Edit tour

Windows Analysis Report
capacart.dll

Overview

General Information

Sample name:capacart.dll
Analysis ID:1581364
MD5:15d5da533da549efbcd0426bccdedf15
SHA1:3345bd1993f144a1eed6709e9a94abc9b570a592
SHA256:9060cde4a7fcb1296912f65d5a30e14e02f6d51c42325b02787b0808dd08507c
Tags:dlluser-windshock
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Contains functionality to detect virtual machines (IN, VMware)
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found decision node followed by non-executed suspicious APIs
Found large amount of non-executed APIs
One or more processes crash
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • loaddll32.exe (PID: 4832 cmdline: loaddll32.exe "C:\Users\user\Desktop\capacart.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6980 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6308 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\capacart.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 3620 cmdline: rundll32.exe "C:\Users\user\Desktop\capacart.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 3208 cmdline: rundll32.exe C:\Users\user\Desktop\capacart.dll,ServiceMain MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 5876 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 616 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 1892 cmdline: rundll32.exe "C:\Users\user\Desktop\capacart.dll",ServiceMain MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 7176 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1892 -s 620 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: capacart.dllAvira: detected
Source: capacart.dllReversingLabs: Detection: 50%
Source: capacart.dllVirustotal: Detection: 60%Perma Link
Source: capacart.dllJoe Sandbox ML: detected
Source: capacart.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100020F0 wcscat,FindFirstFileW,wcscmp,wcscmp,wcscpy,wcscpy,FileTimeToLocalFileTime,FileTimeToSystemTime,wsprintfW,??2@YAPAXI@Z,send,??3@YAXPAX@Z,FindNextFileW,WSAGetLastError,??2@YAPAXI@Z,send,??3@YAXPAX@Z,FindClose,??2@YAPAXI@Z,send,WSAGetLastError,3_2_100020F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10003F90 ??2@YAPAXI@Z,??2@YAPAXI@Z,recv,??3@YAXPAX@Z,fwrite,WSAGetLastError,3_2_10003F90
Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10002D40 OpenSCManagerW,OpenServiceW,DeleteService,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_10002D40
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10001DD03_2_10001DD0
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 616
Source: capacart.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
Source: classification engineClassification label: mal64.evad.winDLL@12/9@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6980:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3208
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1892
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\36b651d7-aef8-4631-be48-a88c89a15ccaJump to behavior
Source: capacart.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\capacart.dll,ServiceMain
Source: capacart.dllReversingLabs: Detection: 50%
Source: capacart.dllVirustotal: Detection: 60%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\capacart.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\capacart.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\capacart.dll,ServiceMain
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\capacart.dll",#1
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 616
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\capacart.dll",ServiceMain
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1892 -s 620
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\capacart.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\capacart.dll,ServiceMainJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\capacart.dll",ServiceMainJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\capacart.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10001BB0 LoadLibraryW,GetProcAddress,GetSystemDirectoryW,wcscat,GetStartupInfoW,CreateProcessW,CreateThread,3_2_10001BB0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10004360 push eax; ret 3_2_1000438E
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10001330 in eax, dx3_2_10001330
Source: C:\Windows\SysWOW64\rundll32.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_3-769
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 0.9 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100020F0 wcscat,FindFirstFileW,wcscmp,wcscmp,wcscpy,wcscpy,FileTimeToLocalFileTime,FileTimeToSystemTime,wsprintfW,??2@YAPAXI@Z,send,??3@YAXPAX@Z,FindNextFileW,WSAGetLastError,??2@YAPAXI@Z,send,??3@YAXPAX@Z,FindClose,??2@YAPAXI@Z,send,WSAGetLastError,3_2_100020F0
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: Amcache.hve.8.drBinary or memory string: VMware
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.8.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.8.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.8.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.8.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.8.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.8.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.8.drBinary or memory string: vmci.sys
Source: Amcache.hve.8.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.8.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.8.drBinary or memory string: VMware20,1
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.8.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.8.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.8.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10001BB0 LoadLibraryW,GetProcAddress,GetSystemDirectoryW,wcscat,GetStartupInfoW,CreateProcessW,CreateThread,3_2_10001BB0
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\capacart.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10001210 GetVersionExW,3_2_10001210
Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Service Execution
1
Windows Service
1
Windows Service
111
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
1
DLL Side-Loading
11
Process Injection
11
Process Injection
LSASS Memory111
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Obfuscated Files or Information
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Rundll32
NTDS2
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1581364 Sample: capacart.dll Startdate: 27/12/2024 Architecture: WINDOWS Score: 64 24 Antivirus / Scanner detection for submitted sample 2->24 26 Multi AV Scanner detection for submitted file 2->26 28 Machine Learning detection for sample 2->28 7 loaddll32.exe 1 2->7         started        process3 process4 9 rundll32.exe 7->9         started        12 cmd.exe 1 7->12         started        14 rundll32.exe 7->14         started        16 conhost.exe 7->16         started        signatures5 30 Contains functionality to detect virtual machines (IN, VMware) 9->30 18 WerFault.exe 20 16 9->18         started        20 rundll32.exe 12->20         started        22 WerFault.exe 16 14->22         started        process6

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
capacart.dll50%ReversingLabsWin32.Backdoor.Cartcapa
capacart.dll61%VirustotalBrowse
capacart.dll100%AviraHEUR/AGEN.1322862
capacart.dll100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.8.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1581364
    Start date and time:2024-12-27 14:09:07 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 41s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:15
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:capacart.dll
    Detection:MAL
    Classification:mal64.evad.winDLL@12/9@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 1
    • Number of non-executed functions: 30
    Cookbook Comments:
    • Found application associated with file extension: .dll
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.42.73.29, 20.190.177.22, 13.107.246.63, 20.109.210.53
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    TimeTypeDescription
    08:10:08API Interceptor1x Sleep call for process: loaddll32.exe modified
    08:10:37API Interceptor2x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.8498150615134252
    Encrypted:false
    SSDEEP:96:jlFwq6iZFhVyPsj94s2Ggf/QXIDcQvc6QcEVcw3cE/O/a/z+HbHg/BQAS/YyNl4Q:5+iZFOPO0BU/wjeT1zuiFRZ24IO8dci
    MD5:6038FD6C813898D937FE281B3458BF8B
    SHA1:4832E4484F763EBFC631CB0B39D15CDB36EDA73A
    SHA-256:4BB8DF71295E08AA68EDC7ECAB74D1D73CE32228D0106E0FF606AD314A986C5F
    SHA-512:379434065132F248E5DC372F41606F727920E5BEF0AF1B82F87A1FA28288E55CA3A715277A660EC82E45CF82AF9C43A34E1632406F9E657ABAA17571457BF3F0
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.7.7.8.6.0.6.4.1.2.2.7.4.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.7.7.8.6.0.6.8.0.2.9.0.3.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.7.4.7.0.c.5.5.-.a.a.7.f.-.4.b.4.f.-.a.e.3.a.-.2.e.f.e.c.e.4.4.7.0.4.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.4.f.a.a.0.5.4.-.8.b.c.e.-.4.7.3.a.-.a.b.a.d.-.b.a.9.5.d.c.4.4.0.f.3.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.c.8.8.-.0.0.0.1.-.0.0.1.4.-.e.2.b.3.-.b.7.a.5.6.0.5.8.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.8500956816719805
    Encrypted:false
    SSDEEP:96:DfJFZh6i9uhVyvsj94s2Ggf/QXIDcQvc6QcEVcw3cE/O/a/z+HbHg/BQAS/YyNlt:tEicOvO0BU/wjeT1zuiFRZ24IO8dci
    MD5:2D0DEF7846453C434D11884A1D5C95F7
    SHA1:1FB5FE5AB0B2AD767330DF7E3F3ADD62D7D1E42D
    SHA-256:7934456023B80A11774E79606DC52D92E1A710D6578AFBB240B5E7F2F66C85C2
    SHA-512:E376DFFDA21783F766C4E7B2594F647953F1B8F94A2D85A20173F5BFF115326F50CD3B81F3371D94D3F0551945D57109261186819849CA4413FE0C4B20D7DAC3
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.7.7.8.6.0.9.0.6.1.4.1.2.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.7.7.8.6.0.9.5.6.1.4.0.6.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.a.b.c.c.6.a.2.-.0.b.b.e.-.4.f.e.0.-.8.8.5.4.-.f.9.9.9.7.e.4.7.8.1.9.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.c.0.c.7.9.e.2.-.4.8.d.9.-.4.e.7.5.-.8.e.f.9.-.e.2.2.7.d.8.4.1.8.7.e.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.7.6.4.-.0.0.0.1.-.0.0.1.4.-.c.6.7.d.-.8.6.a.7.6.0.5.8.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Fri Dec 27 13:10:09 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):43120
    Entropy (8bit):1.9974758484848911
    Encrypted:false
    SSDEEP:192:lk5Xoj+ys4XO5H4J0DqdhsaJIPTlSFFTVABe:u5Xy+nV5H20jLTlOry
    MD5:505485F9E69C9F8A9B63AF6685AA1257
    SHA1:5BBABE914FAC104E66889B959F2366D20F157618
    SHA-256:245E1263443D180BF203DAFAA319120AEB6FBCAA63D49B2F6A1523BFA2940742
    SHA-512:BA960F544697EA1D2F8B56ED2E68E1D1DB7CFA33E60B86A8B5A946FB84A1B3D13618ED0DE8FFFF2E553EC53AE764CE9FE77A713BBC623C2E69AD6DBFFCCEC6DC
    Malicious:false
    Preview:MDMP..a..... .......1.ng........................4...............l(..........T.......8...........T......................................................................................................................eJ......T.......GenuineIntel............T.......d...0.ng.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8250
    Entropy (8bit):3.691298232785875
    Encrypted:false
    SSDEEP:192:R6l7wVeJ/d6Mel6YXJ6cgmfT+qprP89bCpsfl2m:R6lXJ16M06Y56cgmfT+vCCfd
    MD5:33FA4BEB686054573E641B3DB294BFB2
    SHA1:2ACFE0FAD4211FE986C14DB3233B2DFBA1DF98A1
    SHA-256:C67C90AE6AB66F3EE50BE6D69C00631F98B0CBF9CF1AA2F943C2875E7C006229
    SHA-512:3435973771948EA89353433D095C6C7668CCB46798AFAAFA9F0503AF72AEB314823A590AFBC257B5805CE8A4E0F2F0955C85B8B57A0163CD89B9498C2A83C53E
    Malicious:false
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.8.9.2.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4654
    Entropy (8bit):4.461362380281748
    Encrypted:false
    SSDEEP:48:cvIwWl8zs0Jg77aI9B+WpW8VYCYm8M4JCdPVFgy+q8/AfGScSid:uIjfyI7D/7VyJHyXJ3id
    MD5:2674401C9A6E94F499FC111BAEB9CA46
    SHA1:666EADC14F245490DD4447F0B36CE53F05677DF0
    SHA-256:15B3DD68EB16A9DCD6299A1EAEA1FD97290D69B5B56120C7086D38F9FE4F352C
    SHA-512:B3F44FEDE5A0C6CCE691C61172BBDC208F24CA2B4BC5AD33EA071D6959954AA2BCC7B91A2346F1D90DDECA88C65475B8E61A5B4FB6C9E611217DC334D8CBD7B6
    Malicious:false
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="649692" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Fri Dec 27 13:10:06 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):41244
    Entropy (8bit):2.075639322460395
    Encrypted:false
    SSDEEP:192:ykQXrxUvIGpoXO5H4o5HDcZQ3huDl/MBA31TaRhfw5:XQX9MVpo+5H4ZQylkBA3Qw5
    MD5:7A3606A6D05D3C501FB59E5E743D82E4
    SHA1:F94800D3EB8CBB0FAC9C1AF8BA2828F8A1076A01
    SHA-256:ABC217E23E900BD33EFC23CD416BDD87684005822590A15C516EBFC539DCA50E
    SHA-512:9480359C1A4E2C109C7D828405D11D1569A07FEF0463F6FB38FCF3031F312B7DD14827E757A30C2A40FCBAF85A695FDABEEF81FE28E024714AC058C3A29C5105
    Malicious:false
    Preview:MDMP..a..... .........ng........................4...............l(..........T.......8...........T.......................................................................................................................eJ......T.......GenuineIntel............T...........-.ng.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8260
    Entropy (8bit):3.689606901853278
    Encrypted:false
    SSDEEP:192:R6l7wVeJE66MF6YPG67uPgmfT+qpr089b1dsfZHm:R6lXJx6MF6YO6yPgmfT+O1WfU
    MD5:3158D6D6E51AFD2754389AA9AB70A2DB
    SHA1:0333E615374E29D7733068725317BB575DFC6651
    SHA-256:D6A07A68942636970D7F53E7D12BF2434649ADC1AD685CBF7AAD62D6FA596A37
    SHA-512:C95A9E10EC895A1FC5309407D694BAC405DBD0B0843763C4C179766EE7B99094B6E7D8E02B0E06A3779F6902B87C9CFA27DB390A3C3A12EED48B945D30DB19DC
    Malicious:false
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.2.0.8.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4654
    Entropy (8bit):4.460102574849555
    Encrypted:false
    SSDEEP:48:cvIwWl8zs0Jg77aI9B+WpW8VYpPYm8M4JCdPVFp+q8/AVMPGScSld:uIjfyI7D/7V1J26PJ3ld
    MD5:FD47DB3A4EDD3C11D35906EBAD759BE1
    SHA1:A49576F7DACC6AE533C64FD476E9D2598EBB2B10
    SHA-256:85A23F9567AC7361D32A0C9E807CE122A8D8D10A0A32CD94FE38AEB8A9A0D007
    SHA-512:64549FF5626D0370EE6D87F849832A8CBF49D04E08AEF46D331D8B6F4C31465C233E21C8E05E9377E6D8F4D60E1B9DDED0D9BD4D6C8CD48576FA663219FEE063
    Malicious:false
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="649692" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.422289553970632
    Encrypted:false
    SSDEEP:6144:BSvfpi6ceLP/9skLmb0OTyWSPHaJG8nAgeMZMMhA2fX4WABlEnNP0uhiTw:YvloTyW+EZMM6DFyl03w
    MD5:FCE2DEE51713C41547D7607B75374AE6
    SHA1:4D2999878B732AF62B014AAE86BD474B60AA5EE8
    SHA-256:11281DDE116215CB6B9DB941E9657F973E7E8E7EAF806C3E4DF27F85500554A4
    SHA-512:45539C3547935468D9EB6C988C03635E8E70BE3ECC15051E403D859098B85665F85FFB8DCDF772C7F0041009E7C6C9341578FBD03D53CD426299692982ED20D0
    Malicious:false
    Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm....`X..............................................................................................................................................................................................................................................................................................................................................x...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
    Entropy (8bit):5.927697535259842
    TrID:
    • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
    • Generic Win/DOS Executable (2004/3) 0.20%
    • DOS Executable Generic (2002/1) 0.20%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:capacart.dll
    File size:19'968 bytes
    MD5:15d5da533da549efbcd0426bccdedf15
    SHA1:3345bd1993f144a1eed6709e9a94abc9b570a592
    SHA256:9060cde4a7fcb1296912f65d5a30e14e02f6d51c42325b02787b0808dd08507c
    SHA512:1c5e892a09ef432647b0f2c547e90282d6efa558ded74cec5f1151c0354ebbd492dbef54cc054d763fe8975d7642e33a325144746caf428573a13d8a3a265e3d
    SSDEEP:384:NpYtUX02EnhJX0aBXV0Fzo33XXESgr1ChqOPRfex0o0F8PCoyV1E7x:NpbEDFV+E33HEN1ChqR10GP2
    TLSH:F492E940964801FAE90A1B7130BBEF378B3D1B625A216A97DF53DEF53823261E51970B
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........b..f...f...f...z...f..uy...f..^iQ..f...f...f...y...f..uy...f..uy...f..Rich.f..........................PE..L....L.T...........
    Icon Hash:7ae282899bbab082
    Entrypoint:0x10004483
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x10000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
    DLL Characteristics:
    Time Stamp:0x54864CE8 [Tue Dec 9 01:14:16 2014 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:945811f85b5dceddf82b1a675f2faf92
    Instruction
    push ebp
    mov ebp, esp
    push ebx
    mov ebx, dword ptr [ebp+08h]
    push esi
    mov esi, dword ptr [ebp+0Ch]
    push edi
    mov edi, dword ptr [ebp+10h]
    test esi, esi
    jne 00007F42144F326Bh
    cmp dword ptr [10006738h], 00000000h
    jmp 00007F42144F3288h
    cmp esi, 01h
    je 00007F42144F3267h
    cmp esi, 02h
    jne 00007F42144F3284h
    mov eax, dword ptr [10006748h]
    test eax, eax
    je 00007F42144F326Bh
    push edi
    push esi
    push ebx
    call eax
    test eax, eax
    je 00007F42144F326Eh
    push edi
    push esi
    push ebx
    call 00007F42144F317Ah
    test eax, eax
    jne 00007F42144F3266h
    xor eax, eax
    jmp 00007F42144F32B0h
    push edi
    push esi
    push ebx
    call 00007F42144F2902h
    cmp esi, 01h
    mov dword ptr [ebp+0Ch], eax
    jne 00007F42144F326Eh
    test eax, eax
    jne 00007F42144F3299h
    push edi
    push eax
    push ebx
    call 00007F42144F3156h
    test esi, esi
    je 00007F42144F3267h
    cmp esi, 03h
    jne 00007F42144F3288h
    push edi
    push esi
    push ebx
    call 00007F42144F3145h
    test eax, eax
    jne 00007F42144F3265h
    and dword ptr [ebp+0Ch], eax
    cmp dword ptr [ebp+0Ch], 00000000h
    je 00007F42144F3273h
    mov eax, dword ptr [10006748h]
    test eax, eax
    je 00007F42144F326Ah
    push edi
    push esi
    push ebx
    call eax
    mov dword ptr [ebp+0Ch], eax
    mov eax, dword ptr [ebp+0Ch]
    pop edi
    pop esi
    pop ebx
    pop ebp
    retn 000Ch
    jmp dword ptr [100050C8h]
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    lea ecx, dword ptr [ebp-000004D0h]
    jmp 00007F42144F28AAh
    mov eax, 10005190h
    jmp 00007F42144F30B6h
    int3
    int3
    int3
    int3
    int3
    Programming Language:
    • [ C ] VS98 (6.0) build 8168
    • [C++] VS98 (6.0) build 8168
    • [LNK] VS98 (6.0) imp/exp build 8168
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x59300x4b.rdata
    IMAGE_DIRECTORY_ENTRY_IMPORT0x52300xa0.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x70000x3f4.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x50000x17c.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x35a80x36003c6799df96d12e0196974710fc42ff10False0.5099826388888888data6.073895380542516IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x50000x97b0xa004a58e8d220c5fb8a797f6669967e2f26False0.460546875data4.754723320043876IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x60000x74c0x40022c455f736f68d87b578e18d8f662984False0.3955078125Matlab v4 mat-file (little endian) zhi, numeric, rows 0, columns 03.1679494707879146IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .reloc0x70000x4a40x600a696b314f94555ad1896553c19c2613fFalse0.607421875data5.127285207852784IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    DLLImport
    KERNEL32.dllProcess32NextW, OpenProcess, Process32FirstW, GetProcAddress, LoadLibraryW, TerminateProcess, ReadFile, CreateProcessW, GetStartupInfoW, GetSystemDirectoryW, WriteFile, WideCharToMultiByte, TerminateThread, GetExitCodeProcess, CloseHandle, FindClose, FindNextFileW, FileTimeToSystemTime, FileTimeToLocalFileTime, FindFirstFileW, DeleteFileW, GetFileAttributesW, SetEvent, ResetEvent, GetOEMCP, GetLastError, CreateMutexW, FreeConsole, Sleep, MultiByteToWideChar, GlobalMemoryStatus, GetVersionExW, CreateEventW, CreateThread, WaitForSingleObject, GetTickCount, GetDriveTypeW
    USER32.dllwsprintfW
    ADVAPI32.dllOpenSCManagerW, OpenServiceW, DeleteService, CloseServiceHandle, RegOpenKeyExW, RegQueryValueExW, RegisterServiceCtrlHandlerW, SetServiceStatus
    SHELL32.dllSHFileOperationW, ShellExecuteW
    WS2_32.dllselect, __WSAFDIsSet, recv, connect, gethostbyname, inet_ntoa, send, WSAGetLastError, closesocket, htons, socket, WSAStartup, gethostname
    PSAPI.DLLGetModuleFileNameExW
    MSVCRT.dllsprintf, _adjust_fdiv, malloc, _initterm, free, fread, fseek, fwrite, fopen, wcsncpy, strncmp, strstr, exit, fclose, wcstombs, __CxxFrameHandler, wcscmp, wcslen, wcscat, ??3@YAXPAX@Z, ??2@YAPAXI@Z, _except_handler3, atoi, wcscpy, mbstowcs, _wtoi
    NameOrdinalAddress
    ServiceMain10x10003ab0
    No network behavior found

    Click to jump to process

    Click to jump to process

    • File
    • Registry

    Click to dive into process behavior distribution

    Target ID:0
    Start time:08:10:05
    Start date:27/12/2024
    Path:C:\Windows\System32\loaddll32.exe
    Wow64 process (32bit):true
    Commandline:loaddll32.exe "C:\Users\user\Desktop\capacart.dll"
    Imagebase:0x620000
    File size:126'464 bytes
    MD5 hash:51E6071F9CBA48E79F10C84515AAE618
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:1
    Start time:08:10:05
    Start date:27/12/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff6d64d0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:2
    Start time:08:10:05
    Start date:27/12/2024
    Path:C:\Windows\SysWOW64\cmd.exe
    Wow64 process (32bit):true
    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\capacart.dll",#1
    Imagebase:0x790000
    File size:236'544 bytes
    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:3
    Start time:08:10:05
    Start date:27/12/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe C:\Users\user\Desktop\capacart.dll,ServiceMain
    Imagebase:0xa70000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:4
    Start time:08:10:05
    Start date:27/12/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\capacart.dll",#1
    Imagebase:0xa70000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:8
    Start time:08:10:06
    Start date:27/12/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 616
    Imagebase:0xe90000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

    Target ID:10
    Start time:08:10:08
    Start date:27/12/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\capacart.dll",ServiceMain
    Imagebase:0xa70000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:12
    Start time:08:10:08
    Start date:27/12/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1892 -s 620
    Imagebase:0xe90000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

    Execution Graph

    Execution Coverage

    Dynamic/Packed Code Coverage

    Signature Coverage

    Execution Coverage:0.7%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:12.6%
    Total number of Nodes:478
    Total number of Limit Nodes:1
    Show Legend
    Hide Nodes/Edges
    execution_graph 1075 10003b80 ??3@YAXPAX 1076 10002c40 1077 10002c57 recv 1076->1077 1078 10002cf7 closesocket 1077->1078 1079 10002c8d ??2@YAPAXI 1077->1079 1080 10002cba send 1079->1080 1081 10002ce6 WSAGetLastError 1080->1081 1082 10002ccc 1080->1082 1082->1080 1083 10002cd4 ??3@YAXPAX 1082->1083 1083->1077 1084 10002de2 1085 10002def 1084->1085 1086 10002e00 TerminateProcess CloseHandle TerminateThread CloseHandle 1085->1086 1087 10002e48 1085->1087 1086->1087 1093 10002d40 OpenSCManagerW 1087->1093 1090 10002e54 1091 100016e0 18 API calls 1090->1091 1092 10002e60 1091->1092 1094 10002d85 exit 1093->1094 1095 10002d57 OpenServiceW 1093->1095 1094->1090 1095->1094 1096 10002d6e DeleteService 1095->1096 1096->1094 1097 10002d79 CloseServiceHandle CloseServiceHandle 1096->1097 1097->1094 1098 10004483 1100 1000449f 1098->1100 1102 10004496 1098->1102 1100->1102 1105 100044c7 1100->1105 1106 100043d8 1100->1106 1101 100044e7 1104 100043d8 3 API calls 1101->1104 1101->1105 1102->1101 1103 100043d8 3 API calls 1102->1103 1102->1105 1103->1101 1104->1105 1107 100043e0 1106->1107 1108 10004401 malloc 1107->1108 1109 10004416 1107->1109 1112 10004440 1107->1112 1108->1109 1110 1000441a _initterm 1108->1110 1109->1102 1110->1109 1111 1000446d free 1111->1109 1112->1109 1112->1111 1113 10003343 1114 10003430 CreateMutexW GetLastError 1113->1114 1115 10003470 GetOEMCP WSAStartup 1114->1115 1116 10003456 1114->1116 1115->1115 1117 10003492 socket htons gethostbyname 1115->1117 1118 100034ea htons gethostbyname 1117->1118 1120 100034cf 1117->1120 1118->1120 1119 10003548 connect 1119->1120 1122 10003668 connect 1119->1122 1120->1118 1120->1119 1121 10003532 closesocket 1120->1121 1125 10001480 22 API calls 1120->1125 1124 1000346a Sleep 1121->1124 1123 1000367d 1122->1123 1129 10003691 WSAGetLastError 1123->1129 1124->1115 1126 1000359d select 1125->1126 1127 100036ba strstr 1126->1127 1128 1000360b __WSAFDIsSet 1126->1128 1130 100036d4 socket htons gethostbyname 1127->1130 1131 10003999 closesocket 1127->1131 1128->1127 1132 10003621 ??2@YAPAXI 1128->1132 1129->1127 1133 10003720 closesocket 1130->1133 1134 10003732 connect 1130->1134 1131->1115 1135 1000362c recv 1132->1135 1133->1134 1136 10003766 WSAGetLastError closesocket closesocket 1134->1136 1137 10003788 atoi 1134->1137 1135->1129 1138 1000363e 1135->1138 1136->1115 1140 10001480 22 API calls 1137->1140 1138->1135 1139 1000364e strncmp 1138->1139 1142 10003699 ??3@YAXPAX 1138->1142 1139->1127 1139->1138 1141 100037a3 select 1140->1141 1143 100037e4 __WSAFDIsSet 1141->1143 1144 1000385b strstr 1141->1144 1142->1127 1143->1144 1146 100037f3 ??2@YAPAXI 1143->1146 1145 10003871 closesocket closesocket 1144->1145 1159 10003895 1144->1159 1149 1000388d WSAGetLastError 1145->1149 1148 10003800 recv 1146->1148 1148->1149 1150 10003812 1148->1150 1149->1144 1150->1148 1152 10003822 strncmp 1150->1152 1154 1000383a ??3@YAXPAX 1150->1154 1151 100038bf ??2@YAPAXI 1153 100038e7 recv 1151->1153 1152->1144 1152->1150 1155 100038f9 1153->1155 1156 1000393a 7 API calls 1153->1156 1154->1144 1155->1153 1157 10003901 ??3@YAXPAX 1155->1157 1156->1115 1158 10002d90 178 API calls 1157->1158 1158->1159 1159->1151 1160 100011b0 CreateEventW CreateEventW CreateThread CreateThread 1159->1160 1160->1159 1161 10001000 7 API calls 1160->1161 1162 100010f0 6 API calls 1160->1162 1163 100031a4 wcstombs gethostbyname 1164 100032fa 1163->1164 1165 100031ea socket 1163->1165 1165->1164 1166 10003201 htons connect 1165->1166 1166->1164 1167 10003255 ResetEvent ResetEvent 1166->1167 1168 100032a1 CreateThread 1167->1168 1169 1000328b CreateThread 1167->1169 1168->1164 1169->1168 1170 10003465 1171 1000346a Sleep 1170->1171 1172 10003470 GetOEMCP WSAStartup 1171->1172 1172->1172 1173 10003492 socket htons gethostbyname 1172->1173 1174 100034ea htons gethostbyname 1173->1174 1176 100034cf 1173->1176 1174->1176 1175 10003548 connect 1175->1176 1178 10003668 connect 1175->1178 1176->1174 1176->1175 1177 10003532 closesocket 1176->1177 1180 10001480 22 API calls 1176->1180 1177->1171 1179 1000367d 1178->1179 1184 10003691 WSAGetLastError 1179->1184 1181 1000359d select 1180->1181 1182 100036ba strstr 1181->1182 1183 1000360b __WSAFDIsSet 1181->1183 1185 100036d4 socket htons gethostbyname 1182->1185 1186 10003999 closesocket 1182->1186 1183->1182 1187 10003621 ??2@YAPAXI 1183->1187 1184->1182 1188 10003720 closesocket 1185->1188 1189 10003732 connect 1185->1189 1186->1172 1190 1000362c recv 1187->1190 1188->1189 1191 10003766 WSAGetLastError closesocket closesocket 1189->1191 1192 10003788 atoi 1189->1192 1190->1184 1193 1000363e 1190->1193 1191->1172 1195 10001480 22 API calls 1192->1195 1193->1190 1194 1000364e strncmp 1193->1194 1197 10003699 ??3@YAXPAX 1193->1197 1194->1182 1194->1193 1196 100037a3 select 1195->1196 1198 100037e4 __WSAFDIsSet 1196->1198 1199 1000385b strstr 1196->1199 1197->1182 1198->1199 1201 100037f3 ??2@YAPAXI 1198->1201 1200 10003871 closesocket closesocket 1199->1200 1214 10003895 1199->1214 1204 1000388d WSAGetLastError 1200->1204 1203 10003800 recv 1201->1203 1203->1204 1205 10003812 1203->1205 1204->1199 1205->1203 1207 10003822 strncmp 1205->1207 1209 1000383a ??3@YAXPAX 1205->1209 1206 100038bf ??2@YAPAXI 1208 100038e7 recv 1206->1208 1207->1199 1207->1205 1210 100038f9 1208->1210 1211 1000393a 7 API calls 1208->1211 1209->1199 1210->1208 1212 10003901 ??3@YAXPAX 1210->1212 1211->1172 1213 10002d90 178 API calls 1212->1213 1213->1214 1214->1206 1215 100011b0 CreateEventW CreateEventW CreateThread CreateThread 1214->1215 1215->1214 1216 10001000 7 API calls 1215->1216 1217 100010f0 6 API calls 1215->1217 1218 100032cf 1222 10002d10 1218->1222 1221 100032fa 1224 10002d1d 1222->1224 1223 10002d23 closesocket 1223->1224 1224->1223 1225 10002d31 TerminateThread SetEvent SetEvent 1224->1225 1225->1221 737 10003ab0 wcsncpy wcslen RegisterServiceCtrlHandlerW 738 10003b5f 737->738 739 10003b0f FreeConsole 737->739 746 100039b0 SetServiceStatus 739->746 741 10003b20 747 100039b0 SetServiceStatus 741->747 743 10003b2b CreateThread 744 10003b49 Sleep 743->744 748 10003430 CreateMutexW GetLastError 743->748 744->738 745 10003b5a 744->745 745->738 745->744 746->741 747->743 749 10003470 GetOEMCP WSAStartup 748->749 750 10003456 748->750 749->749 751 10003492 socket htons gethostbyname 749->751 752 100034ea htons gethostbyname 751->752 754 100034cf 751->754 752->754 753 10003548 connect 753->754 756 10003668 connect 753->756 754->752 754->753 755 10003532 closesocket 754->755 794 10001480 gethostname 754->794 758 1000346a Sleep 755->758 757 1000367d 756->757 763 10003691 WSAGetLastError 757->763 758->749 760 1000359d select 761 100036ba strstr 760->761 762 1000360b __WSAFDIsSet 760->762 764 100036d4 socket htons gethostbyname 761->764 765 10003999 closesocket 761->765 762->761 766 10003621 ??2@YAPAXI 762->766 763->761 767 10003720 closesocket 764->767 768 10003732 connect 764->768 765->749 769 1000362c recv 766->769 767->768 770 10003766 WSAGetLastError closesocket closesocket 768->770 771 10003788 atoi 768->771 769->763 772 1000363e 769->772 770->749 774 10001480 22 API calls 771->774 772->769 773 1000364e strncmp 772->773 776 10003699 ??3@YAXPAX 772->776 773->761 773->772 775 100037a3 select 774->775 777 100037e4 __WSAFDIsSet 775->777 778 1000385b strstr 775->778 776->761 777->778 781 100037f3 ??2@YAPAXI 777->781 779 10003871 closesocket closesocket 778->779 780 10003895 778->780 784 1000388d WSAGetLastError 779->784 785 100038bf ??2@YAPAXI 780->785 813 100011b0 CreateEventW CreateEventW CreateThread CreateThread 780->813 783 10003800 recv 781->783 783->784 787 10003812 783->787 784->778 788 100038e7 recv 785->788 786 10003822 strncmp 786->778 786->787 787->783 787->786 789 1000383a ??3@YAXPAX 787->789 790 100038f9 788->790 791 1000393a 7 API calls 788->791 789->778 790->788 792 10003901 ??3@YAXPAX 790->792 791->749 814 10002d90 792->814 795 100014ae gethostbyname 794->795 796 100014cf MultiByteToWideChar mbstowcs 794->796 795->796 797 100014bd inet_ntoa 795->797 852 10001210 GetVersionExW 796->852 797->796 800 1000153d 801 10001551 wcscpy 800->801 853 10001300 GlobalMemoryStatus 801->853 803 10001569 wsprintfW wcscpy 854 10001320 GetTickCount 803->854 805 100015a5 wsprintfW wcscpy 806 1000161a 805->806 855 100013c0 RegOpenKeyExW 806->855 808 10001626 ??2@YAPAXI 809 10001695 send 808->809 810 100016c3 WSAGetLastError 809->810 811 100016a7 809->811 810->760 811->809 812 100016af ??3@YAXPAX 811->812 812->760 813->780 860 10001000 813->860 872 100010f0 813->872 815 100032fa 814->815 816 10002dad 814->816 815->780 817 10002fe3 ??2@YAPAXI wcscpy CreateThread 816->817 818 10002f45 816->818 819 1000304e ??2@YAPAXI wcscpy CreateThread CloseHandle 816->819 820 10002e72 816->820 821 10002ed2 816->821 822 100030b3 TerminateThread CloseHandle fclose ??2@YAPAXI 816->822 823 10002e54 816->823 824 10003156 816->824 825 10002e98 816->825 826 10002f78 ??2@YAPAXI wcscpy CreateThread 816->826 827 10002f59 816->827 828 10002dbc GetTickCount 816->828 829 1000317d 816->829 817->780 996 10002800 ??2@YAPAXI 817->996 910 10001dd0 818->910 819->780 1009 10002950 ??2@YAPAXI 819->1009 895 10001960 _wtoi OpenProcess 820->895 821->815 832 10002edf TerminateProcess CloseHandle TerminateThread CloseHandle 821->832 835 10003116 send 822->835 881 100016e0 LoadLibraryW GetProcAddress 823->881 952 100024e0 824->952 903 10001d00 825->903 826->780 1025 100026b0 ??2@YAPAXI 826->1025 926 100020f0 wcscat FindFirstFileW 827->926 828->780 962 100025e0 829->962 832->780 841 10003128 835->841 842 1000314e WSAGetLastError 835->842 839 10002e60 839->780 840 10002e86 840->780 841->835 848 10003130 ??3@YAXPAX 841->848 849 10003139 842->849 843 10002ec0 843->780 844 10002f4a 844->780 845 1000316b 845->780 846 10002f66 846->780 847 10003192 847->780 848->849 951 100011b0 CreateEventW CreateEventW CreateThread CreateThread 849->951 851 1000313e 851->780 852->800 853->803 854->805 856 100013e4 855->856 857 100013eb ??2@YAPAXI RegQueryValueExW 855->857 856->808 858 10001435 857->858 859 1000143c sprintf atoi 857->859 858->808 859->808 861 100010e5 860->861 862 1000102c GetTickCount 860->862 863 10001050 ??2@YAPAXI 862->863 864 10001044 862->864 865 1000108a send 863->865 864->863 868 100010d8 closesocket 864->868 866 100010d0 WSAGetLastError 865->866 867 1000109c 865->867 870 100010ad Sleep 866->870 867->865 869 100010a4 ??3@YAXPAX 867->869 868->861 869->870 870->862 871 100010c5 870->871 873 10001119 872->873 874 1000119c 872->874 875 1000111c WaitForSingleObject ??2@YAPAXI 873->875 876 10001165 send 875->876 877 100011a7 WSAGetLastError 876->877 878 10001177 876->878 880 10001188 Sleep 877->880 878->876 879 1000117f ??3@YAXPAX 878->879 879->880 880->874 880->875 882 1000170f 881->882 883 1000193d 882->883 884 1000171e Process32FirstW 882->884 883->839 885 10001936 CloseHandle 884->885 886 1000173f OpenProcess GetModuleFileNameExW wcscpy wcscpy ??2@YAPAXI 884->886 885->883 887 1000182a send 886->887 888 10001840 887->888 889 10001948 WSAGetLastError 887->889 888->887 890 10001848 ??3@YAXPAX Process32NextW 888->890 889->839 890->886 891 10001874 wsprintfW wcscpy ??2@YAPAXI 890->891 892 1000190f send 891->892 892->889 893 10001921 892->893 893->892 894 10001929 ??3@YAXPAX 893->894 894->885 896 10001998 895->896 897 1000198b TerminateProcess 895->897 898 100019aa ??2@YAPAXI 896->898 897->896 897->898 899 100019e9 send 898->899 900 10001a17 WSAGetLastError 899->900 901 100019fb 899->901 900->840 901->899 902 10001a03 ??3@YAXPAX 901->902 902->840 904 10001d0a 903->904 905 10001d13 904->905 906 10001d1e GetExitCodeProcess 904->906 907 10001d48 wcscat wcslen WideCharToMultiByte WriteFile 905->907 972 10001bb0 LoadLibraryW GetProcAddress 905->972 906->907 908 10001d34 TerminateThread 906->908 907->843 908->905 911 10001e14 910->911 912 10001e8d wsprintfW wcscat GetDriveTypeW 911->912 915 10001f00 wcscpy 911->915 916 10001f4e ??2@YAPAXI 911->916 912->911 913 10001ed4 wcscmp 912->913 913->911 914 10001eea wcscmp 913->914 914->911 914->915 983 10003bc0 915->983 919 10001f9b ??2@YAPAXI 916->919 921 10002084 send 919->921 922 10002096 921->922 923 100020dc WSAGetLastError 921->923 922->921 924 1000209e ??3@YAXPAX 922->924 925 100020a7 ??3@YAXPAX ??3@YAXPAX 923->925 924->925 925->844 927 10002355 926->927 928 1000212f wcscmp 926->928 932 10002417 ??2@YAPAXI 927->932 933 10002368 ??2@YAPAXI 927->933 929 10002333 FindNextFileW 928->929 930 1000214c wcscmp 928->930 929->927 934 10002288 929->934 930->929 931 10002169 930->931 935 100021b3 wcscpy 931->935 936 10002174 wcscpy 931->936 938 1000245d send 932->938 937 100023d5 send 933->937 934->928 934->929 946 100022ca ??2@YAPAXI 934->946 939 100021fb FileTimeToLocalFileTime FileTimeToSystemTime wsprintfW 935->939 936->939 940 100023eb 937->940 941 1000247c WSAGetLastError 937->941 938->941 942 1000246f 938->942 939->934 940->937 943 100023f3 ??3@YAXPAX 940->943 945 100023fc FindClose 941->945 942->938 944 10002477 942->944 943->945 944->943 945->846 947 10002308 send 946->947 948 1000231a 947->948 949 1000234b WSAGetLastError 947->949 948->947 950 10002322 ??3@YAXPAX 948->950 949->927 950->929 951->851 990 10001000 7 API calls 951->990 991 100010f0 6 API calls 951->991 953 10002505 DeleteFileW 952->953 954 100024ee 952->954 956 10002519 ??2@YAPAXI 953->956 992 10002490 SHFileOperationW 954->992 958 1000255c send 956->958 957 100024fb 957->956 959 1000256e 958->959 960 1000258f WSAGetLastError 958->960 959->958 961 10002576 ??3@YAXPAX 959->961 960->845 961->845 993 100025b0 962->993 965 10002624 967 1000262c ??2@YAPAXI 965->967 966 100025fe ShellExecuteW 966->967 968 10002667 send 967->968 969 10002679 968->969 970 1000269a WSAGetLastError 968->970 969->968 971 10002681 ??3@YAXPAX 969->971 970->847 971->847 973 10001bfc GetSystemDirectoryW wcscat GetStartupInfoW CreateProcessW CreateThread 972->973 973->907 975 10001a30 973->975 976 10001a85 ReadFile 975->976 977 10001ad9 MultiByteToWideChar wcscpy ??2@YAPAXI 976->977 979 10001b70 send 977->979 980 10001b82 979->980 981 10001b98 WSAGetLastError 979->981 980->979 982 10001b8a ??3@YAXPAX 980->982 982->976 984 10003d4d 983->984 985 10003bf2 ??2@YAPAXI 983->985 984->911 989 10003c61 ??3@YAXPAX 985->989 988 10003d16 988->911 989->988 992->957 994 100025b8 GetFileAttributesW 993->994 995 100025c4 993->995 994->995 995->965 995->966 997 1000283c 996->997 1001 10002865 996->1001 1038 10004110 WideCharToMultiByte fopen 997->1038 999 100028c2 ??2@YAPAXI 1003 10002900 send 999->1003 1000 1000287f ResetEvent ResetEvent Sleep 1042 100041c0 1000->1042 1001->999 1001->1000 1005 10002912 1003->1005 1006 1000293c WSAGetLastError 1003->1006 1004 100028a8 SetEvent SetEvent 1007 10002923 1004->1007 1005->1003 1008 1000291a ??3@YAXPAX 1005->1008 1006->1007 1008->1007 1010 10002993 1009->1010 1011 100029ac 1009->1011 1056 10003f00 WideCharToMultiByte fopen 1010->1056 1057 10003f90 ??2@YAPAXI 1011->1057 1014 100029c2 1015 100029ca ??2@YAPAXI 1014->1015 1016 10002a4e wcscpy ??2@YAPAXI 1014->1016 1017 10002a0e send 1015->1017 1018 10002a97 send 1016->1018 1019 10002a24 1017->1019 1020 10002ab6 WSAGetLastError 1017->1020 1018->1020 1021 10002aa9 1018->1021 1019->1017 1022 10002a2c ??3@YAXPAX 1019->1022 1024 10002a35 1020->1024 1021->1018 1023 10002ab1 1021->1023 1022->1024 1023->1022 1026 10002715 1025->1026 1027 100026ec 1025->1027 1029 10002772 ??2@YAPAXI 1026->1029 1030 1000272f ResetEvent ResetEvent Sleep 1026->1030 1028 10004110 3 API calls 1027->1028 1028->1026 1032 100027b0 send 1029->1032 1031 100041c0 6 API calls 1030->1031 1033 10002758 SetEvent SetEvent 1031->1033 1034 100027c2 1032->1034 1035 100027ec WSAGetLastError 1032->1035 1036 100027d3 1033->1036 1034->1032 1037 100027ca ??3@YAXPAX 1034->1037 1035->1036 1037->1036 1039 10004177 1038->1039 1040 1000418d 1038->1040 1039->1040 1041 1000417b fseek 1039->1041 1040->1001 1041->1040 1052 100041f1 1042->1052 1043 100042de 1044 100041a0 fclose 1043->1044 1045 100042e5 1044->1045 1045->1004 1046 10004225 fread ??2@YAPAXI 1047 1000427a send 1046->1047 1048 100042c2 WSAGetLastError 1047->1048 1047->1052 1053 100041a0 1048->1053 1050 10004294 ??3@YAXPAX 1050->1043 1050->1052 1052->1043 1052->1046 1052->1047 1052->1050 1054 100041a9 fclose 1053->1054 1055 100041bc 1053->1055 1054->1055 1055->1004 1056->1011 1064 10003fce 1057->1064 1058 100040f1 1059 10003f70 fclose 1058->1059 1060 100040f8 1059->1060 1060->1014 1061 1000400c ??2@YAPAXI 1062 10004020 recv 1061->1062 1063 100040c1 WSAGetLastError 1062->1063 1062->1064 1072 10003f70 1063->1072 1064->1058 1064->1061 1064->1062 1066 1000403e ??3@YAXPAX 1064->1066 1068 1000406c fwrite 1064->1068 1066->1064 1068->1064 1069 100040dd 1068->1069 1070 10003f70 fclose 1069->1070 1071 100040e4 1070->1071 1071->1014 1073 10003f8a 1072->1073 1074 10003f7a fclose 1072->1074 1073->1014 1074->1073 1226 10003a10 1227 10003a42 1226->1227 1228 10003a1a 1226->1228 1229 10003a80 1228->1229 1230 10003a21 1228->1230 1231 10003a64 1228->1231 1232 10003a37 1228->1232 1233 10003a48 1228->1233 1253 100039b0 SetServiceStatus 1229->1253 1247 100039b0 SetServiceStatus 1230->1247 1251 100039b0 SetServiceStatus 1231->1251 1248 100039b0 SetServiceStatus 1232->1248 1249 100039b0 SetServiceStatus 1233->1249 1239 10003a6f 1252 100039b0 SetServiceStatus 1239->1252 1240 10003a2c Sleep 1240->1232 1241 10003a90 1242 10003a53 1250 100039b0 SetServiceStatus 1242->1250 1245 10003a5e 1246 10003a7a 1247->1240 1248->1227 1249->1242 1250->1245 1251->1239 1252->1246 1253->1241 1255 10002ad0 1256 10002aea select __WSAFDIsSet 1255->1256 1256->1256 1257 10002b36 ??2@YAPAXI 1256->1257 1258 10002b4e recv 1257->1258 1259 10002b64 1258->1259 1260 10002c28 WSAGetLastError 1258->1260 1259->1258 1261 10002b6c ??3@YAXPAX 1259->1261 1261->1256 1262 10002b97 ??2@YAPAXI 1261->1262 1263 10002bfa ??3@YAXPAX 1262->1263 1264 10002bdc send 1262->1264 1263->1256 1265 10002bf2 1264->1265 1266 10002c08 WSAGetLastError closesocket 1264->1266 1265->1263 1265->1264 1266->1256

    Callgraph

    Hide Legend
    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_10003B80 1 Function_10001D00 30 Function_10001BB0 1->30 51 Function_10004360 1->51 2 Function_10003F00 3 Function_10002800 14 Function_10004110 3->14 35 Function_100041C0 3->35 4 Function_10001000 5 Function_10001300 6 Function_10001480 6->5 12 Function_10001210 6->12 19 Function_10001320 6->19 31 Function_10001330 6->31 37 Function_100013C0 6->37 48 Function_10001260 6->48 7 Function_10004483 46 Function_100043D8 7->46 56 Function_10003B70 7->56 8 Function_10001388 9 Function_1000138E 10 Function_10003A10 26 Function_100039B0 10->26 11 Function_10002490 13 Function_10002D90 13->1 13->3 28 Function_100026B0 13->28 32 Function_100011B0 13->32 42 Function_10002950 13->42 45 Function_10001DD0 13->45 49 Function_100016E0 13->49 50 Function_10001960 13->50 52 Function_100024E0 13->52 53 Function_100025E0 13->53 57 Function_100020F0 13->57 15 Function_10003F90 59 Function_10003F70 15->59 16 Function_10002D10 17 Function_10004590 18 Function_1000459E 20 Function_100041A0 21 Function_100031A4 22 Function_10003430 22->6 22->13 22->32 23 Function_10003BB0 24 Function_100025B0 25 Function_10003AB0 25->22 25->26 27 Function_10004530 28->14 28->35 29 Function_10001A30 30->29 32->4 58 Function_100010F0 32->58 33 Function_1000453B 34 Function_10002C40 35->20 36 Function_10002D40 38 Function_10003EC0 39 Function_10003BC0 40 Function_10003343 40->6 40->13 40->32 41 Function_100032CF 41->16 42->2 42->15 43 Function_10002AD0 44 Function_10004550 45->23 45->38 45->39 47 Function_1000455E 52->11 53->24 54 Function_10002DE2 54->36 54->49 55 Function_10003465 55->6 55->13 55->32 60 Function_10004570 61 Function_1000457E

    Executed Functions

    Control-flow Graph

    APIs
    • wcsncpy.MSVCRT ref: 10003AC9
    • wcslen.MSVCRT ref: 10003AD3
    • RegisterServiceCtrlHandlerW.ADVAPI32(?,10003A10), ref: 10003B00
    • FreeConsole.KERNEL32 ref: 10003B0F
      • Part of subcall function 100039B0: SetServiceStatus.ADVAPI32 ref: 100039FB
    • CreateThread.KERNEL32(00000000,00000000,10003430,00000000,00000000,00000000), ref: 10003B3D
    • Sleep.KERNEL32(000003E8), ref: 10003B4E
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: Service$ConsoleCreateCtrlFreeHandlerRegisterSleepStatusThreadwcslenwcsncpy
    • String ID:
    • API String ID: 2099132145-0
    • Opcode ID: 41c4d84f45bf79cb7adf8b392f819c452b916b46cfce9452d8cf03726bdc9df8
    • Instruction ID: 6aa1f97fdc80c0aa29635ff4dd13de3f845775d6b9d7f6e4113fde72151d068c
    • Opcode Fuzzy Hash: 41c4d84f45bf79cb7adf8b392f819c452b916b46cfce9452d8cf03726bdc9df8
    • Instruction Fuzzy Hash: 1E11A5357403106BF711DB64CC87F5F7799EB84B81F508418F709EB2CADBA1B5488696

    Non-executed Functions

    Control-flow Graph

    APIs
    • wcscat.MSVCRT ref: 10002109
    • FindFirstFileW.KERNEL32(?,?,00000000), ref: 1000211A
    • wcscmp.MSVCRT ref: 1000213C
    • wcscmp.MSVCRT ref: 10002159
    • wcscpy.MSVCRT ref: 1000218D
    • wcscpy.MSVCRT ref: 100021D7
    • FileTimeToLocalFileTime.KERNEL32(?,?,?,?), ref: 10002208
    • FileTimeToSystemTime.KERNEL32(?,?), ref: 10002218
    • wsprintfW.USER32 ref: 10002268
    • ??2@YAPAXI@Z.MSVCRT(00000410), ref: 100022E7
    • send.WS2_32(00000000,00000104,00000410,00000000), ref: 10002310
    • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 10002323
    • FindNextFileW.KERNEL32(00000000,?), ref: 1000233C
    • WSAGetLastError.WS2_32 ref: 1000234B
    • ??2@YAPAXI@Z.MSVCRT(00000410), ref: 100023B4
    • send.WS2_32(00000000,00000104,00000410,00000000), ref: 100023DD
    • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000410,00000000), ref: 100023F4
    • FindClose.KERNEL32(?,?,00000410,00000000), ref: 10002401
    • ??2@YAPAXI@Z.MSVCRT(00000410), ref: 1000243C
    • send.WS2_32(00000000,?,00000410,00000000), ref: 10002465
    • WSAGetLastError.WS2_32(?,00000410,00000000), ref: 1000247C
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: File$Time$??2@Findsend$??3@ErrorLastwcscmpwcscpy$CloseFirstLocalNextSystemwcscatwsprintf
    • String ID: %d-%d-%d %d:%d:%d$\*.*
    • API String ID: 1477265053-3143167761
    • Opcode ID: 5b399aa4c510fb7db8cbdc862ee54e55cb9948b4e2aa86c191648d9733bbf2a5
    • Instruction ID: 1cb797ff643dc629983326aeed5f019ae3b53c4bf10aabbc1d3b7c0b44eb2bb5
    • Opcode Fuzzy Hash: 5b399aa4c510fb7db8cbdc862ee54e55cb9948b4e2aa86c191648d9733bbf2a5
    • Instruction Fuzzy Hash: BF9192B15087559BE720CF20CC84B9B73E5FFC8384F014A2CFA4997255DB79AA45CB92

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 171 10001dd0-10001e8b call 10003ec0 call 10003bb0 176 10001e8d-10001ec9 wsprintfW wcscat GetDriveTypeW 171->176 177 10001ed4-10001ee8 wcscmp 176->177 178 10001ecb 176->178 179 10001f44-10001f48 177->179 181 10001eea-10001efe wcscmp 177->181 178->179 180 10001ecd-10001ed0 178->180 179->176 184 10001f4e-10001f64 179->184 182 10001f00-10001f3f wcscpy call 10003bc0 180->182 183 10001ed2 180->183 181->179 181->182 182->179 183->179 186 10001f66-10001f68 184->186 187 10001f6a-10001f7f 184->187 188 10001f81-10001f99 ??2@YAPAXI@Z 186->188 187->188 189 10001f9b-10001fa5 188->189 190 10001fa7-10001fbe 189->190 191 10001fda-10001fe5 189->191 193 10001fc0-10001fd4 190->193 194 10001fd6-10001fd8 190->194 192 10002003-1000201d 191->192 195 10002023-10002034 192->195 196 1000201f-10002021 192->196 193->189 194->191 197 10001fe7-10001ffc 194->197 198 10002036-1000207f ??2@YAPAXI@Z 195->198 196->198 197->192 199 10002084-10002094 send 198->199 200 10002096-1000209c 199->200 201 100020dc-100020e2 WSAGetLastError 199->201 200->199 202 1000209e-100020a4 ??3@YAXPAX@Z 200->202 203 100020a7-100020db ??3@YAXPAX@Z * 2 201->203 202->203
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: ??3@$??2@wcscmp$DriveErrorLastTypesendwcscatwcscpywsprintf
    • String ID: A:\$B:\
    • API String ID: 2310596656-1009255891
    • Opcode ID: 81019f50537fe5f6a27677a7089774dd1cdac0f59ba000b1f588a5eba51430cc
    • Instruction ID: f09f52fd22e86e73c91f1a35240c03eeb1886fc88f7823dc4d964afc5cad5309
    • Opcode Fuzzy Hash: 81019f50537fe5f6a27677a7089774dd1cdac0f59ba000b1f588a5eba51430cc
    • Instruction Fuzzy Hash: 6581B2716043468BE718DB24CC50BABB7E6FBC8384F054A2DF98597355EB75AA04C782

    Control-flow Graph

    APIs
    • LoadLibraryW.KERNEL32(Kernel32.dll,CreatePipe,?), ref: 10001BC2
    • GetProcAddress.KERNEL32(00000000), ref: 10001BC9
    • GetSystemDirectoryW.KERNEL32(00000000,00000100), ref: 10001C2F
    • wcscat.MSVCRT ref: 10001C3F
    • GetStartupInfoW.KERNEL32(?,00000000), ref: 10001C73
    • CreateProcessW.KERNEL32 ref: 10001CC3
    • CreateThread.KERNEL32(00000000,00000000,10001A30,00000000,00000000,00000000), ref: 10001CE2
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: Create$AddressDirectoryInfoLibraryLoadProcProcessStartupSystemThreadwcscat
    • String ID: CreatePipe$D$Kernel32.dll$\cmd.exe
    • API String ID: 4211703381-4005030481
    • Opcode ID: 4ba9e3705484fac20227168cc6c42bc61e6528e44f360de262ce13e398df4675
    • Instruction ID: 977645c93628cfe42ae8c11df0c6efa66cb6ef2cdd3aa39efd3e59097fc21fae
    • Opcode Fuzzy Hash: 4ba9e3705484fac20227168cc6c42bc61e6528e44f360de262ce13e398df4675
    • Instruction Fuzzy Hash: 84315E71548310AEF710CF54CC89B8B7BE5EB8C784F20481DF3559A2A8D7B5A148CF9A
    APIs
    • ??2@YAPAXI@Z.MSVCRT(00000400,?,?), ref: 10003FBC
    • ??2@YAPAXI@Z.MSVCRT(00000410), ref: 10004014
    • recv.WS2_32(?,00000000,00000410,00000000), ref: 10004028
    • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,00000410,00000000), ref: 1000404C
    • fwrite.MSVCRT ref: 1000407C
    • WSAGetLastError.WS2_32(?,00000000,00000410,00000000), ref: 100040C1
      • Part of subcall function 10003F70: fclose.MSVCRT ref: 10003F7B
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: ??2@$??3@ErrorLastfclosefwriterecv
    • String ID:
    • API String ID: 1190228266-0
    • Opcode ID: fb8e23e91456c18ce9e124ef80a1fdcdd7395fd16c058db91a6e9a4783862ac4
    • Instruction ID: a469010b371657938a835d1a49e02ba920d2b755804c3035d04ac2f5b7775b76
    • Opcode Fuzzy Hash: fb8e23e91456c18ce9e124ef80a1fdcdd7395fd16c058db91a6e9a4783862ac4
    • Instruction Fuzzy Hash: AB41B2B2A083428BE310CF14D88065FB3E5FFC4390F02093DFA85A7645DB75E9498B9A
    APIs
    • OpenSCManagerW.ADVAPI32(00000000,00000000,000F003F), ref: 10002D4B
    • OpenServiceW.ADVAPI32(00000000,100064C0,00010000), ref: 10002D62
    • DeleteService.ADVAPI32(00000000), ref: 10002D6F
    • CloseServiceHandle.ADVAPI32(00000000), ref: 10002D80
    • CloseServiceHandle.ADVAPI32(00000000), ref: 10002D83
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: Service$CloseHandleOpen$DeleteManager
    • String ID:
    • API String ID: 204194956-0
    • Opcode ID: e9f920ea6b0ac93f1da8a78629853bc3d8b9e1790e0e2dc86ee7852bc6bd51bc
    • Instruction ID: d4aa38b7b11c0e10988c49f5aa9b6fc21c6d9120cca4db4f7cfee64cdb8f1bd3
    • Opcode Fuzzy Hash: e9f920ea6b0ac93f1da8a78629853bc3d8b9e1790e0e2dc86ee7852bc6bd51bc
    • Instruction Fuzzy Hash: 41E04F3160163266F36257256C4CF6F3AA8EFC9FE3F520216FA04E629CEF519C0185E4
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: hXMV$hXMV
    • API String ID: 0-400149659
    • Opcode ID: 9c1469fbd90d131cb05a814f9d29cef5578740e930c1fed6c4241e09c5ca588a
    • Instruction ID: 25e08977c553acebb425d342dc9919dad31361978b2bc62c39eb56c56b6c8ebf
    • Opcode Fuzzy Hash: 9c1469fbd90d131cb05a814f9d29cef5578740e930c1fed6c4241e09c5ca588a
    • Instruction Fuzzy Hash: 82F0C272E0868AABE714CB49DC91BAFFBB8E745B20F704229F524576C1C73A19018B90
    APIs
    • GetVersionExW.KERNEL32(00000000), ref: 10001223
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: Version
    • String ID:
    • API String ID: 1889659487-0
    • Opcode ID: 895c9c88edb24a52fb75ff49a360d76f78ac4b567bf5cc530db337261d7cc269
    • Instruction ID: 6c16c8dde2de0de552518a4f45345c70c84d4ac1e2a93fee1a70dada651428e6
    • Opcode Fuzzy Hash: 895c9c88edb24a52fb75ff49a360d76f78ac4b567bf5cc530db337261d7cc269
    • Instruction Fuzzy Hash: 6EE07E781483459FD329DF14D085ADABBE1BFCD310F408958E88883354D739A855CE82

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 9 10003430-10003454 CreateMutexW GetLastError 10 10003470-10003490 GetOEMCP WSAStartup 9->10 11 10003456-10003462 9->11 10->10 12 10003492-100034cd socket htons gethostbyname 10->12 13 100034ea-1000350d htons gethostbyname 12->13 14 100034cf-100034e8 12->14 15 1000352a-1000352c 13->15 16 1000350f-10003528 13->16 14->13 17 10003548-10003561 connect 15->17 18 1000352e-10003530 15->18 16->15 20 10003567-10003605 call 10001480 select 17->20 21 10003668-1000367b connect 17->21 18->17 19 10003532-10003543 Sleep closesocket 18->19 19->10 27 100036ba-100036ce strstr 20->27 28 1000360b-1000361b __WSAFDIsSet 20->28 22 10003687 21->22 23 1000367d 21->23 29 10003691-10003697 WSAGetLastError 22->29 23->22 30 100036d4-1000371e socket htons gethostbyname 27->30 31 10003999-100039a6 closesocket 27->31 28->27 32 10003621-1000362a ??2@YAPAXI@Z 28->32 29->27 33 10003720-10003727 closesocket 30->33 34 10003732-10003764 connect 30->34 31->10 35 1000362c-1000363c recv 32->35 33->34 36 10003766-10003783 WSAGetLastError closesocket * 2 34->36 37 10003788-100037e2 atoi call 10001480 select 34->37 35->29 38 1000363e-1000364c 35->38 36->10 45 100037e4-100037f1 __WSAFDIsSet 37->45 46 1000385b-1000386f strstr 37->46 39 10003662-10003664 38->39 40 1000364e-10003660 strncmp 38->40 39->35 42 10003666-100036b7 ??3@YAXPAX@Z 39->42 40->27 40->39 42->27 45->46 49 100037f3-100037fe ??2@YAPAXI@Z 45->49 47 10003871-10003886 closesocket * 2 46->47 48 10003895-100038bd call 100011b0 46->48 52 1000388d-10003893 WSAGetLastError 47->52 55 100038bf-100038e5 ??2@YAPAXI@Z 48->55 51 10003800-10003810 recv 49->51 51->52 54 10003812-10003820 51->54 52->46 56 10003822-10003834 strncmp 54->56 57 10003836-10003838 54->57 58 100038e7-100038f7 recv 55->58 56->46 56->57 57->51 59 1000383a-10003858 ??3@YAXPAX@Z 57->59 60 100038f9-100038ff 58->60 61 1000393a-10003994 WSAGetLastError TerminateThread * 2 closesocket * 2 SetEvent * 2 58->61 59->46 60->58 62 10003901-10003938 ??3@YAXPAX@Z call 10002d90 60->62 61->10 62->55
    APIs
    • CreateMutexW.KERNEL32(00000000,00000001,111), ref: 10003443
    • GetLastError.KERNEL32 ref: 10003449
    • Sleep.KERNEL32(00000BB8), ref: 1000346A
    • GetOEMCP.KERNEL32(00000BB8), ref: 10003470
    • WSAStartup.WS2_32(00000202,?), ref: 10003488
    • socket.WS2_32(00000002,00000001,00000000), ref: 10003497
    • htons.WS2_32(000001BB), ref: 100034B7
    • gethostbyname.WS2_32(mircroupdata.dynamic-dns.net), ref: 100034C3
    • htons.WS2_32(000001BB), ref: 100034F9
    • gethostbyname.WS2_32(mircroupdata.dynamic-dns.net), ref: 10003505
    • closesocket.WS2_32(00000000), ref: 10003538
    • connect.WS2_32(00000000,?,00000010), ref: 1000355C
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: gethostbynamehtons$CreateErrorLastMutexSleepStartupclosesocketconnectsocket
    • String ID: 111$connect_ok$mircroupdata.dynamic-dns.net$mircroupdata.dynamic-dns.net$password
    • API String ID: 766072800-4198190782
    • Opcode ID: 297c83c01b996efc3e2887c630c78d32944365f44d252ed87a3ec685554ee870
    • Instruction ID: ebcbd91c580d4eb3c0e248b8f3a0af665f01bbd164a34ceb2893d659881f15f7
    • Opcode Fuzzy Hash: 297c83c01b996efc3e2887c630c78d32944365f44d252ed87a3ec685554ee870
    • Instruction Fuzzy Hash: 89E1D271504320ABF710DF64CC85BAB77EAFB88785F10851DF905972A8EB75E904CB92

    Control-flow Graph

    APIs
    • LoadLibraryW.KERNEL32(Kernel32.dll,CreateToolhelp32Snapshot,?,?,00000000,00000000), ref: 100016F4
    • GetProcAddress.KERNEL32(00000000), ref: 100016FB
    • Process32FirstW.KERNEL32(00000000,?), ref: 10001732
    • OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 1000176F
    • GetModuleFileNameExW.PSAPI(00000000,00000000,?,00000104), ref: 10001785
    • wcscpy.MSVCRT ref: 100017B2
    • wcscpy.MSVCRT ref: 100017C4
    • ??2@YAPAXI@Z.MSVCRT(00000410), ref: 10001809
    • send.WS2_32(00000000,00000000,00000410,00000000), ref: 10001832
    • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,00000000,00000000), ref: 10001849
    • Process32NextW.KERNEL32(?,?), ref: 10001867
    • wsprintfW.USER32 ref: 100018A5
    • wcscpy.MSVCRT ref: 100018B5
    • ??2@YAPAXI@Z.MSVCRT(00000410), ref: 100018EE
    • send.WS2_32(00000000,00000104,00000410,00000000), ref: 10001917
    • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 1000192A
    • CloseHandle.KERNEL32(00000000), ref: 10001937
    • WSAGetLastError.WS2_32(?,?,00000000,00000000), ref: 10001948
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: wcscpy$??2@??3@Process32send$AddressCloseErrorFileFirstHandleLastLibraryLoadModuleNameNextOpenProcProcesswsprintf
    • String ID: CreateToolhelp32Snapshot$Kernel32.dll$LOOK PRO FINISH (total %d)
    • API String ID: 1465932988-42666897
    • Opcode ID: ba017d89b7384dbf8beae6dbc92bbd62b8fa4331ee3d7cd1a14d2058b056d1af
    • Instruction ID: 0a9712c74a3d14d32fc507253284868a3c75b8de6885b334269839cc9f8ffd83
    • Opcode Fuzzy Hash: ba017d89b7384dbf8beae6dbc92bbd62b8fa4331ee3d7cd1a14d2058b056d1af
    • Instruction Fuzzy Hash: CC51C3B15047559BF720DF24CC84BEF77E9FBC8380F010928FA4997295DB74AA058B92

    Control-flow Graph

    APIs
    • GetTickCount.KERNEL32 ref: 10002DBC
    • TerminateProcess.KERNEL32(00000000,00000000), ref: 10002EE8
    • CloseHandle.KERNEL32(00000000), ref: 10002EFA
    • TerminateThread.KERNEL32(00000000,00000000), ref: 10002F1E
    • CloseHandle.KERNEL32(00000000), ref: 10002F2A
    • ??2@YAPAXI@Z.MSVCRT(0000041C), ref: 10002F7D
    • wcscpy.MSVCRT ref: 10002FA6
    • CreateThread.KERNEL32(00000000,00000000,100026B0,00000000,00000000,00000000), ref: 10002FC9
    • ??2@YAPAXI@Z.MSVCRT(0000041C), ref: 10002FE8
    • wcscpy.MSVCRT ref: 10003011
    • CreateThread.KERNEL32(00000000,00000000,10002800,00000000,00000000,00000000), ref: 10003034
    • ??2@YAPAXI@Z.MSVCRT(0000041C), ref: 10003053
    • wcscpy.MSVCRT ref: 1000307C
    • CreateThread.KERNEL32(00000000,00000000,10002950,00000000,00000000,00000000), ref: 10003092
    • CloseHandle.KERNEL32(00000000), ref: 1000309E
    • TerminateThread.KERNEL32(00000000,00000000,00000000), ref: 100030BD
    • CloseHandle.KERNEL32(00000000), ref: 100030CA
    • fclose.MSVCRT ref: 100030D6
    • ??2@YAPAXI@Z.MSVCRT ref: 100030F8
    • send.WS2_32(00000000,?,00000410,00000000), ref: 1000311E
    • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000410,00000000,00000410,00000000), ref: 10003131
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: Thread$??2@CloseHandle$CreateTerminatewcscpy$??3@CountProcessTickfclosesend
    • String ID:
    • API String ID: 1819345987-0
    • Opcode ID: c3011058f0fe82002eac28cb9b040a563d2c80b97a7de21589a28dfa99763b7f
    • Instruction ID: 1c1eeca6c7e678e84d2552db9eafc9bc94aac18e0cc6718ed3338d9b968628f1
    • Opcode Fuzzy Hash: c3011058f0fe82002eac28cb9b040a563d2c80b97a7de21589a28dfa99763b7f
    • Instruction Fuzzy Hash: C6913BF56043109BF720DB28ECC1BDB77E4EB88395F14403AFA4887385D67AB4458BA5

    Control-flow Graph

    APIs
    • gethostname.WS2_32(00000000,00000032), ref: 100014A4
    • gethostbyname.WS2_32(00000000), ref: 100014B3
    • inet_ntoa.WS2_32 ref: 100014C5
    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000032), ref: 10001513
    • mbstowcs.MSVCRT ref: 10001524
    • wcscpy.MSVCRT ref: 1000155A
    • wsprintfW.USER32 ref: 10001581
    • wcscpy.MSVCRT ref: 10001593
    • wsprintfW.USER32 ref: 100015FE
    • wcscpy.MSVCRT ref: 10001610
    • ??2@YAPAXI@Z.MSVCRT(00000410), ref: 1000166D
    • send.WS2_32(?,00000000,00000410,00000000), ref: 1000169D
    • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,?,?), ref: 100016B0
    • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?), ref: 100016C3
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: wcscpy$wsprintf$??2@??3@ByteCharErrorLastMultiWidegethostbynamegethostnameinet_ntoambstowcssend
    • String ID: %d M$%dDay %dHour %dMin %dSec$mircroupdata.dynamic-dns.net
    • API String ID: 4149417593-1019766390
    • Opcode ID: 9943b3763ba919198c90971646df82594e6995f7aed30f1b9187e5529ee36fcd
    • Instruction ID: fa9301ae2e92a151798d79a18c68dec0087eaa4b41b67b2342d2df146a23db2e
    • Opcode Fuzzy Hash: 9943b3763ba919198c90971646df82594e6995f7aed30f1b9187e5529ee36fcd
    • Instruction Fuzzy Hash: BA51B371604340ABE324CB64CC44BEBB3EDEBC8390F44491CF94997294DA75FA058B92

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 207 10003465 208 1000346a Sleep 207->208 209 10003470-10003490 GetOEMCP WSAStartup 208->209 209->209 210 10003492-100034cd socket htons gethostbyname 209->210 211 100034ea-1000350d htons gethostbyname 210->211 212 100034cf-100034e8 210->212 213 1000352a-1000352c 211->213 214 1000350f-10003528 211->214 212->211 215 10003548-10003561 connect 213->215 216 1000352e-10003530 213->216 214->213 218 10003567-10003605 call 10001480 select 215->218 219 10003668-1000367b connect 215->219 216->215 217 10003532-10003543 closesocket 216->217 217->208 224 100036ba-100036ce strstr 218->224 225 1000360b-1000361b __WSAFDIsSet 218->225 220 10003687 219->220 221 1000367d 219->221 226 10003691-10003697 WSAGetLastError 220->226 221->220 227 100036d4-1000371e socket htons gethostbyname 224->227 228 10003999-100039a6 closesocket 224->228 225->224 229 10003621-1000362a ??2@YAPAXI@Z 225->229 226->224 230 10003720-10003727 closesocket 227->230 231 10003732-10003764 connect 227->231 228->209 232 1000362c-1000363c recv 229->232 230->231 233 10003766-10003783 WSAGetLastError closesocket * 2 231->233 234 10003788-100037e2 atoi call 10001480 select 231->234 232->226 235 1000363e-1000364c 232->235 233->209 242 100037e4-100037f1 __WSAFDIsSet 234->242 243 1000385b-1000386f strstr 234->243 236 10003662-10003664 235->236 237 1000364e-10003660 strncmp 235->237 236->232 239 10003666-100036b7 ??3@YAXPAX@Z 236->239 237->224 237->236 239->224 242->243 246 100037f3-100037fe ??2@YAPAXI@Z 242->246 244 10003871-10003886 closesocket * 2 243->244 245 10003895-100038bd call 100011b0 243->245 249 1000388d-10003893 WSAGetLastError 244->249 252 100038bf-100038e5 ??2@YAPAXI@Z 245->252 248 10003800-10003810 recv 246->248 248->249 251 10003812-10003820 248->251 249->243 253 10003822-10003834 strncmp 251->253 254 10003836-10003838 251->254 255 100038e7-100038f7 recv 252->255 253->243 253->254 254->248 256 1000383a-10003858 ??3@YAXPAX@Z 254->256 257 100038f9-100038ff 255->257 258 1000393a-10003994 WSAGetLastError TerminateThread * 2 closesocket * 2 SetEvent * 2 255->258 256->243 257->255 259 10003901-10003938 ??3@YAXPAX@Z call 10002d90 257->259 258->209 259->252
    APIs
    • Sleep.KERNEL32(00000BB8), ref: 1000346A
    • GetOEMCP.KERNEL32(00000BB8), ref: 10003470
    • WSAStartup.WS2_32(00000202,?), ref: 10003488
    • socket.WS2_32(00000002,00000001,00000000), ref: 10003497
    • htons.WS2_32(000001BB), ref: 100034B7
    • gethostbyname.WS2_32(mircroupdata.dynamic-dns.net), ref: 100034C3
    • htons.WS2_32(000001BB), ref: 100034F9
    • gethostbyname.WS2_32(mircroupdata.dynamic-dns.net), ref: 10003505
    • closesocket.WS2_32(00000000), ref: 10003538
    • connect.WS2_32(00000000,?,00000010), ref: 1000355C
    Strings
    • mircroupdata.dynamic-dns.net, xrefs: 100034B9
    • mircroupdata.dynamic-dns.net, xrefs: 100034FB
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: gethostbynamehtons$SleepStartupclosesocketconnectsocket
    • String ID: mircroupdata.dynamic-dns.net$mircroupdata.dynamic-dns.net
    • API String ID: 1830810353-3462125824
    • Opcode ID: 3056f5cdb7e03079f624acb465ea02d17cb143927d5f1f6b0ee980c8f8f2f6ce
    • Instruction ID: 3fe1ecd4b492881f830b5980f4bd19f9185f32bb121a338048f6a1f8965fb255
    • Opcode Fuzzy Hash: 3056f5cdb7e03079f624acb465ea02d17cb143927d5f1f6b0ee980c8f8f2f6ce
    • Instruction Fuzzy Hash: 88218E302047219BFB15DF60CC8966BB7EAFF49B86F40801DEA069B228E7B6D844C755

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 262 10002ad0-10002ae2 263 10002aea-10002b34 select __WSAFDIsSet 262->263 263->263 264 10002b36-10002b4c ??2@YAPAXI@Z 263->264 265 10002b4e-10002b5e recv 264->265 266 10002b64-10002b6a 265->266 267 10002c28-10002c38 WSAGetLastError 265->267 266->265 268 10002b6c-10002b91 ??3@YAXPAX@Z 266->268 268->263 269 10002b97-10002bda ??2@YAPAXI@Z 268->269 270 10002bfa-10002c03 ??3@YAXPAX@Z 269->270 271 10002bdc-10002bf0 send 269->271 270->263 272 10002bf2-10002bf8 271->272 273 10002c08-10002c23 WSAGetLastError closesocket 271->273 272->270 272->271 273->263
    APIs
    • select.WS2_32(?,?,00000000,?,00000000), ref: 10002B1B
    • __WSAFDIsSet.WS2_32(00000000,?), ref: 10002B2D
    • ??2@YAPAXI@Z.MSVCRT(00000410,00000000,?,?,?,00000000,?,00000000,00000000,0000000A), ref: 10002B42
    • recv.WS2_32(00000000,?,00000410,00000000), ref: 10002B56
    • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000410,00000000), ref: 10002B7D
    • ??2@YAPAXI@Z.MSVCRT(?,00000000), ref: 10002BB1
    • send.WS2_32(?,00000000,?,00000000), ref: 10002BE8
    • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 10002BFB
    • WSAGetLastError.WS2_32(?,00000000), ref: 10002C08
    • closesocket.WS2_32(00000000), ref: 10002C1D
    • WSAGetLastError.WS2_32(?,00000410,00000000), ref: 10002C28
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: ??2@??3@ErrorLast$closesocketrecvselectsend
    • String ID:
    • API String ID: 2252093931-0
    • Opcode ID: 77c250424815a847c6f7ba61cc5b161b2bd579a3bbed4e98e10375f55bc999ab
    • Instruction ID: c976249a9a8c53d14f7152e282bfa887b7d50e62d0d8cb4940ca33b7c7704eaa
    • Opcode Fuzzy Hash: 77c250424815a847c6f7ba61cc5b161b2bd579a3bbed4e98e10375f55bc999ab
    • Instruction Fuzzy Hash: F031B0726003169BF724DF64CC95BDB77E9EB89380F010528F94587249DB76AA09CB92

    Control-flow Graph

    APIs
    • ??2@YAPAXI@Z.MSVCRT(00000010), ref: 10002821
    • ResetEvent.KERNEL32(00000000), ref: 1000288C
    • ResetEvent.KERNEL32(00000000), ref: 10002894
    • Sleep.KERNEL32(000007D0), ref: 1000289B
    • SetEvent.KERNEL32(00000000), ref: 100028B5
    • SetEvent.KERNEL32(00000000), ref: 100028BE
      • Part of subcall function 10004110: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000400,00000000,00000000), ref: 1000414F
      • Part of subcall function 10004110: fopen.MSVCRT ref: 1000415F
      • Part of subcall function 10004110: fseek.MSVCRT ref: 10004185
    • ??2@YAPAXI@Z.MSVCRT(00000410), ref: 100028E2
    • send.WS2_32(00000000,00000000,00000410,00000000), ref: 10002908
    • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 1000291B
    • WSAGetLastError.WS2_32 ref: 1000293C
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: Event$??2@Reset$??3@ByteCharErrorLastMultiSleepWidefopenfseeksend
    • String ID:
    • API String ID: 2237447286-0
    • Opcode ID: 545e26743b538da2d0256948276f9b189521645c888e31a5cc7cfd0753457a4c
    • Instruction ID: 8c88a7173fb445b308ccdb77c746ac7f4a700c5bc602be837f9330fd020dbf0f
    • Opcode Fuzzy Hash: 545e26743b538da2d0256948276f9b189521645c888e31a5cc7cfd0753457a4c
    • Instruction Fuzzy Hash: 6A3109F6600214ABF710DB64CC85B9B77E9FB8C790F114628FA0597399DB35A804CBE5

    Control-flow Graph

    APIs
    • ??2@YAPAXI@Z.MSVCRT(00000010), ref: 100026D1
    • ResetEvent.KERNEL32(00000000), ref: 1000273C
    • ResetEvent.KERNEL32(00000000), ref: 10002744
    • Sleep.KERNEL32(000007D0), ref: 1000274B
    • SetEvent.KERNEL32(00000000), ref: 10002765
    • SetEvent.KERNEL32(00000000), ref: 1000276E
      • Part of subcall function 10004110: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000400,00000000,00000000), ref: 1000414F
      • Part of subcall function 10004110: fopen.MSVCRT ref: 1000415F
      • Part of subcall function 10004110: fseek.MSVCRT ref: 10004185
    • ??2@YAPAXI@Z.MSVCRT(00000410), ref: 10002792
    • send.WS2_32(00000000,00000000,00000410,00000000), ref: 100027B8
    • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 100027CB
    • WSAGetLastError.WS2_32 ref: 100027EC
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: Event$??2@Reset$??3@ByteCharErrorLastMultiSleepWidefopenfseeksend
    • String ID:
    • API String ID: 2237447286-0
    • Opcode ID: dc6aecf0e4e7584b8d597a30afd35f24a8038c87cc5cde6187605972ad39e936
    • Instruction ID: 9593be83d57895235682dcee4e743a818cf0cff742c977b3c7a1ba4151597c64
    • Opcode Fuzzy Hash: dc6aecf0e4e7584b8d597a30afd35f24a8038c87cc5cde6187605972ad39e936
    • Instruction Fuzzy Hash: 1331E6B66042109BF710DB64CC85B9B77A9FB88390F114628FA0987399DB75A844CBE5

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 304 100031a4-100031e4 wcstombs gethostbyname 305 100032fa-10003308 304->305 306 100031ea-100031fb socket 304->306 306->305 307 10003201-1000324f htons connect 306->307 307->305 308 10003255-10003289 ResetEvent * 2 307->308 309 100032a1-100032ce CreateThread 308->309 310 1000328b-1000329c CreateThread 308->310 309->305 310->309
    APIs
    • wcstombs.MSVCRT ref: 100031CD
    • gethostbyname.WS2_32(?), ref: 100031DA
    • socket.WS2_32(00000002,00000001,00000000), ref: 100031F0
    • htons.WS2_32 ref: 10003233
    • connect.WS2_32(00000000,?,00000010), ref: 10003246
    • ResetEvent.KERNEL32(00000000), ref: 10003270
    • ResetEvent.KERNEL32(00000000), ref: 10003278
    • CreateThread.KERNEL32(00000000,00000000,Function_00002AD0,00000000,00000000,00000000), ref: 1000329A
    • CreateThread.KERNEL32(00000000,00000000,Function_00002C40,?,00000000,00000000), ref: 100032BE
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: CreateEventResetThread$connectgethostbynamehtonssocketwcstombs
    • String ID:
    • API String ID: 223029929-0
    • Opcode ID: a08a4fc2431d913bba4c9591927c1b2cd6d85cbfb5f5ff91f714eb7699c0cf9d
    • Instruction ID: 927e1738d20abe1d0f1b307c8ef05adcbb485e93cd62e5af3d16f770fc2d2d26
    • Opcode Fuzzy Hash: a08a4fc2431d913bba4c9591927c1b2cd6d85cbfb5f5ff91f714eb7699c0cf9d
    • Instruction Fuzzy Hash: FD31A475604310AFE720CB24CC81B9B77E5EB8CB51F10491DFA45A72D4D7B6A908CB96

    Control-flow Graph

    APIs
    • RegOpenKeyExW.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Internet Settings,00000000,00020019,?,75A773E0,?,?,?,10001626,?,?), ref: 100013DA
    • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,?,10001626,?,?), ref: 100013ED
    • RegQueryValueExW.ADVAPI32(?,ProxyEnable,00000000,?), ref: 1000142B
    Strings
    • ProxyEnable, xrefs: 1000141D
    • Software\Microsoft\Windows\CurrentVersion\Internet Settings, xrefs: 100013D0
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: ??2@OpenQueryValue
    • String ID: ProxyEnable$Software\Microsoft\Windows\CurrentVersion\Internet Settings
    • API String ID: 2275364114-1808106468
    • Opcode ID: c6987373415038016d1ad428303ba20c933c8d1a64fb8354375fcb3238d3cc6a
    • Instruction ID: 34fc9181e4f2e346789c2428ccb036e8b8c48cd1f4024b335a81f20db343bc21
    • Opcode Fuzzy Hash: c6987373415038016d1ad428303ba20c933c8d1a64fb8354375fcb3238d3cc6a
    • Instruction Fuzzy Hash: F41190B16083426BF314EF689C51ADBBAE5EF88340F44485DF58882256E770D60886E7
    APIs
    • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 10002971
    • ??2@YAPAXI@Z.MSVCRT(00000410), ref: 100029ED
    • send.WS2_32(00000000,00000000,00000410,00000000), ref: 10002A16
    • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 10002A2D
      • Part of subcall function 10003F00: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000400,00000000,00000000,?), ref: 10003F35
      • Part of subcall function 10003F00: fopen.MSVCRT ref: 10003F45
    • wcscpy.MSVCRT ref: 10002A69
    • ??2@YAPAXI@Z.MSVCRT(00000410,?,?), ref: 10002A79
    • send.WS2_32(00000000,00000000,00000410,00000000), ref: 10002A9F
    • WSAGetLastError.WS2_32 ref: 10002AB6
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: ??2@$send$??3@ByteCharErrorLastMultiWidefopenwcscpy
    • String ID:
    • API String ID: 2392472551-0
    • Opcode ID: 098c060dbc7b52ab303ffb784b6c3c40be57781a8cca0e9ef4fb8ef4fddbb040
    • Instruction ID: 8a26d9e6375ad740591beb029c97ee1d26c7202b34df74addd45442dcfb9abfd
    • Opcode Fuzzy Hash: 098c060dbc7b52ab303ffb784b6c3c40be57781a8cca0e9ef4fb8ef4fddbb040
    • Instruction Fuzzy Hash: 3031E5B26007519BF320CB25CC8579B77E9FB88790F014638F94997389DF74A904CB96
    APIs
    • ReadFile.KERNEL32(00000000,?,000001FF,00000000,00000000), ref: 10001AB7
    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?), ref: 10001B1E
    • wcscpy.MSVCRT ref: 10001B34
    • ??2@YAPAXI@Z.MSVCRT ref: 10001B4F
    • send.WS2_32(00000000,?,00000410,00000000), ref: 10001B78
    • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000410,00000000), ref: 10001B8B
    • WSAGetLastError.WS2_32(?,00000410,00000000), ref: 10001B98
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: ??2@??3@ByteCharErrorFileLastMultiReadWidesendwcscpy
    • String ID:
    • API String ID: 3138976475-0
    • Opcode ID: 0f5b30952a235ea7ee8b6396ddae8dec54b17ad26299772d589558d42acaa3ba
    • Instruction ID: 377c3d26e852191d57a91ee3c4ecf05a71ee6056ce44171d8d843e0d2da36775
    • Opcode Fuzzy Hash: 0f5b30952a235ea7ee8b6396ddae8dec54b17ad26299772d589558d42acaa3ba
    • Instruction Fuzzy Hash: 8831A871204346AFF720CB24CC54BEB73E9EBC8340F00092DF65997294EB75A90987A3
    APIs
    • GetTickCount.KERNEL32 ref: 1000102C
    • ??2@YAPAXI@Z.MSVCRT ref: 1000106C
    • send.WS2_32(00000000,00000104,00000410,00000000), ref: 10001092
    • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 100010A5
    • Sleep.KERNEL32(00009C40), ref: 100010B2
    • WSAGetLastError.WS2_32 ref: 100010D0
    • closesocket.WS2_32(00000000), ref: 100010DF
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: ??2@??3@CountErrorLastSleepTickclosesocketsend
    • String ID:
    • API String ID: 1914851243-0
    • Opcode ID: f577cd392b19dfd39cec723f6e96506bae673b0265301f3e92f584b97250d589
    • Instruction ID: d94c9553da811a28f2fce3e0f93dd2de5d444d9c04fac52cd2fe30fb4f9d74b8
    • Opcode Fuzzy Hash: f577cd392b19dfd39cec723f6e96506bae673b0265301f3e92f584b97250d589
    • Instruction Fuzzy Hash: BF21D1717002558BF700CB35DC8979B37E5EB843D6F010439FA41C725CEBBAE98886A2
    APIs
      • Part of subcall function 100025B0: GetFileAttributesW.KERNEL32(?,100025F7,?,?,?,00000000), ref: 100025B9
    • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 1000260C
    • ??2@YAPAXI@Z.MSVCRT(00000410), ref: 10002649
    • send.WS2_32(00000000,00000000,00000410,00000000), ref: 1000266F
    • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 10002682
    • WSAGetLastError.WS2_32 ref: 1000269A
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: ??2@??3@AttributesErrorExecuteFileLastShellsend
    • String ID: open
    • API String ID: 4080252296-2758837156
    • Opcode ID: 36e9baf4d0c9fdb419819e233b878e263219e926738e82f55a11d176f5b109d4
    • Instruction ID: f943a664f0ea96b4dc68a7cff9be4213b8e2c9aab41f51eb370d717f6862ffb1
    • Opcode Fuzzy Hash: 36e9baf4d0c9fdb419819e233b878e263219e926738e82f55a11d176f5b109d4
    • Instruction Fuzzy Hash: 4A112BB260061057F310CB20DC86BDB76D8EB847D5F150435FA019B295DBBAF98983D9
    APIs
    • _wtoi.MSVCRT(00000000,?,?,00000000), ref: 1000196F
    • OpenProcess.KERNEL32(001F0FFF,00000000,00000000), ref: 10001981
    • TerminateProcess.KERNEL32(00000000,00000000), ref: 1000198E
    • ??2@YAPAXI@Z.MSVCRT(00000410), ref: 100019CB
    • send.WS2_32(00000000,?,00000410,00000000), ref: 100019F1
    • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000410,00000000), ref: 10001A04
    • WSAGetLastError.WS2_32(?,00000410,00000000), ref: 10001A17
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: Process$??2@??3@ErrorLastOpenTerminate_wtoisend
    • String ID:
    • API String ID: 1682623619-0
    • Opcode ID: 44af0541fbcf324d5782b0593ad0bd05d5675197d9830564703dd29e861c911f
    • Instruction ID: 3a71037d7a96ea86da102fa6f60a34c4d0a357625117caae62ee29ec169a8fc7
    • Opcode Fuzzy Hash: 44af0541fbcf324d5782b0593ad0bd05d5675197d9830564703dd29e861c911f
    • Instruction Fuzzy Hash: 0311E6B2A003115BF310DF20DC89B9B3BD8EB807D5F050438F90497259DB7AE98882E6
    APIs
    • recv.WS2_32 ref: 10002C83
    • ??2@YAPAXI@Z.MSVCRT(00000410), ref: 10002C9C
    • send.WS2_32(00000000,00000000,00000410,00000000), ref: 10002CC2
    • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 10002CD5
    • WSAGetLastError.WS2_32 ref: 10002CE6
    • closesocket.WS2_32 ref: 10002CFF
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: ??2@??3@ErrorLastclosesocketrecvsend
    • String ID:
    • API String ID: 1873095041-0
    • Opcode ID: ec42ab6da09824132e15eb91856200ea3c1f693f3b5b376774f1d1f9f9650f75
    • Instruction ID: aeb44a3bb8e0a1203247f99ab37f821fb7ebe578f5c67549010c6e56c2d80e53
    • Opcode Fuzzy Hash: ec42ab6da09824132e15eb91856200ea3c1f693f3b5b376774f1d1f9f9650f75
    • Instruction Fuzzy Hash: 5511D2B26002249BF700CF64CC85ADBB7E8FB883A5F040539FA0597254DB76E94987E6
    APIs
    • GetExitCodeProcess.KERNEL32(00000000), ref: 10001D24
    • TerminateThread.KERNEL32(00000000,00000000,?,10002EC0,00000000,?), ref: 10001D3D
    • wcscat.MSVCRT ref: 10001D58
    • wcslen.MSVCRT ref: 10001D5E
    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001000,00000000,00000000,10002EC0,00000000,?), ref: 10001DA2
    • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 10001DBC
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: ByteCharCodeExitFileMultiProcessTerminateThreadWideWritewcscatwcslen
    • String ID:
    • API String ID: 118662748-0
    • Opcode ID: 3c4c689e0c29a72d78c46af162be03f7c0454913ae3d77586f60af4647f00eea
    • Instruction ID: 8b1c56680e10605e56bcb1be71bd95fa798179eed4ce51ed37410ee85b244767
    • Opcode Fuzzy Hash: 3c4c689e0c29a72d78c46af162be03f7c0454913ae3d77586f60af4647f00eea
    • Instruction Fuzzy Hash: A2118172204291BFF311DB64CC84FDF33EDFB88785F104629F64596198DB79AA088BA1
    APIs
    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 10001124
    • ??2@YAPAXI@Z.MSVCRT ref: 10001147
    • send.WS2_32(00000000,?,00000410,00000000), ref: 1000116D
    • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000410,00000000), ref: 10001180
    • Sleep.KERNEL32(00009C40,?,00000410,00000000), ref: 1000118D
    • WSAGetLastError.WS2_32(?,00000410,00000000), ref: 100011A7
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: ??2@??3@ErrorLastObjectSingleSleepWaitsend
    • String ID:
    • API String ID: 3170285620-0
    • Opcode ID: 5bcd84b5a92d50d32167fff99c68aed3fb960083369a5a03cc47fbf4db115e83
    • Instruction ID: fb5898aab849cd6be72cbcf1b4ebb39d99d8b1d316814e8ca94bc596cba2b5ef
    • Opcode Fuzzy Hash: 5bcd84b5a92d50d32167fff99c68aed3fb960083369a5a03cc47fbf4db115e83
    • Instruction Fuzzy Hash: 6911E0B1600221ABF300CB24CC85BDB77E9EB853D4F014528FA04973A8DB76E94486D2
    APIs
    • fread.MSVCRT ref: 10004250
    • ??2@YAPAXI@Z.MSVCRT(00000410), ref: 1000425C
    • send.WS2_32(?,00000000,00000410,00000000), ref: 10004282
    • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,00000410,00000000,00000000,75923070,00000000), ref: 10004295
    • WSAGetLastError.WS2_32(?,00000000,00000410,00000000,00000000,75923070,00000000), ref: 100042C2
      • Part of subcall function 100041A0: fclose.MSVCRT ref: 100041AA
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: ??2@??3@ErrorLastfclosefreadsend
    • String ID:
    • API String ID: 2586463314-0
    • Opcode ID: e8f4d5085796ffea71cf3fd13c0752daad24d80455fdbf3b229a1b6ad2aa5663
    • Instruction ID: a39efd8a57863122f1050084b28ef757405dc8fdaf8256a10c4adfdd988bd093
    • Opcode Fuzzy Hash: e8f4d5085796ffea71cf3fd13c0752daad24d80455fdbf3b229a1b6ad2aa5663
    • Instruction Fuzzy Hash: D731C2B1A043119FE304CF24D84069BB7E5FBC8384F52493DFA85D7345DA74E9458B96
    APIs
    • DeleteFileW.KERNEL32(?), ref: 1000250D
    • ??2@YAPAXI@Z.MSVCRT ref: 1000253E
    • send.WS2_32(00000000,00000000,00000410,00000000), ref: 10002564
    • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 10002577
      • Part of subcall function 10002490: SHFileOperationW.SHELL32 ref: 100024D1
    • WSAGetLastError.WS2_32 ref: 1000258F
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: File$??2@??3@DeleteErrorLastOperationsend
    • String ID:
    • API String ID: 583681615-0
    • Opcode ID: 3314b34395dbffa4998d49237d848bb61304e9a670b211b1a176d33d2a4a99e8
    • Instruction ID: 3e42e3547cf1324030a642c7499dd84fa4143b2581b55218b4c6dadfc0ed3615
    • Opcode Fuzzy Hash: 3314b34395dbffa4998d49237d848bb61304e9a670b211b1a176d33d2a4a99e8
    • Instruction Fuzzy Hash: A4117AB26002195BF310DF38DC85BEB37D8EB84391F000934FA05C7244EA39F88987A6
    APIs
    • TerminateProcess.KERNEL32(00000000,00000000), ref: 10002E03
    • CloseHandle.KERNEL32(00000000), ref: 10002E16
    • TerminateThread.KERNEL32(00000000,00000000), ref: 10002E39
    • CloseHandle.KERNEL32(00000000), ref: 10002E46
    • exit.MSVCRT ref: 10002E4F
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: CloseHandleTerminate$ProcessThreadexit
    • String ID:
    • API String ID: 909354777-0
    • Opcode ID: 4a34bacec99acaa7b4100a1cba2411b5570e92b895b3c2f021c06721252522bb
    • Instruction ID: d1620063f169c4269894aff42485f7cb6d1acb416f81c141ff79c1bf72eea847
    • Opcode Fuzzy Hash: 4a34bacec99acaa7b4100a1cba2411b5570e92b895b3c2f021c06721252522bb
    • Instruction Fuzzy Hash: 130112B5A446209BF704DB69CCC4B1A37EAFB8C7D9F24401AF50887268DB79A5448FA1
    APIs
    • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,0000000A,100038A4,00000000,?,?,?,?,?,000001BB), ref: 100011BF
    • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,?,000001BB), ref: 100011CE
    • CreateThread.KERNEL32(00000000,00000000,10001000,00000000,00000000,00000000), ref: 100011EA
    • CreateThread.KERNEL32(00000000,00000000,100010F0,00000000,00000000,00000000), ref: 10001200
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: Create$EventThread
    • String ID:
    • API String ID: 3571019211-0
    • Opcode ID: 0b6ac9352678b0e72ffd089906221d812fb054a5f938ba18cbaba84c6a01cb23
    • Instruction ID: c55ed9b9b4935bf2434d1d35b9174ab6cb5e28cba6f25b8c269aef842b3a1f56
    • Opcode Fuzzy Hash: 0b6ac9352678b0e72ffd089906221d812fb054a5f938ba18cbaba84c6a01cb23
    • Instruction Fuzzy Hash: 35F07571BD03347AFA309B645C87F863A969708F91F300416F3047F1D8D6E234808B98
    APIs
    • CreateMutexW.KERNEL32(00000000,00000001,111), ref: 10003443
    • GetLastError.KERNEL32 ref: 10003449
    • Sleep.KERNEL32(00000BB8), ref: 1000346A
    • GetOEMCP.KERNEL32(00000BB8), ref: 10003470
    • WSAStartup.WS2_32(00000202,?), ref: 10003488
    • socket.WS2_32(00000002,00000001,00000000), ref: 10003497
    • htons.WS2_32(000001BB), ref: 100034B7
    • gethostbyname.WS2_32(mircroupdata.dynamic-dns.net), ref: 100034C3
    • htons.WS2_32(000001BB), ref: 100034F9
    • gethostbyname.WS2_32(mircroupdata.dynamic-dns.net), ref: 10003505
    • closesocket.WS2_32(00000000), ref: 10003538
    • connect.WS2_32(00000000,?,00000010), ref: 1000355C
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2463931357.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000003.00000002.2463889236.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463946181.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463959271.0000000010006000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2463973005.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
    Similarity
    • API ID: gethostbynamehtons$CreateErrorLastMutexSleepStartupclosesocketconnectsocket
    • String ID: 111
    • API String ID: 766072800-1298878781
    • Opcode ID: 7277068ca1c238f40571ebf68e59f023c591dcc063f81d36b2fc90246d2d8aaa
    • Instruction ID: f8972486e9c8a00a4c536b69445b814a1f584d8c326d2615df4a2f7668f35c35
    • Opcode Fuzzy Hash: 7277068ca1c238f40571ebf68e59f023c591dcc063f81d36b2fc90246d2d8aaa
    • Instruction Fuzzy Hash: 61018C2950E2C15FE7039374AD856963F62DF47359F4F48E1E1C4AA46BC18D180DCBA0