB75BC09EB50
          APIs
          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,0453C90C,00000001), ref: 0453D314
            • Part of subcall function 0453D3C0: ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z.MSVCP60(00000001,00000000,00000000,0453D3A6,?,?,?,?,0453C90C,00000001), ref: 0453D3DD
            • Part of subcall function 0453D3C0: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,0453C90C,00000001), ref: 0453D3E4
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: ??3@CreateFileG@2@@std@@G@std@@Tidy@?$basic_string@U?$char_traits@V?$allocator@
          • String ID:
          • API String ID: 1686836073-0
          • Opcode ID: 3ba8424a4f9e5889252292cd1adc226ce432f6893098b4df143e88332e6072b4
          • Instruction ID: 79ff3ab1bd5d4e0ad8dce76ceee0c58f14f20b57253a8fb6ce8539b105b68cc3
          • Opcode Fuzzy Hash: 3ba8424a4f9e5889252292cd1adc226ce432f6893098b4df143e88332e6072b4
          • Instruction Fuzzy Hash: BB21C176300601ABE310DBB4EC88F5AB7A8FBC5722F10852AF704DB280D675A8089771
          APIs
            • Part of subcall function 0453B660: EnterCriticalSection.KERNEL32(?,?,?,0453C467,?,?,?,7595F860,?,04540E26,?,00000380), ref: 0453B668
            • Part of subcall function 0453B660: LeaveCriticalSection.KERNEL32(?,00000400,?,04540E26,?,00000380), ref: 0453B681
          • _ftol.MSVCRT ref: 0453C48F
          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0453C499
          • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,7595F860,?,04540E26,?,00000380), ref: 0453C4CE
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: CriticalSection$??2@??3@EnterLeave_ftol
          • String ID:
          • API String ID: 2245774403-0
          • Opcode ID: 375019e7025dcd4055817ba78f19c08573c8a8ccfff5577bf2e218db7470b539
          • Instruction ID: 7c20b857e1aae745544af9c4808df8322ea1ca4474e43077b3837d67b54eeb43
          • Opcode Fuzzy Hash: 375019e7025dcd4055817ba78f19c08573c8a8ccfff5577bf2e218db7470b539
          • Instruction Fuzzy Hash: 6F4183727047095BE704FE249C41A7F7399FBC8619F40092DE945A7282EB35F909A7A2
          APIs
          • OutputDebugStringW.KERNEL32(?), ref: 0453C83A
          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0453C85A
          • GetFileSize.KERNEL32(00000000,00000000), ref: 0453C86A
          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0453C873
          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0453C887
          • CloseHandle.KERNEL32(00000000), ref: 0453C893
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: File$??2@CloseCreateDebugHandleOutputReadSizeString
          • String ID:
          • API String ID: 2966346487-0
          • Opcode ID: 18a4223280c5f3b4f23a0f221bbdc01be8baa09b79327ebb67d0f14bc2130092
          • Instruction ID: b6482d97afb48bf4af598527cd653728ef1f7f114941b54811b170a949166184
          • Opcode Fuzzy Hash: 18a4223280c5f3b4f23a0f221bbdc01be8baa09b79327ebb67d0f14bc2130092
          • Instruction Fuzzy Hash: 4EF0A435501624BBE3106B34EC0DFEE366CFB46722F104214FD04E62C0D7B42E0596E5
          APIs
          • mbstowcs.MSVCRT ref: 04540F9B
            • Part of subcall function 04541A20: InternetOpenW.WININET(Mozilla/4.0 (compatible),00000000,00000000,00000000,00000000), ref: 04541A46
          • CreateProcessW.KERNEL32(00000000,c:\windows\httpd.exe,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 04540FE2
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: CreateInternetOpenProcessmbstowcs
          • String ID: D$WinSta0\Default$c:\windows\httpd.exe
          • API String ID: 3372342612-3967429356
          • Opcode ID: af18fac6a1b1e1c6c3864b332827d6ef00f81abc67908b0e34b12379f252a575
          • Instruction ID: 7d1158979bf3f5fcf8fcac5e85aac4c6943113825a8f42aa4dbd1689b126be22
          • Opcode Fuzzy Hash: af18fac6a1b1e1c6c3864b332827d6ef00f81abc67908b0e34b12379f252a575
          • Instruction Fuzzy Hash: CA11C4B7800118ABEB509AF4DD09BEB77ECFB44355F108536F505E32C1DA78AE098B60
          APIs
          • CreateFileW.KERNEL32(00000021,40000000,00000002,00000000,00000003,00000080,00000000,?,00000001), ref: 0453DA7C
          • SetFilePointer.KERNEL32(00000000,?,?,00000000,?,00000001), ref: 0453DA8D
          • WriteFile.KERNEL32(00000000,?,?,?,00000000,?,00000001), ref: 0453DAA7
          • CloseHandle.KERNEL32(00000000,?,00000001), ref: 0453DAAE
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: File$CloseCreateHandlePointerWrite
          • String ID: p
          • API String ID: 3604237281-2181537457
          • Opcode ID: f97319f2a44fb02c7aac776eeeb7715abf4270c24439769474ba1b699b68f0d8
          • Instruction ID: 3e92ee9dcddbe8ba35c252ec74b0d8b66eba0b10d3b4305e2873a3d8141adbd5
          • Opcode Fuzzy Hash: f97319f2a44fb02c7aac776eeeb7715abf4270c24439769474ba1b699b68f0d8
          • Instruction Fuzzy Hash: C311C271644701ABD300DF64DC45F6BB7E8FBD9755F040A0DF644962C0D7B4A9098B62
          APIs
          • wsprintfW.USER32 ref: 04540A27
            • Part of subcall function 0453FA30: LoadLibraryW.KERNEL32(ADVAPI32.dll,0453153C,?,?), ref: 0453FA86
            • Part of subcall function 0453FA30: GetProcAddress.KERNEL32(00000000,RegQueryValueExW), ref: 0453FAA0
            • Part of subcall function 0453FA30: GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 0453FAAE
            • Part of subcall function 0453FA30: GetProcAddress.KERNEL32(00000000,RegEnumValueW), ref: 0453FABC
            • Part of subcall function 0453FA30: GetProcAddress.KERNEL32(00000000,RegEnumKeyExW), ref: 0453FACA
            • Part of subcall function 0453FA30: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 0453FAD8
            • Part of subcall function 0453FA30: FreeLibrary.KERNEL32(00000000), ref: 0453FEAE
          • lstrlenW.KERNEL32(?), ref: 04540A53
          • lstrlenW.KERNEL32(?), ref: 04540A5F
          Strings
          • SOFTWARE\Microsoft\Windows\CurrentVersion\Setup, xrefs: 04540A06
          • Host, xrefs: 04540A39
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$Librarylstrlen$FreeLoadwsprintf
          • String ID: Host$SOFTWARE\Microsoft\Windows\CurrentVersion\Setup
          • API String ID: 4274792114-3116824957
          • Opcode ID: c64c7848ab5d1083727e87f49810f17af0b15c1c14cc7a271ec54d28a376f82f
          • Instruction ID: 713a2643b15d38e8bd0cf01951137416ad7dc599154a91d21e45b0add872d944
          • Opcode Fuzzy Hash: c64c7848ab5d1083727e87f49810f17af0b15c1c14cc7a271ec54d28a376f82f
          • Instruction Fuzzy Hash: C60126327002043BE714A624DC02FAB72C9FFC8610F400439F645A3280D975AD099FE2
          APIs
          • LoadLibraryW.KERNEL32(avicap32.dll,?,?,?,7595F860), ref: 045406D1
          • GetProcAddress.KERNEL32(00000000,capGetDriverDescriptionW), ref: 045406DF
          • FreeLibrary.KERNEL32(00000000), ref: 0454070E
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: Library$AddressFreeLoadProc
          • String ID: avicap32.dll$capGetDriverDescriptionW
          • API String ID: 145871493-1031773666
          • Opcode ID: d2eb23098f550bb95f40ecf12a4acb3dcbd4c4279182a3adb4eb7447a91c27ee
          • Instruction ID: 6baa1cee2b39cab63133546a2a2e135d7b7d04667d3f7abda13db8592b36cbab
          • Opcode Fuzzy Hash: d2eb23098f550bb95f40ecf12a4acb3dcbd4c4279182a3adb4eb7447a91c27ee
          • Instruction Fuzzy Hash: 59F0E932181A147FD2206A71AC45EFB374CFB87615F044112FE5293181A66D340CD9F1
          APIs
          • CreateMutexA.KERNEL32(00000000,00000001,UpdateWindow,?,04541073), ref: 04540FFB
          • GetLastError.KERNEL32(?,04541073), ref: 04541003
          • ReleaseMutex.KERNEL32(00000000,?,04541073), ref: 04541016
          • ExitProcess.KERNEL32 ref: 0454101E
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: Mutex$CreateErrorExitLastProcessRelease
          • String ID: UpdateWindow
          • API String ID: 1221886886-2116364557
          • Opcode ID: b04687bf8143210ba7181ea94884352f9c47ec5b6c66fe6b13255ac8c774f7a4
          • Instruction ID: 9eaf2149a63ddef193acb02d6eec7d4ced96471b00069854f1b1481868cac072
          • Opcode Fuzzy Hash: b04687bf8143210ba7181ea94884352f9c47ec5b6c66fe6b13255ac8c774f7a4
          • Instruction Fuzzy Hash: 28D05E34544660ABD7642770B84DB8D3A61FB8971BF040400F20DDD184C7686C84AAA1
          APIs
          • Sleep.KERNEL32(00000064), ref: 04540501
          • PeekNamedPipe.KERNEL32(?,?,00000800,00000000,?,00000000), ref: 04540521
          • LocalAlloc.KERNEL32(00000040,?), ref: 04540543
          • ReadFile.KERNEL32(?,00000000,?,?,00000000), ref: 0454055C
          • LocalFree.KERNEL32(00000000), ref: 04540570
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: Local$AllocFileFreeNamedPeekPipeReadSleep
          • String ID:
          • API String ID: 407041184-0
          • Opcode ID: 5b95965c06044991b21bd8926102ebabe1022281f626ebedda0424d07290ba0e
          • Instruction ID: 135d202ced207a706d1447f6a0a758e731ddffdc783c764c855b7d825e70b0ca
          • Opcode Fuzzy Hash: 5b95965c06044991b21bd8926102ebabe1022281f626ebedda0424d07290ba0e
          • Instruction Fuzzy Hash: 79111671204356ABE744DF64D985FABB7E9FFC8740F00492CB645D7280DB74E9089BA2
          APIs
          • setsockopt.WS2_32(?,0000FFFF,00000080,00000000,00000004), ref: 0453C3FA
          • CancelIo.KERNEL32(?), ref: 0453C407
          • InterlockedExchange.KERNEL32(?,00000000), ref: 0453C416
          • closesocket.WS2_32(?), ref: 0453C423
          • SetEvent.KERNEL32(?), ref: 0453C430
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: CancelEventExchangeInterlockedclosesocketsetsockopt
          • String ID:
          • API String ID: 1486965892-0
          • Opcode ID: 236adaee9366af3630331a8e3338e1cd65840848571e214ec1ed7608c796c998
          • Instruction ID: d722a33b5afc6db8ec8dcd1bbe668e8ee41545d06da213a82c80e59ab39b75dd
          • Opcode Fuzzy Hash: 236adaee9366af3630331a8e3338e1cd65840848571e214ec1ed7608c796c998
          • Instruction Fuzzy Hash: 1EF01275204B01EFD7548B70D848F97B7A8FF49712F108A1DF69A86380CB74A84C9766
          APIs
            • Part of subcall function 0453B270: LoadLibraryW.KERNEL32 ref: 0453B2ED
            • Part of subcall function 0453B270: LoadLibraryW.KERNEL32(00000000,InitializeCriticalSection), ref: 0453B2FB
            • Part of subcall function 0453B270: GetProcAddress.KERNEL32(00000000), ref: 0453B2FE
            • Part of subcall function 0453B270: FreeLibrary.KERNEL32(00000000), ref: 0453B30B
          • WSAStartup.WS2_32(00000202,?), ref: 0453B7ED
          • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 0453B7FB
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: Library$Load$AddressCreateEventFreeProcStartup
          • String ID: H$P
          • API String ID: 358607388-457946424
          • Opcode ID: c44528ba4bd0da7459f7f57d402f4b3e25804232e376f9419de337f72f170329
          • Instruction ID: fe3af0e3bd5f8e434ca3993bcc021080cd54ef9d27c88d1c0bd455ab205098ca
          • Opcode Fuzzy Hash: c44528ba4bd0da7459f7f57d402f4b3e25804232e376f9419de337f72f170329
          • Instruction Fuzzy Hash: D9216D30109780DEE321DB68C505BDBBBE4AB96B05F04895DE4ED473C2C7B4A408DB63
          APIs
          • wsprintfW.USER32 ref: 0453E364
          • lstrlenW.KERNEL32(?,00000000), ref: 0453E377
            • Part of subcall function 0453FF30: LoadLibraryW.KERNEL32(ADVAPI32.dll), ref: 0453FF5F
            • Part of subcall function 0453FF30: GetProcAddress.KERNEL32(00000000,RegCreateKeyExW), ref: 0453FF73
            • Part of subcall function 0453FF30: GetProcAddress.KERNEL32(00000000,RegSetValueExW), ref: 0453FF7E
            • Part of subcall function 0453FF30: GetProcAddress.KERNEL32(00000000,RegDeleteKeyW), ref: 0453FF89
            • Part of subcall function 0453FF30: GetProcAddress.KERNEL32(00000000,RegDeleteValueW), ref: 0453FF94
            • Part of subcall function 0453FF30: GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 0453FF9F
            • Part of subcall function 0453FF30: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 0453FFA9
          Strings
          • SOFTWARE\Microsoft\Windows\CurrentVersion\Setup, xrefs: 0453E353
          • Host, xrefs: 0453E387
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$LibraryLoadlstrlenwsprintf
          • String ID: Host$SOFTWARE\Microsoft\Windows\CurrentVersion\Setup
          • API String ID: 2349312171-3116824957
          • Opcode ID: 3051b483af7374f6b29501cf45472c93f73a2fe3be67ea4b103cb134f5975f2b
          • Instruction ID: b00d4b6caf13f73ad2ff6cecf8066125658bcf584b5281e01586c91a178c7fbd
          • Opcode Fuzzy Hash: 3051b483af7374f6b29501cf45472c93f73a2fe3be67ea4b103cb134f5975f2b
          • Instruction Fuzzy Hash: 45F0EC3BA402107BE3106764EC0AFD73B98FFC0715F004425F94592141E574651CCFE2
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: fee80f019050e072498d8c07f4e1f509c2f00c9a43e7fdd479e7cd75914adb14
          • Instruction ID: 39ce41909eba9128f37398d9f53ef56f17e443e039eeb54284d4a97c7ef68c6f
          • Opcode Fuzzy Hash: fee80f019050e072498d8c07f4e1f509c2f00c9a43e7fdd479e7cd75914adb14
          • Instruction Fuzzy Hash: DD31A6723016126BE6149B69E884FBBB75CFFD836AF00443AF600DA640DB61F855D7A0
          APIs
          • lstrlenW.KERNEL32(?,?), ref: 0453D462
          • wcslen.MSVCRT ref: 0453D4A9
          • ?assign@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PBGI@Z.MSVCP60(?,00000000), ref: 0453D4B8
            • Part of subcall function 0453D570: lstrlenW.KERNEL32(?,?,?,?), ref: 0453D5A8
            • Part of subcall function 0453D570: wsprintfW.USER32 ref: 0453D5DC
            • Part of subcall function 0453D570: FindFirstFileW.KERNEL32(?,?), ref: 0453D5F2
            • Part of subcall function 0453D7C0: ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,0453D48C,?), ref: 0453D804
            • Part of subcall function 0453D7C0: ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,0453D48C,?), ref: 0453D815
            • Part of subcall function 0453D7C0: ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,0453D48C,?), ref: 0453D826
            • Part of subcall function 0453D7C0: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,0453D48C,?), ref: 0453D851
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: G@2@@std@@G@std@@U?$char_traits@V?$allocator@$Refcnt@?$basic_string@$lstrlen$??3@?assign@?$basic_string@FileFindFirstV12@wcslenwsprintf
          • String ID:
          • API String ID: 2478117631-0
          • Opcode ID: b4f4837272e250a86b016553b4934e60d9dff020245af197fd45f0843938bacb
          • Instruction ID: 8eaf321de9acbd70df24cf3aad755c43bf1763d2276b7e141f2d32ec2bdc3512
          • Opcode Fuzzy Hash: b4f4837272e250a86b016553b4934e60d9dff020245af197fd45f0843938bacb
          • Instruction Fuzzy Hash: 0331ADB16047469FC700DF28D880A6BBBF4FF88219F404A2DE4A987351D734E91DDBA2
          APIs
          • ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z.MSVCP60(00000001,?,?,?,?,?,?,?,?,?,?,000000FF,0453C718), ref: 0453C782
          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,000000FF,0453C718), ref: 0453C789
          • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,000000FF,0453C718), ref: 0453C7DF
          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,000000FF,0453C718), ref: 0453C7F6
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: ??3@$G@2@@std@@G@std@@Tidy@?$basic_string@U?$char_traits@V?$allocator@
          • String ID:
          • API String ID: 4114290161-0
          • Opcode ID: c286439e3aaddba1525f4a70ab5626f434fb9c1ff1ef4d16febca4bf707758c3
          • Instruction ID: ebeea96431ab532c5db3e61e085bb61d6df0b09150391602ecf8504976b7044b
          • Opcode Fuzzy Hash: c286439e3aaddba1525f4a70ab5626f434fb9c1ff1ef4d16febca4bf707758c3
          • Instruction Fuzzy Hash: 39315275600A029FC710DF19D480A56FBF0FB89714F004A2DE55A8B791E731B994CBA2
          APIs
          • ceil.MSVCRT ref: 0453B4FC
          • _ftol.MSVCRT ref: 0453B505
          • VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000004,?,?,?,?,?,?,?,?,?,00000380), ref: 0453B519
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: AllocVirtual_ftolceil
          • String ID:
          • API String ID: 3317677364-0
          • Opcode ID: 6bcd0596ae2ce0b876fda8041cba7ec359853c1d990c54372beb563e984e5b26
          • Instruction ID: fc433e9f22ed3dfbfe60f218be6985b813fbbc0c728a9dbb710bba019cb07da9
          • Opcode Fuzzy Hash: 6bcd0596ae2ce0b876fda8041cba7ec359853c1d990c54372beb563e984e5b26
          • Instruction Fuzzy Hash: 5C11D5716043048BD704EF29BC4171AB7E5FBC4366F00843EED458B381EA75A80CDB65
          APIs
          • ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,0453D48C,?), ref: 0453D804
          • ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,0453D48C,?), ref: 0453D815
          • ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,0453D48C,?), ref: 0453D826
          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,0453D48C,?), ref: 0453D851
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: G@2@@std@@G@std@@Refcnt@?$basic_string@U?$char_traits@V?$allocator@$??3@
          • String ID:
          • API String ID: 1249008704-0
          • Opcode ID: 82b4f8276236f857301c0e9baff5a36cb070526a52d0cb4c5709244d54e63ad2
          • Instruction ID: 7e977cf09a82c5c16c24e0270756fa4a9adc5cffe4f4c32a5bfb6d8ba0501ad9
          • Opcode Fuzzy Hash: 82b4f8276236f857301c0e9baff5a36cb070526a52d0cb4c5709244d54e63ad2
          • Instruction Fuzzy Hash: 0D21E4B46006019FD718DF29D98492ABBF5FB89711B008569E85A8B781EB30FC65DBA0
          APIs
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: _ftolceil
          • String ID:
          • API String ID: 2006273141-0
          • Opcode ID: a0002c1a1cf7582cf9a9d2b3e2c990a00ae9bd5d9b51312e6baf806325e649ae
          • Instruction ID: 3e026cafa79216bf32046c60376faf2f3f35276054bc74208f53265579bc2fc7
          • Opcode Fuzzy Hash: a0002c1a1cf7582cf9a9d2b3e2c990a00ae9bd5d9b51312e6baf806325e649ae
          • Instruction Fuzzy Hash: 6F11D2706082058BD700EF35A88162ABBE1FBC4756F00842DEA458B341EA36A818DBB6
          APIs
          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0453B8BC
          • CloseHandle.KERNEL32(?), ref: 0453B8DF
          • CloseHandle.KERNEL32(?), ref: 0453B8E8
          • WSACleanup.WS2_32 ref: 0453B8EA
            • Part of subcall function 0453C3D0: setsockopt.WS2_32(?,0000FFFF,00000080,00000000,00000004), ref: 0453C3FA
            • Part of subcall function 0453C3D0: CancelIo.KERNEL32(?), ref: 0453C407
            • Part of subcall function 0453C3D0: InterlockedExchange.KERNEL32(?,00000000), ref: 0453C416
            • Part of subcall function 0453C3D0: closesocket.WS2_32(?), ref: 0453C423
            • Part of subcall function 0453C3D0: SetEvent.KERNEL32(?), ref: 0453C430
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: CloseHandle$CancelCleanupEventExchangeInterlockedObjectSingleWaitclosesocketsetsockopt
          • String ID:
          • API String ID: 136543108-0
          • Opcode ID: 96e470565917bb4ff9a4c0d3ec4227d3cdefcfeb0bffc6e84fbdb40b54cf1c95
          • Instruction ID: 2698c2df61def225f6dd5ce8c1edf3737720dd2d2b774af6f7f94e817a258f9e
          • Opcode Fuzzy Hash: 96e470565917bb4ff9a4c0d3ec4227d3cdefcfeb0bffc6e84fbdb40b54cf1c95
          • Instruction Fuzzy Hash: FE116D35108B919FD311DF28C444B9AB7E4BF95725F004A0DE4AA432C1CBB8B9099BA3
          APIs
          • InterlockedExchange.KERNEL32(?,00000001), ref: 0453E84C
          • OutputDebugStringA.KERNEL32(COMMAND_GETINFO), ref: 0453E889
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: DebugExchangeInterlockedOutputString
          • String ID: COMMAND_GETINFO
          • API String ID: 4170579539-405466798
          • Opcode ID: ae51782a178fe3c53bd942dd54ac4cd9977beb9c861e02829b424cb9c8522f6b
          • Instruction ID: b781c5b6cbe5d8890577cca9594d92af0165799331279c11f29d0fc3e09e4b8e
          • Opcode Fuzzy Hash: ae51782a178fe3c53bd942dd54ac4cd9977beb9c861e02829b424cb9c8522f6b
          • Instruction Fuzzy Hash: 863103737842006BF290E718BC03FE37384BBA4B0BF058829F98A4A182D5913C55D7A1
          APIs
          • EnterCriticalSection.KERNEL32(?,00000000,?,?,?,0453C2B9,?,00000005,00000005,00000000,?,?,?,?,?), ref: 0453B3FE
          • LeaveCriticalSection.KERNEL32(?,?,?,?,0453C2B9,?,00000005,00000005,00000000,?,?,?,?,?), ref: 0453B414
          • memmove.MSVCRT(00000000,?,00000000,?,?,?,?,0453C2B9,?,00000005,00000005,00000000,?,?,?,?), ref: 0453B465
          • LeaveCriticalSection.KERNEL32(?,00000000,?,?,?,0453C2B9,?,00000005,00000005,00000000,?,?,?,?,?), ref: 0453B48B
          Memory Dump Source
          • Source File: 00000003.00000002.2343292703.0000000004537000.00000040.00001000.00020000.00000000.sdmp, Offset: 04530000, based on PE: true
          • Associated: 00000003.00000002.2343292703.0000000004530000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_4530000_rundll32.jbxd
          Similarity
          • API ID: CriticalSection$Leave$Entermemmove
          • String ID:
          • API String ID: 72348100-0
          • Opcode ID: b923303915850e1b44faa3e598e159e173a8b9705b4ba10dd620b149abbf6c06
          • Instruction ID: 698a3c57abb3d8f2aab2dc637339758c0d3aa0d17fdf3500ef4c5998ded9d172
          • Opcode Fuzzy Hash: b923303915850e1b44faa3e598e159e173a8b9705b4ba10dd620b149abbf6c06
          • Instruction Fuzzy Hash: CD11C4323046198F9B04EF74AC8446FB799FF84116744443DEA43C7702EE75BD0897A4

          Execution Graph

          Execution Coverage:4.3%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:869
          Total number of Limit Nodes:1
          execution_graph 4421 4c4dec0 4422 4c4dec8 4421->4422 4423 4c4decf ??3@YAXPAX 4422->4423 4424 4c4ded8 4422->4424 4423->4424 4479 4c4e180 4480 4c4b780 6 API calls 4479->4480 4481 4c4e1a4 4480->4481 4482 4c4bf20 65 API calls 4481->4482 4483 4c4e1c3 4482->4483 4484 4c4e1f5 4483->4484 4485 4c4e1c7 4483->4485 4496 4c50100 4484->4496 4486 4c4b880 11 API calls 4485->4486 4488 4c4e1db 4486->4488 4491 4c4e214 4511 4c50390 7 API calls 4491->4511 4494 4c4b880 11 API calls 4495 4c4e239 4494->4495 4497 4c4ea10 CreateEventW 4496->4497 4498 4c50132 LoadLibraryA GetProcAddress CreatePipe 4497->4498 4499 4c501f3 CreatePipe 4498->4499 4508 4c4e203 4498->4508 4500 4c50229 GetStartupInfoW GetSystemDirectoryW lstrcatW lstrcatW CreateProcessW 4499->4500 4499->4508 4501 4c502f3 4500->4501 4500->4508 4502 4c4ea90 22 API calls 4501->4502 4503 4c50314 4502->4503 4522 4c4eb00 WaitForSingleObject Sleep 4503->4522 4505 4c5031b 4506 4c516e0 17 API calls 4505->4506 4507 4c50330 4506->4507 4509 4c516e0 17 API calls 4507->4509 4510 4c4c170 WaitForSingleObject 4508->4510 4509->4508 4510->4491 4512 4c5041c DisconnectNamedPipe 4511->4512 4513 4c5041f 4511->4513 4512->4513 4514 4c50426 DisconnectNamedPipe 4513->4514 4515 4c50429 4513->4515 4514->4515 4516 4c50430 DisconnectNamedPipe 4515->4516 4517 4c50433 4515->4517 4516->4517 4518 4c5043a DisconnectNamedPipe 4517->4518 4519 4c5043d 4517->4519 4518->4519 4523 4c4ea60 CloseHandle 4519->4523 4521 4c4e225 4521->4494 4522->4505 4523->4521 4851 4c4ea40 4856 4c4ea60 CloseHandle 4851->4856 4853 4c4ea48 4854 4c4ea4f ??3@YAXPAX 4853->4854 4855 4c4ea58 4853->4855 4854->4855 4856->4853 4524 4c50580 WaitForMultipleObjects TerminateThread TerminateProcess 4527 4c4c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4524->4527 4526 4c505c7 4527->4526 4937 4c57e00 ??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE 4857 4c50f4d mbstowcs 4862 4c51a20 InternetOpenW 4857->4862 4859 4c50fb3 4860 4c50fe8 4859->4860 4861 4c50fba CreateProcessW 4859->4861 4861->4860 4863 4c51a52 4862->4863 4864 4c51a5f InternetOpenUrlW 4862->4864 4863->4859 4865 4c51a7c 4864->4865 4866 4c51a89 CreateFileW 4864->4866 4865->4859 4867 4c51b15 InternetCloseHandle InternetCloseHandle 4866->4867 4868 4c51aab InternetReadFile 4866->4868 4867->4859 4869 4c51ad2 4868->4869 4870 4c51adb WriteFile 4868->4870 4869->4870 4871 4c51b00 CloseHandle 4869->4871 4870->4868 4870->4871 4871->4867 4873 4c50e54 4874 4c50e59 4873->4874 4875 4c575e2 2 API calls 4874->4875 4876 4c50e72 4875->4876 4425 4c4b6d0 4426 4c4b6e0 4425->4426 4427 4c4b708 ??3@YAXPAX 4426->4427 4429 4c4b77b 4426->4429 4427->4426 4428 4c4b726 ??3@YAXPAX 4427->4428 4428->4426 4528 4c4c090 4531 4c4c09a 4528->4531 4529 4c4c0cc select 4530 4c4c153 4529->4530 4529->4531 4560 4c4c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4530->4560 4531->4529 4532 4c4c0fd recv 4531->4532 4535 4c4c143 4531->4535 4536 4c4c190 4531->4536 4532->4530 4532->4531 4537 4c4c1c4 4536->4537 4538 4c4c1dc 4536->4538 4561 4c4c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4537->4561 4540 4c4c223 4538->4540 4543 4c4c1f2 4538->4543 4541 4c4b370 7 API calls 4540->4541 4558 4c4c232 4541->4558 4542 4c4c1c9 4542->4531 4544 4c4c450 22 API calls 4543->4544 4545 4c4c210 4544->4545 4545->4531 4546 4c4c269 _CxxThrowException 4546->4558 4548 4c4c2d3 ??2@YAPAXI ??2@YAPAXI 4549 4c4c392 _CxxThrowException 4548->4549 4548->4558 4550 4c4b660 6 API calls 4549->4550 4552 4c4c3b2 4550->4552 4551 4c4b3f0 8 API calls 4551->4558 4553 4c4c450 22 API calls 4552->4553 4554 4c4c3bd 4553->4554 4554->4531 4555 4c4c37d _CxxThrowException 4555->4549 4556 4c4b660 6 API calls 4556->4558 4557 4c4b370 7 API calls 4557->4558 4558->4542 4558->4546 4558->4549 4558->4551 4558->4555 4558->4556 4558->4557 4559 4c4c366 ??3@YAXPAX ??3@YAXPAX 4558->4559 4562 4c4b3f0 EnterCriticalSection 4558->4562 4559->4558 4560->4535 4561->4542 4563 4c4b40b 4562->4563 4564 4c4b423 4563->4564 4565 4c4b413 LeaveCriticalSection 4563->4565 4566 4c4b47b 4564->4566 4567 4c4b45d memmove 4564->4567 4565->4548 4568 4c4b590 4 API calls 4566->4568 4567->4566 4569 4c4b48a LeaveCriticalSection 4568->4569 4569->4548 4938 4c4c710 4939 4c4c730 7 API calls 4938->4939 4940 4c4c718 4939->4940 4941 4c4c71f ??3@YAXPAX 4940->4941 4942 4c4c728 4940->4942 4941->4942 4430 4c504d0 4431 4c504ff Sleep 4430->4431 4432 4c50507 PeekNamedPipe 4431->4432 4432->4431 4433 4c50527 4432->4433 4433->4431 4434 4c5052f LocalAlloc ReadFile 4433->4434 4437 4c4ea90 4434->4437 4438 4c4c450 22 API calls 4437->4438 4439 4c4eac9 LocalFree 4438->4439 4439->4432 4570 4c50490 4571 4c5049d 4570->4571 4572 4c504ae WriteFile 4570->4572 4571->4572 4573 4c504a6 4571->4573 4576 4c4eb40 SetEvent 4573->4576 4575 4c504ab 4576->4575 4577 4c54590 calloc 4440 4c513d8 4441 4c513da GetTickCount 4440->4441 4442 4c50ac0 136 API calls 4441->4442 4461 4c51154 4442->4461 4443 4c4e400 lstrcpyW 4443->4461 4444 4c51454 Sleep 4444->4461 4445 4c51478 GetTickCount 4446 4c5147e OpenEventW WaitForSingleObject Sleep 4445->4446 4449 4c514b8 4446->4449 4446->4461 4447 4c51159 atoi 4448 4c5116b sprintf OutputDebugStringA Sleep 4447->4448 4448->4448 4448->4461 4473 4c4c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4449->4473 4450 4c511c8 Sleep 4450->4450 4450->4461 4452 4c514c3 CloseHandle SetErrorMode 4456 4c4e450 3 API calls 4452->4456 4453 4c511ee Sleep 4453->4453 4453->4461 4454 4c5121e GetLocalTime sprintf 4454->4461 4455 4c512f9 atoi atoi atoi GetTickCount 4458 4c4bf20 65 API calls 4455->4458 4457 4c514df 4456->4457 4460 4c4b880 11 API calls 4457->4460 4458->4461 4459 4c512ab OpenEventW 4459->4461 4463 4c512c4 Sleep 4459->4463 4464 4c514ee 4460->4464 4461->4443 4461->4444 4461->4445 4461->4446 4461->4447 4461->4450 4461->4453 4461->4454 4461->4455 4461->4459 4462 4c512d7 Sleep 4461->4462 4465 4c51391 sprintf 4461->4465 4469 4c4bf20 65 API calls 4461->4469 4472 4c4c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4461->4472 4462->4461 4463->4459 4463->4461 4467 4c50e7e 6 API calls 4465->4467 4471 4c513b4 4467->4471 4468 4c512f2 CloseHandle 4468->4455 4469->4461 4470 4c57870 7 API calls 4470->4471 4471->4441 4471->4470 4472->4468 4473->4452 4877 4c4cb66 free 4878 4c4cb76 4877->4878 4578 4c4b6a0 4579 4c4b6a5 4578->4579 4582 4c575e2 4579->4582 4585 4c575b6 4582->4585 4584 4c4b6ca 4586 4c575bf _onexit 4585->4586 4587 4c575cb __dllonexit 4585->4587 4586->4584 4587->4584 4588 4c4c8a0 4589 4c4c8b7 4588->4589 4619 4c4c993 4588->4619 4590 4c4c8e0 4589->4590 4591 4c4c980 LoadLibraryW 4589->4591 4592 4c4c942 4589->4592 4593 4c4c962 4589->4593 4594 4c4c903 4589->4594 4595 4c4c98c 4589->4595 4596 4c4c94f 4589->4596 4597 4c4c92a 4589->4597 4598 4c4c8cb DeleteFileW 4589->4598 4599 4c4c935 4589->4599 4600 4c4c8f6 4589->4600 4601 4c4c910 4589->4601 4602 4c4c971 4589->4602 4603 4c4c91d 4589->4603 4604 4c4c8be 4589->4604 4589->4619 4651 4c4d120 wsprintfW FindFirstFileW 4590->4651 4707 4c4d880 lstrcpyW 4592->4707 4720 4c4cba0 wcsrchr 4593->4720 4673 4c4d2e0 4594->4673 4732 4c4c830 OutputDebugStringW CreateFileW 4595->4732 4717 4c4da50 CreateFileW SetFilePointer WriteFile CloseHandle 4596->4717 4694 4c4d7c0 4597->4694 4648 4c4d430 4598->4648 4704 4c4daf0 4599->4704 4658 4c4d440 lstrlenW 4600->4658 4686 4c4db10 4601->4686 4618 4c4cba0 13 API calls 4602->4618 4691 4c4db30 lstrlenW MoveFileW 4603->4691 4635 4c4cfa0 LocalAlloc wsprintfW FindFirstFileW 4604->4635 4632 4c4c97c 4618->4632 4621 4c4c90c 4626 4c4c94b 4628 4c4c8c7 4631 4c4c8e9 4633 4c4d430 22 API calls 4631->4633 4634 4c4c8f2 4633->4634 4636 4c4d007 4635->4636 4638 4c4d027 4635->4638 4637 4c4ea90 22 API calls 4636->4637 4639 4c4d01a 4637->4639 4640 4c4d04f lstrcmpW 4638->4640 4641 4c4d039 LocalReAlloc 4638->4641 4639->4628 4642 4c4d0e2 FindNextFileW 4640->4642 4643 4c4d063 lstrcmpW 4640->4643 4641->4640 4642->4638 4644 4c4d0f6 4642->4644 4643->4642 4645 4c4d077 lstrlenW 4643->4645 4646 4c4ea90 22 API calls 4644->4646 4645->4642 4647 4c4d101 LocalFree FindClose 4646->4647 4647->4628 4649 4c4ea90 22 API calls 4648->4649 4650 4c4c8dc 4649->4650 4652 4c4d163 4651->4652 4657 4c4d171 4651->4657 4652->4631 4653 4c4d1cf FindNextFileW 4654 4c4d1df FindClose RemoveDirectoryW 4653->4654 4653->4657 4654->4631 4655 4c4d1b4 wsprintfW DeleteFileW 4655->4653 4656 4c4d192 wsprintfW 4656->4657 4657->4653 4657->4655 4657->4656 4659 4c4d470 4658->4659 4660 4c4d491 wcslen ?assign@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PBGI 4658->4660 4735 4c4d570 lstrlenW 4659->4735 4748 4c4dbc0 ??2@YAPAXI 4660->4748 4665 4c4d485 4667 4c4d7c0 27 API calls 4665->4667 4672 4c4c8ff 4667->4672 4669 4c4d511 4764 4c4d200 lstrcpyW CreateFileW 4669->4764 4670 4c4d4ea 4670->4669 4671 4c4d518 ??3@YAXPAX 4670->4671 4671->4669 4674 4c4d2f1 4673->4674 4675 4c4d2fe CreateFileW 4673->4675 4769 4c4d3c0 ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N ??3@YAXPAX 4674->4769 4677 4c4d321 4675->4677 4678 4c4d329 SetFilePointer LocalAlloc ReadFile CloseHandle 4675->4678 4677->4621 4679 4c4d385 4678->4679 4680 4c4d3a1 4678->4680 4682 4c4ea90 22 API calls 4679->4682 4683 4c4d3c0 32 API calls 4680->4683 4681 4c4d2f6 4681->4621 4684 4c4d38f LocalFree 4682->4684 4685 4c4d3a6 LocalFree 4683->4685 4684->4621 4685->4621 4776 4c4c9f0 lstrlenW malloc 4686->4776 4688 4c4db1d 4689 4c4d430 22 API calls 4688->4689 4690 4c4c919 4689->4690 4692 4c4d430 22 API calls 4691->4692 4693 4c4c926 4692->4693 4695 4c4d7d0 4694->4695 4701 4c4d86c 4694->4701 4698 4c4d845 ??3@YAXPAX 4695->4698 4699 4c4d801 ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG 4695->4699 4695->4701 4790 4c4dc00 ??3@YAXPAX 4695->4790 4696 4c4d430 22 API calls 4697 4c4c931 4696->4697 4698->4695 4698->4701 4699->4695 4700 4c4d80f ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG 4699->4700 4700->4695 4702 4c4d820 ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG 4700->4702 4701->4696 4702->4698 4791 4c4d930 4704->4791 4706 4c4c93e 4708 4c4c9f0 11 API calls 4707->4708 4709 4c4d8c6 FindFirstFileW 4708->4709 4710 4c4d907 4709->4710 4711 4c4d8d9 4709->4711 4712 4c4d930 26 API calls 4710->4712 4711->4710 4714 4c4d8eb 4711->4714 4713 4c4d90e FindClose 4712->4713 4713->4626 4715 4c4d430 22 API calls 4714->4715 4716 4c4d8f4 FindClose 4715->4716 4716->4626 4718 4c4ea90 22 API calls 4717->4718 4719 4c4c95e 4718->4719 4721 4c4c96d 4720->4721 4722 4c4cbe8 lstrcpyW LoadLibraryW GetProcAddress GetProcAddress GetProcAddress 4720->4722 4723 4c4cc3d 4722->4723 4723->4721 4724 4c4cc5f wsprintfW 4723->4724 4725 4c4cca5 4724->4725 4725->4721 4726 4c4ccd9 wcsstr 4725->4726 4727 4c4ccf2 wcsstr 4726->4727 4728 4c4cd28 lstrcpyW 4726->4728 4727->4728 4729 4c4cd05 lstrcatW lstrcatW 4727->4729 4730 4c4cd37 CreateProcessW 4728->4730 4729->4730 4730->4721 4733 4c4c867 GetFileSize ??2@YAPAXI ReadFile 4732->4733 4734 4c4c892 CloseHandle 4732->4734 4733->4734 4734->4619 4736 4c4d5b6 wsprintfW FindFirstFileW 4735->4736 4738 4c4d478 4736->4738 4745 4c4d608 4736->4745 4738->4665 4738->4669 4739 4c4d742 FindNextFileW 4740 4c4d75a FindClose 4739->4740 4739->4745 4740->4738 4741 4c4d64f wsprintfW wcslen ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N 4743 4c4d6b7 ??2@YAPAXI 4741->4743 4741->4745 4742 4c4d62a wsprintfW 4744 4c4d570 7 API calls 4742->4744 4743->4745 4744->4745 4745->4739 4745->4741 4745->4742 4745->4743 4746 4c4dc10 7 API calls 4745->4746 4747 4c4d71f ??3@YAXPAX 4745->4747 4746->4745 4747->4745 4749 4c4d4d4 4748->4749 4750 4c4dc10 4749->4750 4751 4c4dc40 4750->4751 4757 4c4dd44 4750->4757 4752 4c4dc68 4751->4752 4756 4c4dcdb 4751->4756 4754 4c4dc74 ?_Split@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@ 4752->4754 4755 4c4dc6e ?_Xran@std@ 4752->4755 4753 4c4dd35 ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N 4753->4757 4760 4c4dc85 4754->4760 4755->4754 4756->4753 4759 4c4dcf5 ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N 4756->4759 4757->4670 4758 4c4dcc0 ?_Split@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@ 4758->4670 4761 4c4dd06 4759->4761 4760->4758 4762 4c4dca1 ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N 4760->4762 4761->4670 4762->4758 4763 4c4dcb7 ?_Eos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXI 4762->4763 4763->4758 4765 4c4d243 4764->4765 4766 4c4d24d GetFileSize CloseHandle lstrlenW LocalAlloc lstrlenW 4764->4766 4765->4672 4767 4c4ea90 22 API calls 4766->4767 4768 4c4d2c8 LocalFree 4767->4768 4768->4672 4770 4c4d405 4769->4770 4771 4c4d3f9 4769->4771 4774 4c4d200 30 API calls 4770->4774 4772 4c4d430 22 API calls 4771->4772 4773 4c4d402 4772->4773 4773->4681 4775 4c4d421 4774->4775 4775->4681 4777 4c4cb76 4776->4777 4778 4c4ca42 lstrcpyW 4776->4778 4777->4688 4779 4c4caa7 4778->4779 4781 4c4ca55 4778->4781 4780 4c4cb3e free 4779->4780 4782 4c4cb30 CharNextW 4779->4782 4783 4c4cae8 GetFileAttributesW 4779->4783 4789 4c4cb1c free 4779->4789 4780->4688 4781->4779 4784 4c4ca77 CharNextW 4781->4784 4786 4c4ca82 4781->4786 4782->4779 4783->4779 4785 4c4cafb CreateDirectoryW 4783->4785 4784->4781 4785->4779 4788 4c4cb08 GetLastError 4785->4788 4786->4779 4787 4c4ca9c CharNextW 4786->4787 4787->4786 4788->4779 4789->4777 4790->4698 4793 4c4d944 FindFirstFileW 4791->4793 4794 4c4d98d FindClose CreateFileW 4793->4794 4796 4c4da0d 4794->4796 4797 4c4da2a CloseHandle 4794->4797 4796->4706 4798 4c4ea90 22 API calls 4797->4798 4799 4c4da3f 4798->4799 4799->4706 4800 4c4e0a0 4801 4c4b780 6 API calls 4800->4801 4802 4c4e0c4 4801->4802 4803 4c4bf20 65 API calls 4802->4803 4804 4c4e0e3 4803->4804 4805 4c4e115 4804->4805 4806 4c4e0e7 4804->4806 4817 4c4c690 4805->4817 4807 4c4b880 11 API calls 4806->4807 4809 4c4e0fb 4807->4809 4812 4c4e137 4823 4c4c730 4812->4823 4815 4c4b880 11 API calls 4816 4c4e15f 4815->4816 4818 4c4ea10 CreateEventW 4817->4818 4819 4c4c6b7 ??2@YAPAXI 4818->4819 4831 4c4cda0 8 API calls 4819->4831 4822 4c4c170 WaitForSingleObject 4822->4812 4824 4c4c76a ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N ??3@YAXPAX 4823->4824 4826 4c4c79c 4823->4826 4824->4824 4824->4826 4825 4c4c7f2 ??3@YAXPAX 4844 4c4ea60 CloseHandle 4825->4844 4826->4825 4838 4c4ddf0 4826->4838 4828 4c4c815 4828->4815 4832 4c4ce1d 4831->4832 4833 4c4cf7f 4832->4833 4836 4c4ce73 SHGetFileInfo 4832->4836 4837 4c4ceb9 GetDiskFreeSpaceExA 4832->4837 4834 4c4ea90 22 API calls 4833->4834 4835 4c4c6f8 4834->4835 4835->4822 4836->4832 4837->4832 4839 4c4de06 4838->4839 4840 4c4ddfa 4838->4840 4842 4c4de36 ??3@YAXPAX 4839->4842 4843 4c4c7de ??3@YAXPAX 4839->4843 4840->4839 4841 4c4de0d ??3@YAXPAX 4840->4841 4841->4839 4842->4843 4843->4825 4843->4826 4844->4828 4879 4c4b860 4880 4c4b880 11 API calls 4879->4880 4881 4c4b868 4880->4881 4882 4c4b86f ??3@YAXPAX 4881->4882 4883 4c4b878 4881->4883 4882->4883 4884 4c4e260 4885 4c4b780 6 API calls 4884->4885 4886 4c4e284 4885->4886 4887 4c4bf20 65 API calls 4886->4887 4888 4c4e2a3 4887->4888 4889 4c4e2d5 4888->4889 4890 4c4e2a7 4888->4890 4899 4c4de50 4889->4899 4892 4c4b880 11 API calls 4890->4892 4894 4c4e2bb 4892->4894 4893 4c4e2e3 4908 4c4c170 WaitForSingleObject 4893->4908 4896 4c4e2f4 4897 4c4b880 11 API calls 4896->4897 4898 4c4e319 4897->4898 4900 4c4ea10 CreateEventW 4899->4900 4901 4c4de77 4900->4901 4909 4c4df10 OutputDebugStringA 4901->4909 4905 4c4de93 4913 4c4dfa0 GetSystemDirectoryW lstrcatW CreateFileW 4905->4913 4907 4c4de9a Sleep 4907->4893 4908->4896 4910 4c4ea90 22 API calls 4909->4910 4911 4c4de8c 4910->4911 4912 4c4eb00 WaitForSingleObject Sleep 4911->4912 4912->4905 4914 4c4e082 CloseHandle 4913->4914 4915 4c4dffb GetFileSize ??2@YAPAXI ReadFile 4913->4915 4914->4907 4916 4c4e034 mbstowcs 4915->4916 4917 4c4e026 4915->4917 4920 4c4df40 LocalAlloc 4916->4920 4917->4916 4917->4917 4919 4c4e076 ??3@YAXPAX 4919->4914 4921 4c4ea90 22 API calls 4920->4921 4922 4c4df80 LocalFree 4921->4922 4922->4919 4923 4c4db60 4924 4c4dba3 ??3@YAXPAX 4923->4924 4925 4c4db6f 4923->4925 4926 4c4db70 ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N ??3@YAXPAX 4925->4926 4926->4926 4927 4c4dba2 4926->4927 4927->4924 4943 4c4e820 4944 4c4e834 4943->4944 4966 4c4e946 4943->4966 4945 4c4e884 OutputDebugStringA 4944->4945 4946 4c4e921 4944->4946 4947 4c4e8e1 4944->4947 4948 4c4e901 4944->4948 4949 4c4e843 InterlockedExchange 4944->4949 4950 4c4e856 4944->4950 4951 4c4e8ce 4944->4951 4952 4c4e8f1 4944->4952 4953 4c4e911 4944->4953 4954 4c4e933 4944->4954 4955 4c4e93f 4944->4955 4944->4966 4945->4950 4982 4c4e730 4946->4982 4977 4c4e4d0 wcstombs 4947->4977 4959 4c4e4d0 12 API calls 4948->4959 4969 4c516e0 17 API calls 4950->4969 4974 4c4e340 wsprintfW lstrlenW 4951->4974 4958 4c4e4d0 12 API calls 4952->4958 4960 4c4e4d0 12 API calls 4953->4960 4987 4c4c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4954->4987 4988 4c4e760 wcstombs OutputDebugStringA sprintf WinExec strstr 4955->4988 4967 4c4e8fa 4958->4967 4968 4c4e90a 4959->4968 4970 4c4e91a 4960->4970 4964 4c4e93b 4965 4c4e8ea 4973 4c4e8ad 4969->4973 4991 4c4ff30 7 API calls 4974->4991 4976 4c4e397 4978 4c4e525 atoi 4977->4978 4979 4c4e541 4977->4979 4978->4965 4980 4c4e54a 10 API calls 4979->4980 4981 4c4e654 4979->4981 4980->4965 4981->4965 4995 4c4e6a0 GetCurrentProcess OpenProcessToken 4982->4995 4984 4c4e73c ExitWindowsEx 4985 4c4e6a0 6 API calls 4984->4985 4986 4c4e758 4985->4986 4987->4964 4989 4c4e803 ExitProcess 4988->4989 4990 4c4e80b 4988->4990 4990->4966 4992 4c4ffc3 4991->4992 4993 4c5001f 4991->4993 4992->4993 4994 4c5003c lstrlenW 4992->4994 4993->4976 4994->4993 4996 4c4e6c6 LookupPrivilegeValueW AdjustTokenPrivileges GetLastError 4995->4996 4997 4c4e6c1 4995->4997 4998 4c4e70d 4996->4998 4999 4c4e70f CloseHandle 4996->4999 4997->4984 4998->4999 4999->4984 5000 4c4b320 5001 4c4b340 2 API calls 5000->5001 5002 4c4b328 5001->5002 5003 4c4b32f ??3@YAXPAX 5002->5003 5004 4c4b338 5002->5004 5003->5004 3987 4c515a3 3992 4c4eb90 288 API calls 3987->3992 3989 4c515b4 CreateThread 3993 4c51501 7 API calls 3989->3993 3994 4c51026 3989->3994 3991 4c515d0 GetWindowsDirectoryA DeleteFileA 3992->3989 3993->3991 3995 4c51030 __EH_prolog 3994->3995 4046 4c4eb90 288 API calls 3995->4046 3997 4c51046 GetInputState GetCurrentThreadId PostThreadMessageW GetMessageW 4047 4c50ff1 CreateMutexA GetLastError 3997->4047 4000 4c51090 GetProcAddress 4001 4c510a5 GetProcAddress 4000->4001 4002 4c510b5 4001->4002 4003 4c510ba Sleep GetTickCount wsprintfW strstr 4001->4003 4002->4003 4004 4c510f3 4003->4004 4005 4c51122 SetErrorMode 4003->4005 4051 4c50f2c 4004->4051 4057 4c4b780 4005->4057 4009 4c51135 4066 4c4e3d0 4009->4066 4010 4c51110 4054 4c516e0 CreateEventW 4010->4054 4011 4c51103 WinExec 4011->4005 4014 4c5114a 4016 4c51159 atoi 4014->4016 4018 4c511c8 Sleep 4014->4018 4019 4c511ee Sleep 4014->4019 4020 4c5121e GetLocalTime sprintf 4014->4020 4021 4c512f9 atoi atoi atoi GetTickCount 4014->4021 4023 4c512ab OpenEventW 4014->4023 4024 4c512d7 Sleep 4014->4024 4026 4c51391 sprintf 4014->4026 4030 4c4bf20 65 API calls 4014->4030 4036 4c51454 Sleep 4014->4036 4037 4c51478 GetTickCount 4014->4037 4038 4c5147e OpenEventW WaitForSingleObject Sleep 4014->4038 4069 4c4c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4014->4069 4129 4c4e400 4014->4129 4015 4c5111f 4015->4005 4017 4c5116b sprintf OutputDebugStringA Sleep 4016->4017 4017->4014 4017->4017 4018->4014 4018->4018 4019->4014 4019->4019 4020->4014 4070 4c4bf20 4021->4070 4023->4014 4025 4c512c4 Sleep 4023->4025 4024->4014 4025->4014 4025->4023 4089 4c50e7e GetSystemDirectoryW lstrcatW CreateFileW ??2@YAPAXI 4026->4089 4029 4c512f2 CloseHandle 4029->4021 4030->4014 4032 4c513b4 4033 4c513da GetTickCount 4032->4033 4092 4c57870 4032->4092 4106 4c50ac0 GetVersionExW 4033->4106 4036->4014 4037->4038 4038->4014 4039 4c514b8 4038->4039 4132 4c4c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4039->4132 4041 4c514c3 CloseHandle SetErrorMode 4133 4c4e450 4041->4133 4046->3997 4048 4c51015 ReleaseMutex ExitProcess 4047->4048 4049 4c51010 4047->4049 4049->4048 4050 4c51024 LoadLibraryW GetProcAddress 4049->4050 4050->4000 4052 4c50f33 GetFileAttributesW 4051->4052 4053 4c50f42 4051->4053 4052->4053 4053->4010 4053->4011 4151 4c51630 CreateThread 4054->4151 4056 4c51731 WaitForSingleObject CloseHandle 4056->4015 4174 4c4b270 LoadLibraryW LoadLibraryW GetProcAddress 4057->4174 4059 4c4b7aa 4060 4c4b270 4 API calls 4059->4060 4061 4c4b7bd 4060->4061 4062 4c4b270 4 API calls 4061->4062 4063 4c4b7cd 4062->4063 4064 4c4b270 4 API calls 4063->4064 4065 4c4b7dd WSAStartup CreateEventW 4064->4065 4065->4009 4176 4c4ea10 4066->4176 4068 4c4e3dd 4068->4014 4069->4029 4180 4c4c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4070->4180 4072 4c4bf2e ResetEvent socket 4073 4c4bf65 gethostbyname 4072->4073 4074 4c4bf59 4072->4074 4075 4c4bf76 4073->4075 4076 4c4bf82 htons connect 4073->4076 4074->4014 4075->4014 4078 4c4bfd0 4076->4078 4079 4c4bff9 setsockopt 4076->4079 4181 4c4bb70 4078->4181 4081 4c4c01d WSAIoctl 4079->4081 4082 4c4c059 4079->4082 4081->4082 4083 4c516e0 17 API calls 4082->4083 4085 4c4c075 4083->4085 4084 4c4bfde 4084->4079 4202 4c4b940 RegOpenKeyExW 4084->4202 4085->4014 4087 4c4bfeb 4087->4079 4088 4c4bfef 4087->4088 4088->4014 4090 4c50f00 WriteFile CloseHandle 4089->4090 4091 4c50eef 4089->4091 4090->4032 4091->4090 4093 4c5787d 4092->4093 4094 4c57886 4092->4094 4093->4032 4095 4c5789b 4094->4095 4096 4c578b6 VirtualAlloc 4094->4096 4095->4032 4097 4c578cc 4096->4097 4098 4c578d3 4096->4098 4097->4032 4217 4c57a10 4098->4217 4101 4c57907 VirtualFree 4101->4032 4102 4c5791d VirtualProtect 4103 4c57945 4102->4103 4104 4c5796d 4103->4104 4105 4c5794f VirtualFree 4103->4105 4104->4032 4105->4032 4222 4c50a70 gethostname MultiByteToWideChar lstrlenW 4106->4222 4108 4c50b2a getsockname 4223 4c50630 LoadLibraryW GetProcAddress GetProcAddress GetProcAddress 4108->4223 4111 4c50bd4 GetSystemInfo wsprintfW 4114 4c50bfa 4111->4114 4112 4c50bb8 4112->4111 4113 4c50bc3 lstrcpyW 4112->4113 4113->4114 4227 4c506c0 LoadLibraryW GetProcAddress 4114->4227 4118 4c50c1e 4119 4c50c48 6 API calls 4118->4119 4234 4c50730 _wcsrev 4119->4234 4123 4c50d4d lstrlenW 4124 4c50db0 4123->4124 4125 4c50d68 mbstowcs 4123->4125 4126 4c50dc0 lstrcpyW mbstowcs 4124->4126 4125->4126 4290 4c4c450 4126->4290 4128 4c50e26 4128->4014 4130 4c4e416 4129->4130 4131 4c4e40b lstrcpyW 4129->4131 4130->4014 4131->4130 4132->4041 4134 4c4e484 4133->4134 4135 4c4e4ad 4133->4135 4136 4c4e48b TerminateThread CloseHandle 4134->4136 4401 4c4ea60 CloseHandle 4135->4401 4136->4135 4136->4136 4138 4c4e4bd 4139 4c4b880 WaitForSingleObject 4138->4139 4140 4c4b8d2 CloseHandle CloseHandle WSACleanup 4139->4140 4141 4c4b8cb 4139->4141 4403 4c4b340 4140->4403 4402 4c4c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4141->4402 4144 4c4b8fd 4145 4c4b340 2 API calls 4144->4145 4146 4c4b90a 4145->4146 4147 4c4b340 2 API calls 4146->4147 4148 4c4b917 4147->4148 4149 4c4b340 2 API calls 4148->4149 4150 4c4b927 4149->4150 4151->4056 4152 4c51660 SetEvent 4151->4152 4153 4c516a2 4152->4153 4154 4c516a9 4152->4154 4156 4c519b0 LoadLibraryW GetProcAddress 4153->4156 4157 4c519dc OpenDesktopW 4156->4157 4158 4c519e5 4156->4158 4157->4158 4159 4c519ed 4158->4159 4166 4c51910 LoadLibraryW GetProcAddress GetProcAddress GetCurrentThreadId 4158->4166 4159->4154 4161 4c519f6 4162 4c519fd CloseDesktop 4161->4162 4163 4c51a09 4161->4163 4162->4154 4164 4c51a14 4163->4164 4165 4c51a0d FreeLibrary 4163->4165 4164->4154 4165->4164 4167 4c5194a GetUserObjectInformationW 4166->4167 4168 4c5196f 4167->4168 4169 4c5197a 4167->4169 4168->4161 4170 4c51981 4169->4170 4171 4c5198c CloseDesktop 4169->4171 4170->4161 4172 4c51997 FreeLibrary 4171->4172 4173 4c5199e 4171->4173 4172->4173 4173->4161 4175 4c4b30a FreeLibrary 4174->4175 4175->4059 4179 4c4c680 4176->4179 4178 4c4ea26 CreateEventW 4178->4068 4179->4178 4180->4072 4182 4c4bb93 4181->4182 4216 4c4c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4182->4216 4184 4c4bba5 ResetEvent socket 4185 4c4bbd4 4184->4185 4186 4c4bce0 4184->4186 4187 4c4bce5 4185->4187 4188 4c4bc2f InternetQueryOptionA 4185->4188 4186->4084 4187->4186 4189 4c4bcfa strchr strncpy 4187->4189 4188->4186 4190 4c4bc5e strchr strncpy 4188->4190 4189->4186 4191 4c4bd44 atoi 4189->4191 4190->4186 4192 4c4bcb4 atoi 4190->4192 4191->4186 4193 4c4bd6a gethostbyname 4191->4193 4192->4186 4192->4193 4193->4186 4194 4c4bd81 htons connect 4193->4194 4194->4186 4195 4c4bdb8 sprintf OutputDebugStringA send 4194->4195 4196 4c4be43 select 4195->4196 4198 4c4be99 closesocket 4196->4198 4199 4c4bebb recv strstr 4196->4199 4198->4186 4199->4198 4201 4c4bef8 4199->4201 4201->4084 4203 4c4b9a6 RegQueryValueExA 4202->4203 4204 4c4ba9f 4202->4204 4203->4204 4205 4c4b9da strncpy RegCloseKey strstr 4203->4205 4204->4087 4205->4204 4206 4c4ba18 InternetOpenW 4205->4206 4206->4204 4207 4c4ba31 InternetOpenUrlA 4206->4207 4207->4204 4208 4c4ba4b malloc InternetReadFile InternetCloseHandle InternetCloseHandle 4207->4208 4209 4c4ba91 free 4208->4209 4210 4c4baad _strupr strstr 4208->4210 4209->4204 4211 4c4bb4e free 4210->4211 4212 4c4baea strchr 4210->4212 4211->4087 4212->4211 4214 4c4baff 4212->4214 4213 4c4bb70 24 API calls 4213->4214 4214->4211 4214->4213 4215 4c4bb3c strstr 4214->4215 4215->4211 4215->4212 4216->4184 4218 4c57903 4217->4218 4220 4c57a2b 4217->4220 4218->4101 4218->4102 4219 4c57a9b LoadLibraryA GetModuleHandleA 4219->4218 4219->4220 4220->4218 4220->4219 4221 4c57ad8 GetProcAddress 4220->4221 4221->4218 4221->4220 4222->4108 4224 4c50684 4223->4224 4225 4c506b3 GetVersionExW 4224->4225 4226 4c506ac FreeLibrary 4224->4226 4225->4111 4225->4112 4226->4225 4228 4c506e9 4227->4228 4229 4c50714 4228->4229 4230 4c5070d FreeLibrary 4228->4230 4231 4c505d0 CreateFileW 4229->4231 4230->4229 4232 4c505f5 DeviceIoControl CloseHandle 4231->4232 4233 4c505f0 4231->4233 4232->4118 4233->4118 4320 4c51760 6 API calls 4234->4320 4236 4c50754 4237 4c50781 _wcsrev 4236->4237 4238 4c50763 lstrcatW lstrcatW 4236->4238 4239 4c51760 9 API calls 4237->4239 4238->4237 4240 4c5078e 4239->4240 4241 4c50795 lstrcatW lstrcatW 4240->4241 4242 4c507b3 _wcsrev 4240->4242 4241->4242 4243 4c51760 9 API calls 4242->4243 4244 4c507c0 4243->4244 4245 4c507e5 _wcsrev 4244->4245 4246 4c507c7 lstrcatW lstrcatW 4244->4246 4247 4c51760 9 API calls 4245->4247 4246->4245 4248 4c507f2 4247->4248 4249 4c50817 _wcsrev 4248->4249 4250 4c507f9 lstrcatW lstrcatW 4248->4250 4251 4c51760 9 API calls 4249->4251 4250->4249 4252 4c50824 4251->4252 4253 4c50849 _wcsrev 4252->4253 4254 4c5082b lstrcatW lstrcatW 4252->4254 4255 4c51760 9 API calls 4253->4255 4254->4253 4256 4c50856 4255->4256 4257 4c5085d lstrcatW lstrcatW 4256->4257 4258 4c5087b _wcsrev 4256->4258 4257->4258 4259 4c51760 9 API calls 4258->4259 4260 4c50888 4259->4260 4261 4c508ad _wcsrev 4260->4261 4262 4c5088f lstrcatW lstrcatW 4260->4262 4263 4c51760 9 API calls 4261->4263 4262->4261 4264 4c508ba 4263->4264 4265 4c508c1 lstrcatW lstrcatW 4264->4265 4266 4c508df _wcsrev 4264->4266 4265->4266 4267 4c51760 9 API calls 4266->4267 4268 4c508ec 4267->4268 4269 4c50911 _wcsrev 4268->4269 4270 4c508f3 lstrcatW lstrcatW 4268->4270 4271 4c51760 9 API calls 4269->4271 4270->4269 4272 4c5091e 4271->4272 4273 4c50925 lstrcatW lstrcatW 4272->4273 4274 4c50943 _wcsrev 4272->4274 4273->4274 4275 4c51760 9 API calls 4274->4275 4276 4c50950 4275->4276 4277 4c50975 _wcsrev 4276->4277 4278 4c50957 lstrcatW lstrcatW 4276->4278 4279 4c51760 9 API calls 4277->4279 4278->4277 4280 4c50982 4279->4280 4281 4c509a7 wcsstr 4280->4281 4282 4c50989 lstrcatW lstrcatW 4280->4282 4283 4c509be lstrcatW 4281->4283 4284 4c509ca lstrcpyW 4281->4284 4282->4281 4283->4284 4285 4c509e0 wsprintfW 4284->4285 4327 4c4fa30 6 API calls 4285->4327 4287 4c50a49 lstrlenW 4288 4c50a5e lstrlenW 4287->4288 4289 4c50a59 4287->4289 4288->4123 4289->4288 4366 4c4b660 EnterCriticalSection 4290->4366 4292 4c4c467 4293 4c4c5a4 4292->4293 4294 4c4c473 _ftol ??2@YAPAXI 4292->4294 4295 4c4b370 7 API calls 4293->4295 4296 4c4c4a7 4294->4296 4297 4c4c4b1 4294->4297 4298 4c4c5b4 4295->4298 4296->4128 4301 4c4c4e3 4297->4301 4302 4c4c4cd ??3@YAXPAX 4297->4302 4299 4c4b660 6 API calls 4298->4299 4300 4c4c5be 4299->4300 4303 4c4b370 7 API calls 4300->4303 4369 4c4b370 EnterCriticalSection 4301->4369 4302->4128 4310 4c4c578 4303->4310 4305 4c4c4fe 4306 4c4b370 7 API calls 4305->4306 4307 4c4c50c 4306->4307 4308 4c4b370 7 API calls 4307->4308 4309 4c4c51a 4308->4309 4311 4c4b370 7 API calls 4309->4311 4375 4c4c5d0 4310->4375 4312 4c4c527 ??3@YAXPAX ??2@YAPAXI 4311->4312 4314 4c4b660 6 API calls 4312->4314 4316 4c4c55e 4314->4316 4317 4c4b370 7 API calls 4316->4317 4318 4c4c56b 4317->4318 4318->4310 4319 4c4c56f ??3@YAXPAX 4318->4319 4319->4310 4321 4c518f9 4320->4321 4325 4c518a2 4320->4325 4321->4236 4322 4c518f2 CloseHandle 4322->4321 4323 4c518bd lstrcmpiW 4324 4c518ed 4323->4324 4323->4325 4324->4322 4325->4322 4325->4323 4326 4c518d9 CloseHandle 4325->4326 4326->4236 4351 4c4f7e0 9 API calls 4327->4351 4330 4c4fe45 wsprintfW 4339 4c4fe7a lstrcatW 4330->4339 4331 4c4fb47 4334 4c4fb14 4331->4334 4357 4c4f7b0 4331->4357 4332 4c4fde2 wsprintfW 4332->4339 4333 4c4fcce 4333->4334 4347 4c4fd1f wsprintfW lstrcatW 4333->4347 4342 4c4feb4 4334->4342 4343 4c4fead FreeLibrary 4334->4343 4335 4c4fd55 4335->4334 4345 4c4fdce 4335->4345 4336 4c4fe17 wsprintfW 4336->4339 4337 4c4fb33 4337->4330 4337->4331 4337->4332 4337->4334 4337->4336 4338 4c4fc33 4337->4338 4337->4339 4350 4c4fba4 4337->4350 4338->4334 4344 4c4fc6a wsprintfW 4338->4344 4339->4287 4342->4287 4343->4342 4344->4334 4345->4330 4345->4332 4345->4336 4345->4339 4347->4333 4349 4c4fc1c lstrcpyW 4349->4334 4350->4334 4350->4349 4354 4c4f8b1 4351->4354 4355 4c4f918 GetProcessHeap HeapAlloc 4354->4355 4356 4c4f938 4354->4356 4355->4356 4361 4c4f9cc LoadLibraryW GetProcAddress GetProcAddress 4356->4361 4358 4c4f7bb 4357->4358 4360 4c4f7d5 lstrcpyW 4358->4360 4365 4c4f6f0 CompareStringW 4358->4365 4360->4334 4362 4c4f9f7 4361->4362 4363 4c4fa01 GetProcessHeap HeapFree 4362->4363 4364 4c4f9af 4362->4364 4363->4364 4364->4330 4364->4331 4364->4332 4364->4333 4364->4334 4364->4335 4364->4336 4364->4337 4364->4338 4364->4339 4364->4350 4365->4358 4382 4c4b590 4366->4382 4368 4c4b680 LeaveCriticalSection 4368->4292 4370 4c4b38b 4369->4370 4393 4c4b4c0 4370->4393 4372 4c4b399 4373 4c4b3ae LeaveCriticalSection 4372->4373 4374 4c4b39e LeaveCriticalSection 4372->4374 4373->4305 4374->4305 4376 4c4c5ee 4375->4376 4377 4c4c63a 4375->4377 4378 4c4c5f6 send 4376->4378 4380 4c4c620 Sleep 4376->4380 4381 4c4c59a 4376->4381 4379 4c4c640 send 4377->4379 4377->4381 4378->4376 4379->4377 4379->4381 4380->4376 4380->4377 4381->4128 4383 4c4b59c 4382->4383 4384 4c4b5a4 4383->4384 4385 4c4b5ae ceil _ftol 4383->4385 4384->4368 4386 4c4b5e4 4385->4386 4387 4c4b5f2 VirtualAlloc 4386->4387 4388 4c4b5e8 4386->4388 4391 4c4b4b0 4387->4391 4388->4368 4392 4c4b4b7 VirtualFree 4391->4392 4392->4368 4394 4c4b4cd 4393->4394 4395 4c4b4d5 4394->4395 4396 4c4b4e0 ceil _ftol VirtualAlloc 4394->4396 4395->4372 4397 4c4b535 4396->4397 4398 4c4b529 4396->4398 4399 4c4b55c VirtualFree 4397->4399 4400 4c4b56e 4397->4400 4398->4372 4399->4400 4400->4372 4401->4138 4402->4140 4404 4c4b350 VirtualFree 4403->4404 4405 4c4b35e DeleteCriticalSection 4403->4405 4404->4405 4405->4144 4406 4c5776e 4408 4c5778a 4406->4408 4410 4c57781 4406->4410 4407 4c576c3 3 API calls 4407->4410 4408->4407 4408->4410 4413 4c577b2 4408->4413 4409 4c577d2 4409->4413 4414 4c576c3 4409->4414 4410->4409 4411 4c576c3 3 API calls 4410->4411 4410->4413 4411->4409 4415 4c576cb 4414->4415 4416 4c57701 4415->4416 4417 4c576ec malloc 4415->4417 4419 4c5772b 4415->4419 4416->4413 4417->4416 4418 4c57705 _initterm 4417->4418 4418->4416 4419->4416 4420 4c57758 free 4419->4420 4420->4416 4928 4c50e74 4929 4c57840 4928->4929 4930 4c57864 4929->4930 4931 4c57853 VirtualFree 4929->4931 4931->4930 4474 4c4def0 4475 4c4defe 4474->4475 4476 4c4def9 4474->4476 4478 4c4eb40 SetEvent 4476->4478 4478->4475 4845 4c4e3b0 4846 4c4e450 3 API calls 4845->4846 4847 4c4e3b8 4846->4847 4848 4c4e3bf ??3@YAXPAX 4847->4848 4849 4c4e3c8 4847->4849 4848->4849 4850 4c545b0 free 4932 4c50370 4933 4c50390 12 API calls 4932->4933 4934 4c50378 4933->4934 4935 4c5037f ??3@YAXPAX 4934->4935 4936 4c50388 4934->4936 4935->4936 5006 4c5763c ??1type_info@@UAE 5007 4c57652 5006->5007 5008 4c5764b ??3@YAXPAX 5006->5008 5008->5007 5009 4c4b239 LoadLibraryW LoadLibraryW GetProcAddress 5010 4c4b30a FreeLibrary 5009->5010

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 0 4c4eb90-4c4f6e6 LoadLibraryA LdrInitializeThunk LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress
          APIs
          • LoadLibraryA.KERNEL32(kernel32.dll,OutputDebugStringA,?,?,04C515B4), ref: 04C4EBA2
          • LdrInitializeThunk.NTDLL(00000000), ref: 04C4EBAB
          • LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatus,?,?,04C515B4), ref: 04C4EBBC
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EBBF
          • LoadLibraryA.KERNEL32(kernel32.dll,DeviceIoControl,?,?,04C515B4), ref: 04C4EBD0
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EBD3
          • LoadLibraryA.KERNEL32(kernel32.dll,GetSystemInfo,?,?,04C515B4), ref: 04C4EBE4
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EBE7
          • LoadLibraryA.KERNEL32(kernel32.dll,GetVersionExW,?,?,04C515B4), ref: 04C4EBF8
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EBFB
          • LoadLibraryA.KERNELBASE(wininet.dll,InternetQueryOptionA,?,?,04C515B4), ref: 04C4EC0C
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EC0F
          • LoadLibraryA.KERNEL32(USER32.dll,PostThreadMessageW,?,?,04C515B4), ref: 04C4EC20
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EC23
          • LoadLibraryA.KERNEL32(USER32.dll,GetInputState,?,?,04C515B4), ref: 04C4EC34
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EC37
          • LoadLibraryA.KERNEL32(USER32.dll,OpenDesktopW,?,?,04C515B4), ref: 04C4EC48
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EC4B
          • LoadLibraryA.KERNEL32(USER32.dll,GetUserObjectInformationW,?,?,04C515B4), ref: 04C4EC5C
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EC5F
          • LoadLibraryA.KERNEL32(USER32.dll,CloseDesktop,?,?,04C515B4), ref: 04C4EC70
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EC73
          • LoadLibraryA.KERNEL32(USER32.dll,wsprintfW,?,?,04C515B4), ref: 04C4EC84
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EC87
          • LoadLibraryA.KERNEL32(USER32.dll,CharNextW,?,?,04C515B4), ref: 04C4EC98
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EC9B
          • LoadLibraryW.KERNEL32(gdi32.dll,CreateCompatibleBitmap,?,?,04C515B4), ref: 04C4ECB2
          • GetProcAddress.KERNEL32(00000000), ref: 04C4ECB5
          • LoadLibraryW.KERNEL32(gdi32.dll,GetDIBits,?,?,04C515B4), ref: 04C4ECC6
          • GetProcAddress.KERNEL32(00000000), ref: 04C4ECC9
          • LoadLibraryW.KERNEL32(gdi32.dll,BitBlt,?,?,04C515B4), ref: 04C4ECDA
          • GetProcAddress.KERNEL32(00000000), ref: 04C4ECDD
          • LoadLibraryW.KERNEL32(gdi32.dll,DeleteDC,?,?,04C515B4), ref: 04C4ECEE
          • GetProcAddress.KERNEL32(00000000), ref: 04C4ECF1
          • LoadLibraryW.KERNEL32(gdi32.dll,DeleteObject,?,?,04C515B4), ref: 04C4ED02
          • GetProcAddress.KERNEL32(00000000), ref: 04C4ED05
          • LoadLibraryW.KERNEL32(gdi32.dll,CreateCompatibleDC,?,?,04C515B4), ref: 04C4ED16
          • GetProcAddress.KERNEL32(00000000), ref: 04C4ED19
          • LoadLibraryW.KERNEL32(gdi32.dll,CreateDIBSection,?,?,04C515B4), ref: 04C4ED2A
          • GetProcAddress.KERNEL32(00000000), ref: 04C4ED2D
          • LoadLibraryW.KERNEL32(gdi32.dll,SelectObject,?,?,04C515B4), ref: 04C4ED3E
          • GetProcAddress.KERNEL32(00000000), ref: 04C4ED41
          • LoadLibraryW.KERNEL32(kernel32.dll,RemoveDirectoryW,?,?,04C515B4), ref: 04C4ED52
          • GetProcAddress.KERNEL32(00000000), ref: 04C4ED55
          • LoadLibraryW.KERNEL32(kernel32.dll,FindClose,?,?,04C515B4), ref: 04C4ED66
          • GetProcAddress.KERNEL32(00000000), ref: 04C4ED69
          • LoadLibraryW.KERNEL32(kernel32.dll,FindNextFileW,?,?,04C515B4), ref: 04C4ED7A
          • GetProcAddress.KERNEL32(00000000), ref: 04C4ED7D
          • LoadLibraryW.KERNEL32(kernel32.dll,FindFirstFileW,?,?,04C515B4), ref: 04C4ED8E
          • GetProcAddress.KERNEL32(00000000), ref: 04C4ED91
          • LoadLibraryW.KERNEL32(kernel32.dll,GetDriveTypeA,?,?,04C515B4), ref: 04C4EDA2
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EDA5
          • LoadLibraryW.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,?,?,04C515B4), ref: 04C4EDB6
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EDB9
          • LoadLibraryW.KERNEL32(kernel32.dll,GetVolumeInformationA,?,?,04C515B4), ref: 04C4EDCA
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EDCD
          • LoadLibraryW.KERNEL32(kernel32.dll,GetLogicalDriveStringsA,?,?,04C515B4), ref: 04C4EDDE
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EDE1
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateDirectoryW,?,?,04C515B4), ref: 04C4EDF2
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EDF5
          • LoadLibraryW.KERNEL32(kernel32.dll,GetFileAttributesW,?,?,04C515B4), ref: 04C4EE06
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EE09
          • LoadLibraryW.KERNEL32(kernel32.dll,UnmapViewOfFile,?,?,04C515B4), ref: 04C4EE1A
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EE1D
          • LoadLibraryW.KERNEL32(kernel32.dll,MapViewOfFile,?,?,04C515B4), ref: 04C4EE2E
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EE31
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateFileMappingW,?,?,04C515B4), ref: 04C4EE42
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EE45
          • LoadLibraryW.KERNEL32(kernel32.dll,SetFilePointer,?,?,04C515B4), ref: 04C4EE56
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EE59
          • LoadLibraryW.KERNEL32(user32.dll,GetForegroundWindow,?,?,04C515B4), ref: 04C4EE6A
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EE6D
          • LoadLibraryW.KERNEL32(kernel32.dll,GetCurrentThreadId,?,?,04C515B4), ref: 04C4EE7E
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EE81
          • LoadLibraryW.KERNEL32(kernel32.dll,TerminateThread,?,?,04C515B4), ref: 04C4EE92
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EE95
          • LoadLibraryW.KERNELBASE(avicap32.dll,capGetDriverDescriptionW,?,?,04C515B4), ref: 04C4EEA6
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EEA9
          • LoadLibraryW.KERNEL32(avicap32.dll,capCreateCaptureWindowW,?,?,04C515B4), ref: 04C4EEBA
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EEBD
          • LoadLibraryW.KERNEL32(user32.dll,GetClipboardData,?,?,04C515B4), ref: 04C4EECE
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EED1
          • LoadLibraryW.KERNEL32(user32.dll,CloseClipboard,?,?,04C515B4), ref: 04C4EEE2
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EEE5
          • LoadLibraryW.KERNEL32(user32.dll,SetClipboardData,?,?,04C515B4), ref: 04C4EEF6
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EEF9
          • LoadLibraryW.KERNEL32(user32.dll,EmptyClipboard,?,?,04C515B4), ref: 04C4EF0A
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EF0D
          • LoadLibraryW.KERNEL32(user32.dll,SendMessageW,?,?,04C515B4), ref: 04C4EF1E
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EF21
          • LoadLibraryW.KERNEL32(user32.dll,GetSystemMetrics,?,?,04C515B4), ref: 04C4EF32
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EF35
          • LoadLibraryW.KERNEL32(user32.dll,OpenClipboard,?,?,04C515B4), ref: 04C4EF46
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EF49
          • LoadLibraryW.KERNEL32(user32.dll,SystemParametersInfoW,?,?,04C515B4), ref: 04C4EF5A
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EF5D
          • LoadLibraryW.KERNEL32(user32.dll,BlockInput,?,?,04C515B4), ref: 04C4EF6E
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EF71
          • LoadLibraryW.KERNEL32(kernel32.dll,InterlockedExchange,?,?,04C515B4), ref: 04C4EF82
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EF85
          • LoadLibraryW.KERNEL32(kernel32.dll,VirtualFree,?,?,04C515B4), ref: 04C4EF96
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EF99
          • LoadLibraryW.KERNEL32(kernel32.dll,VirtualAlloc,?,?,04C515B4), ref: 04C4EFAA
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EFAD
          • LoadLibraryW.KERNEL32(kernel32.dll,ReleaseMutex,?,?,04C515B4), ref: 04C4EFBE
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EFC1
          • LoadLibraryW.KERNEL32(kernel32.dll,CloseHandle,?,?,04C515B4), ref: 04C4EFD2
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EFD5
          • LoadLibraryW.KERNEL32(kernel32.dll,GetLastError,?,?,04C515B4), ref: 04C4EFE6
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EFE9
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateMutexA,?,?,04C515B4), ref: 04C4EFFA
          • GetProcAddress.KERNEL32(00000000), ref: 04C4EFFD
          • LoadLibraryW.KERNEL32(kernel32.dll,WinExec,?,?,04C515B4), ref: 04C4F00E
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F011
          • LoadLibraryW.KERNEL32(kernel32.dll,InitializeCriticalSection,?,?,04C515B4), ref: 04C4F022
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F025
          • LoadLibraryW.KERNEL32(kernel32.dll,DeleteCriticalSection,?,?,04C515B4), ref: 04C4F036
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F039
          • LoadLibraryW.KERNEL32(kernel32.dll,LeaveCriticalSection,?,?,04C515B4), ref: 04C4F04A
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F04D
          • LoadLibraryW.KERNEL32(kernel32.dll,EnterCriticalSection,?,?,04C515B4), ref: 04C4F05E
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F061
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateFileW,?,?,04C515B4), ref: 04C4F072
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F075
          • LoadLibraryW.KERNEL32(kernel32.dll,WriteFile,?,?,04C515B4), ref: 04C4F086
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F089
          • LoadLibraryW.KERNEL32(kernel32.dll,MoveFileW,?,?,04C515B4), ref: 04C4F09A
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F09D
          • LoadLibraryW.KERNEL32(kernel32.dll,DeleteFileW,?,?,04C515B4), ref: 04C4F0AE
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F0B1
          • LoadLibraryW.KERNEL32(advapi32.dll,OpenSCManagerW,?,?,04C515B4), ref: 04C4F0C2
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F0C5
          • LoadLibraryW.KERNEL32(advapi32.dll,OpenServiceW,?,?,04C515B4), ref: 04C4F0D6
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F0D9
          • LoadLibraryW.KERNEL32(advapi32.dll,ChangeServiceConfigW,?,?,04C515B4), ref: 04C4F0EA
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F0ED
          • LoadLibraryW.KERNEL32(advapi32.dll,ControlService,?,?,04C515B4), ref: 04C4F0FE
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F101
          • LoadLibraryW.KERNEL32(kernel32.dll,Sleep,?,?,04C515B4), ref: 04C4F112
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F115
          • LoadLibraryW.KERNEL32(advapi32.dll,StartServiceW,?,?,04C515B4), ref: 04C4F126
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F129
          • LoadLibraryW.KERNEL32(advapi32.dll,CloseServiceHandle,?,?,04C515B4), ref: 04C4F13A
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F13D
          • LoadLibraryW.KERNEL32(kernel32.dll,GetModuleFileNameW,?,?,04C515B4), ref: 04C4F14E
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F151
          • LoadLibraryW.KERNEL32(kernel32.dll,GetTempPathW,?,?,04C515B4), ref: 04C4F162
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F165
          • LoadLibraryW.KERNEL32(kernel32.dll,GetSystemDirectoryW,?,?,04C515B4), ref: 04C4F176
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F179
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateProcessW,?,?,04C515B4), ref: 04C4F18A
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F18D
          • LoadLibraryW.KERNEL32(wininet.dll,InternetOpenW,?,?,04C515B4), ref: 04C4F19E
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F1A1
          • LoadLibraryW.KERNEL32(wininet.dll,InternetCloseHandle,?,?,04C515B4), ref: 04C4F1B2
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F1B5
          • LoadLibraryW.KERNEL32(wininet.dll,InternetGetConnectedState,?,?,04C515B4), ref: 04C4F1C6
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F1C9
          • LoadLibraryW.KERNEL32(wininet.dll,InternetOpenUrlA,?,?,04C515B4), ref: 04C4F1DA
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F1DD
          • LoadLibraryW.KERNEL32(wininet.dll,InternetOpenUrlW,?,?,04C515B4), ref: 04C4F1EE
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F1F1
          • LoadLibraryW.KERNEL32(wininet.dll,InternetReadFile,?,?,04C515B4), ref: 04C4F202
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F205
          • LoadLibraryW.KERNEL32(user32.dll,mouse_event,?,?,04C515B4), ref: 04C4F216
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F219
          • LoadLibraryW.KERNEL32(user32.dll,keybd_event,?,?,04C515B4), ref: 04C4F22A
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F22D
          • LoadLibraryW.KERNEL32(user32.dll,EnumWindows,?,?,04C515B4), ref: 04C4F23E
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F241
          • LoadLibraryW.KERNEL32(user32.dll,SetCursorPos,?,?,04C515B4), ref: 04C4F252
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F255
          • LoadLibraryW.KERNEL32(user32.dll,WindowFromPoint,?,?,04C515B4), ref: 04C4F266
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F269
          • LoadLibraryW.KERNEL32(user32.dll,SetCapture,?,?,04C515B4), ref: 04C4F27A
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F27D
          • LoadLibraryW.KERNEL32(user32.dll,GetWindowTextW,?,?,04C515B4), ref: 04C4F28E
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F291
          • LoadLibraryW.KERNEL32(user32.dll,IsWindowVisible,?,?,04C515B4), ref: 04C4F2A2
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F2A5
          • LoadLibraryW.KERNEL32(user32.dll,GetWindowThreadProcessId,?,?,04C515B4), ref: 04C4F2B6
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F2B9
          • LoadLibraryW.KERNEL32(user32.dll,ExitWindowsEx,?,?,04C515B4), ref: 04C4F2CA
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F2CD
          • LoadLibraryW.KERNEL32(advapi32.dll,OpenProcessToken,?,?,04C515B4), ref: 04C4F2DE
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F2E1
          • LoadLibraryW.KERNEL32(advapi32.dll,LookupPrivilegeValueW,?,?,04C515B4), ref: 04C4F2F2
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F2F5
          • LoadLibraryW.KERNEL32(advapi32.dll,AdjustTokenPrivileges,?,?,04C515B4), ref: 04C4F306
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F309
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateToolhelp32Snapshot,?,?,04C515B4), ref: 04C4F31A
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F31D
          • LoadLibraryW.KERNEL32(kernel32.dll,Process32FirstW,?,?,04C515B4), ref: 04C4F32E
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F331
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateThread,?,?,04C515B4), ref: 04C4F342
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F345
          • LoadLibraryW.KERNEL32(kernel32.dll,CopyFileW,?,?,04C515B4), ref: 04C4F356
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F359
          • LoadLibraryW.KERNEL32(kernel32.dll,SetFileAttributesW,?,?,04C515B4), ref: 04C4F36A
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F36D
          • LoadLibraryW.KERNEL32(kernel32.dll,WaitForSingleObject,?,?,04C515B4), ref: 04C4F37E
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F381
          • LoadLibraryW.KERNEL32(kernel32.dll,OpenEventW,?,?,04C515B4), ref: 04C4F392
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F395
          • LoadLibraryW.KERNEL32(kernel32.dll,ReadFile,?,?,04C515B4), ref: 04C4F3A6
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F3A9
          • LoadLibraryW.KERNEL32(shell32.dll,ShellExecuteW,?,?,04C515B4), ref: 04C4F3BA
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F3BD
          • LoadLibraryW.KERNEL32(kernel32.dll,TerminateProcess,?,?,04C515B4), ref: 04C4F3CE
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F3D1
          • LoadLibraryW.KERNEL32(kernel32.dll,OpenProcess,?,?,04C515B4), ref: 04C4F3E2
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F3E5
          • LoadLibraryW.KERNEL32(user32.dll,GetAsyncKeyState,?,?,04C515B4), ref: 04C4F3F6
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F3F9
          • LoadLibraryW.KERNEL32(user32.dll,GetKeyState,?,?,04C515B4), ref: 04C4F40A
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F40D
          • LoadLibraryW.KERNEL32(user32.dll,FindWindowW,?,?,04C515B4), ref: 04C4F41E
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F421
          • LoadLibraryW.KERNEL32(user32.dll,PostMessageW,?,?,04C515B4), ref: 04C4F432
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F435
          • LoadLibraryW.KERNEL32(user32.dll,GetMessageW,?,?,04C515B4), ref: 04C4F446
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F449
          • LoadLibraryW.KERNEL32(user32.dll,DispatchMessageW,?,?,04C515B4), ref: 04C4F45A
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F45D
          • LoadLibraryW.KERNEL32(user32.dll,TranslateMessage,?,?,04C515B4), ref: 04C4F46E
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F471
          • LoadLibraryW.KERNEL32(advapi32.dll,RegCloseKey,?,?,04C515B4), ref: 04C4F482
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F485
          • LoadLibraryW.KERNEL32(advapi32.dll,RegCreateKeyW,?,?,04C515B4), ref: 04C4F496
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F499
          • LoadLibraryW.KERNEL32(advapi32.dll,RegOpenKeyW,?,?,04C515B4), ref: 04C4F4AA
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F4AD
          • LoadLibraryW.KERNEL32(advapi32.dll,RegOpenKeyExW,?,?,04C515B4), ref: 04C4F4BE
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F4C1
          • LoadLibraryW.KERNEL32(advapi32.dll,RegQueryValueExA,?,?,04C515B4), ref: 04C4F4D2
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F4D5
          • LoadLibraryW.KERNEL32(advapi32.dll,RegQueryValueW,?,?,04C515B4), ref: 04C4F4E6
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F4E9
          • LoadLibraryW.KERNEL32(advapi32.dll,RegSetValueW,?,?,04C515B4), ref: 04C4F4FA
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F4FD
          • LoadLibraryW.KERNEL32(advapi32.dll,RegSetValueExW,?,?,04C515B4), ref: 04C4F50E
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F511
          • LoadLibraryW.KERNEL32(advapi32.dll,SetServiceStatus,?,?,04C515B4), ref: 04C4F522
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F525
          • LoadLibraryW.KERNEL32(advapi32.dll,RegisterServiceCtrlHandlerW,?,?,04C515B4), ref: 04C4F536
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F539
          • LoadLibraryW.KERNEL32(advapi32.dll,QueryServiceStatus,?,?,04C515B4), ref: 04C4F54A
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F54D
          • LoadLibraryW.KERNEL32(advapi32.dll,DeleteService,?,?,04C515B4), ref: 04C4F55E
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F561
          • LoadLibraryW.KERNEL32(advapi32.dll,RegCreateKeyExW,?,?,04C515B4), ref: 04C4F572
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F575
          • LoadLibraryW.KERNEL32(kernel32.dll,Process32NextW,?,?,04C515B4), ref: 04C4F586
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F589
          • LoadLibraryW.KERNEL32(advapi32.dll,RegEnumValueW,?,?,04C515B4), ref: 04C4F59A
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F59D
          • LoadLibraryW.KERNEL32(advapi32.dll,RegDeleteKeyW,?,?,04C515B4), ref: 04C4F5AE
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F5B1
          • LoadLibraryW.KERNEL32(advapi32.dll,RegDeleteValueW,?,?,04C515B4), ref: 04C4F5C2
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F5C5
          • LoadLibraryW.KERNEL32(advapi32.dll,RegEnumKeyExW,?,?,04C515B4), ref: 04C4F5D6
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F5D9
          • LoadLibraryW.KERNEL32(advapi32.dll,SetNamedSecurityInfoW,?,?,04C515B4), ref: 04C4F5EA
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F5ED
          • LoadLibraryW.KERNEL32(advapi32.dll,BuildExplicitAccessWithNameW,?,?,04C515B4), ref: 04C4F5FE
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F601
          • LoadLibraryW.KERNEL32(advapi32.dll,GetNamedSecurityInfoW,?,?,04C515B4), ref: 04C4F612
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F615
          • LoadLibraryW.KERNEL32(advapi32.dll,SetEntriesInAclW,?,?,04C515B4), ref: 04C4F626
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F629
          • LoadLibraryW.KERNEL32(advapi32.dll,ClearEventLogW,?,?,04C515B4), ref: 04C4F63A
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F63D
          • LoadLibraryW.KERNEL32(advapi32.dll,OpenEventLogW,?,?,04C515B4), ref: 04C4F64E
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F651
          • LoadLibraryW.KERNEL32(advapi32.dll,CloseEventLog,?,?,04C515B4), ref: 04C4F662
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F665
          • LoadLibraryW.KERNEL32(advapi32.dll,FreeSid,?,?,04C515B4), ref: 04C4F676
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F679
          • LoadLibraryW.KERNEL32(advapi32.dll,LookupAccountSidW,?,?,04C515B4), ref: 04C4F68A
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F68D
          • LoadLibraryW.KERNEL32(advapi32.dll,GetTokenInformationW,?,?,04C515B4), ref: 04C4F69E
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F6A1
          • LoadLibraryW.KERNELBASE(psapi.dll,EnumProcessModules,?,?,04C515B4), ref: 04C4F6B2
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F6B5
          • LoadLibraryW.KERNEL32(psapi.dll,GetModuleFileNameExW,?,?,04C515B4), ref: 04C4F6C6
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F6C9
          • LoadLibraryW.KERNEL32(shell32.dll,SHGetFileInfoA,?,?,04C515B4), ref: 04C4F6DA
          • GetProcAddress.KERNEL32(00000000), ref: 04C4F6DD
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: LibraryLoad$AddressProc$InitializeThunk
          • String ID: AdjustTokenPrivileges$BitBlt$BlockInput$BuildExplicitAccessWithNameW$ChangeServiceConfigW$CharNextW$ClearEventLogW$CloseClipboard$CloseDesktop$CloseEventLog$CloseHandle$CloseServiceHandle$ControlService$CopyFileW$CreateCompatibleBitmap$CreateCompatibleDC$CreateDIBSection$CreateDirectoryW$CreateFileMappingW$CreateFileW$CreateMutexA$CreateProcessW$CreateThread$CreateToolhelp32Snapshot$DeleteCriticalSection$DeleteDC$DeleteFileW$DeleteObject$DeleteService$DeviceIoControl$DispatchMessageW$EmptyClipboard$EnterCriticalSection$EnumProcessModules$EnumWindows$ExitWindowsEx$FindClose$FindFirstFileW$FindNextFileW$FindWindowW$FreeSid$GetAsyncKeyState$GetClipboardData$GetCurrentThreadId$GetDIBits$GetDiskFreeSpaceExA$GetDriveTypeA$GetFileAttributesW$GetForegroundWindow$GetInputState$GetKeyState$GetLastError$GetLogicalDriveStringsA$GetMessageW$GetModuleFileNameExW$GetModuleFileNameW$GetNamedSecurityInfoW$GetSystemDirectoryW$GetSystemInfo$GetSystemMetrics$GetTempPathW$GetTokenInformationW$GetUserObjectInformationW$GetVersionExW$GetVolumeInformationA$GetWindowTextW$GetWindowThreadProcessId$GlobalMemoryStatus$InitializeCriticalSection$InterlockedExchange$InternetCloseHandle$InternetGetConnectedState$InternetOpenUrlA$InternetOpenUrlW$InternetOpenW$InternetQueryOptionA$InternetReadFile$IsWindowVisible$LeaveCriticalSection$LookupAccountSidW$LookupPrivilegeValueW$MapViewOfFile$MoveFileW$OpenClipboard$OpenDesktopW$OpenEventLogW$OpenEventW$OpenProcess$OpenProcessToken$OpenSCManagerW$OpenServiceW$OutputDebugStringA$PostMessageW$PostThreadMessageW$Process32FirstW$Process32NextW$QueryServiceStatus$ReadFile$RegCloseKey$RegCreateKeyExW$RegCreateKeyW$RegDeleteKeyW$RegDeleteValueW$RegEnumKeyExW$RegEnumValueW$RegOpenKeyExW$RegOpenKeyW$RegQueryValueExA$RegQueryValueW$RegSetValueExW$RegSetValueW$RegisterServiceCtrlHandlerW$ReleaseMutex$RemoveDirectoryW$SHGetFileInfoA$SelectObject$SendMessageW$SetCapture$SetClipboardData$SetCursorPos$SetEntriesInAclW$SetFileAttributesW$SetFilePointer$SetNamedSecurityInfoW$SetServiceStatus$ShellExecuteW$Sleep$StartServiceW$SystemParametersInfoW$TerminateProcess$TerminateThread$TranslateMessage$USER32.dll$UnmapViewOfFile$VirtualAlloc$VirtualFree$WaitForSingleObject$WinExec$WindowFromPoint$WriteFile$advapi32.dll$avicap32.dll$capCreateCaptureWindowW$capGetDriverDescriptionW$gdi32.dll$kernel32.dll$kernel32.dll$keybd_event$mouse_event$psapi.dll$shell32.dll$user32.dll$wininet.dll$wininet.dll$wsprintfW
          • API String ID: 227929070-3174654482
          • Opcode ID: 266c9c9431c000c84f2b9f012139265ab1830a3078a002ff16e7240e6319cf0a
          • Instruction ID: 47ba52a3fd7d36ca209915e3d7e0db300b8e3097db350c0385dc92394c2ea56b
          • Opcode Fuzzy Hash: 266c9c9431c000c84f2b9f012139265ab1830a3078a002ff16e7240e6319cf0a
          • Instruction Fuzzy Hash: A23222E8EC035977CB20BBB25E0ED4F2D5ED9D4AA53090976B185A7100DEBCA4D1CFA4

          Control-flow Graph

          APIs
          • VirtualQuery.KERNEL32(delloader,00000000,0000001C), ref: 04C51523
          • VirtualProtect.KERNELBASE(00000000,?,00000020,?), ref: 04C5153B
          • GetModuleHandleA.KERNEL32(kernel32.dll,HeapDestroy), ref: 04C5154F
          • GetProcAddress.KERNEL32(00000000), ref: 04C51556
          • VirtualProtect.KERNELBASE(00000000,00000003,00000040,?), ref: 04C5156A
          • FreeLibrary.KERNELBASE(?), ref: 04C5157E
          • VirtualProtect.KERNELBASE(00000000,?,00000040,?), ref: 04C51599
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: Virtual$Protect$AddressFreeHandleLibraryModuleProcQuery
          • String ID: HeapDestroy$kernel32.dll
          • API String ID: 1044237551-3302499733
          • Opcode ID: 3673266d0c56a1056725599504cd331416e9b950aa6bf452e4f78e925a352168
          • Instruction ID: 206170a71217b6ff28abefe522b23642540f2dfe38227afea926533b11555913
          • Opcode Fuzzy Hash: 3673266d0c56a1056725599504cd331416e9b950aa6bf452e4f78e925a352168
          • Instruction Fuzzy Hash: D3115E7AD10218BFDF01DBE4DD49FEEBBBAEB48711F144011FA05B3140D6B5AA458B64

          Control-flow Graph

          APIs
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(kernel32.dll,OutputDebugStringA,?,?,04C515B4), ref: 04C4EBA2
            • Part of subcall function 04C4EB90: LdrInitializeThunk.NTDLL(00000000), ref: 04C4EBAB
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatus,?,?,04C515B4), ref: 04C4EBBC
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EBBF
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(kernel32.dll,DeviceIoControl,?,?,04C515B4), ref: 04C4EBD0
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EBD3
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(kernel32.dll,GetSystemInfo,?,?,04C515B4), ref: 04C4EBE4
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EBE7
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(kernel32.dll,GetVersionExW,?,?,04C515B4), ref: 04C4EBF8
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EBFB
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNELBASE(wininet.dll,InternetQueryOptionA,?,?,04C515B4), ref: 04C4EC0C
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EC0F
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(USER32.dll,PostThreadMessageW,?,?,04C515B4), ref: 04C4EC20
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EC23
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(USER32.dll,GetInputState,?,?,04C515B4), ref: 04C4EC34
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EC37
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(USER32.dll,OpenDesktopW,?,?,04C515B4), ref: 04C4EC48
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EC4B
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(USER32.dll,GetUserObjectInformationW,?,?,04C515B4), ref: 04C4EC5C
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EC5F
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(USER32.dll,CloseDesktop,?,?,04C515B4), ref: 04C4EC70
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EC73
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(USER32.dll,wsprintfW,?,?,04C515B4), ref: 04C4EC84
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EC87
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(USER32.dll,CharNextW,?,?,04C515B4), ref: 04C4EC98
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EC9B
            • Part of subcall function 04C4EB90: LoadLibraryW.KERNEL32(gdi32.dll,CreateCompatibleBitmap,?,?,04C515B4), ref: 04C4ECB2
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4ECB5
            • Part of subcall function 04C4EB90: LoadLibraryW.KERNEL32(gdi32.dll,GetDIBits,?,?,04C515B4), ref: 04C4ECC6
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4ECC9
            • Part of subcall function 04C4EB90: LoadLibraryW.KERNEL32(gdi32.dll,BitBlt,?,?,04C515B4), ref: 04C4ECDA
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4ECDD
          • CreateThread.KERNELBASE(00000000,00000000,04C51026,00000000,00000000,00000000), ref: 04C515C0
            • Part of subcall function 04C51501: VirtualQuery.KERNEL32(delloader,00000000,0000001C), ref: 04C51523
            • Part of subcall function 04C51501: VirtualProtect.KERNELBASE(00000000,?,00000020,?), ref: 04C5153B
            • Part of subcall function 04C51501: GetModuleHandleA.KERNEL32(kernel32.dll,HeapDestroy), ref: 04C5154F
            • Part of subcall function 04C51501: GetProcAddress.KERNEL32(00000000), ref: 04C51556
            • Part of subcall function 04C51501: VirtualProtect.KERNELBASE(00000000,00000003,00000040,?), ref: 04C5156A
            • Part of subcall function 04C51501: FreeLibrary.KERNELBASE(?), ref: 04C5157E
            • Part of subcall function 04C51501: VirtualProtect.KERNELBASE(00000000,?,00000040,?), ref: 04C51599
          • GetWindowsDirectoryA.KERNEL32(?,?), ref: 04C515F4
          • DeleteFileA.KERNELBASE(?), ref: 04C51616
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: Library$AddressLoadProc$Virtual$Protect$CreateDeleteDirectoryFileFreeHandleInitializeModuleQueryThreadThunkWindows
          • String ID: \up.bak
          • API String ID: 651909140-1981547893
          • Opcode ID: 258e6254a791f717c818e76795b7833f6be3c14c6c1484d1794940152a11ebb0
          • Instruction ID: bc52fac8249dce25d5167b9c4ea144b361a8547cf5817bf4e8641e21a7b3cb35
          • Opcode Fuzzy Hash: 258e6254a791f717c818e76795b7833f6be3c14c6c1484d1794940152a11ebb0
          • Instruction Fuzzy Hash: C301A9B950011CAFE7949A78DD86ADB3BBDFB84355F0004A1F645E6180DE749E844AB0

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 88 4c51026 89 4c5102b-4c510b3 call 4c576a4 call 4c57600 call 4c4eb90 GetInputState GetCurrentThreadId PostThreadMessageW GetMessageW call 4c50ff1 LoadLibraryW GetProcAddress * 3 88->89 99 4c510b5 89->99 100 4c510ba-4c510f1 Sleep GetTickCount wsprintfW strstr 89->100 99->100 101 4c510f3-4c51101 call 4c50f2c 100->101 102 4c51122-4c51151 SetErrorMode call 4c4b780 call 4c4e3d0 100->102 107 4c51110-4c5111f call 4c516e0 101->107 108 4c51103-4c5110e WinExec 101->108 113 4c51154-4c51157 102->113 107->102 108->102 114 4c511b5-4c511c2 113->114 115 4c51159-4c51169 atoi 113->115 117 4c511c4-4c511c6 114->117 118 4c511e1-4c511e8 114->118 116 4c5116b-4c511b3 sprintf OutputDebugStringA Sleep 115->116 116->114 116->116 119 4c511c8-4c511d9 Sleep 117->119 120 4c511db 117->120 121 4c51207-4c51218 118->121 122 4c511ea-4c511ec 118->122 119->119 119->120 120->118 125 4c5129e-4c512a1 121->125 126 4c5121e-4c5126b GetLocalTime sprintf 121->126 123 4c51201 122->123 124 4c511ee-4c511ff Sleep 122->124 123->121 124->123 124->124 127 4c512a3-4c512a7 125->127 128 4c512f9-4c51341 atoi * 3 GetTickCount call 4c4bf20 125->128 129 4c5126d-4c51273 126->129 127->128 130 4c512a9 127->130 139 4c51343-4c5135d call 4c4bf20 128->139 140 4c5138e 128->140 131 4c51275-4c51277 129->131 132 4c5128f-4c51291 129->132 135 4c512ab-4c512c2 OpenEventW 130->135 136 4c51279-4c51281 131->136 137 4c5128b-4c5128d 131->137 134 4c51294-4c51296 132->134 141 4c512d7-4c512e2 Sleep 134->141 142 4c51298-4c5129c 134->142 143 4c512c4-4c512d3 Sleep 135->143 144 4c512e7-4c512f3 call 4c4c3d0 CloseHandle 135->144 136->132 145 4c51283-4c51289 136->145 137->134 153 4c5135f-4c51379 call 4c4bf20 139->153 154 4c51389-4c5138c 139->154 148 4c51391-4c51443 sprintf call 4c50e7e call 4c50e40 call 4c57870 GetTickCount call 4c50ac0 call 4c4e400 call 4c4c680 140->148 141->113 142->125 143->135 147 4c512d5 143->147 144->128 145->129 145->137 147->128 171 4c51445-4c51452 call 4c4ea00 148->171 160 4c51384-4c51387 153->160 161 4c5137b-4c5137f 153->161 154->148 160->148 161->113 174 4c51465-4c51472 call 4c4ea00 171->174 175 4c51454-4c51463 Sleep 171->175 174->113 178 4c51478 GetTickCount 174->178 175->171 175->174 179 4c5147e-4c514ad OpenEventW WaitForSingleObject Sleep 178->179 180 4c514af-4c514b1 179->180 181 4c514b8-4c514fe call 4c4c3d0 CloseHandle SetErrorMode call 4c4e450 call 4c4b880 179->181 180->179 182 4c514b3 180->182 182->113
          APIs
          • __EH_prolog.LIBCMT ref: 04C5102B
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(kernel32.dll,OutputDebugStringA,?,?,04C515B4), ref: 04C4EBA2
            • Part of subcall function 04C4EB90: LdrInitializeThunk.NTDLL(00000000), ref: 04C4EBAB
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatus,?,?,04C515B4), ref: 04C4EBBC
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EBBF
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(kernel32.dll,DeviceIoControl,?,?,04C515B4), ref: 04C4EBD0
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EBD3
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(kernel32.dll,GetSystemInfo,?,?,04C515B4), ref: 04C4EBE4
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EBE7
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(kernel32.dll,GetVersionExW,?,?,04C515B4), ref: 04C4EBF8
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EBFB
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNELBASE(wininet.dll,InternetQueryOptionA,?,?,04C515B4), ref: 04C4EC0C
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EC0F
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(USER32.dll,PostThreadMessageW,?,?,04C515B4), ref: 04C4EC20
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EC23
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(USER32.dll,GetInputState,?,?,04C515B4), ref: 04C4EC34
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EC37
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(USER32.dll,OpenDesktopW,?,?,04C515B4), ref: 04C4EC48
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EC4B
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(USER32.dll,GetUserObjectInformationW,?,?,04C515B4), ref: 04C4EC5C
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EC5F
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(USER32.dll,CloseDesktop,?,?,04C515B4), ref: 04C4EC70
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EC73
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(USER32.dll,wsprintfW,?,?,04C515B4), ref: 04C4EC84
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EC87
            • Part of subcall function 04C4EB90: LoadLibraryA.KERNEL32(USER32.dll,CharNextW,?,?,04C515B4), ref: 04C4EC98
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4EC9B
            • Part of subcall function 04C4EB90: LoadLibraryW.KERNEL32(gdi32.dll,CreateCompatibleBitmap,?,?,04C515B4), ref: 04C4ECB2
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4ECB5
            • Part of subcall function 04C4EB90: LoadLibraryW.KERNEL32(gdi32.dll,GetDIBits,?,?,04C515B4), ref: 04C4ECC6
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4ECC9
            • Part of subcall function 04C4EB90: LoadLibraryW.KERNEL32(gdi32.dll,BitBlt,?,?,04C515B4), ref: 04C4ECDA
            • Part of subcall function 04C4EB90: GetProcAddress.KERNEL32(00000000), ref: 04C4ECDD
          • GetInputState.USER32 ref: 04C51046
          • GetCurrentThreadId.KERNEL32 ref: 04C51051
          • PostThreadMessageW.USER32(00000000), ref: 04C51058
          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 04C51068
            • Part of subcall function 04C50FF1: CreateMutexA.KERNEL32(00000000,00000001,UpdateWindow,?,04C51073), ref: 04C50FFB
            • Part of subcall function 04C50FF1: GetLastError.KERNEL32(?,04C51073), ref: 04C51003
            • Part of subcall function 04C50FF1: ReleaseMutex.KERNEL32(00000000,?,04C51073), ref: 04C51016
            • Part of subcall function 04C50FF1: ExitProcess.KERNEL32 ref: 04C5101E
          • LoadLibraryW.KERNEL32(user32.dll), ref: 04C51078
          • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 04C5108C
          • GetProcAddress.KERNEL32(00000000,OpenWindowStationW), ref: 04C51096
          • GetProcAddress.KERNEL32(00000000,SetProcessWindowStation), ref: 04C510AE
          • Sleep.KERNEL32(00000032), ref: 04C510BC
          • GetTickCount.KERNEL32 ref: 04C510C2
          • wsprintfW.USER32 ref: 04C510D5
          • strstr.MSVCRT ref: 04C510E6
          • WinExec.KERNEL32(c:\windows\httpd.exe,00000000), ref: 04C51108
          • SetErrorMode.KERNEL32(00000001), ref: 04C51124
          • atoi.MSVCRT(?), ref: 04C5115F
          • sprintf.MSVCRT ref: 04C5118E
          • OutputDebugStringA.KERNEL32(?), ref: 04C5119E
          • Sleep.KERNEL32(000003E8), ref: 04C511A9
          • Sleep.KERNEL32(000003E8), ref: 04C511CD
          • Sleep.KERNEL32(000003E8), ref: 04C511F3
            • Part of subcall function 04C516E0: CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?,?,?,04C5133F), ref: 04C51704
            • Part of subcall function 04C516E0: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,00000000), ref: 04C5173D
            • Part of subcall function 04C516E0: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 04C51748
          • GetLocalTime.KERNEL32(?), ref: 04C51236
          • sprintf.MSVCRT ref: 04C5125C
          • OpenEventW.KERNEL32(001F0003,00000000,?), ref: 04C512B8
          • Sleep.KERNEL32(0000001E), ref: 04C512C6
          • Sleep.KERNEL32(000003E8), ref: 04C512DC
          • CloseHandle.KERNEL32(00000000), ref: 04C512F3
          • atoi.MSVCRT(443,?), ref: 04C51304
          • atoi.MSVCRT ref: 04C51310
          • atoi.MSVCRT ref: 04C5131C
          • GetTickCount.KERNEL32 ref: 04C51322
          • sprintf.MSVCRT ref: 04C513A8
          • GetTickCount.KERNEL32 ref: 04C513E1
            • Part of subcall function 04C50AC0: GetVersionExW.KERNEL32 ref: 04C50AEE
            • Part of subcall function 04C50AC0: getsockname.WS2_32(?), ref: 04C50B5F
            • Part of subcall function 04C50AC0: GetVersionExW.KERNEL32(?), ref: 04C50BA0
            • Part of subcall function 04C50AC0: lstrcpyW.KERNEL32(?,04C48D54), ref: 04C50BD0
            • Part of subcall function 04C50AC0: GlobalMemoryStatus.KERNEL32 ref: 04C50C63
            • Part of subcall function 04C50AC0: GetTickCount.KERNEL32 ref: 04C50C77
            • Part of subcall function 04C4E400: lstrcpyW.KERNEL32(?,?,04C59970,04C51431,?,?,?,?,?), ref: 04C4E410
          • Sleep.KERNEL32(000003E8,?,?,?,?,?,?), ref: 04C51459
          • GetTickCount.KERNEL32 ref: 04C51478
          • OpenEventW.KERNEL32(001F0003,00000000,?), ref: 04C5148B
          • WaitForSingleObject.KERNEL32(?,00000064), ref: 04C51498
          • Sleep.KERNEL32(000001F4), ref: 04C514A5
          • CloseHandle.KERNEL32(00000000), ref: 04C514C4
          • SetErrorMode.KERNEL32(00000000), ref: 04C514CB
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$LibraryLoad$Sleep$CountTick$atoi$CloseErrorEventHandlesprintf$CreateMessageModeMutexObjectOpenSingleThreadVersionWaitlstrcpy$CurrentDebugExecExitGlobalH_prologInitializeInputLastLocalMemoryOutputPostProcessReleaseStateStatusStringThunkTimegetsocknamestrstrwsprintf
          • String ID: %d:%d:%d:%d$443$GetProcessWindowStation$Global\X %d$OpenWindowStationW$SetProcessWindowStation$c:\windows\httpd.exe$c:\windows\httpd.exe$connected: %s:%d$http://$safebrow$safebrow.flnet.org$safebrow.flnet.org$safebrow.flnet.org$time=%d$user32.dll$winsta0
          • API String ID: 3353853401-3876656786
          • Opcode ID: 39c1555eb8b65579f3e1bedd4589e879f8be1a830e083fdc702e2225ef8aab15
          • Instruction ID: 2c2ceb5670a52a9e78a869b7d2bfbd73b99be408e87cae77913d95c5dafddc4e
          • Opcode Fuzzy Hash: 39c1555eb8b65579f3e1bedd4589e879f8be1a830e083fdc702e2225ef8aab15
          • Instruction Fuzzy Hash: BDD1C379D00219EFDB10AFA4DD48BEE7BBAEF48304F0800A5E945A2151DF786EC5DB64

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 255 4c513d8 256 4c513da-4c51443 GetTickCount call 4c50ac0 call 4c4e400 call 4c4c680 255->256 263 4c51445-4c51452 call 4c4ea00 256->263 266 4c51465-4c51472 call 4c4ea00 263->266 267 4c51454-4c51463 Sleep 263->267 270 4c51154-4c51157 266->270 271 4c51478 GetTickCount 266->271 267->263 267->266 273 4c511b5-4c511c2 270->273 274 4c51159-4c51169 atoi 270->274 272 4c5147e-4c514ad OpenEventW WaitForSingleObject Sleep 271->272 276 4c514af-4c514b1 272->276 277 4c514b8-4c514fe call 4c4c3d0 CloseHandle SetErrorMode call 4c4e450 call 4c4b880 272->277 278 4c511c4-4c511c6 273->278 279 4c511e1-4c511e8 273->279 275 4c5116b-4c511b3 sprintf OutputDebugStringA Sleep 274->275 275->273 275->275 276->272 280 4c514b3 276->280 281 4c511c8-4c511d9 Sleep 278->281 282 4c511db 278->282 284 4c51207-4c51218 279->284 285 4c511ea-4c511ec 279->285 280->270 281->281 281->282 282->279 289 4c5129e-4c512a1 284->289 290 4c5121e-4c5126b GetLocalTime sprintf 284->290 287 4c51201 285->287 288 4c511ee-4c511ff Sleep 285->288 287->284 288->287 288->288 291 4c512a3-4c512a7 289->291 292 4c512f9-4c51341 atoi * 3 GetTickCount call 4c4bf20 289->292 294 4c5126d-4c51273 290->294 291->292 295 4c512a9 291->295 306 4c51343-4c5135d call 4c4bf20 292->306 307 4c5138e 292->307 297 4c51275-4c51277 294->297 298 4c5128f-4c51291 294->298 301 4c512ab-4c512c2 OpenEventW 295->301 303 4c51279-4c51281 297->303 304 4c5128b-4c5128d 297->304 300 4c51294-4c51296 298->300 308 4c512d7-4c512e2 Sleep 300->308 309 4c51298-4c5129c 300->309 310 4c512c4-4c512d3 Sleep 301->310 311 4c512e7-4c512f3 call 4c4c3d0 CloseHandle 301->311 303->298 313 4c51283-4c51289 303->313 304->300 321 4c5135f-4c51379 call 4c4bf20 306->321 322 4c51389-4c5138c 306->322 316 4c51391-4c513d0 sprintf call 4c50e7e call 4c50e40 call 4c57870 307->316 308->270 309->289 310->301 315 4c512d5 310->315 311->292 313->294 313->304 315->292 316->256 328 4c51384-4c51387 321->328 329 4c5137b-4c5137f 321->329 322->316 328->316 329->270
          APIs
          • atoi.MSVCRT(?), ref: 04C5115F
          • sprintf.MSVCRT ref: 04C5118E
          • OutputDebugStringA.KERNEL32(?), ref: 04C5119E
          • Sleep.KERNEL32(000003E8), ref: 04C511A9
          • Sleep.KERNEL32(000003E8), ref: 04C511CD
          • Sleep.KERNEL32(000003E8), ref: 04C511F3
          • GetLocalTime.KERNEL32(?), ref: 04C51236
          • GetTickCount.KERNEL32 ref: 04C513E1
            • Part of subcall function 04C50AC0: GetVersionExW.KERNEL32 ref: 04C50AEE
            • Part of subcall function 04C50AC0: getsockname.WS2_32(?), ref: 04C50B5F
            • Part of subcall function 04C50AC0: GetVersionExW.KERNEL32(?), ref: 04C50BA0
            • Part of subcall function 04C50AC0: lstrcpyW.KERNEL32(?,04C48D54), ref: 04C50BD0
            • Part of subcall function 04C50AC0: GlobalMemoryStatus.KERNEL32 ref: 04C50C63
            • Part of subcall function 04C50AC0: GetTickCount.KERNEL32 ref: 04C50C77
            • Part of subcall function 04C4E400: lstrcpyW.KERNEL32(?,?,04C59970,04C51431,?,?,?,?,?), ref: 04C4E410
          • Sleep.KERNEL32(000003E8,?,?,?,?,?,?), ref: 04C51459
          • GetTickCount.KERNEL32 ref: 04C51478
          • OpenEventW.KERNEL32(001F0003,00000000,?), ref: 04C5148B
          • WaitForSingleObject.KERNEL32(?,00000064), ref: 04C51498
          • Sleep.KERNEL32(000001F4), ref: 04C514A5
          • CloseHandle.KERNEL32(00000000), ref: 04C514C4
          • SetErrorMode.KERNEL32(00000000), ref: 04C514CB
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: Sleep$CountTick$Versionlstrcpy$CloseDebugErrorEventGlobalHandleLocalMemoryModeObjectOpenOutputSingleStatusStringTimeWaitatoigetsocknamesprintf
          • String ID: %d:%d:%d:%d$443$safebrow$safebrow.flnet.org$safebrow.flnet.org$safebrow.flnet.org$time=%d
          • API String ID: 206305499-1049870798
          • Opcode ID: b6eab8bcbdad8c1b32d38eba56cb74b4d097e1a5c6b6f2cab7cf76d1ac20385f
          • Instruction ID: 0d2217e59811c64146bd9045692ff32d1a621755eb9a85f0850493de29436803
          • Opcode Fuzzy Hash: b6eab8bcbdad8c1b32d38eba56cb74b4d097e1a5c6b6f2cab7cf76d1ac20385f
          • Instruction Fuzzy Hash: 7181D379D00269ABDF21AFA4DD487FD7BBAEB48300F0800A5E949E3151DF356AC5CB64
          APIs
          • lstrlenW.KERNEL32(?,?,?,?), ref: 04C4D5A8
          • wsprintfW.USER32 ref: 04C4D5DC
          • FindFirstFileW.KERNEL32(?,?), ref: 04C4D5F2
          • wsprintfW.USER32 ref: 04C4D632
          • wsprintfW.USER32 ref: 04C4D657
          • wcslen.MSVCRT ref: 04C4D679
          • ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z.MSVCP60(00000000,00000001), ref: 04C4D68B
          • ??2@YAPAXI@Z.MSVCRT(00000018), ref: 04C4D6C6
          • ??3@YAXPAX@Z.MSVCRT(?), ref: 04C4D723
          • FindNextFileW.KERNEL32(?,?), ref: 04C4D74C
          • FindClose.KERNEL32(?), ref: 04C4D75F
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: Findwsprintf$File$??2@??3@CloseFirstG@2@@std@@G@std@@Grow@?$basic_string@NextU?$char_traits@V?$allocator@lstrlenwcslen
          • String ID: %s%s%s$%s%s*.*$.
          • API String ID: 315284584-1343461528
          • Opcode ID: 7c2e67988076123c5875723ae4adf07c425a3366cd146274a8f7053468d6874a
          • Instruction ID: 19d4444966bbaa51cd14983801e1e93008cd4060e78ab00afa58d26fab8d9035
          • Opcode Fuzzy Hash: 7c2e67988076123c5875723ae4adf07c425a3366cd146274a8f7053468d6874a
          • Instruction Fuzzy Hash: CA51A4B55083809FC320EF15C988A9BBBEAFFC8314F484A1DF59A93251EB74A545CB52
          APIs
          • LocalAlloc.KERNEL32(00000040,00002800), ref: 04C4CFC3
          • wsprintfW.USER32 ref: 04C4CFE0
          • FindFirstFileW.KERNEL32(?,?), ref: 04C4CFF6
          • LocalReAlloc.KERNEL32(00000000,000025D0,00000042), ref: 04C4D047
          • lstrcmpW.KERNEL32(?,04C414C4), ref: 04C4D059
          • lstrcmpW.KERNEL32(?,04C414BC), ref: 04C4D06D
          • lstrlenW.KERNEL32(?), ref: 04C4D087
          • FindNextFileW.KERNEL32(00000000,?), ref: 04C4D0E8
          • LocalFree.KERNEL32(00000000), ref: 04C4D104
          • FindClose.KERNEL32(00000000), ref: 04C4D10B
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: FindLocal$AllocFilelstrcmp$CloseFirstFreeNextlstrlenwsprintf
          • String ID: %s\*.*$h
          • API String ID: 2194070967-1052742963
          • Opcode ID: 3a8208f3e8a96b605a81d0ecaa43b5defdfb919c7872cd390ab6c1cf4076978a
          • Instruction ID: ca22d83e5b9cf68fed4b2a48df5a087b599c19af660ce3ed125c5fc7383bee5d
          • Opcode Fuzzy Hash: 3a8208f3e8a96b605a81d0ecaa43b5defdfb919c7872cd390ab6c1cf4076978a
          • Instruction Fuzzy Hash: 144126756043449FC310EF64D988B5BBBE5FBC8300F04452DF98687281EB7DAA09CBA5
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: Find$Filewsprintf$CloseDirectoryFirstNextRemove
          • String ID: %s\%s$%s\*.*$.
          • API String ID: 2470771279-1471744235
          • Opcode ID: e5796dffe40fcae81a13dd964022ee518e6ef358af20610985c06a67199e50a9
          • Instruction ID: 846ec7b757d7a28143e00508e52a6d1527f2a78fefa96e6e64f230b4a8df6cc0
          • Opcode Fuzzy Hash: e5796dffe40fcae81a13dd964022ee518e6ef358af20610985c06a67199e50a9
          • Instruction Fuzzy Hash: 2C21C67A1043445BD320FB65ED88EFF77ADEBC8324F444919E94A82040EB7995588761
          APIs
          • GetCurrentProcess.KERNEL32(00000028), ref: 04C4E6B0
          • OpenProcessToken.ADVAPI32(00000000), ref: 04C4E6B7
          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 04C4E6E5
          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,00000010,00000000,00000000), ref: 04C4E6FD
          • GetLastError.KERNEL32 ref: 04C4E703
          • CloseHandle.KERNEL32(?), ref: 04C4E714
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue
          • String ID:
          • API String ID: 3398352648-0
          • Opcode ID: bba824dc886930de0f3516cb000c61eeb297cad5d24a7354b9e2790e0508987d
          • Instruction ID: 8f154373c8bd039dfa879600523a98a21642fc8b5497b4d143cba8c5cee2f2fa
          • Opcode Fuzzy Hash: bba824dc886930de0f3516cb000c61eeb297cad5d24a7354b9e2790e0508987d
          • Instruction Fuzzy Hash: 5A017179604310ABD314EB64DC49B9F77A8FB88B01F44891CF68696280D7B8E9448BA5
          APIs
          • FindFirstFileW.KERNEL32(00000021,?,00000000,00000001,00000021), ref: 04C4D96F
          • FindClose.KERNEL32(00000000), ref: 04C4D9E9
          • CreateFileW.KERNEL32(00000021,40000000,00000002,00000000,00000002,00000080,00000000), ref: 04C4DA01
          • CloseHandle.KERNEL32(00000000), ref: 04C4DA2B
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: CloseFileFind$CreateFirstHandle
          • String ID: p
          • API String ID: 3283578348-2181537457
          • Opcode ID: 89bd42ed23369a0adb75ee735c9655cbba2adeaaa61b370e90cd23ca1af9835f
          • Instruction ID: 2cdd910c5315623f32d2b200de267238f998a0ad93c60065c5db06d960733dc4
          • Opcode Fuzzy Hash: 89bd42ed23369a0adb75ee735c9655cbba2adeaaa61b370e90cd23ca1af9835f
          • Instruction Fuzzy Hash: 69314C75D083119BD724EF58C94976A7796ABD4320F08863EF89BD73C0DE38A944C742
          APIs
          • CreateFileW.KERNEL32(\\.\PHYSICALDRIVE0,00000000,00000003,00000000,00000003,00000000,00000000,?,?,04C50C1E,?,?,?,?,04C59970), ref: 04C505E3
          • DeviceIoControl.KERNEL32(00000000,00070000,00000000,00000000,?,00000018,?,00000000), ref: 04C5060E
          • CloseHandle.KERNEL32(00000000,?,?,?,04C59970,?,00000000), ref: 04C50617
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: CloseControlCreateDeviceFileHandle
          • String ID: \\.\PHYSICALDRIVE0
          • API String ID: 33631002-1557481562
          • Opcode ID: 73f0e3a1bbd0102e5502d6681d377c8306da3a0a54383737e7fddec2248a7348
          • Instruction ID: 860df12d20d7dae0a34655d2478206af1d6a72f8ef08ed89a41edcc37d21d583
          • Opcode Fuzzy Hash: 73f0e3a1bbd0102e5502d6681d377c8306da3a0a54383737e7fddec2248a7348
          • Instruction Fuzzy Hash: A0F0307A3813207AE6306668AC0BF9A669DDBC9B72F204625F712FA1C0D6F469405778
          APIs
          • lstrcpyW.KERNEL32(00000021,?,?,00000001), ref: 04C4D8A5
            • Part of subcall function 04C4C9F0: lstrlenW.KERNEL32(?), ref: 04C4CA21
            • Part of subcall function 04C4C9F0: malloc.MSVCRT ref: 04C4CA2C
            • Part of subcall function 04C4C9F0: lstrcpyW.KERNEL32(00000000,?), ref: 04C4CA44
            • Part of subcall function 04C4C9F0: CharNextW.USER32(00000000), ref: 04C4CA78
            • Part of subcall function 04C4C9F0: CharNextW.USER32(00000000), ref: 04C4CA9D
            • Part of subcall function 04C4C9F0: GetFileAttributesW.KERNEL32(00000000), ref: 04C4CAEE
            • Part of subcall function 04C4C9F0: CreateDirectoryW.KERNEL32(00000000,00000000), ref: 04C4CAFE
            • Part of subcall function 04C4C9F0: GetLastError.KERNEL32 ref: 04C4CB08
            • Part of subcall function 04C4C9F0: free.MSVCRT ref: 04C4CB1D
          • FindFirstFileW.KERNEL32(00000021,?,?,00000001), ref: 04C4D8CC
          • FindClose.KERNEL32(00000000,0000006D,?,00000001), ref: 04C4D8F5
          • FindClose.KERNEL32(00000000,?,00000001), ref: 04C4D90F
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: Find$CharCloseFileNextlstrcpy$AttributesCreateDirectoryErrorFirstLastfreelstrlenmalloc
          • String ID:
          • API String ID: 3327165776-0
          • Opcode ID: 6c4f55b9c23a4b0751ff0e952932a955b5403a96a7ae8e8b67d7e471449fdb1a
          • Instruction ID: 388275f2d5d8615cd8d1c159bc17f04dc030fbea606900dff272e42387e511f6
          • Opcode Fuzzy Hash: 6c4f55b9c23a4b0751ff0e952932a955b5403a96a7ae8e8b67d7e471449fdb1a
          • Instruction Fuzzy Hash: AA0161792001106BD710BA58E98CBBEB3BAEBD4334F04062AE557C3280DF3D78098761

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 37 4c50730-4c5074e _wcsrev 38 4c5074f call 4c51760 37->38 39 4c50754-4c50761 38->39 40 4c50781-4c50788 _wcsrev 39->40 41 4c50763-4c5077f lstrcatW * 2 39->41 42 4c50789 call 4c51760 40->42 41->40 43 4c5078e-4c50793 42->43 44 4c50795-4c507b1 lstrcatW * 2 43->44 45 4c507b3-4c507ba _wcsrev 43->45 44->45 46 4c507bb call 4c51760 45->46 47 4c507c0-4c507c5 46->47 48 4c507e5-4c507ec _wcsrev 47->48 49 4c507c7-4c507e3 lstrcatW * 2 47->49 50 4c507ed call 4c51760 48->50 49->48 51 4c507f2-4c507f7 50->51 52 4c50817-4c5081e _wcsrev 51->52 53 4c507f9-4c50815 lstrcatW * 2 51->53 54 4c5081f call 4c51760 52->54 53->52 55 4c50824-4c50829 54->55 56 4c50849-4c50850 _wcsrev 55->56 57 4c5082b-4c50847 lstrcatW * 2 55->57 58 4c50851 call 4c51760 56->58 57->56 59 4c50856-4c5085b 58->59 60 4c5085d-4c50879 lstrcatW * 2 59->60 61 4c5087b-4c50882 _wcsrev 59->61 60->61 62 4c50883 call 4c51760 61->62 63 4c50888-4c5088d 62->63 64 4c508ad-4c508b4 _wcsrev 63->64 65 4c5088f-4c508ab lstrcatW * 2 63->65 66 4c508b5 call 4c51760 64->66 65->64 67 4c508ba-4c508bf 66->67 68 4c508c1-4c508dd lstrcatW * 2 67->68 69 4c508df-4c508e6 _wcsrev 67->69 68->69 70 4c508e7 call 4c51760 69->70 71 4c508ec-4c508f1 70->71 72 4c50911-4c50918 _wcsrev 71->72 73 4c508f3-4c5090f lstrcatW * 2 71->73 74 4c50919 call 4c51760 72->74 73->72 75 4c5091e-4c50923 74->75 76 4c50925-4c50941 lstrcatW * 2 75->76 77 4c50943-4c5094a _wcsrev 75->77 76->77 78 4c5094b call 4c51760 77->78 79 4c50950-4c50955 78->79 80 4c50975-4c5097c _wcsrev 79->80 81 4c50957-4c50973 lstrcatW * 2 79->81 82 4c5097d call 4c51760 80->82 81->80 83 4c50982-4c50987 82->83 84 4c509a7-4c509bc wcsstr 83->84 85 4c50989-4c509a5 lstrcatW * 2 83->85 86 4c509be-4c509c8 lstrcatW 84->86 87 4c509ca-4c509d2 84->87 85->84 86->87
          APIs
          • _wcsrev.MSVCRT(exe.yart063,?,?,7595F860,04C50D13,?,?,?,?,?,?,?,?,?,?,?), ref: 04C5074C
            • Part of subcall function 04C51760: LoadLibraryW.KERNEL32 ref: 04C517D0
            • Part of subcall function 04C51760: LoadLibraryW.KERNEL32(?,?), ref: 04C5182B
            • Part of subcall function 04C51760: GetProcAddress.KERNEL32(00000000), ref: 04C51834
            • Part of subcall function 04C51760: LoadLibraryW.KERNEL32(00000032,04C59100), ref: 04C5188B
            • Part of subcall function 04C51760: GetProcAddress.KERNEL32(00000000), ref: 04C5188E
            • Part of subcall function 04C51760: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 04C51897
            • Part of subcall function 04C51760: lstrcmpiW.KERNEL32(?,?), ref: 04C518C3
          • lstrcatW.KERNEL32(04C59100,360,7595F860,04C50D13,?,?,?,?,?,?,?,?,?,?,?), ref: 04C50773
          • lstrcatW.KERNEL32(04C59100,04C413CC,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 04C5077F
            • Part of subcall function 04C51760: CloseHandle.KERNEL32(00000000), ref: 04C518DA
          • _wcsrev.MSVCRT(exe.pva,7595F860,04C50D13,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 04C50786
          • lstrcatW.KERNEL32(04C59100,kaba), ref: 04C507A5
          • lstrcatW.KERNEL32(04C59100,04C413CC), ref: 04C507B1
          • _wcsrev.MSVCRT(exe.pxnomvk,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 04C507B8
          • lstrcatW.KERNEL32(04C59100,jiangmi), ref: 04C507D7
          • lstrcatW.KERNEL32(04C59100,04C413CC), ref: 04C507E3
          • _wcsrev.MSVCRT(exe.dnomvar), ref: 04C507EA
          • lstrcatW.KERNEL32(04C59100,rixing), ref: 04C50809
          • lstrcatW.KERNEL32(04C59100,04C413CC), ref: 04C50815
          • _wcsrev.MSVCRT(exe.ds063), ref: 04C5081C
          • lstrcatW.KERNEL32(04C59100,360sd), ref: 04C5083B
          • lstrcatW.KERNEL32(04C59100,04C413CC), ref: 04C50847
          • _wcsrev.MSVCRT(exe.dleihscm), ref: 04C5084E
          • lstrcatW.KERNEL32(04C59100,macfee), ref: 04C5086D
          • lstrcatW.KERNEL32(04C59100,04C413CC), ref: 04C50879
          • _wcsrev.MSVCRT(exe.iuge), ref: 04C50880
          • lstrcatW.KERNEL32(04C59100,NOD32), ref: 04C5089F
          • lstrcatW.KERNEL32(04C59100,04C413CC), ref: 04C508AB
          • _wcsrev.MSVCRT(exe.yartexk), ref: 04C508B2
          • lstrcatW.KERNEL32(04C59100,jinshan), ref: 04C508D1
          • lstrcatW.KERNEL32(04C59100,04C413CC), ref: 04C508DD
          • _wcsrev.MSVCRT(exe.yartdsnk), ref: 04C508E4
          • lstrcatW.KERNEL32(04C59100,kenu), ref: 04C50903
          • lstrcatW.KERNEL32(04C59100,04C413CC), ref: 04C5090F
          • _wcsrev.MSVCRT(exe.vrsmbmt), ref: 04C50916
          • lstrcatW.KERNEL32(04C59100,qushi), ref: 04C50935
          • lstrcatW.KERNEL32(04C59100,04C413CC), ref: 04C50941
          • _wcsrev.MSVCRT(exe.retnecva), ref: 04C50948
          • lstrcatW.KERNEL32(04C59100,avira), ref: 04C50967
          • lstrcatW.KERNEL32(04C59100,04C413CC), ref: 04C50973
          • _wcsrev.MSVCRT(exe.psidhsa), ref: 04C5097A
          • lstrcatW.KERNEL32(04C59100,avast), ref: 04C50999
          • lstrcatW.KERNEL32(04C59100,04C413CC), ref: 04C509A5
          • wcsstr.MSVCRT ref: 04C509B1
          • lstrcatW.KERNEL32(04C59100,NotFound), ref: 04C509C8
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: lstrcat$_wcsrev$LibraryLoad$AddressProc$CloseCreateHandleSnapshotToolhelp32lstrcmpiwcsstr
          • String ID: 360$360sd$NOD32$NotFound$avast$avira$exe.dleihscm$exe.dnomvar$exe.ds063$exe.iuge$exe.psidhsa$exe.pva$exe.pxnomvk$exe.retnecva$exe.vrsmbmt$exe.yart063$exe.yartdsnk$exe.yartexk$jiangmi$jinshan$kaba$kenu$macfee$qushi$rixing
          • API String ID: 1578094470-4042984187
          • Opcode ID: db98538ea63234b6b171a8265da34ab9ade6ec9d2d66a3150b73555be45c10d8
          • Instruction ID: a765c8028a7f1385b24e3cb9ae28a3a12d3b7a06cbb9362713a180be45eeae2d
          • Opcode Fuzzy Hash: db98538ea63234b6b171a8265da34ab9ade6ec9d2d66a3150b73555be45c10d8
          • Instruction Fuzzy Hash: 65510CBDF81329B7591037765F4FE2F1D979880EDA7080071BC4491122FEA5B584EDBA

          Control-flow Graph

          APIs
          • LoadLibraryW.KERNEL32 ref: 04C517D0
          • LoadLibraryW.KERNEL32(?,?), ref: 04C5182B
          • GetProcAddress.KERNEL32(00000000), ref: 04C51834
          • LoadLibraryW.KERNEL32(00000032,04C59100), ref: 04C5188B
          • GetProcAddress.KERNEL32(00000000), ref: 04C5188E
          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 04C51897
          • lstrcmpiW.KERNEL32(?,?), ref: 04C518C3
          • CloseHandle.KERNEL32(00000000), ref: 04C518DA
          • CloseHandle.KERNEL32(00000000), ref: 04C518F3
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: LibraryLoad$AddressCloseHandleProc$CreateSnapshotToolhelp32lstrcmpi
          • String ID: .$2$2$2$3$3$3$F$N$P$P$W$W$c$c$d$e$e$e$i$k$n$o$o$r$r$r$r$t$t$x
          • API String ID: 3120855396-1187982173
          • Opcode ID: fdd13c51f59e453b103be5347a9af6b7a7e582e2fdbcf09da03b16454fcfa58e
          • Instruction ID: 32440830e86d3841cd06b2a43f26c2568c83166d44621cff6f20a2f497d8b15c
          • Opcode Fuzzy Hash: fdd13c51f59e453b103be5347a9af6b7a7e582e2fdbcf09da03b16454fcfa58e
          • Instruction Fuzzy Hash: F2415B2440C3C099E311DB289888B5FBFE9AFD6308F48195DF4C897252D7BA9648C76B

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 200 4c4fa30-4c4fb12 LoadLibraryW GetProcAddress * 5 call 4c4f7e0 204 4c4fb14-4c4fb1b 200->204 205 4c4fb20-4c4fb26 200->205 206 4c4fe9d-4c4feab call 4c4fece 204->206 205->206 207 4c4fb2c 205->207 233 4c4feb4-4c4fec7 206->233 234 4c4fead-4c4feae FreeLibrary 206->234 207->206 208 4c4fba4-4c4fbd5 207->208 209 4c4fe45-4c4fe5a 207->209 210 4c4fb47-4c4fb78 207->210 211 4c4fde2-4c4fdee 207->211 212 4c4fcce 207->212 213 4c4fc8f-4c4fcbc 207->213 214 4c4fd55-4c4fdc8 207->214 215 4c4fe17-4c4fe43 wsprintfW 207->215 216 4c4fdf0-4c4fdf7 207->216 217 4c4fb33-4c4fb3a 207->217 218 4c4fc33-4c4fc64 207->218 219 4c4fe5c-4c4fe70 207->219 220 4c4fb98-4c4fb9f 207->220 221 4c4fe7a-4c4fe92 lstrcatW 207->221 208->206 241 4c4fbdb 208->241 226 4c4fe71-4c4fe77 wsprintfW 209->226 210->206 238 4c4fb7e-4c4fb92 call 4c4f7b0 lstrcpyW 210->238 225 4c4fdfc-4c4fe15 wsprintfW 211->225 223 4c4fcd1-4c4fd19 212->223 213->206 236 4c4fcc2-4c4fcc9 213->236 239 4c4fe97 214->239 240 4c4fdce-4c4fdd5 214->240 215->221 216->225 217->206 224 4c4fb40 217->224 218->206 235 4c4fc6a-4c4fc8a wsprintfW 218->235 219->226 220->206 223->239 245 4c4fd1f-4c4fd50 wsprintfW lstrcatW 223->245 224->206 224->208 224->209 224->210 224->211 224->213 224->215 224->216 224->218 224->219 224->221 225->221 226->221 234->233 235->206 236->206 238->220 239->206 240->221 243 4c4fddb 240->243 244 4c4fbe1-4c4fbf1 241->244 243->209 243->211 243->215 243->216 243->219 243->221 247 4c4fbf3-4c4fc1a call 4c4f790 * 2 call 4c4f710 244->247 248 4c4fc1c-4c4fc2e lstrcpyW 244->248 245->223 247->244 248->206
          APIs
          • LoadLibraryW.KERNEL32(ADVAPI32.dll,04C4153C,?,?), ref: 04C4FA86
          • GetProcAddress.KERNEL32(00000000,RegQueryValueExW), ref: 04C4FAA0
          • GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 04C4FAAE
          • GetProcAddress.KERNEL32(00000000,RegEnumValueW), ref: 04C4FABC
          • GetProcAddress.KERNEL32(00000000,RegEnumKeyExW), ref: 04C4FACA
          • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 04C4FAD8
            • Part of subcall function 04C4F7E0: LoadLibraryW.KERNEL32(ADVAPI32.dll,00000000,00000000,00000000), ref: 04C4F831
            • Part of subcall function 04C4F7E0: GetProcAddress.KERNEL32(00000000,GetLengthSid), ref: 04C4F848
            • Part of subcall function 04C4F7E0: GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 04C4F853
            • Part of subcall function 04C4F7E0: GetProcAddress.KERNEL32(00000000,SetSecurityDescriptorDacl), ref: 04C4F860
            • Part of subcall function 04C4F7E0: GetProcAddress.KERNEL32(00000000,InitializeSecurityDescriptor), ref: 04C4F86B
            • Part of subcall function 04C4F7E0: GetProcAddress.KERNEL32(00000000,InitializeAcl), ref: 04C4F876
            • Part of subcall function 04C4F7E0: GetProcAddress.KERNEL32(00000000,AddAccessAllowedAce), ref: 04C4F881
            • Part of subcall function 04C4F7E0: GetProcAddress.KERNEL32(00000000,AllocateAndInitializeSid), ref: 04C4F88C
            • Part of subcall function 04C4F7E0: GetProcAddress.KERNEL32(00000000,RegSetKeySecurity), ref: 04C4F897
          • FreeLibrary.KERNEL32(00000000), ref: 04C4FEAE
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$Library$Load$Free
          • String ID: %-24s %-15s $%-24s %-15s %s $%-24s %-15s 0x%x(%d) $ADVAPI32.dll$REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_SZ$RegCloseKey$RegEnumKeyExW$RegEnumValueW$RegOpenKeyExW$RegQueryValueExW$[%s]
          • API String ID: 314858353-258588721
          • Opcode ID: a0d24698e423926de6cc120af9a159447ad27884234505ac17cfcc6e74c0ef2c
          • Instruction ID: a34f8b20f6c0dc61d96ed5ce3cf161dc978ecd9c36b7d61a0f46151b67be38db
          • Opcode Fuzzy Hash: a0d24698e423926de6cc120af9a159447ad27884234505ac17cfcc6e74c0ef2c
          • Instruction Fuzzy Hash: 51C122B5900258ABDB24CF54CD85FEE7779EB88700F00859EF60AA7140DB74AE85CF65

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 332 4c4bb70-4c4bbce call 4c57600 call 4c4c3d0 ResetEvent socket 337 4c4bbd4-4c4bc29 332->337 338 4c4bea6-4c4beb8 332->338 339 4c4bce5-4c4bcf4 337->339 340 4c4bc2f-4c4bc58 InternetQueryOptionA 337->340 339->338 341 4c4bcfa-4c4bd3e strchr strncpy 339->341 340->338 342 4c4bc5e-4c4bcae strchr strncpy 340->342 341->338 343 4c4bd44-4c4bd64 atoi 341->343 342->338 344 4c4bcb4-4c4bcda atoi 342->344 343->338 346 4c4bd6a-4c4bd7b gethostbyname 343->346 345 4c4bce0 344->345 344->346 345->338 346->338 347 4c4bd81-4c4bdb2 htons connect 346->347 347->338 348 4c4bdb8-4c4be3d sprintf OutputDebugStringA send 347->348 349 4c4be43-4c4be45 348->349 350 4c4be47-4c4be56 349->350 351 4c4be5d 349->351 352 4c4be58-4c4be59 350->352 353 4c4be5b 350->353 354 4c4be7e-4c4be97 select 351->354 355 4c4be5f-4c4be62 351->355 352->349 353->351 357 4c4be99-4c4be9f 354->357 358 4c4bebb-4c4beed recv strstr 354->358 355->354 356 4c4be64-4c4be78 355->356 356->354 359 4c4bea0 closesocket 357->359 360 4c4beef-4c4bef6 358->360 361 4c4bef8-4c4bf0a 358->361 359->338 360->359
          APIs
            • Part of subcall function 04C4C3D0: setsockopt.WS2_32(?,0000FFFF,00000080,00000000,00000004), ref: 04C4C3FA
            • Part of subcall function 04C4C3D0: CancelIo.KERNEL32(?), ref: 04C4C407
            • Part of subcall function 04C4C3D0: InterlockedExchange.KERNEL32(?,00000000), ref: 04C4C416
            • Part of subcall function 04C4C3D0: closesocket.WS2_32(?), ref: 04C4C423
            • Part of subcall function 04C4C3D0: SetEvent.KERNEL32(?), ref: 04C4C430
          • ResetEvent.KERNEL32(?,00000000,?,?,?,00000000,04C57DA0,000000FF,?,04C4BFDE,04C58D88,?,?), ref: 04C4BBAC
          • socket.WS2_32 ref: 04C4BBBF
          • InternetQueryOptionA.WININET(00000000,00000026,00000000,00001000), ref: 04C4BC3D
          • strchr.MSVCRT ref: 04C4BC61
          • strncpy.MSVCRT ref: 04C4BC90
          • atoi.MSVCRT(?), ref: 04C4BCCD
          • strchr.MSVCRT ref: 04C4BCFD
          • strncpy.MSVCRT ref: 04C4BD26
          • atoi.MSVCRT(?), ref: 04C4BD57
          • gethostbyname.WS2_32(?), ref: 04C4BD71
          • htons.WS2_32 ref: 04C4BD88
          • connect.WS2_32(?,00000002,00000010), ref: 04C4BDA9
          • sprintf.MSVCRT ref: 04C4BDEF
          • OutputDebugStringA.KERNEL32(?), ref: 04C4BDFF
          • send.WS2_32(?,?,?,00000000), ref: 04C4BE26
          • select.WS2_32(00000000,?,00000000,00000000,00000000), ref: 04C4BE8F
          • closesocket.WS2_32(?), ref: 04C4BEA0
          • recv.WS2_32(?,?,00000258,00000000), ref: 04C4BED0
          • strstr.MSVCRT ref: 04C4BEE2
          Strings
          • CONNECT , xrefs: 04C4BDDE
          • %s%s:%d%s, xrefs: 04C4BDE9
          • Connection established, xrefs: 04C4BEDC
          • HTTP/1.1Accept: */*Content-Type: text/htmlProxy-Connection: Keep-AliveContent-length: 0, xrefs: 04C4BDD6
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: Eventatoiclosesocketstrchrstrncpy$CancelDebugExchangeInterlockedInternetOptionOutputQueryResetStringconnectgethostbynamehtonsrecvselectsendsetsockoptsocketsprintfstrstr
          • String ID: HTTP/1.1Accept: */*Content-Type: text/htmlProxy-Connection: Keep-AliveContent-length: 0$%s%s:%d%s$CONNECT $Connection established
          • API String ID: 2042499094-4200791392
          • Opcode ID: f199977373a05682c2501a74b6aa6b967931a695286a0e76eaf7182a5f0f66a9
          • Instruction ID: b4715d5acb97045f1891cfd0874e57fbb65fe29f5ca0a9c496dc053a2fe1e1a5
          • Opcode Fuzzy Hash: f199977373a05682c2501a74b6aa6b967931a695286a0e76eaf7182a5f0f66a9
          • Instruction Fuzzy Hash: DFA1E639A102049FD724CB74CD88BAE77AAFBC9320F144659F52AD72C1EF75AE418B50

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 362 4c4b940-4c4b9a0 RegOpenKeyExW 363 4c4b9a6-4c4b9d4 RegQueryValueExA 362->363 364 4c4ba9f-4c4baaa 362->364 363->364 365 4c4b9da-4c4ba12 strncpy RegCloseKey strstr 363->365 365->364 366 4c4ba18-4c4ba2f InternetOpenW 365->366 366->364 367 4c4ba31-4c4ba49 InternetOpenUrlA 366->367 367->364 368 4c4ba4b-4c4ba8f malloc InternetReadFile InternetCloseHandle * 2 367->368 369 4c4ba91-4c4ba9c free 368->369 370 4c4baad-4c4bae8 _strupr strstr 368->370 369->364 371 4c4bb4e-4c4bb67 free 370->371 372 4c4baea-4c4bafd strchr 370->372 372->371 373 4c4baff-4c4bb0b 372->373 374 4c4bb0d-4c4bb15 373->374 374->374 375 4c4bb17-4c4bb3a call 4c4bb70 374->375 375->371 378 4c4bb3c-4c4bb4c strstr 375->378 378->371 378->372
          APIs
          • RegOpenKeyExW.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Internet Settings,00000000,00000001,?), ref: 04C4B998
          • RegQueryValueExA.ADVAPI32(?,AutoConfigURL,00000000,?,00000000,?), ref: 04C4B9CC
          • strncpy.MSVCRT ref: 04C4B9E9
          • RegCloseKey.ADVAPI32(?,00000000,?,?), ref: 04C4B9F7
          • strstr.MSVCRT ref: 04C4BA07
          • InternetOpenW.WININET(IE6.0,00000000,00000000,00000000,00000000), ref: 04C4BA25
          • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 04C4BA3F
          • malloc.MSVCRT ref: 04C4BA50
          • InternetReadFile.WININET(00000000,00000000,0000C440,?), ref: 04C4BA77
          • InternetCloseHandle.WININET(00000000), ref: 04C4BA80
          • InternetCloseHandle.WININET(00000000), ref: 04C4BA87
          • free.MSVCRT ref: 04C4BA96
          • _strupr.MSVCRT ref: 04C4BAB2
          • strstr.MSVCRT ref: 04C4BADF
          • strchr.MSVCRT ref: 04C4BAF0
          • strstr.MSVCRT ref: 04C4BB43
          • free.MSVCRT ref: 04C4BB53
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: Internet$CloseOpenstrstr$Handlefree$FileQueryReadValue_struprmallocstrchrstrncpy
          • String ID: "PROXY $AutoConfigURL$IE6.0$Software\Microsoft\Windows\CurrentVersion\Internet Settings$pac
          • API String ID: 3082613322-1950214214
          • Opcode ID: 18dcc597bd5b88d7f1b463ccac9b6a1fb514d08772f877914673393046515831
          • Instruction ID: 5e2416885689bda1e8256a8ff6facc7b06e83dd93d621fbc68dd7cbb7f160898
          • Opcode Fuzzy Hash: 18dcc597bd5b88d7f1b463ccac9b6a1fb514d08772f877914673393046515831
          • Instruction Fuzzy Hash: 8F51EB392443456BD3209B64DD05BEB77E9EBC8700F044928FA85D7281EEB4FE458BA6

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 379 4c4cba0-4c4cbe2 wcsrchr 380 4c4cd85-4c4cd91 379->380 381 4c4cbe8-4c4cc3f lstrcpyW LoadLibraryW GetProcAddress * 3 379->381 381->380 383 4c4cc45-4c4cca7 wsprintfW 381->383 383->380 387 4c4ccad-4c4ccf0 wcsstr 383->387 390 4c4ccf2-4c4cd03 wcsstr 387->390 391 4c4cd28-4c4cd31 lstrcpyW 387->391 390->391 392 4c4cd05-4c4cd26 lstrcatW * 2 390->392 393 4c4cd37-4c4cd55 391->393 392->393 394 4c4cd57 393->394 395 4c4cd5f-4c4cd7f CreateProcessW 393->395 394->395 395->380
          APIs
          • wcsrchr.MSVCRT ref: 04C4CBD7
          • lstrcpyW.KERNEL32(?,00000000), ref: 04C4CBEE
          • LoadLibraryW.KERNEL32(ADVAPI32.dll), ref: 04C4CBF9
          • GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 04C4CC0D
          • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 04C4CC17
          • GetProcAddress.KERNEL32(00000000,RegQueryValueW), ref: 04C4CC21
          • wsprintfW.USER32 ref: 04C4CC81
          • wcsstr.MSVCRT ref: 04C4CCE9
          • wcsstr.MSVCRT ref: 04C4CCFC
          • lstrcatW.KERNEL32(?,04C413CC), ref: 04C4CD15
          • lstrcatW.KERNEL32(?,?), ref: 04C4CD24
          • lstrcpyW.KERNEL32(00000000,?,?,?), ref: 04C4CD31
          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 04C4CD7F
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$lstrcatlstrcpywcsstr$CreateLibraryLoadProcesswcsrchrwsprintf
          • String ID: "%1$%s\shell\open\command$ADVAPI32.dll$D$RegCloseKey$RegOpenKeyExW$RegQueryValueW$WinSta0\Default
          • API String ID: 4134440835-86666626
          • Opcode ID: c118747e23b5656cd0caf7b31a4ee3eab93a208f69816fbe5796bce616561744
          • Instruction ID: 93280634af708fb5d7f8073a4a9c9823d4104b9dedafab5c9548b5971b20078e
          • Opcode Fuzzy Hash: c118747e23b5656cd0caf7b31a4ee3eab93a208f69816fbe5796bce616561744
          • Instruction Fuzzy Hash: 1F516275244345ABE720DF61CE49FABB7EEEFC4704F04091DF68493150EAB5E9098BA2

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 396 4c4f7e0-4c4f8b3 LoadLibraryW GetProcAddress * 8 398 4c4f9a0 396->398 399 4c4f8b9-4c4f8da 396->399 400 4c4f9a3-4c4f9c2 call 4c4f9cc 398->400 399->398 404 4c4f8e0-4c4f901 399->404 404->398 406 4c4f907-4c4f936 GetProcessHeap HeapAlloc 404->406 406->400 409 4c4f938-4c4f941 406->409 409->400 411 4c4f943-4c4f956 409->411 411->400 413 4c4f958-4c4f967 411->413 413->400 415 4c4f969-4c4f974 413->415 415->400 417 4c4f976-4c4f984 415->417 417->400 419 4c4f986-4c4f995 417->419 419->400 421 4c4f997-4c4f99e 419->421 421->400
          APIs
          • LoadLibraryW.KERNEL32(ADVAPI32.dll,00000000,00000000,00000000), ref: 04C4F831
          • GetProcAddress.KERNEL32(00000000,GetLengthSid), ref: 04C4F848
          • GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 04C4F853
          • GetProcAddress.KERNEL32(00000000,SetSecurityDescriptorDacl), ref: 04C4F860
          • GetProcAddress.KERNEL32(00000000,InitializeSecurityDescriptor), ref: 04C4F86B
          • GetProcAddress.KERNEL32(00000000,InitializeAcl), ref: 04C4F876
          • GetProcAddress.KERNEL32(00000000,AddAccessAllowedAce), ref: 04C4F881
          • GetProcAddress.KERNEL32(00000000,AllocateAndInitializeSid), ref: 04C4F88C
          • GetProcAddress.KERNEL32(00000000,RegSetKeySecurity), ref: 04C4F897
          • GetProcessHeap.KERNEL32(00000000,00000018), ref: 04C4F922
          • HeapAlloc.KERNEL32(00000000), ref: 04C4F929
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$Heap$AllocLibraryLoadProcess
          • String ID: ADVAPI32.dll$AddAccessAllowedAce$AllocateAndInitializeSid$GetLengthSid$InitializeAcl$InitializeSecurityDescriptor$RegOpenKeyExW$RegSetKeySecurity$SetSecurityDescriptorDacl
          • API String ID: 3190449858-3036209889
          • Opcode ID: 2c0b7fa8ceac341e46144f3aee06709a2eeea0c46a007ee1abecdc9f9e0be512
          • Instruction ID: 61f32afdc389f9026378fab4b29e980fb593d042a2bfa8c89b2d6c910bbe6958
          • Opcode Fuzzy Hash: 2c0b7fa8ceac341e46144f3aee06709a2eeea0c46a007ee1abecdc9f9e0be512
          • Instruction Fuzzy Hash: BB514A71E40358ABDB10DBE5CD45FEEBBB9AF88714F044129FA04B6280D7B5A901CFA5

          Control-flow Graph

          APIs
          • GetVersionExW.KERNEL32 ref: 04C50AEE
            • Part of subcall function 04C50A70: gethostname.WS2_32(00000000,00000032), ref: 04C50A8F
            • Part of subcall function 04C50A70: MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000032,?,00000032), ref: 04C50AA7
            • Part of subcall function 04C50A70: lstrlenW.KERNEL32(?), ref: 04C50AAE
          • getsockname.WS2_32(?), ref: 04C50B5F
            • Part of subcall function 04C50630: LoadLibraryW.KERNEL32(ADVAPI32.dll,?,?,?,0000011C,?,?,?,?,04C59970,?,00000000), ref: 04C50649
            • Part of subcall function 04C50630: GetProcAddress.KERNEL32(00000000,RegQueryValueExW), ref: 04C5065D
            • Part of subcall function 04C50630: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 04C50667
            • Part of subcall function 04C50630: GetProcAddress.KERNEL32(00000000,RegOpenKeyW), ref: 04C50671
            • Part of subcall function 04C50630: FreeLibrary.KERNEL32(00000000,?,?,?,?,04C59970,?,00000000), ref: 04C506AD
          • GetVersionExW.KERNEL32(?), ref: 04C50BA0
          • lstrcpyW.KERNEL32(?,04C48D54), ref: 04C50BD0
          • GetSystemInfo.KERNEL32(?), ref: 04C50BD9
          • wsprintfW.USER32 ref: 04C50BF1
          • GlobalMemoryStatus.KERNEL32 ref: 04C50C63
          • GetTickCount.KERNEL32 ref: 04C50C77
          • wsprintfW.USER32 ref: 04C50C95
          • wsprintfW.USER32 ref: 04C50CB5
          • wsprintfW.USER32 ref: 04C50CDA
          • wsprintfW.USER32 ref: 04C50D05
          • lstrcpyW.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 04C50D1C
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 04C50D58
          • mbstowcs.MSVCRT ref: 04C50D99
          • lstrcpyW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 04C50DC0
          • mbstowcs.MSVCRT ref: 04C50DF3
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: wsprintf$AddressProclstrcpy$LibraryVersionlstrlenmbstowcs$ByteCharCountFreeGlobalInfoLoadMemoryMultiStatusSystemTickWidegethostnamegetsockname
          • String ID: $f
          • API String ID: 3780208771-2452994617
          • Opcode ID: 637b8bf25834a5fad1672481ac629aada6bee179deeb6600c054c8b94ef594dc
          • Instruction ID: f7c270b72844dc4565f4472e028883d029afc67610b11eb4422d5c5e865972fb
          • Opcode Fuzzy Hash: 637b8bf25834a5fad1672481ac629aada6bee179deeb6600c054c8b94ef594dc
          • Instruction Fuzzy Hash: 378161B55083459BE334DB64C844BEFB7EAEFC8304F00492DF68997250DB75AA48CB66

          Control-flow Graph

          APIs
          • LoadLibraryW.KERNEL32(kernel32.dll,GetVolumeInformationA), ref: 04C4CDBE
          • GetProcAddress.KERNEL32(00000000), ref: 04C4CDC7
          • LoadLibraryW.KERNEL32(kernel32.dll,GetLogicalDriveStringsA), ref: 04C4CDD7
          • GetProcAddress.KERNEL32(00000000), ref: 04C4CDDA
          • LoadLibraryW.KERNEL32(kernel32.dll,GetDriveTypeA), ref: 04C4CDE8
          • GetProcAddress.KERNEL32(00000000), ref: 04C4CDEB
          • LoadLibraryW.KERNEL32(kernel32.dll,lstrlenA), ref: 04C4CDFB
          • GetProcAddress.KERNEL32(00000000), ref: 04C4CDFE
          • SHGetFileInfo.SHELL32(?,00000080,?,000002DC,00000410), ref: 04C4CE8B
          • GetDiskFreeSpaceExA.KERNEL32(00000001,?,?,00000000), ref: 04C4CEC6
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: AddressLibraryLoadProc$DiskFileFreeInfoSpace
          • String ID: GetDriveTypeA$GetLogicalDriveStringsA$GetVolumeInformationA$g$kernel32.dll$lstrlenA
          • API String ID: 2694536233-2593926017
          • Opcode ID: bfa1d378e95488e14b2a44c069626657a863977d5f642cc7fa904c42404a6a47
          • Instruction ID: e1cab10477b5611efc356a3295262026a7f6ae2714665602e217a29aabcc91c0
          • Opcode Fuzzy Hash: bfa1d378e95488e14b2a44c069626657a863977d5f642cc7fa904c42404a6a47
          • Instruction Fuzzy Hash: AF51E7715083459FD714DF64C844A9FBBEAFFC8704F48492DF989A7240CB74AA45CB62
          APIs
          • LoadLibraryW.KERNEL32(ADVAPI32.dll), ref: 04C4FF5F
          • GetProcAddress.KERNEL32(00000000,RegCreateKeyExW), ref: 04C4FF73
          • GetProcAddress.KERNEL32(00000000,RegSetValueExW), ref: 04C4FF7E
          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyW), ref: 04C4FF89
          • GetProcAddress.KERNEL32(00000000,RegDeleteValueW), ref: 04C4FF94
          • GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 04C4FF9F
          • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 04C4FFA9
          • lstrlenW.KERNEL32(?), ref: 04C50040
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$LibraryLoadlstrlen
          • String ID: ADVAPI32.dll$RegCloseKey$RegCreateKeyExW$RegDeleteKeyW$RegDeleteValueW$RegOpenKeyExW$RegSetValueExW
          • API String ID: 1729337914-2216571892
          • Opcode ID: 47cb1b36b879535368cd0f3a0dedf3631c997eb56aafdce359020f90c547686e
          • Instruction ID: 693fcfed506e4951772fa7c6c6389e2720dec0a627e97dc1b8e9545716d323fa
          • Opcode Fuzzy Hash: 47cb1b36b879535368cd0f3a0dedf3631c997eb56aafdce359020f90c547686e
          • Instruction Fuzzy Hash: C8515E71A40209BBDB10DF96CC89FEFB7B9EF88714F044115F915E7250D7B5A9808BA4
          APIs
            • Part of subcall function 04C4EA10: CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,04C4E3DD,?,7591F550,04C5114A,?), ref: 04C4EA2E
          • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle,?), ref: 04C5014B
          • GetProcAddress.KERNEL32(00000000), ref: 04C50152
          • CreatePipe.KERNEL32 ref: 04C501CA
          • CreatePipe.KERNEL32(00000068,00000064,?,00000000), ref: 04C501FF
          • GetStartupInfoW.KERNEL32(0000000C), ref: 04C5024D
          • GetSystemDirectoryW.KERNEL32 ref: 04C50288
          • lstrcatW.KERNEL32(?,\cmd.e,?,?,?,?,?,?,?,?,?,?,?,00000118), ref: 04C5029E
          • lstrcatW.KERNEL32(?,04C421C0,?,?,?,?,?,?,?,?,?,?,?,00000118), ref: 04C502AA
          • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000001,00000020,00000000,00000000,0000000C,?), ref: 04C502CC
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: Create$Pipelstrcat$AddressDirectoryEventInfoLibraryLoadProcProcessStartupSystem
          • String ID: CloseHandle$D$\cmd.e$kernel32.dll$s
          • API String ID: 2063449080-2709968139
          • Opcode ID: a85308fdbcc1159ab185beb330be826388c26627c286ef101bd87e53cf09abb6
          • Instruction ID: 33e0fc8ead315209073bcaae6fbe1c8325efad6500112031b5cf5bca49e3398b
          • Opcode Fuzzy Hash: a85308fdbcc1159ab185beb330be826388c26627c286ef101bd87e53cf09abb6
          • Instruction Fuzzy Hash: 41718CB5644740AFE320CF65C888B5BBBE5FFC8740F10492DF689972A0DBB4A5488F56
          APIs
          • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle,?,?,?,?,00000000,04C57F38,000000FF,04C4E225,?), ref: 04C503C7
          • GetProcAddress.KERNEL32(00000000), ref: 04C503CE
          • TerminateThread.KERNEL32(?,00000000,?,?,?,?,00000000,04C57F38,000000FF,04C4E225,?), ref: 04C503E2
          • TerminateProcess.KERNEL32(?,00000000,?,?,?,?,00000000,04C57F38,000000FF,04C4E225,?), ref: 04C503EA
          • TerminateThread.KERNEL32(?,00000000,?,?,?,?,00000000,04C57F38,000000FF,04C4E225,?), ref: 04C503F6
          • WaitForSingleObject.KERNEL32(?,000007D0,?,?,?,?,00000000,04C57F38,000000FF,04C4E225,?), ref: 04C50401
          • TerminateThread.KERNEL32(?,00000000,?,?,?,?,00000000,04C57F38,000000FF,04C4E225,?), ref: 04C5040D
          • DisconnectNamedPipe.KERNEL32(?,?,?,?,?,00000000,04C57F38,000000FF,04C4E225,?), ref: 04C5041D
          • DisconnectNamedPipe.KERNEL32(?,?,?,?,?,00000000,04C57F38,000000FF,04C4E225,?), ref: 04C50427
          • DisconnectNamedPipe.KERNEL32(?,?,?,?,?,00000000,04C57F38,000000FF,04C4E225,?), ref: 04C50431
          • DisconnectNamedPipe.KERNEL32(?,?,?,?,?,00000000,04C57F38,000000FF,04C4E225,?), ref: 04C5043B
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: DisconnectNamedPipeTerminate$Thread$AddressLibraryLoadObjectProcProcessSingleWait
          • String ID: CloseHandle$kernel32.dll
          • API String ID: 2122371937-3978267401
          • Opcode ID: 6ce9831984124f5572989112e00314b14de212fe294830a5264bd68a32cca2ba
          • Instruction ID: 6b263c4259f3cbfac1a0c8e9ae68279a7488d63baf060776cc28fdc6b6d393ec
          • Opcode Fuzzy Hash: 6ce9831984124f5572989112e00314b14de212fe294830a5264bd68a32cca2ba
          • Instruction Fuzzy Hash: 9731E975640700ABD620EF7ADD88F1BF7E9BF88610F444A1DF58AD3690CA78F8458B64
          APIs
          • LoadLibraryW.KERNEL32 ref: 04C4B2ED
          • LoadLibraryW.KERNEL32(00000000,InitializeCriticalSection), ref: 04C4B2FB
          • GetProcAddress.KERNEL32(00000000), ref: 04C4B2FE
          • FreeLibrary.KERNEL32(00000000), ref: 04C4B30B
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: Library$Load$AddressFreeProc
          • String ID: .$2$3$InitializeCriticalSection$d$k$n$r
          • API String ID: 2632591731-2400524468
          • Opcode ID: b818912305b7b11abd422a5577d1bfd0334797aa2edc26cb3da17706a7d2b280
          • Instruction ID: 989bac3fecbbf8fa910841e8b1101f95ff6c6aa01e1ffbad6889e00489a268e5
          • Opcode Fuzzy Hash: b818912305b7b11abd422a5577d1bfd0334797aa2edc26cb3da17706a7d2b280
          • Instruction Fuzzy Hash: C4216A6951C3818FC311DF64984854ABBF1FF99304F04989EE1C9C7262E779860DC76B
          APIs
          • LoadLibraryW.KERNEL32 ref: 04C4B2ED
          • LoadLibraryW.KERNEL32(00000000,InitializeCriticalSection), ref: 04C4B2FB
          • GetProcAddress.KERNEL32(00000000), ref: 04C4B2FE
          • FreeLibrary.KERNEL32(00000000), ref: 04C4B30B
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: Library$Load$AddressFreeProc
          • String ID: .$2$3$InitializeCriticalSection$d$k$n$r
          • API String ID: 2632591731-2400524468
          • Opcode ID: 6bc371834ecccc3a1a745484b329814cf2c48fcc841810b2f0b7f974f1e57515
          • Instruction ID: 213f885a196554481a275dc0949308e41e0caecd631c0463036f31ff9cc7f05c
          • Opcode Fuzzy Hash: 6bc371834ecccc3a1a745484b329814cf2c48fcc841810b2f0b7f974f1e57515
          • Instruction Fuzzy Hash: 22115A681183419AC310EF65D40854BB7F5FFC8704F009D1EE1D9C3221E7B99648CB6B
          APIs
          • InternetOpenW.WININET(Mozilla/4.0 (compatible),00000000,00000000,00000000,00000000), ref: 04C51A46
          • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 04C51A70
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: InternetOpen
          • String ID: MZ$Mozilla/4.0 (compatible)$c:\windows\httpd.exe
          • API String ID: 2038078732-2593800607
          • Opcode ID: 74792abca0e39cbe37b3687c086530a5214ded77efa12cd89b7800f1761eba7a
          • Instruction ID: f312bd355949155dc85a91163c4ef51d29b9994c805db97c2b92e9b6934609d0
          • Opcode Fuzzy Hash: 74792abca0e39cbe37b3687c086530a5214ded77efa12cd89b7800f1761eba7a
          • Instruction Fuzzy Hash: 7531CF75504340ABD7209F61EC88F9FBBEDFBC9B10F044A2DF98192140DA78A985CBA5
          APIs
          • LoadLibraryW.KERNEL32(ADVAPI32.dll,?,?,?,0000011C,?,?,?,?,04C59970,?,00000000), ref: 04C50649
          • GetProcAddress.KERNEL32(00000000,RegQueryValueExW), ref: 04C5065D
          • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 04C50667
          • GetProcAddress.KERNEL32(00000000,RegOpenKeyW), ref: 04C50671
          • FreeLibrary.KERNEL32(00000000,?,?,?,?,04C59970,?,00000000), ref: 04C506AD
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$Library$FreeLoad
          • String ID: ADVAPI32.dll$HARDWARE\DESCRIPTION\System\CentralProcessor\0$RegCloseKey$RegOpenKeyW$RegQueryValueExW$~MHz
          • API String ID: 2449869053-3996806929
          • Opcode ID: 376866b2945b1828ca70ba0f419ca6640497f9f66ecfdd0848b0468949778e27
          • Instruction ID: 6c65a95845fdb39936bd8e0262e89658cd8915385b2cc1b62ad06190ed802976
          • Opcode Fuzzy Hash: 376866b2945b1828ca70ba0f419ca6640497f9f66ecfdd0848b0468949778e27
          • Instruction Fuzzy Hash: CF0192796403556BD310EBA5DD49EABB7ECEFC5610F04092AB980E3101EA74F9098BA6
          APIs
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: atoi$DebugOutputString$strchrstrncpy$wcstombs
          • String ID:
          • API String ID: 2034632737-0
          • Opcode ID: 0e8573665881bd21e6035b3d9196c886b1f4a7aa9ad4b659afa421885382e940
          • Instruction ID: f8952cf81a541355985358652ca1efb697a40e52299def7920b10d862a3f8934
          • Opcode Fuzzy Hash: 0e8573665881bd21e6035b3d9196c886b1f4a7aa9ad4b659afa421885382e940
          • Instruction Fuzzy Hash: 7451D37A5002049FD314DF38D944AAA77D8FBC4320F554A3EE966C32D1EE3AEA0D8B51
          APIs
          • GetSystemDirectoryW.KERNEL32(?,00000230), ref: 04C4DFBF
          • lstrcatW.KERNEL32(?,\KB1035627.dat), ref: 04C4DFCF
          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 04C4DFEA
          • GetFileSize.KERNEL32(00000000,00000000), ref: 04C4DFFE
          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 04C4E007
          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 04C4E01A
          • mbstowcs.MSVCRT ref: 04C4E058
          • ??3@YAXPAX@Z.MSVCRT(00000000,?), ref: 04C4E079
          • CloseHandle.KERNEL32(00000000), ref: 04C4E083
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: File$??2@??3@CloseCreateDirectoryHandleReadSizeSystemlstrcatmbstowcs
          • String ID: \KB1035627.dat
          • API String ID: 2808364958-3026359696
          • Opcode ID: b7202f75f8b3d3fefe1cb72ffa9498468bfebee48fc99d128b3723c6c9479012
          • Instruction ID: f1d260e99355f821fb2a531f40918ba914882eb940c23541ac41f3f3837c04d7
          • Opcode Fuzzy Hash: b7202f75f8b3d3fefe1cb72ffa9498468bfebee48fc99d128b3723c6c9479012
          • Instruction Fuzzy Hash: 69212D79900254AFE3309F24ED4CFAB7BADEBC8750F040919F995D6141D9356D48C7A2
          APIs
          • LoadLibraryW.KERNEL32(user32.dll,00000000,00000000,?,?), ref: 04C5191F
          • GetProcAddress.KERNEL32(00000000,SetThreadDesktop), ref: 04C51933
          • GetProcAddress.KERNEL32(00000000,GetThreadDesktop), ref: 04C5193D
          • GetCurrentThreadId.KERNEL32 ref: 04C51941
          • GetUserObjectInformationW.USER32(?,00000002,?,00000100,?,?,?), ref: 04C51965
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$CurrentInformationLibraryLoadObjectThreadUser
          • String ID: GetThreadDesktop$SetThreadDesktop$user32.dll
          • API String ID: 813802599-2914630085
          • Opcode ID: 6704349181d64aa4c6c4bb77d07c58e9607193eca2cfd8a0a4fea0e3daa69111
          • Instruction ID: fa492dc61a9aeb71373330446a6940275bad59cd8843e34a62cf4351f74442c5
          • Opcode Fuzzy Hash: 6704349181d64aa4c6c4bb77d07c58e9607193eca2cfd8a0a4fea0e3daa69111
          • Instruction Fuzzy Hash: E501223A70031467D3202665AD4CBFF775EDBC0B62F480032FE44D2100EEAE688985B1
          APIs
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: CharNext$free$AttributesCreateDirectoryErrorFileLastlstrcpylstrlenmalloc
          • String ID:
          • API String ID: 3289936468-0
          • Opcode ID: 77469e2588ac79d69820239d48430df890a639ce40bbd40102fe8812d78996b2
          • Instruction ID: a0fa04f19bd7f80bb308cb00c4a94190cb43843b6d4ddc1f9feb4895499102a9
          • Opcode Fuzzy Hash: 77469e2588ac79d69820239d48430df890a639ce40bbd40102fe8812d78996b2
          • Instruction Fuzzy Hash: 0041E6B9C01215DFCB20EF58C9447EEB7B6FF88750F054239E855A3290E7382A81CBA5
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: CancelEventExchangeInterlockedclosesocketsetsockopt
          • String ID: bad Allocate$bad buffer
          • API String ID: 1486965892-2913219628
          • Opcode ID: e5a9ca807018b40785afaa62369cd899ddbf74bb67ef544a52d1be50fa8d3c56
          • Instruction ID: 64ba58361743994ba18c026e178a133364fc508ddbfe613c652531813b08067a
          • Opcode Fuzzy Hash: e5a9ca807018b40785afaa62369cd899ddbf74bb67ef544a52d1be50fa8d3c56
          • Instruction Fuzzy Hash: DD51B675A01208ABDF14EF65C990BAF77A7EFC8714F008029E905AB250EF34BD458BA5
          APIs
            • Part of subcall function 04C4C3D0: setsockopt.WS2_32(?,0000FFFF,00000080,00000000,00000004), ref: 04C4C3FA
            • Part of subcall function 04C4C3D0: CancelIo.KERNEL32(?), ref: 04C4C407
            • Part of subcall function 04C4C3D0: InterlockedExchange.KERNEL32(?,00000000), ref: 04C4C416
            • Part of subcall function 04C4C3D0: closesocket.WS2_32(?), ref: 04C4C423
            • Part of subcall function 04C4C3D0: SetEvent.KERNEL32(?), ref: 04C4C430
          • ResetEvent.KERNEL32(?,04C59908,safebrow.flnet.org,?,00000000,?,?,?,?,?,?,04C5133F,safebrow.flnet.org,?), ref: 04C4BF35
          • socket.WS2_32(00000002,00000001,00000006), ref: 04C4BF48
          • gethostbyname.WS2_32(?), ref: 04C4BF6A
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: Event$CancelExchangeInterlockedResetclosesocketgethostbynamesetsockoptsocket
          • String ID: safebrow.flnet.org
          • API String ID: 513860241-719919387
          • Opcode ID: e35d4f8c1598fe46afcc93ccf5a7f4db6ddc79391256e307fbf16bf8ef06134b
          • Instruction ID: 4d0f5053a43ba06e18e56ca392dd6932bd68645cc650b7734ed79a3fb9e870fd
          • Opcode Fuzzy Hash: e35d4f8c1598fe46afcc93ccf5a7f4db6ddc79391256e307fbf16bf8ef06134b
          • Instruction Fuzzy Hash: 584124392443006BE3209B65DC85F9BB7A9EFC9724F044119F68996181EBB6F9888B61
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: DebugExecExitOutputProcessStringsprintfstrstrwcstombs
          • String ID: cmd.exe /c %s$killme
          • API String ID: 587452862-2010447487
          • Opcode ID: 5dc2065b554c7b421a88a69249ebdafc8c5b24518dce211606aa04c25b99c605
          • Instruction ID: 7d0aaffd173801d36da4534ca71f4d8c668c921411aac4562beefb0a3600a900
          • Opcode Fuzzy Hash: 5dc2065b554c7b421a88a69249ebdafc8c5b24518dce211606aa04c25b99c605
          • Instruction Fuzzy Hash: F211C839108781BBD3208764DD08B9B77A9FBC4746F04482CE6C9D2180EBB99758CF52
          APIs
          • LoadLibraryW.KERNEL32(ADVAPI32.dll,04C4F9AF), ref: 04C4F9D1
          • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 04C4F9DF
          • GetProcAddress.KERNEL32(00000000,FreeSid), ref: 04C4F9EA
          • GetProcessHeap.KERNEL32(00000000,?), ref: 04C4FA04
          • HeapFree.KERNEL32(00000000), ref: 04C4FA0B
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: AddressHeapProc$FreeLibraryLoadProcess
          • String ID: ADVAPI32.dll$FreeSid$RegCloseKey
          • API String ID: 2518100794-3304832375
          • Opcode ID: f908b18ebc352dbff035787a6a613b19a5d74a48840dbe5e2957f778d4501280
          • Instruction ID: 8b3f277358766962c3f7debd9397b5c724dc7dc9a891ad73d734515711c692c4
          • Opcode Fuzzy Hash: f908b18ebc352dbff035787a6a613b19a5d74a48840dbe5e2957f778d4501280
          • Instruction Fuzzy Hash: EEF03079A402186BDB10ABF59E4CE9EB6AD9FC4650B194129F840E3141DE74AD408E60
          APIs
          • GetSystemDirectoryW.KERNEL32(?,00000230), ref: 04C50E96
          • lstrcatW.KERNEL32(?,\KB1035627.dat), ref: 04C50EA8
          • CreateFileW.KERNEL32(?,40000000,00000002,00000000,00000002,00000080,00000000), ref: 04C50EC7
          • ??2@YAPAXI@Z.MSVCRT ref: 04C50EE3
          • WriteFile.KERNEL32(04C513B4,00000000,?,?,00000000), ref: 04C50F18
          • CloseHandle.KERNEL32(04C513B4,?,?,00000000), ref: 04C50F21
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: File$??2@CloseCreateDirectoryHandleSystemWritelstrcat
          • String ID: \KB1035627.dat
          • API String ID: 476129920-3026359696
          • Opcode ID: e52fa399ac561f365a2e4f59473bf3452e9b43e779181f9103078a2579eba4a0
          • Instruction ID: 6329aab270931b655fb5339b451efee450540fad517b8cf103a0528073a75f07
          • Opcode Fuzzy Hash: e52fa399ac561f365a2e4f59473bf3452e9b43e779181f9103078a2579eba4a0
          • Instruction Fuzzy Hash: D4112639540118BFEB20AAB8CD4DFEE3B78EB44320F10026AF541E60D0DE746E80CB60
          APIs
          • LoadLibraryW.KERNEL32(user32.dll,?,?,04C516A9,00000000), ref: 04C519B7
          • GetProcAddress.KERNEL32(00000000,OpenInputDesktop), ref: 04C519C5
          • OpenDesktopW.USER32(?,00000000,00000000,400001CF), ref: 04C519DD
            • Part of subcall function 04C51910: LoadLibraryW.KERNEL32(user32.dll,00000000,00000000,?,?), ref: 04C5191F
            • Part of subcall function 04C51910: GetProcAddress.KERNEL32(00000000,SetThreadDesktop), ref: 04C51933
            • Part of subcall function 04C51910: GetProcAddress.KERNEL32(00000000,GetThreadDesktop), ref: 04C5193D
            • Part of subcall function 04C51910: GetCurrentThreadId.KERNEL32 ref: 04C51941
            • Part of subcall function 04C51910: GetUserObjectInformationW.USER32(?,00000002,?,00000100,?,?,?), ref: 04C51965
          • CloseDesktop.USER32(00000000), ref: 04C519FE
          • FreeLibrary.KERNEL32(00000000), ref: 04C51A0E
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: AddressLibraryProc$DesktopLoad$CloseCurrentFreeInformationObjectOpenThreadUser
          • String ID: OpenInputDesktop$user32.dll
          • API String ID: 1994081172-2568742042
          • Opcode ID: 7438dad1b0ed03bdcc4d683520d21dca5988562711ea857882cef187b3955660
          • Instruction ID: de645b4bd30b05bcd552ae03f0bc4abba7436e1914d8b67782104ed18ec4df19
          • Opcode Fuzzy Hash: 7438dad1b0ed03bdcc4d683520d21dca5988562711ea857882cef187b3955660
          • Instruction Fuzzy Hash: 39F0BB3E6403206BE762266ABD0CBEF361BDFC5661F0D4235FD06D1154DF249DC245A5
          APIs
          • lstrcpyW.KERNEL32(?,?,?,?,?,?,?,?), ref: 04C4D21D
          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,?,?), ref: 04C4D236
          • GetFileSize.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?), ref: 04C4D255
          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?), ref: 04C4D260
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?), ref: 04C4D267
          • LocalAlloc.KERNEL32(00000040,0000000B,?,?,?,?,?,?), ref: 04C4D274
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?), ref: 04C4D2A2
          • LocalFree.KERNEL32(00000000,?,?,?,?,?,?), ref: 04C4D2CB
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: FileLocallstrlen$AllocCloseCreateFreeHandleSizelstrcpy
          • String ID:
          • API String ID: 4036129025-0
          • Opcode ID: a85705d5652522be82fedd3168ba5987056fe11c83b725b5a7f38e3a6e85e7e4
          • Instruction ID: 8ed8b468f1a3fb5ddffebf6bea1889000145e0fcbd00022019050c1f088e2a07
          • Opcode Fuzzy Hash: a85705d5652522be82fedd3168ba5987056fe11c83b725b5a7f38e3a6e85e7e4
          • Instruction Fuzzy Hash: 7A21F139600214AFD714DF28EC49F6BBBEAFBC8715F084429F646D7280DE35A905CB61
          APIs
          • ?_Xran@std@@YAXXZ.MSVCP60(?,?,?,00000000,?,-00000008,04C57E51,000000FF,04C4D4EA,-00000008,?,?,?), ref: 04C4DC6E
          • ?_Split@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXXZ.MSVCP60(?,?,?,00000000,?,-00000008,04C57E51,000000FF,04C4D4EA,-00000008,?,?,?), ref: 04C4DC76
          • ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z.MSVCP60(?,00000000), ref: 04C4DCAD
          • ?_Eos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXI@Z.MSVCP60(?), ref: 04C4DCBA
          • ?_Split@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXXZ.MSVCP60 ref: 04C4DCC2
          • ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z.MSVCP60(00000001,?,?,?,00000000,?,-00000008,04C57E51,000000FF,04C4D4EA,-00000008,?,?,?), ref: 04C4DCF9
          • ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z.MSVCP60(?,00000001,?,?,?,00000000,?,-00000008,04C57E51,000000FF,04C4D4EA,-00000008,?,?,?), ref: 04C4DD3A
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: G@2@@std@@G@std@@U?$char_traits@V?$allocator@$Grow@?$basic_string@Split@?$basic_string@$Eos@?$basic_string@Tidy@?$basic_string@Xran@std@@
          • String ID:
          • API String ID: 2613176527-0
          • Opcode ID: ee4350b3d1eb7e2133bccfaf9bbc61177d25950acc707e0b3bc0ae39d4de0a6a
          • Instruction ID: 150b476aa811d55e577739d222825e912162bb1036524983abfb840cc551e70e
          • Opcode Fuzzy Hash: ee4350b3d1eb7e2133bccfaf9bbc61177d25950acc707e0b3bc0ae39d4de0a6a
          • Instruction Fuzzy Hash: 9341C079700B408FC720DF19D688A6AF7E2FBC8B20F54895DE4978B751DB35A841CB60
          APIs
          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,04C4C90C,00000001), ref: 04C4D314
            • Part of subcall function 04C4D3C0: ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z.MSVCP60(00000001,00000000,00000000,04C4D3A6,?,?,?,?,04C4C90C,00000001), ref: 04C4D3DD
            • Part of subcall function 04C4D3C0: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,04C4C90C,00000001), ref: 04C4D3E4
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: ??3@CreateFileG@2@@std@@G@std@@Tidy@?$basic_string@U?$char_traits@V?$allocator@
          • String ID:
          • API String ID: 1686836073-0
          • Opcode ID: 91a9d4b8a2882fcc23a7a25b6a1a02a46ba3bb82fca9788bc33edd66bdf1b1c7
          • Instruction ID: 6d6254232256c50effe6d5776f809d628e502cfaba5ad6eb1e9f2bf0f0e9b51e
          • Opcode Fuzzy Hash: 91a9d4b8a2882fcc23a7a25b6a1a02a46ba3bb82fca9788bc33edd66bdf1b1c7
          • Instruction Fuzzy Hash: 8C21D37A340300ABE310EF64ED88F6AB7A9EBC5721F14852AF745DA280DB75A8048771
          APIs
            • Part of subcall function 04C4B660: EnterCriticalSection.KERNEL32(?,?,?,04C4C467,?,?,?,7595F860,?,04C50E26,?,00000380), ref: 04C4B668
            • Part of subcall function 04C4B660: LeaveCriticalSection.KERNEL32(?,00000400,?,04C50E26,?,00000380), ref: 04C4B681
          • _ftol.MSVCRT ref: 04C4C48F
          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 04C4C499
          • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,7595F860,?,04C50E26,?,00000380), ref: 04C4C4CE
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: CriticalSection$??2@??3@EnterLeave_ftol
          • String ID:
          • API String ID: 2245774403-0
          • Opcode ID: fbe645ae6696c70b39a28354c6ef6fb6ff8f556dfe96bc2a157eadcf86f1221d
          • Instruction ID: ea8f4ca9f3af9ff58ea2b795d085bf3f57910de15716f6473349da01246ccabb
          • Opcode Fuzzy Hash: fbe645ae6696c70b39a28354c6ef6fb6ff8f556dfe96bc2a157eadcf86f1221d
          • Instruction Fuzzy Hash: 7E41CF71B003085BE604EF249D40A7F739AEBC4614F40492DF90693291FE34FA0997A2
          APIs
          • OutputDebugStringW.KERNEL32(?), ref: 04C4C83A
          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 04C4C85A
          • GetFileSize.KERNEL32(00000000,00000000), ref: 04C4C86A
          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 04C4C873
          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 04C4C887
          • CloseHandle.KERNEL32(00000000), ref: 04C4C893
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: File$??2@CloseCreateDebugHandleOutputReadSizeString
          • String ID:
          • API String ID: 2966346487-0
          • Opcode ID: 31d870a96e8e1a39db052d3923abde998f490f12041c36d300c7eb764fe631d1
          • Instruction ID: 7980c7d0de16c0d4da8cc30665f5cd2456b5652a641a95c8165a252132d38efe
          • Opcode Fuzzy Hash: 31d870a96e8e1a39db052d3923abde998f490f12041c36d300c7eb764fe631d1
          • Instruction Fuzzy Hash: 2BF0C83D541224BBE7106B64ED0DFEE3A6CDB86721F144214FD54A71C0DBB42E4186E5
          APIs
          • mbstowcs.MSVCRT ref: 04C50F9B
            • Part of subcall function 04C51A20: InternetOpenW.WININET(Mozilla/4.0 (compatible),00000000,00000000,00000000,00000000), ref: 04C51A46
          • CreateProcessW.KERNEL32(00000000,c:\windows\httpd.exe,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 04C50FE2
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: CreateInternetOpenProcessmbstowcs
          • String ID: D$WinSta0\Default$c:\windows\httpd.exe
          • API String ID: 3372342612-3967429356
          • Opcode ID: 9eb07b7aacdf37de7ee2eee78ee548b488610c0111361480ddd74e949b9fc6a2
          • Instruction ID: b0f1d26f4170b8a4c9b61121d1ce1aa401d7c2c8e04ef2b8701ee07d0dce9062
          • Opcode Fuzzy Hash: 9eb07b7aacdf37de7ee2eee78ee548b488610c0111361480ddd74e949b9fc6a2
          • Instruction Fuzzy Hash: 5611C8BF8011186BEB509AF4DE0DBDF77ADEB84354F108536E515E32C1DE749A098660
          APIs
          • CreateFileW.KERNEL32(00000021,40000000,00000002,00000000,00000003,00000080,00000000,?,00000001), ref: 04C4DA7C
          • SetFilePointer.KERNEL32(00000000,?,?,00000000,?,00000001), ref: 04C4DA8D
          • WriteFile.KERNEL32(00000000,?,?,?,00000000,?,00000001), ref: 04C4DAA7
          • CloseHandle.KERNEL32(00000000,?,00000001), ref: 04C4DAAE
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: File$CloseCreateHandlePointerWrite
          • String ID: p
          • API String ID: 3604237281-2181537457
          • Opcode ID: d98c851d1d0c952f0fb288ddb4e45960f2c1e06690100ecb09723a39009b6c9e
          • Instruction ID: 0bc483b0da8c371190fdfb974a2fdcd8644878d789664350baadb4e44f253067
          • Opcode Fuzzy Hash: d98c851d1d0c952f0fb288ddb4e45960f2c1e06690100ecb09723a39009b6c9e
          • Instruction Fuzzy Hash: 4B110275244301ABD300DF54DC85F6BBBE8FBC8304F040A0CF280862C0D774A9098B62
          APIs
          • wsprintfW.USER32 ref: 04C50A27
            • Part of subcall function 04C4FA30: LoadLibraryW.KERNEL32(ADVAPI32.dll,04C4153C,?,?), ref: 04C4FA86
            • Part of subcall function 04C4FA30: GetProcAddress.KERNEL32(00000000,RegQueryValueExW), ref: 04C4FAA0
            • Part of subcall function 04C4FA30: GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 04C4FAAE
            • Part of subcall function 04C4FA30: GetProcAddress.KERNEL32(00000000,RegEnumValueW), ref: 04C4FABC
            • Part of subcall function 04C4FA30: GetProcAddress.KERNEL32(00000000,RegEnumKeyExW), ref: 04C4FACA
            • Part of subcall function 04C4FA30: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 04C4FAD8
            • Part of subcall function 04C4FA30: FreeLibrary.KERNEL32(00000000), ref: 04C4FEAE
          • lstrlenW.KERNEL32(?), ref: 04C50A53
          • lstrlenW.KERNEL32(?), ref: 04C50A5F
          Strings
          • Host, xrefs: 04C50A39
          • SOFTWARE\Microsoft\Windows\CurrentVersion\Setup, xrefs: 04C50A06
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$Librarylstrlen$FreeLoadwsprintf
          • String ID: Host$SOFTWARE\Microsoft\Windows\CurrentVersion\Setup
          • API String ID: 4274792114-3116824957
          • Opcode ID: 8db5231025669b332f323311b8a7b7681e8daf61e34d7603621ad6f15f656bac
          • Instruction ID: f0fd7717e8545908db00831c769b5f3eb310bc6b209944598429b8fd145020ac
          • Opcode Fuzzy Hash: 8db5231025669b332f323311b8a7b7681e8daf61e34d7603621ad6f15f656bac
          • Instruction Fuzzy Hash: 6A0126727002082BE714A514DC06FEB72DAEFC8610F440439FA86A3280D9A5AD5A8FF2
          APIs
          • LoadLibraryW.KERNEL32(avicap32.dll,?,?,?,7595F860), ref: 04C506D1
          • GetProcAddress.KERNEL32(00000000,capGetDriverDescriptionW), ref: 04C506DF
          • FreeLibrary.KERNEL32(00000000), ref: 04C5070E
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: Library$AddressFreeLoadProc
          • String ID: avicap32.dll$capGetDriverDescriptionW
          • API String ID: 145871493-1031773666
          • Opcode ID: ed075b098e01c7b3c8d1402ee9054a32d3af538e8e4aa8289ce4be2af55f095d
          • Instruction ID: 73f91a2728477e8d839945c8cdbdaca37842623ee4cd72b9b385c6526c729d2a
          • Opcode Fuzzy Hash: ed075b098e01c7b3c8d1402ee9054a32d3af538e8e4aa8289ce4be2af55f095d
          • Instruction Fuzzy Hash: CDF0B43A1813246BD2206561AD09FEB374DDB86350F084122FD91D3081AA59248C89A0
          APIs
          • CreateMutexA.KERNEL32(00000000,00000001,UpdateWindow,?,04C51073), ref: 04C50FFB
          • GetLastError.KERNEL32(?,04C51073), ref: 04C51003
          • ReleaseMutex.KERNEL32(00000000,?,04C51073), ref: 04C51016
          • ExitProcess.KERNEL32 ref: 04C5101E
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: Mutex$CreateErrorExitLastProcessRelease
          • String ID: UpdateWindow
          • API String ID: 1221886886-2116364557
          • Opcode ID: 4c17daae674bdebd9a46c0da36394579081a532d557f355906394b8488d01b41
          • Instruction ID: 07103907f748103bda7e26dea287f3122dd3f7fcfb4ff0564079f0a39e47f4ee
          • Opcode Fuzzy Hash: 4c17daae674bdebd9a46c0da36394579081a532d557f355906394b8488d01b41
          • Instruction Fuzzy Hash: 32D05E38984360ABD7A02660AD4DB8C3926EBD9762F0C0451F60AE5090CB684CC04A61
          APIs
          • Sleep.KERNEL32(00000064), ref: 04C50501
          • PeekNamedPipe.KERNEL32(?,?,00000800,00000000,?,00000000), ref: 04C50521
          • LocalAlloc.KERNEL32(00000040,?), ref: 04C50543
          • ReadFile.KERNEL32(?,00000000,?,?,00000000), ref: 04C5055C
          • LocalFree.KERNEL32(00000000), ref: 04C50570
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: Local$AllocFileFreeNamedPeekPipeReadSleep
          • String ID:
          • API String ID: 407041184-0
          • Opcode ID: 2a17705e44b1693b1d7dcfc3de7fb50e9f92b103725373026fd3e3c3d4c5e136
          • Instruction ID: 6e8c5a83ab917de7e9bed09b814608756da93360cb538d185975280a7dbe9b6d
          • Opcode Fuzzy Hash: 2a17705e44b1693b1d7dcfc3de7fb50e9f92b103725373026fd3e3c3d4c5e136
          • Instruction Fuzzy Hash: F9115E75204342AFD704DE65D989F6B77E9FFC8740F00492CBA85D7280DB74E94887A6
          APIs
          • setsockopt.WS2_32(?,0000FFFF,00000080,00000000,00000004), ref: 04C4C3FA
          • CancelIo.KERNEL32(?), ref: 04C4C407
          • InterlockedExchange.KERNEL32(?,00000000), ref: 04C4C416
          • closesocket.WS2_32(?), ref: 04C4C423
          • SetEvent.KERNEL32(?), ref: 04C4C430
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: CancelEventExchangeInterlockedclosesocketsetsockopt
          • String ID:
          • API String ID: 1486965892-0
          • Opcode ID: 20dcbb09c702c7d02b64a2297284411b404ee97b4791373b6742b6dbd20f2d14
          • Instruction ID: 237d8f6a24601f7c2ef264225705b23c4cf19a9ee16d67181ba7c9d41ac52976
          • Opcode Fuzzy Hash: 20dcbb09c702c7d02b64a2297284411b404ee97b4791373b6742b6dbd20f2d14
          • Instruction Fuzzy Hash: 3CF0127D214701EFD7648B60D94CF97B7A8EF89711F108A1DF6EA46280CF7468888766
          APIs
            • Part of subcall function 04C4B270: LoadLibraryW.KERNEL32 ref: 04C4B2ED
            • Part of subcall function 04C4B270: LoadLibraryW.KERNEL32(00000000,InitializeCriticalSection), ref: 04C4B2FB
            • Part of subcall function 04C4B270: GetProcAddress.KERNEL32(00000000), ref: 04C4B2FE
            • Part of subcall function 04C4B270: FreeLibrary.KERNEL32(00000000), ref: 04C4B30B
          • WSAStartup.WS2_32(00000202,?), ref: 04C4B7ED
          • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 04C4B7FB
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: Library$Load$AddressCreateEventFreeProcStartup
          • String ID: H$P
          • API String ID: 358607388-457946424
          • Opcode ID: 1dedd82cf13218a9f132de5379edf65d6e70dffc7f16a0b086774adfab20b4e2
          • Instruction ID: d6553b769018224c3c0dc4c0c415f420c63fc51e445bf26fe59be6078fd2bb82
          • Opcode Fuzzy Hash: 1dedd82cf13218a9f132de5379edf65d6e70dffc7f16a0b086774adfab20b4e2
          • Instruction Fuzzy Hash: 00216A34109780DEE321DF68C604B9BBBE5AB96B14F04895DE4EE476C1D7B8A408CB63
          APIs
          • wsprintfW.USER32 ref: 04C4E364
          • lstrlenW.KERNEL32(?,00000000), ref: 04C4E377
            • Part of subcall function 04C4FF30: LoadLibraryW.KERNEL32(ADVAPI32.dll), ref: 04C4FF5F
            • Part of subcall function 04C4FF30: GetProcAddress.KERNEL32(00000000,RegCreateKeyExW), ref: 04C4FF73
            • Part of subcall function 04C4FF30: GetProcAddress.KERNEL32(00000000,RegSetValueExW), ref: 04C4FF7E
            • Part of subcall function 04C4FF30: GetProcAddress.KERNEL32(00000000,RegDeleteKeyW), ref: 04C4FF89
            • Part of subcall function 04C4FF30: GetProcAddress.KERNEL32(00000000,RegDeleteValueW), ref: 04C4FF94
            • Part of subcall function 04C4FF30: GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 04C4FF9F
            • Part of subcall function 04C4FF30: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 04C4FFA9
          Strings
          • Host, xrefs: 04C4E387
          • SOFTWARE\Microsoft\Windows\CurrentVersion\Setup, xrefs: 04C4E353
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$LibraryLoadlstrlenwsprintf
          • String ID: Host$SOFTWARE\Microsoft\Windows\CurrentVersion\Setup
          • API String ID: 2349312171-3116824957
          • Opcode ID: d7cb997b3a62cae6c3e3a3beafaeb5a3a828f96d95a5db3190bfa1e376284f98
          • Instruction ID: cbf15c10d5c47b9295075ca9725fd2d4b40c0d389e53626c917b2a0dd4d29f95
          • Opcode Fuzzy Hash: d7cb997b3a62cae6c3e3a3beafaeb5a3a828f96d95a5db3190bfa1e376284f98
          • Instruction Fuzzy Hash: A5F0EC3A5403147BE3106614DD0EFDB3BD9EFC4710F044439B986A2141E9746559CFE2
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: edc7b88df1698727375f411f62e07cc50a4394be63d91dfa1c0bd9b35974ef53
          • Instruction ID: 88ec75267558493105678231ac3d411daffbf69eed876078d6d5caf4caa66bd3
          • Opcode Fuzzy Hash: edc7b88df1698727375f411f62e07cc50a4394be63d91dfa1c0bd9b35974ef53
          • Instruction Fuzzy Hash: A331B4763026126BE7149A59E884FBEB75DEBD0262F00403AFA40D6250DB61F8D5C7A4
          APIs
          • lstrlenW.KERNEL32(?,?), ref: 04C4D462
          • wcslen.MSVCRT ref: 04C4D4A9
          • ?assign@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PBGI@Z.MSVCP60(?,00000000), ref: 04C4D4B8
            • Part of subcall function 04C4D570: lstrlenW.KERNEL32(?,?,?,?), ref: 04C4D5A8
            • Part of subcall function 04C4D570: wsprintfW.USER32 ref: 04C4D5DC
            • Part of subcall function 04C4D570: FindFirstFileW.KERNEL32(?,?), ref: 04C4D5F2
            • Part of subcall function 04C4D7C0: ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,04C4D48C,?), ref: 04C4D804
            • Part of subcall function 04C4D7C0: ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,04C4D48C,?), ref: 04C4D815
            • Part of subcall function 04C4D7C0: ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,04C4D48C,?), ref: 04C4D826
            • Part of subcall function 04C4D7C0: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,04C4D48C,?), ref: 04C4D851
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: G@2@@std@@G@std@@U?$char_traits@V?$allocator@$Refcnt@?$basic_string@$lstrlen$??3@?assign@?$basic_string@FileFindFirstV12@wcslenwsprintf
          • String ID:
          • API String ID: 2478117631-0
          • Opcode ID: 3cc2bfe75740c047775560ceb264a3acaab34abc4c3b2829696d7b97fe1e4442
          • Instruction ID: 1a9cd825cd068c2ea4e04925d7231c3cf4279a75f2ae514376895d53feb474c6
          • Opcode Fuzzy Hash: 3cc2bfe75740c047775560ceb264a3acaab34abc4c3b2829696d7b97fe1e4442
          • Instruction Fuzzy Hash: B031C5B56043419FC700EF28C984A6BBBE5FFC8218F444A2DF49A83351DB34E949CB92
          APIs
          • ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z.MSVCP60(00000001,?,?,?,?,?,?,?,?,?,?,000000FF,04C4C718), ref: 04C4C782
          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,000000FF,04C4C718), ref: 04C4C789
          • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,000000FF,04C4C718), ref: 04C4C7DF
          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,000000FF,04C4C718), ref: 04C4C7F6
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: ??3@$G@2@@std@@G@std@@Tidy@?$basic_string@U?$char_traits@V?$allocator@
          • String ID:
          • API String ID: 4114290161-0
          • Opcode ID: 67482df3b22f454c8b6045b0fd6946d8c374af5c94177a09c5920ef4b785bfa0
          • Instruction ID: eb93821f3473b979217a36b30eb35fda1a858c4425f0cabe2f27981de0b6e0a9
          • Opcode Fuzzy Hash: 67482df3b22f454c8b6045b0fd6946d8c374af5c94177a09c5920ef4b785bfa0
          • Instruction Fuzzy Hash: E73165B5600B019FC710DF19C680A1ABBE1FF89714F40462DE55A877A1E731BA94CBD2
          APIs
          • ceil.MSVCRT ref: 04C4B4FC
          • _ftol.MSVCRT ref: 04C4B505
          • VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000004,?,?,?,?,?,?,?,?,?,00000380), ref: 04C4B519
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: AllocVirtual_ftolceil
          • String ID:
          • API String ID: 3317677364-0
          • Opcode ID: a90e9fa99408ef9f942102b0d76f6198843bc6aa5e4fcadad38c2f9fa3e18216
          • Instruction ID: b55f061f09a5840b8852b928ab3f6f1aabc3e992f4f2fa40b2cae80849dc473c
          • Opcode Fuzzy Hash: a90e9fa99408ef9f942102b0d76f6198843bc6aa5e4fcadad38c2f9fa3e18216
          • Instruction Fuzzy Hash: 9611C0756043048BD704EE29BD4672ABBE5EBC4365F04843EEE498B380EA75E848CA65
          APIs
          • ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,04C4D48C,?), ref: 04C4D804
          • ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,04C4D48C,?), ref: 04C4D815
          • ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,04C4D48C,?), ref: 04C4D826
          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,04C4D48C,?), ref: 04C4D851
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: G@2@@std@@G@std@@Refcnt@?$basic_string@U?$char_traits@V?$allocator@$??3@
          • String ID:
          • API String ID: 1249008704-0
          • Opcode ID: 9e7fecdd50bcfe4024281db2fa0dcdf24a8fb0a681a5f7962b4928e1090a5a31
          • Instruction ID: 365f085f4d8d0f84a2647982e4acd5bd2b2a950881d185373b47cab8fcd5fb18
          • Opcode Fuzzy Hash: 9e7fecdd50bcfe4024281db2fa0dcdf24a8fb0a681a5f7962b4928e1090a5a31
          • Instruction Fuzzy Hash: 24214FB47006019FD718EF29DA8492BBBE6EF89720704856DE85AC7751EB30FD51CB90
          APIs
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: _ftolceil
          • String ID:
          • API String ID: 2006273141-0
          • Opcode ID: 9c07f64858f1de3973086f10f833b3ba53b05607a685c37426fbe655f56a44da
          • Instruction ID: d5a37f27cc5531103c8d3570b1a1082ab415bf254681a2a6566620d6b5cd9504
          • Opcode Fuzzy Hash: 9c07f64858f1de3973086f10f833b3ba53b05607a685c37426fbe655f56a44da
          • Instruction Fuzzy Hash: DA11D2756042048FD700EF35E98572ABBE1EBC4766F44842DEE4587340EA75A848CBA2
          APIs
          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 04C4B8BC
          • CloseHandle.KERNEL32(?), ref: 04C4B8DF
          • CloseHandle.KERNEL32(?), ref: 04C4B8E8
          • WSACleanup.WS2_32 ref: 04C4B8EA
            • Part of subcall function 04C4C3D0: setsockopt.WS2_32(?,0000FFFF,00000080,00000000,00000004), ref: 04C4C3FA
            • Part of subcall function 04C4C3D0: CancelIo.KERNEL32(?), ref: 04C4C407
            • Part of subcall function 04C4C3D0: InterlockedExchange.KERNEL32(?,00000000), ref: 04C4C416
            • Part of subcall function 04C4C3D0: closesocket.WS2_32(?), ref: 04C4C423
            • Part of subcall function 04C4C3D0: SetEvent.KERNEL32(?), ref: 04C4C430
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: CloseHandle$CancelCleanupEventExchangeInterlockedObjectSingleWaitclosesocketsetsockopt
          • String ID:
          • API String ID: 136543108-0
          • Opcode ID: 37aabf9602f319d221e77a992652c2482c129bd4766c717745fe69c98a80c318
          • Instruction ID: 4cdafb6efe3de8676b8e832fe067bca436073aaf70bdf0f74ef3da80801cfe6b
          • Opcode Fuzzy Hash: 37aabf9602f319d221e77a992652c2482c129bd4766c717745fe69c98a80c318
          • Instruction Fuzzy Hash: 80116038108B819FD310DF28C644B5AFBE5AFD5724F044A0DE4EA426C1DBB8B9058B62
          APIs
          • InterlockedExchange.KERNEL32(?,00000001), ref: 04C4E84C
          • OutputDebugStringA.KERNEL32(COMMAND_GETINFO), ref: 04C4E889
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: DebugExchangeInterlockedOutputString
          • String ID: COMMAND_GETINFO
          • API String ID: 4170579539-405466798
          • Opcode ID: 9b2213856bda349a411222fcdb64f2cbfa0bc4dcafadf428128d1836e1a46493
          • Instruction ID: 535d88c4e6c70e6d3de6057473bfbcf32ddb614df6ac7601b048605dc46e0556
          • Opcode Fuzzy Hash: 9b2213856bda349a411222fcdb64f2cbfa0bc4dcafadf428128d1836e1a46493
          • Instruction Fuzzy Hash: C33127777842106BF290F758BD06FF37356BBE0B19F0A4829F98A4A1C1D9913C95C7A1
          APIs
          • EnterCriticalSection.KERNEL32(?,00000000,?,?,?,04C4C2B9,?,00000005,00000005,00000000,?,?,?,?,?), ref: 04C4B3FE
          • LeaveCriticalSection.KERNEL32(?,?,?,?,04C4C2B9,?,00000005,00000005,00000000,?,?,?,?,?), ref: 04C4B414
          • memmove.MSVCRT(00000000,?,00000000,?,?,?,?,04C4C2B9,?,00000005,00000005,00000000,?,?,?,?), ref: 04C4B465
          • LeaveCriticalSection.KERNEL32(?,00000000,?,?,?,04C4C2B9,?,00000005,00000005,00000000,?,?,?,?,?), ref: 04C4B48B
          Memory Dump Source
          • Source File: 00000004.00000002.2366451192.0000000004C47000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: true
          • Associated: 00000004.00000002.2366451192.0000000004C40000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_4c40000_rundll32.jbxd
          Similarity
          • API ID: CriticalSection$Leave$Entermemmove
          • String ID:
          • API String ID: 72348100-0
          • Opcode ID: dd12f9507f3a84fc46d6fd84bce504512007c2bac3a788df1df96d97706809cb
          • Instruction ID: 07e7df874e05e08392027ee3d54a99ce5896c97dde4ba90e1bcbed104b78c314
          • Opcode Fuzzy Hash: dd12f9507f3a84fc46d6fd84bce504512007c2bac3a788df1df96d97706809cb
          • Instruction Fuzzy Hash: 4311BF363042198F9B04AF74AE8846FBB9AEFC4215744542EEE43D7701FE68FD088790

          Execution Graph

          Execution Coverage:13.3%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:987
          Total number of Limit Nodes:15
          execution_graph 5038 321db60 5039 321dba3 ??3@YAXPAX 5038->5039 5040 321db6f 5038->5040 5041 321db70 ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N ??3@YAXPAX 5040->5041 5041->5041 5042 321dba2 5041->5042 5042->5039 4417 32215a3 4422 321eb90 288 API calls 4417->4422 4419 32215b4 CreateThread 4423 3221501 7 API calls 4419->4423 4424 3221026 4419->4424 4421 32215d0 GetWindowsDirectoryA DeleteFileA 4422->4419 4423->4421 4425 3221030 __EH_prolog 4424->4425 4477 321eb90 288 API calls 4425->4477 4427 3221046 GetInputState GetCurrentThreadId PostThreadMessageW GetMessageW 4478 3220ff1 CreateMutexA GetLastError 4427->4478 4430 3221090 GetProcAddress OpenWindowStationW GetProcAddress 4431 32210b5 4430->4431 4432 32210ba Sleep GetTickCount wsprintfW strstr 4430->4432 4431->4432 4433 3221122 SetErrorMode 4432->4433 4434 32210f3 4432->4434 4482 321b780 4433->4482 4557 3220f2c 4434->4557 4438 3221135 4491 321e3d0 4438->4491 4439 3221103 WinExec 4439->4433 4440 3221110 4560 32216e0 CreateEventW 4440->4560 4443 322111f 4443->4433 4444 3221159 atoi 4445 322116b sprintf OutputDebugStringA Sleep 4444->4445 4445->4445 4459 322114a 4445->4459 4446 32211c8 Sleep 4446->4446 4446->4459 4447 32211ee Sleep 4447->4447 4447->4459 4448 322121e GetLocalTime sprintf 4451 322126d 4448->4451 4449 32212f9 atoi atoi atoi GetTickCount 4494 321bf20 4449->4494 4452 32212ab OpenEventW 4451->4452 4453 32212d7 Sleep 4451->4453 4451->4459 4469 322147e OpenEventW WaitForSingleObject Sleep 4451->4469 4563 321c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4451->4563 4452->4451 4454 32212c4 Sleep 4452->4454 4453->4459 4454->4452 4455 32212d5 4454->4455 4455->4449 4456 321bf20 65 API calls 4456->4459 4457 3221391 sprintf 4513 3220e7e GetSystemDirectoryW lstrcatW CreateFileW ??2@YAPAXI 4457->4513 4459->4444 4459->4446 4459->4447 4459->4448 4459->4449 4459->4451 4459->4456 4459->4457 4467 3221454 Sleep 4459->4467 4468 3221478 GetTickCount 4459->4468 4554 321e400 4459->4554 4461 32212f2 CloseHandle 4461->4449 4462 32213b4 4464 32213da GetTickCount 4462->4464 4516 3227870 4462->4516 4531 3220ac0 GetVersionExW 4464->4531 4467->4459 4468->4469 4469->4451 4470 32214b8 4469->4470 4564 321c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4470->4564 4472 32214c3 CloseHandle SetErrorMode 4565 321e450 4472->4565 4477->4427 4479 3221010 4478->4479 4480 3221015 ReleaseMutex ExitProcess 4478->4480 4479->4480 4481 3221024 LoadLibraryW GetProcAddress 4479->4481 4481->4430 4583 321b270 LoadLibraryW LoadLibraryW GetProcAddress 4482->4583 4484 321b7aa 4485 321b270 4 API calls 4484->4485 4486 321b7bd 4485->4486 4487 321b270 4 API calls 4486->4487 4488 321b7cd 4487->4488 4489 321b270 4 API calls 4488->4489 4490 321b7dd WSAStartup CreateEventW 4489->4490 4490->4438 4585 321ea10 4491->4585 4493 321e3dd 4493->4459 4589 321c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4494->4589 4496 321bf2e ResetEvent socket 4497 321bf65 gethostbyname 4496->4497 4498 321bf59 4496->4498 4499 321bf82 htons connect 4497->4499 4500 321bf76 4497->4500 4498->4459 4502 321bfd0 4499->4502 4503 321bff9 setsockopt 4499->4503 4500->4459 4590 321bb70 4502->4590 4504 321c059 4503->4504 4505 321c01d WSAIoctl 4503->4505 4507 32216e0 17 API calls 4504->4507 4505->4504 4509 321c075 4507->4509 4508 321bfde 4508->4503 4611 321b940 RegOpenKeyExW 4508->4611 4509->4459 4511 321bfeb 4511->4503 4512 321bfef 4511->4512 4512->4459 4514 3220f00 WriteFile CloseHandle 4513->4514 4515 3220eef 4513->4515 4514->4462 4515->4514 4517 322787d 4516->4517 4518 3227886 4516->4518 4517->4462 4519 322789b 4518->4519 4520 32278b6 VirtualAlloc 4518->4520 4519->4462 4521 32278d3 4520->4521 4522 32278cc 4520->4522 4626 3227a10 4521->4626 4522->4462 4525 3227907 VirtualFree 4525->4462 4526 322791d VirtualProtect 4632 4922c10 4526->4632 4528 322796d 4528->4462 4529 322794f VirtualFree 4529->4462 4731 3220a70 gethostname MultiByteToWideChar lstrlenW 4531->4731 4533 3220b2a getsockname 4732 3220630 6 API calls 4533->4732 4536 3220bd4 GetSystemInfo wsprintfW 4539 3220bfa 4536->4539 4537 3220bb8 4537->4536 4538 3220bc3 lstrcpyW 4537->4538 4538->4539 4736 32206c0 LoadLibraryW GetProcAddress 4539->4736 4543 3220c1e 4544 3220c48 6 API calls 4543->4544 4743 3220730 _wcsrev 4544->4743 4548 3220d4d lstrlenW 4549 3220db0 4548->4549 4550 3220d68 mbstowcs 4548->4550 4551 3220dc0 lstrcpyW mbstowcs 4549->4551 4550->4551 4799 321c450 4551->4799 4553 3220e26 4553->4459 4555 321e416 4554->4555 4556 321e40b lstrcpyW 4554->4556 4555->4459 4556->4555 4558 3220f33 GetFileAttributesW 4557->4558 4559 3220f42 4557->4559 4558->4559 4559->4439 4559->4440 4914 3221630 CreateThread 4560->4914 4562 3221731 WaitForSingleObject CloseHandle 4562->4443 4563->4461 4564->4472 4566 321e484 4565->4566 4567 321e4ad 4565->4567 4568 321e48b TerminateThread CloseHandle 4566->4568 4938 321ea60 CloseHandle 4567->4938 4568->4567 4568->4568 4570 321e4bd 4571 321b880 WaitForSingleObject 4570->4571 4572 321b8d2 CloseHandle CloseHandle WSACleanup 4571->4572 4573 321b8cb 4571->4573 4940 321b340 4572->4940 4939 321c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4573->4939 4576 321b8fd 4577 321b340 2 API calls 4576->4577 4578 321b90a 4577->4578 4579 321b340 2 API calls 4578->4579 4580 321b917 4579->4580 4581 321b340 2 API calls 4580->4581 4582 321b927 4581->4582 4584 321b30a FreeLibrary 4583->4584 4584->4484 4588 321c680 4585->4588 4587 321ea26 CreateEventW 4587->4493 4588->4587 4589->4496 4591 321bb93 4590->4591 4625 321c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4591->4625 4593 321bba5 ResetEvent socket 4594 321bbd4 4593->4594 4601 321bce0 4593->4601 4595 321bce5 4594->4595 4596 321bc2f InternetQueryOptionA 4594->4596 4598 321bcfa strchr strncpy 4595->4598 4595->4601 4597 321bc5e strchr strncpy 4596->4597 4596->4601 4599 321bcb4 atoi 4597->4599 4597->4601 4600 321bd44 atoi 4598->4600 4598->4601 4599->4601 4602 321bd6a gethostbyname 4599->4602 4600->4601 4600->4602 4601->4508 4602->4601 4603 321bd81 htons connect 4602->4603 4603->4601 4604 321bdb8 sprintf OutputDebugStringA send 4603->4604 4606 321be43 select 4604->4606 4607 321be99 closesocket 4606->4607 4608 321bebb recv strstr 4606->4608 4607->4601 4608->4607 4610 321bef8 4608->4610 4610->4508 4612 321b9a6 RegQueryValueExA 4611->4612 4613 321ba9f 4611->4613 4612->4613 4614 321b9da strncpy RegCloseKey strstr 4612->4614 4613->4511 4614->4613 4615 321ba18 InternetOpenW 4614->4615 4615->4613 4616 321ba31 InternetOpenUrlA 4615->4616 4616->4613 4617 321ba4b malloc InternetReadFile InternetCloseHandle InternetCloseHandle 4616->4617 4618 321ba91 free 4617->4618 4619 321baad _strupr strstr 4617->4619 4618->4613 4620 321baea strchr 4619->4620 4621 321bb4e free 4619->4621 4620->4621 4623 321baff 4620->4623 4621->4511 4622 321bb70 24 API calls 4622->4623 4623->4621 4623->4622 4624 321bb3c strstr 4623->4624 4624->4620 4624->4621 4625->4593 4627 3227903 4626->4627 4629 3227a2b 4626->4629 4627->4525 4627->4526 4628 3227a9b LoadLibraryA GetModuleHandleA 4628->4627 4628->4629 4629->4627 4629->4628 4630 3227acb 4629->4630 4630->4629 4631 3227ad8 GetProcAddress 4630->4631 4631->4627 4631->4630 4633 4922c17 CreateThread 4632->4633 4634 3227945 4632->4634 4633->4634 4635 4922b20 4633->4635 4634->4528 4634->4529 4641 4921930 CreateMutexA GetLastError 4635->4641 4638 4922bc0 4640 4922bcc TranslateMessage DispatchMessageA GetMessageA 4638->4640 4639 4922be8 4640->4639 4640->4640 4642 492195e 8 API calls 4641->4642 4643 492194f ReleaseMutex ExitProcess 4641->4643 4642->4638 4642->4639 4644 49225c0 4642->4644 4660 4922c60 4644->4660 4647 492267c 6 API calls 4648 4922664 4647->4648 4658 49226fe 4647->4658 4648->4647 4650 4922b0b SysFreeString 4650->4647 4651 492273d wcstombs _strcmpi 4651->4658 4653 4922ae4 SysFreeString 4653->4648 4655 4922af9 4653->4655 4654 4922794 GetLocalTime GetWindowTextA wsprintfA 4654->4658 4655->4648 4658->4650 4658->4651 4658->4654 4662 4922250 LoadLibraryA 4658->4662 4668 4921520 malloc 4658->4668 4672 4921590 4658->4672 4676 49217f0 4658->4676 4687 4922470 4658->4687 4661 49225e3 CoInitialize 4660->4661 4661->4648 4663 492228e 4662->4663 4666 4922354 4662->4666 4664 4922299 RegisterClipboardFormatA SendMessageTimeoutA GetProcAddress 4663->4664 4665 492234d FreeLibrary 4663->4665 4664->4665 4667 49222cd 4664->4667 4665->4666 4666->4658 4667->4665 4667->4666 4669 492155b 4668->4669 4669->4669 4699 4921440 malloc 4669->4699 4675 49215c5 4672->4675 4673 49215ff isalnum 4673->4675 4674 4921758 4674->4658 4675->4673 4675->4674 4677 4922c60 4676->4677 4678 49217fa WSAStartup 4677->4678 4679 4921813 socket 4678->4679 4680 4921926 4678->4680 4679->4680 4681 492182a htons gethostbyname 4679->4681 4680->4658 4681->4680 4682 4921853 connect 4681->4682 4683 4921882 4682->4683 4684 4921871 closesocket 4682->4684 4701 49217c0 wsprintfA 4683->4701 4684->4658 4686 49218c1 send recv closesocket WSACleanup 4686->4680 4688 4922250 5 API calls 4687->4688 4689 49224ad 4688->4689 4690 49224ce wcstombs 4689->4690 4691 492256c SysFreeString 4689->4691 4693 4922542 SysFreeString 4690->4693 4694 4922505 4690->4694 4691->4653 4697 4922559 4693->4697 4702 4921b20 4694->4702 4697->4653 4698 492252e 4698->4653 4700 492146d free 4699->4700 4700->4658 4701->4686 4703 49221e5 SysFreeString 4702->4703 4704 4921b5f 4702->4704 4703->4698 4725 4921960 Sleep 4704->4725 4706 49221c9 SysFreeString 4706->4703 4707 4921b65 4707->4706 4709 4921bc9 Sleep 4707->4709 4711 4921d3f VariantClear VariantClear 4707->4711 4712 492213a VariantClear VariantClear VariantClear 4707->4712 4713 4921e16 VariantClear VariantClear VariantClear 4707->4713 4714 4921e91 lstrlenW 4707->4714 4715 4921eab WideCharToMultiByte 4707->4715 4716 4921edf lstrlenW 4707->4716 4717 4921ef9 WideCharToMultiByte 4707->4717 4718 4921f32 lstrlenW 4707->4718 4719 4921f7c _strcmpi 4707->4719 4720 4921f4c WideCharToMultiByte 4707->4720 4723 4921fd2 _strcmpi 4707->4723 4724 492217d VariantClear VariantClear VariantClear 4707->4724 4710 4921c4b VariantClear VariantClear 4709->4710 4710->4707 4711->4707 4712->4707 4713->4707 4714->4707 4715->4707 4716->4707 4717->4707 4718->4707 4721 4921f92 _strcmpi 4719->4721 4722 4921fac StrStrIA 4719->4722 4720->4719 4721->4712 4721->4722 4722->4707 4722->4723 4723->4707 4724->4707 4727 4921ac1 4725->4727 4729 4921995 4725->4729 4726 4921a0e VariantClear 4726->4729 4727->4707 4728 4921aa6 VariantClear 4728->4727 4728->4729 4729->4726 4729->4727 4729->4728 4730 4921b20 25 API calls 4729->4730 4730->4729 4731->4533 4733 32206a8 4732->4733 4734 32206b3 GetVersionExW 4733->4734 4735 32206ac FreeLibrary 4733->4735 4734->4536 4734->4537 4735->4734 4737 32206e9 4736->4737 4738 3220714 4737->4738 4739 322070d FreeLibrary 4737->4739 4740 32205d0 CreateFileW 4738->4740 4739->4738 4741 32205f0 4740->4741 4742 32205f5 DeviceIoControl CloseHandle 4740->4742 4741->4543 4742->4543 4829 3221760 6 API calls 4743->4829 4745 3220754 4746 3220763 lstrcatW lstrcatW 4745->4746 4747 3220781 _wcsrev 4745->4747 4746->4747 4748 3221760 9 API calls 4747->4748 4749 322078e 4748->4749 4750 32207b3 _wcsrev 4749->4750 4751 3220795 lstrcatW lstrcatW 4749->4751 4752 3221760 9 API calls 4750->4752 4751->4750 4753 32207c0 4752->4753 4754 32207c7 lstrcatW lstrcatW 4753->4754 4755 32207e5 _wcsrev 4753->4755 4754->4755 4756 3221760 9 API calls 4755->4756 4757 32207f2 4756->4757 4758 3220817 _wcsrev 4757->4758 4759 32207f9 lstrcatW lstrcatW 4757->4759 4760 3221760 9 API calls 4758->4760 4759->4758 4761 3220824 4760->4761 4762 322082b lstrcatW lstrcatW 4761->4762 4763 3220849 _wcsrev 4761->4763 4762->4763 4764 3221760 9 API calls 4763->4764 4765 3220856 4764->4765 4766 322087b _wcsrev 4765->4766 4767 322085d lstrcatW lstrcatW 4765->4767 4768 3221760 9 API calls 4766->4768 4767->4766 4769 3220888 4768->4769 4770 322088f lstrcatW lstrcatW 4769->4770 4771 32208ad _wcsrev 4769->4771 4770->4771 4772 3221760 9 API calls 4771->4772 4773 32208ba 4772->4773 4774 32208c1 lstrcatW lstrcatW 4773->4774 4775 32208df _wcsrev 4773->4775 4774->4775 4776 3221760 9 API calls 4775->4776 4777 32208ec 4776->4777 4778 32208f3 lstrcatW lstrcatW 4777->4778 4779 3220911 _wcsrev 4777->4779 4778->4779 4780 3221760 9 API calls 4779->4780 4781 322091e 4780->4781 4782 3220943 _wcsrev 4781->4782 4783 3220925 lstrcatW lstrcatW 4781->4783 4784 3221760 9 API calls 4782->4784 4783->4782 4785 3220950 4784->4785 4786 3220957 lstrcatW lstrcatW 4785->4786 4787 3220975 _wcsrev 4785->4787 4786->4787 4788 3221760 9 API calls 4787->4788 4789 3220982 4788->4789 4790 32209a7 wcsstr 4789->4790 4791 3220989 lstrcatW lstrcatW 4789->4791 4792 32209ca lstrcpyW 4790->4792 4793 32209be lstrcatW 4790->4793 4791->4790 4794 32209e0 wsprintfW 4792->4794 4793->4792 4836 321fa30 6 API calls 4794->4836 4796 3220a49 lstrlenW 4797 3220a59 4796->4797 4798 3220a5e lstrlenW 4796->4798 4797->4798 4798->4548 4879 321b660 EnterCriticalSection 4799->4879 4801 321c467 4802 321c473 _ftol ??2@YAPAXI 4801->4802 4803 321c5a4 4801->4803 4804 321c4b1 4802->4804 4805 321c4a7 4802->4805 4806 321b370 7 API calls 4803->4806 4810 321c4e3 4804->4810 4811 321c4cd ??3@YAXPAX 4804->4811 4805->4553 4807 321c5b4 4806->4807 4808 321b660 6 API calls 4807->4808 4809 321c5be 4808->4809 4812 321b370 7 API calls 4809->4812 4889 321b370 EnterCriticalSection 4810->4889 4811->4553 4817 321c578 4812->4817 4814 321c4fe 4815 321b370 7 API calls 4814->4815 4816 321c50c 4815->4816 4818 321b370 7 API calls 4816->4818 4882 321c5d0 4817->4882 4819 321c51a 4818->4819 4820 321b370 7 API calls 4819->4820 4821 321c527 ??3@YAXPAX ??2@YAPAXI 4820->4821 4823 321b660 6 API calls 4821->4823 4825 321c55e 4823->4825 4826 321b370 7 API calls 4825->4826 4827 321c56b 4826->4827 4827->4817 4828 321c56f ??3@YAXPAX 4827->4828 4828->4817 4830 32218a2 4829->4830 4831 32218f9 4829->4831 4832 32218f2 CloseHandle 4830->4832 4833 32218bd lstrcmpiW 4830->4833 4835 32218d9 CloseHandle 4830->4835 4831->4745 4832->4831 4833->4830 4834 32218ed 4833->4834 4834->4832 4835->4745 4862 321f7e0 10 API calls 4836->4862 4839 321fb20 4840 321fde2 wsprintfW 4839->4840 4841 321fe45 wsprintfW 4839->4841 4842 321fb47 RegQueryValueExW 4839->4842 4843 321fe17 wsprintfW 4839->4843 4844 321fe7a lstrcatW 4839->4844 4847 321fb14 4839->4847 4848 321fb33 4839->4848 4852 321fd55 4839->4852 4854 321fc33 4839->4854 4856 321fcce 4839->4856 4861 321fba4 4839->4861 4840->4844 4841->4844 4842->4847 4849 321fb7e 4842->4849 4843->4844 4844->4796 4850 321feb4 4847->4850 4851 321fead FreeLibrary 4847->4851 4848->4840 4848->4841 4848->4842 4848->4843 4848->4844 4848->4847 4848->4854 4848->4861 4870 321f7b0 4849->4870 4850->4796 4851->4850 4852->4847 4857 321fdce 4852->4857 4854->4847 4855 321fc6a wsprintfW 4854->4855 4855->4847 4856->4847 4859 321fd1f wsprintfW lstrcatW 4856->4859 4857->4840 4857->4841 4857->4843 4857->4844 4859->4856 4860 321fc1c lstrcpyW 4860->4847 4861->4847 4861->4860 4863 321f997 4862->4863 4866 321f8b9 4862->4866 4874 321f9cc LoadLibraryW GetProcAddress GetProcAddress 4863->4874 4866->4863 4867 321f918 GetProcessHeap HeapAlloc 4866->4867 4867->4863 4868 321f938 4867->4868 4868->4863 4869 321f986 RegSetKeySecurity 4868->4869 4869->4863 4871 321f7bb 4870->4871 4873 321f7d5 lstrcpyW 4871->4873 4878 321f6f0 CompareStringW 4871->4878 4873->4847 4875 321f9f7 4874->4875 4876 321f9af RegOpenKeyExW 4875->4876 4877 321fa01 GetProcessHeap HeapFree 4875->4877 4876->4839 4876->4847 4877->4876 4878->4871 4895 321b590 4879->4895 4881 321b680 LeaveCriticalSection 4881->4801 4884 321c5ee 4882->4884 4888 321c63a 4882->4888 4883 321c5f6 send 4883->4884 4884->4883 4886 321c59a 4884->4886 4887 321c620 Sleep 4884->4887 4885 321c640 send 4885->4886 4885->4888 4886->4553 4887->4884 4887->4888 4888->4885 4888->4886 4890 321b38b 4889->4890 4906 321b4c0 4890->4906 4892 321b399 4893 321b3ae LeaveCriticalSection 4892->4893 4894 321b39e LeaveCriticalSection 4892->4894 4893->4814 4894->4814 4896 321b59c 4895->4896 4897 321b5a4 4896->4897 4898 321b5ae ceil _ftol 4896->4898 4897->4881 4899 321b5e4 4898->4899 4900 321b5f2 VirtualAlloc 4899->4900 4901 321b5e8 4899->4901 4904 321b4b0 4900->4904 4901->4881 4905 321b4b7 VirtualFree 4904->4905 4905->4881 4907 321b4cd 4906->4907 4908 321b4e0 ceil _ftol VirtualAlloc 4907->4908 4909 321b4d5 4907->4909 4910 321b535 4908->4910 4911 321b529 4908->4911 4909->4892 4912 321b55c VirtualFree 4910->4912 4913 321b56e 4910->4913 4911->4892 4912->4913 4913->4892 4914->4562 4915 3221660 SetEvent 4914->4915 4916 32216a2 4915->4916 4917 32216ac 4915->4917 4920 32219b0 LoadLibraryW GetProcAddress 4916->4920 4919 32216a9 4919->4917 4921 32219e5 4920->4921 4922 32219dc OpenDesktopW 4920->4922 4923 32219ed 4921->4923 4930 3221910 LoadLibraryW GetProcAddress GetProcAddress GetCurrentThreadId 4921->4930 4922->4921 4923->4919 4925 32219f6 4926 3221a09 4925->4926 4927 32219fd CloseDesktop 4925->4927 4928 3221a14 4926->4928 4929 3221a0d FreeLibrary 4926->4929 4927->4919 4928->4919 4929->4928 4931 322194a GetUserObjectInformationW 4930->4931 4932 322196f 4931->4932 4933 322197a 4931->4933 4932->4925 4934 3221981 4933->4934 4935 322198c CloseDesktop 4933->4935 4934->4925 4936 3221997 FreeLibrary 4935->4936 4937 322199e 4935->4937 4936->4937 4937->4925 4938->4570 4939->4572 4941 321b350 VirtualFree 4940->4941 4942 321b35e DeleteCriticalSection 4940->4942 4941->4942 4942->4576 5011 321b320 5012 321b340 2 API calls 5011->5012 5013 321b328 5012->5013 5014 321b338 5013->5014 5015 321b32f ??3@YAXPAX 5013->5015 5015->5014 5158 321e820 5159 321e834 5158->5159 5186 321e946 5158->5186 5160 321e921 5159->5160 5161 321e8e1 5159->5161 5162 321e901 5159->5162 5163 321e843 InterlockedExchange 5159->5163 5164 321e884 OutputDebugStringA 5159->5164 5165 321e856 5159->5165 5166 321e8ce 5159->5166 5167 321e8f1 5159->5167 5168 321e911 5159->5168 5169 321e933 5159->5169 5170 321e93f 5159->5170 5159->5186 5197 321e730 5160->5197 5192 321e4d0 wcstombs 5161->5192 5178 321e4d0 12 API calls 5162->5178 5164->5165 5180 32216e0 17 API calls 5165->5180 5189 321e340 wsprintfW lstrlenW 5166->5189 5177 321e4d0 12 API calls 5167->5177 5171 321e4d0 12 API calls 5168->5171 5202 321c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 5169->5202 5203 321e760 wcstombs OutputDebugStringA sprintf WinExec strstr 5170->5203 5181 321e91a 5171->5181 5187 321e8fa 5177->5187 5179 321e90a 5178->5179 5188 321e8ad 5180->5188 5184 321e93b 5185 321e8ea 5206 321ff30 7 API calls 5189->5206 5191 321e397 5193 321e541 5192->5193 5194 321e525 atoi 5192->5194 5195 321e54a 10 API calls 5193->5195 5196 321e654 5193->5196 5194->5185 5195->5185 5196->5185 5210 321e6a0 GetCurrentProcess OpenProcessToken 5197->5210 5199 321e73c ExitWindowsEx 5200 321e6a0 6 API calls 5199->5200 5201 321e758 5200->5201 5202->5184 5204 321e803 ExitProcess 5203->5204 5205 321e80b 5203->5205 5205->5186 5207 322001f 5206->5207 5208 321ffc3 5206->5208 5207->5191 5208->5207 5209 322003c lstrlenW 5208->5209 5209->5207 5211 321e6c1 5210->5211 5212 321e6c6 LookupPrivilegeValueW AdjustTokenPrivileges GetLastError 5210->5212 5211->5199 5213 321e70d 5212->5213 5214 321e70f CloseHandle 5212->5214 5213->5214 5214->5199 5222 321e260 5223 321b780 6 API calls 5222->5223 5224 321e284 5223->5224 5225 321bf20 65 API calls 5224->5225 5226 321e2a3 5225->5226 5227 321e2d5 5226->5227 5228 321e2a7 5226->5228 5237 321de50 5227->5237 5229 321b880 11 API calls 5228->5229 5231 321e2bb 5229->5231 5232 321e2e3 5246 321c170 WaitForSingleObject 5232->5246 5234 321e2f4 5235 321b880 11 API calls 5234->5235 5236 321e319 5235->5236 5238 321ea10 CreateEventW 5237->5238 5239 321de77 5238->5239 5247 321df10 OutputDebugStringA 5239->5247 5243 321de93 5251 321dfa0 GetSystemDirectoryW lstrcatW CreateFileW 5243->5251 5245 321de9a Sleep 5245->5232 5246->5234 5248 321ea90 22 API calls 5247->5248 5249 321de8c 5248->5249 5250 321eb00 WaitForSingleObject Sleep 5249->5250 5250->5243 5252 321e082 CloseHandle 5251->5252 5253 321dffb GetFileSize ??2@YAPAXI ReadFile 5251->5253 5252->5245 5254 321e034 mbstowcs 5253->5254 5255 321e026 5253->5255 5258 321df40 LocalAlloc 5254->5258 5255->5254 5255->5255 5257 321e076 ??3@YAXPAX 5257->5252 5259 321ea90 22 API calls 5258->5259 5260 321df80 LocalFree 5259->5260 5260->5257 5261 321b860 5262 321b880 11 API calls 5261->5262 5263 321b868 5262->5263 5264 321b878 5263->5264 5265 321b86f ??3@YAXPAX 5263->5265 5265->5264 5287 321b6a0 5288 321b6a5 5287->5288 5289 32275e2 2 API calls 5288->5289 5290 321b6ca 5289->5290 5291 321e0a0 5292 321b780 6 API calls 5291->5292 5293 321e0c4 5292->5293 5294 321bf20 65 API calls 5293->5294 5295 321e0e3 5294->5295 5296 321e115 5295->5296 5297 321e0e7 5295->5297 5308 321c690 5296->5308 5299 321b880 11 API calls 5297->5299 5301 321e0fb 5299->5301 5303 321e137 5304 321c730 7 API calls 5303->5304 5305 321e14b 5304->5305 5306 321b880 11 API calls 5305->5306 5307 321e15f 5306->5307 5309 321ea10 CreateEventW 5308->5309 5310 321c6b7 ??2@YAPAXI 5309->5310 5314 321cda0 8 API calls 5310->5314 5313 321c170 WaitForSingleObject 5313->5303 5315 321ce1d 5314->5315 5316 321cf7f 5315->5316 5319 321ce73 SHGetFileInfo 5315->5319 5320 321ceb9 GetDiskFreeSpaceExA 5315->5320 5317 321ea90 22 API calls 5316->5317 5318 321c6f8 5317->5318 5318->5313 5319->5315 5320->5315 5321 321c8a0 5322 321c8b7 5321->5322 5323 321c993 5321->5323 5322->5323 5324 321c8e0 5322->5324 5325 321c980 LoadLibraryW 5322->5325 5326 321c903 5322->5326 5327 321c942 5322->5327 5328 321c962 5322->5328 5329 321c8cb DeleteFileW 5322->5329 5330 321c92a 5322->5330 5331 321c98c 5322->5331 5332 321c94f 5322->5332 5333 321c971 5322->5333 5334 321c910 5322->5334 5335 321c935 5322->5335 5336 321c8f6 5322->5336 5337 321c91d 5322->5337 5338 321c8be 5322->5338 5384 321d120 wsprintfW FindFirstFileW 5324->5384 5406 321d2e0 5326->5406 5440 321d880 lstrcpyW 5327->5440 5453 321cba0 wcsrchr 5328->5453 5381 321d430 5329->5381 5427 321d7c0 5330->5427 5465 321c830 OutputDebugStringW CreateFileW 5331->5465 5450 321da50 CreateFileW SetFilePointer WriteFile CloseHandle 5332->5450 5340 321cba0 13 API calls 5333->5340 5419 321db10 5334->5419 5437 321daf0 5335->5437 5391 321d440 lstrlenW 5336->5391 5424 321db30 lstrlenW MoveFileW 5337->5424 5368 321cfa0 LocalAlloc wsprintfW FindFirstFileW 5338->5368 5354 321c97c 5340->5354 5353 321c8e9 5366 321d430 22 API calls 5353->5366 5356 321c90c 5361 321c94b 5363 321c8c7 5367 321c8f2 5366->5367 5369 321d027 5368->5369 5370 321d007 5368->5370 5373 321d039 LocalReAlloc 5369->5373 5374 321d04f lstrcmpW 5369->5374 5371 321ea90 22 API calls 5370->5371 5372 321d01a 5371->5372 5372->5363 5373->5374 5375 321d063 lstrcmpW 5374->5375 5376 321d0e2 FindNextFileW 5374->5376 5375->5376 5377 321d077 lstrlenW 5375->5377 5376->5369 5378 321d0f6 5376->5378 5377->5376 5379 321ea90 22 API calls 5378->5379 5380 321d101 LocalFree FindClose 5379->5380 5380->5363 5382 321ea90 22 API calls 5381->5382 5383 321c8dc 5382->5383 5385 321d163 5384->5385 5390 321d171 5384->5390 5385->5353 5386 321d1cf FindNextFileW 5389 321d1df FindClose RemoveDirectoryW 5386->5389 5386->5390 5387 321d192 wsprintfW 5387->5390 5388 321d1b4 wsprintfW DeleteFileW 5388->5386 5389->5353 5390->5386 5390->5387 5390->5388 5392 321d491 wcslen ?assign@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PBGI 5391->5392 5393 321d470 5391->5393 5481 321dbc0 ??2@YAPAXI 5392->5481 5468 321d570 lstrlenW 5393->5468 5398 321d485 5401 321d7c0 27 API calls 5398->5401 5400 321d511 5497 321d200 lstrcpyW CreateFileW 5400->5497 5403 321c8ff 5401->5403 5404 321d518 ??3@YAXPAX 5404->5400 5405 321d4ea 5405->5400 5405->5404 5407 321d2f1 5406->5407 5408 321d2fe CreateFileW 5406->5408 5502 321d3c0 ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N ??3@YAXPAX 5407->5502 5409 321d321 5408->5409 5410 321d329 SetFilePointer LocalAlloc ReadFile CloseHandle 5408->5410 5409->5356 5412 321d3a1 5410->5412 5413 321d385 5410->5413 5416 321d3c0 32 API calls 5412->5416 5415 321ea90 22 API calls 5413->5415 5414 321d2f6 5414->5356 5417 321d38f LocalFree 5415->5417 5418 321d3a6 LocalFree 5416->5418 5417->5356 5418->5356 5509 321c9f0 lstrlenW malloc 5419->5509 5421 321db1d 5422 321d430 22 API calls 5421->5422 5423 321c919 5422->5423 5425 321d430 22 API calls 5424->5425 5426 321c926 5425->5426 5428 321d86c 5427->5428 5433 321d7d0 5427->5433 5429 321d430 22 API calls 5428->5429 5430 321c931 5429->5430 5431 321d801 ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG 5431->5433 5434 321d80f ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG 5431->5434 5432 321d845 ??3@YAXPAX 5432->5428 5432->5433 5433->5428 5433->5431 5433->5432 5523 321dc00 ??3@YAXPAX 5433->5523 5434->5433 5435 321d820 ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG 5434->5435 5435->5432 5524 321d930 5437->5524 5439 321c93e 5441 321c9f0 11 API calls 5440->5441 5442 321d8c6 FindFirstFileW 5441->5442 5443 321d907 5442->5443 5444 321d8d9 5442->5444 5445 321d930 26 API calls 5443->5445 5444->5443 5447 321d8eb 5444->5447 5446 321d90e FindClose 5445->5446 5446->5361 5448 321d430 22 API calls 5447->5448 5449 321d8f4 FindClose 5448->5449 5449->5361 5451 321ea90 22 API calls 5450->5451 5452 321c95e 5451->5452 5454 321c96d 5453->5454 5455 321cbe8 lstrcpyW LoadLibraryW GetProcAddress GetProcAddress GetProcAddress 5453->5455 5456 321cc3d 5455->5456 5456->5454 5457 321cc5f wsprintfW 5456->5457 5458 321cca5 5457->5458 5458->5454 5459 321ccd9 wcsstr 5458->5459 5460 321ccf2 wcsstr 5459->5460 5461 321cd28 lstrcpyW 5459->5461 5460->5461 5462 321cd05 lstrcatW lstrcatW 5460->5462 5463 321cd37 CreateProcessW 5461->5463 5462->5463 5463->5454 5466 321c892 CloseHandle 5465->5466 5467 321c867 GetFileSize ??2@YAPAXI ReadFile 5465->5467 5466->5323 5467->5466 5469 321d5b6 wsprintfW FindFirstFileW 5468->5469 5471 321d478 5469->5471 5479 321d608 5469->5479 5471->5398 5471->5400 5472 321d742 FindNextFileW 5473 321d75a FindClose 5472->5473 5472->5479 5473->5471 5474 321d62a wsprintfW 5476 321d570 7 API calls 5474->5476 5475 321d64f wsprintfW wcslen ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N 5477 321d6b7 ??2@YAPAXI 5475->5477 5475->5479 5476->5479 5477->5479 5478 321dc10 7 API calls 5478->5479 5479->5472 5479->5474 5479->5475 5479->5477 5479->5478 5480 321d71f ??3@YAXPAX 5479->5480 5480->5479 5482 321d4d4 5481->5482 5483 321dc10 5482->5483 5484 321dc40 5483->5484 5494 321dd44 5483->5494 5485 321dc68 5484->5485 5489 321dcdb 5484->5489 5487 321dc74 ?_Split@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@ 5485->5487 5488 321dc6e ?_Xran@std@ 5485->5488 5486 321dd35 ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N 5486->5494 5491 321dc85 5487->5491 5488->5487 5489->5486 5492 321dcf5 ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N 5489->5492 5490 321dcc0 ?_Split@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@ 5490->5405 5491->5490 5493 321dca1 ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N 5491->5493 5495 321dd06 5492->5495 5493->5490 5496 321dcb7 ?_Eos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXI 5493->5496 5494->5405 5494->5494 5495->5405 5496->5490 5498 321d243 5497->5498 5499 321d24d GetFileSize CloseHandle lstrlenW LocalAlloc lstrlenW 5497->5499 5498->5403 5500 321ea90 22 API calls 5499->5500 5501 321d2c8 LocalFree 5500->5501 5501->5403 5503 321d3f9 5502->5503 5505 321d405 5502->5505 5504 321d430 22 API calls 5503->5504 5506 321d402 5504->5506 5507 321d200 30 API calls 5505->5507 5506->5414 5508 321d421 5507->5508 5508->5414 5510 321ca42 lstrcpyW 5509->5510 5511 321cb76 5509->5511 5513 321ca55 5510->5513 5517 321caa7 5510->5517 5511->5421 5512 321cb3e free 5512->5421 5512->5511 5516 321ca77 CharNextW 5513->5516 5513->5517 5519 321ca82 5513->5519 5514 321cb30 CharNextW 5514->5517 5515 321cae8 GetFileAttributesW 5515->5517 5518 321cafb CreateDirectoryW 5515->5518 5516->5513 5517->5512 5517->5514 5517->5515 5522 321cb1c free 5517->5522 5518->5517 5520 321cb08 GetLastError 5518->5520 5519->5517 5521 321ca9c CharNextW 5519->5521 5520->5517 5521->5519 5522->5511 5523->5432 5525 321d944 FindFirstFileW 5524->5525 5528 321d98d FindClose CreateFileW 5525->5528 5529 321da2a CloseHandle 5528->5529 5530 321da0d 5528->5530 5531 321ea90 22 API calls 5529->5531 5530->5439 5532 321da3f 5531->5532 5532->5439 5533 4921b10 VariantClear 5043 321cb66 free 5044 321cb76 5043->5044 4996 322776e 4998 322778a 4996->4998 5000 3227781 4996->5000 4997 32276c3 3 API calls 4997->5000 4998->4997 4998->5000 5003 32277b2 4998->5003 4999 32277d2 4999->5003 5004 32276c3 4999->5004 5000->4999 5002 32276c3 3 API calls 5000->5002 5000->5003 5002->4999 5005 32276cb 5004->5005 5006 32276ec malloc 5005->5006 5007 3227701 5005->5007 5009 322772b 5005->5009 5006->5007 5008 3227705 _initterm 5006->5008 5007->5003 5008->5007 5009->5007 5010 3227758 free 5009->5010 5010->5007 5541 4922d5d 5542 4922d70 5541->5542 5545 4922d79 5541->5545 5544 4922c10 82 API calls 5542->5544 5548 4922da1 5542->5548 5547 4922dad 5544->5547 5545->5542 5545->5548 5551 4922cb2 5545->5551 5546 4922dc1 5546->5548 5550 4922cb2 3 API calls 5546->5550 5547->5546 5547->5548 5549 4922cb2 3 API calls 5547->5549 5549->5546 5550->5548 5552 4922cba 5551->5552 5553 4922cdb malloc 5552->5553 5555 4922cf0 5552->5555 5557 4922d1a 5552->5557 5554 4922cf4 _initterm 5553->5554 5553->5555 5554->5555 5555->5542 5556 4922d47 free 5556->5555 5557->5555 5557->5556 5078 321e3b0 5079 321e450 3 API calls 5078->5079 5080 321e3b8 5079->5080 5081 321e3c8 5080->5081 5082 321e3bf ??3@YAXPAX 5080->5082 5082->5081 5558 321def0 5559 321def9 5558->5559 5560 321defe 5558->5560 5562 321eb40 SetEvent 5559->5562 5562->5560 4994 32245b0 free 5045 3220370 5050 3220390 7 API calls 5045->5050 5048 3220388 5049 322037f ??3@YAXPAX 5049->5048 5051 322041f 5050->5051 5052 322041c DisconnectNamedPipe 5050->5052 5053 3220426 DisconnectNamedPipe 5051->5053 5054 3220429 5051->5054 5052->5051 5053->5054 5055 3220433 5054->5055 5056 3220430 DisconnectNamedPipe 5054->5056 5057 322043a DisconnectNamedPipe 5055->5057 5058 322043d 5055->5058 5056->5055 5057->5058 5061 321ea60 CloseHandle 5058->5061 5060 3220378 5060->5048 5060->5049 5061->5060 5083 4922200 SysFreeString 5266 3220e74 5267 3227840 5266->5267 5268 3227864 5267->5268 5269 3227853 VirtualFree 5267->5269 5269->5268 5216 321b239 LoadLibraryW LoadLibraryW GetProcAddress 5217 321b30a FreeLibrary 5216->5217 5016 4922c8f ??1type_info@@UAE 5017 4922c9e 5016->5017 5218 322763c ??1type_info@@UAE 5219 3227652 5218->5219 5220 322764b ??3@YAXPAX 5218->5220 5220->5219 5084 321e180 5085 321b780 6 API calls 5084->5085 5086 321e1a4 5085->5086 5087 321bf20 65 API calls 5086->5087 5088 321e1c3 5087->5088 5089 321e1f5 5088->5089 5090 321e1c7 5088->5090 5101 3220100 5089->5101 5091 321b880 11 API calls 5090->5091 5093 321e1db 5091->5093 5096 321e214 5097 3220390 12 API calls 5096->5097 5098 321e225 5097->5098 5099 321b880 11 API calls 5098->5099 5100 321e239 5099->5100 5102 321ea10 CreateEventW 5101->5102 5103 3220132 LoadLibraryA GetProcAddress CreatePipe 5102->5103 5104 32201f3 CreatePipe 5103->5104 5113 321e203 5103->5113 5105 3220229 GetStartupInfoW GetSystemDirectoryW lstrcatW lstrcatW CreateProcessW 5104->5105 5104->5113 5106 32202f3 5105->5106 5105->5113 5116 321ea90 5106->5116 5110 322031b 5111 32216e0 17 API calls 5110->5111 5112 3220330 5111->5112 5114 32216e0 17 API calls 5112->5114 5115 321c170 WaitForSingleObject 5113->5115 5114->5113 5115->5096 5117 321c450 22 API calls 5116->5117 5118 321eac9 5117->5118 5119 321eb00 WaitForSingleObject Sleep 5118->5119 5119->5110 5270 321ea40 5275 321ea60 CloseHandle 5270->5275 5272 321ea48 5273 321ea58 5272->5273 5274 321ea4f ??3@YAXPAX 5272->5274 5274->5273 5275->5272 5563 321dec0 5564 321dec8 5563->5564 5565 321ded8 5564->5565 5566 321decf ??3@YAXPAX 5564->5566 5566->5565 5120 3220580 WaitForMultipleObjects TerminateThread TerminateProcess 5123 321c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 5120->5123 5122 32205c7 5123->5122 5221 3227e00 ??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE 5062 3220f4d mbstowcs 5067 3221a20 InternetOpenW 5062->5067 5064 3220fb3 5065 3220fba CreateProcessW 5064->5065 5066 3220fe8 5064->5066 5065->5066 5068 3221a52 5067->5068 5069 3221a5f InternetOpenUrlW 5067->5069 5068->5064 5070 3221a89 CreateFileW 5069->5070 5071 3221a7c 5069->5071 5072 3221b15 InternetCloseHandle InternetCloseHandle 5070->5072 5073 3221aab InternetReadFile 5070->5073 5071->5064 5072->5064 5074 3221ad2 5073->5074 5075 3221adb WriteFile 5073->5075 5074->5075 5076 3221b00 CloseHandle 5074->5076 5075->5073 5075->5076 5076->5072 4943 321b590 4944 321b59c 4943->4944 4945 321b5a4 4944->4945 4946 321b5ae ceil _ftol 4944->4946 4947 321b5e4 4946->4947 4948 321b5f2 VirtualAlloc 4947->4948 4949 321b5e8 4947->4949 4950 321b4b0 4948->4950 4951 321b611 VirtualFree 4950->4951 4952 321c090 4955 321c09a 4952->4955 4953 321c0cc select 4954 321c153 4953->4954 4953->4955 4984 321c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4954->4984 4955->4953 4957 321c0fd recv 4955->4957 4959 321c143 4955->4959 4960 321c190 4955->4960 4957->4954 4957->4955 4961 321c1c4 4960->4961 4962 321c1dc 4960->4962 4985 321c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4961->4985 4964 321c223 4962->4964 4967 321c1f2 4962->4967 4966 321b370 7 API calls 4964->4966 4965 321c1c9 4965->4955 4971 321c232 4966->4971 4968 321c450 22 API calls 4967->4968 4969 321c210 4968->4969 4969->4955 4970 321c269 _CxxThrowException 4970->4971 4971->4965 4971->4970 4974 321c392 _CxxThrowException 4971->4974 4976 321b3f0 8 API calls 4971->4976 4980 321c37d _CxxThrowException 4971->4980 4981 321b660 6 API calls 4971->4981 4982 321b370 7 API calls 4971->4982 4983 321c366 ??3@YAXPAX ??3@YAXPAX 4971->4983 4986 321b3f0 EnterCriticalSection 4971->4986 4973 321c2d3 ??2@YAPAXI ??2@YAPAXI 4973->4971 4973->4974 4975 321b660 6 API calls 4974->4975 4977 321c3b2 4975->4977 4976->4971 4978 321c450 22 API calls 4977->4978 4979 321c3bd 4978->4979 4979->4955 4980->4974 4981->4971 4982->4971 4983->4971 4984->4959 4985->4965 4987 321b40b 4986->4987 4988 321b413 LeaveCriticalSection 4987->4988 4989 321b423 4987->4989 4988->4973 4990 321b47b 4989->4990 4991 321b45d memmove 4989->4991 4992 321b590 4 API calls 4990->4992 4991->4990 4993 321b48a LeaveCriticalSection 4992->4993 4993->4973 5018 321c710 5023 321c730 5018->5023 5021 321c728 5022 321c71f ??3@YAXPAX 5022->5021 5024 321c76a ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N ??3@YAXPAX 5023->5024 5027 321c79c 5023->5027 5024->5024 5024->5027 5025 321c7f2 ??3@YAXPAX 5037 321ea60 CloseHandle 5025->5037 5027->5025 5031 321ddf0 5027->5031 5028 321c718 5028->5021 5028->5022 5032 321ddfa 5031->5032 5036 321de06 5031->5036 5033 321de0d ??3@YAXPAX 5032->5033 5032->5036 5033->5036 5034 321de36 ??3@YAXPAX 5035 321c7de ??3@YAXPAX 5034->5035 5035->5025 5035->5027 5036->5034 5036->5035 5037->5028 5567 321b6d0 5569 321b6e0 5567->5569 5568 321b77b 5569->5568 5570 321b708 ??3@YAXPAX 5569->5570 5570->5569 5571 321b726 ??3@YAXPAX 5570->5571 5571->5569 4995 3224590 calloc 5534 3220490 5535 32204ae WriteFile 5534->5535 5536 322049d 5534->5536 5536->5535 5537 32204a6 5536->5537 5540 321eb40 SetEvent 5537->5540 5539 32204ab 5540->5539 5572 32204d0 5573 32204ff Sleep 5572->5573 5574 3220507 PeekNamedPipe 5573->5574 5574->5573 5575 3220527 5574->5575 5575->5573 5576 322052f LocalAlloc ReadFile 5575->5576 5577 321ea90 22 API calls 5576->5577 5578 322056f LocalFree 5577->5578 5578->5574 5276 3220e54 5277 3220e59 5276->5277 5280 32275e2 5277->5280 5283 32275b6 5280->5283 5282 3220e72 5284 32275cb __dllonexit 5283->5284 5285 32275bf _onexit 5283->5285 5284->5282 5285->5282 5124 32213d8 5125 32213da GetTickCount 5124->5125 5126 3220ac0 142 API calls 5125->5126 5134 3221154 5126->5134 5127 321e400 lstrcpyW 5127->5134 5128 3221454 Sleep 5128->5134 5129 3221478 GetTickCount 5131 322147e OpenEventW WaitForSingleObject Sleep 5129->5131 5130 3221159 atoi 5132 322116b sprintf OutputDebugStringA Sleep 5130->5132 5133 32214b8 5131->5133 5131->5134 5132->5132 5132->5134 5157 321c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 5133->5157 5134->5127 5134->5128 5134->5129 5134->5130 5134->5131 5136 32211c8 Sleep 5134->5136 5137 32211ee Sleep 5134->5137 5139 322121e GetLocalTime sprintf 5134->5139 5141 32212f9 atoi atoi atoi GetTickCount 5134->5141 5145 32212ab OpenEventW 5134->5145 5147 32212d7 Sleep 5134->5147 5149 3221391 sprintf 5134->5149 5153 321bf20 65 API calls 5134->5153 5156 321c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 5134->5156 5136->5134 5136->5136 5137->5134 5137->5137 5138 32214c3 CloseHandle SetErrorMode 5140 321e450 3 API calls 5138->5140 5139->5134 5143 32214df 5140->5143 5142 321bf20 65 API calls 5141->5142 5142->5134 5144 321b880 11 API calls 5143->5144 5146 32214ee 5144->5146 5145->5134 5148 32212c4 Sleep 5145->5148 5147->5134 5148->5134 5148->5145 5151 3220e7e 6 API calls 5149->5151 5155 32213b4 5151->5155 5152 32212f2 CloseHandle 5152->5141 5153->5134 5154 3227870 89 API calls 5154->5155 5155->5125 5155->5154 5156->5152 5157->5138 5286 4922bee CoUninitialize

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1 3221026-32210b3 call 32276a4 call 3227600 call 321eb90 GetInputState GetCurrentThreadId PostThreadMessageW GetMessageW call 3220ff1 LoadLibraryW GetProcAddress * 2 OpenWindowStationW GetProcAddress 11 32210b5 1->11 12 32210ba-32210f1 Sleep GetTickCount wsprintfW strstr 1->12 11->12 13 3221122-3221151 SetErrorMode call 321b780 call 321e3d0 12->13 14 32210f3-3221101 call 3220f2c 12->14 24 3221154-3221157 13->24 19 3221103-322110e WinExec 14->19 20 3221110-322111f call 32216e0 14->20 19->13 20->13 26 32211b5-32211c2 24->26 27 3221159-3221169 atoi 24->27 29 32211e1-32211e8 26->29 30 32211c4-32211c6 26->30 28 322116b-32211b3 sprintf OutputDebugStringA Sleep 27->28 28->26 28->28 33 3221207-3221218 29->33 34 32211ea-32211ec 29->34 31 32211db 30->31 32 32211c8-32211d9 Sleep 30->32 31->29 32->31 32->32 37 322129e-32212a1 33->37 38 322121e-322126b GetLocalTime sprintf 33->38 35 3221201 34->35 36 32211ee-32211ff Sleep 34->36 35->33 36->35 36->36 40 32212a3-32212a7 37->40 41 32212f9-3221341 atoi * 3 GetTickCount call 321bf20 37->41 39 322126d-3221273 38->39 43 3221275-3221277 39->43 44 322128f-3221291 39->44 40->41 45 32212a9 40->45 51 3221343-322135d call 321bf20 41->51 52 322138e 41->52 48 322128b-322128d 43->48 49 3221279-3221281 43->49 46 3221294-3221296 44->46 50 32212ab-32212c2 OpenEventW 45->50 54 32212d7-32212e2 Sleep 46->54 55 3221298-322129c 46->55 48->46 49->44 53 3221283-3221289 49->53 56 32212e7-32212f3 call 321c3d0 CloseHandle 50->56 57 32212c4-32212d3 Sleep 50->57 65 3221389-322138c 51->65 66 322135f-3221379 call 321bf20 51->66 60 3221391-3221443 sprintf call 3220e7e call 3220e40 call 3227870 GetTickCount call 3220ac0 call 321e400 call 321c680 52->60 53->39 53->48 54->24 55->37 56->41 57->50 58 32212d5 57->58 58->41 83 3221445-3221452 call 321ea00 60->83 65->60 72 3221384-3221387 66->72 73 322137b-322137f 66->73 72->60 73->24 86 3221454-3221463 Sleep 83->86 87 3221465-3221472 call 321ea00 83->87 86->83 86->87 87->24 90 3221478 GetTickCount 87->90 91 322147e-32214ad OpenEventW WaitForSingleObject Sleep 90->91 92 32214b8-32214fe call 321c3d0 CloseHandle SetErrorMode call 321e450 call 321b880 91->92 93 32214af-32214b1 91->93 93->91 95 32214b3 93->95 95->24
          APIs
          • __EH_prolog.LIBCMT ref: 0322102B
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(kernel32.dll,OutputDebugStringA,?,?,032215B4), ref: 0321EBA2
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EBAB
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatus,?,?,032215B4), ref: 0321EBBC
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EBBF
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(kernel32.dll,DeviceIoControl,?,?,032215B4), ref: 0321EBD0
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EBD3
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(kernel32.dll,GetSystemInfo,?,?,032215B4), ref: 0321EBE4
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EBE7
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(kernel32.dll,GetVersionExW,?,?,032215B4), ref: 0321EBF8
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EBFB
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(wininet.dll,InternetQueryOptionA,?,?,032215B4), ref: 0321EC0C
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EC0F
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(USER32.dll,PostThreadMessageW,?,?,032215B4), ref: 0321EC20
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EC23
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(USER32.dll,GetInputState,?,?,032215B4), ref: 0321EC34
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EC37
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(USER32.dll,OpenDesktopW,?,?,032215B4), ref: 0321EC48
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EC4B
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(USER32.dll,GetUserObjectInformationW,?,?,032215B4), ref: 0321EC5C
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EC5F
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(USER32.dll,CloseDesktop,?,?,032215B4), ref: 0321EC70
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EC73
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(USER32.dll,wsprintfW,?,?,032215B4), ref: 0321EC84
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EC87
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(USER32.dll,CharNextW,?,?,032215B4), ref: 0321EC98
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EC9B
            • Part of subcall function 0321EB90: LoadLibraryW.KERNEL32(gdi32.dll,CreateCompatibleBitmap,?,?,032215B4), ref: 0321ECB2
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321ECB5
            • Part of subcall function 0321EB90: LoadLibraryW.KERNEL32(gdi32.dll,GetDIBits,?,?,032215B4), ref: 0321ECC6
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321ECC9
            • Part of subcall function 0321EB90: LoadLibraryW.KERNEL32(gdi32.dll,BitBlt,?,?,032215B4), ref: 0321ECDA
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321ECDD
          • GetInputState.USER32 ref: 03221046
          • GetCurrentThreadId.KERNEL32 ref: 03221051
          • PostThreadMessageW.USER32(00000000), ref: 03221058
          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 03221068
            • Part of subcall function 03220FF1: CreateMutexA.KERNEL32(00000000,00000001,UpdateWindow,?,03221073), ref: 03220FFB
            • Part of subcall function 03220FF1: GetLastError.KERNEL32(?,03221073), ref: 03221003
            • Part of subcall function 03220FF1: ReleaseMutex.KERNEL32(00000000,?,03221073), ref: 03221016
            • Part of subcall function 03220FF1: ExitProcess.KERNEL32 ref: 0322101E
          • LoadLibraryW.KERNEL32(user32.dll), ref: 03221078
          • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 0322108C
          • GetProcAddress.KERNEL32(00000000,OpenWindowStationW), ref: 03221096
          • OpenWindowStationW.USER32(winsta0,00000000,02000000), ref: 032210A3
          • GetProcAddress.KERNEL32(00000000,SetProcessWindowStation), ref: 032210AE
          • Sleep.KERNEL32(00000032), ref: 032210BC
          • GetTickCount.KERNEL32 ref: 032210C2
          • wsprintfW.USER32 ref: 032210D5
          • strstr.MSVCRT ref: 032210E6
          • WinExec.KERNEL32(c:\windows\httpd.exe,00000000), ref: 03221108
          • SetErrorMode.KERNEL32(00000001), ref: 03221124
          • atoi.MSVCRT(?), ref: 0322115F
          • sprintf.MSVCRT ref: 0322118E
          • OutputDebugStringA.KERNELBASE(?), ref: 0322119E
          • Sleep.KERNEL32(000003E8), ref: 032211A9
          • Sleep.KERNEL32(000003E8), ref: 032211CD
          • Sleep.KERNEL32(000003E8), ref: 032211F3
            • Part of subcall function 032216E0: CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?,?,?,0322133F), ref: 03221704
            • Part of subcall function 032216E0: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,00000000), ref: 0322173D
            • Part of subcall function 032216E0: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 03221748
          • GetLocalTime.KERNEL32(?), ref: 03221236
          • sprintf.MSVCRT ref: 0322125C
          • OpenEventW.KERNEL32(001F0003,00000000,?), ref: 032212B8
          • Sleep.KERNEL32(0000001E), ref: 032212C6
          • Sleep.KERNEL32(000003E8), ref: 032212DC
          • CloseHandle.KERNEL32(00000000), ref: 032212F3
          • atoi.MSVCRT(443,?), ref: 03221304
          • atoi.MSVCRT ref: 03221310
          • atoi.MSVCRT ref: 0322131C
          • GetTickCount.KERNEL32 ref: 03221322
          • sprintf.MSVCRT ref: 032213A8
          • GetTickCount.KERNEL32 ref: 032213E1
            • Part of subcall function 03220AC0: GetVersionExW.KERNEL32 ref: 03220AEE
            • Part of subcall function 03220AC0: getsockname.WS2_32(?), ref: 03220B5F
            • Part of subcall function 03220AC0: GetVersionExW.KERNEL32(?), ref: 03220BA0
            • Part of subcall function 03220AC0: lstrcpyW.KERNEL32(?,03218D54), ref: 03220BD0
            • Part of subcall function 03220AC0: GlobalMemoryStatus.KERNEL32 ref: 03220C63
            • Part of subcall function 03220AC0: GetTickCount.KERNEL32 ref: 03220C77
            • Part of subcall function 0321E400: lstrcpyW.KERNEL32(?,?,connected: safebrow.flnet.org:443,03221431,?,?,?,?,?), ref: 0321E410
          • Sleep.KERNEL32(000003E8,?,?,?,?,?,?), ref: 03221459
          • GetTickCount.KERNEL32 ref: 03221478
          • OpenEventW.KERNEL32(001F0003,00000000,?), ref: 0322148B
          • WaitForSingleObject.KERNEL32(?,00000064), ref: 03221498
          • Sleep.KERNEL32(000001F4), ref: 032214A5
          • CloseHandle.KERNEL32(00000000), ref: 032214C4
          • SetErrorMode.KERNEL32(00000000), ref: 032214CB
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$LibraryLoad$Sleep$CountTick$atoi$CloseErrorEventHandleOpensprintf$CreateMessageModeMutexObjectSingleThreadVersionWaitlstrcpy$CurrentDebugExecExitGlobalH_prologInputLastLocalMemoryOutputPostProcessReleaseStateStationStatusStringTimeWindowgetsocknamestrstrwsprintf
          • String ID: %d:%d:%d:%d$443$443$443$GetProcessWindowStation$Global\X %d$OpenWindowStationW$SetProcessWindowStation$c:\windows\httpd.exe$c:\windows\httpd.exe$connected: %s:%d$connected: safebrow.flnet.org:443$http://$safebrow$safebrow.flnet.org$safebrow.flnet.org$safebrow.flnet.org$time=%d$user32.dll$winsta0
          • API String ID: 834566867-853570213
          • Opcode ID: 4bcc8fc50287bbf292d1b43426fc45d76248b360b6c21d488e2ffcab6773521a
          • Instruction ID: 32e79c50b55bf817c708a13a86b29d6b8881d3ab777ee58676990926cb76928d
          • Opcode Fuzzy Hash: 4bcc8fc50287bbf292d1b43426fc45d76248b360b6c21d488e2ffcab6773521a
          • Instruction Fuzzy Hash: 7AD1B971D50269BFCB20EBA4ED88EED7FB9AF28700F044095F515E2140DB7559E4CBA1

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 165 32213d8 166 32213da-3221443 GetTickCount call 3220ac0 call 321e400 call 321c680 165->166 173 3221445-3221452 call 321ea00 166->173 176 3221454-3221463 Sleep 173->176 177 3221465-3221472 call 321ea00 173->177 176->173 176->177 180 3221154-3221157 177->180 181 3221478 GetTickCount 177->181 182 32211b5-32211c2 180->182 183 3221159-3221169 atoi 180->183 184 322147e-32214ad OpenEventW WaitForSingleObject Sleep 181->184 186 32211e1-32211e8 182->186 187 32211c4-32211c6 182->187 185 322116b-32211b3 sprintf OutputDebugStringA Sleep 183->185 188 32214b8-32214fe call 321c3d0 CloseHandle SetErrorMode call 321e450 call 321b880 184->188 189 32214af-32214b1 184->189 185->182 185->185 194 3221207-3221218 186->194 195 32211ea-32211ec 186->195 191 32211db 187->191 192 32211c8-32211d9 Sleep 187->192 189->184 193 32214b3 189->193 191->186 192->191 192->192 193->180 199 322129e-32212a1 194->199 200 322121e-322126b GetLocalTime sprintf 194->200 196 3221201 195->196 197 32211ee-32211ff Sleep 195->197 196->194 197->196 197->197 203 32212a3-32212a7 199->203 204 32212f9-3221341 atoi * 3 GetTickCount call 321bf20 199->204 202 322126d-3221273 200->202 207 3221275-3221277 202->207 208 322128f-3221291 202->208 203->204 209 32212a9 203->209 216 3221343-322135d call 321bf20 204->216 217 322138e 204->217 213 322128b-322128d 207->213 214 3221279-3221281 207->214 210 3221294-3221296 208->210 215 32212ab-32212c2 OpenEventW 209->215 220 32212d7-32212e2 Sleep 210->220 221 3221298-322129c 210->221 213->210 214->208 219 3221283-3221289 214->219 222 32212e7-32212f3 call 321c3d0 CloseHandle 215->222 223 32212c4-32212d3 Sleep 215->223 231 3221389-322138c 216->231 232 322135f-3221379 call 321bf20 216->232 226 3221391-32213d0 sprintf call 3220e7e call 3220e40 call 3227870 217->226 219->202 219->213 220->180 221->199 222->204 223->215 224 32212d5 223->224 224->204 226->166 231->226 238 3221384-3221387 232->238 239 322137b-322137f 232->239 238->226 239->180
          APIs
          • atoi.MSVCRT(?), ref: 0322115F
          • sprintf.MSVCRT ref: 0322118E
          • OutputDebugStringA.KERNELBASE(?), ref: 0322119E
          • Sleep.KERNEL32(000003E8), ref: 032211A9
          • Sleep.KERNEL32(000003E8), ref: 032211CD
          • Sleep.KERNEL32(000003E8), ref: 032211F3
          • GetLocalTime.KERNEL32(?), ref: 03221236
          • GetTickCount.KERNEL32 ref: 032213E1
            • Part of subcall function 03220AC0: GetVersionExW.KERNEL32 ref: 03220AEE
            • Part of subcall function 03220AC0: getsockname.WS2_32(?), ref: 03220B5F
            • Part of subcall function 03220AC0: GetVersionExW.KERNEL32(?), ref: 03220BA0
            • Part of subcall function 03220AC0: lstrcpyW.KERNEL32(?,03218D54), ref: 03220BD0
            • Part of subcall function 03220AC0: GlobalMemoryStatus.KERNEL32 ref: 03220C63
            • Part of subcall function 03220AC0: GetTickCount.KERNEL32 ref: 03220C77
            • Part of subcall function 0321E400: lstrcpyW.KERNEL32(?,?,connected: safebrow.flnet.org:443,03221431,?,?,?,?,?), ref: 0321E410
          • Sleep.KERNEL32(000003E8,?,?,?,?,?,?), ref: 03221459
          • GetTickCount.KERNEL32 ref: 03221478
          • OpenEventW.KERNEL32(001F0003,00000000,?), ref: 0322148B
          • WaitForSingleObject.KERNEL32(?,00000064), ref: 03221498
          • Sleep.KERNEL32(000001F4), ref: 032214A5
          • CloseHandle.KERNEL32(00000000), ref: 032214C4
          • SetErrorMode.KERNEL32(00000000), ref: 032214CB
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: Sleep$CountTick$Versionlstrcpy$CloseDebugErrorEventGlobalHandleLocalMemoryModeObjectOpenOutputSingleStatusStringTimeWaitatoigetsocknamesprintf
          • String ID: %d:%d:%d:%d$443$443$443$safebrow$safebrow.flnet.org$safebrow.flnet.org$safebrow.flnet.org$time=%d
          • API String ID: 206305499-2868102726
          • Opcode ID: b55919aca01ebcc2bcbf7ba7aaa11370ccee871723e9a52416aca374c60185fb
          • Instruction ID: d158b73752c40eeb32b26a2de57983c6c17329c8f97150a30362bf36d91e4796
          • Opcode Fuzzy Hash: b55919aca01ebcc2bcbf7ba7aaa11370ccee871723e9a52416aca374c60185fb
          • Instruction Fuzzy Hash: 0881A531D10279BFCB21EFA4ED88AEDBBB9AB18700F0441A5F605E3140DB7159E5CB91
          APIs
          • CreateFileW.KERNEL32(\\.\PHYSICALDRIVE0,00000000,00000003,00000000,00000003,00000000,00000000,?,?,03220C1E,?,?,?,?,connected: safebrow.flnet.org:443), ref: 032205E3
          • DeviceIoControl.KERNEL32(00000000,00070000,00000000,00000000,?,00000018,?,00000000), ref: 0322060E
          • CloseHandle.KERNEL32(00000000,?,?,?,connected: safebrow.flnet.org:443,?,00000000), ref: 03220617
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: CloseControlCreateDeviceFileHandle
          • String ID: \\.\PHYSICALDRIVE0
          • API String ID: 33631002-1557481562
          • Opcode ID: b7ab2a4ea2059ec36e388c35eb0b8b146ddbd1adbc6ccff602aab0f28609b876
          • Instruction ID: 3d0aebdde813a2988206a73a778069ecb5d88cd7c046022bd80e5b531b4feb6f
          • Opcode Fuzzy Hash: b7ab2a4ea2059ec36e388c35eb0b8b146ddbd1adbc6ccff602aab0f28609b876
          • Instruction Fuzzy Hash: AFF030763913207AE6346268BC0EF9A6698D795B72F248625F716EA1C0DAF0654043A8

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 0 321eb90-321f6e6 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress
          APIs
          • LoadLibraryA.KERNEL32(kernel32.dll,OutputDebugStringA,?,?,032215B4), ref: 0321EBA2
          • GetProcAddress.KERNEL32(00000000), ref: 0321EBAB
          • LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatus,?,?,032215B4), ref: 0321EBBC
          • GetProcAddress.KERNEL32(00000000), ref: 0321EBBF
          • LoadLibraryA.KERNEL32(kernel32.dll,DeviceIoControl,?,?,032215B4), ref: 0321EBD0
          • GetProcAddress.KERNEL32(00000000), ref: 0321EBD3
          • LoadLibraryA.KERNEL32(kernel32.dll,GetSystemInfo,?,?,032215B4), ref: 0321EBE4
          • GetProcAddress.KERNEL32(00000000), ref: 0321EBE7
          • LoadLibraryA.KERNEL32(kernel32.dll,GetVersionExW,?,?,032215B4), ref: 0321EBF8
          • GetProcAddress.KERNEL32(00000000), ref: 0321EBFB
          • LoadLibraryA.KERNEL32(wininet.dll,InternetQueryOptionA,?,?,032215B4), ref: 0321EC0C
          • GetProcAddress.KERNEL32(00000000), ref: 0321EC0F
          • LoadLibraryA.KERNEL32(USER32.dll,PostThreadMessageW,?,?,032215B4), ref: 0321EC20
          • GetProcAddress.KERNEL32(00000000), ref: 0321EC23
          • LoadLibraryA.KERNEL32(USER32.dll,GetInputState,?,?,032215B4), ref: 0321EC34
          • GetProcAddress.KERNEL32(00000000), ref: 0321EC37
          • LoadLibraryA.KERNEL32(USER32.dll,OpenDesktopW,?,?,032215B4), ref: 0321EC48
          • GetProcAddress.KERNEL32(00000000), ref: 0321EC4B
          • LoadLibraryA.KERNEL32(USER32.dll,GetUserObjectInformationW,?,?,032215B4), ref: 0321EC5C
          • GetProcAddress.KERNEL32(00000000), ref: 0321EC5F
          • LoadLibraryA.KERNEL32(USER32.dll,CloseDesktop,?,?,032215B4), ref: 0321EC70
          • GetProcAddress.KERNEL32(00000000), ref: 0321EC73
          • LoadLibraryA.KERNEL32(USER32.dll,wsprintfW,?,?,032215B4), ref: 0321EC84
          • GetProcAddress.KERNEL32(00000000), ref: 0321EC87
          • LoadLibraryA.KERNEL32(USER32.dll,CharNextW,?,?,032215B4), ref: 0321EC98
          • GetProcAddress.KERNEL32(00000000), ref: 0321EC9B
          • LoadLibraryW.KERNEL32(gdi32.dll,CreateCompatibleBitmap,?,?,032215B4), ref: 0321ECB2
          • GetProcAddress.KERNEL32(00000000), ref: 0321ECB5
          • LoadLibraryW.KERNEL32(gdi32.dll,GetDIBits,?,?,032215B4), ref: 0321ECC6
          • GetProcAddress.KERNEL32(00000000), ref: 0321ECC9
          • LoadLibraryW.KERNEL32(gdi32.dll,BitBlt,?,?,032215B4), ref: 0321ECDA
          • GetProcAddress.KERNEL32(00000000), ref: 0321ECDD
          • LoadLibraryW.KERNEL32(gdi32.dll,DeleteDC,?,?,032215B4), ref: 0321ECEE
          • GetProcAddress.KERNEL32(00000000), ref: 0321ECF1
          • LoadLibraryW.KERNEL32(gdi32.dll,DeleteObject,?,?,032215B4), ref: 0321ED02
          • GetProcAddress.KERNEL32(00000000), ref: 0321ED05
          • LoadLibraryW.KERNEL32(gdi32.dll,CreateCompatibleDC,?,?,032215B4), ref: 0321ED16
          • GetProcAddress.KERNEL32(00000000), ref: 0321ED19
          • LoadLibraryW.KERNEL32(gdi32.dll,CreateDIBSection,?,?,032215B4), ref: 0321ED2A
          • GetProcAddress.KERNEL32(00000000), ref: 0321ED2D
          • LoadLibraryW.KERNEL32(gdi32.dll,SelectObject,?,?,032215B4), ref: 0321ED3E
          • GetProcAddress.KERNEL32(00000000), ref: 0321ED41
          • LoadLibraryW.KERNEL32(kernel32.dll,RemoveDirectoryW,?,?,032215B4), ref: 0321ED52
          • GetProcAddress.KERNEL32(00000000), ref: 0321ED55
          • LoadLibraryW.KERNEL32(kernel32.dll,FindClose,?,?,032215B4), ref: 0321ED66
          • GetProcAddress.KERNEL32(00000000), ref: 0321ED69
          • LoadLibraryW.KERNEL32(kernel32.dll,FindNextFileW,?,?,032215B4), ref: 0321ED7A
          • GetProcAddress.KERNEL32(00000000), ref: 0321ED7D
          • LoadLibraryW.KERNEL32(kernel32.dll,FindFirstFileW,?,?,032215B4), ref: 0321ED8E
          • GetProcAddress.KERNEL32(00000000), ref: 0321ED91
          • LoadLibraryW.KERNEL32(kernel32.dll,GetDriveTypeA,?,?,032215B4), ref: 0321EDA2
          • GetProcAddress.KERNEL32(00000000), ref: 0321EDA5
          • LoadLibraryW.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,?,?,032215B4), ref: 0321EDB6
          • GetProcAddress.KERNEL32(00000000), ref: 0321EDB9
          • LoadLibraryW.KERNEL32(kernel32.dll,GetVolumeInformationA,?,?,032215B4), ref: 0321EDCA
          • GetProcAddress.KERNEL32(00000000), ref: 0321EDCD
          • LoadLibraryW.KERNEL32(kernel32.dll,GetLogicalDriveStringsA,?,?,032215B4), ref: 0321EDDE
          • GetProcAddress.KERNEL32(00000000), ref: 0321EDE1
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateDirectoryW,?,?,032215B4), ref: 0321EDF2
          • GetProcAddress.KERNEL32(00000000), ref: 0321EDF5
          • LoadLibraryW.KERNEL32(kernel32.dll,GetFileAttributesW,?,?,032215B4), ref: 0321EE06
          • GetProcAddress.KERNEL32(00000000), ref: 0321EE09
          • LoadLibraryW.KERNEL32(kernel32.dll,UnmapViewOfFile,?,?,032215B4), ref: 0321EE1A
          • GetProcAddress.KERNEL32(00000000), ref: 0321EE1D
          • LoadLibraryW.KERNEL32(kernel32.dll,MapViewOfFile,?,?,032215B4), ref: 0321EE2E
          • GetProcAddress.KERNEL32(00000000), ref: 0321EE31
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateFileMappingW,?,?,032215B4), ref: 0321EE42
          • GetProcAddress.KERNEL32(00000000), ref: 0321EE45
          • LoadLibraryW.KERNEL32(kernel32.dll,SetFilePointer,?,?,032215B4), ref: 0321EE56
          • GetProcAddress.KERNEL32(00000000), ref: 0321EE59
          • LoadLibraryW.KERNEL32(user32.dll,GetForegroundWindow,?,?,032215B4), ref: 0321EE6A
          • GetProcAddress.KERNEL32(00000000), ref: 0321EE6D
          • LoadLibraryW.KERNEL32(kernel32.dll,GetCurrentThreadId,?,?,032215B4), ref: 0321EE7E
          • GetProcAddress.KERNEL32(00000000), ref: 0321EE81
          • LoadLibraryW.KERNEL32(kernel32.dll,TerminateThread,?,?,032215B4), ref: 0321EE92
          • GetProcAddress.KERNEL32(00000000), ref: 0321EE95
          • LoadLibraryW.KERNEL32(avicap32.dll,capGetDriverDescriptionW,?,?,032215B4), ref: 0321EEA6
          • GetProcAddress.KERNEL32(00000000), ref: 0321EEA9
          • LoadLibraryW.KERNEL32(avicap32.dll,capCreateCaptureWindowW,?,?,032215B4), ref: 0321EEBA
          • GetProcAddress.KERNEL32(00000000), ref: 0321EEBD
          • LoadLibraryW.KERNEL32(user32.dll,GetClipboardData,?,?,032215B4), ref: 0321EECE
          • GetProcAddress.KERNEL32(00000000), ref: 0321EED1
          • LoadLibraryW.KERNEL32(user32.dll,CloseClipboard,?,?,032215B4), ref: 0321EEE2
          • GetProcAddress.KERNEL32(00000000), ref: 0321EEE5
          • LoadLibraryW.KERNEL32(user32.dll,SetClipboardData,?,?,032215B4), ref: 0321EEF6
          • GetProcAddress.KERNEL32(00000000), ref: 0321EEF9
          • LoadLibraryW.KERNEL32(user32.dll,EmptyClipboard,?,?,032215B4), ref: 0321EF0A
          • GetProcAddress.KERNEL32(00000000), ref: 0321EF0D
          • LoadLibraryW.KERNEL32(user32.dll,SendMessageW,?,?,032215B4), ref: 0321EF1E
          • GetProcAddress.KERNEL32(00000000), ref: 0321EF21
          • LoadLibraryW.KERNEL32(user32.dll,GetSystemMetrics,?,?,032215B4), ref: 0321EF32
          • GetProcAddress.KERNEL32(00000000), ref: 0321EF35
          • LoadLibraryW.KERNEL32(user32.dll,OpenClipboard,?,?,032215B4), ref: 0321EF46
          • GetProcAddress.KERNEL32(00000000), ref: 0321EF49
          • LoadLibraryW.KERNEL32(user32.dll,SystemParametersInfoW,?,?,032215B4), ref: 0321EF5A
          • GetProcAddress.KERNEL32(00000000), ref: 0321EF5D
          • LoadLibraryW.KERNEL32(user32.dll,BlockInput,?,?,032215B4), ref: 0321EF6E
          • GetProcAddress.KERNEL32(00000000), ref: 0321EF71
          • LoadLibraryW.KERNEL32(kernel32.dll,InterlockedExchange,?,?,032215B4), ref: 0321EF82
          • GetProcAddress.KERNEL32(00000000), ref: 0321EF85
          • LoadLibraryW.KERNEL32(kernel32.dll,VirtualFree,?,?,032215B4), ref: 0321EF96
          • GetProcAddress.KERNEL32(00000000), ref: 0321EF99
          • LoadLibraryW.KERNEL32(kernel32.dll,VirtualAlloc,?,?,032215B4), ref: 0321EFAA
          • GetProcAddress.KERNEL32(00000000), ref: 0321EFAD
          • LoadLibraryW.KERNEL32(kernel32.dll,ReleaseMutex,?,?,032215B4), ref: 0321EFBE
          • GetProcAddress.KERNEL32(00000000), ref: 0321EFC1
          • LoadLibraryW.KERNEL32(kernel32.dll,CloseHandle,?,?,032215B4), ref: 0321EFD2
          • GetProcAddress.KERNEL32(00000000), ref: 0321EFD5
          • LoadLibraryW.KERNEL32(kernel32.dll,GetLastError,?,?,032215B4), ref: 0321EFE6
          • GetProcAddress.KERNEL32(00000000), ref: 0321EFE9
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateMutexA,?,?,032215B4), ref: 0321EFFA
          • GetProcAddress.KERNEL32(00000000), ref: 0321EFFD
          • LoadLibraryW.KERNEL32(kernel32.dll,WinExec,?,?,032215B4), ref: 0321F00E
          • GetProcAddress.KERNEL32(00000000), ref: 0321F011
          • LoadLibraryW.KERNEL32(kernel32.dll,InitializeCriticalSection,?,?,032215B4), ref: 0321F022
          • GetProcAddress.KERNEL32(00000000), ref: 0321F025
          • LoadLibraryW.KERNEL32(kernel32.dll,DeleteCriticalSection,?,?,032215B4), ref: 0321F036
          • GetProcAddress.KERNEL32(00000000), ref: 0321F039
          • LoadLibraryW.KERNEL32(kernel32.dll,LeaveCriticalSection,?,?,032215B4), ref: 0321F04A
          • GetProcAddress.KERNEL32(00000000), ref: 0321F04D
          • LoadLibraryW.KERNEL32(kernel32.dll,EnterCriticalSection,?,?,032215B4), ref: 0321F05E
          • GetProcAddress.KERNEL32(00000000), ref: 0321F061
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateFileW,?,?,032215B4), ref: 0321F072
          • GetProcAddress.KERNEL32(00000000), ref: 0321F075
          • LoadLibraryW.KERNEL32(kernel32.dll,WriteFile,?,?,032215B4), ref: 0321F086
          • GetProcAddress.KERNEL32(00000000), ref: 0321F089
          • LoadLibraryW.KERNEL32(kernel32.dll,MoveFileW,?,?,032215B4), ref: 0321F09A
          • GetProcAddress.KERNEL32(00000000), ref: 0321F09D
          • LoadLibraryW.KERNEL32(kernel32.dll,DeleteFileW,?,?,032215B4), ref: 0321F0AE
          • GetProcAddress.KERNEL32(00000000), ref: 0321F0B1
          • LoadLibraryW.KERNEL32(advapi32.dll,OpenSCManagerW,?,?,032215B4), ref: 0321F0C2
          • GetProcAddress.KERNEL32(00000000), ref: 0321F0C5
          • LoadLibraryW.KERNEL32(advapi32.dll,OpenServiceW,?,?,032215B4), ref: 0321F0D6
          • GetProcAddress.KERNEL32(00000000), ref: 0321F0D9
          • LoadLibraryW.KERNEL32(advapi32.dll,ChangeServiceConfigW,?,?,032215B4), ref: 0321F0EA
          • GetProcAddress.KERNEL32(00000000), ref: 0321F0ED
          • LoadLibraryW.KERNEL32(advapi32.dll,ControlService,?,?,032215B4), ref: 0321F0FE
          • GetProcAddress.KERNEL32(00000000), ref: 0321F101
          • LoadLibraryW.KERNEL32(kernel32.dll,Sleep,?,?,032215B4), ref: 0321F112
          • GetProcAddress.KERNEL32(00000000), ref: 0321F115
          • LoadLibraryW.KERNEL32(advapi32.dll,StartServiceW,?,?,032215B4), ref: 0321F126
          • GetProcAddress.KERNEL32(00000000), ref: 0321F129
          • LoadLibraryW.KERNEL32(advapi32.dll,CloseServiceHandle,?,?,032215B4), ref: 0321F13A
          • GetProcAddress.KERNEL32(00000000), ref: 0321F13D
          • LoadLibraryW.KERNEL32(kernel32.dll,GetModuleFileNameW,?,?,032215B4), ref: 0321F14E
          • GetProcAddress.KERNEL32(00000000), ref: 0321F151
          • LoadLibraryW.KERNEL32(kernel32.dll,GetTempPathW,?,?,032215B4), ref: 0321F162
          • GetProcAddress.KERNEL32(00000000), ref: 0321F165
          • LoadLibraryW.KERNEL32(kernel32.dll,GetSystemDirectoryW,?,?,032215B4), ref: 0321F176
          • GetProcAddress.KERNEL32(00000000), ref: 0321F179
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateProcessW,?,?,032215B4), ref: 0321F18A
          • GetProcAddress.KERNEL32(00000000), ref: 0321F18D
          • LoadLibraryW.KERNEL32(wininet.dll,InternetOpenW,?,?,032215B4), ref: 0321F19E
          • GetProcAddress.KERNEL32(00000000), ref: 0321F1A1
          • LoadLibraryW.KERNEL32(wininet.dll,InternetCloseHandle,?,?,032215B4), ref: 0321F1B2
          • GetProcAddress.KERNEL32(00000000), ref: 0321F1B5
          • LoadLibraryW.KERNEL32(wininet.dll,InternetGetConnectedState,?,?,032215B4), ref: 0321F1C6
          • GetProcAddress.KERNEL32(00000000), ref: 0321F1C9
          • LoadLibraryW.KERNEL32(wininet.dll,InternetOpenUrlA,?,?,032215B4), ref: 0321F1DA
          • GetProcAddress.KERNEL32(00000000), ref: 0321F1DD
          • LoadLibraryW.KERNEL32(wininet.dll,InternetOpenUrlW,?,?,032215B4), ref: 0321F1EE
          • GetProcAddress.KERNEL32(00000000), ref: 0321F1F1
          • LoadLibraryW.KERNEL32(wininet.dll,InternetReadFile,?,?,032215B4), ref: 0321F202
          • GetProcAddress.KERNEL32(00000000), ref: 0321F205
          • LoadLibraryW.KERNEL32(user32.dll,mouse_event,?,?,032215B4), ref: 0321F216
          • GetProcAddress.KERNEL32(00000000), ref: 0321F219
          • LoadLibraryW.KERNEL32(user32.dll,keybd_event,?,?,032215B4), ref: 0321F22A
          • GetProcAddress.KERNEL32(00000000), ref: 0321F22D
          • LoadLibraryW.KERNEL32(user32.dll,EnumWindows,?,?,032215B4), ref: 0321F23E
          • GetProcAddress.KERNEL32(00000000), ref: 0321F241
          • LoadLibraryW.KERNEL32(user32.dll,SetCursorPos,?,?,032215B4), ref: 0321F252
          • GetProcAddress.KERNEL32(00000000), ref: 0321F255
          • LoadLibraryW.KERNEL32(user32.dll,WindowFromPoint,?,?,032215B4), ref: 0321F266
          • GetProcAddress.KERNEL32(00000000), ref: 0321F269
          • LoadLibraryW.KERNEL32(user32.dll,SetCapture,?,?,032215B4), ref: 0321F27A
          • GetProcAddress.KERNEL32(00000000), ref: 0321F27D
          • LoadLibraryW.KERNEL32(user32.dll,GetWindowTextW,?,?,032215B4), ref: 0321F28E
          • GetProcAddress.KERNEL32(00000000), ref: 0321F291
          • LoadLibraryW.KERNEL32(user32.dll,IsWindowVisible,?,?,032215B4), ref: 0321F2A2
          • GetProcAddress.KERNEL32(00000000), ref: 0321F2A5
          • LoadLibraryW.KERNEL32(user32.dll,GetWindowThreadProcessId,?,?,032215B4), ref: 0321F2B6
          • GetProcAddress.KERNEL32(00000000), ref: 0321F2B9
          • LoadLibraryW.KERNEL32(user32.dll,ExitWindowsEx,?,?,032215B4), ref: 0321F2CA
          • GetProcAddress.KERNEL32(00000000), ref: 0321F2CD
          • LoadLibraryW.KERNEL32(advapi32.dll,OpenProcessToken,?,?,032215B4), ref: 0321F2DE
          • GetProcAddress.KERNEL32(00000000), ref: 0321F2E1
          • LoadLibraryW.KERNEL32(advapi32.dll,LookupPrivilegeValueW,?,?,032215B4), ref: 0321F2F2
          • GetProcAddress.KERNEL32(00000000), ref: 0321F2F5
          • LoadLibraryW.KERNEL32(advapi32.dll,AdjustTokenPrivileges,?,?,032215B4), ref: 0321F306
          • GetProcAddress.KERNEL32(00000000), ref: 0321F309
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateToolhelp32Snapshot,?,?,032215B4), ref: 0321F31A
          • GetProcAddress.KERNEL32(00000000), ref: 0321F31D
          • LoadLibraryW.KERNEL32(kernel32.dll,Process32FirstW,?,?,032215B4), ref: 0321F32E
          • GetProcAddress.KERNEL32(00000000), ref: 0321F331
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateThread,?,?,032215B4), ref: 0321F342
          • GetProcAddress.KERNEL32(00000000), ref: 0321F345
          • LoadLibraryW.KERNEL32(kernel32.dll,CopyFileW,?,?,032215B4), ref: 0321F356
          • GetProcAddress.KERNEL32(00000000), ref: 0321F359
          • LoadLibraryW.KERNEL32(kernel32.dll,SetFileAttributesW,?,?,032215B4), ref: 0321F36A
          • GetProcAddress.KERNEL32(00000000), ref: 0321F36D
          • LoadLibraryW.KERNEL32(kernel32.dll,WaitForSingleObject,?,?,032215B4), ref: 0321F37E
          • GetProcAddress.KERNEL32(00000000), ref: 0321F381
          • LoadLibraryW.KERNEL32(kernel32.dll,OpenEventW,?,?,032215B4), ref: 0321F392
          • GetProcAddress.KERNEL32(00000000), ref: 0321F395
          • LoadLibraryW.KERNEL32(kernel32.dll,ReadFile,?,?,032215B4), ref: 0321F3A6
          • GetProcAddress.KERNEL32(00000000), ref: 0321F3A9
          • LoadLibraryW.KERNEL32(shell32.dll,ShellExecuteW,?,?,032215B4), ref: 0321F3BA
          • GetProcAddress.KERNEL32(00000000), ref: 0321F3BD
          • LoadLibraryW.KERNEL32(kernel32.dll,TerminateProcess,?,?,032215B4), ref: 0321F3CE
          • GetProcAddress.KERNEL32(00000000), ref: 0321F3D1
          • LoadLibraryW.KERNEL32(kernel32.dll,OpenProcess,?,?,032215B4), ref: 0321F3E2
          • GetProcAddress.KERNEL32(00000000), ref: 0321F3E5
          • LoadLibraryW.KERNEL32(user32.dll,GetAsyncKeyState,?,?,032215B4), ref: 0321F3F6
          • GetProcAddress.KERNEL32(00000000), ref: 0321F3F9
          • LoadLibraryW.KERNEL32(user32.dll,GetKeyState,?,?,032215B4), ref: 0321F40A
          • GetProcAddress.KERNEL32(00000000), ref: 0321F40D
          • LoadLibraryW.KERNEL32(user32.dll,FindWindowW,?,?,032215B4), ref: 0321F41E
          • GetProcAddress.KERNEL32(00000000), ref: 0321F421
          • LoadLibraryW.KERNEL32(user32.dll,PostMessageW,?,?,032215B4), ref: 0321F432
          • GetProcAddress.KERNEL32(00000000), ref: 0321F435
          • LoadLibraryW.KERNEL32(user32.dll,GetMessageW,?,?,032215B4), ref: 0321F446
          • GetProcAddress.KERNEL32(00000000), ref: 0321F449
          • LoadLibraryW.KERNEL32(user32.dll,DispatchMessageW,?,?,032215B4), ref: 0321F45A
          • GetProcAddress.KERNEL32(00000000), ref: 0321F45D
          • LoadLibraryW.KERNEL32(user32.dll,TranslateMessage,?,?,032215B4), ref: 0321F46E
          • GetProcAddress.KERNEL32(00000000), ref: 0321F471
          • LoadLibraryW.KERNEL32(advapi32.dll,RegCloseKey,?,?,032215B4), ref: 0321F482
          • GetProcAddress.KERNEL32(00000000), ref: 0321F485
          • LoadLibraryW.KERNEL32(advapi32.dll,RegCreateKeyW,?,?,032215B4), ref: 0321F496
          • GetProcAddress.KERNEL32(00000000), ref: 0321F499
          • LoadLibraryW.KERNEL32(advapi32.dll,RegOpenKeyW,?,?,032215B4), ref: 0321F4AA
          • GetProcAddress.KERNEL32(00000000), ref: 0321F4AD
          • LoadLibraryW.KERNEL32(advapi32.dll,RegOpenKeyExW,?,?,032215B4), ref: 0321F4BE
          • GetProcAddress.KERNEL32(00000000), ref: 0321F4C1
          • LoadLibraryW.KERNEL32(advapi32.dll,RegQueryValueExA,?,?,032215B4), ref: 0321F4D2
          • GetProcAddress.KERNEL32(00000000), ref: 0321F4D5
          • LoadLibraryW.KERNEL32(advapi32.dll,RegQueryValueW,?,?,032215B4), ref: 0321F4E6
          • GetProcAddress.KERNEL32(00000000), ref: 0321F4E9
          • LoadLibraryW.KERNEL32(advapi32.dll,RegSetValueW,?,?,032215B4), ref: 0321F4FA
          • GetProcAddress.KERNEL32(00000000), ref: 0321F4FD
          • LoadLibraryW.KERNEL32(advapi32.dll,RegSetValueExW,?,?,032215B4), ref: 0321F50E
          • GetProcAddress.KERNEL32(00000000), ref: 0321F511
          • LoadLibraryW.KERNEL32(advapi32.dll,SetServiceStatus,?,?,032215B4), ref: 0321F522
          • GetProcAddress.KERNEL32(00000000), ref: 0321F525
          • LoadLibraryW.KERNEL32(advapi32.dll,RegisterServiceCtrlHandlerW,?,?,032215B4), ref: 0321F536
          • GetProcAddress.KERNEL32(00000000), ref: 0321F539
          • LoadLibraryW.KERNEL32(advapi32.dll,QueryServiceStatus,?,?,032215B4), ref: 0321F54A
          • GetProcAddress.KERNEL32(00000000), ref: 0321F54D
          • LoadLibraryW.KERNEL32(advapi32.dll,DeleteService,?,?,032215B4), ref: 0321F55E
          • GetProcAddress.KERNEL32(00000000), ref: 0321F561
          • LoadLibraryW.KERNEL32(advapi32.dll,RegCreateKeyExW,?,?,032215B4), ref: 0321F572
          • GetProcAddress.KERNEL32(00000000), ref: 0321F575
          • LoadLibraryW.KERNEL32(kernel32.dll,Process32NextW,?,?,032215B4), ref: 0321F586
          • GetProcAddress.KERNEL32(00000000), ref: 0321F589
          • LoadLibraryW.KERNEL32(advapi32.dll,RegEnumValueW,?,?,032215B4), ref: 0321F59A
          • GetProcAddress.KERNEL32(00000000), ref: 0321F59D
          • LoadLibraryW.KERNEL32(advapi32.dll,RegDeleteKeyW,?,?,032215B4), ref: 0321F5AE
          • GetProcAddress.KERNEL32(00000000), ref: 0321F5B1
          • LoadLibraryW.KERNEL32(advapi32.dll,RegDeleteValueW,?,?,032215B4), ref: 0321F5C2
          • GetProcAddress.KERNEL32(00000000), ref: 0321F5C5
          • LoadLibraryW.KERNEL32(advapi32.dll,RegEnumKeyExW,?,?,032215B4), ref: 0321F5D6
          • GetProcAddress.KERNEL32(00000000), ref: 0321F5D9
          • LoadLibraryW.KERNEL32(advapi32.dll,SetNamedSecurityInfoW,?,?,032215B4), ref: 0321F5EA
          • GetProcAddress.KERNEL32(00000000), ref: 0321F5ED
          • LoadLibraryW.KERNEL32(advapi32.dll,BuildExplicitAccessWithNameW,?,?,032215B4), ref: 0321F5FE
          • GetProcAddress.KERNEL32(00000000), ref: 0321F601
          • LoadLibraryW.KERNEL32(advapi32.dll,GetNamedSecurityInfoW,?,?,032215B4), ref: 0321F612
          • GetProcAddress.KERNEL32(00000000), ref: 0321F615
          • LoadLibraryW.KERNEL32(advapi32.dll,SetEntriesInAclW,?,?,032215B4), ref: 0321F626
          • GetProcAddress.KERNEL32(00000000), ref: 0321F629
          • LoadLibraryW.KERNEL32(advapi32.dll,ClearEventLogW,?,?,032215B4), ref: 0321F63A
          • GetProcAddress.KERNEL32(00000000), ref: 0321F63D
          • LoadLibraryW.KERNEL32(advapi32.dll,OpenEventLogW,?,?,032215B4), ref: 0321F64E
          • GetProcAddress.KERNEL32(00000000), ref: 0321F651
          • LoadLibraryW.KERNEL32(advapi32.dll,CloseEventLog,?,?,032215B4), ref: 0321F662
          • GetProcAddress.KERNEL32(00000000), ref: 0321F665
          • LoadLibraryW.KERNEL32(advapi32.dll,FreeSid,?,?,032215B4), ref: 0321F676
          • GetProcAddress.KERNEL32(00000000), ref: 0321F679
          • LoadLibraryW.KERNEL32(advapi32.dll,LookupAccountSidW,?,?,032215B4), ref: 0321F68A
          • GetProcAddress.KERNEL32(00000000), ref: 0321F68D
          • LoadLibraryW.KERNEL32(advapi32.dll,GetTokenInformationW,?,?,032215B4), ref: 0321F69E
          • GetProcAddress.KERNEL32(00000000), ref: 0321F6A1
          • LoadLibraryW.KERNEL32(psapi.dll,EnumProcessModules,?,?,032215B4), ref: 0321F6B2
          • GetProcAddress.KERNEL32(00000000), ref: 0321F6B5
          • LoadLibraryW.KERNEL32(psapi.dll,GetModuleFileNameExW,?,?,032215B4), ref: 0321F6C6
          • GetProcAddress.KERNEL32(00000000), ref: 0321F6C9
          • LoadLibraryW.KERNEL32(shell32.dll,SHGetFileInfoA,?,?,032215B4), ref: 0321F6DA
          • GetProcAddress.KERNEL32(00000000), ref: 0321F6DD
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: AddressLibraryLoadProc
          • String ID: AdjustTokenPrivileges$BitBlt$BlockInput$BuildExplicitAccessWithNameW$ChangeServiceConfigW$CharNextW$ClearEventLogW$CloseClipboard$CloseDesktop$CloseEventLog$CloseHandle$CloseServiceHandle$ControlService$CopyFileW$CreateCompatibleBitmap$CreateCompatibleDC$CreateDIBSection$CreateDirectoryW$CreateFileMappingW$CreateFileW$CreateMutexA$CreateProcessW$CreateThread$CreateToolhelp32Snapshot$DeleteCriticalSection$DeleteDC$DeleteFileW$DeleteObject$DeleteService$DeviceIoControl$DispatchMessageW$EmptyClipboard$EnterCriticalSection$EnumProcessModules$EnumWindows$ExitWindowsEx$FindClose$FindFirstFileW$FindNextFileW$FindWindowW$FreeSid$GetAsyncKeyState$GetClipboardData$GetCurrentThreadId$GetDIBits$GetDiskFreeSpaceExA$GetDriveTypeA$GetFileAttributesW$GetForegroundWindow$GetInputState$GetKeyState$GetLastError$GetLogicalDriveStringsA$GetMessageW$GetModuleFileNameExW$GetModuleFileNameW$GetNamedSecurityInfoW$GetSystemDirectoryW$GetSystemInfo$GetSystemMetrics$GetTempPathW$GetTokenInformationW$GetUserObjectInformationW$GetVersionExW$GetVolumeInformationA$GetWindowTextW$GetWindowThreadProcessId$GlobalMemoryStatus$InitializeCriticalSection$InterlockedExchange$InternetCloseHandle$InternetGetConnectedState$InternetOpenUrlA$InternetOpenUrlW$InternetOpenW$InternetQueryOptionA$InternetReadFile$IsWindowVisible$LeaveCriticalSection$LookupAccountSidW$LookupPrivilegeValueW$MapViewOfFile$MoveFileW$OpenClipboard$OpenDesktopW$OpenEventLogW$OpenEventW$OpenProcess$OpenProcessToken$OpenSCManagerW$OpenServiceW$OutputDebugStringA$PostMessageW$PostThreadMessageW$Process32FirstW$Process32NextW$QueryServiceStatus$ReadFile$RegCloseKey$RegCreateKeyExW$RegCreateKeyW$RegDeleteKeyW$RegDeleteValueW$RegEnumKeyExW$RegEnumValueW$RegOpenKeyExW$RegOpenKeyW$RegQueryValueExA$RegQueryValueW$RegSetValueExW$RegSetValueW$RegisterServiceCtrlHandlerW$ReleaseMutex$RemoveDirectoryW$SHGetFileInfoA$SelectObject$SendMessageW$SetCapture$SetClipboardData$SetCursorPos$SetEntriesInAclW$SetFileAttributesW$SetFilePointer$SetNamedSecurityInfoW$SetServiceStatus$ShellExecuteW$Sleep$StartServiceW$SystemParametersInfoW$TerminateProcess$TerminateThread$TranslateMessage$USER32.dll$UnmapViewOfFile$VirtualAlloc$VirtualFree$WaitForSingleObject$WinExec$WindowFromPoint$WriteFile$advapi32.dll$avicap32.dll$capCreateCaptureWindowW$capGetDriverDescriptionW$gdi32.dll$kernel32.dll$kernel32.dll$keybd_event$mouse_event$psapi.dll$shell32.dll$user32.dll$wininet.dll$wininet.dll$wsprintfW
          • API String ID: 2574300362-3174654482
          • Opcode ID: 54a10ceca9963d678d521fbcb75fd6a019a583d84da3588040b967a59bc8338f
          • Instruction ID: ed7cc9a8713c470e323b4e2f779a2b82699e39634341f20b22c75aedaa9e0e6c
          • Opcode Fuzzy Hash: 54a10ceca9963d678d521fbcb75fd6a019a583d84da3588040b967a59bc8338f
          • Instruction Fuzzy Hash: 7A326D60DA03587DDF30FBB26E0ED4F2FD9D9B1E503415916B22497906DAB8A1B0CF94

          Control-flow Graph

          APIs
          • LoadLibraryW.KERNEL32 ref: 032217D0
          • LoadLibraryW.KERNEL32(?,?), ref: 0322182B
          • GetProcAddress.KERNEL32(00000000), ref: 03221834
          • LoadLibraryW.KERNEL32(00000032,?), ref: 0322188B
          • GetProcAddress.KERNEL32(00000000), ref: 0322188E
          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 03221897
          • lstrcmpiW.KERNEL32(?,?), ref: 032218C3
          • CloseHandle.KERNEL32(00000000), ref: 032218DA
          • CloseHandle.KERNEL32(00000000), ref: 032218F3
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: LibraryLoad$AddressCloseHandleProc$CreateSnapshotToolhelp32lstrcmpi
          • String ID: .$2$2$2$3$3$3$F$N$NotFound$P$P$W$W$c$c$d$e$e$e$i$k$n$o$o$r$r$r$r$t$t$x
          • API String ID: 3120855396-1909897051
          • Opcode ID: 4dbb04254e5e8b24105595cb9b6c59a6e1bcc7f12f4079c57f4d0bb66bc899bd
          • Instruction ID: e8db667eff9011320a671f46786c47dff06f6178d887313bbae2ec188ef632aa
          • Opcode Fuzzy Hash: 4dbb04254e5e8b24105595cb9b6c59a6e1bcc7f12f4079c57f4d0bb66bc899bd
          • Instruction Fuzzy Hash: 0241702041C3C099E301DB299888B5FBFE9AFA6308F48195DF5C857242D7BAD60CC76B

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 112 321fa30-321fb12 LoadLibraryW GetProcAddress * 5 call 321f7e0 RegOpenKeyExW 115 321fb20-321fb26 112->115 116 321fb14-321fb1b 112->116 117 321fe9d-321feab call 321fece 115->117 118 321fb2c 115->118 116->117 142 321feb4-321fec7 117->142 143 321fead-321feae FreeLibrary 117->143 118->117 120 321fde2-321fdee 118->120 121 321fe45-321fe5a 118->121 122 321fba4-321fbd5 118->122 123 321fb47-321fb78 RegQueryValueExW 118->123 124 321fc8f-321fcbc 118->124 125 321fcce 118->125 126 321fdf0-321fdf7 118->126 127 321fb33-321fb3a 118->127 128 321fc33-321fc64 118->128 129 321fd55-321fdc8 118->129 130 321fe17-321fe43 wsprintfW 118->130 131 321fb98-321fb9f 118->131 132 321fe7a-321fe92 lstrcatW 118->132 133 321fe5c-321fe70 118->133 134 321fdfc-321fe15 wsprintfW 120->134 135 321fe71-321fe77 wsprintfW 121->135 122->117 147 321fbdb 122->147 123->117 139 321fb7e-321fb92 call 321f7b0 lstrcpyW 123->139 124->117 149 321fcc2-321fcc9 124->149 137 321fcd1-321fd19 125->137 126->134 127->117 138 321fb40 127->138 128->117 148 321fc6a-321fc8a wsprintfW 128->148 151 321fe97 129->151 152 321fdce-321fdd5 129->152 130->132 131->117 133->135 134->132 135->132 137->151 155 321fd1f-321fd50 wsprintfW lstrcatW 137->155 138->117 138->120 138->121 138->122 138->123 138->124 138->126 138->128 138->130 138->132 138->133 139->131 143->142 154 321fbe1-321fbf1 147->154 148->117 149->117 151->117 152->132 156 321fddb 152->156 157 321fbf3-321fc1a call 321f790 * 2 call 321f710 154->157 158 321fc1c-321fc2e lstrcpyW 154->158 155->137 156->120 156->121 156->126 156->130 156->132 156->133 157->154 158->117
          APIs
          • LoadLibraryW.KERNEL32(ADVAPI32.dll,0321153C,?,?), ref: 0321FA86
          • GetProcAddress.KERNEL32(00000000,RegQueryValueExW), ref: 0321FAA0
          • GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 0321FAAE
          • GetProcAddress.KERNEL32(00000000,RegEnumValueW), ref: 0321FABC
          • GetProcAddress.KERNEL32(00000000,RegEnumKeyExW), ref: 0321FACA
          • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 0321FAD8
            • Part of subcall function 0321F7E0: LoadLibraryW.KERNEL32(ADVAPI32.dll,00000000,00000000,00000000), ref: 0321F831
            • Part of subcall function 0321F7E0: GetProcAddress.KERNEL32(00000000,GetLengthSid), ref: 0321F848
            • Part of subcall function 0321F7E0: GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 0321F853
            • Part of subcall function 0321F7E0: GetProcAddress.KERNEL32(00000000,SetSecurityDescriptorDacl), ref: 0321F860
            • Part of subcall function 0321F7E0: GetProcAddress.KERNEL32(00000000,InitializeSecurityDescriptor), ref: 0321F86B
            • Part of subcall function 0321F7E0: GetProcAddress.KERNEL32(00000000,InitializeAcl), ref: 0321F876
            • Part of subcall function 0321F7E0: GetProcAddress.KERNEL32(00000000,AddAccessAllowedAce), ref: 0321F881
            • Part of subcall function 0321F7E0: GetProcAddress.KERNEL32(00000000,AllocateAndInitializeSid), ref: 0321F88C
            • Part of subcall function 0321F7E0: GetProcAddress.KERNEL32(00000000,RegSetKeySecurity), ref: 0321F897
            • Part of subcall function 0321F7E0: RegOpenKeyExW.KERNEL32(00000000,?,00000000,00040000,?), ref: 0321F8AF
          • RegOpenKeyExW.KERNEL32(?,00000000,00000000,00020019,?), ref: 0321FB0A
          • FreeLibrary.KERNEL32(00000000), ref: 0321FEAE
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$Library$LoadOpen$Free
          • String ID: %-24s %-15s $%-24s %-15s %s $%-24s %-15s 0x%x(%d) $ADVAPI32.dll$REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_SZ$RegCloseKey$RegEnumKeyExW$RegEnumValueW$RegOpenKeyExW$RegQueryValueExW$[%s]
          • API String ID: 853568933-258588721
          • Opcode ID: 026ed412c1a98948304916736c1c403e64012c5fad2dc2ca5b01e5c3a7dd8b19
          • Instruction ID: 0dab4ece61b2e16a484291300e85d4cd56b6f65cd18cc153681f817386805442
          • Opcode Fuzzy Hash: 026ed412c1a98948304916736c1c403e64012c5fad2dc2ca5b01e5c3a7dd8b19
          • Instruction Fuzzy Hash: 3FC184B1910218AFDB60CF54DE84FEE73B8FB54700F008599F619A7145DBB49A94CFA4

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 242 321f7e0-321f8b3 LoadLibraryW GetProcAddress * 8 RegOpenKeyExW 243 321f9a0 242->243 244 321f8b9-321f8da 242->244 245 321f9a3-321f9c2 call 321f9cc 243->245 244->243 249 321f8e0-321f901 244->249 249->243 251 321f907-321f936 GetProcessHeap HeapAlloc 249->251 251->245 254 321f938-321f941 251->254 254->245 256 321f943-321f956 254->256 256->245 258 321f958-321f967 256->258 258->245 260 321f969-321f974 258->260 260->245 262 321f976-321f984 260->262 262->245 264 321f986-321f995 RegSetKeySecurity 262->264 264->245 265 321f997-321f99e 264->265 265->245
          APIs
          • LoadLibraryW.KERNEL32(ADVAPI32.dll,00000000,00000000,00000000), ref: 0321F831
          • GetProcAddress.KERNEL32(00000000,GetLengthSid), ref: 0321F848
          • GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 0321F853
          • GetProcAddress.KERNEL32(00000000,SetSecurityDescriptorDacl), ref: 0321F860
          • GetProcAddress.KERNEL32(00000000,InitializeSecurityDescriptor), ref: 0321F86B
          • GetProcAddress.KERNEL32(00000000,InitializeAcl), ref: 0321F876
          • GetProcAddress.KERNEL32(00000000,AddAccessAllowedAce), ref: 0321F881
          • GetProcAddress.KERNEL32(00000000,AllocateAndInitializeSid), ref: 0321F88C
          • GetProcAddress.KERNEL32(00000000,RegSetKeySecurity), ref: 0321F897
          • RegOpenKeyExW.KERNEL32(00000000,?,00000000,00040000,?), ref: 0321F8AF
          • GetProcessHeap.KERNEL32(00000000,00000018), ref: 0321F922
          • HeapAlloc.KERNEL32(00000000), ref: 0321F929
          • RegSetKeySecurity.KERNEL32(?,00000004,?), ref: 0321F990
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$Heap$AllocLibraryLoadOpenProcessSecurity
          • String ID: ADVAPI32.dll$AddAccessAllowedAce$AllocateAndInitializeSid$GetLengthSid$InitializeAcl$InitializeSecurityDescriptor$RegOpenKeyExW$RegSetKeySecurity$SetSecurityDescriptorDacl
          • API String ID: 1994375984-3036209889
          • Opcode ID: dc11d20d2d8e07460dd3fcf71ccb3ec815a2f3e509e95835b76641ba6533d3c4
          • Instruction ID: 8ff3c28d05dd85f87e2e3454d0f90356c073c2adf1e73909715d9c41c605a77c
          • Opcode Fuzzy Hash: dc11d20d2d8e07460dd3fcf71ccb3ec815a2f3e509e95835b76641ba6533d3c4
          • Instruction Fuzzy Hash: C9515970E10319BEDB10EBA9CE45FEEBBF8AF68700F044119F614B6281D7B599418BA1

          Control-flow Graph

          APIs
          • GetVersionExW.KERNEL32 ref: 03220AEE
            • Part of subcall function 03220A70: gethostname.WS2_32(00000000,00000032), ref: 03220A8F
            • Part of subcall function 03220A70: MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000032,?,00000032), ref: 03220AA7
            • Part of subcall function 03220A70: lstrlenW.KERNEL32(?), ref: 03220AAE
          • getsockname.WS2_32(?), ref: 03220B5F
            • Part of subcall function 03220630: LoadLibraryW.KERNEL32(ADVAPI32.dll,?,?,?,0000011C,?,?,?,?,connected: safebrow.flnet.org:443,?,00000000), ref: 03220649
            • Part of subcall function 03220630: GetProcAddress.KERNEL32(00000000,RegQueryValueExW), ref: 0322065D
            • Part of subcall function 03220630: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 03220667
            • Part of subcall function 03220630: GetProcAddress.KERNEL32(00000000,RegOpenKeyW), ref: 03220671
            • Part of subcall function 03220630: RegOpenKeyW.ADVAPI32(80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,?,?,?,?,?,connected: safebrow.flnet.org:443,?,00000000), ref: 03220682
            • Part of subcall function 03220630: RegQueryValueExW.KERNEL32(?,~MHz,00000000,?,?,?,?,?,?,?,connected: safebrow.flnet.org:443,?,00000000), ref: 0322069F
            • Part of subcall function 03220630: FreeLibrary.KERNEL32(00000000,?,?,?,?,connected: safebrow.flnet.org:443,?,00000000), ref: 032206AD
          • GetVersionExW.KERNEL32(?), ref: 03220BA0
          • lstrcpyW.KERNEL32(?,03218D54), ref: 03220BD0
          • GetSystemInfo.KERNEL32(?), ref: 03220BD9
          • wsprintfW.USER32 ref: 03220BF1
          • GlobalMemoryStatus.KERNEL32 ref: 03220C63
          • GetTickCount.KERNEL32 ref: 03220C77
          • wsprintfW.USER32 ref: 03220C95
          • wsprintfW.USER32 ref: 03220CB5
          • wsprintfW.USER32 ref: 03220CDA
          • wsprintfW.USER32 ref: 03220D05
          • lstrcpyW.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 03220D1C
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 03220D58
          • mbstowcs.MSVCRT ref: 03220D99
          • lstrcpyW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 03220DC0
          • mbstowcs.MSVCRT ref: 03220DF3
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: wsprintf$AddressProclstrcpy$LibraryVersionlstrlenmbstowcs$ByteCharCountFreeGlobalInfoLoadMemoryMultiOpenQueryStatusSystemTickValueWidegethostnamegetsockname
          • String ID: $connected: safebrow.flnet.org:443$f
          • API String ID: 3965135286-403705569
          • Opcode ID: f930f07b0892a672600f8165881607706663fc019bc4facb203abaae4fb0733d
          • Instruction ID: 9eb0b10c8079c1161abedd899e9127010313b6b0aa51f10be25876d531848b9e
          • Opcode Fuzzy Hash: f930f07b0892a672600f8165881607706663fc019bc4facb203abaae4fb0733d
          • Instruction Fuzzy Hash: FE819EB1518385AFD334DB24C844AEBB7E9EFD8704F40891DF68987245DB74A548CB92

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 292 49225c0-492266f call 4922c60 CoInitialize 296 492267c-49226f8 Sleep GetForegroundWindow GetCursorPos WindowFromPoint GetClassNameA _strcmpi 292->296 297 49226fe-4922712 call 4922250 296->297 298 4922aff-4922b06 296->298 301 4922714-4922716 297->301 302 492271a-492272a 297->302 298->296 301->302 303 4922730-4922766 wcstombs _strcmpi 302->303 304 4922b0b-4922b13 SysFreeString 302->304 306 4922acc-4922af7 call 4922470 SysFreeString 303->306 307 492276c-492277b 303->307 304->296 306->298 313 4922af9-4922afb 306->313 307->306 309 4922781-492278e 307->309 309->306 311 4922794-492280c GetLocalTime GetWindowTextA wsprintfA 309->311 312 492280e-4922814 311->312 314 4922863-4922991 call 4921520 312->314 315 4922816-492282f 312->315 313->298 321 4922993-49229ac 314->321 322 49229b0-49229d0 314->322 316 4922860-4922861 315->316 317 4922831-492285e 315->317 316->312 317->316 321->322 323 49229d2 322->323 324 49229d8-49229da 322->324 323->324 325 4922a1a-4922a4d call 4921590 324->325 326 49229dc-49229f0 324->326 332 4922a6b-4922a79 325->332 333 4922a4f-4922a55 325->333 326->325 330 49229f2-4922a16 326->330 330->325 336 4922a80-4922aca call 49217f0 332->336 337 4922a7b 332->337 334 4922a62-4922a68 call 4922c50 333->334 335 4922a57-4922a5a 333->335 334->332 335->334 339 4922a5c-4922a60 335->339 336->306 337->336 339->332
          APIs
          • CoInitialize.OLE32(00000000), ref: 049225EB
          • Sleep.KERNEL32(000001F4), ref: 04922681
          • GetForegroundWindow.USER32 ref: 04922687
          • GetCursorPos.USER32(?), ref: 04922693
          • WindowFromPoint.USER32(?,?), ref: 049226A1
          • GetClassNameA.USER32(00000000,00000000,000000C8), ref: 049226D9
          • _strcmpi.MSVCRT ref: 049226F1
          • wcstombs.MSVCRT ref: 0492274D
          • _strcmpi.MSVCRT ref: 0492275F
          • GetLocalTime.KERNEL32(?), ref: 04922798
          • GetWindowTextA.USER32(00000000,?,00000118), ref: 049227AB
          • wsprintfA.USER32 ref: 04922803
            • Part of subcall function 04921520: malloc.MSVCRT ref: 04921538
            • Part of subcall function 04921520: free.MSVCRT ref: 04921579
          • SysFreeString.OLEAUT32(?), ref: 04922AEB
          • SysFreeString.OLEAUT32(00000000), ref: 04922B0D
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4490119108.0000000004920000.00000040.00001000.00020000.00000000.sdmp, Offset: 04920000, based on PE: true
          • Associated: 00000011.00000002.4490119108.0000000004926000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_4920000_rundll32.jbxd
          Similarity
          • API ID: Window$FreeString_strcmpi$ClassCursorForegroundFromInitializeLocalNamePointSleepTextTimefreemallocwcstombswsprintf
          • String ID: $965543$ALL$Internet Explorer_Server
          • API String ID: 392133977-3604510796
          • Opcode ID: 46c4746084b444ae1ddf20b60c6e53d3247e0afc3e3442de3e5b65ddcd572f37
          • Instruction ID: 68871003c7a12883575282c57121ad0fc3a4962bd55f1e6a5d386f4aa205e20a
          • Opcode Fuzzy Hash: 46c4746084b444ae1ddf20b60c6e53d3247e0afc3e3442de3e5b65ddcd572f37
          • Instruction Fuzzy Hash: 81F14C31A006689BDB24CF74C951AEE7BB6FF88310F1442B9E516A77C4CB75AE05CB90

          Control-flow Graph

          APIs
          • LoadLibraryW.KERNEL32(ADVAPI32.dll,?,?,?,0000011C,?,?,?,?,connected: safebrow.flnet.org:443,?,00000000), ref: 03220649
          • GetProcAddress.KERNEL32(00000000,RegQueryValueExW), ref: 0322065D
          • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 03220667
          • GetProcAddress.KERNEL32(00000000,RegOpenKeyW), ref: 03220671
          • RegOpenKeyW.ADVAPI32(80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,?,?,?,?,?,connected: safebrow.flnet.org:443,?,00000000), ref: 03220682
          • RegQueryValueExW.KERNEL32(?,~MHz,00000000,?,?,?,?,?,?,?,connected: safebrow.flnet.org:443,?,00000000), ref: 0322069F
          • FreeLibrary.KERNEL32(00000000,?,?,?,?,connected: safebrow.flnet.org:443,?,00000000), ref: 032206AD
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$Library$FreeLoadOpenQueryValue
          • String ID: ADVAPI32.dll$HARDWARE\DESCRIPTION\System\CentralProcessor\0$RegCloseKey$RegOpenKeyW$RegQueryValueExW$~MHz
          • API String ID: 490023571-3996806929
          • Opcode ID: 1fc802b16d06d72be78f49f10773f48f68465e8dd5a9de821d0aceb8dde6841b
          • Instruction ID: ed742883677fa3fddfc3bf2cf16e877f911158f31873d0b9fb9373e435c14033
          • Opcode Fuzzy Hash: 1fc802b16d06d72be78f49f10773f48f68465e8dd5a9de821d0aceb8dde6841b
          • Instruction Fuzzy Hash: CD01F9716103156FD300EB65ED45D6FB7DCEFD5900F004919FA10E3102D674F91587A5

          Control-flow Graph

          APIs
            • Part of subcall function 04921930: CreateMutexA.KERNEL32(00000000,00000001,IEPASS,?,04922B46), ref: 0492193A
            • Part of subcall function 04921930: GetLastError.KERNEL32(?,04922B46), ref: 04921942
            • Part of subcall function 04921930: ReleaseMutex.KERNEL32(00000000,?,04922B46), ref: 04921950
            • Part of subcall function 04921930: ExitProcess.KERNEL32 ref: 04921958
          • GetInputState.USER32 ref: 04922B46
          • GetCurrentThreadId.KERNEL32 ref: 04922B51
          • PostThreadMessageA.USER32(00000000), ref: 04922B58
          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 04922B65
          • _CxxThrowException.MSVCRT(?,04923210), ref: 04922B7A
          • GetComputerNameA.KERNEL32(965543,?), ref: 04922B8F
          • CreateThread.KERNEL32(00000000,00000000,049225C0,00000000,00000000,00000000), ref: 04922BA4
          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 04922BBA
          • TranslateMessage.USER32(?), ref: 04922BD0
          • DispatchMessageA.USER32(?), ref: 04922BD6
          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 04922BE2
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4490119108.0000000004920000.00000040.00001000.00020000.00000000.sdmp, Offset: 04920000, based on PE: true
          • Associated: 00000011.00000002.4490119108.0000000004926000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_4920000_rundll32.jbxd
          Similarity
          • API ID: Message$Thread$CreateMutex$ComputerCurrentDispatchErrorExceptionExitInputLastNamePostProcessReleaseStateThrowTranslate
          • String ID: 965543
          • API String ID: 4219117369-1568212969
          • Opcode ID: 42127809d639d0ee1b605303db6dd1a4b24118579c349f3d5f4f3c7db0fc7693
          • Instruction ID: 8b18a4f93f9560a77746fe20632488f477e35a93e3a5c27fc73edfb8397da9e3
          • Opcode Fuzzy Hash: 42127809d639d0ee1b605303db6dd1a4b24118579c349f3d5f4f3c7db0fc7693
          • Instruction Fuzzy Hash: 0B216D75985329BBDB20DBA0DE0AF9F7F7CEB44B50F100124F601A6188C6B86A008BA5

          Control-flow Graph

          APIs
          • VirtualQuery.KERNEL32(delloader,00000000,0000001C), ref: 03221523
          • VirtualProtect.KERNEL32(00000000,?,00000020,?), ref: 0322153B
          • GetModuleHandleA.KERNEL32(kernel32.dll,HeapDestroy), ref: 0322154F
          • GetProcAddress.KERNEL32(00000000), ref: 03221556
          • VirtualProtect.KERNEL32(00000000,00000003,00000040,?), ref: 0322156A
          • FreeLibrary.KERNEL32(?), ref: 0322157E
          • VirtualProtect.KERNEL32(00000000,?,00000040,?), ref: 03221599
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: Virtual$Protect$AddressFreeHandleLibraryModuleProcQuery
          • String ID: HeapDestroy$kernel32.dll
          • API String ID: 1044237551-3302499733
          • Opcode ID: cfabbb6fe287316f9b3fd87cc9d66bbe90fe5c50afba01c51f5788bbf70f2836
          • Instruction ID: 3e5085a3b02885fa8724c40f8d9fdd021542f87e707536d6408d37cfc5d3c61e
          • Opcode Fuzzy Hash: cfabbb6fe287316f9b3fd87cc9d66bbe90fe5c50afba01c51f5788bbf70f2836
          • Instruction Fuzzy Hash: 6A113732D10208BFDF01EAE5ED48EEEBBB9EB18711F108012FB05B2140C6B1AA158B64

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 354 321bf20-321bf57 call 321c3d0 ResetEvent socket 357 321bf65-321bf74 gethostbyname 354->357 358 321bf59-321bf62 354->358 359 321bf82-321bf94 357->359 360 321bf76-321bf7f 357->360 361 321bfa0 359->361 362 321bf96-321bf9e 359->362 363 321bfa1-321bfce htons connect 361->363 362->363 364 321bfd0-321bfe0 call 321bb70 363->364 365 321bff9-321c01b setsockopt 363->365 364->365 372 321bfe2-321bfed call 321b940 364->372 366 321c059-321c070 call 32216e0 365->366 367 321c01d-321c053 WSAIoctl 365->367 371 321c075-321c087 366->371 367->366 372->365 375 321bfef-321bff6 372->375
          APIs
            • Part of subcall function 0321C3D0: setsockopt.WS2_32(?,0000FFFF,00000080,00000000,00000004), ref: 0321C3FA
            • Part of subcall function 0321C3D0: CancelIo.KERNEL32(?), ref: 0321C407
            • Part of subcall function 0321C3D0: InterlockedExchange.KERNEL32(?,00000000), ref: 0321C416
            • Part of subcall function 0321C3D0: closesocket.WS2_32(?), ref: 0321C423
            • Part of subcall function 0321C3D0: SetEvent.KERNEL32(?), ref: 0321C430
          • ResetEvent.KERNEL32(?,03229908,safebrow.flnet.org,?,00000000,?,?,?,?,?,?,0322133F,safebrow.flnet.org,?), ref: 0321BF35
          • socket.WS2_32(00000002,00000001,00000006), ref: 0321BF48
          • gethostbyname.WS2_32(?), ref: 0321BF6A
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: Event$CancelExchangeInterlockedResetclosesocketgethostbynamesetsockoptsocket
          • String ID: safebrow.flnet.org
          • API String ID: 513860241-719919387
          • Opcode ID: 2b77b69abecc3cf90ea3e76131fb933440d72fd2f9f24fc0f76df6207bbcbcff
          • Instruction ID: b1a5d0fdc9573a53cc75982d1e09d273a59f362a3351ed5e94983f96b70d5d14
          • Opcode Fuzzy Hash: 2b77b69abecc3cf90ea3e76131fb933440d72fd2f9f24fc0f76df6207bbcbcff
          • Instruction Fuzzy Hash: 3A4127362543007FD320DB65ED89F9BB7E8EFA9764F00410DF659961C0DBB2A4988B61

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 376 3220e7e-3220eed GetSystemDirectoryW lstrcatW CreateFileW ??2@YAPAXI@Z 377 3220f00-3220f2b WriteFile CloseHandle 376->377 378 3220eef-3220ef2 376->378 379 3220ef4-3220efe 378->379 379->377 379->379
          APIs
          • GetSystemDirectoryW.KERNEL32(?,00000230), ref: 03220E96
          • lstrcatW.KERNEL32(?,\KB1035627.dat), ref: 03220EA8
          • CreateFileW.KERNEL32(?,40000000,00000002,00000000,00000002,00000080,00000000), ref: 03220EC7
          • ??2@YAPAXI@Z.MSVCRT ref: 03220EE3
          • WriteFile.KERNEL32(032213B4,00000000,?,?,00000000), ref: 03220F18
          • CloseHandle.KERNEL32(032213B4,?,?,00000000), ref: 03220F21
          Strings
          • \KB1035627.dat, xrefs: 03220EA2
          • connected: safebrow.flnet.org:443, xrefs: 03220E88
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: File$??2@CloseCreateDirectoryHandleSystemWritelstrcat
          • String ID: \KB1035627.dat$connected: safebrow.flnet.org:443
          • API String ID: 476129920-3087542612
          • Opcode ID: 6f61d2ca575de906e323c6f9d8bbbac2d63a3852b001917e838bfa9d3af1eb85
          • Instruction ID: 6dba6e750974de6a73891d2ea9b39eb188014f061971f80e19e9a91bafec2940
          • Opcode Fuzzy Hash: 6f61d2ca575de906e323c6f9d8bbbac2d63a3852b001917e838bfa9d3af1eb85
          • Instruction Fuzzy Hash: AC110875940218BFDB10AAB8DD4DFEE7F78EB14351F10426AF601A61D5DE706E44CB60

          Control-flow Graph

          Strings
          • connected: safebrow.flnet.org:443, xrefs: 03227872
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID:
          • String ID: connected: safebrow.flnet.org:443
          • API String ID: 0-2118524957
          • Opcode ID: 3ea9709598f4c2a8433795193551701a118ee58512c22f3115f02746d38abaa8
          • Instruction ID: d296a4656bd05de5ca9c5568e741d89970cd005c2f7c6b25a15dd9ff0b9c994e
          • Opcode Fuzzy Hash: 3ea9709598f4c2a8433795193551701a118ee58512c22f3115f02746d38abaa8
          • Instruction Fuzzy Hash: D531C8763157227BD214EA6EEC84FBBBB5CEF90362F044036FA00D6241DB61E455D7A1

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 408 32209e0-3220a57 wsprintfW call 321fa30 lstrlenW 411 3220a59 408->411 412 3220a5e-3220a6a lstrlenW 408->412 411->412
          APIs
          • wsprintfW.USER32 ref: 03220A27
            • Part of subcall function 0321FA30: LoadLibraryW.KERNEL32(ADVAPI32.dll,0321153C,?,?), ref: 0321FA86
            • Part of subcall function 0321FA30: GetProcAddress.KERNEL32(00000000,RegQueryValueExW), ref: 0321FAA0
            • Part of subcall function 0321FA30: GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 0321FAAE
            • Part of subcall function 0321FA30: GetProcAddress.KERNEL32(00000000,RegEnumValueW), ref: 0321FABC
            • Part of subcall function 0321FA30: GetProcAddress.KERNEL32(00000000,RegEnumKeyExW), ref: 0321FACA
            • Part of subcall function 0321FA30: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 0321FAD8
            • Part of subcall function 0321FA30: RegOpenKeyExW.KERNEL32(?,00000000,00000000,00020019,?), ref: 0321FB0A
            • Part of subcall function 0321FA30: FreeLibrary.KERNEL32(00000000), ref: 0321FEAE
          • lstrlenW.KERNEL32(?), ref: 03220A53
          • lstrlenW.KERNEL32(?), ref: 03220A5F
          Strings
          • SOFTWARE\Microsoft\Windows\CurrentVersion\Setup, xrefs: 03220A06
          • Host, xrefs: 03220A39
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$Librarylstrlen$FreeLoadOpenwsprintf
          • String ID: Host$SOFTWARE\Microsoft\Windows\CurrentVersion\Setup
          • API String ID: 489517643-3116824957
          • Opcode ID: 02d235bf580dc4d3822abbf2f4da5a6811ac38e4e0fa3f5ee6394fd3b6514107
          • Instruction ID: eb9e131f1fc185862e626f2556a9e3a697de384138d930a4e354ee2609f76cb9
          • Opcode Fuzzy Hash: 02d235bf580dc4d3822abbf2f4da5a6811ac38e4e0fa3f5ee6394fd3b6514107
          • Instruction Fuzzy Hash: 6A0126327102143AE714E514ED46FAB77D9EFC8A00F444439F755A3284D9B1AD6A8BE2
          APIs
          • LoadLibraryW.KERNEL32(avicap32.dll,?,?,?,7595F860), ref: 032206D1
          • GetProcAddress.KERNEL32(00000000,capGetDriverDescriptionW), ref: 032206DF
          • FreeLibrary.KERNEL32(00000000), ref: 0322070E
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: Library$AddressFreeLoadProc
          • String ID: avicap32.dll$capGetDriverDescriptionW
          • API String ID: 145871493-1031773666
          • Opcode ID: d9703cd95234f7966abc9c350fb0d41f274dcdef31b549433c0b22cd88cccab6
          • Instruction ID: f56d6beedfe08e9b823a07feb7f31ed9765a44645cb98095d3610c23b4b0e6d9
          • Opcode Fuzzy Hash: d9703cd95234f7966abc9c350fb0d41f274dcdef31b549433c0b22cd88cccab6
          • Instruction Fuzzy Hash: 38F0E9366922147FD220F561AD09FFB7B9CDB57210F058112FF5183081EAB9246C85F0
          APIs
          • CreateMutexA.KERNEL32(00000000,00000001,UpdateWindow,?,03221073), ref: 03220FFB
          • GetLastError.KERNEL32(?,03221073), ref: 03221003
          • ReleaseMutex.KERNEL32(00000000,?,03221073), ref: 03221016
          • ExitProcess.KERNEL32 ref: 0322101E
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: Mutex$CreateErrorExitLastProcessRelease
          • String ID: UpdateWindow
          • API String ID: 1221886886-2116364557
          • Opcode ID: 627492031cea6fd71432aebd73577c267d882e1087a60f4b70f34bccaecf2198
          • Instruction ID: 94daa5078497ad6befedfd9bd202ea640be2649084a502122048397bfc8e2aa3
          • Opcode Fuzzy Hash: 627492031cea6fd71432aebd73577c267d882e1087a60f4b70f34bccaecf2198
          • Instruction Fuzzy Hash: EBD0A731954360BBD7707761BD8DF9C3F22EB29712F084050FB09D50C8CBA455E08661
          APIs
          • CreateMutexA.KERNEL32(00000000,00000001,IEPASS,?,04922B46), ref: 0492193A
          • GetLastError.KERNEL32(?,04922B46), ref: 04921942
          • ReleaseMutex.KERNEL32(00000000,?,04922B46), ref: 04921950
          • ExitProcess.KERNEL32 ref: 04921958
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4490119108.0000000004920000.00000040.00001000.00020000.00000000.sdmp, Offset: 04920000, based on PE: true
          • Associated: 00000011.00000002.4490119108.0000000004926000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_4920000_rundll32.jbxd
          Similarity
          • API ID: Mutex$CreateErrorExitLastProcessRelease
          • String ID: IEPASS
          • API String ID: 1221886886-3492268978
          • Opcode ID: 5eb8ce4ba97a3781fbb49c6b7a5b367728ed5488ba7b4bf2698e8befa39d4b40
          • Instruction ID: fdb6ec313f739d491d0835aa79f09dab1af218c58c3b3d47bdeff30765c71635
          • Opcode Fuzzy Hash: 5eb8ce4ba97a3781fbb49c6b7a5b367728ed5488ba7b4bf2698e8befa39d4b40
          • Instruction Fuzzy Hash: FAD09E359CD270E7D76016607B4FB893E65DB44762F000430F209E50C4C76A48618A51
          APIs
          • setsockopt.WS2_32(?,0000FFFF,00000080,00000000,00000004), ref: 0321C3FA
          • CancelIo.KERNEL32(?), ref: 0321C407
          • InterlockedExchange.KERNEL32(?,00000000), ref: 0321C416
          • closesocket.WS2_32(?), ref: 0321C423
          • SetEvent.KERNEL32(?), ref: 0321C430
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: CancelEventExchangeInterlockedclosesocketsetsockopt
          • String ID:
          • API String ID: 1486965892-0
          • Opcode ID: 26850e3f37836a23cd280a46a5df586fd78fae97c31134a331cc5ecf0b9fb0ef
          • Instruction ID: 28e7929d03a03d2bbcac736d1169bc240e168d1a4153e2ef8b8c6d33da82bfc6
          • Opcode Fuzzy Hash: 26850e3f37836a23cd280a46a5df586fd78fae97c31134a331cc5ecf0b9fb0ef
          • Instruction Fuzzy Hash: DBF01D75204701EFD7649B60E94CF97B7A8AF49711F10CA1DFAEA86284CF70B4488B66
          APIs
            • Part of subcall function 0321B270: LoadLibraryW.KERNEL32 ref: 0321B2ED
            • Part of subcall function 0321B270: LoadLibraryW.KERNEL32(00000000,InitializeCriticalSection), ref: 0321B2FB
            • Part of subcall function 0321B270: GetProcAddress.KERNEL32(00000000), ref: 0321B2FE
            • Part of subcall function 0321B270: FreeLibrary.KERNEL32(00000000), ref: 0321B30B
          • WSAStartup.WS2_32(00000202,?), ref: 0321B7ED
          • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 0321B7FB
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: Library$Load$AddressCreateEventFreeProcStartup
          • String ID: H$P
          • API String ID: 358607388-457946424
          • Opcode ID: e3b4b535f60187b94c44f1f7c0f274bebaaa3deef5b8f4838b9b6d2da45476c4
          • Instruction ID: 8698d7591f50f8faf185df383f1a8d0f0698634e146303da4b8be84216b7fe87
          • Opcode Fuzzy Hash: e3b4b535f60187b94c44f1f7c0f274bebaaa3deef5b8f4838b9b6d2da45476c4
          • Instruction Fuzzy Hash: 01216D34119780DED321DB68C504B9BFBE4ABA6B10F04895DE5ED4B6C1C7B86008CBA3
          APIs
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(kernel32.dll,OutputDebugStringA,?,?,032215B4), ref: 0321EBA2
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EBAB
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatus,?,?,032215B4), ref: 0321EBBC
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EBBF
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(kernel32.dll,DeviceIoControl,?,?,032215B4), ref: 0321EBD0
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EBD3
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(kernel32.dll,GetSystemInfo,?,?,032215B4), ref: 0321EBE4
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EBE7
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(kernel32.dll,GetVersionExW,?,?,032215B4), ref: 0321EBF8
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EBFB
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(wininet.dll,InternetQueryOptionA,?,?,032215B4), ref: 0321EC0C
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EC0F
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(USER32.dll,PostThreadMessageW,?,?,032215B4), ref: 0321EC20
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EC23
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(USER32.dll,GetInputState,?,?,032215B4), ref: 0321EC34
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EC37
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(USER32.dll,OpenDesktopW,?,?,032215B4), ref: 0321EC48
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EC4B
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(USER32.dll,GetUserObjectInformationW,?,?,032215B4), ref: 0321EC5C
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EC5F
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(USER32.dll,CloseDesktop,?,?,032215B4), ref: 0321EC70
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EC73
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(USER32.dll,wsprintfW,?,?,032215B4), ref: 0321EC84
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EC87
            • Part of subcall function 0321EB90: LoadLibraryA.KERNEL32(USER32.dll,CharNextW,?,?,032215B4), ref: 0321EC98
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321EC9B
            • Part of subcall function 0321EB90: LoadLibraryW.KERNEL32(gdi32.dll,CreateCompatibleBitmap,?,?,032215B4), ref: 0321ECB2
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321ECB5
            • Part of subcall function 0321EB90: LoadLibraryW.KERNEL32(gdi32.dll,GetDIBits,?,?,032215B4), ref: 0321ECC6
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321ECC9
            • Part of subcall function 0321EB90: LoadLibraryW.KERNEL32(gdi32.dll,BitBlt,?,?,032215B4), ref: 0321ECDA
            • Part of subcall function 0321EB90: GetProcAddress.KERNEL32(00000000), ref: 0321ECDD
          • CreateThread.KERNEL32(00000000,00000000,03221026,00000000,00000000,00000000), ref: 032215C0
            • Part of subcall function 03221501: VirtualQuery.KERNEL32(delloader,00000000,0000001C), ref: 03221523
            • Part of subcall function 03221501: VirtualProtect.KERNEL32(00000000,?,00000020,?), ref: 0322153B
            • Part of subcall function 03221501: GetModuleHandleA.KERNEL32(kernel32.dll,HeapDestroy), ref: 0322154F
            • Part of subcall function 03221501: GetProcAddress.KERNEL32(00000000), ref: 03221556
            • Part of subcall function 03221501: VirtualProtect.KERNEL32(00000000,00000003,00000040,?), ref: 0322156A
            • Part of subcall function 03221501: FreeLibrary.KERNEL32(?), ref: 0322157E
            • Part of subcall function 03221501: VirtualProtect.KERNEL32(00000000,?,00000040,?), ref: 03221599
          • GetWindowsDirectoryA.KERNEL32(?,?), ref: 032215F4
          • DeleteFileA.KERNEL32(?), ref: 03221616
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: AddressLibraryProc$Load$Virtual$Protect$CreateDeleteDirectoryFileFreeHandleModuleQueryThreadWindows
          • String ID: \up.bak
          • API String ID: 804718740-1981547893
          • Opcode ID: a30b85da8280c67ed483ed8a5c92cbed873aa5f511e4a5cbe5dca5a5bb745b1a
          • Instruction ID: 406b92fb6657b8ef63de765b02705d824c29496c1b97fef241b294fcd7fd71d2
          • Opcode Fuzzy Hash: a30b85da8280c67ed483ed8a5c92cbed873aa5f511e4a5cbe5dca5a5bb745b1a
          • Instruction Fuzzy Hash: B901D6B591021CBFD794EA78DD86ADB3BACEB14350F0044A0FB05E6180CA705E944AA0
          APIs
          • gethostname.WS2_32(00000000,00000032), ref: 03220A8F
          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000032,?,00000032), ref: 03220AA7
          • lstrlenW.KERNEL32(?), ref: 03220AAE
          Strings
          • connected: safebrow.flnet.org:443, xrefs: 03220A73
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: ByteCharMultiWidegethostnamelstrlen
          • String ID: connected: safebrow.flnet.org:443
          • API String ID: 2386635775-2118524957
          • Opcode ID: 9efea5fb3e62ce0e0e4e6429c2022203720dbfdc563bdb44765e21c89c7d13a5
          • Instruction ID: 14d324f014acef084501996da1d444f24121ef2739e5b4f6faf8c6b7bd057abd
          • Opcode Fuzzy Hash: 9efea5fb3e62ce0e0e4e6429c2022203720dbfdc563bdb44765e21c89c7d13a5
          • Instruction Fuzzy Hash: B5E0E536244340BBE314E654DC0DF8BBBA8ABE5740F408918FB45961D4DAB0A604C692
          APIs
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: _ftolceil
          • String ID:
          • API String ID: 2006273141-0
          • Opcode ID: d7426a98daf5082c43a0a7d3f440470cdc0060d5b82df21ba7b7caa6f88693ea
          • Instruction ID: 11182f4e1d6f45d4822cb6e9a95e6a42aa720b31d635523e4d7c0a297de2334d
          • Opcode Fuzzy Hash: d7426a98daf5082c43a0a7d3f440470cdc0060d5b82df21ba7b7caa6f88693ea
          • Instruction Fuzzy Hash: 3E11D2756043049FD700EF29BD8562ABBE4EB94752F00C42DEE058B344EE759868CAA2
          APIs
          • LoadLibraryA.KERNEL32(?), ref: 03227AA5
          • GetModuleHandleA.KERNEL32(00000000), ref: 03227AB0
          • GetProcAddress.KERNEL32(00000000,?), ref: 03227AD9
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: AddressHandleLibraryLoadModuleProc
          • String ID:
          • API String ID: 310444273-0
          • Opcode ID: 61017a9e69c24389277f8eb6241be448505b0313d4cff0bcfe3938b552bac769
          • Instruction ID: de2bfc90b7996807db7ab706f4b2cc69c3563b3e8fd2acbdfaf3422b98f65ea9
          • Opcode Fuzzy Hash: 61017a9e69c24389277f8eb6241be448505b0313d4cff0bcfe3938b552bac769
          • Instruction Fuzzy Hash: 2B3104316182529FD714CE2CDC807A6BBE4EF84710F19487CE981CB242DB72E589C7A1
          APIs
          • send.WS2_32(?,00000005,?,00000000), ref: 0321C601
          • Sleep.KERNEL32(0000000A), ref: 0321C62E
          • send.WS2_32(?,00000005,?,00000000), ref: 0321C64B
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: send$Sleep
          • String ID:
          • API String ID: 3329562092-0
          • Opcode ID: fb331de8eaeb611873f5117db99bcfd7d083a19225df43cb58b87cd0d8711e52
          • Instruction ID: 9b6df22adc44787e895b2f1778d14c05c6b6664c4f354cd9407578a03ffbd662
          • Opcode Fuzzy Hash: fb331de8eaeb611873f5117db99bcfd7d083a19225df43cb58b87cd0d8711e52
          • Instruction Fuzzy Hash: D91126366643625BC324CE59DA88B5BF7D9EBE5B10F04482DF54497280C6B09895CBA2
          APIs
          • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?,?,?,0322133F), ref: 03221704
            • Part of subcall function 03221630: CreateThread.KERNEL32(?,?,?,?,?,?), ref: 0322164E
          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,00000000), ref: 0322173D
          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 03221748
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: Create$CloseEventHandleObjectSingleThreadWait
          • String ID:
          • API String ID: 3360349984-0
          • Opcode ID: 30263ca343105dba3a8d65b4186df6d7673f6a83360836149ebe5f78465afcee
          • Instruction ID: 95fd3bb724e1e5d99a2868a16e4e698ba1417015f1267ec92a9cf5c5e38addb4
          • Opcode Fuzzy Hash: 30263ca343105dba3a8d65b4186df6d7673f6a83360836149ebe5f78465afcee
          • Instruction Fuzzy Hash: 8F01EC74608351AFD300DF18DC85F2BBBE4BB98754F444A4CF9A8A7381D674E9148B96
          APIs
          • select.WS2_32(00000000,?,00000000,00000000,00000000), ref: 0321C0EE
          • recv.WS2_32(?,?,00002000,00000000), ref: 0321C122
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: recvselect
          • String ID:
          • API String ID: 741273618-0
          • Opcode ID: 2d0cf4f355be8ccf437413d7bd867ba0c9ea76f40f369d44217125d3814a73c6
          • Instruction ID: 46e602f70f30550b0c726c5f7815988db91eeab8f97a5358a10edb937e9c91ab
          • Opcode Fuzzy Hash: 2d0cf4f355be8ccf437413d7bd867ba0c9ea76f40f369d44217125d3814a73c6
          • Instruction Fuzzy Hash: DE1129363D430567DB60DA68DD84BEBB3D5AFA5B20F400A39FB14DB2C1CB71549983A2
          APIs
          • CreateThread.KERNEL32(?,?,?,?,?,?), ref: 0322164E
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: CreateThread
          • String ID:
          • API String ID: 2422867632-0
          • Opcode ID: c6f23739ad192ec9b390b4a386c97417ea26ddf0f3e8b1ccf9d995489e724ea1
          • Instruction ID: 8c872aea37c18799d6d5733a629646b8e6239a16a26504e4bdbc7c2508c9a684
          • Opcode Fuzzy Hash: c6f23739ad192ec9b390b4a386c97417ea26ddf0f3e8b1ccf9d995489e724ea1
          • Instruction Fuzzy Hash: A4D0BCB5618382AF9704DF59D994D3BB7E9BBD8600F148D4CB69583254D730E809CB62
          APIs
          • CreateThread.KERNEL32(00000000,00000000,04922B20,00000000,00000000,?), ref: 04922C29
          Memory Dump Source
          • Source File: 00000011.00000002.4490119108.0000000004920000.00000040.00001000.00020000.00000000.sdmp, Offset: 04920000, based on PE: true
          • Associated: 00000011.00000002.4490119108.0000000004926000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_4920000_rundll32.jbxd
          Similarity
          • API ID: CreateThread
          • String ID:
          • API String ID: 2422867632-0
          • Opcode ID: 4dd6e2920820454c1ff67891b3f3ad4507dd9c135a8cde6ca24219178f3cd4ff
          • Instruction ID: b26a86c032bc3a16ea23ace865dd2a364c417fa12a5fc6e62ddf5ed51d376d8b
          • Opcode Fuzzy Hash: 4dd6e2920820454c1ff67891b3f3ad4507dd9c135a8cde6ca24219178f3cd4ff
          • Instruction Fuzzy Hash: EED01238388315BBE720CB00CD02F5A7B98E7A4B82F1048A5B248A90D8D6A0F8808B19
          APIs
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: calloc
          • String ID:
          • API String ID: 2635317215-0
          • Opcode ID: a56f21f6a3eb65668459b43a73b6148e26709e4f734da3901a1dc33146c2d934
          • Instruction ID: e902a14de3305b0dc04d43e900177a52aff8b1dfd9cfb275c258bc8c7b6a24a6
          • Opcode Fuzzy Hash: a56f21f6a3eb65668459b43a73b6148e26709e4f734da3901a1dc33146c2d934
          • Instruction Fuzzy Hash: D4B012FD5283007FC604EB14EC40C6BB798EBC4200F80890CBD4842200D535D84CC623
          APIs
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: free
          • String ID:
          • API String ID: 1294909896-0
          • Opcode ID: 37e88ff3b73e9709136fdbeb37fc0dd67003950041c441504840946ccd144518
          • Instruction ID: f730cf08226cb3f65a76646a80a135aa104047e5447274bc05ac1b970c694e68
          • Opcode Fuzzy Hash: 37e88ff3b73e9709136fdbeb37fc0dd67003950041c441504840946ccd144518
          • Instruction Fuzzy Hash: E6A022AA008300328A20E2ACC800C0A2B880A80000B200808F0028E000CA30C8C08280
          APIs
          • lstrlenW.KERNEL32(?,?,?,?), ref: 0321D5A8
          • wsprintfW.USER32 ref: 0321D5DC
          • FindFirstFileW.KERNEL32(?,?), ref: 0321D5F2
          • wsprintfW.USER32 ref: 0321D632
          • wsprintfW.USER32 ref: 0321D657
          • wcslen.MSVCRT ref: 0321D679
          • ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z.MSVCP60(00000000,00000001), ref: 0321D68B
          • ??2@YAPAXI@Z.MSVCRT(00000018), ref: 0321D6C6
          • ??3@YAXPAX@Z.MSVCRT(?), ref: 0321D723
          • FindNextFileW.KERNEL32(?,?), ref: 0321D74C
          • FindClose.KERNEL32(?), ref: 0321D75F
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: Findwsprintf$File$??2@??3@CloseFirstG@2@@std@@G@std@@Grow@?$basic_string@NextU?$char_traits@V?$allocator@lstrlenwcslen
          • String ID: %s%s%s$%s%s*.*$.
          • API String ID: 315284584-1343461528
          • Opcode ID: 19b8ab0202f737932c3fc4eae3b397801dd2e4193846f42ba79fb9ff61887fdb
          • Instruction ID: 39df95147de8a853ebd88fb23342332b7e95683876329a4ee82737e3c590a940
          • Opcode Fuzzy Hash: 19b8ab0202f737932c3fc4eae3b397801dd2e4193846f42ba79fb9ff61887fdb
          • Instruction Fuzzy Hash: 6D51D3B2428380DFC320DF18D988AABBBE8BFE8314F444A1CF59997245D774A555CB92
          APIs
          • LocalAlloc.KERNEL32(00000040,00002800), ref: 0321CFC3
          • wsprintfW.USER32 ref: 0321CFE0
          • FindFirstFileW.KERNEL32(?,?), ref: 0321CFF6
          • LocalReAlloc.KERNEL32(00000000,000025D0,00000042), ref: 0321D047
          • lstrcmpW.KERNEL32(?,032114C4), ref: 0321D059
          • lstrcmpW.KERNEL32(?,032114BC), ref: 0321D06D
          • lstrlenW.KERNEL32(?), ref: 0321D087
          • FindNextFileW.KERNEL32(00000000,?), ref: 0321D0E8
          • LocalFree.KERNEL32(00000000), ref: 0321D104
          • FindClose.KERNEL32(00000000), ref: 0321D10B
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: FindLocal$AllocFilelstrcmp$CloseFirstFreeNextlstrlenwsprintf
          • String ID: %s\*.*$h
          • API String ID: 2194070967-1052742963
          • Opcode ID: 64d1c5612ea0188759b48feb78a0d8bf764aeaaeee431e6b3f01de9fceb3acbf
          • Instruction ID: 536444dea9c3e0b4a2f48bd0bbabe099591736c641571ac50d4f18d4ecbae51d
          • Opcode Fuzzy Hash: 64d1c5612ea0188759b48feb78a0d8bf764aeaaeee431e6b3f01de9fceb3acbf
          • Instruction Fuzzy Hash: 75412671A043449FC310EF64E988B5FBBE4FBA4300F04851DFA4587285DB79A519C7A5
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: Find$Filewsprintf$CloseDirectoryFirstNextRemove
          • String ID: %s\%s$%s\*.*$.
          • API String ID: 2470771279-1471744235
          • Opcode ID: 75292fb4decfc66809663b76687862f5b7211d23db8c73ca1916f9c1e8907378
          • Instruction ID: 144291323a88a553c81b58ec11febbe2f690ebb6972f60eda70bb6abb93c9ae3
          • Opcode Fuzzy Hash: 75292fb4decfc66809663b76687862f5b7211d23db8c73ca1916f9c1e8907378
          • Instruction Fuzzy Hash: A721F372514344AFD360EB65ED8CEFF77ECEBE4710F408919EA5882044EB759168C7A2
          APIs
          • GetCurrentProcess.KERNEL32(00000028), ref: 0321E6B0
          • OpenProcessToken.ADVAPI32(00000000), ref: 0321E6B7
          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 0321E6E5
          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,00000010,00000000,00000000), ref: 0321E6FD
          • GetLastError.KERNEL32 ref: 0321E703
          • CloseHandle.KERNEL32(?), ref: 0321E714
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue
          • String ID:
          • API String ID: 3398352648-0
          • Opcode ID: 4a22e7ef00b47e71faabf7f413e879a97c314af3acccd7b7afa5012e5692a20d
          • Instruction ID: abc68b538f38ec93089fb0fa52233d0583bd1ebc9a982bb46f7afc660ea22160
          • Opcode Fuzzy Hash: 4a22e7ef00b47e71faabf7f413e879a97c314af3acccd7b7afa5012e5692a20d
          • Instruction Fuzzy Hash: 760171756143107BD324EB64EC4DFAB77A8BB84B00F44891CFA86C6280D774E9448B96
          APIs
          • FindFirstFileW.KERNEL32(00000021,?,00000000,00000001,00000021), ref: 0321D96F
          • FindClose.KERNEL32(00000000), ref: 0321D9E9
          • CreateFileW.KERNEL32(00000021,40000000,00000002,00000000,00000002,00000080,00000000), ref: 0321DA01
          • CloseHandle.KERNEL32(00000000), ref: 0321DA2B
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: CloseFileFind$CreateFirstHandle
          • String ID: p
          • API String ID: 3283578348-2181537457
          • Opcode ID: c15340017b49c031fbb12bbda25e7ec60984481305e24678ce3dd4a6aac14717
          • Instruction ID: 78e9c6c880cbb008a74d8e852ee8ebef69c8c3671e04fe4932474e88158aa9f2
          • Opcode Fuzzy Hash: c15340017b49c031fbb12bbda25e7ec60984481305e24678ce3dd4a6aac14717
          • Instruction Fuzzy Hash: CC314975C28312DBD724DF18DE4977AB7D4ABD4320F18863EF8999B3C0C67898948782
          APIs
          • lstrcpyW.KERNEL32(00000021,?,?,00000001), ref: 0321D8A5
            • Part of subcall function 0321C9F0: lstrlenW.KERNEL32(?), ref: 0321CA21
            • Part of subcall function 0321C9F0: malloc.MSVCRT ref: 0321CA2C
            • Part of subcall function 0321C9F0: lstrcpyW.KERNEL32(00000000,?), ref: 0321CA44
            • Part of subcall function 0321C9F0: CharNextW.USER32(00000000), ref: 0321CA78
            • Part of subcall function 0321C9F0: CharNextW.USER32(00000000), ref: 0321CA9D
            • Part of subcall function 0321C9F0: GetFileAttributesW.KERNEL32(00000000), ref: 0321CAEE
            • Part of subcall function 0321C9F0: CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0321CAFE
            • Part of subcall function 0321C9F0: GetLastError.KERNEL32 ref: 0321CB08
            • Part of subcall function 0321C9F0: free.MSVCRT ref: 0321CB1D
          • FindFirstFileW.KERNEL32(00000021,?,?,00000001), ref: 0321D8CC
          • FindClose.KERNEL32(00000000,0000006D,?,00000001), ref: 0321D8F5
          • FindClose.KERNEL32(00000000,?,00000001), ref: 0321D90F
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: Find$CharCloseFileNextlstrcpy$AttributesCreateDirectoryErrorFirstLastfreelstrlenmalloc
          • String ID:
          • API String ID: 3327165776-0
          • Opcode ID: ebadec9f47c884c9009338529db81791a1d731d0cb8ce95ffd2315356f338ee8
          • Instruction ID: de058bb1461f034ef777dfe0673ee5f602e3c31df6429e3c7cdd9fed40928b58
          • Opcode Fuzzy Hash: ebadec9f47c884c9009338529db81791a1d731d0cb8ce95ffd2315356f338ee8
          • Instruction Fuzzy Hash: C2014E752102109BDB10E618F98CABEF3EDEBE4320F44462AEA16C3280DF3874698761
          APIs
          • _wcsrev.MSVCRT(360tray.exe,?,?,7595F860,03220D13,?,?,?,?,?,?,?,?,?,?,?), ref: 0322074C
            • Part of subcall function 03221760: LoadLibraryW.KERNEL32 ref: 032217D0
            • Part of subcall function 03221760: LoadLibraryW.KERNEL32(?,?), ref: 0322182B
            • Part of subcall function 03221760: GetProcAddress.KERNEL32(00000000), ref: 03221834
            • Part of subcall function 03221760: LoadLibraryW.KERNEL32(00000032,?), ref: 0322188B
            • Part of subcall function 03221760: GetProcAddress.KERNEL32(00000000), ref: 0322188E
            • Part of subcall function 03221760: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 03221897
            • Part of subcall function 03221760: lstrcmpiW.KERNEL32(?,?), ref: 032218C3
          • lstrcatW.KERNEL32(NotFound,360,7595F860,03220D13,?,?,?,?,?,?,?,?,?,?,?), ref: 03220773
          • lstrcatW.KERNEL32(NotFound,032113CC,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0322077F
            • Part of subcall function 03221760: CloseHandle.KERNEL32(00000000), ref: 032218DA
          • _wcsrev.MSVCRT(avp.exe,7595F860,03220D13,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 03220786
          • lstrcatW.KERNEL32(NotFound,kaba), ref: 032207A5
          • lstrcatW.KERNEL32(NotFound,032113CC), ref: 032207B1
          • _wcsrev.MSVCRT(kvmonxp.exe,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 032207B8
          • lstrcatW.KERNEL32(NotFound,jiangmi), ref: 032207D7
          • lstrcatW.KERNEL32(NotFound,032113CC), ref: 032207E3
          • _wcsrev.MSVCRT(ravmond.exe), ref: 032207EA
          • lstrcatW.KERNEL32(NotFound,rixing), ref: 03220809
          • lstrcatW.KERNEL32(NotFound,032113CC), ref: 03220815
          • _wcsrev.MSVCRT(360sd.exe), ref: 0322081C
          • lstrcatW.KERNEL32(NotFound,360sd), ref: 0322083B
          • lstrcatW.KERNEL32(NotFound,032113CC), ref: 03220847
          • _wcsrev.MSVCRT(mcshield.exe), ref: 0322084E
          • lstrcatW.KERNEL32(NotFound,macfee), ref: 0322086D
          • lstrcatW.KERNEL32(NotFound,032113CC), ref: 03220879
          • _wcsrev.MSVCRT(egui.exe), ref: 03220880
          • lstrcatW.KERNEL32(NotFound,NOD32), ref: 0322089F
          • lstrcatW.KERNEL32(NotFound,032113CC), ref: 032208AB
          • _wcsrev.MSVCRT(kxetray.exe), ref: 032208B2
          • lstrcatW.KERNEL32(NotFound,jinshan), ref: 032208D1
          • lstrcatW.KERNEL32(NotFound,032113CC), ref: 032208DD
          • _wcsrev.MSVCRT(knsdtray.exe), ref: 032208E4
          • lstrcatW.KERNEL32(NotFound,kenu), ref: 03220903
          • lstrcatW.KERNEL32(NotFound,032113CC), ref: 0322090F
          • _wcsrev.MSVCRT(tmbmsrv.exe), ref: 03220916
          • lstrcatW.KERNEL32(NotFound,qushi), ref: 03220935
          • lstrcatW.KERNEL32(NotFound,032113CC), ref: 03220941
          • _wcsrev.MSVCRT(avcenter.exe), ref: 03220948
          • lstrcatW.KERNEL32(NotFound,avira), ref: 03220967
          • lstrcatW.KERNEL32(NotFound,032113CC), ref: 03220973
          • _wcsrev.MSVCRT(ashdisp.exe), ref: 0322097A
          • lstrcatW.KERNEL32(NotFound,avast), ref: 03220999
          • lstrcatW.KERNEL32(NotFound,032113CC), ref: 032209A5
          • wcsstr.MSVCRT ref: 032209B1
          • lstrcatW.KERNEL32(NotFound,NotFound), ref: 032209C8
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: lstrcat$_wcsrev$LibraryLoad$AddressProc$CloseCreateHandleSnapshotToolhelp32lstrcmpiwcsstr
          • String ID: 360$360sd$360sd.exe$360tray.exe$NOD32$NotFound$NotFound$ashdisp.exe$avast$avcenter.exe$avira$avp.exe$egui.exe$jiangmi$jinshan$kaba$kenu$knsdtray.exe$kvmonxp.exe$kxetray.exe$macfee$mcshield.exe$qushi$ravmond.exe$rixing$tmbmsrv.exe
          • API String ID: 1578094470-620590891
          • Opcode ID: 61f01cacabb9e880923bbe221aeea3f04dd8acecb772dbfe876c7312a478fc62
          • Instruction ID: ae866c51c7e56882b42a6419f24466220422e57eeb863ac9e9db48f6d9d6127d
          • Opcode Fuzzy Hash: 61f01cacabb9e880923bbe221aeea3f04dd8acecb772dbfe876c7312a478fc62
          • Instruction Fuzzy Hash: 35510AB4FB03297DD510F6726FCEE2F2DC48860D96B044016F928A1907DFA6A5F0C9A2
          APIs
            • Part of subcall function 0321C3D0: setsockopt.WS2_32(?,0000FFFF,00000080,00000000,00000004), ref: 0321C3FA
            • Part of subcall function 0321C3D0: CancelIo.KERNEL32(?), ref: 0321C407
            • Part of subcall function 0321C3D0: InterlockedExchange.KERNEL32(?,00000000), ref: 0321C416
            • Part of subcall function 0321C3D0: closesocket.WS2_32(?), ref: 0321C423
            • Part of subcall function 0321C3D0: SetEvent.KERNEL32(?), ref: 0321C430
          • ResetEvent.KERNEL32(?,00000000,?,?,?,00000000,03227DA0,000000FF,?,0321BFDE,03228D88,?,?), ref: 0321BBAC
          • socket.WS2_32 ref: 0321BBBF
          • InternetQueryOptionA.WININET(00000000,00000026,00000000,00001000), ref: 0321BC3D
          • strchr.MSVCRT ref: 0321BC61
          • strncpy.MSVCRT ref: 0321BC90
          • atoi.MSVCRT(?), ref: 0321BCCD
          • strchr.MSVCRT ref: 0321BCFD
          • strncpy.MSVCRT ref: 0321BD26
          • atoi.MSVCRT(?), ref: 0321BD57
          • gethostbyname.WS2_32(?), ref: 0321BD71
          • htons.WS2_32 ref: 0321BD88
          • connect.WS2_32(?,00000002,00000010), ref: 0321BDA9
          • sprintf.MSVCRT ref: 0321BDEF
          • OutputDebugStringA.KERNEL32(?), ref: 0321BDFF
          • send.WS2_32(?,?,?,00000000), ref: 0321BE26
          • select.WS2_32(00000000,?,00000000,00000000,00000000), ref: 0321BE8F
          • closesocket.WS2_32(?), ref: 0321BEA0
          • recv.WS2_32(?,?,00000258,00000000), ref: 0321BED0
          • strstr.MSVCRT ref: 0321BEE2
          Strings
          • CONNECT , xrefs: 0321BDDE
          • Connection established, xrefs: 0321BEDC
          • HTTP/1.1Accept: */*Content-Type: text/htmlProxy-Connection: Keep-AliveContent-length: 0, xrefs: 0321BDD6
          • %s%s:%d%s, xrefs: 0321BDE9
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: Eventatoiclosesocketstrchrstrncpy$CancelDebugExchangeInterlockedInternetOptionOutputQueryResetStringconnectgethostbynamehtonsrecvselectsendsetsockoptsocketsprintfstrstr
          • String ID: HTTP/1.1Accept: */*Content-Type: text/htmlProxy-Connection: Keep-AliveContent-length: 0$%s%s:%d%s$CONNECT $Connection established
          • API String ID: 2042499094-4200791392
          • Opcode ID: 65c2c1984077ca80b17408bebab18d1a055f562ca797cc46ce5e79a0a04c600e
          • Instruction ID: 2f8063a5509fa96c118787101dde31f358c3ddc0b99cbc2286db7676635ac313
          • Opcode Fuzzy Hash: 65c2c1984077ca80b17408bebab18d1a055f562ca797cc46ce5e79a0a04c600e
          • Instruction Fuzzy Hash: BCA1F7359102049FD728CA78CD88BAEB7F9FB95710F10865DF62AD32C1DFB1AA518B50
          APIs
          • RegOpenKeyExW.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Internet Settings,00000000,00000001,?), ref: 0321B998
          • RegQueryValueExA.ADVAPI32(?,AutoConfigURL,00000000,?,00000000,?), ref: 0321B9CC
          • strncpy.MSVCRT ref: 0321B9E9
          • RegCloseKey.ADVAPI32(?,00000000,?,?), ref: 0321B9F7
          • strstr.MSVCRT ref: 0321BA07
          • InternetOpenW.WININET(IE6.0,00000000,00000000,00000000,00000000), ref: 0321BA25
          • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 0321BA3F
          • malloc.MSVCRT ref: 0321BA50
          • InternetReadFile.WININET(00000000,00000000,0000C440,?), ref: 0321BA77
          • InternetCloseHandle.WININET(00000000), ref: 0321BA80
          • InternetCloseHandle.WININET(00000000), ref: 0321BA87
          • free.MSVCRT ref: 0321BA96
          • _strupr.MSVCRT ref: 0321BAB2
          • strstr.MSVCRT ref: 0321BADF
          • strchr.MSVCRT ref: 0321BAF0
          • strstr.MSVCRT ref: 0321BB43
          • free.MSVCRT ref: 0321BB53
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: Internet$CloseOpenstrstr$Handlefree$FileQueryReadValue_struprmallocstrchrstrncpy
          • String ID: "PROXY $AutoConfigURL$IE6.0$Software\Microsoft\Windows\CurrentVersion\Internet Settings$pac
          • API String ID: 3082613322-1950214214
          • Opcode ID: cf9d75c0cfddbb47b737a4a262a32490a1d9004270569f7f424e70f7aa81f957
          • Instruction ID: 1158a71f0e11fddd0969a9e02bc2266a20ba77b5f958df2bed33bc704b8e541b
          • Opcode Fuzzy Hash: cf9d75c0cfddbb47b737a4a262a32490a1d9004270569f7f424e70f7aa81f957
          • Instruction Fuzzy Hash: 3051EB352143467FD320DB24DD09BEBB7E8BBE8700F048428FB85D7284DBB1A56487A2
          APIs
          • wcsrchr.MSVCRT ref: 0321CBD7
          • lstrcpyW.KERNEL32(?,00000000), ref: 0321CBEE
          • LoadLibraryW.KERNEL32(ADVAPI32.dll), ref: 0321CBF9
          • GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 0321CC0D
          • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 0321CC17
          • GetProcAddress.KERNEL32(00000000,RegQueryValueW), ref: 0321CC21
          • wsprintfW.USER32 ref: 0321CC81
          • wcsstr.MSVCRT ref: 0321CCE9
          • wcsstr.MSVCRT ref: 0321CCFC
          • lstrcatW.KERNEL32(?,032113CC), ref: 0321CD15
          • lstrcatW.KERNEL32(?,?), ref: 0321CD24
          • lstrcpyW.KERNEL32(00000000,?,?,?), ref: 0321CD31
          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 0321CD7F
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$lstrcatlstrcpywcsstr$CreateLibraryLoadProcesswcsrchrwsprintf
          • String ID: "%1$%s\shell\open\command$ADVAPI32.dll$D$RegCloseKey$RegOpenKeyExW$RegQueryValueW$WinSta0\Default
          • API String ID: 4134440835-86666626
          • Opcode ID: d7cc28f67ac874fff0c0949a738c06c756a90b61eaaf6d6b9da25c57934b663e
          • Instruction ID: 2bb6e50f7e84aa95f1e8e007a659aca239372611a04af49918644de1ed77c91c
          • Opcode Fuzzy Hash: d7cc28f67ac874fff0c0949a738c06c756a90b61eaaf6d6b9da25c57934b663e
          • Instruction Fuzzy Hash: 9251C471258346AFE710DB61DE44FABB7EDEFD4700F00491DB64493144EAB1E928CBA2
          APIs
          • LoadLibraryW.KERNEL32(kernel32.dll,GetVolumeInformationA), ref: 0321CDBE
          • GetProcAddress.KERNEL32(00000000), ref: 0321CDC7
          • LoadLibraryW.KERNEL32(kernel32.dll,GetLogicalDriveStringsA), ref: 0321CDD7
          • GetProcAddress.KERNEL32(00000000), ref: 0321CDDA
          • LoadLibraryW.KERNEL32(kernel32.dll,GetDriveTypeA), ref: 0321CDE8
          • GetProcAddress.KERNEL32(00000000), ref: 0321CDEB
          • LoadLibraryW.KERNEL32(kernel32.dll,lstrlenA), ref: 0321CDFB
          • GetProcAddress.KERNEL32(00000000), ref: 0321CDFE
          • SHGetFileInfo.SHELL32(?,00000080,?,000002DC,00000410), ref: 0321CE8B
          • GetDiskFreeSpaceExA.KERNEL32(00000001,?,?,00000000), ref: 0321CEC6
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: AddressLibraryLoadProc$DiskFileFreeInfoSpace
          • String ID: GetDriveTypeA$GetLogicalDriveStringsA$GetVolumeInformationA$g$kernel32.dll$lstrlenA
          • API String ID: 2694536233-2593926017
          • Opcode ID: c6944c48e645accc8c8706dcd6a5f2f3134e70f78cc69229379702ded96a6ee4
          • Instruction ID: 31640d0e2d7062b44be857746f7ccab4ce13ef55a5f0c74fdc0c2d2075c52429
          • Opcode Fuzzy Hash: c6944c48e645accc8c8706dcd6a5f2f3134e70f78cc69229379702ded96a6ee4
          • Instruction Fuzzy Hash: CE514B715083499FD724DF64C844A9FBBE9FFC8704F44492DF989A7201CB74AA45CB92
          APIs
          • LoadLibraryW.KERNEL32(ADVAPI32.dll), ref: 0321FF5F
          • GetProcAddress.KERNEL32(00000000,RegCreateKeyExW), ref: 0321FF73
          • GetProcAddress.KERNEL32(00000000,RegSetValueExW), ref: 0321FF7E
          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyW), ref: 0321FF89
          • GetProcAddress.KERNEL32(00000000,RegDeleteValueW), ref: 0321FF94
          • GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 0321FF9F
          • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 0321FFA9
          • lstrlenW.KERNEL32(?), ref: 03220040
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$LibraryLoadlstrlen
          • String ID: ADVAPI32.dll$RegCloseKey$RegCreateKeyExW$RegDeleteKeyW$RegDeleteValueW$RegOpenKeyExW$RegSetValueExW
          • API String ID: 1729337914-2216571892
          • Opcode ID: 05e16d86733e1fbfd3342b0440a1746241e805eade11064805b91b4c0015b9fc
          • Instruction ID: 050d963a552cfa1c95b0fac1649858a289ae0b7667658104bfefebb71b9ba09d
          • Opcode Fuzzy Hash: 05e16d86733e1fbfd3342b0440a1746241e805eade11064805b91b4c0015b9fc
          • Instruction Fuzzy Hash: E2515B71A50219BBEB10DF95DC85FEEBBBCEF58600F008105FA14A7241D7B5A9808BA0
          APIs
            • Part of subcall function 0321EA10: CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,0321E3DD,?,7591F550,0322114A,?), ref: 0321EA2E
          • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle,?), ref: 0322014B
          • GetProcAddress.KERNEL32(00000000), ref: 03220152
          • CreatePipe.KERNEL32 ref: 032201CA
          • CreatePipe.KERNEL32(000001D3,000001CF,?,00000000), ref: 032201FF
          • GetStartupInfoW.KERNEL32(0000000C), ref: 0322024D
          • GetSystemDirectoryW.KERNEL32 ref: 03220288
          • lstrcatW.KERNEL32(?,\cmd.e,?,?,?,?,?,?,?,?,?,?,?,00000118), ref: 0322029E
          • lstrcatW.KERNEL32(?,032121C0,?,?,?,?,?,?,?,?,?,?,?,00000118), ref: 032202AA
          • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000001,00000020,00000000,00000000,0000000C,?), ref: 032202CC
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: Create$Pipelstrcat$AddressDirectoryEventInfoLibraryLoadProcProcessStartupSystem
          • String ID: CloseHandle$D$\cmd.e$kernel32.dll$s
          • API String ID: 2063449080-2709968139
          • Opcode ID: 4892329a48551dff23808f5b4f4f66d6f6c4fc61ceba4342889eb09ef08435e1
          • Instruction ID: 55e4a983be59481674c3ce528b9b59da4863e7729a5a6e4f3fbe79504585b7ab
          • Opcode Fuzzy Hash: 4892329a48551dff23808f5b4f4f66d6f6c4fc61ceba4342889eb09ef08435e1
          • Instruction Fuzzy Hash: 6D718AB1604741AFD320DF65CC84B5BBBE8BFC8B00F10891DF69997290DBB4A5448F52
          APIs
          • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle,?,?,?,?,00000000,03227F38,000000FF,0321E225,?), ref: 032203C7
          • GetProcAddress.KERNEL32(00000000), ref: 032203CE
          • TerminateThread.KERNEL32(?,00000000,?,?,?,?,00000000,03227F38,000000FF,0321E225,?), ref: 032203E2
          • TerminateProcess.KERNEL32(?,00000000,?,?,?,?,00000000,03227F38,000000FF,0321E225,?), ref: 032203EA
          • TerminateThread.KERNEL32(?,00000000,?,?,?,?,00000000,03227F38,000000FF,0321E225,?), ref: 032203F6
          • WaitForSingleObject.KERNEL32(?,000007D0,?,?,?,?,00000000,03227F38,000000FF,0321E225,?), ref: 03220401
          • TerminateThread.KERNEL32(?,00000000,?,?,?,?,00000000,03227F38,000000FF,0321E225,?), ref: 0322040D
          • DisconnectNamedPipe.KERNEL32(?,?,?,?,?,00000000,03227F38,000000FF,0321E225,?), ref: 0322041D
          • DisconnectNamedPipe.KERNEL32(?,?,?,?,?,00000000,03227F38,000000FF,0321E225,?), ref: 03220427
          • DisconnectNamedPipe.KERNEL32(?,?,?,?,?,00000000,03227F38,000000FF,0321E225,?), ref: 03220431
          • DisconnectNamedPipe.KERNEL32(?,?,?,?,?,00000000,03227F38,000000FF,0321E225,?), ref: 0322043B
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: DisconnectNamedPipeTerminate$Thread$AddressLibraryLoadObjectProcProcessSingleWait
          • String ID: CloseHandle$kernel32.dll
          • API String ID: 2122371937-3978267401
          • Opcode ID: 1c9ea18902c83ccdca097eb98c5277846eac5cd5fc53e71e0f479eb0a0eef6ef
          • Instruction ID: 827c2fea49a13bbbc16c1f4d994eb8ccb6878926ca242bf68b3f8f86b0e255e1
          • Opcode Fuzzy Hash: 1c9ea18902c83ccdca097eb98c5277846eac5cd5fc53e71e0f479eb0a0eef6ef
          • Instruction Fuzzy Hash: 1E31DC71610740ABC620EF7ADD84F17F7E8BF98610F548A0DF65AD3690CA78F8458B64
          APIs
          • LoadLibraryW.KERNEL32 ref: 0321B2ED
          • LoadLibraryW.KERNEL32(00000000,InitializeCriticalSection), ref: 0321B2FB
          • GetProcAddress.KERNEL32(00000000), ref: 0321B2FE
          • FreeLibrary.KERNEL32(00000000), ref: 0321B30B
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: Library$Load$AddressFreeProc
          • String ID: .$2$3$InitializeCriticalSection$d$k$n$r
          • API String ID: 2632591731-2400524468
          • Opcode ID: 1af141faa4e038a15d1d66c89d59216f26ec2b087dce088c2dad45ba7f580b07
          • Instruction ID: 312fe618d79c1312ba1f03431031f1f4db647e9d57c146ff662b43ad9273bf20
          • Opcode Fuzzy Hash: 1af141faa4e038a15d1d66c89d59216f26ec2b087dce088c2dad45ba7f580b07
          • Instruction Fuzzy Hash: A621492152D3818FC311DFA5D84454ABBF1EF9A304F04989EE189CB222E3759618CB6B
          APIs
          • LoadLibraryW.KERNEL32 ref: 0321B2ED
          • LoadLibraryW.KERNEL32(00000000,InitializeCriticalSection), ref: 0321B2FB
          • GetProcAddress.KERNEL32(00000000), ref: 0321B2FE
          • FreeLibrary.KERNEL32(00000000), ref: 0321B30B
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: Library$Load$AddressFreeProc
          • String ID: .$2$3$InitializeCriticalSection$d$k$n$r
          • API String ID: 2632591731-2400524468
          • Opcode ID: a0a1fa54e545941c878fa80e4cdcd397b2006ab042d1f09854c9595a9cc6e06f
          • Instruction ID: 1fc4f47cb9ea80b3e0822bf5ab394366bd8c3c4746e691891337e2c706a357f9
          • Opcode Fuzzy Hash: a0a1fa54e545941c878fa80e4cdcd397b2006ab042d1f09854c9595a9cc6e06f
          • Instruction Fuzzy Hash: 641179645283419AC310EF65E80894BB7F5FFD8704F009D1EE59AC3221E7B59618CBAB
          APIs
          • InternetOpenW.WININET(Mozilla/4.0 (compatible),00000000,00000000,00000000,00000000), ref: 03221A46
          • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 03221A70
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: InternetOpen
          • String ID: MZ$Mozilla/4.0 (compatible)$c:\windows\httpd.exe
          • API String ID: 2038078732-2593800607
          • Opcode ID: dbd7a9cc84b2e255fe862c0e13ac35059bbc00b0fb4b9f576dafdbf15f4e609b
          • Instruction ID: ff6679bc143584a2da582199fd185f41596f551dc61534b7ae2fdbdb7b202be5
          • Opcode Fuzzy Hash: dbd7a9cc84b2e255fe862c0e13ac35059bbc00b0fb4b9f576dafdbf15f4e609b
          • Instruction Fuzzy Hash: E831AD32504351BBD220DF61EC88E9BBBFDFBC9B10F04891DF98582140D679A585C7A2
          APIs
          • WSAStartup.WS2_32(00000202,?), ref: 04921805
          • socket.WS2_32(00000002,00000001,00000006), ref: 04921819
          • htons.WS2_32 ref: 04921833
          • gethostbyname.WS2_32(0492117C), ref: 04921845
          • connect.WS2_32(00000000,00000002,00000010), ref: 04921866
          • closesocket.WS2_32(00000000), ref: 04921872
          • send.WS2_32(00000000,?,?,00000000), ref: 049218E1
          • recv.WS2_32(00000000,?,00000400,00000000), ref: 04921912
          • closesocket.WS2_32(00000000), ref: 04921919
          • WSACleanup.WS2_32 ref: 0492191F
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4490119108.0000000004920000.00000040.00001000.00020000.00000000.sdmp, Offset: 04920000, based on PE: true
          • Associated: 00000011.00000002.4490119108.0000000004926000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_4920000_rundll32.jbxd
          Similarity
          • API ID: closesocket$CleanupStartupconnectgethostbynamehtonsrecvsendsocket
          • String ID:
          • API String ID: 374537757-2344752452
          • Opcode ID: cb78d229bf217b24aed1217f819dd8b54d70f6c62d72e2d2543dbf3bdfde4995
          • Instruction ID: 9b83d023e7da8d657c52b972005febdafab5e3db34bbc80e839c6de7361b4b06
          • Opcode Fuzzy Hash: cb78d229bf217b24aed1217f819dd8b54d70f6c62d72e2d2543dbf3bdfde4995
          • Instruction Fuzzy Hash: 9731C634208660AFE3308B64DD4AFEB7B99FFC4351F004939F656961C4EB7559148B92
          APIs
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: atoi$DebugOutputString$strchrstrncpy$wcstombs
          • String ID:
          • API String ID: 2034632737-0
          • Opcode ID: cc869b41de660f348f39506ccb6416763b67d3d16b09da8c883b855efc85b467
          • Instruction ID: a78a12eeab4f218a02306eddca1193ad6638b0ad4369579bed6f8471cefbfc39
          • Opcode Fuzzy Hash: cc869b41de660f348f39506ccb6416763b67d3d16b09da8c883b855efc85b467
          • Instruction Fuzzy Hash: 8A51C3761002049FD354DB38ED449AAB7D8FB94320F558A3EFA62C32D1EE36E61D8B51
          APIs
          • GetSystemDirectoryW.KERNEL32(?,00000230), ref: 0321DFBF
          • lstrcatW.KERNEL32(?,\KB1035627.dat), ref: 0321DFCF
          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0321DFEA
          • GetFileSize.KERNEL32(00000000,00000000), ref: 0321DFFE
          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0321E007
          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0321E01A
          • mbstowcs.MSVCRT ref: 0321E058
          • ??3@YAXPAX@Z.MSVCRT(00000000,?), ref: 0321E079
          • CloseHandle.KERNEL32(00000000), ref: 0321E083
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: File$??2@??3@CloseCreateDirectoryHandleReadSizeSystemlstrcatmbstowcs
          • String ID: \KB1035627.dat
          • API String ID: 2808364958-3026359696
          • Opcode ID: 82753458180009b42c086cdfc32d3f7d5d658b08d6feaf15eb282a0f91439312
          • Instruction ID: 340cc3c837f6f3a4603aa431bfcd6c9853eb5bf56adf1374d40cf963ef701969
          • Opcode Fuzzy Hash: 82753458180009b42c086cdfc32d3f7d5d658b08d6feaf15eb282a0f91439312
          • Instruction Fuzzy Hash: 8421F775814254AFD320EB25AD4CFAB7BECDFD8740F004A29FA4996141EA316958C7A2
          APIs
          • LoadLibraryW.KERNEL32(user32.dll,00000000,00000000,?,?), ref: 0322191F
          • GetProcAddress.KERNEL32(00000000,SetThreadDesktop), ref: 03221933
          • GetProcAddress.KERNEL32(00000000,GetThreadDesktop), ref: 0322193D
          • GetCurrentThreadId.KERNEL32 ref: 03221941
          • GetUserObjectInformationW.USER32(?,00000002,?,00000100,?,?,?), ref: 03221965
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$CurrentInformationLibraryLoadObjectThreadUser
          • String ID: GetThreadDesktop$SetThreadDesktop$user32.dll
          • API String ID: 813802599-2914630085
          • Opcode ID: 62c1998cf9c47080be37552d0c4713b354e3bbea1ccbb68174378a616d61886e
          • Instruction ID: 46977bf188c85f8adeb2e6e83f4cf66130eb11f7afc91a0ee2f87d111c270601
          • Opcode Fuzzy Hash: 62c1998cf9c47080be37552d0c4713b354e3bbea1ccbb68174378a616d61886e
          • Instruction Fuzzy Hash: DB01F9327112146BD3207666BD8DFFB775CDBD1771F554022FF05C2100EA79749585A1
          APIs
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: CharNext$free$AttributesCreateDirectoryErrorFileLastlstrcpylstrlenmalloc
          • String ID:
          • API String ID: 3289936468-0
          • Opcode ID: de19600783ecf5fcd882f87a7e21d016f434b8eb7490422359b7fc4d057eac23
          • Instruction ID: a48d189e0f8922e2e0288212dc7b8717484cd9c0c0255f32518b42d7a53a283d
          • Opcode Fuzzy Hash: de19600783ecf5fcd882f87a7e21d016f434b8eb7490422359b7fc4d057eac23
          • Instruction Fuzzy Hash: 5441F579C90236DFCB31EF5899087AEBBF4FF24750F044269E951A3280E7345991CBA5
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: CancelEventExchangeInterlockedclosesocketsetsockopt
          • String ID: bad Allocate$bad buffer
          • API String ID: 1486965892-2913219628
          • Opcode ID: 9cb25211b02b01fde9da0e6359940f1bf362b876875d0b3498e1ab4060ad1fcc
          • Instruction ID: c45b4bf58edf51ccb61f295aca6d9ae79aa5dd8bcc7a6d8c90fcd83afdeab008
          • Opcode Fuzzy Hash: 9cb25211b02b01fde9da0e6359940f1bf362b876875d0b3498e1ab4060ad1fcc
          • Instruction Fuzzy Hash: 6051D979A60319ABCF14DF68CD90BAFB7F5EF58600F048128E905AF341DBB4A9948791
          APIs
          • LoadLibraryA.KERNEL32(OLEACC.DLL,76376A90,00000000,00000000,000000FF,?,0492270B,00000000), ref: 0492227E
          • RegisterClipboardFormatA.USER32(WM_HTML_GETOBJECT), ref: 0492229E
          • SendMessageTimeoutA.USER32(0492270B,00000000,00000000,00000000,00000002,000003E8,?), ref: 049222B3
          • GetProcAddress.KERNEL32(00000000,ObjectFromLresult), ref: 049222BF
          • FreeLibrary.KERNEL32(00000000,?,0492270B,00000000), ref: 0492234E
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4490119108.0000000004920000.00000040.00001000.00020000.00000000.sdmp, Offset: 04920000, based on PE: true
          • Associated: 00000011.00000002.4490119108.0000000004926000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_4920000_rundll32.jbxd
          Similarity
          • API ID: Library$AddressClipboardFormatFreeLoadMessageProcRegisterSendTimeout
          • String ID: OLEACC.DLL$ObjectFromLresult$WM_HTML_GETOBJECT
          • API String ID: 1721063476-842822840
          • Opcode ID: bb14e44ef9da29f5aad3e003bccdb026d5e2ec51287f544011feb3a8b62afd5d
          • Instruction ID: eee618693815ea65886720d260738c7fc94864ef5282b5c7495c4bb023a55332
          • Opcode Fuzzy Hash: bb14e44ef9da29f5aad3e003bccdb026d5e2ec51287f544011feb3a8b62afd5d
          • Instruction Fuzzy Hash: 02418271A00259EFCB10CF94C989AAEBBB8FF89710F1045B8F515E7244C735AE45CBA1
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: DebugExecExitOutputProcessStringsprintfstrstrwcstombs
          • String ID: cmd.exe /c %s$killme
          • API String ID: 587452862-2010447487
          • Opcode ID: 20be19f7618d8a7b0fa7bb5445c093da9f68a62ad582fa0aff1bd46b83350a75
          • Instruction ID: af87b115d62dad2280e0c749fada3fe44bab7667d7994847e5f81701e3a1ac38
          • Opcode Fuzzy Hash: 20be19f7618d8a7b0fa7bb5445c093da9f68a62ad582fa0aff1bd46b83350a75
          • Instruction Fuzzy Hash: 4B11CC31508781BFD364DB64ED08B9FB7E8BB94745F00882CF749C1184EBB5A224CB92
          APIs
          • LoadLibraryW.KERNEL32(ADVAPI32.dll,0321F9AF), ref: 0321F9D1
          • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 0321F9DF
          • GetProcAddress.KERNEL32(00000000,FreeSid), ref: 0321F9EA
          • GetProcessHeap.KERNEL32(00000000,?), ref: 0321FA04
          • HeapFree.KERNEL32(00000000), ref: 0321FA0B
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: AddressHeapProc$FreeLibraryLoadProcess
          • String ID: ADVAPI32.dll$FreeSid$RegCloseKey
          • API String ID: 2518100794-3304832375
          • Opcode ID: 95bff297f97da70ad3fb6e69abc40b84bfbe3876a285b4071272a7ca8d2fcc6c
          • Instruction ID: 7183805a9304eba30326a02ff232ebb9f0b9e4061cc579457020e0d044f59b38
          • Opcode Fuzzy Hash: 95bff297f97da70ad3fb6e69abc40b84bfbe3876a285b4071272a7ca8d2fcc6c
          • Instruction Fuzzy Hash: 91F05475A202196FDB10FBF6AF48E9EB7EC9F64A40B194125FA00F3105CE74AD608E70
          APIs
          • LoadLibraryW.KERNEL32(user32.dll,?,?,032216A9,00000000), ref: 032219B7
          • GetProcAddress.KERNEL32(00000000,OpenInputDesktop), ref: 032219C5
          • OpenDesktopW.USER32(?,00000000,00000000,400001CF), ref: 032219DD
            • Part of subcall function 03221910: LoadLibraryW.KERNEL32(user32.dll,00000000,00000000,?,?), ref: 0322191F
            • Part of subcall function 03221910: GetProcAddress.KERNEL32(00000000,SetThreadDesktop), ref: 03221933
            • Part of subcall function 03221910: GetProcAddress.KERNEL32(00000000,GetThreadDesktop), ref: 0322193D
            • Part of subcall function 03221910: GetCurrentThreadId.KERNEL32 ref: 03221941
            • Part of subcall function 03221910: GetUserObjectInformationW.USER32(?,00000002,?,00000100,?,?,?), ref: 03221965
          • CloseDesktop.USER32(00000000), ref: 032219FE
          • FreeLibrary.KERNEL32(00000000), ref: 03221A0E
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: AddressLibraryProc$DesktopLoad$CloseCurrentFreeInformationObjectOpenThreadUser
          • String ID: OpenInputDesktop$user32.dll
          • API String ID: 1994081172-2568742042
          • Opcode ID: 9c2891c879da63873a9c3a5ad2ee62fd34bf1f897625d035bee1b4b7a317d590
          • Instruction ID: bb23af0b6fe509fd75dd410a736604c3deed6ed2b974fbc2a5cf7d241c528e37
          • Opcode Fuzzy Hash: 9c2891c879da63873a9c3a5ad2ee62fd34bf1f897625d035bee1b4b7a317d590
          • Instruction Fuzzy Hash: 42F02B366212307BD721A66BBD0CFEF3B599FE1621F058026FE07D1104DB30E8A28091
          APIs
          • lstrcpyW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0321D21D
          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,?,?), ref: 0321D236
          • GetFileSize.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?), ref: 0321D255
          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?), ref: 0321D260
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?), ref: 0321D267
          • LocalAlloc.KERNEL32(00000040,0000000B,?,?,?,?,?,?), ref: 0321D274
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?), ref: 0321D2A2
          • LocalFree.KERNEL32(00000000,?,?,?,?,?,?), ref: 0321D2CB
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: FileLocallstrlen$AllocCloseCreateFreeHandleSizelstrcpy
          • String ID:
          • API String ID: 4036129025-0
          • Opcode ID: a71dc51793ddd448ca5ea5a918096b709d73fc52c64b905fef317d8e841e7551
          • Instruction ID: 956ce423a1a68d12929ec4c085ee720dce0052c78429b9bb57aff54d4b51bc16
          • Opcode Fuzzy Hash: a71dc51793ddd448ca5ea5a918096b709d73fc52c64b905fef317d8e841e7551
          • Instruction Fuzzy Hash: D221F131A00204AFC714EE29FC49F6BB7E9FB98711F048429FA06D7284DE71A915CB61
          APIs
          • ?_Xran@std@@YAXXZ.MSVCP60(?,?,?,00000000,?,-00000008,03227E51,000000FF,0321D4EA,-00000008,?,?,?), ref: 0321DC6E
          • ?_Split@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXXZ.MSVCP60(?,?,?,00000000,?,-00000008,03227E51,000000FF,0321D4EA,-00000008,?,?,?), ref: 0321DC76
          • ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z.MSVCP60(?,00000000), ref: 0321DCAD
          • ?_Eos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXI@Z.MSVCP60(?), ref: 0321DCBA
          • ?_Split@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXXZ.MSVCP60 ref: 0321DCC2
          • ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z.MSVCP60(00000001,?,?,?,00000000,?,-00000008,03227E51,000000FF,0321D4EA,-00000008,?,?,?), ref: 0321DCF9
          • ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z.MSVCP60(?,00000001,?,?,?,00000000,?,-00000008,03227E51,000000FF,0321D4EA,-00000008,?,?,?), ref: 0321DD3A
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: G@2@@std@@G@std@@U?$char_traits@V?$allocator@$Grow@?$basic_string@Split@?$basic_string@$Eos@?$basic_string@Tidy@?$basic_string@Xran@std@@
          • String ID:
          • API String ID: 2613176527-0
          • Opcode ID: a629f4c806a9c0875a066015709c55f76a56bd0bfdc07b37f2ff90800d782323
          • Instruction ID: a318ba69a9e6e1d34ba65218b4b4d418407d6e1e08b3968703083e5bf4d717db
          • Opcode Fuzzy Hash: a629f4c806a9c0875a066015709c55f76a56bd0bfdc07b37f2ff90800d782323
          • Instruction Fuzzy Hash: F6410276300B41CFCB20DF18D684A7AFBE6FB98B20F58895DD5568B714CB31A891CB90
          APIs
          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,0321C90C,00000001), ref: 0321D314
            • Part of subcall function 0321D3C0: ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z.MSVCP60(00000001,00000000,00000000,0321D3A6,?,?,?,?,0321C90C,00000001), ref: 0321D3DD
            • Part of subcall function 0321D3C0: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,0321C90C,00000001), ref: 0321D3E4
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: ??3@CreateFileG@2@@std@@G@std@@Tidy@?$basic_string@U?$char_traits@V?$allocator@
          • String ID:
          • API String ID: 1686836073-0
          • Opcode ID: 1064d030780d1d4f74cbc96c33dd2c5006a98e2abac76733b1412be9743e3b4e
          • Instruction ID: c64d6c7c0ca87c3a9387b4bbaeb768ad2d599ea5c5836100d6fb4e81b8bd83bd
          • Opcode Fuzzy Hash: 1064d030780d1d4f74cbc96c33dd2c5006a98e2abac76733b1412be9743e3b4e
          • Instruction Fuzzy Hash: 5021D676740301ABD310EA65FD48F6BB7E8DBA5761F10C52AFB04DA280DA71A4548B71
          APIs
            • Part of subcall function 0321B660: EnterCriticalSection.KERNEL32(?,?,?,0321C467,?,?,?,7595F860,?,03220E26,?,00000380), ref: 0321B668
            • Part of subcall function 0321B660: LeaveCriticalSection.KERNEL32(?,00000400,?,03220E26,?,00000380), ref: 0321B681
          • _ftol.MSVCRT ref: 0321C48F
          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0321C499
          • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,7595F860,?,03220E26,?,00000380), ref: 0321C4CE
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: CriticalSection$??2@??3@EnterLeave_ftol
          • String ID:
          • API String ID: 2245774403-0
          • Opcode ID: 998903d67e7ac62475f931a60b3259d8fe982c82c9dd327713d5a557f071d698
          • Instruction ID: 3638176cce8b15a22ef25d0e3e25707f36472670c037da49458fede82d308ed7
          • Opcode Fuzzy Hash: 998903d67e7ac62475f931a60b3259d8fe982c82c9dd327713d5a557f071d698
          • Instruction Fuzzy Hash: 484127797243086BD700FF249D40A3FB7E9AFE8610F40052DF9055B281EBB4A96983A2
          APIs
          • OutputDebugStringW.KERNEL32(?), ref: 0321C83A
          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0321C85A
          • GetFileSize.KERNEL32(00000000,00000000), ref: 0321C86A
          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0321C873
          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0321C887
          • CloseHandle.KERNEL32(00000000), ref: 0321C893
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: File$??2@CloseCreateDebugHandleOutputReadSizeString
          • String ID:
          • API String ID: 2966346487-0
          • Opcode ID: ae392b632857f6955dac5c5e1372ca027b1633502af75f83c1330aafcd2f144c
          • Instruction ID: 5d906db78674a71dcdd42c391ba21d563942eb25b0c339c8e27c217636eed496
          • Opcode Fuzzy Hash: ae392b632857f6955dac5c5e1372ca027b1633502af75f83c1330aafcd2f144c
          • Instruction Fuzzy Hash: E0F0A435951224BBE310AB25FD0DFEE3B6CDF56721F108254FE04A61C0DBB03A1586E5
          APIs
            • Part of subcall function 04922250: LoadLibraryA.KERNEL32(OLEACC.DLL,76376A90,00000000,00000000,000000FF,?,0492270B,00000000), ref: 0492227E
            • Part of subcall function 04922250: RegisterClipboardFormatA.USER32(WM_HTML_GETOBJECT), ref: 0492229E
            • Part of subcall function 04922250: SendMessageTimeoutA.USER32(0492270B,00000000,00000000,00000000,00000002,000003E8,?), ref: 049222B3
            • Part of subcall function 04922250: GetProcAddress.KERNEL32(00000000,ObjectFromLresult), ref: 049222BF
            • Part of subcall function 04922250: FreeLibrary.KERNEL32(00000000,?,0492270B,00000000), ref: 0492234E
          • wcstombs.MSVCRT ref: 049224E9
          • SysFreeString.OLEAUT32(?), ref: 04922512
          • SysFreeString.OLEAUT32(?), ref: 04922546
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4490119108.0000000004920000.00000040.00001000.00020000.00000000.sdmp, Offset: 04920000, based on PE: true
          • Associated: 00000011.00000002.4490119108.0000000004926000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_4920000_rundll32.jbxd
          Similarity
          • API ID: Free$LibraryString$AddressClipboardFormatLoadMessageProcRegisterSendTimeoutwcstombs
          • String ID: ALL
          • API String ID: 1031945333-2914988887
          • Opcode ID: bbe398ad026e6b1b7872cd4f25bfbd6c0d970960f5e408f6140ec67ba8a4f633
          • Instruction ID: c942e1c9f604b81c59426731fe9fc067c8725501b2be70d5f5e6677e9e96c3b9
          • Opcode Fuzzy Hash: bbe398ad026e6b1b7872cd4f25bfbd6c0d970960f5e408f6140ec67ba8a4f633
          • Instruction Fuzzy Hash: DD31D671904258AFCB10CFA8D985BAEBFB8FB49720F1482B9E81997345C7355A05CBE1
          APIs
          • mbstowcs.MSVCRT ref: 03220F9B
            • Part of subcall function 03221A20: InternetOpenW.WININET(Mozilla/4.0 (compatible),00000000,00000000,00000000,00000000), ref: 03221A46
          • CreateProcessW.KERNEL32(00000000,c:\windows\httpd.exe,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 03220FE2
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: CreateInternetOpenProcessmbstowcs
          • String ID: D$WinSta0\Default$c:\windows\httpd.exe
          • API String ID: 3372342612-3967429356
          • Opcode ID: aca319b05bebc6a9b33a07e5d7cd8791cd3ccbf566f6c64cf27d62de6877e33c
          • Instruction ID: 3f8e577488e166edd3ff92a0415b036188211271d427ff8c3862f3d71b1a539e
          • Opcode Fuzzy Hash: aca319b05bebc6a9b33a07e5d7cd8791cd3ccbf566f6c64cf27d62de6877e33c
          • Instruction Fuzzy Hash: FC11C8B78101186BDB50DAF4DE4DBDB7BACEB54350F108536E605E3285DE749A098660
          APIs
          • CreateFileW.KERNEL32(00000021,40000000,00000002,00000000,00000003,00000080,00000000,?,00000001), ref: 0321DA7C
          • SetFilePointer.KERNEL32(00000000,?,?,00000000,?,00000001), ref: 0321DA8D
          • WriteFile.KERNEL32(00000000,?,?,?,00000000,?,00000001), ref: 0321DAA7
          • CloseHandle.KERNEL32(00000000,?,00000001), ref: 0321DAAE
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: File$CloseCreateHandlePointerWrite
          • String ID: p
          • API String ID: 3604237281-2181537457
          • Opcode ID: b27bbd34b79acfd8848d571a0ebf214ea47cccc0100ecdba2e017716b71700f0
          • Instruction ID: c84d8caa8d9ca811f832918c1912cbdbc809124fb233862e47bfbd4bce889cd8
          • Opcode Fuzzy Hash: b27bbd34b79acfd8848d571a0ebf214ea47cccc0100ecdba2e017716b71700f0
          • Instruction Fuzzy Hash: 7F11C271648301ABD300EF55ED45F6BB7E8FBA9755F044A0DF6449A2C0D7B0A9098BA2
          APIs
          • Sleep.KERNEL32(00000064), ref: 03220501
          • PeekNamedPipe.KERNEL32(?,?,00000800,00000000,?,00000000), ref: 03220521
          • LocalAlloc.KERNEL32(00000040,?), ref: 03220543
          • ReadFile.KERNEL32(?,00000000,?,?,00000000), ref: 0322055C
          • LocalFree.KERNEL32(00000000), ref: 03220570
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: Local$AllocFileFreeNamedPeekPipeReadSleep
          • String ID:
          • API String ID: 407041184-0
          • Opcode ID: 2d6c8b26ed83b7c912f9261c675b537217112699d769d44758b6d8282cc99e8b
          • Instruction ID: 66929e9ae7ea707a11590b5da30b82f6725a35ce1bad62c250842cd636ac63e3
          • Opcode Fuzzy Hash: 2d6c8b26ed83b7c912f9261c675b537217112699d769d44758b6d8282cc99e8b
          • Instruction Fuzzy Hash: 8B118B70604342AFD704DE25D988F6BB7E9FF88740F00892CBA45D7280DB70E8188BA2
          APIs
          • wsprintfW.USER32 ref: 0321E364
          • lstrlenW.KERNEL32(?,00000000), ref: 0321E377
            • Part of subcall function 0321FF30: LoadLibraryW.KERNEL32(ADVAPI32.dll), ref: 0321FF5F
            • Part of subcall function 0321FF30: GetProcAddress.KERNEL32(00000000,RegCreateKeyExW), ref: 0321FF73
            • Part of subcall function 0321FF30: GetProcAddress.KERNEL32(00000000,RegSetValueExW), ref: 0321FF7E
            • Part of subcall function 0321FF30: GetProcAddress.KERNEL32(00000000,RegDeleteKeyW), ref: 0321FF89
            • Part of subcall function 0321FF30: GetProcAddress.KERNEL32(00000000,RegDeleteValueW), ref: 0321FF94
            • Part of subcall function 0321FF30: GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 0321FF9F
            • Part of subcall function 0321FF30: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 0321FFA9
          Strings
          • SOFTWARE\Microsoft\Windows\CurrentVersion\Setup, xrefs: 0321E353
          • Host, xrefs: 0321E387
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$LibraryLoadlstrlenwsprintf
          • String ID: Host$SOFTWARE\Microsoft\Windows\CurrentVersion\Setup
          • API String ID: 2349312171-3116824957
          • Opcode ID: 6e5c021daf1c6801389a48f692d0cb033729e60345656542c8d7b8a92d727305
          • Instruction ID: e51ebf084632f1995178f3c1d62c94cab259424124976771d5ffb8113b7bd027
          • Opcode Fuzzy Hash: 6e5c021daf1c6801389a48f692d0cb033729e60345656542c8d7b8a92d727305
          • Instruction Fuzzy Hash: B2F0EC3A9503107FE310A614ED0BFDB3BD8EF90710F408425FA59A268AE5B46178CAD2
          APIs
          • lstrlenW.KERNEL32(?,?), ref: 0321D462
          • wcslen.MSVCRT ref: 0321D4A9
          • ?assign@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PBGI@Z.MSVCP60(?,00000000), ref: 0321D4B8
            • Part of subcall function 0321D570: lstrlenW.KERNEL32(?,?,?,?), ref: 0321D5A8
            • Part of subcall function 0321D570: wsprintfW.USER32 ref: 0321D5DC
            • Part of subcall function 0321D570: FindFirstFileW.KERNEL32(?,?), ref: 0321D5F2
            • Part of subcall function 0321D7C0: ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,0321D48C,?), ref: 0321D804
            • Part of subcall function 0321D7C0: ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,0321D48C,?), ref: 0321D815
            • Part of subcall function 0321D7C0: ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,0321D48C,?), ref: 0321D826
            • Part of subcall function 0321D7C0: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,0321D48C,?), ref: 0321D851
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: G@2@@std@@G@std@@U?$char_traits@V?$allocator@$Refcnt@?$basic_string@$lstrlen$??3@?assign@?$basic_string@FileFindFirstV12@wcslenwsprintf
          • String ID:
          • API String ID: 2478117631-0
          • Opcode ID: 252ac01761cd329ba02373e4302de57ba2f3548d8150dfc506ba548f159739ee
          • Instruction ID: b0cf1e52c0a9fbcc7424ae5812089cc4bb7cd2cd76d24cf5947a1fc12c439b55
          • Opcode Fuzzy Hash: 252ac01761cd329ba02373e4302de57ba2f3548d8150dfc506ba548f159739ee
          • Instruction Fuzzy Hash: 503104B1514352EFC700DF28C984A6BFBE4BFA8214F444A2DE46987341D774E869CBA2
          APIs
          • ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z.MSVCP60(00000001,?,?,?,?,?,?,?,?,?,?,000000FF,0321C718), ref: 0321C782
          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,000000FF,0321C718), ref: 0321C789
          • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,000000FF,0321C718), ref: 0321C7DF
          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,000000FF,0321C718), ref: 0321C7F6
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: ??3@$G@2@@std@@G@std@@Tidy@?$basic_string@U?$char_traits@V?$allocator@
          • String ID:
          • API String ID: 4114290161-0
          • Opcode ID: 1e0b36c3cb84c88f52622f609707c69a2a8fc46256bd7a553f397222c94af7c6
          • Instruction ID: 56265121b4c8371aee653c0fd4e786753c958f5147bcf8ab1e51358f5adab602
          • Opcode Fuzzy Hash: 1e0b36c3cb84c88f52622f609707c69a2a8fc46256bd7a553f397222c94af7c6
          • Instruction Fuzzy Hash: F23187B96107129FC710DF19C980A16FBE4FF58710F00462CE55A8B781E775B9A5CBD1
          APIs
          • ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,0321D48C,?), ref: 0321D804
          • ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,0321D48C,?), ref: 0321D815
          • ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,0321D48C,?), ref: 0321D826
          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,0321D48C,?), ref: 0321D851
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: G@2@@std@@G@std@@Refcnt@?$basic_string@U?$char_traits@V?$allocator@$??3@
          • String ID:
          • API String ID: 1249008704-0
          • Opcode ID: 5c13d879fb1fecdb0c779faba7acaab6a3dfa892c8901d490c73eabc8523a01e
          • Instruction ID: 17de2fa826b93ee76cab28fbe4a10a2c79ac816531a454819028abebb154c6d9
          • Opcode Fuzzy Hash: 5c13d879fb1fecdb0c779faba7acaab6a3dfa892c8901d490c73eabc8523a01e
          • Instruction Fuzzy Hash: 8721AF743106019FC718DF28DA8492BFBE5EF58610704856CE85ACB791DB70FCA1CBA0
          APIs
          • ceil.MSVCRT ref: 0321B4FC
          • _ftol.MSVCRT ref: 0321B505
          • VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000004,?,?,?,?,?,?,?,?,?,00000380), ref: 0321B519
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: AllocVirtual_ftolceil
          • String ID:
          • API String ID: 3317677364-0
          • Opcode ID: 74e328058d66418aadcfb53599e689576b82d6502b9cfacc8f540e8f383850b3
          • Instruction ID: 5fb301e2db0a38a042fb2d3de52efd3c64229040f08802dc6f69f57a9395cff5
          • Opcode Fuzzy Hash: 74e328058d66418aadcfb53599e689576b82d6502b9cfacc8f540e8f383850b3
          • Instruction Fuzzy Hash: 0D1102756043049BC704EF29BD4672ABBE4EBE4361F04C03EEE058B384DB75A468CA65
          APIs
          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0321B8BC
          • CloseHandle.KERNEL32(?), ref: 0321B8DF
          • CloseHandle.KERNEL32(?), ref: 0321B8E8
          • WSACleanup.WS2_32 ref: 0321B8EA
            • Part of subcall function 0321C3D0: setsockopt.WS2_32(?,0000FFFF,00000080,00000000,00000004), ref: 0321C3FA
            • Part of subcall function 0321C3D0: CancelIo.KERNEL32(?), ref: 0321C407
            • Part of subcall function 0321C3D0: InterlockedExchange.KERNEL32(?,00000000), ref: 0321C416
            • Part of subcall function 0321C3D0: closesocket.WS2_32(?), ref: 0321C423
            • Part of subcall function 0321C3D0: SetEvent.KERNEL32(?), ref: 0321C430
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: CloseHandle$CancelCleanupEventExchangeInterlockedObjectSingleWaitclosesocketsetsockopt
          • String ID:
          • API String ID: 136543108-0
          • Opcode ID: 14e7e5f376badc25e0e26579331ae0e7cfda7e35d62c3c3ad9429c10d11f40bd
          • Instruction ID: 15ae52454fe0ab6ec56f768ca56b751aa3903585f7e5f7f4d1702d0287c1742d
          • Opcode Fuzzy Hash: 14e7e5f376badc25e0e26579331ae0e7cfda7e35d62c3c3ad9429c10d11f40bd
          • Instruction Fuzzy Hash: B3115439118B41DFC315EF28D644B5AF7E4AFA9B20F104A0DE4BA476C0CBF46555CB62
          APIs
          • InterlockedExchange.KERNEL32(?,00000001), ref: 0321E84C
          • OutputDebugStringA.KERNEL32(COMMAND_GETINFO), ref: 0321E889
          Strings
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: DebugExchangeInterlockedOutputString
          • String ID: COMMAND_GETINFO
          • API String ID: 4170579539-405466798
          • Opcode ID: 1a1fd1ac3b62743a471e292dfd97e1b8104ea855ae22c35d4251360dedb5aab4
          • Instruction ID: 098c1fcd195298cf85a3101ab85b3816754a8d0774016c4512b2d8c8445edc45
          • Opcode Fuzzy Hash: 1a1fd1ac3b62743a471e292dfd97e1b8104ea855ae22c35d4251360dedb5aab4
          • Instruction Fuzzy Hash: BD3105776A43106EF190F618BD02FB7B394AB70B05F068829FE9A4E181D5D23CE583A1
          APIs
          • EnterCriticalSection.KERNEL32(?,00000000,?,?,?,0321C2B9,?,00000005,00000005,00000000,?,?,?,?,?), ref: 0321B3FE
          • LeaveCriticalSection.KERNEL32(?,?,?,?,0321C2B9,?,00000005,00000005,00000000,?,?,?,?,?), ref: 0321B414
          • memmove.MSVCRT(00000000,?,00000000,?,?,?,?,0321C2B9,?,00000005,00000005,00000000,?,?,?,?), ref: 0321B465
          • LeaveCriticalSection.KERNEL32(?,00000000,?,?,?,0321C2B9,?,00000005,00000005,00000000,?,?,?,?,?), ref: 0321B48B
          Memory Dump Source
          • Source File: 00000011.00000002.4489774740.0000000003217000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
          • Associated: 00000011.00000002.4489774740.0000000003210000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_17_2_3210000_rundll32.jbxd
          Similarity
          • API ID: CriticalSection$Leave$Entermemmove
          • String ID:
          • API String ID: 72348100-0
          • Opcode ID: 63b8b59b587b8cb21cba735c78d62cf9cefe9c46ca0183da75ed117b869ee4ff
          • Instruction ID: ac3921a3caa8c26326812f39fc4be92fda94fd09274aeae685849153d1eec2e7
          • Opcode Fuzzy Hash: 63b8b59b587b8cb21cba735c78d62cf9cefe9c46ca0183da75ed117b869ee4ff
          • Instruction Fuzzy Hash: 981190366103195F8B04FE74AAA446FB7E8EF68111744842DE903CB745EFA4AD689790

          Execution Graph

          Execution Coverage:4.2%
          Dynamic/Decrypted Code Coverage:100%
          Signature Coverage:0%
          Total number of Nodes:825
          Total number of Limit Nodes:0
          execution_graph 3958 471def0 3959 471def9 3958->3959 3960 471defe 3958->3960 3962 471eb40 SetEvent 3959->3962 3962->3960 4172 471e3b0 4173 471e450 CloseHandle 4172->4173 4174 471e3b8 4173->4174 4175 471e3c8 4174->4175 4176 471e3bf ??3@YAXPAX 4174->4176 4176->4175 3587 4720370 3592 4720390 7 API calls 3587->3592 3590 4720388 3591 472037f ??3@YAXPAX 3591->3590 3593 472041f 3592->3593 3594 472041c DisconnectNamedPipe 3592->3594 3595 4720426 DisconnectNamedPipe 3593->3595 3596 4720429 3593->3596 3594->3593 3595->3596 3597 4720433 3596->3597 3598 4720430 DisconnectNamedPipe 3596->3598 3599 472043a DisconnectNamedPipe 3597->3599 3600 472043d 3597->3600 3598->3597 3599->3600 3603 471ea60 CloseHandle 3600->3603 3602 4720378 3602->3590 3602->3591 3603->3602 4177 47245b0 free 3604 4720e74 3605 4727840 3604->3605 3606 4727864 3605->3606 3607 4727853 VirtualFree 3605->3607 3607->3606 3869 471b239 3870 471b260 3869->3870 3871 471b264 LoadLibraryW LoadLibraryW GetProcAddress 3869->3871 3870->3871 3872 471b30a FreeLibrary 3871->3872 3873 472763c ??1type_info@@UAE 3874 4727652 3873->3874 3875 472764b ??3@YAXPAX 3873->3875 3875->3874 3827 471db60 3828 471dba3 ??3@YAXPAX 3827->3828 3829 471db6f 3827->3829 3830 471db70 ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N ??3@YAXPAX 3829->3830 3830->3830 3831 471dba2 3830->3831 3831->3828 3608 471b860 3613 471b880 WaitForSingleObject 3608->3613 3611 471b878 3612 471b86f ??3@YAXPAX 3612->3611 3614 471b8d2 CloseHandle CloseHandle WSACleanup 3613->3614 3615 471b8cb 3613->3615 3626 471b340 3614->3626 3625 471c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 3615->3625 3618 471b8fd 3619 471b340 2 API calls 3618->3619 3620 471b90a 3619->3620 3621 471b340 2 API calls 3620->3621 3622 471b917 3621->3622 3623 471b340 2 API calls 3622->3623 3624 471b868 3623->3624 3624->3611 3624->3612 3625->3614 3627 471b350 VirtualFree 3626->3627 3628 471b35e DeleteCriticalSection 3626->3628 3627->3628 3628->3618 3629 471e260 3644 471b780 3629->3644 3631 471e284 3653 471bf20 3631->3653 3633 471e2a3 3634 471e2d5 3633->3634 3635 471e2a7 3633->3635 3672 471de50 3634->3672 3636 471b880 11 API calls 3635->3636 3638 471e2bb 3636->3638 3639 471e2e3 3681 471c170 WaitForSingleObject 3639->3681 3641 471e2f4 3642 471b880 11 API calls 3641->3642 3643 471e319 3642->3643 3682 471b270 LoadLibraryW LoadLibraryW GetProcAddress 3644->3682 3646 471b7aa 3647 471b270 4 API calls 3646->3647 3648 471b7bd 3647->3648 3649 471b270 4 API calls 3648->3649 3650 471b7cd 3649->3650 3651 471b270 4 API calls 3650->3651 3652 471b7dd WSAStartup CreateEventW 3651->3652 3652->3631 3684 471c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 3653->3684 3655 471bf2e ResetEvent socket 3656 471bf65 gethostbyname 3655->3656 3657 471bf59 3655->3657 3658 471bf82 htons connect 3656->3658 3659 471bf76 3656->3659 3657->3633 3661 471bfd0 3658->3661 3662 471bff9 setsockopt 3658->3662 3659->3633 3685 471bb70 3661->3685 3663 471c059 3662->3663 3664 471c01d WSAIoctl 3662->3664 3721 47216e0 CreateEventW 3663->3721 3664->3663 3667 471bfde 3667->3662 3706 471b940 3667->3706 3668 471c075 3668->3633 3670 471bfeb 3670->3662 3671 471bfef 3670->3671 3671->3633 3741 471ea10 3672->3741 3674 471de77 3744 471df10 OutputDebugStringA 3674->3744 3678 471de93 3748 471dfa0 GetSystemDirectoryW lstrcatW CreateFileW 3678->3748 3680 471de9a Sleep 3680->3639 3681->3641 3683 471b30a FreeLibrary 3682->3683 3683->3646 3684->3655 3686 471bb93 3685->3686 3724 471c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 3686->3724 3688 471bba5 ResetEvent socket 3689 471bbd4 3688->3689 3690 471bce0 3688->3690 3691 471bce5 3689->3691 3692 471bc2f 3689->3692 3690->3667 3691->3690 3693 471bcfa strchr strncpy 3691->3693 3692->3690 3695 471bc5e strchr strncpy 3692->3695 3693->3690 3694 471bd44 atoi 3693->3694 3694->3690 3696 471bd6a gethostbyname 3694->3696 3695->3690 3697 471bcb4 atoi 3695->3697 3696->3690 3698 471bd81 htons connect 3696->3698 3697->3690 3697->3696 3698->3690 3699 471bdb8 sprintf OutputDebugStringA send 3698->3699 3701 471be43 select 3699->3701 3702 471be99 closesocket 3701->3702 3703 471bebb recv strstr 3701->3703 3702->3690 3703->3702 3705 471bef8 3703->3705 3705->3667 3707 471b99e 3706->3707 3708 471ba9f 3707->3708 3709 471b9da strncpy 3707->3709 3708->3670 3710 471b9fd strstr 3709->3710 3710->3708 3711 471ba18 3710->3711 3711->3708 3712 471ba4b malloc 3711->3712 3713 471ba7d 3712->3713 3714 471ba91 free 3713->3714 3715 471baad _strupr strstr 3713->3715 3714->3708 3716 471baea strchr 3715->3716 3717 471bb4e free 3715->3717 3716->3717 3719 471baff 3716->3719 3717->3670 3718 471bb70 23 API calls 3718->3719 3719->3717 3719->3718 3720 471bb3c strstr 3719->3720 3720->3716 3720->3717 3725 4721630 CreateThread 3721->3725 3723 4721731 WaitForSingleObject CloseHandle 3723->3668 3724->3688 3725->3723 3726 4721660 SetEvent 3725->3726 3727 47216a2 3726->3727 3728 47216a9 3726->3728 3730 47219b0 LoadLibraryW GetProcAddress 3727->3730 3731 47219dc 3730->3731 3732 47219ed 3731->3732 3737 4721910 LoadLibraryW GetProcAddress GetProcAddress GetCurrentThreadId 3731->3737 3732->3728 3735 47219fd 3735->3728 3736 4721a0d FreeLibrary 3736->3735 3738 472194a 3737->3738 3739 472196f 3738->3739 3740 4721997 FreeLibrary 3738->3740 3739->3735 3739->3736 3740->3739 3755 471c680 3741->3755 3743 471ea26 CreateEventW 3743->3674 3756 471ea90 3744->3756 3747 471eb00 WaitForSingleObject Sleep 3747->3678 3749 471e082 CloseHandle 3748->3749 3750 471dffb GetFileSize ??2@YAPAXI ReadFile 3748->3750 3749->3680 3751 471e034 mbstowcs 3750->3751 3752 471e026 3750->3752 3824 471df40 LocalAlloc 3751->3824 3752->3751 3752->3752 3754 471e076 ??3@YAXPAX 3754->3749 3755->3743 3759 471c450 3756->3759 3758 471de8c 3758->3747 3789 471b660 EnterCriticalSection 3759->3789 3761 471c467 3762 471c473 _ftol ??2@YAPAXI 3761->3762 3763 471c5a4 3761->3763 3765 471c4a7 3762->3765 3767 471c4b1 3762->3767 3764 471b370 7 API calls 3763->3764 3766 471c5b4 3764->3766 3765->3758 3768 471b660 6 API calls 3766->3768 3770 471c4e3 3767->3770 3771 471c4cd ??3@YAXPAX 3767->3771 3769 471c5be 3768->3769 3773 471b370 7 API calls 3769->3773 3792 471b370 EnterCriticalSection 3770->3792 3771->3758 3777 471c578 3773->3777 3774 471c4fe 3775 471b370 7 API calls 3774->3775 3776 471c50c 3775->3776 3778 471b370 7 API calls 3776->3778 3798 471c5d0 3777->3798 3779 471c51a 3778->3779 3780 471b370 7 API calls 3779->3780 3782 471c527 ??3@YAXPAX ??2@YAPAXI 3780->3782 3784 471b660 6 API calls 3782->3784 3785 471c55e 3784->3785 3786 471b370 7 API calls 3785->3786 3787 471c56b 3786->3787 3787->3777 3788 471c56f ??3@YAXPAX 3787->3788 3788->3777 3805 471b590 3789->3805 3791 471b680 LeaveCriticalSection 3791->3761 3793 471b38b 3792->3793 3816 471b4c0 3793->3816 3795 471b399 3796 471b3ae LeaveCriticalSection 3795->3796 3797 471b39e LeaveCriticalSection 3795->3797 3796->3774 3797->3774 3799 471c63a 3798->3799 3800 471c5ee 3798->3800 3802 471c640 send 3799->3802 3804 471c59a 3799->3804 3801 471c5f6 send 3800->3801 3803 471c620 Sleep 3800->3803 3800->3804 3801->3800 3802->3799 3802->3804 3803->3799 3803->3800 3804->3758 3806 471b59c 3805->3806 3807 471b5a4 3806->3807 3808 471b5ae ceil _ftol 3806->3808 3807->3791 3809 471b5e4 3808->3809 3810 471b5f2 VirtualAlloc 3809->3810 3811 471b5e8 3809->3811 3814 471b4b0 3810->3814 3811->3791 3815 471b4b7 VirtualFree 3814->3815 3815->3791 3817 471b4cd 3816->3817 3818 471b4e0 ceil _ftol VirtualAlloc 3817->3818 3819 471b4d5 3817->3819 3820 471b529 3818->3820 3821 471b535 3818->3821 3819->3795 3820->3795 3822 471b55c VirtualFree 3821->3822 3823 471b56e 3821->3823 3822->3823 3823->3795 3825 471ea90 22 API calls 3824->3825 3826 471df80 LocalFree 3825->3826 3826->3754 3876 471e820 3877 471e834 3876->3877 3905 471e946 3876->3905 3878 471e8f1 3877->3878 3879 471e911 3877->3879 3880 471e933 3877->3880 3881 471e856 3877->3881 3882 471e93f 3877->3882 3883 471e921 3877->3883 3884 471e8e1 3877->3884 3885 471e901 3877->3885 3886 471e843 InterlockedExchange 3877->3886 3887 471e884 OutputDebugStringA 3877->3887 3888 471e8ce 3877->3888 3877->3905 3896 471e4d0 12 API calls 3878->3896 3890 471e4d0 12 API calls 3879->3890 3921 471c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 3880->3921 3899 47216e0 13 API calls 3881->3899 3922 471e760 wcstombs OutputDebugStringA sprintf WinExec strstr 3882->3922 3916 471e730 3883->3916 3911 471e4d0 wcstombs 3884->3911 3889 471e4d0 12 API calls 3885->3889 3887->3881 3907 471e340 3888->3907 3898 471e90a 3889->3898 3900 471e91a 3890->3900 3897 471e8fa 3896->3897 3906 471e8ad 3899->3906 3903 471e93b 3904 471e8ea 3908 471e36a lstrlenW 3907->3908 3925 471ff30 7 API calls 3908->3925 3910 471e397 3912 471e541 3911->3912 3913 471e525 atoi 3911->3913 3914 471e54a 10 API calls 3912->3914 3915 471e654 3912->3915 3913->3904 3914->3904 3915->3904 3915->3915 3929 471e6a0 GetCurrentProcess 3916->3929 3919 471e6a0 GetCurrentProcess 3920 471e758 3919->3920 3921->3903 3923 471e803 ExitProcess 3922->3923 3924 471e80b 3922->3924 3924->3905 3926 472001f 3925->3926 3927 471ffc3 3925->3927 3926->3910 3927->3926 3928 472003c lstrlenW 3927->3928 3928->3926 3930 471e6bd 3929->3930 3930->3919 3931 471b320 3932 471b340 2 API calls 3931->3932 3933 471b328 3932->3933 3934 471b338 3933->3934 3935 471b32f ??3@YAXPAX 3933->3935 3935->3934 4178 471b6a0 4179 471b6a5 4178->4179 4180 47275e2 2 API calls 4179->4180 4181 471b6ca 4180->4181 4182 471c8a0 4183 471c8b7 4182->4183 4184 471c993 4182->4184 4183->4184 4185 471c971 4183->4185 4186 471c910 4183->4186 4187 471c935 4183->4187 4188 471c8f6 4183->4188 4189 471c91d 4183->4189 4190 471c8be 4183->4190 4191 471c8e0 4183->4191 4192 471c980 LoadLibraryW 4183->4192 4193 471c903 4183->4193 4194 471c942 4183->4194 4195 471c962 4183->4195 4196 471c8cb DeleteFileW 4183->4196 4197 471c92a 4183->4197 4198 471c98c 4183->4198 4199 471c94f 4183->4199 4206 471cba0 12 API calls 4185->4206 4281 471db10 4186->4281 4299 471daf0 4187->4299 4253 471d440 lstrlenW 4188->4253 4286 471db30 lstrlenW MoveFileW 4189->4286 4229 471cfa0 LocalAlloc 4190->4229 4246 471d120 4191->4246 4268 471d2e0 4193->4268 4302 471d880 lstrcpyW 4194->4302 4315 471cba0 wcsrchr 4195->4315 4243 471d430 4196->4243 4289 471d7c0 4197->4289 4325 471c830 OutputDebugStringW CreateFileW 4198->4325 4312 471da50 CreateFileW SetFilePointer WriteFile CloseHandle 4199->4312 4220 471c97c 4206->4220 4215 471c94b 4216 471c8c7 4221 471c8e9 4227 471d430 22 API calls 4221->4227 4223 471c90c 4228 471c8f2 4227->4228 4230 471cfe6 FindFirstFileW 4229->4230 4231 471d027 4230->4231 4232 471d007 4230->4232 4234 471d039 LocalReAlloc 4231->4234 4235 471d04f lstrcmpW 4231->4235 4233 471ea90 22 API calls 4232->4233 4236 471d01a 4233->4236 4234->4235 4237 471d063 lstrcmpW 4235->4237 4238 471d0e2 FindNextFileW 4235->4238 4236->4216 4237->4238 4239 471d077 lstrlenW 4237->4239 4238->4231 4240 471d0f6 4238->4240 4239->4238 4241 471ea90 22 API calls 4240->4241 4242 471d101 LocalFree FindClose 4241->4242 4242->4216 4244 471ea90 22 API calls 4243->4244 4245 471c8dc 4244->4245 4247 471d146 FindFirstFileW 4246->4247 4248 471d163 4247->4248 4252 471d171 4247->4252 4248->4221 4249 471d1cf FindNextFileW 4250 471d1df FindClose RemoveDirectoryW 4249->4250 4249->4252 4250->4221 4251 471d1c2 DeleteFileW 4251->4249 4252->4249 4252->4251 4254 471d491 wcslen ?assign@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PBGI 4253->4254 4255 471d470 4253->4255 4340 471dbc0 ??2@YAPAXI 4254->4340 4328 471d570 lstrlenW 4255->4328 4260 471d485 4262 471d7c0 27 API calls 4260->4262 4264 471c8ff 4262->4264 4265 471d4ea 4266 471d511 4265->4266 4267 471d518 ??3@YAXPAX 4265->4267 4356 471d200 lstrcpyW CreateFileW 4266->4356 4267->4266 4269 471d2f1 4268->4269 4270 471d2fe CreateFileW 4268->4270 4361 471d3c0 ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N ??3@YAXPAX 4269->4361 4272 471d321 4270->4272 4273 471d329 SetFilePointer LocalAlloc ReadFile CloseHandle 4270->4273 4272->4223 4275 471d3a1 4273->4275 4276 471d385 4273->4276 4274 471d2f6 4274->4223 4278 471d3c0 32 API calls 4275->4278 4277 471ea90 22 API calls 4276->4277 4279 471d38f LocalFree 4277->4279 4280 471d3a6 LocalFree 4278->4280 4279->4223 4280->4223 4368 471c9f0 lstrlenW malloc 4281->4368 4283 471db1d 4284 471d430 22 API calls 4283->4284 4285 471c919 4284->4285 4287 471d430 22 API calls 4286->4287 4288 471c926 4287->4288 4294 471d7d0 4289->4294 4296 471d86c 4289->4296 4290 471d430 22 API calls 4291 471c931 4290->4291 4292 471d801 ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG 4292->4294 4295 471d80f ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG 4292->4295 4293 471d845 ??3@YAXPAX 4293->4294 4293->4296 4294->4292 4294->4293 4294->4296 4374 471dc00 ??3@YAXPAX 4294->4374 4295->4294 4297 471d820 ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG 4295->4297 4296->4290 4297->4293 4375 471d930 4299->4375 4301 471c93e 4303 471c9f0 5 API calls 4302->4303 4304 471d8c6 FindFirstFileW 4303->4304 4305 471d907 4304->4305 4306 471d8d9 4304->4306 4307 471d930 26 API calls 4305->4307 4306->4305 4309 471d8eb 4306->4309 4308 471d90e FindClose 4307->4308 4308->4215 4310 471d430 22 API calls 4309->4310 4311 471d8f4 FindClose 4310->4311 4311->4215 4313 471ea90 22 API calls 4312->4313 4314 471c95e 4313->4314 4316 471c96d 4315->4316 4317 471cbe8 lstrcpyW LoadLibraryW GetProcAddress GetProcAddress GetProcAddress 4315->4317 4318 471cc3d 4317->4318 4318->4316 4319 471ccd9 wcsstr 4318->4319 4320 471ccf2 wcsstr 4319->4320 4321 471cd28 lstrcpyW 4319->4321 4320->4321 4322 471cd05 lstrcatW lstrcatW 4320->4322 4323 471cd37 CreateProcessW 4321->4323 4322->4323 4323->4316 4326 471c892 CloseHandle 4325->4326 4327 471c867 GetFileSize ??2@YAPAXI ReadFile 4325->4327 4326->4184 4327->4326 4329 471d5b6 FindFirstFileW 4328->4329 4331 471d478 4329->4331 4337 471d608 4329->4337 4331->4260 4331->4266 4332 471d742 FindNextFileW 4333 471d75a FindClose 4332->4333 4332->4337 4333->4331 4334 471d65d wcslen ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N 4335 471d6b7 ??2@YAPAXI 4334->4335 4334->4337 4335->4337 4336 471d570 7 API calls 4336->4337 4337->4332 4337->4334 4337->4335 4337->4336 4338 471dc10 7 API calls 4337->4338 4339 471d71f ??3@YAXPAX 4337->4339 4338->4337 4339->4337 4341 471d4d4 4340->4341 4342 471dc10 4341->4342 4343 471dc40 4342->4343 4353 471dd44 4342->4353 4344 471dc68 4343->4344 4345 471dcdb 4343->4345 4347 471dc74 ?_Split@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@ 4344->4347 4348 471dc6e ?_Xran@std@ 4344->4348 4346 471dd35 ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N 4345->4346 4351 471dcf5 ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N 4345->4351 4346->4353 4350 471dc85 4347->4350 4348->4347 4349 471dcc0 ?_Split@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@ 4349->4265 4350->4349 4354 471dca1 ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N 4350->4354 4352 471dd06 4351->4352 4352->4265 4353->4265 4353->4353 4354->4349 4355 471dcb7 ?_Eos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXI 4354->4355 4355->4349 4357 471d243 4356->4357 4358 471d24d GetFileSize CloseHandle lstrlenW LocalAlloc lstrlenW 4356->4358 4357->4264 4359 471ea90 22 API calls 4358->4359 4360 471d2c8 LocalFree 4359->4360 4360->4264 4362 471d405 4361->4362 4363 471d3f9 4361->4363 4365 471d200 30 API calls 4362->4365 4364 471d430 22 API calls 4363->4364 4366 471d402 4364->4366 4367 471d421 4365->4367 4366->4274 4367->4274 4369 471ca42 lstrcpyW 4368->4369 4370 471cb76 4368->4370 4373 471ca55 4369->4373 4370->4283 4371 471cb3e free 4371->4283 4371->4370 4372 471cb1c free 4372->4370 4373->4371 4373->4372 4374->4293 4377 471d944 FindFirstFileW 4375->4377 4378 471d98d FindClose CreateFileW 4377->4378 4380 471da2a CloseHandle 4378->4380 4381 471da0d 4378->4381 4382 471ea90 22 API calls 4380->4382 4381->4301 4383 471da3f 4382->4383 4383->4301 4384 471e0a0 4385 471b780 6 API calls 4384->4385 4386 471e0c4 4385->4386 4387 471bf20 52 API calls 4386->4387 4388 471e0e3 4387->4388 4389 471e115 4388->4389 4390 471e0e7 4388->4390 4401 471c690 4389->4401 4391 471b880 11 API calls 4390->4391 4393 471e0fb 4391->4393 4396 471e137 4397 471c730 7 API calls 4396->4397 4398 471e14b 4397->4398 4399 471b880 11 API calls 4398->4399 4400 471e15f 4399->4400 4402 471ea10 CreateEventW 4401->4402 4403 471c6b7 ??2@YAPAXI 4402->4403 4407 471cda0 8 API calls 4403->4407 4406 471c170 WaitForSingleObject 4406->4396 4410 471ce1d 4407->4410 4408 471ea90 22 API calls 4409 471c6f8 4408->4409 4409->4406 4410->4408 4411 47215a3 4416 471eb90 288 API calls 4411->4416 4413 47215b4 CreateThread 4417 4721501 7 API calls 4413->4417 4418 4721026 4413->4418 4415 47215d0 GetWindowsDirectoryA DeleteFileA 4416->4413 4417->4415 4419 4721030 __EH_prolog 4418->4419 4466 471eb90 288 API calls 4419->4466 4421 4721046 4467 4720ff1 CreateMutexA 4421->4467 4424 4721090 GetProcAddress 4425 47210a5 GetProcAddress 4424->4425 4426 47210b5 4425->4426 4427 47210ba Sleep GetTickCount 4425->4427 4426->4427 4428 47210db strstr 4427->4428 4429 4721122 SetErrorMode 4428->4429 4430 47210f3 4428->4430 4432 471b780 6 API calls 4429->4432 4471 4720f2c 4430->4471 4434 4721135 4432->4434 4474 471e3d0 4434->4474 4435 4721103 WinExec 4435->4429 4436 4721110 4438 47216e0 13 API calls 4436->4438 4439 472111f 4438->4439 4439->4429 4440 4721159 atoi 4441 472116b sprintf OutputDebugStringA 4440->4441 4444 472114a 4441->4444 4442 472121e GetLocalTime sprintf 4442->4444 4443 47212f9 atoi atoi atoi GetTickCount 4445 471bf20 52 API calls 4443->4445 4444->4440 4444->4441 4444->4442 4444->4443 4446 47212d7 Sleep 4444->4446 4447 4721391 sprintf 4444->4447 4449 47212c4 Sleep 4444->4449 4451 471bf20 52 API calls 4444->4451 4456 471e400 lstrcpyW 4444->4456 4457 4721478 GetTickCount 4444->4457 4458 47214b8 4444->4458 4477 471c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4444->4477 4445->4444 4446->4444 4448 4720e7e 6 API calls 4447->4448 4453 47213b4 4448->4453 4449->4444 4451->4444 4452 4727870 7 API calls 4452->4453 4453->4452 4454 47213da GetTickCount 4453->4454 4455 4720ac0 123 API calls 4454->4455 4455->4444 4456->4444 4457->4444 4478 471c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4458->4478 4460 47214c3 SetErrorMode 4462 471e450 CloseHandle 4460->4462 4463 47214df 4462->4463 4464 471b880 11 API calls 4463->4464 4465 47214ee 4464->4465 4466->4421 4468 4721009 4467->4468 4469 4721024 LoadLibraryW GetProcAddress 4468->4469 4470 472101c ExitProcess 4468->4470 4469->4424 4472 4720f33 GetFileAttributesW 4471->4472 4473 4720f42 4471->4473 4472->4473 4473->4435 4473->4436 4475 471ea10 CreateEventW 4474->4475 4476 471e3dd 4475->4476 4476->4444 4477->4444 4478->4460 3832 471cb66 free 3833 471cb76 3832->3833 3834 472776e 3836 472778a 3834->3836 3838 4727781 3834->3838 3836->3838 3841 47277b2 3836->3841 3842 47276c3 3836->3842 3837 47277d2 3840 47276c3 3 API calls 3837->3840 3837->3841 3838->3837 3839 47276c3 3 API calls 3838->3839 3838->3841 3839->3837 3840->3841 3843 47276cb 3842->3843 3844 4727701 3843->3844 3845 47276ec malloc 3843->3845 3847 472772b 3843->3847 3844->3838 3845->3844 3846 4727705 _initterm 3845->3846 3846->3844 3847->3844 3848 4727758 free 3847->3848 3848->3844 3586 471eb90 288 API calls 3937 471c710 3942 471c730 3937->3942 3940 471c728 3941 471c71f ??3@YAXPAX 3941->3940 3943 471c76a ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N ??3@YAXPAX 3942->3943 3946 471c79c 3942->3946 3943->3943 3943->3946 3944 471c7f2 ??3@YAXPAX 3956 471ea60 CloseHandle 3944->3956 3946->3944 3950 471ddf0 3946->3950 3947 471c718 3947->3940 3947->3941 3951 471ddfa 3950->3951 3955 471de06 3950->3955 3952 471de0d ??3@YAXPAX 3951->3952 3951->3955 3952->3955 3953 471de36 ??3@YAXPAX 3954 471c7de ??3@YAXPAX 3953->3954 3954->3944 3954->3946 3955->3953 3955->3954 3956->3947 3963 471b6d0 3965 471b6e0 3963->3965 3964 471b77b 3965->3964 3966 471b708 ??3@YAXPAX 3965->3966 3966->3965 3967 471b726 ??3@YAXPAX 3966->3967 3967->3965 4479 471c090 4482 471c09a 4479->4482 4480 471c0cc select 4481 471c153 4480->4481 4480->4482 4511 471c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4481->4511 4482->4480 4483 471c0fd recv 4482->4483 4486 471c143 4482->4486 4487 471c190 4482->4487 4483->4481 4483->4482 4488 471c1c4 4487->4488 4489 471c1dc 4487->4489 4512 471c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4488->4512 4491 471c223 4489->4491 4494 471c1f2 4489->4494 4492 471b370 7 API calls 4491->4492 4498 471c232 4492->4498 4493 471c1c9 4493->4482 4495 471c450 22 API calls 4494->4495 4496 471c210 4495->4496 4496->4482 4497 471c269 _CxxThrowException 4497->4498 4498->4493 4498->4497 4499 471b3f0 8 API calls 4498->4499 4502 471c392 _CxxThrowException 4498->4502 4507 471c37d _CxxThrowException 4498->4507 4508 471b660 6 API calls 4498->4508 4509 471b370 7 API calls 4498->4509 4510 471c366 ??3@YAXPAX ??3@YAXPAX 4498->4510 4513 471b3f0 EnterCriticalSection 4498->4513 4499->4498 4501 471c2d3 ??2@YAPAXI ??2@YAPAXI 4501->4498 4501->4502 4503 471b660 6 API calls 4502->4503 4504 471c3b2 4503->4504 4505 471c450 22 API calls 4504->4505 4506 471c3bd 4505->4506 4506->4482 4507->4502 4508->4498 4509->4498 4510->4498 4511->4486 4512->4493 4514 471b40b 4513->4514 4515 471b413 LeaveCriticalSection 4514->4515 4516 471b423 4514->4516 4515->4501 4517 471b47b 4516->4517 4518 471b45d memmove 4516->4518 4519 471b590 4 API calls 4517->4519 4518->4517 4520 471b48a LeaveCriticalSection 4519->4520 4520->4501 3968 47204d0 3969 47204ff Sleep 3968->3969 3970 4720507 PeekNamedPipe 3969->3970 3970->3969 3971 4720527 3970->3971 3971->3969 3972 472052f LocalAlloc ReadFile 3971->3972 3973 471ea90 22 API calls 3972->3973 3974 472056f LocalFree 3973->3974 3974->3970 4521 4720490 4522 47204ae WriteFile 4521->4522 4523 472049d 4521->4523 4523->4522 4524 47204a6 4523->4524 4527 471eb40 SetEvent 4524->4527 4526 47204ab 4527->4526 4528 4724590 calloc 3849 4720e54 3850 4720e59 3849->3850 3853 47275e2 3850->3853 3856 47275b6 3853->3856 3855 4720e72 3857 47275cb __dllonexit 3856->3857 3858 47275bf _onexit 3856->3858 3857->3855 3858->3855 3975 47213d8 3976 47213da GetTickCount 3975->3976 4020 4720ac0 GetVersionExW 3976->4020 3979 4721478 GetTickCount 3985 4721154 3979->3985 3980 4721159 atoi 3981 472116b sprintf OutputDebugStringA 3980->3981 3981->3985 3982 472121e GetLocalTime sprintf 3982->3985 3983 47212f9 atoi atoi atoi GetTickCount 3984 471bf20 52 API calls 3983->3984 3984->3985 3985->3979 3985->3980 3985->3981 3985->3982 3985->3983 3986 47214b8 3985->3986 3987 47212d7 Sleep 3985->3987 3988 4721391 sprintf 3985->3988 3992 47212c4 Sleep 3985->3992 3995 471bf20 52 API calls 3985->3995 4002 471c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 3985->4002 4044 471e400 3985->4044 4047 471c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 3986->4047 3987->3985 4003 4720e7e GetSystemDirectoryW lstrcatW CreateFileW ??2@YAPAXI 3988->4003 3991 47214c3 SetErrorMode 4048 471e450 3991->4048 3992->3985 3995->3985 3999 47213b4 3999->3976 4006 4727870 3999->4006 4000 471b880 11 API calls 4001 47214ee 4000->4001 4002->3985 4004 4720f00 WriteFile CloseHandle 4003->4004 4005 4720eef 4003->4005 4004->3999 4005->4004 4007 472787d 4006->4007 4008 4727886 4006->4008 4007->3999 4009 472789b 4008->4009 4010 47278b6 VirtualAlloc 4008->4010 4009->3999 4011 47278cc 4010->4011 4012 47278d3 4010->4012 4011->3999 4052 4727a10 4012->4052 4015 4727907 VirtualFree 4015->3999 4016 472791d VirtualProtect 4017 4727945 4016->4017 4018 472796d 4017->4018 4019 472794f VirtualFree 4017->4019 4018->3999 4019->3999 4057 4720a70 gethostname MultiByteToWideChar lstrlenW 4020->4057 4022 4720b2a getsockname 4058 4720630 LoadLibraryW GetProcAddress GetProcAddress GetProcAddress 4022->4058 4025 4720bd4 GetSystemInfo 4028 4720bf7 4025->4028 4026 4720bb8 4026->4025 4027 4720bc3 lstrcpyW 4026->4027 4027->4028 4062 47206c0 LoadLibraryW GetProcAddress 4028->4062 4032 4720c1e 4033 4720c48 GlobalMemoryStatus GetTickCount 4032->4033 4034 4720c9b 4033->4034 4071 4720730 _wcsrev 4034->4071 4038 4720d4d lstrlenW 4039 4720db0 4038->4039 4040 4720d68 mbstowcs 4038->4040 4041 4720dc0 lstrcpyW mbstowcs 4039->4041 4040->4041 4042 471c450 22 API calls 4041->4042 4043 4720e26 4042->4043 4043->3985 4045 471e416 4044->4045 4046 471e40b lstrcpyW 4044->4046 4045->3985 4046->4045 4047->3991 4050 471e484 4048->4050 4167 471ea60 CloseHandle 4050->4167 4051 471e4bd 4051->4000 4053 4727a2b 4052->4053 4054 4727903 4052->4054 4053->4054 4055 4727a9b LoadLibraryA GetModuleHandleA 4053->4055 4056 4727ad8 GetProcAddress 4053->4056 4054->4015 4054->4016 4055->4053 4055->4054 4056->4053 4056->4054 4057->4022 4059 4720684 4058->4059 4060 47206b3 GetVersionExW 4059->4060 4061 47206ac FreeLibrary 4059->4061 4060->4025 4060->4026 4061->4060 4063 47206e9 4062->4063 4064 4720714 4063->4064 4065 472070d FreeLibrary 4063->4065 4066 47205d0 4064->4066 4065->4064 4067 47205e9 4066->4067 4068 47205f0 4067->4068 4069 47205f5 DeviceIoControl 4067->4069 4068->4032 4070 472061d 4069->4070 4070->4032 4128 4721760 6 API calls 4071->4128 4073 4720754 4074 4720763 lstrcatW lstrcatW 4073->4074 4075 4720781 _wcsrev 4073->4075 4074->4075 4076 4721760 9 API calls 4075->4076 4077 472078e 4076->4077 4078 47207b3 _wcsrev 4077->4078 4079 4720795 lstrcatW lstrcatW 4077->4079 4080 4721760 9 API calls 4078->4080 4079->4078 4081 47207c0 4080->4081 4082 47207c7 lstrcatW lstrcatW 4081->4082 4083 47207e5 _wcsrev 4081->4083 4082->4083 4084 4721760 9 API calls 4083->4084 4085 47207f2 4084->4085 4086 4720817 _wcsrev 4085->4086 4087 47207f9 lstrcatW lstrcatW 4085->4087 4088 4721760 9 API calls 4086->4088 4087->4086 4089 4720824 4088->4089 4090 472082b lstrcatW lstrcatW 4089->4090 4091 4720849 _wcsrev 4089->4091 4090->4091 4092 4721760 9 API calls 4091->4092 4093 4720856 4092->4093 4094 472087b _wcsrev 4093->4094 4095 472085d lstrcatW lstrcatW 4093->4095 4096 4721760 9 API calls 4094->4096 4095->4094 4097 4720888 4096->4097 4098 472088f lstrcatW lstrcatW 4097->4098 4099 47208ad _wcsrev 4097->4099 4098->4099 4100 4721760 9 API calls 4099->4100 4101 47208ba 4100->4101 4102 47208c1 lstrcatW lstrcatW 4101->4102 4103 47208df _wcsrev 4101->4103 4102->4103 4104 4721760 9 API calls 4103->4104 4105 47208ec 4104->4105 4106 47208f3 lstrcatW lstrcatW 4105->4106 4107 4720911 _wcsrev 4105->4107 4106->4107 4108 4721760 9 API calls 4107->4108 4109 472091e 4108->4109 4110 4720943 _wcsrev 4109->4110 4111 4720925 lstrcatW lstrcatW 4109->4111 4112 4721760 9 API calls 4110->4112 4111->4110 4113 4720950 4112->4113 4114 4720957 lstrcatW lstrcatW 4113->4114 4115 4720975 _wcsrev 4113->4115 4114->4115 4116 4721760 9 API calls 4115->4116 4117 4720982 4116->4117 4118 47209a7 wcsstr 4117->4118 4119 4720989 lstrcatW lstrcatW 4117->4119 4120 47209ca lstrcpyW 4118->4120 4121 47209be lstrcatW 4118->4121 4119->4118 4122 47209e0 4120->4122 4121->4120 4123 4720a2d 4122->4123 4135 471fa30 6 API calls 4123->4135 4125 4720a49 lstrlenW 4126 4720a59 4125->4126 4127 4720a5e lstrlenW 4125->4127 4126->4127 4127->4038 4129 47218a2 4128->4129 4130 47218f9 4128->4130 4131 47218f2 CloseHandle 4129->4131 4132 47218bd lstrcmpiW 4129->4132 4134 47218d9 CloseHandle 4129->4134 4130->4073 4131->4130 4132->4129 4133 47218ed 4132->4133 4133->4131 4134->4073 4152 471f7e0 9 API calls 4135->4152 4138 471fb33 4139 471fb14 4138->4139 4141 471fe7a lstrcatW 4138->4141 4142 471fb47 4138->4142 4143 471fdce 4138->4143 4151 471fba4 4138->4151 4144 471feb4 4139->4144 4145 471fead FreeLibrary 4139->4145 4140 471fd55 4140->4139 4140->4143 4141->4125 4142->4139 4158 471f7b0 4142->4158 4143->4141 4144->4125 4145->4144 4146 471fcce 4146->4139 4150 471fd38 lstrcatW 4146->4150 4149 471fc1c lstrcpyW 4149->4139 4150->4146 4151->4139 4151->4149 4155 471f8b1 4152->4155 4156 471f918 GetProcessHeap HeapAlloc 4155->4156 4157 471f938 4155->4157 4156->4157 4162 471f9cc LoadLibraryW GetProcAddress GetProcAddress 4157->4162 4159 471f7bb 4158->4159 4161 471f7d5 lstrcpyW 4159->4161 4166 471f6f0 CompareStringW 4159->4166 4161->4139 4163 471f9f7 4162->4163 4164 471f9af 4163->4164 4165 471fa01 GetProcessHeap HeapFree 4163->4165 4164->4138 4164->4139 4164->4140 4164->4141 4164->4142 4164->4143 4164->4146 4164->4151 4165->4164 4166->4159 4167->4051 3859 471ea40 3864 471ea60 CloseHandle 3859->3864 3861 471ea48 3862 471ea58 3861->3862 3863 471ea4f ??3@YAXPAX 3861->3863 3863->3862 3864->3861 4168 471dec0 4169 471dec8 4168->4169 4170 471ded8 4169->4170 4171 471decf ??3@YAXPAX 4169->4171 4171->4170 4529 471e180 4530 471b780 6 API calls 4529->4530 4531 471e1a4 4530->4531 4532 471bf20 52 API calls 4531->4532 4533 471e1c3 4532->4533 4534 471e1f5 4533->4534 4535 471e1c7 4533->4535 4546 4720100 4534->4546 4536 471b880 11 API calls 4535->4536 4539 471e1db 4536->4539 4541 471e214 4542 4720390 12 API calls 4541->4542 4543 471e225 4542->4543 4544 471b880 11 API calls 4543->4544 4545 471e239 4544->4545 4547 471ea10 CreateEventW 4546->4547 4548 4720132 LoadLibraryA GetProcAddress CreatePipe 4547->4548 4549 47201f3 CreatePipe 4548->4549 4558 471e203 4548->4558 4550 4720229 GetStartupInfoW GetSystemDirectoryW lstrcatW lstrcatW CreateProcessW 4549->4550 4549->4558 4551 47202f3 4550->4551 4550->4558 4552 471ea90 22 API calls 4551->4552 4553 4720314 4552->4553 4561 471eb00 WaitForSingleObject Sleep 4553->4561 4555 472031b 4556 47216e0 13 API calls 4555->4556 4557 4720330 4556->4557 4559 47216e0 13 API calls 4557->4559 4560 471c170 WaitForSingleObject 4558->4560 4559->4558 4560->4541 4561->4555 3957 4727e00 ??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE 4562 4720580 WaitForMultipleObjects TerminateThread TerminateProcess 4565 471c3d0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 4562->4565 4564 47205c7 4565->4564 3865 4720f4d mbstowcs 3866 4720fb3 3865->3866 3867 4720fba CreateProcessW 3866->3867 3868 4720fe8 3866->3868 3867->3868

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 0 471eb90-471f6e6 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress
          APIs
          • LoadLibraryA.KERNEL32(kernel32.dll,OutputDebugStringA,?,?,047215B4), ref: 0471EBA2
          • GetProcAddress.KERNEL32(00000000), ref: 0471EBAB
          • LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatus,?,?,047215B4), ref: 0471EBBC
          • GetProcAddress.KERNEL32(00000000), ref: 0471EBBF
          • LoadLibraryA.KERNEL32(kernel32.dll,DeviceIoControl,?,?,047215B4), ref: 0471EBD0
          • GetProcAddress.KERNEL32(00000000), ref: 0471EBD3
          • LoadLibraryA.KERNEL32(kernel32.dll,GetSystemInfo,?,?,047215B4), ref: 0471EBE4
          • GetProcAddress.KERNEL32(00000000), ref: 0471EBE7
          • LoadLibraryA.KERNEL32(kernel32.dll,GetVersionExW,?,?,047215B4), ref: 0471EBF8
          • GetProcAddress.KERNEL32(00000000), ref: 0471EBFB
          • LoadLibraryA.KERNELBASE(wininet.dll,InternetQueryOptionA,?,?,047215B4), ref: 0471EC0C
          • GetProcAddress.KERNEL32(00000000), ref: 0471EC0F
          • LoadLibraryA.KERNEL32(USER32.dll,PostThreadMessageW,?,?,047215B4), ref: 0471EC20
          • GetProcAddress.KERNEL32(00000000), ref: 0471EC23
          • LoadLibraryA.KERNEL32(USER32.dll,GetInputState,?,?,047215B4), ref: 0471EC34
          • GetProcAddress.KERNEL32(00000000), ref: 0471EC37
          • LoadLibraryA.KERNEL32(USER32.dll,OpenDesktopW,?,?,047215B4), ref: 0471EC48
          • GetProcAddress.KERNEL32(00000000), ref: 0471EC4B
          • LoadLibraryA.KERNEL32(USER32.dll,GetUserObjectInformationW,?,?,047215B4), ref: 0471EC5C
          • GetProcAddress.KERNEL32(00000000), ref: 0471EC5F
          • LoadLibraryA.KERNEL32(USER32.dll,CloseDesktop,?,?,047215B4), ref: 0471EC70
          • GetProcAddress.KERNEL32(00000000), ref: 0471EC73
          • LoadLibraryA.KERNEL32(USER32.dll,wsprintfW,?,?,047215B4), ref: 0471EC84
          • GetProcAddress.KERNEL32(00000000), ref: 0471EC87
          • LoadLibraryA.KERNEL32(USER32.dll,CharNextW,?,?,047215B4), ref: 0471EC98
          • GetProcAddress.KERNEL32(00000000), ref: 0471EC9B
          • LoadLibraryW.KERNEL32(gdi32.dll,CreateCompatibleBitmap,?,?,047215B4), ref: 0471ECB2
          • GetProcAddress.KERNEL32(00000000), ref: 0471ECB5
          • LoadLibraryW.KERNEL32(gdi32.dll,GetDIBits,?,?,047215B4), ref: 0471ECC6
          • GetProcAddress.KERNEL32(00000000), ref: 0471ECC9
          • LoadLibraryW.KERNEL32(gdi32.dll,BitBlt,?,?,047215B4), ref: 0471ECDA
          • GetProcAddress.KERNEL32(00000000), ref: 0471ECDD
          • LoadLibraryW.KERNEL32(gdi32.dll,DeleteDC,?,?,047215B4), ref: 0471ECEE
          • GetProcAddress.KERNEL32(00000000), ref: 0471ECF1
          • LoadLibraryW.KERNEL32(gdi32.dll,DeleteObject,?,?,047215B4), ref: 0471ED02
          • GetProcAddress.KERNEL32(00000000), ref: 0471ED05
          • LoadLibraryW.KERNEL32(gdi32.dll,CreateCompatibleDC,?,?,047215B4), ref: 0471ED16
          • GetProcAddress.KERNEL32(00000000), ref: 0471ED19
          • LoadLibraryW.KERNEL32(gdi32.dll,CreateDIBSection,?,?,047215B4), ref: 0471ED2A
          • GetProcAddress.KERNEL32(00000000), ref: 0471ED2D
          • LoadLibraryW.KERNEL32(gdi32.dll,SelectObject,?,?,047215B4), ref: 0471ED3E
          • GetProcAddress.KERNEL32(00000000), ref: 0471ED41
          • LoadLibraryW.KERNEL32(kernel32.dll,RemoveDirectoryW,?,?,047215B4), ref: 0471ED52
          • GetProcAddress.KERNEL32(00000000), ref: 0471ED55
          • LoadLibraryW.KERNEL32(kernel32.dll,FindClose,?,?,047215B4), ref: 0471ED66
          • GetProcAddress.KERNEL32(00000000), ref: 0471ED69
          • LoadLibraryW.KERNEL32(kernel32.dll,FindNextFileW,?,?,047215B4), ref: 0471ED7A
          • GetProcAddress.KERNEL32(00000000), ref: 0471ED7D
          • LoadLibraryW.KERNEL32(kernel32.dll,FindFirstFileW,?,?,047215B4), ref: 0471ED8E
          • GetProcAddress.KERNEL32(00000000), ref: 0471ED91
          • LoadLibraryW.KERNEL32(kernel32.dll,GetDriveTypeA,?,?,047215B4), ref: 0471EDA2
          • GetProcAddress.KERNEL32(00000000), ref: 0471EDA5
          • LoadLibraryW.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,?,?,047215B4), ref: 0471EDB6
          • GetProcAddress.KERNEL32(00000000), ref: 0471EDB9
          • LoadLibraryW.KERNEL32(kernel32.dll,GetVolumeInformationA,?,?,047215B4), ref: 0471EDCA
          • GetProcAddress.KERNEL32(00000000), ref: 0471EDCD
          • LoadLibraryW.KERNEL32(kernel32.dll,GetLogicalDriveStringsA,?,?,047215B4), ref: 0471EDDE
          • GetProcAddress.KERNEL32(00000000), ref: 0471EDE1
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateDirectoryW,?,?,047215B4), ref: 0471EDF2
          • GetProcAddress.KERNEL32(00000000), ref: 0471EDF5
          • LoadLibraryW.KERNEL32(kernel32.dll,GetFileAttributesW,?,?,047215B4), ref: 0471EE06
          • GetProcAddress.KERNEL32(00000000), ref: 0471EE09
          • LoadLibraryW.KERNEL32(kernel32.dll,UnmapViewOfFile,?,?,047215B4), ref: 0471EE1A
          • GetProcAddress.KERNEL32(00000000), ref: 0471EE1D
          • LoadLibraryW.KERNEL32(kernel32.dll,MapViewOfFile,?,?,047215B4), ref: 0471EE2E
          • GetProcAddress.KERNEL32(00000000), ref: 0471EE31
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateFileMappingW,?,?,047215B4), ref: 0471EE42
          • GetProcAddress.KERNEL32(00000000), ref: 0471EE45
          • LoadLibraryW.KERNEL32(kernel32.dll,SetFilePointer,?,?,047215B4), ref: 0471EE56
          • GetProcAddress.KERNEL32(00000000), ref: 0471EE59
          • LoadLibraryW.KERNEL32(user32.dll,GetForegroundWindow,?,?,047215B4), ref: 0471EE6A
          • GetProcAddress.KERNEL32(00000000), ref: 0471EE6D
          • LoadLibraryW.KERNEL32(kernel32.dll,GetCurrentThreadId,?,?,047215B4), ref: 0471EE7E
          • GetProcAddress.KERNEL32(00000000), ref: 0471EE81
          • LoadLibraryW.KERNEL32(kernel32.dll,TerminateThread,?,?,047215B4), ref: 0471EE92
          • GetProcAddress.KERNEL32(00000000), ref: 0471EE95
          • LoadLibraryW.KERNEL32(avicap32.dll,capGetDriverDescriptionW,?,?,047215B4), ref: 0471EEA6
          • GetProcAddress.KERNEL32(00000000), ref: 0471EEA9
          • LoadLibraryW.KERNEL32(avicap32.dll,capCreateCaptureWindowW,?,?,047215B4), ref: 0471EEBA
          • GetProcAddress.KERNEL32(00000000), ref: 0471EEBD
          • LoadLibraryW.KERNEL32(user32.dll,GetClipboardData,?,?,047215B4), ref: 0471EECE
          • GetProcAddress.KERNEL32(00000000), ref: 0471EED1
          • LoadLibraryW.KERNEL32(user32.dll,CloseClipboard,?,?,047215B4), ref: 0471EEE2
          • GetProcAddress.KERNEL32(00000000), ref: 0471EEE5
          • LoadLibraryW.KERNEL32(user32.dll,SetClipboardData,?,?,047215B4), ref: 0471EEF6
          • GetProcAddress.KERNEL32(00000000), ref: 0471EEF9
          • LoadLibraryW.KERNEL32(user32.dll,EmptyClipboard,?,?,047215B4), ref: 0471EF0A
          • GetProcAddress.KERNEL32(00000000), ref: 0471EF0D
          • LoadLibraryW.KERNEL32(user32.dll,SendMessageW,?,?,047215B4), ref: 0471EF1E
          • GetProcAddress.KERNEL32(00000000), ref: 0471EF21
          • LoadLibraryW.KERNEL32(user32.dll,GetSystemMetrics,?,?,047215B4), ref: 0471EF32
          • GetProcAddress.KERNEL32(00000000), ref: 0471EF35
          • LoadLibraryW.KERNEL32(user32.dll,OpenClipboard,?,?,047215B4), ref: 0471EF46
          • GetProcAddress.KERNEL32(00000000), ref: 0471EF49
          • LoadLibraryW.KERNEL32(user32.dll,SystemParametersInfoW,?,?,047215B4), ref: 0471EF5A
          • GetProcAddress.KERNEL32(00000000), ref: 0471EF5D
          • LoadLibraryW.KERNEL32(user32.dll,BlockInput,?,?,047215B4), ref: 0471EF6E
          • GetProcAddress.KERNEL32(00000000), ref: 0471EF71
          • LoadLibraryW.KERNEL32(kernel32.dll,InterlockedExchange,?,?,047215B4), ref: 0471EF82
          • GetProcAddress.KERNEL32(00000000), ref: 0471EF85
          • LoadLibraryW.KERNEL32(kernel32.dll,VirtualFree,?,?,047215B4), ref: 0471EF96
          • GetProcAddress.KERNEL32(00000000), ref: 0471EF99
          • LoadLibraryW.KERNEL32(kernel32.dll,VirtualAlloc,?,?,047215B4), ref: 0471EFAA
          • GetProcAddress.KERNEL32(00000000), ref: 0471EFAD
          • LoadLibraryW.KERNEL32(kernel32.dll,ReleaseMutex,?,?,047215B4), ref: 0471EFBE
          • GetProcAddress.KERNEL32(00000000), ref: 0471EFC1
          • LoadLibraryW.KERNEL32(kernel32.dll,CloseHandle,?,?,047215B4), ref: 0471EFD2
          • GetProcAddress.KERNEL32(00000000), ref: 0471EFD5
          • LoadLibraryW.KERNEL32(kernel32.dll,GetLastError,?,?,047215B4), ref: 0471EFE6
          • GetProcAddress.KERNEL32(00000000), ref: 0471EFE9
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateMutexA,?,?,047215B4), ref: 0471EFFA
          • GetProcAddress.KERNEL32(00000000), ref: 0471EFFD
          • LoadLibraryW.KERNEL32(kernel32.dll,WinExec,?,?,047215B4), ref: 0471F00E
          • GetProcAddress.KERNEL32(00000000), ref: 0471F011
          • LoadLibraryW.KERNEL32(kernel32.dll,InitializeCriticalSection,?,?,047215B4), ref: 0471F022
          • GetProcAddress.KERNEL32(00000000), ref: 0471F025
          • LoadLibraryW.KERNEL32(kernel32.dll,DeleteCriticalSection,?,?,047215B4), ref: 0471F036
          • GetProcAddress.KERNEL32(00000000), ref: 0471F039
          • LoadLibraryW.KERNEL32(kernel32.dll,LeaveCriticalSection,?,?,047215B4), ref: 0471F04A
          • GetProcAddress.KERNEL32(00000000), ref: 0471F04D
          • LoadLibraryW.KERNEL32(kernel32.dll,EnterCriticalSection,?,?,047215B4), ref: 0471F05E
          • GetProcAddress.KERNEL32(00000000), ref: 0471F061
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateFileW,?,?,047215B4), ref: 0471F072
          • GetProcAddress.KERNEL32(00000000), ref: 0471F075
          • LoadLibraryW.KERNEL32(kernel32.dll,WriteFile,?,?,047215B4), ref: 0471F086
          • GetProcAddress.KERNEL32(00000000), ref: 0471F089
          • LoadLibraryW.KERNEL32(kernel32.dll,MoveFileW,?,?,047215B4), ref: 0471F09A
          • GetProcAddress.KERNEL32(00000000), ref: 0471F09D
          • LoadLibraryW.KERNEL32(kernel32.dll,DeleteFileW,?,?,047215B4), ref: 0471F0AE
          • GetProcAddress.KERNEL32(00000000), ref: 0471F0B1
          • LoadLibraryW.KERNEL32(advapi32.dll,OpenSCManagerW,?,?,047215B4), ref: 0471F0C2
          • GetProcAddress.KERNEL32(00000000), ref: 0471F0C5
          • LoadLibraryW.KERNEL32(advapi32.dll,OpenServiceW,?,?,047215B4), ref: 0471F0D6
          • GetProcAddress.KERNEL32(00000000), ref: 0471F0D9
          • LoadLibraryW.KERNEL32(advapi32.dll,ChangeServiceConfigW,?,?,047215B4), ref: 0471F0EA
          • GetProcAddress.KERNEL32(00000000), ref: 0471F0ED
          • LoadLibraryW.KERNEL32(advapi32.dll,ControlService,?,?,047215B4), ref: 0471F0FE
          • GetProcAddress.KERNEL32(00000000), ref: 0471F101
          • LoadLibraryW.KERNEL32(kernel32.dll,Sleep,?,?,047215B4), ref: 0471F112
          • GetProcAddress.KERNEL32(00000000), ref: 0471F115
          • LoadLibraryW.KERNEL32(advapi32.dll,StartServiceW,?,?,047215B4), ref: 0471F126
          • GetProcAddress.KERNEL32(00000000), ref: 0471F129
          • LoadLibraryW.KERNEL32(advapi32.dll,CloseServiceHandle,?,?,047215B4), ref: 0471F13A
          • GetProcAddress.KERNEL32(00000000), ref: 0471F13D
          • LoadLibraryW.KERNEL32(kernel32.dll,GetModuleFileNameW,?,?,047215B4), ref: 0471F14E
          • GetProcAddress.KERNEL32(00000000), ref: 0471F151
          • LoadLibraryW.KERNEL32(kernel32.dll,GetTempPathW,?,?,047215B4), ref: 0471F162
          • GetProcAddress.KERNEL32(00000000), ref: 0471F165
          • LoadLibraryW.KERNEL32(kernel32.dll,GetSystemDirectoryW,?,?,047215B4), ref: 0471F176
          • GetProcAddress.KERNEL32(00000000), ref: 0471F179
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateProcessW,?,?,047215B4), ref: 0471F18A
          • GetProcAddress.KERNEL32(00000000), ref: 0471F18D
          • LoadLibraryW.KERNEL32(wininet.dll,InternetOpenW,?,?,047215B4), ref: 0471F19E
          • GetProcAddress.KERNEL32(00000000), ref: 0471F1A1
          • LoadLibraryW.KERNEL32(wininet.dll,InternetCloseHandle,?,?,047215B4), ref: 0471F1B2
          • GetProcAddress.KERNEL32(00000000), ref: 0471F1B5
          • LoadLibraryW.KERNEL32(wininet.dll,InternetGetConnectedState,?,?,047215B4), ref: 0471F1C6
          • GetProcAddress.KERNEL32(00000000), ref: 0471F1C9
          • LoadLibraryW.KERNEL32(wininet.dll,InternetOpenUrlA,?,?,047215B4), ref: 0471F1DA
          • GetProcAddress.KERNEL32(00000000), ref: 0471F1DD
          • LoadLibraryW.KERNEL32(wininet.dll,InternetOpenUrlW,?,?,047215B4), ref: 0471F1EE
          • GetProcAddress.KERNEL32(00000000), ref: 0471F1F1
          • LoadLibraryW.KERNEL32(wininet.dll,InternetReadFile,?,?,047215B4), ref: 0471F202
          • GetProcAddress.KERNEL32(00000000), ref: 0471F205
          • LoadLibraryW.KERNEL32(user32.dll,mouse_event,?,?,047215B4), ref: 0471F216
          • GetProcAddress.KERNEL32(00000000), ref: 0471F219
          • LoadLibraryW.KERNEL32(user32.dll,keybd_event,?,?,047215B4), ref: 0471F22A
          • GetProcAddress.KERNEL32(00000000), ref: 0471F22D
          • LoadLibraryW.KERNEL32(user32.dll,EnumWindows,?,?,047215B4), ref: 0471F23E
          • GetProcAddress.KERNEL32(00000000), ref: 0471F241
          • LoadLibraryW.KERNEL32(user32.dll,SetCursorPos,?,?,047215B4), ref: 0471F252
          • GetProcAddress.KERNEL32(00000000), ref: 0471F255
          • LoadLibraryW.KERNEL32(user32.dll,WindowFromPoint,?,?,047215B4), ref: 0471F266
          • GetProcAddress.KERNEL32(00000000), ref: 0471F269
          • LoadLibraryW.KERNEL32(user32.dll,SetCapture,?,?,047215B4), ref: 0471F27A
          • GetProcAddress.KERNEL32(00000000), ref: 0471F27D
          • LoadLibraryW.KERNEL32(user32.dll,GetWindowTextW,?,?,047215B4), ref: 0471F28E
          • GetProcAddress.KERNEL32(00000000), ref: 0471F291
          • LoadLibraryW.KERNEL32(user32.dll,IsWindowVisible,?,?,047215B4), ref: 0471F2A2
          • GetProcAddress.KERNEL32(00000000), ref: 0471F2A5
          • LoadLibraryW.KERNEL32(user32.dll,GetWindowThreadProcessId,?,?,047215B4), ref: 0471F2B6
          • GetProcAddress.KERNEL32(00000000), ref: 0471F2B9
          • LoadLibraryW.KERNEL32(user32.dll,ExitWindowsEx,?,?,047215B4), ref: 0471F2CA
          • GetProcAddress.KERNEL32(00000000), ref: 0471F2CD
          • LoadLibraryW.KERNEL32(advapi32.dll,OpenProcessToken,?,?,047215B4), ref: 0471F2DE
          • GetProcAddress.KERNEL32(00000000), ref: 0471F2E1
          • LoadLibraryW.KERNEL32(advapi32.dll,LookupPrivilegeValueW,?,?,047215B4), ref: 0471F2F2
          • GetProcAddress.KERNEL32(00000000), ref: 0471F2F5
          • LoadLibraryW.KERNEL32(advapi32.dll,AdjustTokenPrivileges,?,?,047215B4), ref: 0471F306
          • GetProcAddress.KERNEL32(00000000), ref: 0471F309
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateToolhelp32Snapshot,?,?,047215B4), ref: 0471F31A
          • GetProcAddress.KERNEL32(00000000), ref: 0471F31D
          • LoadLibraryW.KERNEL32(kernel32.dll,Process32FirstW,?,?,047215B4), ref: 0471F32E
          • GetProcAddress.KERNEL32(00000000), ref: 0471F331
          • LoadLibraryW.KERNEL32(kernel32.dll,CreateThread,?,?,047215B4), ref: 0471F342
          • GetProcAddress.KERNEL32(00000000), ref: 0471F345
          • LoadLibraryW.KERNEL32(kernel32.dll,CopyFileW,?,?,047215B4), ref: 0471F356
          • GetProcAddress.KERNEL32(00000000), ref: 0471F359
          • LoadLibraryW.KERNEL32(kernel32.dll,SetFileAttributesW,?,?,047215B4), ref: 0471F36A
          • GetProcAddress.KERNEL32(00000000), ref: 0471F36D
          • LoadLibraryW.KERNEL32(kernel32.dll,WaitForSingleObject,?,?,047215B4), ref: 0471F37E
          • GetProcAddress.KERNEL32(00000000), ref: 0471F381
          • LoadLibraryW.KERNEL32(kernel32.dll,OpenEventW,?,?,047215B4), ref: 0471F392
          • GetProcAddress.KERNEL32(00000000), ref: 0471F395
          • LoadLibraryW.KERNEL32(kernel32.dll,ReadFile,?,?,047215B4), ref: 0471F3A6
          • GetProcAddress.KERNEL32(00000000), ref: 0471F3A9
          • LoadLibraryW.KERNEL32(shell32.dll,ShellExecuteW,?,?,047215B4), ref: 0471F3BA
          • GetProcAddress.KERNEL32(00000000), ref: 0471F3BD
          • LoadLibraryW.KERNEL32(kernel32.dll,TerminateProcess,?,?,047215B4), ref: 0471F3CE
          • GetProcAddress.KERNEL32(00000000), ref: 0471F3D1
          • LoadLibraryW.KERNEL32(kernel32.dll,OpenProcess,?,?,047215B4), ref: 0471F3E2
          • GetProcAddress.KERNEL32(00000000), ref: 0471F3E5
          • LoadLibraryW.KERNEL32(user32.dll,GetAsyncKeyState,?,?,047215B4), ref: 0471F3F6
          • GetProcAddress.KERNEL32(00000000), ref: 0471F3F9
          • LoadLibraryW.KERNEL32(user32.dll,GetKeyState,?,?,047215B4), ref: 0471F40A
          • GetProcAddress.KERNEL32(00000000), ref: 0471F40D
          • LoadLibraryW.KERNEL32(user32.dll,FindWindowW,?,?,047215B4), ref: 0471F41E
          • GetProcAddress.KERNEL32(00000000), ref: 0471F421
          • LoadLibraryW.KERNEL32(user32.dll,PostMessageW,?,?,047215B4), ref: 0471F432
          • GetProcAddress.KERNEL32(00000000), ref: 0471F435
          • LoadLibraryW.KERNEL32(user32.dll,GetMessageW,?,?,047215B4), ref: 0471F446
          • GetProcAddress.KERNEL32(00000000), ref: 0471F449
          • LoadLibraryW.KERNEL32(user32.dll,DispatchMessageW,?,?,047215B4), ref: 0471F45A
          • GetProcAddress.KERNEL32(00000000), ref: 0471F45D
          • LoadLibraryW.KERNEL32(user32.dll,TranslateMessage,?,?,047215B4), ref: 0471F46E
          • GetProcAddress.KERNEL32(00000000), ref: 0471F471
          • LoadLibraryW.KERNEL32(advapi32.dll,RegCloseKey,?,?,047215B4), ref: 0471F482
          • GetProcAddress.KERNEL32(00000000), ref: 0471F485
          • LoadLibraryW.KERNEL32(advapi32.dll,RegCreateKeyW,?,?,047215B4), ref: 0471F496
          • GetProcAddress.KERNEL32(00000000), ref: 0471F499
          • LoadLibraryW.KERNEL32(advapi32.dll,RegOpenKeyW,?,?,047215B4), ref: 0471F4AA
          • GetProcAddress.KERNEL32(00000000), ref: 0471F4AD
          • LoadLibraryW.KERNEL32(advapi32.dll,RegOpenKeyExW,?,?,047215B4), ref: 0471F4BE
          • GetProcAddress.KERNEL32(00000000), ref: 0471F4C1
          • LoadLibraryW.KERNEL32(advapi32.dll,RegQueryValueExA,?,?,047215B4), ref: 0471F4D2
          • GetProcAddress.KERNEL32(00000000), ref: 0471F4D5
          • LoadLibraryW.KERNEL32(advapi32.dll,RegQueryValueW,?,?,047215B4), ref: 0471F4E6
          • GetProcAddress.KERNEL32(00000000), ref: 0471F4E9
          • LoadLibraryW.KERNEL32(advapi32.dll,RegSetValueW,?,?,047215B4), ref: 0471F4FA
          • GetProcAddress.KERNEL32(00000000), ref: 0471F4FD
          • LoadLibraryW.KERNEL32(advapi32.dll,RegSetValueExW,?,?,047215B4), ref: 0471F50E
          • GetProcAddress.KERNEL32(00000000), ref: 0471F511
          • LoadLibraryW.KERNEL32(advapi32.dll,SetServiceStatus,?,?,047215B4), ref: 0471F522
          • GetProcAddress.KERNEL32(00000000), ref: 0471F525
          • LoadLibraryW.KERNEL32(advapi32.dll,RegisterServiceCtrlHandlerW,?,?,047215B4), ref: 0471F536
          • GetProcAddress.KERNEL32(00000000), ref: 0471F539
          • LoadLibraryW.KERNEL32(advapi32.dll,QueryServiceStatus,?,?,047215B4), ref: 0471F54A
          • GetProcAddress.KERNEL32(00000000), ref: 0471F54D
          • LoadLibraryW.KERNEL32(advapi32.dll,DeleteService,?,?,047215B4), ref: 0471F55E
          • GetProcAddress.KERNEL32(00000000), ref: 0471F561
          • LoadLibraryW.KERNEL32(advapi32.dll,RegCreateKeyExW,?,?,047215B4), ref: 0471F572
          • GetProcAddress.KERNEL32(00000000), ref: 0471F575
          • LoadLibraryW.KERNEL32(kernel32.dll,Process32NextW,?,?,047215B4), ref: 0471F586
          • GetProcAddress.KERNEL32(00000000), ref: 0471F589
          • LoadLibraryW.KERNEL32(advapi32.dll,RegEnumValueW,?,?,047215B4), ref: 0471F59A
          • GetProcAddress.KERNEL32(00000000), ref: 0471F59D
          • LoadLibraryW.KERNEL32(advapi32.dll,RegDeleteKeyW,?,?,047215B4), ref: 0471F5AE
          • GetProcAddress.KERNEL32(00000000), ref: 0471F5B1
          • LoadLibraryW.KERNEL32(advapi32.dll,RegDeleteValueW,?,?,047215B4), ref: 0471F5C2
          • GetProcAddress.KERNEL32(00000000), ref: 0471F5C5
          • LoadLibraryW.KERNEL32(advapi32.dll,RegEnumKeyExW,?,?,047215B4), ref: 0471F5D6
          • GetProcAddress.KERNEL32(00000000), ref: 0471F5D9
          • LoadLibraryW.KERNEL32(advapi32.dll,SetNamedSecurityInfoW,?,?,047215B4), ref: 0471F5EA
          • GetProcAddress.KERNEL32(00000000), ref: 0471F5ED
          • LoadLibraryW.KERNEL32(advapi32.dll,BuildExplicitAccessWithNameW,?,?,047215B4), ref: 0471F5FE
          • GetProcAddress.KERNEL32(00000000), ref: 0471F601
          • LoadLibraryW.KERNEL32(advapi32.dll,GetNamedSecurityInfoW,?,?,047215B4), ref: 0471F612
          • GetProcAddress.KERNEL32(00000000), ref: 0471F615
          • LoadLibraryW.KERNEL32(advapi32.dll,SetEntriesInAclW,?,?,047215B4), ref: 0471F626
          • GetProcAddress.KERNEL32(00000000), ref: 0471F629
          • LoadLibraryW.KERNEL32(advapi32.dll,ClearEventLogW,?,?,047215B4), ref: 0471F63A
          • GetProcAddress.KERNEL32(00000000), ref: 0471F63D
          • LoadLibraryW.KERNEL32(advapi32.dll,OpenEventLogW,?,?,047215B4), ref: 0471F64E
          • GetProcAddress.KERNEL32(00000000), ref: 0471F651
          • LoadLibraryW.KERNEL32(advapi32.dll,CloseEventLog,?,?,047215B4), ref: 0471F662
          • GetProcAddress.KERNEL32(00000000), ref: 0471F665
          • LoadLibraryW.KERNEL32(advapi32.dll,FreeSid,?,?,047215B4), ref: 0471F676
          • GetProcAddress.KERNEL32(00000000), ref: 0471F679
          • LoadLibraryW.KERNEL32(advapi32.dll,LookupAccountSidW,?,?,047215B4), ref: 0471F68A
          • GetProcAddress.KERNEL32(00000000), ref: 0471F68D
          • LoadLibraryW.KERNEL32(advapi32.dll,GetTokenInformationW,?,?,047215B4), ref: 0471F69E
          • GetProcAddress.KERNEL32(00000000), ref: 0471F6A1
          • LoadLibraryW.KERNEL32(psapi.dll,EnumProcessModules,?,?,047215B4), ref: 0471F6B2
          • GetProcAddress.KERNEL32(00000000), ref: 0471F6B5
          • LoadLibraryW.KERNEL32(psapi.dll,GetModuleFileNameExW,?,?,047215B4), ref: 0471F6C6
          • GetProcAddress.KERNEL32(00000000), ref: 0471F6C9
          • LoadLibraryW.KERNEL32(shell32.dll,SHGetFileInfoA,?,?,047215B4), ref: 0471F6DA
          • GetProcAddress.KERNEL32(00000000), ref: 0471F6DD
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: AddressLibraryLoadProc
          • String ID: AdjustTokenPrivileges$BitBlt$BlockInput$BuildExplicitAccessWithNameW$ChangeServiceConfigW$CharNextW$ClearEventLogW$CloseClipboard$CloseDesktop$CloseEventLog$CloseHandle$CloseServiceHandle$ControlService$CopyFileW$CreateCompatibleBitmap$CreateCompatibleDC$CreateDIBSection$CreateDirectoryW$CreateFileMappingW$CreateFileW$CreateMutexA$CreateProcessW$CreateThread$CreateToolhelp32Snapshot$DeleteCriticalSection$DeleteDC$DeleteFileW$DeleteObject$DeleteService$DeviceIoControl$DispatchMessageW$EmptyClipboard$EnterCriticalSection$EnumProcessModules$EnumWindows$ExitWindowsEx$FindClose$FindFirstFileW$FindNextFileW$FindWindowW$FreeSid$GetAsyncKeyState$GetClipboardData$GetCurrentThreadId$GetDIBits$GetDiskFreeSpaceExA$GetDriveTypeA$GetFileAttributesW$GetForegroundWindow$GetInputState$GetKeyState$GetLastError$GetLogicalDriveStringsA$GetMessageW$GetModuleFileNameExW$GetModuleFileNameW$GetNamedSecurityInfoW$GetSystemDirectoryW$GetSystemInfo$GetSystemMetrics$GetTempPathW$GetTokenInformationW$GetUserObjectInformationW$GetVersionExW$GetVolumeInformationA$GetWindowTextW$GetWindowThreadProcessId$GlobalMemoryStatus$InitializeCriticalSection$InterlockedExchange$InternetCloseHandle$InternetGetConnectedState$InternetOpenUrlA$InternetOpenUrlW$InternetOpenW$InternetQueryOptionA$InternetReadFile$IsWindowVisible$LeaveCriticalSection$LookupAccountSidW$LookupPrivilegeValueW$MapViewOfFile$MoveFileW$OpenClipboard$OpenDesktopW$OpenEventLogW$OpenEventW$OpenProcess$OpenProcessToken$OpenSCManagerW$OpenServiceW$OutputDebugStringA$PostMessageW$PostThreadMessageW$Process32FirstW$Process32NextW$QueryServiceStatus$ReadFile$RegCloseKey$RegCreateKeyExW$RegCreateKeyW$RegDeleteKeyW$RegDeleteValueW$RegEnumKeyExW$RegEnumValueW$RegOpenKeyExW$RegOpenKeyW$RegQueryValueExA$RegQueryValueW$RegSetValueExW$RegSetValueW$RegisterServiceCtrlHandlerW$ReleaseMutex$RemoveDirectoryW$SHGetFileInfoA$SelectObject$SendMessageW$SetCapture$SetClipboardData$SetCursorPos$SetEntriesInAclW$SetFileAttributesW$SetFilePointer$SetNamedSecurityInfoW$SetServiceStatus$ShellExecuteW$Sleep$StartServiceW$SystemParametersInfoW$TerminateProcess$TerminateThread$TranslateMessage$USER32.dll$UnmapViewOfFile$VirtualAlloc$VirtualFree$WaitForSingleObject$WinExec$WindowFromPoint$WriteFile$advapi32.dll$avicap32.dll$capCreateCaptureWindowW$capGetDriverDescriptionW$gdi32.dll$kernel32.dll$kernel32.dll$keybd_event$mouse_event$psapi.dll$shell32.dll$user32.dll$wininet.dll$wininet.dll$wsprintfW
          • API String ID: 2574300362-3174654482
          • Opcode ID: 4b3a07ed931f22022407bc04b3394529aabd129c747129d022545979029462d2
          • Instruction ID: f562bdcb62c2bc439c6be1a9ea112948764e257c9d0ec980b2802bb2c7cea0f3
          • Opcode Fuzzy Hash: 4b3a07ed931f22022407bc04b3394529aabd129c747129d022545979029462d2
          • Instruction Fuzzy Hash: 3C3273E0E8039977DF30BBBA5D0ED8B2F59E998E507854916B3049F720DABDA400CF95
          APIs
          • lstrlenW.KERNEL32(?,?,?,?), ref: 0471D5A8
          • FindFirstFileW.KERNEL32(?,?), ref: 0471D5F2
          • wcslen.MSVCRT ref: 0471D679
          • ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z.MSVCP60(00000000,00000001), ref: 0471D68B
          • ??2@YAPAXI@Z.MSVCRT(00000018), ref: 0471D6C6
          • ??3@YAXPAX@Z.MSVCRT(?), ref: 0471D723
          • FindNextFileW.KERNEL32(?,?), ref: 0471D74C
          • FindClose.KERNEL32(?), ref: 0471D75F
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: Find$File$??2@??3@CloseFirstG@2@@std@@G@std@@Grow@?$basic_string@NextU?$char_traits@V?$allocator@lstrlenwcslen
          • String ID: %s%s%s$%s%s*.*$.
          • API String ID: 1916976614-1343461528
          • Opcode ID: 8111cc6aa803deae3075abc91651f967ef882b7fa02f6a8db1f509a31faf284a
          • Instruction ID: c1716811ba9ec4e7aeadd9bafa74b5dbb68e288a197993d89eff4bb896bb5545
          • Opcode Fuzzy Hash: 8111cc6aa803deae3075abc91651f967ef882b7fa02f6a8db1f509a31faf284a
          • Instruction Fuzzy Hash: 005181B15083809BC320DF29C988AABBBE8FF88714F444A1DF59997361E775B505CF92
          APIs
          • LocalAlloc.KERNEL32(00000040,00002800), ref: 0471CFC3
          • FindFirstFileW.KERNEL32(?,?), ref: 0471CFF6
          • LocalReAlloc.KERNEL32(00000000,000025D0,00000042), ref: 0471D047
          • lstrcmpW.KERNEL32(?,047114C4), ref: 0471D059
          • lstrcmpW.KERNEL32(?,047114BC), ref: 0471D06D
          • lstrlenW.KERNEL32(?), ref: 0471D087
          • FindNextFileW.KERNEL32(00000000,?), ref: 0471D0E8
          • LocalFree.KERNEL32(00000000), ref: 0471D104
          • FindClose.KERNEL32(00000000), ref: 0471D10B
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: FindLocal$AllocFilelstrcmp$CloseFirstFreeNextlstrlen
          • String ID: %s\*.*$h
          • API String ID: 2888258008-1052742963
          • Opcode ID: 254007bb7b36e329a86d64611901bf3ab91fa2e7c33c12043b4d23b7d742b5bd
          • Instruction ID: 60bbeb1363dc782a55dc47398690bfba35cf91d9acdf5bb412ff0fac2ba03f08
          • Opcode Fuzzy Hash: 254007bb7b36e329a86d64611901bf3ab91fa2e7c33c12043b4d23b7d742b5bd
          • Instruction Fuzzy Hash: 1841F971A043449FC720DF68D884B9B7BE4FB88700F44892DFA4597381E77DA909CBA5
          APIs
          • FindFirstFileW.KERNEL32(?,?), ref: 0471D156
          • FindNextFileW.KERNEL32(00000000,?), ref: 0471D1D5
          • FindClose.KERNEL32(00000000), ref: 0471D1E0
          • RemoveDirectoryW.KERNEL32(?), ref: 0471D1E7
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: Find$File$CloseDirectoryFirstNextRemove
          • String ID: %s\%s$%s\*.*$.
          • API String ID: 81111410-1471744235
          • Opcode ID: c1e85b43e0e22e0dd02b50fe92f229b9343a6238a7dd0b88920b985f8ee8c997
          • Instruction ID: b380500ffa4ae7fb902a5488d5033613fe35298f8dbdeeac4bf08f98dda96584
          • Opcode Fuzzy Hash: c1e85b43e0e22e0dd02b50fe92f229b9343a6238a7dd0b88920b985f8ee8c997
          • Instruction Fuzzy Hash: D121C6725043445BD330EB68D888EFF77ACFBC8314F418919E64982150E779A508DBA2
          APIs
          • FindFirstFileW.KERNEL32(00000021,?,00000000,00000001,00000021), ref: 0471D96F
          • FindClose.KERNEL32(00000000), ref: 0471D9E9
          • CreateFileW.KERNEL32(00000021,40000000,00000002,00000000,00000002,00000080,00000000), ref: 0471DA01
          • CloseHandle.KERNEL32(00000000), ref: 0471DA2B
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: CloseFileFind$CreateFirstHandle
          • String ID: p
          • API String ID: 3283578348-2181537457
          • Opcode ID: f5cae628db857b4507cf893babfbb25782c3c103ad1b5af32e5f4bfc5efcbb35
          • Instruction ID: 97d0b14cd0437446f394536537a47083f4944431806c8e51886c66864cf8378c
          • Opcode Fuzzy Hash: f5cae628db857b4507cf893babfbb25782c3c103ad1b5af32e5f4bfc5efcbb35
          • Instruction Fuzzy Hash: 7D31EC75D083119BD734DE1D984576A77A4EBC9320F44863EF899AB3E0D638B8448B52
          APIs
          • lstrcpyW.KERNEL32(00000021,?,?,00000001), ref: 0471D8A5
            • Part of subcall function 0471C9F0: lstrlenW.KERNEL32(?), ref: 0471CA21
            • Part of subcall function 0471C9F0: malloc.MSVCRT ref: 0471CA2C
            • Part of subcall function 0471C9F0: lstrcpyW.KERNEL32(00000000,?), ref: 0471CA44
            • Part of subcall function 0471C9F0: free.MSVCRT ref: 0471CB1D
          • FindFirstFileW.KERNEL32(00000021,?,?,00000001), ref: 0471D8CC
          • FindClose.KERNEL32(00000000,0000006D,?,00000001), ref: 0471D8F5
          • FindClose.KERNEL32(00000000,?,00000001), ref: 0471D90F
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: Find$Closelstrcpy$FileFirstfreelstrlenmalloc
          • String ID:
          • API String ID: 2589062839-0
          • Opcode ID: 192adc416189b6801f211c6e66234b84e9496f56ed9bc1f779068738c5502f58
          • Instruction ID: f6146d27f0dce3d856f30aca0b458be34d7333d7a14b8bfc0d8370001c0486e6
          • Opcode Fuzzy Hash: 192adc416189b6801f211c6e66234b84e9496f56ed9bc1f779068738c5502f58
          • Instruction Fuzzy Hash: A10126716005105BD734565CD88CAFE737DE7C4325F404529D516C3360DB3C7805C761

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1 4720730-472074e _wcsrev 2 472074f call 4721760 1->2 3 4720754-4720761 2->3 4 4720763-472077f lstrcatW * 2 3->4 5 4720781-4720788 _wcsrev 3->5 4->5 6 4720789 call 4721760 5->6 7 472078e-4720793 6->7 8 47207b3-47207ba _wcsrev 7->8 9 4720795-47207b1 lstrcatW * 2 7->9 10 47207bb call 4721760 8->10 9->8 11 47207c0-47207c5 10->11 12 47207c7-47207e3 lstrcatW * 2 11->12 13 47207e5-47207ec _wcsrev 11->13 12->13 14 47207ed call 4721760 13->14 15 47207f2-47207f7 14->15 16 4720817-472081e _wcsrev 15->16 17 47207f9-4720815 lstrcatW * 2 15->17 18 472081f call 4721760 16->18 17->16 19 4720824-4720829 18->19 20 472082b-4720847 lstrcatW * 2 19->20 21 4720849-4720850 _wcsrev 19->21 20->21 22 4720851 call 4721760 21->22 23 4720856-472085b 22->23 24 472087b-4720882 _wcsrev 23->24 25 472085d-4720879 lstrcatW * 2 23->25 26 4720883 call 4721760 24->26 25->24 27 4720888-472088d 26->27 28 472088f-47208ab lstrcatW * 2 27->28 29 47208ad-47208b4 _wcsrev 27->29 28->29 30 47208b5 call 4721760 29->30 31 47208ba-47208bf 30->31 32 47208c1-47208dd lstrcatW * 2 31->32 33 47208df-47208e6 _wcsrev 31->33 32->33 34 47208e7 call 4721760 33->34 35 47208ec-47208f1 34->35 36 47208f3-472090f lstrcatW * 2 35->36 37 4720911-4720918 _wcsrev 35->37 36->37 38 4720919 call 4721760 37->38 39 472091e-4720923 38->39 40 4720943-472094a _wcsrev 39->40 41 4720925-4720941 lstrcatW * 2 39->41 42 472094b call 4721760 40->42 41->40 43 4720950-4720955 42->43 44 4720957-4720973 lstrcatW * 2 43->44 45 4720975-472097c _wcsrev 43->45 44->45 46 472097d call 4721760 45->46 47 4720982-4720987 46->47 48 47209a7-47209bc wcsstr 47->48 49 4720989-47209a5 lstrcatW * 2 47->49 50 47209ca-47209d2 48->50 51 47209be-47209c8 lstrcatW 48->51 49->48 51->50
          APIs
          • _wcsrev.MSVCRT(exe.yart063,?,?,7595F860,04720D13,?,?,?,?,?,?,?,?,?,?,?), ref: 0472074C
            • Part of subcall function 04721760: LoadLibraryW.KERNEL32 ref: 047217D0
            • Part of subcall function 04721760: LoadLibraryW.KERNEL32(?,?), ref: 0472182B
            • Part of subcall function 04721760: GetProcAddress.KERNEL32(00000000), ref: 04721834
            • Part of subcall function 04721760: LoadLibraryW.KERNEL32(00000032,04729100), ref: 0472188B
            • Part of subcall function 04721760: GetProcAddress.KERNEL32(00000000), ref: 0472188E
            • Part of subcall function 04721760: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 04721897
            • Part of subcall function 04721760: lstrcmpiW.KERNEL32(?,?), ref: 047218C3
          • lstrcatW.KERNEL32(04729100,360,7595F860,04720D13,?,?,?,?,?,?,?,?,?,?,?), ref: 04720773
          • lstrcatW.KERNEL32(04729100,047113CC,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0472077F
            • Part of subcall function 04721760: CloseHandle.KERNEL32(00000000), ref: 047218DA
          • _wcsrev.MSVCRT(exe.pva,7595F860,04720D13,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 04720786
          • lstrcatW.KERNEL32(04729100,kaba), ref: 047207A5
          • lstrcatW.KERNEL32(04729100,047113CC), ref: 047207B1
          • _wcsrev.MSVCRT(exe.pxnomvk,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 047207B8
          • lstrcatW.KERNEL32(04729100,jiangmi), ref: 047207D7
          • lstrcatW.KERNEL32(04729100,047113CC), ref: 047207E3
          • _wcsrev.MSVCRT(exe.dnomvar), ref: 047207EA
          • lstrcatW.KERNEL32(04729100,rixing), ref: 04720809
          • lstrcatW.KERNEL32(04729100,047113CC), ref: 04720815
          • _wcsrev.MSVCRT(exe.ds063), ref: 0472081C
          • lstrcatW.KERNEL32(04729100,360sd), ref: 0472083B
          • lstrcatW.KERNEL32(04729100,047113CC), ref: 04720847
          • _wcsrev.MSVCRT(exe.dleihscm), ref: 0472084E
          • lstrcatW.KERNEL32(04729100,macfee), ref: 0472086D
          • lstrcatW.KERNEL32(04729100,047113CC), ref: 04720879
          • _wcsrev.MSVCRT(exe.iuge), ref: 04720880
          • lstrcatW.KERNEL32(04729100,NOD32), ref: 0472089F
          • lstrcatW.KERNEL32(04729100,047113CC), ref: 047208AB
          • _wcsrev.MSVCRT(exe.yartexk), ref: 047208B2
          • lstrcatW.KERNEL32(04729100,jinshan), ref: 047208D1
          • lstrcatW.KERNEL32(04729100,047113CC), ref: 047208DD
          • _wcsrev.MSVCRT(exe.yartdsnk), ref: 047208E4
          • lstrcatW.KERNEL32(04729100,kenu), ref: 04720903
          • lstrcatW.KERNEL32(04729100,047113CC), ref: 0472090F
          • _wcsrev.MSVCRT(exe.vrsmbmt), ref: 04720916
          • lstrcatW.KERNEL32(04729100,qushi), ref: 04720935
          • lstrcatW.KERNEL32(04729100,047113CC), ref: 04720941
          • _wcsrev.MSVCRT(exe.retnecva), ref: 04720948
          • lstrcatW.KERNEL32(04729100,avira), ref: 04720967
          • lstrcatW.KERNEL32(04729100,047113CC), ref: 04720973
          • _wcsrev.MSVCRT(exe.psidhsa), ref: 0472097A
          • lstrcatW.KERNEL32(04729100,avast), ref: 04720999
          • lstrcatW.KERNEL32(04729100,047113CC), ref: 047209A5
          • wcsstr.MSVCRT ref: 047209B1
          • lstrcatW.KERNEL32(04729100,NotFound), ref: 047209C8
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: lstrcat$_wcsrev$LibraryLoad$AddressProc$CloseCreateHandleSnapshotToolhelp32lstrcmpiwcsstr
          • String ID: 360$360sd$NOD32$NotFound$avast$avira$exe.dleihscm$exe.dnomvar$exe.ds063$exe.iuge$exe.psidhsa$exe.pva$exe.pxnomvk$exe.retnecva$exe.vrsmbmt$exe.yart063$exe.yartdsnk$exe.yartexk$jiangmi$jinshan$kaba$kenu$macfee$qushi$rixing
          • API String ID: 1578094470-4042984187
          • Opcode ID: 2284272dd74e85f23c1c3afc818ee7cbdde9c3a78b407510bc2cf1bf6ac2842b
          • Instruction ID: 361ecc026379e6126c8243d865efa260188c467fa2b8450b558eca84e509c9c3
          • Opcode Fuzzy Hash: 2284272dd74e85f23c1c3afc818ee7cbdde9c3a78b407510bc2cf1bf6ac2842b
          • Instruction Fuzzy Hash: 3E5173F4F803B9375760377B5F8FE2B2E48D944A9AB590016FA4475321D995B408CDB3

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 52 4721026-47210b3 call 47276a4 call 4727600 call 471eb90 call 4720ff1 LoadLibraryW GetProcAddress * 3 67 47210b5 52->67 68 47210ba-47210f1 Sleep GetTickCount strstr 52->68 67->68 70 4721122-4721151 SetErrorMode call 471b780 call 471e3d0 68->70 71 47210f3-4721101 call 4720f2c 68->71 82 4721154-4721157 70->82 76 4721103-472110e WinExec 71->76 77 4721110-472111f call 47216e0 71->77 76->70 77->70 83 47211b5-47211c2 82->83 84 4721159-4721169 atoi 82->84 85 47211e1-47211e8 83->85 86 47211c4-47211c6 83->86 87 472116b-47211b3 sprintf OutputDebugStringA 84->87 90 4721207-4721218 85->90 91 47211ea-47211ec 85->91 88 47211db 86->88 89 47211c8-47211d9 86->89 87->83 88->85 89->88 95 472129e-47212a1 90->95 96 472121e-472126b GetLocalTime sprintf 90->96 93 4721201 91->93 94 47211ee-47211ff 91->94 93->90 94->93 98 47212a3-47212a7 95->98 99 47212f9-4721341 atoi * 3 GetTickCount call 471bf20 95->99 100 472126d-4721273 96->100 98->99 104 47212a9 98->104 114 4721343-472135d call 471bf20 99->114 115 472138e 99->115 101 4721275-4721277 100->101 102 472128f-4721291 100->102 106 472128b-472128d 101->106 107 4721279-4721281 101->107 108 4721294-4721296 102->108 110 47212ab-47212c2 104->110 106->108 107->102 111 4721283-4721289 107->111 112 47212d7-47212e2 Sleep 108->112 113 4721298-472129c 108->113 121 47212e7-47212f2 call 471c3d0 110->121 122 47212c4-47212d3 Sleep 110->122 111->100 111->106 112->82 113->95 125 4721389-472138c 114->125 126 472135f-4721379 call 471bf20 114->126 116 4721391-4721443 sprintf call 4720e7e call 4720e40 call 4727870 GetTickCount call 4720ac0 call 471e400 call 471c680 115->116 144 4721445-4721452 call 471ea00 116->144 121->99 122->110 127 47212d5 122->127 125->116 134 4721384-4721387 126->134 135 472137b-472137f 126->135 127->99 134->116 135->82 147 4721454-4721463 144->147 148 4721465-4721472 call 471ea00 144->148 147->144 147->148 148->82 152 4721478 GetTickCount 148->152 153 472147e-47214ad 152->153 157 47214b8-47214fe call 471c3d0 SetErrorMode call 471e450 call 471b880 153->157 158 47214af-47214b1 153->158 158->153 159 47214b3 158->159 159->82
          APIs
          • __EH_prolog.LIBCMT ref: 0472102B
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(kernel32.dll,OutputDebugStringA,?,?,047215B4), ref: 0471EBA2
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EBAB
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatus,?,?,047215B4), ref: 0471EBBC
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EBBF
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(kernel32.dll,DeviceIoControl,?,?,047215B4), ref: 0471EBD0
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EBD3
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(kernel32.dll,GetSystemInfo,?,?,047215B4), ref: 0471EBE4
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EBE7
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(kernel32.dll,GetVersionExW,?,?,047215B4), ref: 0471EBF8
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EBFB
            • Part of subcall function 0471EB90: LoadLibraryA.KERNELBASE(wininet.dll,InternetQueryOptionA,?,?,047215B4), ref: 0471EC0C
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EC0F
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(USER32.dll,PostThreadMessageW,?,?,047215B4), ref: 0471EC20
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EC23
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(USER32.dll,GetInputState,?,?,047215B4), ref: 0471EC34
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EC37
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(USER32.dll,OpenDesktopW,?,?,047215B4), ref: 0471EC48
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EC4B
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(USER32.dll,GetUserObjectInformationW,?,?,047215B4), ref: 0471EC5C
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EC5F
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(USER32.dll,CloseDesktop,?,?,047215B4), ref: 0471EC70
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EC73
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(USER32.dll,wsprintfW,?,?,047215B4), ref: 0471EC84
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EC87
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(USER32.dll,CharNextW,?,?,047215B4), ref: 0471EC98
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EC9B
            • Part of subcall function 0471EB90: LoadLibraryW.KERNEL32(gdi32.dll,CreateCompatibleBitmap,?,?,047215B4), ref: 0471ECB2
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471ECB5
            • Part of subcall function 0471EB90: LoadLibraryW.KERNEL32(gdi32.dll,GetDIBits,?,?,047215B4), ref: 0471ECC6
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471ECC9
            • Part of subcall function 0471EB90: LoadLibraryW.KERNEL32(gdi32.dll,BitBlt,?,?,047215B4), ref: 0471ECDA
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471ECDD
            • Part of subcall function 04720FF1: CreateMutexA.KERNEL32(00000000,00000001,UpdateWindow,?,04721073), ref: 04720FFB
            • Part of subcall function 04720FF1: ExitProcess.KERNEL32 ref: 0472101E
          • LoadLibraryW.KERNEL32(user32.dll), ref: 04721078
          • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 0472108C
          • GetProcAddress.KERNEL32(00000000,OpenWindowStationW), ref: 04721096
          • GetProcAddress.KERNEL32(00000000,SetProcessWindowStation), ref: 047210AE
          • Sleep.KERNEL32(00000032), ref: 047210BC
          • GetTickCount.KERNEL32 ref: 047210C2
          • strstr.MSVCRT ref: 047210E6
          • WinExec.KERNEL32(c:\windows\httpd.exe,00000000), ref: 04721108
          • SetErrorMode.KERNEL32(00000001), ref: 04721124
          • atoi.MSVCRT(?), ref: 0472115F
          • sprintf.MSVCRT ref: 0472118E
          • OutputDebugStringA.KERNEL32(?), ref: 0472119E
            • Part of subcall function 047216E0: CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?,?,?,0472133F), ref: 04721704
            • Part of subcall function 047216E0: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,00000000), ref: 0472173D
            • Part of subcall function 047216E0: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 04721748
          • GetLocalTime.KERNEL32(?), ref: 04721236
          • sprintf.MSVCRT ref: 0472125C
          • Sleep.KERNEL32(0000001E), ref: 047212C6
          • Sleep.KERNEL32(000003E8), ref: 047212DC
          • atoi.MSVCRT(443,?), ref: 04721304
          • atoi.MSVCRT ref: 04721310
          • atoi.MSVCRT ref: 0472131C
          • GetTickCount.KERNEL32 ref: 04721322
          • sprintf.MSVCRT ref: 047213A8
          • GetTickCount.KERNEL32 ref: 047213E1
            • Part of subcall function 04720AC0: GetVersionExW.KERNEL32 ref: 04720AEE
            • Part of subcall function 04720AC0: getsockname.WS2_32(?), ref: 04720B5F
            • Part of subcall function 04720AC0: GetVersionExW.KERNEL32(?), ref: 04720BA0
            • Part of subcall function 04720AC0: lstrcpyW.KERNEL32(?,04718D54), ref: 04720BD0
            • Part of subcall function 04720AC0: GlobalMemoryStatus.KERNEL32 ref: 04720C63
            • Part of subcall function 04720AC0: GetTickCount.KERNEL32 ref: 04720C77
            • Part of subcall function 0471E400: lstrcpyW.KERNEL32(?,?,04729970,04721431,?,?,?,?,?), ref: 0471E410
          • GetTickCount.KERNEL32 ref: 04721478
          • SetErrorMode.KERNEL32(00000000), ref: 047214CB
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$LibraryLoad$CountTick$atoi$Sleepsprintf$CreateErrorModeVersionlstrcpy$CloseDebugEventExecExitGlobalH_prologHandleLocalMemoryMutexObjectOutputProcessSingleStatusStringTimeWaitgetsocknamestrstr
          • String ID: %d:%d:%d:%d$443$443$443$GetProcessWindowStation$Global\X %d$OpenWindowStationW$SetProcessWindowStation$c:\windows\httpd.exe$c:\windows\httpd.exe$connected: %s:%d$http://$safebrow$safebrow.flnet.org$safebrow.flnet.org$safebrow.flnet.org$time=%d$user32.dll$winsta0
          • API String ID: 2830774399-2481499505
          • Opcode ID: 801360fe6f5f09b3be04ca655481976266f0b389a7d14cb123b6f0b6ee9a346e
          • Instruction ID: c46d4e203aced3b18ddafe8926cd1d5b83f8905c2ddb1a196422c73468a6fa1f
          • Opcode Fuzzy Hash: 801360fe6f5f09b3be04ca655481976266f0b389a7d14cb123b6f0b6ee9a346e
          • Instruction Fuzzy Hash: 0DD1E571D00269AFDB20AFA8DE48AEE7BB9FF08304F418465F605B2350DB356E44CB61

          Control-flow Graph

          APIs
          • LoadLibraryW.KERNEL32 ref: 047217D0
          • LoadLibraryW.KERNEL32(?,?), ref: 0472182B
          • GetProcAddress.KERNEL32(00000000), ref: 04721834
          • LoadLibraryW.KERNEL32(00000032,04729100), ref: 0472188B
          • GetProcAddress.KERNEL32(00000000), ref: 0472188E
          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 04721897
          • lstrcmpiW.KERNEL32(?,?), ref: 047218C3
          • CloseHandle.KERNEL32(00000000), ref: 047218DA
          • CloseHandle.KERNEL32(00000000), ref: 047218F3
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: LibraryLoad$AddressCloseHandleProc$CreateSnapshotToolhelp32lstrcmpi
          • String ID: .$2$2$2$3$3$3$F$N$P$P$W$W$c$c$d$e$e$e$i$k$n$o$o$r$r$r$r$t$t$x
          • API String ID: 3120855396-1187982173
          • Opcode ID: 6346e0e8ae99e9a4b3b26c8b43c7d01ef38cca4b3e1e88d9e491f8ab0f24f4b6
          • Instruction ID: 44ec32f0b7fbb74b2273e47e5719913df6181a3c0f6a5416813781c334efee12
          • Opcode Fuzzy Hash: 6346e0e8ae99e9a4b3b26c8b43c7d01ef38cca4b3e1e88d9e491f8ab0f24f4b6
          • Instruction Fuzzy Hash: 4F415E2040C3C099E311DB28988875FBFE9AFA6308F84195DF5C897252D3BAD60CC76B

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 178 471fa30-471fb12 LoadLibraryW GetProcAddress * 5 call 471f7e0 182 471fb20-471fb26 178->182 183 471fb14-471fb1b 178->183 184 471fe9d-471feab call 471fece 182->184 185 471fb2c 182->185 183->184 211 471feb4-471fec7 184->211 212 471fead-471feae FreeLibrary 184->212 185->184 187 471fdf0-471fdf7 185->187 188 471fb33-471fb3a 185->188 189 471fc33-471fc64 185->189 190 471fd55-471fdc8 185->190 191 471fe17-471fe43 185->191 192 471fb98-471fb9f 185->192 193 471fe7a-471fe92 lstrcatW 185->193 194 471fe5c-471fe70 185->194 195 471fde2-471fdee 185->195 196 471fe45-471fe5a 185->196 197 471fba4-471fbd5 185->197 198 471fb47-471fb78 185->198 199 471fc8f-471fcbc 185->199 200 471fcce 185->200 201 471fdfc-471fe15 187->201 188->184 204 471fb40 188->204 189->184 221 471fc6a-471fc8a 189->221 216 471fe97 190->216 217 471fdce-471fdd5 190->217 191->193 192->184 202 471fe71-471fe77 194->202 195->201 196->202 197->184 218 471fbdb 197->218 198->184 215 471fb7e-471fb92 call 471f7b0 lstrcpyW 198->215 199->184 222 471fcc2-471fcc9 199->222 205 471fcd1-471fd19 200->205 201->193 202->193 204->184 204->187 204->189 204->191 204->193 204->194 204->195 204->196 204->197 204->198 204->199 205->216 223 471fd1f-471fd50 lstrcatW 205->223 212->211 215->192 216->184 217->193 225 471fddb 217->225 226 471fbe1-471fbf1 218->226 221->184 222->184 223->205 225->187 225->191 225->193 225->194 225->195 225->196 228 471fbf3-471fc1a call 471f790 * 2 call 471f710 226->228 229 471fc1c-471fc2e lstrcpyW 226->229 228->226 229->184
          APIs
          • LoadLibraryW.KERNEL32(ADVAPI32.dll,0471153C,?,?), ref: 0471FA86
          • GetProcAddress.KERNEL32(00000000,RegQueryValueExW), ref: 0471FAA0
          • GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 0471FAAE
          • GetProcAddress.KERNEL32(00000000,RegEnumValueW), ref: 0471FABC
          • GetProcAddress.KERNEL32(00000000,RegEnumKeyExW), ref: 0471FACA
          • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 0471FAD8
            • Part of subcall function 0471F7E0: LoadLibraryW.KERNEL32(ADVAPI32.dll,00000000,00000000,00000000), ref: 0471F831
            • Part of subcall function 0471F7E0: GetProcAddress.KERNEL32(00000000,GetLengthSid), ref: 0471F848
            • Part of subcall function 0471F7E0: GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 0471F853
            • Part of subcall function 0471F7E0: GetProcAddress.KERNEL32(00000000,SetSecurityDescriptorDacl), ref: 0471F860
            • Part of subcall function 0471F7E0: GetProcAddress.KERNEL32(00000000,InitializeSecurityDescriptor), ref: 0471F86B
            • Part of subcall function 0471F7E0: GetProcAddress.KERNEL32(00000000,InitializeAcl), ref: 0471F876
            • Part of subcall function 0471F7E0: GetProcAddress.KERNEL32(00000000,AddAccessAllowedAce), ref: 0471F881
            • Part of subcall function 0471F7E0: GetProcAddress.KERNEL32(00000000,AllocateAndInitializeSid), ref: 0471F88C
            • Part of subcall function 0471F7E0: GetProcAddress.KERNEL32(00000000,RegSetKeySecurity), ref: 0471F897
          • FreeLibrary.KERNEL32(00000000), ref: 0471FEAE
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$Library$Load$Free
          • String ID: %-24s %-15s $%-24s %-15s %s $%-24s %-15s 0x%x(%d) $ADVAPI32.dll$REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_SZ$RegCloseKey$RegEnumKeyExW$RegEnumValueW$RegOpenKeyExW$RegQueryValueExW$[%s]
          • API String ID: 314858353-258588721
          • Opcode ID: 82e90d70dab72bdda09fde083800dc100910ad0b9855e9fc7af8cfd2e2bf1112
          • Instruction ID: 35918e8552d1f807667bb02cbf19d89e2e6d010737ab83354d22de3aea5c8cc7
          • Opcode Fuzzy Hash: 82e90d70dab72bdda09fde083800dc100910ad0b9855e9fc7af8cfd2e2bf1112
          • Instruction Fuzzy Hash: ABC142F1900258ABDB60CF98CC94FEA7779FB48700F00859AF609A7251D775AE48CFA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 238 471bb70-471bbce call 4727600 call 471c3d0 ResetEvent socket 243 471bbd4-471bc29 238->243 244 471bea6-471beb8 238->244 245 471bce5-471bcf4 243->245 246 471bc2f-471bc58 243->246 245->244 247 471bcfa-471bd3e strchr strncpy 245->247 246->244 250 471bc5e-471bcae strchr strncpy 246->250 247->244 249 471bd44-471bd64 atoi 247->249 249->244 251 471bd6a-471bd7b gethostbyname 249->251 250->244 252 471bcb4-471bcda atoi 250->252 251->244 253 471bd81-471bdb2 htons connect 251->253 252->251 254 471bce0 252->254 253->244 255 471bdb8-471be3d sprintf OutputDebugStringA send 253->255 254->244 256 471be43-471be45 255->256 257 471be47-471be56 256->257 258 471be5d 256->258 259 471be58-471be59 257->259 260 471be5b 257->260 261 471be5f-471be62 258->261 262 471be7e-471be97 select 258->262 259->256 260->258 261->262 263 471be64-471be78 261->263 264 471be99-471be9f 262->264 265 471bebb-471beed recv strstr 262->265 263->262 266 471bea0 closesocket 264->266 267 471bef8-471bf0a 265->267 268 471beef-471bef6 265->268 266->244 268->266
          APIs
            • Part of subcall function 0471C3D0: setsockopt.WS2_32(?,0000FFFF,00000080,00000000,00000004), ref: 0471C3FA
            • Part of subcall function 0471C3D0: CancelIo.KERNEL32(?), ref: 0471C407
            • Part of subcall function 0471C3D0: InterlockedExchange.KERNEL32(?,00000000), ref: 0471C416
            • Part of subcall function 0471C3D0: closesocket.WS2_32(?), ref: 0471C423
            • Part of subcall function 0471C3D0: SetEvent.KERNEL32(?), ref: 0471C430
          • ResetEvent.KERNEL32(?,00000000,?,?,?,00000000,04727DA0,000000FF,?,0471BFDE,04728D88,?,?), ref: 0471BBAC
          • socket.WS2_32 ref: 0471BBBF
          • strchr.MSVCRT ref: 0471BC61
          • strncpy.MSVCRT ref: 0471BC90
          • atoi.MSVCRT(?), ref: 0471BCCD
          • strchr.MSVCRT ref: 0471BCFD
          • strncpy.MSVCRT ref: 0471BD26
          • atoi.MSVCRT(?), ref: 0471BD57
          • gethostbyname.WS2_32(?), ref: 0471BD71
          • htons.WS2_32 ref: 0471BD88
          • connect.WS2_32(?,00000002,00000010), ref: 0471BDA9
          • sprintf.MSVCRT ref: 0471BDEF
          • OutputDebugStringA.KERNEL32(?), ref: 0471BDFF
          • send.WS2_32(?,?,?,00000000), ref: 0471BE26
          • select.WS2_32(00000000,?,00000000,00000000,00000000), ref: 0471BE8F
          • closesocket.WS2_32(?), ref: 0471BEA0
          • recv.WS2_32(?,?,00000258,00000000), ref: 0471BED0
          • strstr.MSVCRT ref: 0471BEE2
          Strings
          • HTTP/1.1Accept: */*Content-Type: text/htmlProxy-Connection: Keep-AliveContent-length: 0, xrefs: 0471BDD6
          • CONNECT , xrefs: 0471BDDE
          • Connection established, xrefs: 0471BEDC
          • %s%s:%d%s, xrefs: 0471BDE9
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: Eventatoiclosesocketstrchrstrncpy$CancelDebugExchangeInterlockedOutputResetStringconnectgethostbynamehtonsrecvselectsendsetsockoptsocketsprintfstrstr
          • String ID: HTTP/1.1Accept: */*Content-Type: text/htmlProxy-Connection: Keep-AliveContent-length: 0$%s%s:%d%s$CONNECT $Connection established
          • API String ID: 41334446-4200791392
          • Opcode ID: e01692bbcc695421fe0aaef8dc19aad18563e4f38944838fcebc56f2f1d9b063
          • Instruction ID: 998d2f7611863f3a3e3f8bc66e13364f1bd03f400aa4c09a393e5cf8df9b1a37
          • Opcode Fuzzy Hash: e01692bbcc695421fe0aaef8dc19aad18563e4f38944838fcebc56f2f1d9b063
          • Instruction Fuzzy Hash: 10A1F8316102049FD718CB78CC94BEEB7A9FB88710F10865DF62AD72D1DB75AE458B50

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 269 47213d8 270 47213da-4721443 GetTickCount call 4720ac0 call 471e400 call 471c680 269->270 277 4721445-4721452 call 471ea00 270->277 280 4721454-4721463 277->280 281 4721465-4721472 call 471ea00 277->281 280->277 280->281 285 4721154-4721157 281->285 286 4721478 GetTickCount 281->286 288 47211b5-47211c2 285->288 289 4721159-4721169 atoi 285->289 287 472147e-47214ad 286->287 319 47214b8-47214fe call 471c3d0 SetErrorMode call 471e450 call 471b880 287->319 320 47214af-47214b1 287->320 290 47211e1-47211e8 288->290 291 47211c4-47211c6 288->291 292 472116b-47211b3 sprintf OutputDebugStringA 289->292 295 4721207-4721218 290->295 296 47211ea-47211ec 290->296 293 47211db 291->293 294 47211c8-47211d9 291->294 292->288 293->290 294->293 301 472129e-47212a1 295->301 302 472121e-472126b GetLocalTime sprintf 295->302 299 4721201 296->299 300 47211ee-47211ff 296->300 299->295 300->299 304 47212a3-47212a7 301->304 305 47212f9-4721341 atoi * 3 GetTickCount call 471bf20 301->305 307 472126d-4721273 302->307 304->305 311 47212a9 304->311 324 4721343-472135d call 471bf20 305->324 325 472138e 305->325 308 4721275-4721277 307->308 309 472128f-4721291 307->309 313 472128b-472128d 308->313 314 4721279-4721281 308->314 315 4721294-4721296 309->315 317 47212ab-47212c2 311->317 313->315 314->309 321 4721283-4721289 314->321 322 47212d7-47212e2 Sleep 315->322 323 4721298-472129c 315->323 334 47212e7-47212f2 call 471c3d0 317->334 335 47212c4-47212d3 Sleep 317->335 320->287 326 47214b3 320->326 321->307 321->313 322->285 323->301 338 4721389-472138c 324->338 339 472135f-4721379 call 471bf20 324->339 327 4721391-47213d0 sprintf call 4720e7e call 4720e40 call 4727870 325->327 326->285 327->270 334->305 335->317 340 47212d5 335->340 338->327 350 4721384-4721387 339->350 351 472137b-472137f 339->351 340->305 350->327 351->285
          APIs
          • atoi.MSVCRT(?), ref: 0472115F
          • sprintf.MSVCRT ref: 0472118E
          • OutputDebugStringA.KERNEL32(?), ref: 0472119E
          • GetLocalTime.KERNEL32(?), ref: 04721236
          • GetTickCount.KERNEL32 ref: 047213E1
            • Part of subcall function 04720AC0: GetVersionExW.KERNEL32 ref: 04720AEE
            • Part of subcall function 04720AC0: getsockname.WS2_32(?), ref: 04720B5F
            • Part of subcall function 04720AC0: GetVersionExW.KERNEL32(?), ref: 04720BA0
            • Part of subcall function 04720AC0: lstrcpyW.KERNEL32(?,04718D54), ref: 04720BD0
            • Part of subcall function 04720AC0: GlobalMemoryStatus.KERNEL32 ref: 04720C63
            • Part of subcall function 04720AC0: GetTickCount.KERNEL32 ref: 04720C77
            • Part of subcall function 0471E400: lstrcpyW.KERNEL32(?,?,04729970,04721431,?,?,?,?,?), ref: 0471E410
          • GetTickCount.KERNEL32 ref: 04721478
          • SetErrorMode.KERNEL32(00000000), ref: 047214CB
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: CountTick$Versionlstrcpy$DebugErrorGlobalLocalMemoryModeOutputStatusStringTimeatoigetsocknamesprintf
          • String ID: %d:%d:%d:%d$443$443$443$safebrow$safebrow.flnet.org$safebrow.flnet.org$safebrow.flnet.org$time=%d
          • API String ID: 3005873580-2868102726
          • Opcode ID: 99580e666f538677152d1222ab9507acc45babeb5dbe589e8882a0ac86643754
          • Instruction ID: 6c48118ae6b1406ba55acd6f1dd0634fb2498a6410bc37d9d39d976f17e7cf94
          • Opcode Fuzzy Hash: 99580e666f538677152d1222ab9507acc45babeb5dbe589e8882a0ac86643754
          • Instruction Fuzzy Hash: 9D81C471D00269ABDF21AFA8DE886ED77B9FB08300F4144A5E649F3350DB356949CB91

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 355 471f7e0-471f8b3 LoadLibraryW GetProcAddress * 8 357 471f9a0 355->357 358 471f8b9-471f8da 355->358 359 471f9a3-471f9c2 call 471f9cc 357->359 358->357 363 471f8e0-471f901 358->363 363->357 365 471f907-471f936 GetProcessHeap HeapAlloc 363->365 365->359 368 471f938-471f941 365->368 368->359 370 471f943-471f956 368->370 370->359 372 471f958-471f967 370->372 372->359 374 471f969-471f974 372->374 374->359 376 471f976-471f984 374->376 376->359 378 471f986-471f995 376->378 378->359 380 471f997-471f99e 378->380 380->359
          APIs
          • LoadLibraryW.KERNEL32(ADVAPI32.dll,00000000,00000000,00000000), ref: 0471F831
          • GetProcAddress.KERNEL32(00000000,GetLengthSid), ref: 0471F848
          • GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 0471F853
          • GetProcAddress.KERNEL32(00000000,SetSecurityDescriptorDacl), ref: 0471F860
          • GetProcAddress.KERNEL32(00000000,InitializeSecurityDescriptor), ref: 0471F86B
          • GetProcAddress.KERNEL32(00000000,InitializeAcl), ref: 0471F876
          • GetProcAddress.KERNEL32(00000000,AddAccessAllowedAce), ref: 0471F881
          • GetProcAddress.KERNEL32(00000000,AllocateAndInitializeSid), ref: 0471F88C
          • GetProcAddress.KERNEL32(00000000,RegSetKeySecurity), ref: 0471F897
          • GetProcessHeap.KERNEL32(00000000,00000018), ref: 0471F922
          • HeapAlloc.KERNEL32(00000000), ref: 0471F929
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$Heap$AllocLibraryLoadProcess
          • String ID: ADVAPI32.dll$AddAccessAllowedAce$AllocateAndInitializeSid$GetLengthSid$InitializeAcl$InitializeSecurityDescriptor$RegOpenKeyExW$RegSetKeySecurity$SetSecurityDescriptorDacl
          • API String ID: 3190449858-3036209889
          • Opcode ID: e1c171f8ce78ef956c1fd43280a798b4e2dbde999bd942c8b68b2d6481274ea2
          • Instruction ID: 0a4238e41a426953c2ae5799076c4a6ab5366433403e2acab7476d7bb9914400
          • Opcode Fuzzy Hash: e1c171f8ce78ef956c1fd43280a798b4e2dbde999bd942c8b68b2d6481274ea2
          • Instruction Fuzzy Hash: C4511AB1E41258ABDB10DBA9CC45FEEBBB8EF48B04F044119F604F6291D7B5A9018BA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 381 471cba0-471cbe2 wcsrchr 382 471cd85-471cd91 381->382 383 471cbe8-471cc3f lstrcpyW LoadLibraryW GetProcAddress * 3 381->383 383->382 385 471cc45-471cca7 383->385 385->382 390 471ccad-471ccf0 wcsstr 385->390 393 471ccf2-471cd03 wcsstr 390->393 394 471cd28-471cd31 lstrcpyW 390->394 393->394 395 471cd05-471cd26 lstrcatW * 2 393->395 396 471cd37-471cd55 394->396 395->396 397 471cd57 396->397 398 471cd5f-471cd7f CreateProcessW 396->398 397->398 398->382
          APIs
          • wcsrchr.MSVCRT ref: 0471CBD7
          • lstrcpyW.KERNEL32(?,00000000), ref: 0471CBEE
          • LoadLibraryW.KERNEL32(ADVAPI32.dll), ref: 0471CBF9
          • GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 0471CC0D
          • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 0471CC17
          • GetProcAddress.KERNEL32(00000000,RegQueryValueW), ref: 0471CC21
          • wcsstr.MSVCRT ref: 0471CCE9
          • wcsstr.MSVCRT ref: 0471CCFC
          • lstrcatW.KERNEL32(?,047113CC), ref: 0471CD15
          • lstrcatW.KERNEL32(?,?), ref: 0471CD24
          • lstrcpyW.KERNEL32(00000000,?,?,?), ref: 0471CD31
          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 0471CD7F
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$lstrcatlstrcpywcsstr$CreateLibraryLoadProcesswcsrchr
          • String ID: "%1$%s\shell\open\command$ADVAPI32.dll$D$RegCloseKey$RegOpenKeyExW$RegQueryValueW$WinSta0\Default
          • API String ID: 1364736247-86666626
          • Opcode ID: bca5845e13edf58d70c65abcb8de554eef1039d8679bc1c8242204f256119aeb
          • Instruction ID: 636496b2ce1c6b59db30626df7c22359d327f11daef53bee6ca208267c78a415
          • Opcode Fuzzy Hash: bca5845e13edf58d70c65abcb8de554eef1039d8679bc1c8242204f256119aeb
          • Instruction Fuzzy Hash: 9F51A1B1244345AFE710DB69CD45FABB7EDEFC8700F40491DB68497250EAB5E908CBA2

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 399 471ff30-471ffbd LoadLibraryW GetProcAddress * 6 400 471ffc3 399->400 401 47200b1-47200d0 call 47200d4 399->401 403 4720082-4720099 400->403 404 471fff2-4720009 400->404 405 471ffca-471ffec 400->405 406 472005c-4720073 400->406 403->401 414 472009b-47200a2 403->414 404->401 413 472000f-4720014 404->413 405->401 405->404 406->401 412 4720075-4720080 406->412 419 47200a6-47200a8 412->419 413->401 415 472001a-472001d 413->415 414->419 417 472001f-4720022 415->417 418 472003c-472005a lstrlenW 415->418 417->401 420 4720028-472003a 417->420 418->419 419->401 421 47200aa 419->421 420->419 421->401
          APIs
          • LoadLibraryW.KERNEL32(ADVAPI32.dll), ref: 0471FF5F
          • GetProcAddress.KERNEL32(00000000,RegCreateKeyExW), ref: 0471FF73
          • GetProcAddress.KERNEL32(00000000,RegSetValueExW), ref: 0471FF7E
          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyW), ref: 0471FF89
          • GetProcAddress.KERNEL32(00000000,RegDeleteValueW), ref: 0471FF94
          • GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 0471FF9F
          • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 0471FFA9
          • lstrlenW.KERNEL32(?), ref: 04720040
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$LibraryLoadlstrlen
          • String ID: ADVAPI32.dll$RegCloseKey$RegCreateKeyExW$RegDeleteKeyW$RegDeleteValueW$RegOpenKeyExW$RegSetValueExW
          • API String ID: 1729337914-2216571892
          • Opcode ID: f59a4c2f5eadb2735d776f3b40618404a63e7662484af135c8ba3050f9dd186e
          • Instruction ID: 2461ac8289c825096152146518cc15f127fb42ba8e18885ff49c25fcdb0f058f
          • Opcode Fuzzy Hash: f59a4c2f5eadb2735d776f3b40618404a63e7662484af135c8ba3050f9dd186e
          • Instruction Fuzzy Hash: A1514DB1A40259BBEB20DF99CD85FEEB7B8EF48704F008505FA15AB350D775A9408BA0

          Control-flow Graph

          APIs
          • GetVersionExW.KERNEL32 ref: 04720AEE
            • Part of subcall function 04720A70: gethostname.WS2_32(00000000,00000032), ref: 04720A8F
            • Part of subcall function 04720A70: MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000032,?,00000032), ref: 04720AA7
            • Part of subcall function 04720A70: lstrlenW.KERNEL32(?), ref: 04720AAE
          • getsockname.WS2_32(?), ref: 04720B5F
            • Part of subcall function 04720630: LoadLibraryW.KERNEL32(ADVAPI32.dll,?,?,?,0000011C,?,?,?,?,04729970,?,00000000), ref: 04720649
            • Part of subcall function 04720630: GetProcAddress.KERNEL32(00000000,RegQueryValueExW), ref: 0472065D
            • Part of subcall function 04720630: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 04720667
            • Part of subcall function 04720630: GetProcAddress.KERNEL32(00000000,RegOpenKeyW), ref: 04720671
            • Part of subcall function 04720630: FreeLibrary.KERNEL32(00000000,?,?,?,?,04729970,?,00000000), ref: 047206AD
          • GetVersionExW.KERNEL32(?), ref: 04720BA0
          • lstrcpyW.KERNEL32(?,04718D54), ref: 04720BD0
          • GetSystemInfo.KERNEL32(?), ref: 04720BD9
          • GlobalMemoryStatus.KERNEL32 ref: 04720C63
          • GetTickCount.KERNEL32 ref: 04720C77
          • lstrcpyW.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 04720D1C
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 04720D58
          • mbstowcs.MSVCRT ref: 04720D99
          • lstrcpyW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 04720DC0
          • mbstowcs.MSVCRT ref: 04720DF3
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: AddressProclstrcpy$LibraryVersionlstrlenmbstowcs$ByteCharCountFreeGlobalInfoLoadMemoryMultiStatusSystemTickWidegethostnamegetsockname
          • String ID: $f
          • API String ID: 3530512102-2452994617
          • Opcode ID: ddfbc33323cb14cd1992690335af25cbe9e6d93c8d5118c4a3ba3b090157e6a0
          • Instruction ID: c38bb35a25f2c1be8504647600e97bf9ac8cecc031797048a98e78e7b987224f
          • Opcode Fuzzy Hash: ddfbc33323cb14cd1992690335af25cbe9e6d93c8d5118c4a3ba3b090157e6a0
          • Instruction Fuzzy Hash: B1815FB15083859BE334DB64C944AEBB7E9FFC8704F408D1DF68997250DB75AA08CB62

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 455 4720100-47201d2 call 471ea10 LoadLibraryA GetProcAddress CreatePipe 458 47201f3-4720207 CreatePipe 455->458 459 47201d4-47201d8 455->459 462 4720229-47202d4 GetStartupInfoW GetSystemDirectoryW lstrcatW * 2 CreateProcessW 458->462 463 4720209-472020d 458->463 460 47201da 459->460 461 47201df-47201e3 459->461 460->461 466 47201e9-47201ee 461->466 467 472034e-4720368 461->467 464 47202f3-472034b call 471ea90 call 471eb00 call 47216e0 * 2 462->464 465 47202d6-47202f1 462->465 468 4720214-4720219 463->468 469 472020f 463->469 464->467 465->467 466->467 468->467 470 472021f-4720224 468->470 469->468 470->467
          APIs
            • Part of subcall function 0471EA10: CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,0471E3DD,?,7591F550,0472114A,?), ref: 0471EA2E
          • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle,?), ref: 0472014B
          • GetProcAddress.KERNEL32(00000000), ref: 04720152
          • CreatePipe.KERNEL32 ref: 047201CA
          • CreatePipe.KERNEL32(00000068,00000064,?,00000000), ref: 047201FF
          • GetStartupInfoW.KERNEL32(0000000C), ref: 0472024D
          • GetSystemDirectoryW.KERNEL32 ref: 04720288
          • lstrcatW.KERNEL32(?,\cmd.e,?,?,?,?,?,?,?,?,?,?,?,00000118), ref: 0472029E
          • lstrcatW.KERNEL32(?,047121C0,?,?,?,?,?,?,?,?,?,?,?,00000118), ref: 047202AA
          • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000001,00000020,00000000,00000000,0000000C,?), ref: 047202CC
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: Create$Pipelstrcat$AddressDirectoryEventInfoLibraryLoadProcProcessStartupSystem
          • String ID: CloseHandle$D$\cmd.e$kernel32.dll$s
          • API String ID: 2063449080-2709968139
          • Opcode ID: c0cea6ace51bb3b83a3be6bfa74c95731ec644ef8c3298f3904bacfafd4a14fd
          • Instruction ID: e46bb15ca25cf0c54bb093ef59f46e81c80585df4ce06a1a89c508fb68f96b96
          • Opcode Fuzzy Hash: c0cea6ace51bb3b83a3be6bfa74c95731ec644ef8c3298f3904bacfafd4a14fd
          • Instruction Fuzzy Hash: 3C715BB1644784AFE324CF69C884B5BBBE4FF88740F10891DF689973A0D7B4A5048F66

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 485 471b940-471b9a0 487 471b9a6-471b9d4 485->487 488 471ba9f-471baaa 485->488 487->488 490 471b9da-471ba12 strncpy strstr 487->490 490->488 492 471ba18-471ba2f 490->492 492->488 494 471ba31-471ba49 492->494 494->488 496 471ba4b-471ba8f malloc 494->496 500 471ba91-471ba9c free 496->500 501 471baad-471bae8 _strupr strstr 496->501 500->488 502 471baea-471bafd strchr 501->502 503 471bb4e-471bb67 free 501->503 502->503 504 471baff-471bb0b 502->504 505 471bb0d-471bb15 504->505 505->505 506 471bb17-471bb3a call 471bb70 505->506 506->503 509 471bb3c-471bb4c strstr 506->509 509->502 509->503
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: strstr$free$_struprmallocstrchrstrncpy
          • String ID: "PROXY $AutoConfigURL$IE6.0$Software\Microsoft\Windows\CurrentVersion\Internet Settings$pac
          • API String ID: 2557522929-1950214214
          • Opcode ID: 119451541e1f363f48433f40bcee237a274be995c16f8dec99d64c9d0e16f194
          • Instruction ID: a64a65a859fcc5ec05ca2b62763dc7db720b9c7d7a27070f37ed14bd1cae0d9c
          • Opcode Fuzzy Hash: 119451541e1f363f48433f40bcee237a274be995c16f8dec99d64c9d0e16f194
          • Instruction Fuzzy Hash: 9951D8716043456BD3309B68DD05FEBB7E4FB88700F448528FB8597380DAB5B9048BA2

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 510 471cda0-471ce44 LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress LoadLibraryW GetProcAddress 512 471ce4a 510->512 513 471cf7f-471cf9b call 471ea90 510->513 514 471ce52-471ceb3 512->514 521 471ceb5-471ceb7 514->521 522 471cef4-471cef6 514->522 521->522 524 471ceb9-471cece 521->524 523 471cefa-471cf79 522->523 523->513 529 471ce4c-471ce50 523->529 524->522 527 471ced0-471cef2 524->527 527->523 529->514
          APIs
          • LoadLibraryW.KERNEL32(kernel32.dll,GetVolumeInformationA), ref: 0471CDBE
          • GetProcAddress.KERNEL32(00000000), ref: 0471CDC7
          • LoadLibraryW.KERNEL32(kernel32.dll,GetLogicalDriveStringsA), ref: 0471CDD7
          • GetProcAddress.KERNEL32(00000000), ref: 0471CDDA
          • LoadLibraryW.KERNEL32(kernel32.dll,GetDriveTypeA), ref: 0471CDE8
          • GetProcAddress.KERNEL32(00000000), ref: 0471CDEB
          • LoadLibraryW.KERNEL32(kernel32.dll,lstrlenA), ref: 0471CDFB
          • GetProcAddress.KERNEL32(00000000), ref: 0471CDFE
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: AddressLibraryLoadProc
          • String ID: GetDriveTypeA$GetLogicalDriveStringsA$GetVolumeInformationA$g$kernel32.dll$lstrlenA
          • API String ID: 2574300362-2593926017
          • Opcode ID: f145094e9568eb8448ccf04f4771bfcbf2641a2e4d50352cd2e61a4280939f37
          • Instruction ID: 2ac59274fc31d86993792896f77b6848acd1598316eb22c10318204e0b213fe1
          • Opcode Fuzzy Hash: f145094e9568eb8448ccf04f4771bfcbf2641a2e4d50352cd2e61a4280939f37
          • Instruction Fuzzy Hash: 6751F9719083499FD714DF68C844A9FBBE9FFC8704F44492DF989AB350C674A909CB92

          Control-flow Graph

          APIs
          • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle,?,?,?,?,00000000,04727F38,000000FF,0471E225,?), ref: 047203C7
          • GetProcAddress.KERNEL32(00000000), ref: 047203CE
          • TerminateThread.KERNEL32(?,00000000,?,?,?,?,00000000,04727F38,000000FF,0471E225,?), ref: 047203E2
          • TerminateProcess.KERNEL32(?,00000000,?,?,?,?,00000000,04727F38,000000FF,0471E225,?), ref: 047203EA
          • TerminateThread.KERNEL32(?,00000000,?,?,?,?,00000000,04727F38,000000FF,0471E225,?), ref: 047203F6
          • WaitForSingleObject.KERNEL32(?,000007D0,?,?,?,?,00000000,04727F38,000000FF,0471E225,?), ref: 04720401
          • TerminateThread.KERNEL32(?,00000000,?,?,?,?,00000000,04727F38,000000FF,0471E225,?), ref: 0472040D
          • DisconnectNamedPipe.KERNEL32(?,?,?,?,?,00000000,04727F38,000000FF,0471E225,?), ref: 0472041D
          • DisconnectNamedPipe.KERNEL32(?,?,?,?,?,00000000,04727F38,000000FF,0471E225,?), ref: 04720427
          • DisconnectNamedPipe.KERNEL32(?,?,?,?,?,00000000,04727F38,000000FF,0471E225,?), ref: 04720431
          • DisconnectNamedPipe.KERNEL32(?,?,?,?,?,00000000,04727F38,000000FF,0471E225,?), ref: 0472043B
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: DisconnectNamedPipeTerminate$Thread$AddressLibraryLoadObjectProcProcessSingleWait
          • String ID: CloseHandle$kernel32.dll
          • API String ID: 2122371937-3978267401
          • Opcode ID: a68577038f9771d36dd7b8d7edf6890488d801925b11dcf191f5a64795eb5f00
          • Instruction ID: ae9b0f27db9be2ed53ef2fc5e89e92c0a1fd85687cd86803b6732575e6367a7a
          • Opcode Fuzzy Hash: a68577038f9771d36dd7b8d7edf6890488d801925b11dcf191f5a64795eb5f00
          • Instruction Fuzzy Hash: BB3197B1600750ABD620AB7ACD84F56F3E8FF8C610F548A19A24AD7690CA78F8058B64
          APIs
          • LoadLibraryW.KERNEL32 ref: 0471B2ED
          • LoadLibraryW.KERNEL32(00000000,InitializeCriticalSection), ref: 0471B2FB
          • GetProcAddress.KERNEL32(00000000), ref: 0471B2FE
          • FreeLibrary.KERNEL32(00000000), ref: 0471B30B
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: Library$Load$AddressFreeProc
          • String ID: .$2$3$InitializeCriticalSection$d$k$n$r
          • API String ID: 2632591731-2400524468
          • Opcode ID: c68ca308baca01fae9bf5a7393b1071aad45fc6924bb5ee584ebff56942a9413
          • Instruction ID: 71096e4959028632b079d3712416076068acc59f8be70b2f34f87551467222b4
          • Opcode Fuzzy Hash: c68ca308baca01fae9bf5a7393b1071aad45fc6924bb5ee584ebff56942a9413
          • Instruction Fuzzy Hash: 60216A6551D3818FC301DF68984448ABBF1FF9A304F419C5EE1D9CB222E3799609C76B
          APIs
          • LoadLibraryW.KERNEL32 ref: 0471B2ED
          • LoadLibraryW.KERNEL32(00000000,InitializeCriticalSection), ref: 0471B2FB
          • GetProcAddress.KERNEL32(00000000), ref: 0471B2FE
          • FreeLibrary.KERNEL32(00000000), ref: 0471B30B
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: Library$Load$AddressFreeProc
          • String ID: .$2$3$InitializeCriticalSection$d$k$n$r
          • API String ID: 2632591731-2400524468
          • Opcode ID: 397980429efacc487c0372fb9a9032bd3707b1988f73d03b34f0cdd4226e6a16
          • Instruction ID: 2525a780a9f27b6556bc6823f5fe68d9474a092bc2343038d4cf0f44fe766b3d
          • Opcode Fuzzy Hash: 397980429efacc487c0372fb9a9032bd3707b1988f73d03b34f0cdd4226e6a16
          • Instruction Fuzzy Hash: 211179645283419AC310EF69D80498BB7F5FFC8704F409D1EE59AD7220E3B9D608CBAB
          APIs
          • LoadLibraryW.KERNEL32(ADVAPI32.dll,?,?,?,0000011C,?,?,?,?,04729970,?,00000000), ref: 04720649
          • GetProcAddress.KERNEL32(00000000,RegQueryValueExW), ref: 0472065D
          • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 04720667
          • GetProcAddress.KERNEL32(00000000,RegOpenKeyW), ref: 04720671
          • FreeLibrary.KERNEL32(00000000,?,?,?,?,04729970,?,00000000), ref: 047206AD
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$Library$FreeLoad
          • String ID: ADVAPI32.dll$HARDWARE\DESCRIPTION\System\CentralProcessor\0$RegCloseKey$RegOpenKeyW$RegQueryValueExW$~MHz
          • API String ID: 2449869053-3996806929
          • Opcode ID: e9cb8c383778379fb13d4a2ffe71a4a751d955da18eea7c30ac03117df1846d5
          • Instruction ID: 798f995e36be031b0708d9281eb2df05614c63a7754080f3066a187999480e11
          • Opcode Fuzzy Hash: e9cb8c383778379fb13d4a2ffe71a4a751d955da18eea7c30ac03117df1846d5
          • Instruction Fuzzy Hash: 3001D6B16003556BD310EBA9DC45DABB7DCEFC9A00F414919BA00F3211D674F9058BA6
          APIs
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: atoi$DebugOutputString$strchrstrncpy$wcstombs
          • String ID:
          • API String ID: 2034632737-0
          • Opcode ID: dabc5d2a9807d0abc139ad79e4060b4cc0e9d35fdfb4f9e82c6ca1beac589832
          • Instruction ID: 49ab70afdcb16aaaf70524a3f4d6d8934fe3b7c98bb7a8023d060bcd3695020f
          • Opcode Fuzzy Hash: dabc5d2a9807d0abc139ad79e4060b4cc0e9d35fdfb4f9e82c6ca1beac589832
          • Instruction Fuzzy Hash: 4651B6761002045FD314DF78D8459AA77D4FB85320F948A3EFA62C72E1EE36EA0D8751
          APIs
          • GetSystemDirectoryW.KERNEL32(?,00000230), ref: 0471DFBF
          • lstrcatW.KERNEL32(?,\KB1035627.dat), ref: 0471DFCF
          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0471DFEA
          • GetFileSize.KERNEL32(00000000,00000000), ref: 0471DFFE
          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0471E007
          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0471E01A
          • mbstowcs.MSVCRT ref: 0471E058
          • ??3@YAXPAX@Z.MSVCRT(00000000,?), ref: 0471E079
          • CloseHandle.KERNEL32(00000000), ref: 0471E083
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: File$??2@??3@CloseCreateDirectoryHandleReadSizeSystemlstrcatmbstowcs
          • String ID: \KB1035627.dat
          • API String ID: 2808364958-3026359696
          • Opcode ID: 4ee2697ed091c94cc501c7178d26d50c3376155129f39f7ddaf02c25360dec83
          • Instruction ID: 7d11ce3ef22f9878ff5f0a1871c876ce3bd6a3a4ba1b55fba2d81738bf2c081e
          • Opcode Fuzzy Hash: 4ee2697ed091c94cc501c7178d26d50c3376155129f39f7ddaf02c25360dec83
          • Instruction Fuzzy Hash: 1221C971900254AFE3209B28AC48FEB7BACDBCC750F404919FA4596251D5356908C7A2
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: CancelEventExchangeInterlockedclosesocketsetsockopt
          • String ID: bad Allocate$bad buffer
          • API String ID: 1486965892-2913219628
          • Opcode ID: 8916c9a4388b0e8e8634e3fd881ec85e4a8316fc49484c8f02d221f8f0197095
          • Instruction ID: 387bbd16ea43b6e7ec9f59996ddb47c8e9edc0d3a703fa4fdd741b53246b4d32
          • Opcode Fuzzy Hash: 8916c9a4388b0e8e8634e3fd881ec85e4a8316fc49484c8f02d221f8f0197095
          • Instruction Fuzzy Hash: D651A671A40218AFDF14EFADC994BAFB7B5EF48714F008529E905AB350DB34B9058BE1
          APIs
          • VirtualQuery.KERNEL32(delloader,00000000,0000001C), ref: 04721523
          • VirtualProtect.KERNEL32(00000000,?,00000020,?), ref: 0472153B
          • GetModuleHandleA.KERNEL32(kernel32.dll,HeapDestroy), ref: 0472154F
          • GetProcAddress.KERNEL32(00000000), ref: 04721556
          • VirtualProtect.KERNEL32(00000000,00000003,00000040,?), ref: 0472156A
          • FreeLibrary.KERNEL32(?), ref: 0472157E
          • VirtualProtect.KERNEL32(00000000,?,00000040,?), ref: 04721599
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: Virtual$Protect$AddressFreeHandleLibraryModuleProcQuery
          • String ID: HeapDestroy$kernel32.dll
          • API String ID: 1044237551-3302499733
          • Opcode ID: 4f385a2a2c919c3bb65260c677de8717d577df47a349a678e27a2b36188e9078
          • Instruction ID: 0ed949ace459c4bde15a75b602e524420692ac87140ed19a0766f8b502105ac8
          • Opcode Fuzzy Hash: 4f385a2a2c919c3bb65260c677de8717d577df47a349a678e27a2b36188e9078
          • Instruction Fuzzy Hash: 5A110472E0021CBFDF01DAE8DC45EEEBBB9EB4C711F118452EB05B6150D2B5AA058B64
          APIs
            • Part of subcall function 0471C3D0: setsockopt.WS2_32(?,0000FFFF,00000080,00000000,00000004), ref: 0471C3FA
            • Part of subcall function 0471C3D0: CancelIo.KERNEL32(?), ref: 0471C407
            • Part of subcall function 0471C3D0: InterlockedExchange.KERNEL32(?,00000000), ref: 0471C416
            • Part of subcall function 0471C3D0: closesocket.WS2_32(?), ref: 0471C423
            • Part of subcall function 0471C3D0: SetEvent.KERNEL32(?), ref: 0471C430
          • ResetEvent.KERNEL32(?,04729908,safebrow.flnet.org,?,00000000,?,?,?,?,?,?,0472133F,safebrow.flnet.org,?), ref: 0471BF35
          • socket.WS2_32(00000002,00000001,00000006), ref: 0471BF48
          • gethostbyname.WS2_32(?), ref: 0471BF6A
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: Event$CancelExchangeInterlockedResetclosesocketgethostbynamesetsockoptsocket
          • String ID: safebrow.flnet.org
          • API String ID: 513860241-719919387
          • Opcode ID: 648d1d5b13f0c5921b2605432ec0bd7f5b653cb54fec7f58f68090edc637b946
          • Instruction ID: b94c1f4e2a96db160add5c2c146b5d4d039d61c06e87f63f03130903adba36f5
          • Opcode Fuzzy Hash: 648d1d5b13f0c5921b2605432ec0bd7f5b653cb54fec7f58f68090edc637b946
          • Instruction Fuzzy Hash: 154117323443006FD3209F69DC85FDBB7A8EF89764F40450DF6499A2D1D7B6B4488B62
          APIs
          • LoadLibraryW.KERNEL32(user32.dll,00000000,00000000,?,?), ref: 0472191F
          • GetProcAddress.KERNEL32(00000000,SetThreadDesktop), ref: 04721933
          • GetProcAddress.KERNEL32(00000000,GetThreadDesktop), ref: 0472193D
          • GetCurrentThreadId.KERNEL32 ref: 04721941
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$CurrentLibraryLoadThread
          • String ID: GetThreadDesktop$SetThreadDesktop$user32.dll
          • API String ID: 2791020318-2914630085
          • Opcode ID: 5b00524b4045c17bd3c284d3729b8afe8e59187d86781d7c45ce7d38b12f5eb9
          • Instruction ID: 7f6131ad4b131addb0d7ba575c063e09b60455bb999b970eacda14acc1b52bd6
          • Opcode Fuzzy Hash: 5b00524b4045c17bd3c284d3729b8afe8e59187d86781d7c45ce7d38b12f5eb9
          • Instruction Fuzzy Hash: 9401497270022867D3202669AC49FFB775CEBC4B31F858422FF04D2210D66E680585A1
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: DebugExecExitOutputProcessStringsprintfstrstrwcstombs
          • String ID: cmd.exe /c %s$killme
          • API String ID: 587452862-2010447487
          • Opcode ID: 45172fe9a7137b2b431d5c7d222d86346f87ce0ecc08947c98eede43fab307d5
          • Instruction ID: adc2216b64420e8f641cf5bec624540ac3353a2764da2e6235c7a12cb4f87b96
          • Opcode Fuzzy Hash: 45172fe9a7137b2b431d5c7d222d86346f87ce0ecc08947c98eede43fab307d5
          • Instruction Fuzzy Hash: D311CC71508781BBD320C768DC04BDBB7A9FB88745F40882CE749D5290E7B59604CF52
          APIs
          • LoadLibraryW.KERNEL32(ADVAPI32.dll,0471F9AF), ref: 0471F9D1
          • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 0471F9DF
          • GetProcAddress.KERNEL32(00000000,FreeSid), ref: 0471F9EA
          • GetProcessHeap.KERNEL32(00000000,?), ref: 0471FA04
          • HeapFree.KERNEL32(00000000), ref: 0471FA0B
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: AddressHeapProc$FreeLibraryLoadProcess
          • String ID: ADVAPI32.dll$FreeSid$RegCloseKey
          • API String ID: 2518100794-3304832375
          • Opcode ID: a14e8ed7977a00c29812823313b3589241a5cd9ad767c7ac7b0092b800c9a89e
          • Instruction ID: bb73eddaa9673631df3d7dbb8d82df9f618049680c91645acf0715fa2744ffe8
          • Opcode Fuzzy Hash: a14e8ed7977a00c29812823313b3589241a5cd9ad767c7ac7b0092b800c9a89e
          • Instruction Fuzzy Hash: ABF05475A00218ABDB10EBFD9C44EDEB7ACDF4C640B564516FA00F7220CA78ED008E70
          APIs
          • GetSystemDirectoryW.KERNEL32(?,00000230), ref: 04720E96
          • lstrcatW.KERNEL32(?,\KB1035627.dat), ref: 04720EA8
          • CreateFileW.KERNEL32(?,40000000,00000002,00000000,00000002,00000080,00000000), ref: 04720EC7
          • ??2@YAPAXI@Z.MSVCRT ref: 04720EE3
          • WriteFile.KERNEL32(047213B4,00000000,?,?,00000000), ref: 04720F18
          • CloseHandle.KERNEL32(047213B4,?,?,00000000), ref: 04720F21
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: File$??2@CloseCreateDirectoryHandleSystemWritelstrcat
          • String ID: \KB1035627.dat
          • API String ID: 476129920-3026359696
          • Opcode ID: 2b346837c97e7aa86e0c88efc373bcdfb538b4c0daed0192271341b414b5f917
          • Instruction ID: c02237b55d6ba46a74af8fefb720c2dcaf4f619c26e21d0ef46b8b19aa603aee
          • Opcode Fuzzy Hash: 2b346837c97e7aa86e0c88efc373bcdfb538b4c0daed0192271341b414b5f917
          • Instruction Fuzzy Hash: BF110871940118BFEB10AAB8DD4DFEE7B78EB08355F10426AF601AA1E1DA746F44CB60
          APIs
          • lstrcpyW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0471D21D
          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,?,?), ref: 0471D236
          • GetFileSize.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?), ref: 0471D255
          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?), ref: 0471D260
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?), ref: 0471D267
          • LocalAlloc.KERNEL32(00000040,0000000B,?,?,?,?,?,?), ref: 0471D274
          • lstrlenW.KERNEL32(?,?,?,?,?,?,?), ref: 0471D2A2
          • LocalFree.KERNEL32(00000000,?,?,?,?,?,?), ref: 0471D2CB
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: FileLocallstrlen$AllocCloseCreateFreeHandleSizelstrcpy
          • String ID:
          • API String ID: 4036129025-0
          • Opcode ID: 5f6d3af91662471b8709b2ff4eda14b9d22ac0bce1794cf408c517be2c9bd493
          • Instruction ID: 4d7259e75d5cdc3c7c400352167eff6b589e3c24e233a22b1a00b41d79b0043b
          • Opcode Fuzzy Hash: 5f6d3af91662471b8709b2ff4eda14b9d22ac0bce1794cf408c517be2c9bd493
          • Instruction Fuzzy Hash: 0C21F131B00214AFD714DE2CEC59FABB7E9FB88715F448829F606DB290DA35A905CB61
          APIs
          • ?_Xran@std@@YAXXZ.MSVCP60(?,?,?,00000000,?,-00000008,04727E51,000000FF,0471D4EA,-00000008,?,?,?), ref: 0471DC6E
          • ?_Split@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXXZ.MSVCP60(?,?,?,00000000,?,-00000008,04727E51,000000FF,0471D4EA,-00000008,?,?,?), ref: 0471DC76
          • ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z.MSVCP60(?,00000000), ref: 0471DCAD
          • ?_Eos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXI@Z.MSVCP60(?), ref: 0471DCBA
          • ?_Split@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXXZ.MSVCP60 ref: 0471DCC2
          • ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z.MSVCP60(00000001,?,?,?,00000000,?,-00000008,04727E51,000000FF,0471D4EA,-00000008,?,?,?), ref: 0471DCF9
          • ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z.MSVCP60(?,00000001,?,?,?,00000000,?,-00000008,04727E51,000000FF,0471D4EA,-00000008,?,?,?), ref: 0471DD3A
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: G@2@@std@@G@std@@U?$char_traits@V?$allocator@$Grow@?$basic_string@Split@?$basic_string@$Eos@?$basic_string@Tidy@?$basic_string@Xran@std@@
          • String ID:
          • API String ID: 2613176527-0
          • Opcode ID: 8b8d7e5170d2bce996503d7283dade722509109e2c6648fe5b1c310f52a9db88
          • Instruction ID: de905618db24ec5ff418e887497ed373e653aa6cfc1bd8bf9ffc90c7da2444ed
          • Opcode Fuzzy Hash: 8b8d7e5170d2bce996503d7283dade722509109e2c6648fe5b1c310f52a9db88
          • Instruction Fuzzy Hash: 4C41BE75300B408FC720CF1DD484AAAF7E2EB89B20F94895EE5968B761DB75B805CF50
          APIs
          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,0471C90C,00000001), ref: 0471D314
            • Part of subcall function 0471D3C0: ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z.MSVCP60(00000001,00000000,00000000,0471D3A6,?,?,?,?,0471C90C,00000001), ref: 0471D3DD
            • Part of subcall function 0471D3C0: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,0471C90C,00000001), ref: 0471D3E4
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: ??3@CreateFileG@2@@std@@G@std@@Tidy@?$basic_string@U?$char_traits@V?$allocator@
          • String ID:
          • API String ID: 1686836073-0
          • Opcode ID: 4880b3fdc6042538665bb30508629875038f959b88546ec9eb2ce95fcc0bd28b
          • Instruction ID: ade86c3697b3f7c22a232755fe68c93d82ac2cba42b925c25ebf1c1898aae03d
          • Opcode Fuzzy Hash: 4880b3fdc6042538665bb30508629875038f959b88546ec9eb2ce95fcc0bd28b
          • Instruction Fuzzy Hash: ED21D676740310ABD310DA68EC48FAAB7A8DB89761F10C92AF704DA290D675A8048B71
          APIs
            • Part of subcall function 0471B660: EnterCriticalSection.KERNEL32(?,?,?,0471C467,?,?,?,7595F860,?,04720E26,?,00000380), ref: 0471B668
            • Part of subcall function 0471B660: LeaveCriticalSection.KERNEL32(?,00000400,?,04720E26,?,00000380), ref: 0471B681
          • _ftol.MSVCRT ref: 0471C48F
          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0471C499
          • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,7595F860,?,04720E26,?,00000380), ref: 0471C4CE
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: CriticalSection$??2@??3@EnterLeave_ftol
          • String ID:
          • API String ID: 2245774403-0
          • Opcode ID: f4365bb6c4dc24c9bc33bee432861d1cae27b60dcfa7d7c895c01ec36bb322de
          • Instruction ID: 482fbba3b4c597c94c09eaf4eb6efbcd53747e310bc2b63138363b4692760843
          • Opcode Fuzzy Hash: f4365bb6c4dc24c9bc33bee432861d1cae27b60dcfa7d7c895c01ec36bb322de
          • Instruction Fuzzy Hash: 3141D7757043085BE704FF689C44A7FB7A9EFC9614F40052DF906A73A1EA34FA1987A2
          APIs
          • OutputDebugStringW.KERNEL32(?), ref: 0471C83A
          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0471C85A
          • GetFileSize.KERNEL32(00000000,00000000), ref: 0471C86A
          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0471C873
          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0471C887
          • CloseHandle.KERNEL32(00000000), ref: 0471C893
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: File$??2@CloseCreateDebugHandleOutputReadSizeString
          • String ID:
          • API String ID: 2966346487-0
          • Opcode ID: 05ed17a72c74405b03b3f5e13eed2d95ae4ad50120094bf1a1212c0b0c16efcb
          • Instruction ID: 85250ac594e4c2564d6e5198ea1cce456fedea90ab3936ae40fc4e9832a3f84b
          • Opcode Fuzzy Hash: 05ed17a72c74405b03b3f5e13eed2d95ae4ad50120094bf1a1212c0b0c16efcb
          • Instruction Fuzzy Hash: A5F0A435951224BBE3106B68EC09FEE376CDB4A721F108254FE04AA2D0D7B42E01C6E5
          APIs
          • mbstowcs.MSVCRT ref: 04720F9B
          • CreateProcessW.KERNEL32(00000000,c:\windows\httpd.exe,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 04720FE2
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: CreateProcessmbstowcs
          • String ID: D$WinSta0\Default$c:\windows\httpd.exe
          • API String ID: 2815196715-3967429356
          • Opcode ID: 22d1f826547721461296df5f49cefb7eac983f2b48a140aba69b36d71239fca1
          • Instruction ID: c79cb08edd335770af50c68c7794980348685d68eccce28512a1ea960fe1678f
          • Opcode Fuzzy Hash: 22d1f826547721461296df5f49cefb7eac983f2b48a140aba69b36d71239fca1
          • Instruction Fuzzy Hash: 0511C8B78001186BEB509AF8DD09BDB77BCEB44354F108676E605E3295DA749E098760
          APIs
          • CreateFileW.KERNEL32(00000021,40000000,00000002,00000000,00000003,00000080,00000000,?,00000001), ref: 0471DA7C
          • SetFilePointer.KERNEL32(00000000,?,?,00000000,?,00000001), ref: 0471DA8D
          • WriteFile.KERNEL32(00000000,?,?,?,00000000,?,00000001), ref: 0471DAA7
          • CloseHandle.KERNEL32(00000000,?,00000001), ref: 0471DAAE
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: File$CloseCreateHandlePointerWrite
          • String ID: p
          • API String ID: 3604237281-2181537457
          • Opcode ID: 2835521a805faa7fba179d40561e12815c5f75c0f0cb64627cce35018cc81ee3
          • Instruction ID: cee3c06e6b164622c7eae002ef5338f4d9d4e115c77dbf8897d08dff890307a3
          • Opcode Fuzzy Hash: 2835521a805faa7fba179d40561e12815c5f75c0f0cb64627cce35018cc81ee3
          • Instruction Fuzzy Hash: 2611CE71648301ABE300DF58DC45FABBBE8FB99755F044A0DF6449A2D0D7B4A9098BA2
          APIs
          • LoadLibraryW.KERNEL32(user32.dll,?,?,047216A9,00000000), ref: 047219B7
          • GetProcAddress.KERNEL32(00000000,OpenInputDesktop), ref: 047219C5
            • Part of subcall function 04721910: LoadLibraryW.KERNEL32(user32.dll,00000000,00000000,?,?), ref: 0472191F
            • Part of subcall function 04721910: GetProcAddress.KERNEL32(00000000,SetThreadDesktop), ref: 04721933
            • Part of subcall function 04721910: GetProcAddress.KERNEL32(00000000,GetThreadDesktop), ref: 0472193D
            • Part of subcall function 04721910: GetCurrentThreadId.KERNEL32 ref: 04721941
          • FreeLibrary.KERNEL32(00000000), ref: 04721A0E
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: AddressLibraryProc$Load$CurrentFreeThread
          • String ID: OpenInputDesktop$user32.dll
          • API String ID: 4158890708-2568742042
          • Opcode ID: 616c7ea553a0296f4e0451b72aa2b4508891916e09d3345ea091dc893a8bcb2d
          • Instruction ID: c6cdb85671c9cfa7cf4bafb91ec057b5367359d5671a589c7cfe3461f1da0f96
          • Opcode Fuzzy Hash: 616c7ea553a0296f4e0451b72aa2b4508891916e09d3345ea091dc893a8bcb2d
          • Instruction Fuzzy Hash: 82F02B366051706BE721266DBE08BEF3329FFC5721F42C126FA06E5304D7259C024092
          APIs
          • LoadLibraryW.KERNEL32(avicap32.dll,?,?,?,7595F860), ref: 047206D1
          • GetProcAddress.KERNEL32(00000000,capGetDriverDescriptionW), ref: 047206DF
          • FreeLibrary.KERNEL32(00000000), ref: 0472070E
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: Library$AddressFreeLoadProc
          • String ID: avicap32.dll$capGetDriverDescriptionW
          • API String ID: 145871493-1031773666
          • Opcode ID: 5cc28c0811800891039d24723287282a5d896eeb218540d777fa45d0b036ad8d
          • Instruction ID: 0ac59539eaac66785b1f19f95f9b205f8defd871107eb77ade910824fea06d5f
          • Opcode Fuzzy Hash: 5cc28c0811800891039d24723287282a5d896eeb218540d777fa45d0b036ad8d
          • Instruction Fuzzy Hash: E5F02E366822687FD3206565AD05FFB375CDB4B210F458513FF9193291E65E240C8AF0
          APIs
          • Sleep.KERNEL32(00000064), ref: 04720501
          • PeekNamedPipe.KERNEL32(?,?,00000800,00000000,?,00000000), ref: 04720521
          • LocalAlloc.KERNEL32(00000040,?), ref: 04720543
          • ReadFile.KERNEL32(?,00000000,?,?,00000000), ref: 0472055C
          • LocalFree.KERNEL32(00000000), ref: 04720570
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: Local$AllocFileFreeNamedPeekPipeReadSleep
          • String ID:
          • API String ID: 407041184-0
          • Opcode ID: 2c7a099c8d8a8b99d1cc5824c4b4d9e667207b8339c8d15407e59942f91eccc5
          • Instruction ID: 6c8f4dfe3563e8ff52f87ece590068835fc19c30fff5c8c4b9a32655daea84a9
          • Opcode Fuzzy Hash: 2c7a099c8d8a8b99d1cc5824c4b4d9e667207b8339c8d15407e59942f91eccc5
          • Instruction Fuzzy Hash: C6114971604352AFE744DE68C984FAB77A9FF88740F00892CB645DB280D774E9088BA2
          APIs
          • setsockopt.WS2_32(?,0000FFFF,00000080,00000000,00000004), ref: 0471C3FA
          • CancelIo.KERNEL32(?), ref: 0471C407
          • InterlockedExchange.KERNEL32(?,00000000), ref: 0471C416
          • closesocket.WS2_32(?), ref: 0471C423
          • SetEvent.KERNEL32(?), ref: 0471C430
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: CancelEventExchangeInterlockedclosesocketsetsockopt
          • String ID:
          • API String ID: 1486965892-0
          • Opcode ID: b22ada317ae90a4b26afa1bd85cb71941426fe1d598c3ed6708c6ed92cb05905
          • Instruction ID: 3dcc9880cbc22d348c9b4632db18955664b090d5fa70f2e3f599c6335b56890c
          • Opcode Fuzzy Hash: b22ada317ae90a4b26afa1bd85cb71941426fe1d598c3ed6708c6ed92cb05905
          • Instruction Fuzzy Hash: E0F06275204701EFD710CB64D848FD7B3A8EF49711F10CA0DF6DA46290CB74A8488766
          APIs
            • Part of subcall function 0471B270: LoadLibraryW.KERNEL32 ref: 0471B2ED
            • Part of subcall function 0471B270: LoadLibraryW.KERNEL32(00000000,InitializeCriticalSection), ref: 0471B2FB
            • Part of subcall function 0471B270: GetProcAddress.KERNEL32(00000000), ref: 0471B2FE
            • Part of subcall function 0471B270: FreeLibrary.KERNEL32(00000000), ref: 0471B30B
          • WSAStartup.WS2_32(00000202,?), ref: 0471B7ED
          • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 0471B7FB
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: Library$Load$AddressCreateEventFreeProcStartup
          • String ID: H$P
          • API String ID: 358607388-457946424
          • Opcode ID: e290542757e627497c2605442dcd9bc9739bd51e13f0b33dfc84e9df7b9e3dfa
          • Instruction ID: 372b93df9bc1d8b0dd503b06833e5a19ef5b6db8e90f5fd33f5a76f8278d4837
          • Opcode Fuzzy Hash: e290542757e627497c2605442dcd9bc9739bd51e13f0b33dfc84e9df7b9e3dfa
          • Instruction Fuzzy Hash: 29215C34109780DEE321DB68C505B9BFBE4ABAAB14F04895DE5E947391C7B86408CB63
          APIs
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(kernel32.dll,OutputDebugStringA,?,?,047215B4), ref: 0471EBA2
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EBAB
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatus,?,?,047215B4), ref: 0471EBBC
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EBBF
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(kernel32.dll,DeviceIoControl,?,?,047215B4), ref: 0471EBD0
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EBD3
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(kernel32.dll,GetSystemInfo,?,?,047215B4), ref: 0471EBE4
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EBE7
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(kernel32.dll,GetVersionExW,?,?,047215B4), ref: 0471EBF8
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EBFB
            • Part of subcall function 0471EB90: LoadLibraryA.KERNELBASE(wininet.dll,InternetQueryOptionA,?,?,047215B4), ref: 0471EC0C
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EC0F
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(USER32.dll,PostThreadMessageW,?,?,047215B4), ref: 0471EC20
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EC23
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(USER32.dll,GetInputState,?,?,047215B4), ref: 0471EC34
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EC37
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(USER32.dll,OpenDesktopW,?,?,047215B4), ref: 0471EC48
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EC4B
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(USER32.dll,GetUserObjectInformationW,?,?,047215B4), ref: 0471EC5C
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EC5F
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(USER32.dll,CloseDesktop,?,?,047215B4), ref: 0471EC70
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EC73
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(USER32.dll,wsprintfW,?,?,047215B4), ref: 0471EC84
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EC87
            • Part of subcall function 0471EB90: LoadLibraryA.KERNEL32(USER32.dll,CharNextW,?,?,047215B4), ref: 0471EC98
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471EC9B
            • Part of subcall function 0471EB90: LoadLibraryW.KERNEL32(gdi32.dll,CreateCompatibleBitmap,?,?,047215B4), ref: 0471ECB2
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471ECB5
            • Part of subcall function 0471EB90: LoadLibraryW.KERNEL32(gdi32.dll,GetDIBits,?,?,047215B4), ref: 0471ECC6
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471ECC9
            • Part of subcall function 0471EB90: LoadLibraryW.KERNEL32(gdi32.dll,BitBlt,?,?,047215B4), ref: 0471ECDA
            • Part of subcall function 0471EB90: GetProcAddress.KERNEL32(00000000), ref: 0471ECDD
          • CreateThread.KERNEL32(00000000,00000000,04721026,00000000,00000000,00000000), ref: 047215C0
            • Part of subcall function 04721501: VirtualQuery.KERNEL32(delloader,00000000,0000001C), ref: 04721523
            • Part of subcall function 04721501: VirtualProtect.KERNEL32(00000000,?,00000020,?), ref: 0472153B
            • Part of subcall function 04721501: GetModuleHandleA.KERNEL32(kernel32.dll,HeapDestroy), ref: 0472154F
            • Part of subcall function 04721501: GetProcAddress.KERNEL32(00000000), ref: 04721556
            • Part of subcall function 04721501: VirtualProtect.KERNEL32(00000000,00000003,00000040,?), ref: 0472156A
            • Part of subcall function 04721501: FreeLibrary.KERNEL32(?), ref: 0472157E
            • Part of subcall function 04721501: VirtualProtect.KERNEL32(00000000,?,00000040,?), ref: 04721599
          • GetWindowsDirectoryA.KERNEL32(?,?), ref: 047215F4
          • DeleteFileA.KERNEL32(?), ref: 04721616
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: AddressLibraryProc$Load$Virtual$Protect$CreateDeleteDirectoryFileFreeHandleModuleQueryThreadWindows
          • String ID: \up.bak
          • API String ID: 804718740-1981547893
          • Opcode ID: 510eb5ae7a47e396b1f3395f56c941a8feee9ae10175136e2ef23f13317c0f58
          • Instruction ID: 16fa5fe155a5f8502c3be3c9a735a27f2893cb62e1e0ddb2e2c967f8d00467ff
          • Opcode Fuzzy Hash: 510eb5ae7a47e396b1f3395f56c941a8feee9ae10175136e2ef23f13317c0f58
          • Instruction Fuzzy Hash: AF01A9B590012CAFE7949A7CDC86EDB3BBCFB48355F0048A1F705E6290DA749E444AB1
          APIs
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: free$lstrcpylstrlenmalloc
          • String ID:
          • API String ID: 1962848600-0
          • Opcode ID: c87900989cc8b1f309e5945947835a327a3ff578c942beba8ac1e86214252497
          • Instruction ID: e1e05a4567954f8dd512aba9ff98dbb3befc3a5d1f6b6b59ea1e57795deb65b4
          • Opcode Fuzzy Hash: c87900989cc8b1f309e5945947835a327a3ff578c942beba8ac1e86214252497
          • Instruction Fuzzy Hash: E641D5B5C40225DFCB32DF9C8805BEABBB4FF04750F44422AE955A3790E7396941CBA5
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 92fc22b1891afe39f537808ccb0655330c271c98f17d0f5d7daf37f57b6ff2cc
          • Instruction ID: d0827cd40be7531644980a3d80e5d5f5bba3d809265af394c8e14fc3f68459f6
          • Opcode Fuzzy Hash: 92fc22b1891afe39f537808ccb0655330c271c98f17d0f5d7daf37f57b6ff2cc
          • Instruction Fuzzy Hash: EB31B9723017226BE7189A69DA84FBBB75CEF94362F00843BF600DA740DB61F855C7A0
          APIs
          • lstrlenW.KERNEL32(?,?), ref: 0471D462
          • wcslen.MSVCRT ref: 0471D4A9
          • ?assign@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PBGI@Z.MSVCP60(?,00000000), ref: 0471D4B8
            • Part of subcall function 0471D570: lstrlenW.KERNEL32(?,?,?,?), ref: 0471D5A8
            • Part of subcall function 0471D570: FindFirstFileW.KERNEL32(?,?), ref: 0471D5F2
            • Part of subcall function 0471D7C0: ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,0471D48C,?), ref: 0471D804
            • Part of subcall function 0471D7C0: ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,0471D48C,?), ref: 0471D815
            • Part of subcall function 0471D7C0: ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,0471D48C,?), ref: 0471D826
            • Part of subcall function 0471D7C0: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,0471D48C,?), ref: 0471D851
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: G@2@@std@@G@std@@U?$char_traits@V?$allocator@$Refcnt@?$basic_string@$lstrlen$??3@?assign@?$basic_string@FileFindFirstV12@wcslen
          • String ID:
          • API String ID: 3574082842-0
          • Opcode ID: bd2b013d79c90f1a5b5c2246a06e17f5e30955c5f47d777bf7757b6862c39452
          • Instruction ID: 546cb76b5a4b29929fee68c6fd38507cd691df9a9cb23dd3d1769187210cbaf7
          • Opcode Fuzzy Hash: bd2b013d79c90f1a5b5c2246a06e17f5e30955c5f47d777bf7757b6862c39452
          • Instruction Fuzzy Hash: CF316EB16043519FC710DF2CC884A5BBBE4FB89218F544A2DE55A97361D734F9098FA2
          APIs
          • ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z.MSVCP60(00000001,?,?,?,?,?,?,?,?,?,?,000000FF,0471C718), ref: 0471C782
          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,000000FF,0471C718), ref: 0471C789
          • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,000000FF,0471C718), ref: 0471C7DF
          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,000000FF,0471C718), ref: 0471C7F6
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: ??3@$G@2@@std@@G@std@@Tidy@?$basic_string@U?$char_traits@V?$allocator@
          • String ID:
          • API String ID: 4114290161-0
          • Opcode ID: 9bcc7b940a33018a9f07415388fc07eabf257b7affc631885fd65fa77f351904
          • Instruction ID: 31cce8fdd35ff8e88c50536b6b81b28c9f85fc3a657dddbb0201bcd6536018ea
          • Opcode Fuzzy Hash: 9bcc7b940a33018a9f07415388fc07eabf257b7affc631885fd65fa77f351904
          • Instruction Fuzzy Hash: 483152B1600A029FC714DF59C680A56FBE4FF89B14F004A2DE55A8B7A1E771B984CBD2
          APIs
          • ceil.MSVCRT ref: 0471B4FC
          • _ftol.MSVCRT ref: 0471B505
          • VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000004,?,?,?,?,?,?,?,?,?,00000380), ref: 0471B519
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: AllocVirtual_ftolceil
          • String ID:
          • API String ID: 3317677364-0
          • Opcode ID: 77190ec35ebae4a08b144ac1be0db967346814be62d0c726df671472672f8ee2
          • Instruction ID: 4b20ccbdf19b7b7e89ab3bbdbf1e01716273182bcc6eea1d7a2877026af2fc88
          • Opcode Fuzzy Hash: 77190ec35ebae4a08b144ac1be0db967346814be62d0c726df671472672f8ee2
          • Instruction Fuzzy Hash: 7411D5716043048BD704EF2DBC4575AB7E4EBC4765F40C43EEE458B390DA75A808CAA5
          APIs
          • ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,0471D48C,?), ref: 0471D804
          • ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,0471D48C,?), ref: 0471D815
          • ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z.MSVCP60(?,?,?,?,00000000,?,0471D48C,?), ref: 0471D826
          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,0471D48C,?), ref: 0471D851
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: G@2@@std@@G@std@@Refcnt@?$basic_string@U?$char_traits@V?$allocator@$??3@
          • String ID:
          • API String ID: 1249008704-0
          • Opcode ID: 7d57958c556a9b0958f8fb63ed7d59e595d2a1b2f135464e81091b23d338c5e3
          • Instruction ID: 6890b07d09d0ec5a3f1eeb5aa2b4674710f9b1efe45eae26b0500215612d73d9
          • Opcode Fuzzy Hash: 7d57958c556a9b0958f8fb63ed7d59e595d2a1b2f135464e81091b23d338c5e3
          • Instruction Fuzzy Hash: 7C2128B06006119FD728DF2DC98492BBBE5EB48710750856DE85ACB7A1EB30FC51CBA0
          APIs
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: _ftolceil
          • String ID:
          • API String ID: 2006273141-0
          • Opcode ID: 6a917c121c6865514e23e12ac2cf11215682fb4c154ecd0a0cb6eb6baa399568
          • Instruction ID: 33433aa99de187e4e57cb0ebc15dda59583e5433209f35927cef2dd34e061c2d
          • Opcode Fuzzy Hash: 6a917c121c6865514e23e12ac2cf11215682fb4c154ecd0a0cb6eb6baa399568
          • Instruction Fuzzy Hash: 8C11B4716042048FD704EF39EC8562ABBD0EB84756F40C43DEE458B354EA75A818CBA2
          APIs
            • Part of subcall function 0471FA30: LoadLibraryW.KERNEL32(ADVAPI32.dll,0471153C,?,?), ref: 0471FA86
            • Part of subcall function 0471FA30: GetProcAddress.KERNEL32(00000000,RegQueryValueExW), ref: 0471FAA0
            • Part of subcall function 0471FA30: GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 0471FAAE
            • Part of subcall function 0471FA30: GetProcAddress.KERNEL32(00000000,RegEnumValueW), ref: 0471FABC
            • Part of subcall function 0471FA30: GetProcAddress.KERNEL32(00000000,RegEnumKeyExW), ref: 0471FACA
            • Part of subcall function 0471FA30: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 0471FAD8
            • Part of subcall function 0471FA30: FreeLibrary.KERNEL32(00000000), ref: 0471FEAE
          • lstrlenW.KERNEL32(?), ref: 04720A53
          • lstrlenW.KERNEL32(?), ref: 04720A5F
          Strings
          • SOFTWARE\Microsoft\Windows\CurrentVersion\Setup, xrefs: 04720A06
          • Host, xrefs: 04720A39
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: AddressProc$Librarylstrlen$FreeLoad
          • String ID: Host$SOFTWARE\Microsoft\Windows\CurrentVersion\Setup
          • API String ID: 165984041-3116824957
          • Opcode ID: 49202c1d47b058a45d68f21a0877d637310018aef12113a8f427fe3f95128902
          • Instruction ID: 42ff3f8bf3ca7acff8925c9e7bea0a2c46555b55b4d5271cce52f73a3248c6e5
          • Opcode Fuzzy Hash: 49202c1d47b058a45d68f21a0877d637310018aef12113a8f427fe3f95128902
          • Instruction Fuzzy Hash: B90126727002142BE724A518DC46FAB7299FFC8610F804439F746A7340D965AD0A8BE2
          APIs
          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0471B8BC
          • CloseHandle.KERNEL32(?), ref: 0471B8DF
          • CloseHandle.KERNEL32(?), ref: 0471B8E8
          • WSACleanup.WS2_32 ref: 0471B8EA
            • Part of subcall function 0471C3D0: setsockopt.WS2_32(?,0000FFFF,00000080,00000000,00000004), ref: 0471C3FA
            • Part of subcall function 0471C3D0: CancelIo.KERNEL32(?), ref: 0471C407
            • Part of subcall function 0471C3D0: InterlockedExchange.KERNEL32(?,00000000), ref: 0471C416
            • Part of subcall function 0471C3D0: closesocket.WS2_32(?), ref: 0471C423
            • Part of subcall function 0471C3D0: SetEvent.KERNEL32(?), ref: 0471C430
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: CloseHandle$CancelCleanupEventExchangeInterlockedObjectSingleWaitclosesocketsetsockopt
          • String ID:
          • API String ID: 136543108-0
          • Opcode ID: 56589a52d936dca072b6b1ccbe7a0f3bd30c84dca5aecf25556be9537beeea2f
          • Instruction ID: 33d422cd833846db3f5540f64ce63652643d9493114236ddebe20e72c04956b4
          • Opcode Fuzzy Hash: 56589a52d936dca072b6b1ccbe7a0f3bd30c84dca5aecf25556be9537beeea2f
          • Instruction Fuzzy Hash: 96116034108B419FD315DF2CC948B9AF7E4EF99724F504A0DE4AA463D0C7B8B5058BA2
          APIs
          • InterlockedExchange.KERNEL32(?,00000001), ref: 0471E84C
          • OutputDebugStringA.KERNEL32(COMMAND_GETINFO), ref: 0471E889
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: DebugExchangeInterlockedOutputString
          • String ID: COMMAND_GETINFO
          • API String ID: 4170579539-405466798
          • Opcode ID: 2d29c4a4ec0cd375563c5e695d67d3a24848f1c8a7cd9857a8da907952e4bd35
          • Instruction ID: 19e6d0c4d38930856d0e8e50cee420799440ad2e8b80720fa35c270d3a7c2333
          • Opcode Fuzzy Hash: 2d29c4a4ec0cd375563c5e695d67d3a24848f1c8a7cd9857a8da907952e4bd35
          • Instruction Fuzzy Hash: DD3125727842106BF390F61CBC06FF37354BB64B09F098829FE8A4E291D5917C5587A2
          APIs
          • CreateMutexA.KERNEL32(00000000,00000001,UpdateWindow,?,04721073), ref: 04720FFB
          • ExitProcess.KERNEL32 ref: 0472101E
          Strings
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: CreateExitMutexProcess
          • String ID: UpdateWindow
          • API String ID: 3437166654-2116364557
          • Opcode ID: c6f846ff7733e1a32a26e68d864c1a7650c39a345b73cee4f6282fdecb48cb10
          • Instruction ID: 1374e0387c393417f8abc485d07a7214b4b69e205c0d2db2f49a91e0431c7513
          • Opcode Fuzzy Hash: c6f846ff7733e1a32a26e68d864c1a7650c39a345b73cee4f6282fdecb48cb10
          • Instruction Fuzzy Hash: 1FD05E30944370ABD7702664B94DBCC3B22FB0D712F8A4840F309D9190C75948804A62
          APIs
          • EnterCriticalSection.KERNEL32(?,00000000,?,?,?,0471C2B9,?,00000005,00000005,00000000,?,?,?,?,?), ref: 0471B3FE
          • LeaveCriticalSection.KERNEL32(?,?,?,?,0471C2B9,?,00000005,00000005,00000000,?,?,?,?,?), ref: 0471B414
          • memmove.MSVCRT(00000000,?,00000000,?,?,?,?,0471C2B9,?,00000005,00000005,00000000,?,?,?,?), ref: 0471B465
          • LeaveCriticalSection.KERNEL32(?,00000000,?,?,?,0471C2B9,?,00000005,00000005,00000000,?,?,?,?,?), ref: 0471B48B
          Memory Dump Source
          • Source File: 00000012.00000002.2114231433.0000000004717000.00000040.00001000.00020000.00000000.sdmp, Offset: 04710000, based on PE: true
          • Associated: 00000012.00000002.2114231433.0000000004710000.00000040.00001000.00020000.00000000.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_18_2_4710000_rundll32.jbxd
          Similarity
          • API ID: CriticalSection$Leave$Entermemmove
          • String ID:
          • API String ID: 72348100-0
          • Opcode ID: 07983443642cebd657cab676cbf2e8a5eefda369333d698c2deb9334cae9186a
          • Instruction ID: 29770096e488c3b7ae352327d600dd214d9f4f65e3d8d892280ba75edfaed9f9
          • Opcode Fuzzy Hash: 07983443642cebd657cab676cbf2e8a5eefda369333d698c2deb9334cae9186a
          • Instruction Fuzzy Hash: 741130326046198FDB04AE78A8994AEB799EF48115744842DEE03DB751EB65BE0887D0