Create Interactive Tour

Windows Analysis Report iso.iso

Overview

General Information

Sample Name:iso.iso (renamed file extension from iso to img)
Analysis ID:736
MD5:00a47f21fea32a81de7a9e798fb32704
SHA1:b68d87592f56444443a2a17cdeea2fc3c8575b6a
SHA256:5d627575522c96ffb6af26bf7472f1f55a0a1e4ef4af7e75b062529f72304845
Infos:

Most interesting Screenshot:

Errors
  • Corrupt sample or wrongly selected analyzer. Details: No application is associated with the specified file for this operation.

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Sigma detected: Copying Sensitive Files with Credential Data
Sample execution stops while process was sleeping (likely an evasion)
PE file contains more sections than normal
Drops PE files to the application program directory (C:\ProgramData)
PE file contains an invalid checksum
Drops PE files
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
PE file contains sections with non-standard names
Binary contains a suspicious time stamp
Detected potential crypto function

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is start
  • cmd.exe (PID: 7464 cmdline: 'C:\Windows\System32\cmd.exe' /c xcopy /H /y temp.dll c:\programdata && start /B /min C:\Windows\System32\rundll32.exe c:\programdata\temp.dll,ClearNode MD5: 9D59442313565C2E0860B88BF32B2277)
    • conhost.exe (PID: 7456 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: C5E9B1D1103EDCEA2E408E9497A5A88F)
    • xcopy.exe (PID: 4780 cmdline: xcopy /H /y temp.dll c:\programdata MD5: F359375C36D2C540DFF1141B11BF2F7F)
    • rundll32.exe (PID: 3348 cmdline: C:\Windows\System32\rundll32.exe c:\programdata\temp.dll,ClearNode MD5: F68AF942FD7CCC0E7BAB1A2335D2AD26)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: Copying Sensitive Files with Credential Data
Source: Process startedAuthor: Teymur Kheirkhabarov, Daniil Yugoslavskiy, oscd.community: Data: Command: xcopy /H /y temp.dll c:\programdata , CommandLine: xcopy /H /y temp.dll c:\programdata , CommandLine|base64offset|contains: ), Image: C:\Windows\System32\xcopy.exe, NewProcessName: C:\Windows\System32\xcopy.exe, OriginalFileName: C:\Windows\System32\xcopy.exe, ParentCommandLine: 'C:\Windows\System32\cmd.exe' /c xcopy /H /y temp.dll c:\programdata && start /B /min C:\Windows\System32\rundll32.exe c:\programdata\temp.dll,ClearNode, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7464, ProcessCommandLine: xcopy /H /y temp.dll c:\programdata , ProcessId: 4780

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Antivirus detection for dropped file
Source: C:\ProgramData\temp.dllAvira: detection malicious, Label: HEUR/AGEN.1144327

System Summary:

barindex
Source: temp.dll.8.drStatic PE information: Number of sections : 11 > 10
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000000C0000C22DC9_2_000000C0000C22DC
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000000C0000CC5D09_2_000000C0000CC5D0
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000000C0000C05EC9_2_000000C0000C05EC
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000000C0000BA1E89_2_000000C0000BA1E8
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000000C0000C4FE09_2_000000C0000C4FE0
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000000C0000C15FC9_2_000000C0000C15FC
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000000C0000C540C9_2_000000C0000C540C
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000000C0000CA2049_2_000000C0000CA204
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000000C0000C43109_2_000000C0000C4310
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000000C0000BC82C9_2_000000C0000BC82C
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000000C0000C63209_2_000000C0000C6320
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000000C0000BEA349_2_000000C0000BEA34
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000000C0000B7D4C9_2_000000C0000B7D4C
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000000C0000B98409_2_000000C0000B9840
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000000C0000BA6449_2_000000C0000BA644
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000000C0000BD4509_2_000000C0000BD450
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000000C0000C94649_2_000000C0000C9464
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000000C0000C70849_2_000000C0000C7084
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000000C0000C49949_2_000000C0000C4994
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000000C0000BB4A89_2_000000C0000BB4A8
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000000C0000BC2BC9_2_000000C0000BC2BC
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000000C0000C0EB49_2_000000C0000C0EB4
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9B8EBC9_2_000001673E9B8EBC
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9C4C249_2_000001673E9C4C24
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9C2F209_2_000001673E9C2F20
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9C210B9_2_000001673E9C210B
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9B64409_2_000001673E9B6440
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9B72449_2_000001673E9B7244
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9B942C9_2_000001673E9B942C
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9C60649_2_000001673E9C6064
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9C20579_2_000001673E9C2057
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9BA0509_2_000001673E9BA050
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9B494C9_2_000001673E9B494C
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9BB67C9_2_000001673E9BB67C
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9BDAB49_2_000001673E9BDAB4
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9B80A89_2_000001673E9B80A8
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9C1BE09_2_000001673E9C1BE0
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9BEEDC9_2_000001673E9BEEDC
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9C15CF9_2_000001673E9C15CF
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9C91D09_2_000001673E9C91D0
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9C6E049_2_000001673E9C6E04
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9BE1FC9_2_000001673E9BE1FC
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9C40FD9_2_000001673E9C40FD
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9B6DE89_2_000001673E9B6DE8
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9BD1EC9_2_000001673E9BD1EC
Source: C:\Windows\System32\xcopy.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: classification engineClassification label: mal52.winIMG@6/1@0/0
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe c:\programdata\temp.dll,ClearNode
Source: unknownProcess created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /c xcopy /H /y temp.dll c:\programdata && start /B /min C:\Windows\System32\rundll32.exe c:\programdata\temp.dll,ClearNode
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\xcopy.exe xcopy /H /y temp.dll c:\programdata
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe c:\programdata\temp.dll,ClearNode
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\xcopy.exe xcopy /H /y temp.dll c:\programdata Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe c:\programdata\temp.dll,ClearNodeJump to behavior
Source: iso.isoJoe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
Source: C:\Windows\System32\conhost.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: iso.imgStatic file information: File size 1757184 > 1048576
Source: temp.dll.8.drStatic PE information: real checksum: 0x1a433b should be: 0x1a031c
Source: temp.dll.8.drStatic PE information: section name: .xdata
Source: temp.dll.8.drStatic PE information: 0xA7CAD086 [Mon Mar 17 00:32:06 2059 UTC]
Source: C:\Windows\System32\xcopy.exeFile created: C:\ProgramData\temp.dllJump to dropped file
Source: C:\Windows\System32\xcopy.exeFile created: C:\ProgramData\temp.dllJump to dropped file
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: rundll32.exe, 00000009.00000002.9766480277.0000016717D31000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 72000Jump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: 9_2_000001673E9B9AA0 GetProcessHeap,HeapAlloc,RtlAllocateHeap,9_2_000001673E9B9AA0
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\xcopy.exe xcopy /H /y temp.dll c:\programdata Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe c:\programdata\temp.dll,ClearNodeJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection11Rundll321OS Credential DumpingSecurity Software Discovery11Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection11Security Account ManagerFile and Directory Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Timestomp1NTDSSystem Information Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 736 Sample: iso.iso Startdate: 28/10/2021 Architecture: WINDOWS Score: 52 17 Antivirus detection for dropped file 2->17 19 Sigma detected: Copying Sensitive Files with Credential Data 2->19 6 cmd.exe 1 2->6         started        process3 process4 8 xcopy.exe 2 6->8         started        11 rundll32.exe 6->11         started        13 conhost.exe 1 6->13         started        file5 15 C:\ProgramData\temp.dll, PE32+ 8->15 dropped

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
No Antivirus matches
SourceDetectionScannerLabelLink
C:\ProgramData\temp.dll100%AviraHEUR/AGEN.1144327
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos

General Information

Joe Sandbox Version:33.0.0 White Diamond
Analysis ID:736
Start date:28.10.2021
Start time:09:07:26
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 31s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:iso.iso (renamed file extension from iso to img)
Cookbook file name:defaultwindowsinteractivecookbook.jbs
Number of analysed new started processes analysed:15
Number of new started drivers analysed:3
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal52.winIMG@6/1@0/0
EGA Information:
  • Successful, ratio: 100%
HDC Information:
  • Successful, ratio: 62.6% (good quality ratio 55.9%)
  • Quality average: 53.9%
  • Quality standard deviation: 27%
HCA Information:
  • Successful, ratio: 80%
  • Number of executed functions: 3
  • Number of non-executed functions: 45
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
Warnings:
  • Exclude process from analysis (whitelisted): cdfs.sys, vhdmp.sys, BackgroundTransferHost.exe, SIHClient.exe, backgroundTaskHost.exe, fsdepends.sys, svchost.exe
  • Excluded IPs from analysis (whitelisted): 2.21.142.245, 20.190.159.132, 20.190.159.136, 40.126.31.8, 20.190.159.134, 40.126.31.135, 40.126.31.139, 40.126.31.143, 40.126.31.1, 40.126.31.4, 40.126.31.141, 20.190.160.2, 20.190.160.75, 20.190.160.8, 20.190.160.4, 20.190.160.73, 20.190.160.6, 20.190.160.67, 20.190.160.132, 20.190.159.138, 40.126.31.137, 52.152.110.14, 40.126.31.2, 20.190.159.137, 40.126.31.142, 40.126.31.7, 40.126.31.9, 40.126.31.3, 40.126.31.5, 20.190.159.135, 20.54.110.249, 20.82.210.154, 40.112.88.60, 8.253.95.120, 8.248.133.254, 8.248.115.254, 8.248.119.254, 8.248.145.254, 20.199.120.85, 20.199.120.182, 92.123.194.82, 92.123.194.20, 20.199.120.151, 52.109.88.34, 20.50.102.62
  • Excluded domains from analysis (whitelisted): fg.download.windowsupdate.com.c.footprint.net, slscr.update.microsoft.com, www.tm.lg.prod.aadmsa.akadns.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, www.tm.a.prd.aadg.trafficmanager.net, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, login.live.com, sls.update.microsoft.com, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, glb.sls.prod.dcat.dsp.trafficmanager.net, client.wns.windows.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, wu-shim.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, www.tm.a.prd.aadg.akadns.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, login.msa.msidentity.com, prod.nexusrules.live.com.akadns.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, nexusrules.officeapps.live.com, displaycatalog-rp.md.mp.microsoft.com.akadns.net, www.tm.lg.prod.aadmsa.trafficmanager.net
  • Not all processes where analyzed, report is missing behavior information
Errors:
  • Corrupt sample or wrongly selected analyzer. Details: No application is associated with the specified file for this operation.
TimeTypeDescription
09:08:33API Interceptor2x Sleep call for process: rundll32.exe modified
C:\ProgramData\temp.dll
Process:C:\Windows\System32\xcopy.exe
File Type:PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
Category:dropped
Size (bytes):1702400
Entropy (8bit):6.178198204344416
Encrypted:false
SSDEEP:24576:yarBYucHPcCsi/GkU1C2LRB+HbkZ7TCYzaIXM:tYuegAGkU1CIu7wTC
MD5:411074A668721B9FE2EF22197E9F7E48
SHA1:E38E6555BF3D01EB3FA2CEE3F3A75128728F2DC2
SHA-256:95347BEA5432C09CC216F5DB771B956EB78A43139789036AF9446139967B1C7F
SHA-512:651EF9F23E050A7049E0BC0D9F1E2D8985982CDBB9D1E4379072595811538709AA81BF5235E205B8D8B33F7C50A720142C021ACEA180C387BB0C329F15299304
Malicious:true
Antivirus:
  • Antivirus: Avira, Detection: 100%
Reputation:low
Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................."..)..^..........P.........E.....................................;C....`... ......................................0.......@...............p...............p..`v...........................c..(....................B..p............................text....\.......^..................`.``.data........p.......b..............@.`..rdata...............h..............@.`@.pdata.......p.......X..............@.0@.xdata...............b..............@.0@.bss..................................`..edata.......0.......j..............@.0@.idata.......@.......r..............@.0..CRT....X....P.......~..............@.@..tls.........`......................@.@..reloc..`v...p...x..................@.0B........................................................................................................................................................................

Static File Info

General

File type:ISO 9660 CD-ROM filesystem data ''
Entropy (8bit):6.056353001538691
TrID:
  • ImgBurn Image (2052548/1) 49.86%
  • null bytes (2050048/1) 49.80%
  • Photoshop Action (5010/6) 0.12%
  • Lotus 123 Worksheet (generic) (2007/4) 0.05%
  • HSC music composer song (1267/141) 0.03%
File name:iso.img
File size:1757184
MD5:00a47f21fea32a81de7a9e798fb32704
SHA1:b68d87592f56444443a2a17cdeea2fc3c8575b6a
SHA256:5d627575522c96ffb6af26bf7472f1f55a0a1e4ef4af7e75b062529f72304845
SHA512:472bbe491d65e32252069c8ba3976dc3b4d1d2b3bacce8bcd2ed6e7fef1855246cc6ca9bfce08c8f580356947b668ccb4f898316d8f095fd2434bb090d27d2c3
SSDEEP:24576:JarBYucHPcCsi/GkU1C2LRB+HbkZ7TCYzaIXM:0YuegAGkU1CIu7wTC
File Content Preview:...............................................................................................................................................................................................................................................................

File Icon

Icon Hash:74f0ccccd4c4ecf4

Network Behavior

No network behavior found

Code Manipulations

Statistics

CPU Usage

050100s020406080100

Click to jump to process

Memory Usage

Click to jump to process

Behavior

Click to jump to process

System Behavior

Start time:09:08:31
Start date:28/10/2021
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:'C:\Windows\System32\cmd.exe' /c xcopy /H /y temp.dll c:\programdata && start /B /min C:\Windows\System32\rundll32.exe c:\programdata\temp.dll,ClearNode
Imagebase:0x7ff633bc0000
File size:280064 bytes
MD5 hash:9D59442313565C2E0860B88BF32B2277
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language
Reputation:low
Start time:09:08:31
Start date:28/10/2021
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff703e40000
File size:885760 bytes
MD5 hash:C5E9B1D1103EDCEA2E408E9497A5A88F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language
Reputation:low
Start time:09:08:32
Start date:28/10/2021
Path:C:\Windows\System32\xcopy.exe
Wow64 process (32bit):true
Commandline:xcopy /H /y temp.dll c:\programdata
Imagebase:0x9e0000
File size:47616 bytes
MD5 hash:F359375C36D2C540DFF1141B11BF2F7F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language
Reputation:low
Start time:09:08:33
Start date:28/10/2021
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:C:\Windows\System32\rundll32.exe c:\programdata\temp.dll,ClearNode
Imagebase:0x7ff61cb30000
File size:71168 bytes
MD5 hash:F68AF942FD7CCC0E7BAB1A2335D2AD26
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language
Reputation:low

Disassembly

Code Analysis

Execution Graph

Execution Coverage

Dynamic/Packed Code Coverage

Signature Coverage

Execution Coverage:0.2%
Dynamic/Decrypted Code Coverage:100%
Signature Coverage:31.8%
Total number of Nodes:132
Total number of Limit Nodes:5

Graph

Show Legend
Hide Nodes/Edges
execution_graph 17868 1673e9bbdec 17869 1673e9bbdf1 17868->17869 17869->17868 17892 1673e9b25a8 17869->17892 17872 1673e9b25a8 8 API calls 17873 1673e9bbe15 17872->17873 17896 1673e9b9208 17873->17896 17878 1673e9bbe35 SleepEx 17879 1673e9bbe3d 17878->17879 17880 1673e9b9208 8 API calls 17879->17880 17881 1673e9bbe56 17880->17881 17882 1673e9b99c4 8 API calls 17881->17882 17883 1673e9bbe6c 17882->17883 17904 1673e9b1b14 17883->17904 17889 1673e9bbeae 17890 1673e9b9ae8 2 API calls 17889->17890 17891 1673e9bbec8 17890->17891 17893 1673e9b25c0 17892->17893 17894 1673e9b25c5 17892->17894 17927 1673e9b1ce8 17893->17927 17894->17872 17898 1673e9b9218 17896->17898 17897 1673e9b923e 17900 1673e9b99c4 17897->17900 17898->17897 17932 1673e9b8ebc 17898->17932 17901 1673e9b99da 17900->17901 17902 1673e9b9a01 17901->17902 17950 1673e9b98b0 17901->17950 17902->17878 17902->17879 17905 1673e9b1b4e 17904->17905 17906 1673e9b1b1d 17904->17906 17915 1673e9b39d0 17905->17915 17906->17905 17907 1673e9b1b92 17906->17907 17908 1673e9b1bb9 17906->17908 17909 1673e9b9aa0 2 API calls 17907->17909 17910 1673e9b9ae8 2 API calls 17908->17910 17914 1673e9b1bb0 17908->17914 17909->17914 17912 1673e9b1bd3 17910->17912 17911 1673e9b9c00 8 API calls 17911->17905 17913 1673e9b9aa0 2 API calls 17912->17913 17913->17914 17914->17911 17916 1673e9b39fd 17915->17916 17917 1673e9b3b9f 17916->17917 18010 1673e9b9d70 17916->18010 17923 1673e9b9ae8 17917->17923 17919 1673e9b3b8e 17919->17917 17920 1673e9b9ae8 2 API calls 17919->17920 17920->17917 17921 1673e9b3a2d 17921->17919 18014 1673e9b1830 17921->18014 17924 1673e9b9b0e 17923->17924 17925 1673e9b9aed GetProcessHeap 17923->17925 17924->17889 17925->17924 17926 1673e9b9b00 HeapFree 17925->17926 17926->17924 17928 1673e9b9208 8 API calls 17927->17928 17929 1673e9b1cf1 17928->17929 17930 1673e9b99c4 8 API calls 17929->17930 17931 1673e9b1d05 17930->17931 17931->17894 17933 1673e9b8ee5 17932->17933 17946 1673e9b8f99 17932->17946 17934 1673e9b9155 17933->17934 17937 1673e9b90d5 17933->17937 17938 1673e9b8f68 17933->17938 17935 1673e9b9173 17934->17935 17936 1673e9b917a 17934->17936 17939 1673e9b9ae8 2 API calls 17935->17939 17940 1673e9b917f VirtualFree 17936->17940 17936->17946 17942 1673e9b9120 VirtualAlloc 17937->17942 17943 1673e9b90fa 17937->17943 17938->17934 17941 1673e9b8f82 17938->17941 17938->17946 17939->17946 17940->17946 17944 1673e9b8f8c Sleep SleepEx 17941->17944 17941->17946 17942->17946 17947 1673e9b9aa0 17943->17947 17944->17946 17946->17898 17948 1673e9b9ab0 GetProcessHeap HeapAlloc 17947->17948 17949 1673e9b9aac 17947->17949 17948->17949 17949->17946 17951 1673e9b9929 17950->17951 17957 1673e9b98d1 17950->17957 17951->17957 17964 1673e9b942c 17951->17964 17953 1673e9b9208 8 API calls 17956 1673e9b9947 17953->17956 17954 1673e9b999f 17954->17902 17958 1673e9b99c4 8 API calls 17956->17958 17957->17953 17963 1673e9b998a 17957->17963 17959 1673e9b995d 17958->17959 17960 1673e9b9208 8 API calls 17959->17960 17959->17963 17961 1673e9b9974 17960->17961 17962 1673e9b99c4 8 API calls 17961->17962 17962->17963 17963->17954 17990 1673e9b9344 17963->17990 17965 1673e9b9454 17964->17965 17967 1673e9b97ef 17964->17967 17994 1673e9b9c00 17965->17994 17967->17957 17969 1673e9b9c00 8 API calls 17970 1673e9b94fc 17969->17970 17971 1673e9b9c00 8 API calls 17970->17971 17972 1673e9b9548 17971->17972 17973 1673e9b9c00 8 API calls 17972->17973 17974 1673e9b9594 17973->17974 17975 1673e9b9c00 8 API calls 17974->17975 17976 1673e9b95e0 17975->17976 17977 1673e9b9c00 8 API calls 17976->17977 17978 1673e9b962c 17977->17978 17979 1673e9b9c00 8 API calls 17978->17979 17980 1673e9b9678 17979->17980 17981 1673e9b9c00 8 API calls 17980->17981 17982 1673e9b96c4 17981->17982 17983 1673e9b9c00 8 API calls 17982->17983 17984 1673e9b970e 17983->17984 17985 1673e9b9c00 8 API calls 17984->17985 17986 1673e9b975a 17985->17986 17987 1673e9b9c00 8 API calls 17986->17987 17988 1673e9b97a6 17987->17988 17989 1673e9b9c00 8 API calls 17988->17989 17989->17967 17991 1673e9b937f 17990->17991 17993 1673e9b93da 17991->17993 17999 1673e9b9244 17991->17999 17993->17954 17995 1673e9b9208 8 API calls 17994->17995 17996 1673e9b9c15 17995->17996 17997 1673e9b99c4 8 API calls 17996->17997 17998 1673e9b94ab 17997->17998 17998->17969 18000 1673e9b9313 17999->18000 18001 1673e9b925f 17999->18001 18000->17993 18001->18000 18005 1673e9b9b74 18001->18005 18003 1673e9b92f2 18004 1673e9b98b0 8 API calls 18003->18004 18004->18000 18006 1673e9b9208 8 API calls 18005->18006 18007 1673e9b9b89 18006->18007 18008 1673e9b99c4 8 API calls 18007->18008 18009 1673e9b9b9f 18008->18009 18009->18003 18011 1673e9b9d84 18010->18011 18012 1673e9b9d7c 18010->18012 18011->17921 18013 1673e9b9aa0 2 API calls 18012->18013 18013->18011 18015 1673e9b1839 18014->18015 18019 1673e9b18b3 18014->18019 18016 1673e9b18c3 18015->18016 18017 1673e9b188b 18015->18017 18015->18019 18018 1673e9b9aa0 2 API calls 18016->18018 18016->18019 18020 1673e9b9aa0 2 API calls 18017->18020 18022 1673e9b18f6 18018->18022 18019->17921 18020->18019 18021 1673e9b9ae8 2 API calls 18021->18019 18022->18021

Executed Functions

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 0 1673e9b8ebc-1673e9b8edf 1 1673e9b8ee5-1673e9b8ef9 call 1673e9b8e64 0->1 2 1673e9b91ec-1673e9b9206 0->2 5 1673e9b8f4a-1673e9b8f50 1->5 6 1673e9b8efb-1673e9b8efe 1->6 7 1673e9b8f56-1673e9b8f5d call 1673e9b8e64 5->7 8 1673e9b9155-1673e9b9171 call 1673e9b8e64 5->8 9 1673e9b8f00-1673e9b8f03 6->9 10 1673e9b8f43-1673e9b8f46 6->10 22 1673e9b8f5f-1673e9b8f62 7->22 23 1673e9b9173-1673e9b9178 call 1673e9b9ae8 8->23 24 1673e9b917a-1673e9b917d 8->24 14 1673e9b8f05-1673e9b8f08 9->14 15 1673e9b8f3c-1673e9b8f3f 9->15 10->7 11 1673e9b8f48 10->11 16 1673e9b8f37-1673e9b8f3a 11->16 19 1673e9b8f2f-1673e9b8f35 14->19 20 1673e9b8f0a-1673e9b8f11 14->20 15->7 21 1673e9b8f41 15->21 16->7 19->16 19->22 20->7 25 1673e9b8f13-1673e9b8f17 20->25 21->16 26 1673e9b90d5-1673e9b90f8 call 1673e9b8e64 22->26 27 1673e9b8f68-1673e9b8f6c 22->27 36 1673e9b918d 23->36 30 1673e9b917f-1673e9b9187 VirtualFree 24->30 31 1673e9b9194-1673e9b91e7 24->31 25->7 29 1673e9b8f19-1673e9b8f1b 25->29 47 1673e9b9120-1673e9b9149 VirtualAlloc 26->47 48 1673e9b90fa-1673e9b90fd call 1673e9b9aa0 26->48 32 1673e9b8f72-1673e9b8f76 27->32 33 1673e9b9025-1673e9b9080 call 1673e9b8e64 * 5 27->33 29->7 35 1673e9b8f1d-1673e9b8f20 29->35 30->36 31->2 38 1673e9b8f99-1673e9b8faf call 1673e9b8e64 * 2 32->38 39 1673e9b8f78-1673e9b8f7c 32->39 33->2 73 1673e9b9086 33->73 35->22 40 1673e9b8f22-1673e9b8f2d call 1673e9b8e64 35->40 36->31 60 1673e9b8fb1-1673e9b8fb8 38->60 61 1673e9b8fba-1673e9b8fea 38->61 39->8 43 1673e9b8f82-1673e9b8f86 39->43 40->22 43->2 50 1673e9b8f8c-1673e9b8f94 Sleep SleepEx 43->50 49 1673e9b914d-1673e9b9150 47->49 57 1673e9b9102-1673e9b911e 48->57 49->2 50->38 57->49 60->61 61->2 63 1673e9b8ff0-1673e9b8ff2 61->63 66 1673e9b8ff4-1673e9b8ff7 63->66 67 1673e9b9003-1673e9b9007 63->67 69 1673e9b8ff9-1673e9b9001 66->69 70 1673e9b900b-1673e9b901e 66->70 67->70 69->70 70->63 72 1673e9b9020 70->72 72->2 74 1673e9b9088-1673e9b908a 73->74 75 1673e9b9097 74->75 76 1673e9b908c-1673e9b908f 74->76 78 1673e9b909b-1673e9b90ce 75->78 77 1673e9b9091-1673e9b9095 76->77 76->78 77->78 78->74 79 1673e9b90d0 78->79 79->2
APIs
Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID: Virtual$AllocFreeSleep
  • String ID:
  • API String ID: 3875540815-0
  • Opcode ID: 91a20d18f6369290bfbf3b7e20f87574a947ecbf2a0b2a8b51b5a924e45c2469
  • Instruction ID: 1671b6db6a5b328e4b8267fc140ec6f60a1e914301c0494f3b65ae916a82d71b
  • Opcode Fuzzy Hash: 91a20d18f6369290bfbf3b7e20f87574a947ecbf2a0b2a8b51b5a924e45c2469
  • Instruction Fuzzy Hash: E3A1E9B2629A0587EB68DF18CD443EC73A5F744B88F148826DA9A837D1DB36DC60E741
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

APIs
Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID: Heap$AllocProcess
  • String ID:
  • API String ID: 1617791916-0
  • Opcode ID: 9145f3d558a7ceb0ca93f2402a6124cb5227b151d3c91854a273210ea69cf88d
  • Instruction ID: 9f2e3e96b7990ad9c6b86edf4b8d23b7ae26cb1d310498ed0c53204f36b0987d
  • Opcode Fuzzy Hash: 9145f3d558a7ceb0ca93f2402a6124cb5227b151d3c91854a273210ea69cf88d
  • Instruction Fuzzy Hash: 88E0D87073F74755FE599FA61C503A500C8BF1D78CF284D2A4987423C1EB5A0C456312
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

APIs
Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID: Sleep
  • String ID:
  • API String ID: 3472027048-0
  • Opcode ID: 8123317d3123158b8624dd414f442dd0825b429c1488d5d94955d649091043a1
  • Instruction ID: 709c6bcd79a3bc2440e9d9864ceba1b00ac26dfc0ec09dcfdd39ca5451fc25ce
  • Opcode Fuzzy Hash: 8123317d3123158b8624dd414f442dd0825b429c1488d5d94955d649091043a1
  • Instruction Fuzzy Hash: BD216B32B24B1189FB10EFB1DC512DC37B4BB88748F980826DA8967BCADF36C5519351
Uniqueness

Uniqueness Score: -1.00%

Non-executed Functions

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 120 c0000ca204-c0000ca240 call c0000b4400 123 c0000ca25b-c0000ca2a9 120->123 124 c0000ca242-c0000ca249 120->124 126 c0000ca2ab 123->126 127 c0000ca2c4-c0000ca3c4 call c0000b4ddc 123->127 125 c0000ca257-c0000ca259 124->125 125->123 129 c0000ca24b-c0000ca24e 125->129 130 c0000ca2ae-c0000ca2c2 126->130 133 c0000ca3dc-c0000ca4ff call c0000b4ddc 127->133 134 c0000ca3c6 127->134 129->123 132 c0000ca250-c0000ca254 129->132 130->127 130->130 132->125 138 c0000ca517-c0000ca682 call c0000b4ddc 133->138 139 c0000ca501 133->139 135 c0000ca3c9-c0000ca3da 134->135 135->133 135->135 143 c0000ca684 138->143 144 c0000ca6a0-c0000ca80e call c0000b4ddc 138->144 140 c0000ca504-c0000ca515 139->140 140->138 140->140 146 c0000ca687-c0000ca69e 143->146 148 c0000ca82c-c0000ca99a call c0000b4ddc 144->148 149 c0000ca810 144->149 146->144 146->146 153 c0000ca99c 148->153 154 c0000ca9b8-c0000cab26 call c0000b4ddc 148->154 150 c0000ca813-c0000ca82a 149->150 150->148 150->150 155 c0000ca99f-c0000ca9b6 153->155 158 c0000cab28 154->158 159 c0000cab44-c0000cacb2 call c0000b4ddc 154->159 155->154 155->155 160 c0000cab2b-c0000cab42 158->160 163 c0000cacb4 159->163 164 c0000cacd0-c0000cae3e call c0000b4ddc 159->164 160->159 160->160 165 c0000cacb7-c0000cacce 163->165 168 c0000cae5c-c0000cafca call c0000b4ddc 164->168 169 c0000cae40 164->169 165->164 165->165 173 c0000cafcc 168->173 174 c0000cafe8-c0000cb156 call c0000b4ddc 168->174 170 c0000cae43-c0000cae5a 169->170 170->168 170->170 175 c0000cafcf-c0000cafe6 173->175 178 c0000cb158 174->178 179 c0000cb174-c0000cb2e2 call c0000b4ddc 174->179 175->174 175->175 180 c0000cb15b-c0000cb172 178->180 183 c0000cb2e4 179->183 184 c0000cb300-c0000cb46e call c0000b4ddc 179->184 180->179 180->180 185 c0000cb2e7-c0000cb2fe 183->185 188 c0000cb48c-c0000cb50a call c0000b4ddc 184->188 189 c0000cb470 184->189 185->184 185->185 193 c0000cb50c 188->193 194 c0000cb522-c0000cb57a call c0000b4ddc 188->194 190 c0000cb473-c0000cb48a 189->190 190->188 190->190 195 c0000cb50f-c0000cb520 193->195 198 c0000cb57c-c0000cb590 194->198 199 c0000cb592-c0000cb5b7 call c0000b4ddc 194->199 195->194 195->195 198->198 198->199
Strings
Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: r\c${D|$/M$ 4s-$&M$( ?$)8A2$+%u7$3!=3$3ZI$3$48Vw$5 9p$5%5]$5F91$5ZFt$:85$;lU$<#w'$=c1$=g[$?" -$?8$B$Kq$BYmV$DTsK$E pG$EEli$IC!$K+4.$RseD$U&xk$U?B$VCQ]$VQsG$YMsg$ZXv$_InF$`Y$aYvI$c(,7$c/*;$f$tW$fvQG$g#6)$g[p$i(pJ$i(pg$i)JG$ip[A$j!KS$j%1T$jHXv$jsPD$l=tj$nIT$oHfN$rNzr$t@o/$w5$z@H`${3L8$~5PS$~CB'$JsN$Wg|$XWO$ZD7$[C~$[sH$rdg$znU$\
  • API String ID: 0-38973088
  • Opcode ID: b39804cc145b3c2fa27090e442bc94d912d4229f91518052c9281603afd96ab4
  • Instruction ID: 6b2e58539d8fdf45db8a889c994033e76d2f90599a8254052e38c1c0a1a2e833
  • Opcode Fuzzy Hash: b39804cc145b3c2fa27090e442bc94d912d4229f91518052c9281603afd96ab4
  • Instruction Fuzzy Hash: E9A2F8B26056C08FE774CF66AA947DD7BA0F349B4CFA08208D7595FA19DB348242CF49
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 202 1673e9c6e04-1673e9c6e40 call 1673e9b1000 205 1673e9c6e42-1673e9c6e49 202->205 206 1673e9c6e5b-1673e9c6ea9 202->206 209 1673e9c6e57-1673e9c6e59 205->209 207 1673e9c6ec4-1673e9c6fc4 call 1673e9b19dc 206->207 208 1673e9c6eab 206->208 215 1673e9c6fc6 207->215 216 1673e9c6fdc-1673e9c70ff call 1673e9b19dc 207->216 210 1673e9c6eae-1673e9c6ec2 208->210 209->206 212 1673e9c6e4b-1673e9c6e4e 209->212 210->207 210->210 212->206 214 1673e9c6e50-1673e9c6e54 212->214 214->209 217 1673e9c6fc9-1673e9c6fda 215->217 220 1673e9c7101 216->220 221 1673e9c7117-1673e9c7282 call 1673e9b19dc 216->221 217->216 217->217 222 1673e9c7104-1673e9c7115 220->222 225 1673e9c7284 221->225 226 1673e9c72a0-1673e9c740e call 1673e9b19dc 221->226 222->221 222->222 227 1673e9c7287-1673e9c729e 225->227 230 1673e9c7410 226->230 231 1673e9c742c-1673e9c759a call 1673e9b19dc 226->231 227->226 227->227 232 1673e9c7413-1673e9c742a 230->232 235 1673e9c759c 231->235 236 1673e9c75b8-1673e9c7726 call 1673e9b19dc 231->236 232->231 232->232 237 1673e9c759f-1673e9c75b6 235->237 240 1673e9c7744-1673e9c78b2 call 1673e9b19dc 236->240 241 1673e9c7728 236->241 237->236 237->237 245 1673e9c78b4 240->245 246 1673e9c78d0-1673e9c7a3e call 1673e9b19dc 240->246 243 1673e9c772b-1673e9c7742 241->243 243->240 243->243 247 1673e9c78b7-1673e9c78ce 245->247 250 1673e9c7a40 246->250 251 1673e9c7a5c-1673e9c7bca call 1673e9b19dc 246->251 247->246 247->247 252 1673e9c7a43-1673e9c7a5a 250->252 255 1673e9c7bcc 251->255 256 1673e9c7be8-1673e9c7d56 call 1673e9b19dc 251->256 252->251 252->252 258 1673e9c7bcf-1673e9c7be6 255->258 260 1673e9c7d74-1673e9c7ee2 call 1673e9b19dc 256->260 261 1673e9c7d58 256->261 258->256 258->258 265 1673e9c7ee4 260->265 266 1673e9c7f00-1673e9c806e call 1673e9b19dc 260->266 262 1673e9c7d5b-1673e9c7d72 261->262 262->260 262->262 267 1673e9c7ee7-1673e9c7efe 265->267 270 1673e9c8070 266->270 271 1673e9c808c-1673e9c810a call 1673e9b19dc 266->271 267->266 267->267 272 1673e9c8073-1673e9c808a 270->272 275 1673e9c8122-1673e9c817a call 1673e9b19dc 271->275 276 1673e9c810c 271->276 272->271 272->272 280 1673e9c8192-1673e9c81b7 call 1673e9b19dc 275->280 281 1673e9c817c-1673e9c8190 275->281 277 1673e9c810f-1673e9c8120 276->277 277->275 277->277 281->280 281->281
Strings
Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: r\c${D|$/M$ 4s-$&M$( ?$)8A2$+%u7$3!=3$3ZI$3$48Vw$5 9p$5%5]$5F91$5ZFt$:85$;lU$<#w'$=c1$=g[$?" -$?8$B$Kq$BYmV$DTsK$E pG$EEli$IC!$K+4.$RseD$U&xk$U?B$VCQ]$VQsG$YMsg$ZXv$_InF$`Y$aYvI$c(,7$c/*;$f$tW$fvQG$g#6)$g[p$i(pJ$i(pg$i)JG$ip[A$j!KS$j%1T$jHXv$jsPD$l=tj$nIT$oHfN$rNzr$t@o/$w5$z@H`${3L8$~5PS$~CB'$JsN$Wg|$XWO$ZD7$[C~$[sH$rdg$znU$\
  • API String ID: 0-38973088
  • Opcode ID: 78a9b579b5f7a436b638f65c866e7110ccc151b8437862654c73cf7ec66033e7
  • Instruction ID: 59e3c808c65feaf41911c74a1bd34725a60808998e8473242c28535ffaee96df
  • Opcode Fuzzy Hash: 78a9b579b5f7a436b638f65c866e7110ccc151b8437862654c73cf7ec66033e7
  • Instruction Fuzzy Hash: 3DA2E7B26096C08FD774CF26AA903ED7BA0F345B4CF908609D7991FA19DB358242CF49
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 284 c0000bd450-c0000bd453 285 c0000bd459-c0000bd4b7 call c0000b8730 284->285 286 c0000be1a0 284->286 289 c0000bd4b9 285->289 290 c0000bd4d1-c0000bd555 call c0000b4f14 call c0000b77a8 285->290 292 c0000bd4bb-c0000bd4cf 289->292 296 c0000bd557 290->296 297 c0000bd576-c0000bd5a9 call c0000b4f14 290->297 292->290 292->292 298 c0000bd55a-c0000bd574 296->298 301 c0000bd5ab 297->301 302 c0000bd5c1-c0000bd5ed call c0000b4ddc 297->302 298->297 298->298 303 c0000bd5ae-c0000bd5bf 301->303 306 c0000bd608-c0000bd675 call c0000b4ddc call c0000b77a8 302->306 307 c0000bd5ef 302->307 303->302 303->303 313 c0000bd677 306->313 314 c0000bd696-c0000bd6e1 call c0000b4f14 call c0000b77a8 306->314 309 c0000bd5f2-c0000bd606 307->309 309->306 309->309 315 c0000bd67a-c0000bd694 313->315 320 c0000bd6fc-c0000bd750 call c0000b4f14 call c0000b77a8 314->320 321 c0000bd6e3 314->321 315->314 315->315 327 c0000bd76b-c0000bd7bf call c0000b4f14 call c0000b77a8 320->327 328 c0000bd752 320->328 322 c0000bd6e6-c0000bd6fa 321->322 322->320 322->322 334 c0000bd7da-c0000bd867 call c0000b4f14 call c0000b77a8 327->334 335 c0000bd7c1 327->335 329 c0000bd755-c0000bd769 328->329 329->327 329->329 341 c0000bd869 334->341 342 c0000bd888-c0000bd90e call c0000b4f14 call c0000b77a8 334->342 336 c0000bd7c4-c0000bd7d8 335->336 336->334 336->336 343 c0000bd86c-c0000bd886 341->343 348 c0000bd92f-c0000bd9bf call c0000b4f14 call c0000b77a8 342->348 349 c0000bd910 342->349 343->342 343->343 355 c0000bd9c1 348->355 356 c0000bd9e0-c0000bda66 call c0000b4f14 call c0000b77a8 348->356 350 c0000bd913-c0000bd92d 349->350 350->348 350->350 357 c0000bd9c4-c0000bd9de 355->357 362 c0000bda68 356->362 363 c0000bda87-c0000bdb21 call c0000b4f14 call c0000b77a8 356->363 357->356 357->357 364 c0000bda6b-c0000bda85 362->364 369 c0000bdb23 363->369 370 c0000bdb42-c0000bdb8b call c0000b4f14 call c0000b77a8 363->370 364->363 364->364 372 c0000bdb26-c0000bdb40 369->372 376 c0000bdb8d 370->376 377 c0000bdba3-c0000bdbea call c0000b4f14 call c0000b77a8 370->377 372->370 372->372 378 c0000bdb90-c0000bdba1 376->378 383 c0000bdbec 377->383 384 c0000bdc02-c0000bdc48 call c0000b4f14 call c0000b77a8 377->384 378->377 378->378 385 c0000bdbef-c0000bdc00 383->385 390 c0000bdc4a 384->390 391 c0000bdc63-c0000bdca8 call c0000b4f14 call c0000b77a8 384->391 385->384 385->385 392 c0000bdc4d-c0000bdc61 390->392 397 c0000bdcaa 391->397 398 c0000bdcc0-c0000bdd00 call c0000b4f14 call c0000b77a8 391->398 392->391 392->392 399 c0000bdcad-c0000bdcbe 397->399 404 c0000bdd1b-c0000bdd5a call c0000b4f14 call c0000b77a8 398->404 405 c0000bdd02 398->405 399->398 399->399 411 c0000bdd5c 404->411 412 c0000bdd75-c0000bddbc call c0000b4f14 call c0000b77a8 404->412 406 c0000bdd05-c0000bdd19 405->406 406->404 406->406 413 c0000bdd5f-c0000bdd73 411->413 418 c0000bddbe 412->418 419 c0000bddd4-c0000bde28 call c0000b4f14 call c0000b77a8 412->419 413->412 413->413 421 c0000bddc1-c0000bddd2 418->421 425 c0000bde2a 419->425 426 c0000bde43-c0000bde98 call c0000b4f14 call c0000b77a8 419->426 421->419 421->421 427 c0000bde2d-c0000bde41 425->427 432 c0000bde9a 426->432 433 c0000bdeb0-c0000bdf04 call c0000b4f14 call c0000b77a8 426->433 427->426 427->427 434 c0000bde9d-c0000bdeae 432->434 439 c0000bdf1f-c0000bdf73 call c0000b4f14 call c0000b77a8 433->439 440 c0000bdf06 433->440 434->433 434->434 446 c0000bdf8e-c0000be008 call c0000b4f14 call c0000b77a8 439->446 447 c0000bdf75 439->447 441 c0000bdf09-c0000bdf1d 440->441 441->439 441->441 453 c0000be00a 446->453 454 c0000be026-c0000be0a3 call c0000b4f14 call c0000b77a8 446->454 448 c0000bdf78-c0000bdf8c 447->448 448->446 448->448 455 c0000be00d-c0000be024 453->455 460 c0000be0c1-c0000be148 call c0000b4f14 call c0000b77a8 454->460 461 c0000be0a5 454->461 455->454 455->455 467 c0000be14a-c0000be161 460->467 468 c0000be163-c0000be19f call c0000b4f14 call c0000b77a8 460->468 462 c0000be0a8-c0000be0bf 461->462 462->460 462->462 467->467 467->468 468->286
Strings
Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: Jy>$(%#7$,*67$/!u$;$OM$? q\$I{+|$se${&>Q$11N$1VK$9;Y$LzC$VN($sng
  • API String ID: 0-2078040707
  • Opcode ID: 401f4ae59521fcb328f9ea5b2f16be958f9c658b16d95f13b3317b3a042898fb
  • Instruction ID: 9fcffb9d39b82d1fe3004e041ace321c78c8b73a80bae783f540a6e9a47e5b4c
  • Opcode Fuzzy Hash: 401f4ae59521fcb328f9ea5b2f16be958f9c658b16d95f13b3317b3a042898fb
  • Instruction Fuzzy Hash: 217266B26042C0CEEB25CF25D9507ED7BA1E78578CFA54615EB862BB1DEB78C601CB10
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 473 1673e9ba050-1673e9ba053 474 1673e9bada0 473->474 475 1673e9ba059-1673e9ba0b7 call 1673e9b5330 473->475 478 1673e9ba0d1-1673e9ba155 call 1673e9b1b14 call 1673e9b43a8 475->478 479 1673e9ba0b9 475->479 485 1673e9ba176-1673e9ba1a9 call 1673e9b1b14 478->485 486 1673e9ba157 478->486 480 1673e9ba0bb-1673e9ba0cf 479->480 480->478 480->480 490 1673e9ba1c1-1673e9ba1ed call 1673e9b19dc 485->490 491 1673e9ba1ab 485->491 487 1673e9ba15a-1673e9ba174 486->487 487->485 487->487 495 1673e9ba1ef 490->495 496 1673e9ba208-1673e9ba275 call 1673e9b19dc call 1673e9b43a8 490->496 492 1673e9ba1ae-1673e9ba1bf 491->492 492->490 492->492 497 1673e9ba1f2-1673e9ba206 495->497 502 1673e9ba296-1673e9ba2e1 call 1673e9b1b14 call 1673e9b43a8 496->502 503 1673e9ba277 496->503 497->496 497->497 509 1673e9ba2e3 502->509 510 1673e9ba2fc-1673e9ba350 call 1673e9b1b14 call 1673e9b43a8 502->510 504 1673e9ba27a-1673e9ba294 503->504 504->502 504->504 511 1673e9ba2e6-1673e9ba2fa 509->511 516 1673e9ba352 510->516 517 1673e9ba36b-1673e9ba3bf call 1673e9b1b14 call 1673e9b43a8 510->517 511->510 511->511 518 1673e9ba355-1673e9ba369 516->518 523 1673e9ba3c1 517->523 524 1673e9ba3da-1673e9ba467 call 1673e9b1b14 call 1673e9b43a8 517->524 518->517 518->518 525 1673e9ba3c4-1673e9ba3d8 523->525 530 1673e9ba469 524->530 531 1673e9ba488-1673e9ba50e call 1673e9b1b14 call 1673e9b43a8 524->531 525->524 525->525 532 1673e9ba46c-1673e9ba486 530->532 537 1673e9ba510 531->537 538 1673e9ba52f-1673e9ba5bf call 1673e9b1b14 call 1673e9b43a8 531->538 532->531 532->532 540 1673e9ba513-1673e9ba52d 537->540 544 1673e9ba5c1 538->544 545 1673e9ba5e0-1673e9ba666 call 1673e9b1b14 call 1673e9b43a8 538->545 540->538 540->540 546 1673e9ba5c4-1673e9ba5de 544->546 551 1673e9ba668 545->551 552 1673e9ba687-1673e9ba721 call 1673e9b1b14 call 1673e9b43a8 545->552 546->545 546->546 553 1673e9ba66b-1673e9ba685 551->553 558 1673e9ba742-1673e9ba78b call 1673e9b1b14 call 1673e9b43a8 552->558 559 1673e9ba723 552->559 553->552 553->553 565 1673e9ba7a3-1673e9ba7ea call 1673e9b1b14 call 1673e9b43a8 558->565 566 1673e9ba78d 558->566 560 1673e9ba726-1673e9ba740 559->560 560->558 560->560 572 1673e9ba802-1673e9ba848 call 1673e9b1b14 call 1673e9b43a8 565->572 573 1673e9ba7ec 565->573 567 1673e9ba790-1673e9ba7a1 566->567 567->565 567->567 579 1673e9ba863-1673e9ba8a8 call 1673e9b1b14 call 1673e9b43a8 572->579 580 1673e9ba84a 572->580 574 1673e9ba7ef-1673e9ba800 573->574 574->572 574->574 586 1673e9ba8c0-1673e9ba900 call 1673e9b1b14 call 1673e9b43a8 579->586 587 1673e9ba8aa 579->587 581 1673e9ba84d-1673e9ba861 580->581 581->579 581->581 593 1673e9ba902 586->593 594 1673e9ba91b-1673e9ba95a call 1673e9b1b14 call 1673e9b43a8 586->594 588 1673e9ba8ad-1673e9ba8be 587->588 588->586 588->588 595 1673e9ba905-1673e9ba919 593->595 600 1673e9ba975-1673e9ba9bc call 1673e9b1b14 call 1673e9b43a8 594->600 601 1673e9ba95c 594->601 595->594 595->595 607 1673e9ba9d4-1673e9baa28 call 1673e9b1b14 call 1673e9b43a8 600->607 608 1673e9ba9be 600->608 603 1673e9ba95f-1673e9ba973 601->603 603->600 603->603 614 1673e9baa43-1673e9baa98 call 1673e9b1b14 call 1673e9b43a8 607->614 615 1673e9baa2a 607->615 609 1673e9ba9c1-1673e9ba9d2 608->609 609->607 609->609 621 1673e9baab0-1673e9bab04 call 1673e9b1b14 call 1673e9b43a8 614->621 622 1673e9baa9a 614->622 616 1673e9baa2d-1673e9baa41 615->616 616->614 616->616 628 1673e9bab1f-1673e9bab73 call 1673e9b1b14 call 1673e9b43a8 621->628 629 1673e9bab06 621->629 623 1673e9baa9d-1673e9baaae 622->623 623->621 623->623 635 1673e9bab75 628->635 636 1673e9bab8e-1673e9bac08 call 1673e9b1b14 call 1673e9b43a8 628->636 630 1673e9bab09-1673e9bab1d 629->630 630->628 630->630 637 1673e9bab78-1673e9bab8c 635->637 642 1673e9bac26-1673e9baca3 call 1673e9b1b14 call 1673e9b43a8 636->642 643 1673e9bac0a 636->643 637->636 637->637 649 1673e9bacc1-1673e9bad48 call 1673e9b1b14 call 1673e9b43a8 642->649 650 1673e9baca5 642->650 644 1673e9bac0d-1673e9bac24 643->644 644->642 644->644 656 1673e9bad63-1673e9bad9f call 1673e9b1b14 call 1673e9b43a8 649->656 657 1673e9bad4a-1673e9bad61 649->657 652 1673e9baca8-1673e9bacbf 650->652 652->649 652->652 656->474 657->656 657->657
Strings
Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: Jy>$(%#7$,*67$/!u$;$OM$? q\$I{+|$se${&>Q$11N$1VK$9;Y$LzC$VN($sng
  • API String ID: 0-2078040707
  • Opcode ID: f59db2886387d65f367faaa339c31c00bacb244b09e194ed08360d579bd9f91d
  • Instruction ID: dcbb502d7b9aa18ff4530862a9c91cbe5f2c78a7f66fd0cd418be92d160be604
  • Opcode Fuzzy Hash: f59db2886387d65f367faaa339c31c00bacb244b09e194ed08360d579bd9f91d
  • Instruction Fuzzy Hash: B47279B22082C18EEB28CF36D9502DD7BA1F74578CF44491ADB861BB5DEBB9C601DB10
Uniqueness

Uniqueness Score: -1.00%

Strings
Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: 0123456789ABCDEFR$1ee$@$@B$YtSG$bnbI$u(@$v|*
  • API String ID: 0-1400767620
  • Opcode ID: 314952ac009838435bb6b7e5f9baacf2f9cad5df5641b5113d9610ccecdd3220
  • Instruction ID: 9c06018c6f6b201e0c4bd27dcaa868fe5484d5c8a0ac62df6d8d0612e25e4e45
  • Opcode Fuzzy Hash: 314952ac009838435bb6b7e5f9baacf2f9cad5df5641b5113d9610ccecdd3220
  • Instruction Fuzzy Hash: 5F03BA722057C0CAFB75DF25D840BED7BA1FB45B8CF668219DA491BB99DB388605CB00
Uniqueness

Uniqueness Score: -1.00%

Strings
Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: I)-$D-J$R-=_$`IQt$`Xde$dmd~$z=oD
  • API String ID: 0-1938568667
  • Opcode ID: 9a24a01d1b5c68672d51f10109505c85d14fa6a4b5cb96a06c22ae75e63bfcbd
  • Instruction ID: 474e4fad8010cc49de8682ebba9ce1609d93d128d7e4c869a9cfa25b9a1b66e7
  • Opcode Fuzzy Hash: 9a24a01d1b5c68672d51f10109505c85d14fa6a4b5cb96a06c22ae75e63bfcbd
  • Instruction Fuzzy Hash: D6827D72701A80CAFB25CF65E940F983BE0E74978CF6A4718DA495BB99EB78C541CB01
Uniqueness

Uniqueness Score: -1.00%

Strings
Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: I)-$D-J$R-=_$`IQt$`Xde$dmd~$z=oD
  • API String ID: 0-1938568667
  • Opcode ID: 775ad047f6099a42e8bed6977e714076cd7abaddeb37ed9494d455c2ff3faa6c
  • Instruction ID: 09291e90ea7ab9a3eafca5476440fa1772c125e6d877e5b400a4cfb12ddc1d13
  • Opcode Fuzzy Hash: 775ad047f6099a42e8bed6977e714076cd7abaddeb37ed9494d455c2ff3faa6c
  • Instruction Fuzzy Hash: 7282A4716597848AEB20DF25AD403D83BA4F745B8CF144C1AD6C91BBDAEB3AC581DF02
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 2343 1673e9c4c24-1673e9c4c2b 2344 1673e9c4c43-1673e9c4ca1 call 1673e9b9a1c call 1673e9b9aa0 2343->2344 2345 1673e9c4c2d 2343->2345 2352 1673e9c4ca3-1673e9c4caa 2344->2352 2353 1673e9c4cfa-1673e9c4cfd 2344->2353 2346 1673e9c4c32-1673e9c4c35 2345->2346 2346->2344 2348 1673e9c4c37-1673e9c4c41 2346->2348 2348->2344 2348->2346 2356 1673e9c4cb0-1673e9c4cbf 2352->2356 2354 1673e9c4d03-1673e9c4d0f 2353->2354 2355 1673e9c4e30-1673e9c4e85 call 1673e9b9ae8 2353->2355 2354->2355 2359 1673e9c4d15-1673e9c4d17 2354->2359 2368 1673e9c4e9e-1673e9c4ede 2355->2368 2369 1673e9c4e87-1673e9c4e8a 2355->2369 2357 1673e9c4ce3-1673e9c4cea 2356->2357 2358 1673e9c4cc1-1673e9c4cdc call 1673e9b9a1c 2356->2358 2357->2356 2362 1673e9c4cec-1673e9c4cf3 2357->2362 2358->2357 2359->2355 2363 1673e9c4d1d-1673e9c4d20 2359->2363 2362->2353 2363->2355 2367 1673e9c4d26-1673e9c4d31 2363->2367 2370 1673e9c4d37-1673e9c4d3e 2367->2370 2371 1673e9c4e29 2367->2371 2373 1673e9c4ee0-1673e9c4ee3 2368->2373 2374 1673e9c4f02-1673e9c4f26 2368->2374 2369->2368 2372 1673e9c4e8c-1673e9c4e94 2369->2372 2375 1673e9c4d43-1673e9c4d46 2370->2375 2371->2355 2372->2372 2376 1673e9c4e96-1673e9c4e98 2372->2376 2377 1673e9c4ee8-1673e9c4ef9 2373->2377 2378 1673e9c4f4b-1673e9c4f94 call 1673e9b19dc * 2 call 1673e9b9208 call 1673e9b99c4 2374->2378 2379 1673e9c4f28-1673e9c4f2b 2374->2379 2380 1673e9c4e14-1673e9c4e22 2375->2380 2381 1673e9c4d4c-1673e9c4d66 2375->2381 2376->2368 2382 1673e9c5059-1673e9c5068 2376->2382 2377->2377 2383 1673e9c4efb 2377->2383 2426 1673e9c4f96-1673e9c4fa5 2378->2426 2427 1673e9c5008-1673e9c5052 call 1673e9b9ae8 2378->2427 2384 1673e9c4f31-1673e9c4f42 2379->2384 2380->2371 2386 1673e9c4d6c-1673e9c4d71 2381->2386 2387 1673e9c4e07-1673e9c4e0e 2381->2387 2388 1673e9c513f-1673e9c515a call 1673e9b9ae8 call 1673e9b9aa0 2382->2388 2389 1673e9c506e-1673e9c5071 2382->2389 2383->2374 2384->2384 2390 1673e9c4f44 2384->2390 2392 1673e9c4d75-1673e9c4d7b 2386->2392 2387->2375 2387->2380 2416 1673e9c516f-1673e9c517d 2388->2416 2417 1673e9c515c-1673e9c515f 2388->2417 2389->2388 2394 1673e9c5077-1673e9c5080 2389->2394 2390->2378 2396 1673e9c4df1-1673e9c4df7 2392->2396 2397 1673e9c4d7d-1673e9c4d91 2392->2397 2394->2394 2402 1673e9c5082-1673e9c5084 2394->2402 2396->2392 2403 1673e9c4dfd-1673e9c4e00 2396->2403 2399 1673e9c4d93-1673e9c4da5 2397->2399 2400 1673e9c4da7-1673e9c4dab 2397->2400 2405 1673e9c4dd0-1673e9c4dd5 2399->2405 2406 1673e9c4dad-1673e9c4db7 2400->2406 2407 1673e9c4db9-1673e9c4dbc 2400->2407 2402->2388 2409 1673e9c508a-1673e9c5094 2402->2409 2403->2387 2405->2396 2406->2405 2411 1673e9c4dbe-1673e9c4dcb 2407->2411 2412 1673e9c4dd7-1673e9c4de4 2407->2412 2409->2388 2414 1673e9c509a-1673e9c509c 2409->2414 2411->2405 2412->2396 2418 1673e9c4de6-1673e9c4dec 2412->2418 2414->2388 2419 1673e9c50a2-1673e9c50cb 2414->2419 2422 1673e9c5183-1673e9c51aa 2416->2422 2423 1673e9c52f4-1673e9c52fd 2416->2423 2417->2416 2421 1673e9c5161-1673e9c516d 2417->2421 2418->2396 2424 1673e9c50cd-1673e9c50d7 2419->2424 2425 1673e9c5139 2419->2425 2421->2416 2421->2417 2430 1673e9c51ad-1673e9c51c1 2422->2430 2428 1673e9c5303-1673e9c5328 2423->2428 2429 1673e9c55fa 2423->2429 2431 1673e9c50de-1673e9c5102 call 1673e9b9bb8 2424->2431 2425->2388 2426->2427 2445 1673e9c4fa7-1673e9c4fd6 2426->2445 2427->2382 2433 1673e9c532b-1673e9c533e 2428->2433 2432 1673e9c55ff-1673e9c5686 call 1673e9b9ae8 call 1673e9b9208 call 1673e9b99c4 call 1673e9b9ae8 call 1673e9b9208 call 1673e9b99c4 2429->2432 2430->2430 2434 1673e9c51c3-1673e9c51d8 2430->2434 2447 1673e9c5104-1673e9c5119 2431->2447 2448 1673e9c511d-1673e9c5124 2431->2448 2504 1673e9c568f-1673e9c56b7 call 1673e9b9208 call 1673e9b99c4 2432->2504 2505 1673e9c5688-1673e9c568a 2432->2505 2433->2433 2439 1673e9c5340-1673e9c5367 2433->2439 2441 1673e9c51dd-1673e9c51f2 2434->2441 2444 1673e9c536c-1673e9c5380 2439->2444 2441->2441 2446 1673e9c51f4-1673e9c5213 2441->2446 2444->2444 2450 1673e9c5382-1673e9c53a2 2444->2450 2451 1673e9c4ffc-1673e9c5003 call 1673e9b1b14 2445->2451 2452 1673e9c4fd8-1673e9c4fdb 2445->2452 2453 1673e9c521a-1673e9c522f 2446->2453 2447->2448 2448->2431 2454 1673e9c5126-1673e9c5132 2448->2454 2456 1673e9c53a7-1673e9c53bb 2450->2456 2451->2427 2457 1673e9c4fe0-1673e9c4ff3 2452->2457 2453->2453 2459 1673e9c5231-1673e9c5252 2453->2459 2454->2425 2456->2456 2461 1673e9c53bd-1673e9c53da 2456->2461 2457->2457 2462 1673e9c4ff5 2457->2462 2463 1673e9c5257-1673e9c526c 2459->2463 2466 1673e9c53df-1673e9c53f3 2461->2466 2462->2451 2463->2463 2464 1673e9c526e-1673e9c5288 2463->2464 2467 1673e9c52d9-1673e9c52ef 2464->2467 2468 1673e9c528a-1673e9c52a7 2464->2468 2466->2466 2470 1673e9c53f5-1673e9c5467 2466->2470 2472 1673e9c54d2-1673e9c54df 2467->2472 2471 1673e9c52ac-1673e9c52c1 2468->2471 2474 1673e9c54b7-1673e9c54cf 2470->2474 2475 1673e9c5469-1673e9c5486 2470->2475 2471->2471 2477 1673e9c52c3-1673e9c52d4 2471->2477 2472->2432 2476 1673e9c54e5-1673e9c5531 call 1673e9b1000 2472->2476 2474->2472 2478 1673e9c548b-1673e9c549f 2475->2478 2484 1673e9c5533-1673e9c553e 2476->2484 2485 1673e9c5556-1673e9c5563 2476->2485 2477->2467 2478->2478 2481 1673e9c54a1-1673e9c54b2 2478->2481 2481->2474 2484->2485 2488 1673e9c5540 2484->2488 2489 1673e9c5569-1673e9c556c 2485->2489 2491 1673e9c5545-1673e9c5548 2488->2491 2492 1673e9c5576-1673e9c55a3 2489->2492 2493 1673e9c556e-1673e9c5573 2489->2493 2491->2485 2495 1673e9c554a-1673e9c5554 2491->2495 2492->2489 2496 1673e9c55a5-1673e9c55f3 call 1673e9b9a1c call 1673e9b9ae8 2492->2496 2493->2492 2495->2485 2495->2491 2496->2429 2510 1673e9c56be-1673e9c56dd call 1673e9b9208 call 1673e9b99c4 2504->2510 2511 1673e9c56b9 2504->2511 2505->2504 2516 1673e9c56e4-1673e9c56e7 2510->2516 2517 1673e9c56df 2510->2517 2511->2510 2518 1673e9c56f7-1673e9c5752 call 1673e9b99c4 call 1673e9b5e20 2516->2518 2519 1673e9c56e9-1673e9c56f5 2516->2519 2517->2516 2525 1673e9c5754-1673e9c575c 2518->2525 2526 1673e9c575f-1673e9c585a 2518->2526 2519->2516 2519->2518 2525->2526 2527 1673e9c587b-1673e9c5f92 call 1673e9b19dc * 3 call 1673e9b9ae8 * 4 2526->2527 2528 1673e9c585c 2526->2528 2529 1673e9c585f-1673e9c5879 2528->2529 2529->2527 2529->2529
Strings
Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: 0123456789ABCDEFR$1ee$YtSG$v|*
  • API String ID: 0-3001268231
  • Opcode ID: f8a229a7c4cfcc76a0c7407a830669d1ac3a7edb0575b8d269bd729ec905c25d
  • Instruction ID: f543538940221c39c36d4bc0a77dc34680c9229d3146e36e8821ce0c7cc57981
  • Opcode Fuzzy Hash: f8a229a7c4cfcc76a0c7407a830669d1ac3a7edb0575b8d269bd729ec905c25d
  • Instruction Fuzzy Hash: 6672E2767047C08AEB21AF29DC403ED7BA1FB45B8CF48451ACA891BBD9DB39C645DB01
Uniqueness

Uniqueness Score: -1.00%

Strings
Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: 2j]W$2xFU$uxJ\$|gFA
  • API String ID: 0-2595514560
  • Opcode ID: f2cac8906f89d109d6377761237cbb4398d87897c9c6d81693a3b052af1e6ca3
  • Instruction ID: 54c7406b34a6bfa3b36281cd8747b5d83a457957d0e7764567ea20c8690cfa4c
  • Opcode Fuzzy Hash: f2cac8906f89d109d6377761237cbb4398d87897c9c6d81693a3b052af1e6ca3
  • Instruction Fuzzy Hash: 84824732200BC0CAFB64CF64D890BDD77A4F744788F654229DA896BB9ACF34D5A6D710
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 2828 1673e9b6440-1673e9b6478 2829 1673e9b6496-1673e9b64a3 2828->2829 2830 1673e9b647a-1673e9b6492 call 1673e9b9ae8 call 1673e9b9aa0 2828->2830 2832 1673e9b64a5-1673e9b64a7 2829->2832 2833 1673e9b64de-1673e9b64eb 2829->2833 2830->2829 2837 1673e9b64b7-1673e9b64b9 2832->2837 2834 1673e9b6508-1673e9b650b 2833->2834 2835 1673e9b64ed-1673e9b6506 call 1673e9b25a8 2833->2835 2840 1673e9b6529-1673e9b6530 2834->2840 2841 1673e9b650d-1673e9b6525 call 1673e9b9ae8 call 1673e9b9aa0 2834->2841 2835->2834 2842 1673e9b64a9-1673e9b64ac 2837->2842 2843 1673e9b64bb-1673e9b64c6 2837->2843 2848 1673e9b6532-1673e9b6534 2840->2848 2849 1673e9b656b-1673e9b659d call 1673e9b9ae8 call 1673e9b9aa0 2840->2849 2841->2840 2842->2843 2847 1673e9b64ae-1673e9b64b4 2842->2847 2843->2833 2850 1673e9b64c8-1673e9b64ca 2843->2850 2847->2837 2853 1673e9b6544-1673e9b6546 2848->2853 2868 1673e9b659f-1673e9b65a2 2849->2868 2869 1673e9b65ca-1673e9b65e9 2849->2869 2854 1673e9b64da-1673e9b64dc 2850->2854 2858 1673e9b6536-1673e9b6539 2853->2858 2859 1673e9b6548-1673e9b6553 2853->2859 2854->2833 2855 1673e9b64cc-1673e9b64cf 2854->2855 2855->2833 2864 1673e9b64d1-1673e9b64d7 2855->2864 2858->2859 2863 1673e9b653b-1673e9b6541 2858->2863 2859->2849 2860 1673e9b6555-1673e9b6557 2859->2860 2865 1673e9b6567-1673e9b6569 2860->2865 2863->2853 2864->2854 2865->2849 2867 1673e9b6559-1673e9b655c 2865->2867 2867->2849 2872 1673e9b655e-1673e9b6564 2867->2872 2873 1673e9b65a4-1673e9b65a7 2868->2873 2870 1673e9b6604-1673e9b6649 call 1673e9b174c call 1673e9b9ae8 call 1673e9b9aa0 2869->2870 2871 1673e9b65eb 2869->2871 2885 1673e9b6678-1673e9b66b5 2870->2885 2886 1673e9b664b-1673e9b664e 2870->2886 2874 1673e9b65ee-1673e9b6602 2871->2874 2872->2865 2876 1673e9b65b6 2873->2876 2877 1673e9b65a9-1673e9b65b4 2873->2877 2874->2870 2874->2874 2879 1673e9b65b8-1673e9b65bb 2876->2879 2877->2873 2877->2876 2879->2869 2881 1673e9b65bd-1673e9b65c8 2879->2881 2881->2869 2881->2879 2887 1673e9b66cf-1673e9b670c call 1673e9b174c call 1673e9b9ae8 call 1673e9b9aa0 2885->2887 2888 1673e9b66b7 2885->2888 2889 1673e9b6651-1673e9b6654 2886->2889 2901 1673e9b6737-1673e9b676f 2887->2901 2902 1673e9b670e-1673e9b6711 2887->2902 2890 1673e9b66ba-1673e9b66cd 2888->2890 2892 1673e9b6656-1673e9b6661 2889->2892 2893 1673e9b6663 2889->2893 2890->2887 2890->2890 2892->2889 2892->2893 2895 1673e9b6666-1673e9b6669 2893->2895 2895->2885 2897 1673e9b666b-1673e9b6676 2895->2897 2897->2885 2897->2895 2904 1673e9b6771 2901->2904 2905 1673e9b6786-1673e9b67cd call 1673e9b6120 2901->2905 2903 1673e9b6713-1673e9b6716 2902->2903 2908 1673e9b6725-1673e9b6728 2903->2908 2909 1673e9b6718-1673e9b6723 2903->2909 2906 1673e9b6774-1673e9b6784 2904->2906 2912 1673e9b67cf 2905->2912 2913 1673e9b67e4-1673e9b6825 call 1673e9b6120 2905->2913 2906->2905 2906->2906 2908->2901 2911 1673e9b672a-1673e9b6735 2908->2911 2909->2903 2909->2908 2911->2901 2911->2908 2914 1673e9b67d2-1673e9b67e2 2912->2914 2917 1673e9b6827 2913->2917 2918 1673e9b683c-1673e9b687d call 1673e9b6120 2913->2918 2914->2913 2914->2914 2919 1673e9b682a-1673e9b683a 2917->2919 2922 1673e9b687f 2918->2922 2923 1673e9b6894-1673e9b68d5 call 1673e9b6120 2918->2923 2919->2918 2919->2919 2925 1673e9b6882-1673e9b6892 2922->2925 2927 1673e9b68d7 2923->2927 2928 1673e9b68ec-1673e9b692d call 1673e9b6120 2923->2928 2925->2923 2925->2925 2929 1673e9b68da-1673e9b68ea 2927->2929 2932 1673e9b692f 2928->2932 2933 1673e9b6944-1673e9b6985 call 1673e9b6120 2928->2933 2929->2928 2929->2929 2934 1673e9b6932-1673e9b6942 2932->2934 2937 1673e9b6987 2933->2937 2938 1673e9b699c-1673e9b69dd call 1673e9b6120 2933->2938 2934->2933 2934->2934 2940 1673e9b698a-1673e9b699a 2937->2940 2942 1673e9b69df 2938->2942 2943 1673e9b69f4-1673e9b6a35 call 1673e9b6120 2938->2943 2940->2938 2940->2940 2944 1673e9b69e2-1673e9b69f2 2942->2944 2947 1673e9b6a37 2943->2947 2948 1673e9b6a4c-1673e9b6a8d call 1673e9b6120 2943->2948 2944->2943 2944->2944 2949 1673e9b6a3a-1673e9b6a4a 2947->2949 2952 1673e9b6a8f 2948->2952 2953 1673e9b6aa4-1673e9b6ae5 call 1673e9b6120 2948->2953 2949->2948 2949->2949 2954 1673e9b6a92-1673e9b6aa2 2952->2954 2957 1673e9b6ae7 2953->2957 2958 1673e9b6afc-1673e9b6b43 call 1673e9b6120 2953->2958 2954->2953 2954->2954 2959 1673e9b6aea-1673e9b6afa 2957->2959 2962 1673e9b6b45 2958->2962 2963 1673e9b6b5a-1673e9b6bb3 call 1673e9b6120 2958->2963 2959->2958 2959->2959 2964 1673e9b6b48-1673e9b6b58 2962->2964 2967 1673e9b6bd0-1673e9b6c2c call 1673e9b6120 2963->2967 2968 1673e9b6bb5 2963->2968 2964->2963 2964->2964 2972 1673e9b6c49-1673e9b6c7d call 1673e9b6120 2967->2972 2973 1673e9b6c2e 2967->2973 2969 1673e9b6bb8-1673e9b6bce 2968->2969 2969->2967 2969->2969 2977 1673e9b6c7f 2972->2977 2978 1673e9b6c95-1673e9b6cbe call 1673e9b6120 2972->2978 2974 1673e9b6c31-1673e9b6c47 2973->2974 2974->2972 2974->2974 2979 1673e9b6c82-1673e9b6c93 2977->2979 2982 1673e9b6cc3-1673e9b6cc6 2978->2982 2979->2978 2979->2979 2983 1673e9b6ccc-1673e9b6d35 2982->2983 2983->2983 2984 1673e9b6d37-1673e9b6d3e 2983->2984 2984->2982 2985 1673e9b6d40-1673e9b6d43 2984->2985 2986 1673e9b6d45-1673e9b6d4e 2985->2986 2987 1673e9b6d68-1673e9b6d6b 2985->2987 2990 1673e9b6d5d-1673e9b6d5f 2986->2990 2988 1673e9b6d90-1673e9b6d93 2987->2988 2989 1673e9b6d6d-1673e9b6d76 2987->2989 2994 1673e9b6daf-1673e9b6de1 call 1673e9b9ae8 * 2 2988->2994 2995 1673e9b6d95-1673e9b6d9c 2988->2995 2993 1673e9b6d85-1673e9b6d87 2989->2993 2991 1673e9b6d61 2990->2991 2992 1673e9b6d50-1673e9b6d53 2990->2992 2991->2987 2992->2991 2996 1673e9b6d55-1673e9b6d5a 2992->2996 2997 1673e9b6d89 2993->2997 2998 1673e9b6d78-1673e9b6d7b 2993->2998 2999 1673e9b6dab-1673e9b6dad 2995->2999 2996->2990 2997->2988 2998->2997 3002 1673e9b6d7d-1673e9b6d82 2998->3002 2999->2994 3003 1673e9b6d9e-1673e9b6da1 2999->3003 3002->2993 3003->2994 3005 1673e9b6da3-1673e9b6da8 3003->3005 3005->2999
Strings
Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID: Heap$FreeProcess
  • String ID: 50$>1"R$V{'$RjM
  • API String ID: 3859560861-168007915
  • Opcode ID: a3e92adb96b447af456c8efde9ab049051fdfd552e5dd40782002e614e772544
  • Instruction ID: 9c6389855e8d48429e5614f9ef9f3f121e50e69c365a1c3f57b5759209841c3c
  • Opcode Fuzzy Hash: a3e92adb96b447af456c8efde9ab049051fdfd552e5dd40782002e614e772544
  • Instruction Fuzzy Hash: 3552FF326097858AEF14CF65E8503EE3BB0F78574CF048819DA8A6BB9EDB39D505DB01
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 3007 c0000b9840-c0000b9878 3008 c0000b987a-c0000b9892 call c0000bcee8 call c0000bcea0 3007->3008 3009 c0000b9896-c0000b98a3 3007->3009 3008->3009 3011 c0000b98de-c0000b98eb 3009->3011 3012 c0000b98a5-c0000b98a7 3009->3012 3013 c0000b9908-c0000b990b 3011->3013 3014 c0000b98ed-c0000b9906 call c0000b59a8 3011->3014 3016 c0000b98b7-c0000b98b9 3012->3016 3019 c0000b9929-c0000b9930 3013->3019 3020 c0000b990d-c0000b9925 call c0000bcee8 call c0000bcea0 3013->3020 3014->3013 3021 c0000b98bb-c0000b98c6 3016->3021 3022 c0000b98a9-c0000b98ac 3016->3022 3027 c0000b996b-c0000b999d call c0000bcee8 call c0000bcea0 3019->3027 3028 c0000b9932-c0000b9934 3019->3028 3020->3019 3021->3011 3029 c0000b98c8-c0000b98ca 3021->3029 3022->3021 3026 c0000b98ae-c0000b98b4 3022->3026 3026->3016 3047 c0000b99ca-c0000b99e9 3027->3047 3048 c0000b999f-c0000b99a2 3027->3048 3032 c0000b9944-c0000b9946 3028->3032 3033 c0000b98da-c0000b98dc 3029->3033 3034 c0000b9948-c0000b9953 3032->3034 3035 c0000b9936-c0000b9939 3032->3035 3033->3011 3036 c0000b98cc-c0000b98cf 3033->3036 3034->3027 3039 c0000b9955-c0000b9957 3034->3039 3035->3034 3042 c0000b993b-c0000b9941 3035->3042 3036->3011 3043 c0000b98d1-c0000b98d7 3036->3043 3044 c0000b9967-c0000b9969 3039->3044 3042->3032 3043->3033 3044->3027 3046 c0000b9959-c0000b995c 3044->3046 3046->3027 3051 c0000b995e-c0000b9964 3046->3051 3049 c0000b99eb 3047->3049 3050 c0000b9a04-c0000b9a49 call c0000b4b4c call c0000bcee8 call c0000bcea0 3047->3050 3052 c0000b99a4-c0000b99a7 3048->3052 3053 c0000b99ee-c0000b9a02 3049->3053 3064 c0000b9a4b-c0000b9a4e 3050->3064 3065 c0000b9a78-c0000b9ab5 3050->3065 3051->3044 3055 c0000b99a9-c0000b99b4 3052->3055 3056 c0000b99b6 3052->3056 3053->3050 3053->3053 3055->3052 3055->3056 3058 c0000b99b8-c0000b99bb 3056->3058 3058->3047 3060 c0000b99bd-c0000b99c8 3058->3060 3060->3047 3060->3058 3068 c0000b9a51-c0000b9a54 3064->3068 3066 c0000b9acf-c0000b9b0c call c0000b4b4c call c0000bcee8 call c0000bcea0 3065->3066 3067 c0000b9ab7 3065->3067 3080 c0000b9b0e-c0000b9b11 3066->3080 3081 c0000b9b37-c0000b9b6f 3066->3081 3069 c0000b9aba-c0000b9acd 3067->3069 3071 c0000b9a63 3068->3071 3072 c0000b9a56-c0000b9a61 3068->3072 3069->3066 3069->3069 3074 c0000b9a66-c0000b9a69 3071->3074 3072->3068 3072->3071 3074->3065 3076 c0000b9a6b-c0000b9a76 3074->3076 3076->3065 3076->3074 3084 c0000b9b13-c0000b9b16 3080->3084 3082 c0000b9b71 3081->3082 3083 c0000b9b86-c0000b9bcd call c0000b9520 3081->3083 3085 c0000b9b74-c0000b9b84 3082->3085 3091 c0000b9bcf 3083->3091 3092 c0000b9be4-c0000b9c25 call c0000b9520 3083->3092 3087 c0000b9b18-c0000b9b23 3084->3087 3088 c0000b9b25-c0000b9b28 3084->3088 3085->3083 3085->3085 3087->3084 3087->3088 3088->3081 3090 c0000b9b2a-c0000b9b35 3088->3090 3090->3081 3090->3088 3093 c0000b9bd2-c0000b9be2 3091->3093 3096 c0000b9c3c-c0000b9c7d call c0000b9520 3092->3096 3097 c0000b9c27 3092->3097 3093->3092 3093->3093 3101 c0000b9c7f 3096->3101 3102 c0000b9c94-c0000b9cd5 call c0000b9520 3096->3102 3098 c0000b9c2a-c0000b9c3a 3097->3098 3098->3096 3098->3098 3103 c0000b9c82-c0000b9c92 3101->3103 3106 c0000b9cec-c0000b9d2d call c0000b9520 3102->3106 3107 c0000b9cd7 3102->3107 3103->3102 3103->3103 3111 c0000b9d2f 3106->3111 3112 c0000b9d44-c0000b9d85 call c0000b9520 3106->3112 3108 c0000b9cda-c0000b9cea 3107->3108 3108->3106 3108->3108 3113 c0000b9d32-c0000b9d42 3111->3113 3116 c0000b9d9c-c0000b9ddd call c0000b9520 3112->3116 3117 c0000b9d87 3112->3117 3113->3112 3113->3113 3121 c0000b9ddf 3116->3121 3122 c0000b9df4-c0000b9e35 call c0000b9520 3116->3122 3119 c0000b9d8a-c0000b9d9a 3117->3119 3119->3116 3119->3119 3123 c0000b9de2-c0000b9df2 3121->3123 3126 c0000b9e4c-c0000b9e8d call c0000b9520 3122->3126 3127 c0000b9e37 3122->3127 3123->3122 3123->3123 3131 c0000b9e8f 3126->3131 3132 c0000b9ea4-c0000b9ee5 call c0000b9520 3126->3132 3128 c0000b9e3a-c0000b9e4a 3127->3128 3128->3126 3128->3128 3134 c0000b9e92-c0000b9ea2 3131->3134 3136 c0000b9efc-c0000b9f43 call c0000b9520 3132->3136 3137 c0000b9ee7 3132->3137 3134->3132 3134->3134 3141 c0000b9f5a-c0000b9fb3 call c0000b9520 3136->3141 3142 c0000b9f45 3136->3142 3138 c0000b9eea-c0000b9efa 3137->3138 3138->3136 3138->3138 3146 c0000b9fd0-c0000ba02c call c0000b9520 3141->3146 3147 c0000b9fb5 3141->3147 3143 c0000b9f48-c0000b9f58 3142->3143 3143->3141 3143->3143 3151 c0000ba049-c0000ba07d call c0000b9520 3146->3151 3152 c0000ba02e 3146->3152 3148 c0000b9fb8-c0000b9fce 3147->3148 3148->3146 3148->3148 3156 c0000ba07f 3151->3156 3157 c0000ba095-c0000ba0be call c0000b9520 3151->3157 3153 c0000ba031-c0000ba047 3152->3153 3153->3151 3153->3153 3158 c0000ba082-c0000ba093 3156->3158 3161 c0000ba0c3-c0000ba0c6 3157->3161 3158->3157 3158->3158 3162 c0000ba0cc-c0000ba135 3161->3162 3162->3162 3163 c0000ba137-c0000ba13e 3162->3163 3163->3161 3164 c0000ba140-c0000ba143 3163->3164 3165 c0000ba168-c0000ba16b 3164->3165 3166 c0000ba145-c0000ba14e 3164->3166 3168 c0000ba16d-c0000ba176 3165->3168 3169 c0000ba190-c0000ba193 3165->3169 3167 c0000ba15d-c0000ba15f 3166->3167 3170 c0000ba161 3167->3170 3171 c0000ba150-c0000ba153 3167->3171 3172 c0000ba185-c0000ba187 3168->3172 3173 c0000ba1af-c0000ba1e1 call c0000bcee8 * 2 3169->3173 3174 c0000ba195-c0000ba19c 3169->3174 3170->3165 3171->3170 3177 c0000ba155-c0000ba15a 3171->3177 3175 c0000ba189 3172->3175 3176 c0000ba178-c0000ba17b 3172->3176 3178 c0000ba1ab-c0000ba1ad 3174->3178 3175->3169 3176->3175 3182 c0000ba17d-c0000ba182 3176->3182 3177->3167 3178->3173 3180 c0000ba19e-c0000ba1a1 3178->3180 3180->3173 3183 c0000ba1a3-c0000ba1a8 3180->3183 3182->3172 3183->3178
Strings
Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: 50$>1"R$V{'$RjM
  • API String ID: 0-168007915
  • Opcode ID: 5b1d124956e47e3a08fb9cedf0fafcd9824b72326c35a7e4038469c0e41be914
  • Instruction ID: 5e3587661e721b812051b228a654ed7b32b37c42d59bda3c547da12cba30e09b
  • Opcode Fuzzy Hash: 5b1d124956e47e3a08fb9cedf0fafcd9824b72326c35a7e4038469c0e41be914
  • Instruction Fuzzy Hash: 8C529B72705780CAEB24CF39E550BAE3BB0F78574CF2586189B896BB59DB38C905CB10
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 3186 1673e9c210b 3187 1673e9c210e-1673e9c2121 3186->3187 3187->3187 3188 1673e9c2123-1673e9c2160 call 1673e9b1b14 3187->3188 3191 1673e9c2162 3188->3191 3192 1673e9c217b-1673e9c21e7 call 1673e9b1b14 call 1673e9bd1ec * 2 3188->3192 3193 1673e9c2165-1673e9c2179 3191->3193 3201 1673e9c2209-1673e9c2220 3192->3201 3202 1673e9c21e9-1673e9c21ec 3192->3202 3193->3192 3193->3193 3204 1673e9c2242-1673e9c22b3 call 1673e9b1000 * 2 call 1673e9bc300 3201->3204 3205 1673e9c2222-1673e9c2225 3201->3205 3202->3201 3203 1673e9c21ee-1673e9c21f7 3202->3203 3203->3203 3206 1673e9c21f9-1673e9c21fb 3203->3206 3219 1673e9c22c3-1673e9c2398 call 1673e9b9c00 call 1673e9c6e04 3204->3219 3220 1673e9c22b5-1673e9c22bd 3204->3220 3205->3204 3207 1673e9c2227-1673e9c2230 3205->3207 3206->3201 3209 1673e9c21fd-1673e9c2204 call 1673e9bbf78 3206->3209 3207->3207 3210 1673e9c2232-1673e9c2234 3207->3210 3209->3201 3210->3204 3213 1673e9c2236-1673e9c223d call 1673e9bbf78 3210->3213 3213->3204 3225 1673e9c2cf2-1673e9c2da3 call 1673e9b9ae8 * 6 3219->3225 3226 1673e9c239e 3219->3226 3220->3219 3228 1673e9c23a3-1673e9c23d5 call 1673e9c33fc call 1673e9b1ce8 call 1673e9bc300 3226->3228 3242 1673e9c23e4-1673e9c23ee call 1673e9b1d18 3228->3242 3243 1673e9c23d7-1673e9c23e1 3228->3243 3249 1673e9c23f4-1673e9c2439 3242->3249 3250 1673e9c2cbd-1673e9c2cd9 call 1673e9b9208 call 1673e9b99c4 3242->3250 3243->3242 3252 1673e9c2454-1673e9c2482 call 1673e9b1b14 3249->3252 3253 1673e9c243b 3249->3253 3262 1673e9c2ce2-1673e9c2ce5 3250->3262 3263 1673e9c2cdb 3250->3263 3264 1673e9c2484-1673e9c2491 call 1673e9b1d18 3252->3264 3265 1673e9c24aa-1673e9c24cd 3252->3265 3255 1673e9c243e-1673e9c2452 3253->3255 3255->3252 3255->3255 3262->3228 3267 1673e9c2ceb 3262->3267 3263->3262 3264->3265 3274 1673e9c2493-1673e9c24a5 call 1673e9c993c 3264->3274 3269 1673e9c24cf-1673e9c24dc 3265->3269 3270 1673e9c24ee-1673e9c2524 call 1673e9c81b8 3265->3270 3267->3225 3272 1673e9c24ea-1673e9c24ec 3269->3272 3278 1673e9c2526-1673e9c252d 3270->3278 3279 1673e9c253f-1673e9c2558 3270->3279 3272->3270 3275 1673e9c24de-1673e9c24e1 3272->3275 3274->3265 3275->3270 3280 1673e9c24e3-1673e9c24e7 3275->3280 3281 1673e9c253b-1673e9c253d 3278->3281 3282 1673e9c2572-1673e9c26f0 call 1673e9b19dc * 2 call 1673e9b80a8 call 1673e9b174c call 1673e9c91d0 call 1673e9b9ae8 * 2 call 1673e9c8474 3279->3282 3283 1673e9c255a 3279->3283 3280->3272 3281->3279 3284 1673e9c252f-1673e9c2532 3281->3284 3306 1673e9c26f6-1673e9c2753 call 1673e9b260c call 1673e9c85e0 3282->3306 3307 1673e9c283a 3282->3307 3285 1673e9c255d-1673e9c2570 3283->3285 3284->3279 3287 1673e9c2534-1673e9c2538 3284->3287 3285->3282 3285->3285 3287->3281 3316 1673e9c2755-1673e9c275c 3306->3316 3317 1673e9c276e-1673e9c278c 3306->3317 3309 1673e9c283d-1673e9c2908 call 1673e9b9ae8 * 3 call 1673e9b1b14 call 1673e9b83fc 3307->3309 3342 1673e9c290e-1673e9c2912 3309->3342 3343 1673e9c2a18 3309->3343 3319 1673e9c276a-1673e9c276c 3316->3319 3320 1673e9c279f-1673e9c2838 call 1673e9b19dc * 3 call 1673e9b80a8 call 1673e9b9ae8 * 2 3317->3320 3321 1673e9c278e-1673e9c2799 3317->3321 3319->3317 3323 1673e9c275e-1673e9c2761 3319->3323 3320->3309 3321->3320 3323->3317 3328 1673e9c2763-1673e9c2767 3323->3328 3328->3319 3342->3343 3345 1673e9c2918-1673e9c293e call 1673e9c9744 3342->3345 3346 1673e9c2a1e-1673e9c2a4b 3343->3346 3355 1673e9c2940-1673e9c2945 3345->3355 3356 1673e9c294a-1673e9c2952 3345->3356 3352 1673e9c2a55-1673e9c2a77 call 1673e9b1b14 3346->3352 3353 1673e9c2a4d 3346->3353 3360 1673e9c2a7d-1673e9c2a81 3352->3360 3361 1673e9c2b8e-1673e9c2ba7 call 1673e9b9bb8 3352->3361 3353->3352 3358 1673e9c2a04-1673e9c2a13 call 1673e9b9ae8 3355->3358 3356->3355 3359 1673e9c2954-1673e9c295c 3356->3359 3358->3343 3363 1673e9c2a01 3359->3363 3364 1673e9c2962-1673e9c2969 3359->3364 3365 1673e9c2a83-1673e9c2ab5 call 1673e9bbf78 * 2 3360->3365 3366 1673e9c2abc-1673e9c2ace call 1673e9b9bb8 3360->3366 3376 1673e9c2bad-1673e9c2bbe 3361->3376 3377 1673e9c2c67-1673e9c2c85 call 1673e9c1594 3361->3377 3363->3358 3364->3363 3369 1673e9c296f-1673e9c2977 3364->3369 3365->3366 3366->3361 3381 1673e9c2ad4-1673e9c2ae5 3366->3381 3369->3363 3373 1673e9c297d-1673e9c298a 3369->3373 3373->3363 3378 1673e9c298c-1673e9c2995 3373->3378 3382 1673e9c2bc0-1673e9c2bcd 3376->3382 3383 1673e9c2be1-1673e9c2c09 call 1673e9b1b14 3376->3383 3377->3250 3416 1673e9c2c87-1673e9c2c8a 3377->3416 3384 1673e9c29a2-1673e9c29a6 3378->3384 3385 1673e9c2997-1673e9c29a0 3378->3385 3389 1673e9c2ae7-1673e9c2af4 3381->3389 3390 1673e9c2b08-1673e9c2b30 call 1673e9b1b14 3381->3390 3391 1673e9c2bdd-1673e9c2bdf 3382->3391 3401 1673e9c2c0b-1673e9c2c18 3383->3401 3402 1673e9c2c2c-1673e9c2c62 call 1673e9b1b14 call 1673e9bdab4 3383->3402 3384->3363 3386 1673e9c29a8-1673e9c29af 3384->3386 3385->3363 3385->3384 3393 1673e9c29b1-1673e9c29b4 3386->3393 3394 1673e9c29cb-1673e9c29ff call 1673e9b16d4 call 1673e9b9ae8 3386->3394 3396 1673e9c2b04-1673e9c2b06 3389->3396 3408 1673e9c2b53-1673e9c2b89 call 1673e9b1b14 call 1673e9bdab4 3390->3408 3409 1673e9c2b32-1673e9c2b3f 3390->3409 3391->3383 3397 1673e9c2bcf-1673e9c2bd2 3391->3397 3403 1673e9c29c3-1673e9c29c5 3393->3403 3394->3346 3396->3390 3407 1673e9c2af6-1673e9c2af9 3396->3407 3397->3383 3404 1673e9c2bd4-1673e9c2bda 3397->3404 3410 1673e9c2c28-1673e9c2c2a 3401->3410 3402->3377 3412 1673e9c29b6-1673e9c29b9 3403->3412 3413 1673e9c29c7 3403->3413 3404->3391 3407->3390 3414 1673e9c2afb-1673e9c2b01 3407->3414 3408->3361 3417 1673e9c2b4f-1673e9c2b51 3409->3417 3410->3402 3418 1673e9c2c1a-1673e9c2c1d 3410->3418 3412->3413 3421 1673e9c29bb-1673e9c29c0 3412->3421 3413->3394 3414->3396 3416->3250 3417->3408 3423 1673e9c2b41-1673e9c2b44 3417->3423 3418->3402 3426 1673e9c2c1f-1673e9c2c25 3418->3426 3421->3403 3423->3408 3429 1673e9c2b46-1673e9c2b4c 3423->3429 3426->3410 3429->3417
Strings
Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: 2j]W$2xFU$uxJ\$|gFA
  • API String ID: 0-2595514560
  • Opcode ID: 42f83fc9a6e80b06c3af0088fb6d183c7d2a0dae591b96b705e11cc3111a0fcc
  • Instruction ID: bdebf5434ebe1d7680b59f461cef1e884bbd76465fda7a9d201f64c16ca5989b
  • Opcode Fuzzy Hash: 42f83fc9a6e80b06c3af0088fb6d183c7d2a0dae591b96b705e11cc3111a0fcc
  • Instruction Fuzzy Hash: D1625672204BC18AEB64DF75E8803DD37A4F744788F54481ADB896BBA9CF31C5A6E701
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 3430 c0000c22dc-c0000c2310 3431 c0000c232c-c0000c2335 3430->3431 3432 c0000c2312-c0000c2319 3430->3432 3433 c0000c233b-c0000c233d 3431->3433 3434 c0000c2e55-c0000c2e70 3431->3434 3435 c0000c2328-c0000c232a 3432->3435 3433->3434 3437 c0000c2343-c0000c234b 3433->3437 3435->3431 3436 c0000c231b-c0000c231e 3435->3436 3436->3431 3438 c0000c2320-c0000c2325 3436->3438 3437->3437 3439 c0000c234d-c0000c234f 3437->3439 3438->3435 3439->3434 3440 c0000c2355-c0000c238f 3439->3440 3441 c0000c23aa-c0000c23ba call c0000bcfb8 3440->3441 3442 c0000c2391 3440->3442 3446 c0000c2550-c0000c25a8 3441->3446 3447 c0000c23c0-c0000c23e6 3441->3447 3443 c0000c2394-c0000c23a8 3442->3443 3443->3441 3443->3443 3448 c0000c25aa 3446->3448 3449 c0000c25c3-c0000c25d4 call c0000b4f14 3446->3449 3450 c0000c23e8 3447->3450 3451 c0000c2401-c0000c2411 call c0000bcfb8 3447->3451 3453 c0000c25ad-c0000c25c1 3448->3453 3459 c0000c25d7-c0000c2600 call c0000b59a8 call c0000b93d4 call c0000b4ddc 3449->3459 3455 c0000c23eb-c0000c23ff 3450->3455 3451->3446 3458 c0000c2417-c0000c244b 3451->3458 3453->3449 3453->3453 3455->3451 3455->3455 3460 c0000c244d 3458->3460 3461 c0000c2462-c0000c2472 call c0000bcfb8 3458->3461 3478 c0000c2602-c0000c2620 3459->3478 3464 c0000c2450-c0000c2460 3460->3464 3469 c0000c2e4c-c0000c2e50 call c0000bcee8 3461->3469 3470 c0000c2478-c0000c24ad 3461->3470 3464->3461 3464->3464 3469->3434 3473 c0000c24af 3470->3473 3474 c0000c24c8-c0000c24d4 call c0000b4f14 3470->3474 3476 c0000c24b2-c0000c24c6 3473->3476 3482 c0000c24da-c0000c2503 call c0000b59a8 call c0000b93d4 call c0000b4ddc 3474->3482 3476->3474 3476->3476 3480 c0000c2622-c0000c262d 3478->3480 3481 c0000c2633-c0000c263d call c0000b4ddc 3478->3481 3480->3481 3486 c0000c2642-c0000c266b call c0000b59a8 call c0000b93d4 call c0000b4ddc 3481->3486 3495 c0000c2505-c0000c2532 3482->3495 3500 c0000c266d-c0000c268b 3486->3500 3497 c0000c2534-c0000c2544 3495->3497 3498 c0000c2546-c0000c254b 3495->3498 3497->3497 3497->3498 3501 c0000c2e44-c0000c2e47 call c0000b4ddc 3498->3501 3502 c0000c268d-c0000c2698 3500->3502 3503 c0000c269e-c0000c26ad call c0000b4ddc 3500->3503 3501->3469 3502->3503 3507 c0000c26b3-c0000c26dc call c0000b59a8 call c0000b93d4 call c0000b4ddc 3503->3507 3514 c0000c26de-c0000c2704 3507->3514 3515 c0000c271f-c0000c272f call c0000bcfb8 3514->3515 3516 c0000c2706 3514->3516 3520 c0000c2ab8-c0000c2ade 3515->3520 3521 c0000c2735-c0000c2808 3515->3521 3518 c0000c2709-c0000c271d 3516->3518 3518->3515 3518->3518 3524 c0000c2af9-c0000c2b09 call c0000bcfb8 3520->3524 3525 c0000c2ae0 3520->3525 3522 c0000c280a 3521->3522 3523 c0000c2826-c0000c289d call c0000b4ddc 3521->3523 3526 c0000c280d-c0000c2824 3522->3526 3532 c0000c289f 3523->3532 3533 c0000c28b8-c0000c2978 call c0000b4ddc 3523->3533 3524->3469 3534 c0000c2b0f-c0000c2baf 3524->3534 3528 c0000c2ae3-c0000c2af7 3525->3528 3526->3523 3526->3526 3528->3524 3528->3528 3535 c0000c28a2-c0000c28b6 3532->3535 3542 c0000c2999-c0000c2a8e call c0000b4ddc 3533->3542 3543 c0000c297a 3533->3543 3537 c0000c2bd0-c0000c2c37 call c0000b4ddc 3534->3537 3538 c0000c2bb1 3534->3538 3535->3533 3535->3535 3546 c0000c2c39 3537->3546 3547 c0000c2c52-c0000c2cea call c0000b4ddc 3537->3547 3540 c0000c2bb4-c0000c2bce 3538->3540 3540->3537 3540->3540 3552 c0000c2aac-c0000c2ab3 3542->3552 3553 c0000c2a90-c0000c2aaa 3542->3553 3548 c0000c297d-c0000c2997 3543->3548 3550 c0000c2c3c-c0000c2c50 3546->3550 3555 c0000c2cec 3547->3555 3556 c0000c2d0b-c0000c2d64 call c0000b4ddc 3547->3556 3548->3542 3548->3548 3550->3547 3550->3550 3552->3501 3553->3552 3553->3553 3557 c0000c2cef-c0000c2d09 3555->3557 3560 c0000c2d7f-c0000c2e22 call c0000b4ddc 3556->3560 3561 c0000c2d66 3556->3561 3557->3556 3557->3557 3565 c0000c2e3d 3560->3565 3566 c0000c2e24-c0000c2e3b 3560->3566 3562 c0000c2d69-c0000c2d7d 3561->3562 3562->3560 3562->3562 3565->3501 3566->3565 3566->3566
Strings
Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: &K}g$-OHW$EUDS$vatc
  • API String ID: 0-1212930380
  • Opcode ID: 56765ba2d39660e30ec840d43a7b9b27e50efdd83fc8feea4f472af215f0e517
  • Instruction ID: de72270f69c2caa8b10d4b314f008a51a8758301da4480a12e941319d40894eb
  • Opcode Fuzzy Hash: 56765ba2d39660e30ec840d43a7b9b27e50efdd83fc8feea4f472af215f0e517
  • Instruction Fuzzy Hash: EE6253B26052C0CEEB24CF659990BED3BA1F34574CFA14618EA895FF49DB788646CF40
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 3567 1673e9beedc-1673e9bef10 3568 1673e9bef12-1673e9bef19 3567->3568 3569 1673e9bef2c-1673e9bef35 3567->3569 3570 1673e9bef28-1673e9bef2a 3568->3570 3571 1673e9bfa55-1673e9bfa70 3569->3571 3572 1673e9bef3b-1673e9bef3d 3569->3572 3570->3569 3573 1673e9bef1b-1673e9bef1e 3570->3573 3572->3571 3574 1673e9bef43-1673e9bef4b 3572->3574 3573->3569 3575 1673e9bef20-1673e9bef25 3573->3575 3574->3574 3576 1673e9bef4d-1673e9bef4f 3574->3576 3575->3570 3576->3571 3577 1673e9bef55-1673e9bef8f 3576->3577 3578 1673e9bef91 3577->3578 3579 1673e9befaa-1673e9befba call 1673e9b9bb8 3577->3579 3580 1673e9bef94-1673e9befa8 3578->3580 3583 1673e9bf150-1673e9bf1a8 3579->3583 3584 1673e9befc0-1673e9befe6 3579->3584 3580->3579 3580->3580 3585 1673e9bf1c3-1673e9bf1d4 call 1673e9b1b14 3583->3585 3586 1673e9bf1aa 3583->3586 3587 1673e9bf001-1673e9bf011 call 1673e9b9bb8 3584->3587 3588 1673e9befe8 3584->3588 3595 1673e9bf1d7-1673e9bf200 call 1673e9b25a8 call 1673e9b5fd4 call 1673e9b19dc 3585->3595 3591 1673e9bf1ad-1673e9bf1c1 3586->3591 3587->3583 3596 1673e9bf017-1673e9bf04b 3587->3596 3589 1673e9befeb-1673e9befff 3588->3589 3589->3587 3589->3589 3591->3585 3591->3591 3615 1673e9bf202-1673e9bf220 3595->3615 3598 1673e9bf062-1673e9bf072 call 1673e9b9bb8 3596->3598 3599 1673e9bf04d 3596->3599 3606 1673e9bfa4c-1673e9bfa50 call 1673e9b9ae8 3598->3606 3607 1673e9bf078-1673e9bf0ad 3598->3607 3601 1673e9bf050-1673e9bf060 3599->3601 3601->3598 3601->3601 3606->3571 3610 1673e9bf0af 3607->3610 3611 1673e9bf0c8-1673e9bf0d4 call 1673e9b1b14 3607->3611 3613 1673e9bf0b2-1673e9bf0c6 3610->3613 3617 1673e9bf0da-1673e9bf103 call 1673e9b25a8 call 1673e9b5fd4 call 1673e9b19dc 3611->3617 3613->3611 3613->3613 3618 1673e9bf233-1673e9bf23d call 1673e9b19dc 3615->3618 3619 1673e9bf222-1673e9bf22d 3615->3619 3633 1673e9bf105-1673e9bf132 3617->3633 3623 1673e9bf242-1673e9bf26b call 1673e9b25a8 call 1673e9b5fd4 call 1673e9b19dc 3618->3623 3619->3618 3637 1673e9bf26d-1673e9bf28b 3623->3637 3635 1673e9bf134-1673e9bf144 3633->3635 3636 1673e9bf146-1673e9bf14b 3633->3636 3635->3635 3635->3636 3638 1673e9bfa44-1673e9bfa47 call 1673e9b19dc 3636->3638 3639 1673e9bf28d-1673e9bf298 3637->3639 3640 1673e9bf29e-1673e9bf2ad call 1673e9b19dc 3637->3640 3638->3606 3639->3640 3644 1673e9bf2b3-1673e9bf2dc call 1673e9b25a8 call 1673e9b5fd4 call 1673e9b19dc 3640->3644 3651 1673e9bf2de-1673e9bf304 3644->3651 3652 1673e9bf306 3651->3652 3653 1673e9bf31f-1673e9bf32f call 1673e9b9bb8 3651->3653 3654 1673e9bf309-1673e9bf31d 3652->3654 3657 1673e9bf335-1673e9bf408 3653->3657 3658 1673e9bf6b8-1673e9bf6de 3653->3658 3654->3653 3654->3654 3659 1673e9bf426-1673e9bf49d call 1673e9b19dc 3657->3659 3660 1673e9bf40a 3657->3660 3661 1673e9bf6e0 3658->3661 3662 1673e9bf6f9-1673e9bf709 call 1673e9b9bb8 3658->3662 3669 1673e9bf49f 3659->3669 3670 1673e9bf4b8-1673e9bf578 call 1673e9b19dc 3659->3670 3663 1673e9bf40d-1673e9bf424 3660->3663 3665 1673e9bf6e3-1673e9bf6f7 3661->3665 3662->3606 3671 1673e9bf70f-1673e9bf7af 3662->3671 3663->3659 3663->3663 3665->3662 3665->3665 3672 1673e9bf4a2-1673e9bf4b6 3669->3672 3680 1673e9bf599-1673e9bf68e call 1673e9b19dc 3670->3680 3681 1673e9bf57a 3670->3681 3674 1673e9bf7d0-1673e9bf837 call 1673e9b19dc 3671->3674 3675 1673e9bf7b1 3671->3675 3672->3670 3672->3672 3683 1673e9bf852-1673e9bf8ea call 1673e9b19dc 3674->3683 3684 1673e9bf839 3674->3684 3678 1673e9bf7b4-1673e9bf7ce 3675->3678 3678->3674 3678->3678 3689 1673e9bf690-1673e9bf6aa 3680->3689 3690 1673e9bf6ac-1673e9bf6b3 3680->3690 3682 1673e9bf57d-1673e9bf597 3681->3682 3682->3680 3682->3682 3692 1673e9bf90b-1673e9bf964 call 1673e9b19dc 3683->3692 3693 1673e9bf8ec 3683->3693 3686 1673e9bf83c-1673e9bf850 3684->3686 3686->3683 3686->3686 3689->3689 3689->3690 3690->3638 3697 1673e9bf966 3692->3697 3698 1673e9bf97f-1673e9bfa22 call 1673e9b19dc 3692->3698 3694 1673e9bf8ef-1673e9bf909 3693->3694 3694->3692 3694->3694 3699 1673e9bf969-1673e9bf97d 3697->3699 3702 1673e9bfa24-1673e9bfa3b 3698->3702 3703 1673e9bfa3d 3698->3703 3699->3698 3699->3699 3702->3702 3702->3703 3703->3638
Strings
Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: &K}g$-OHW$EUDS$vatc
  • API String ID: 0-1212930380
  • Opcode ID: 97567781d9f1832e7a99bfd3abd22102227f4b18fa2f0e3859c8a764d13a6cb4
  • Instruction ID: a76110a0f3f90177cb40e8644534295aa5b1d4ac778d8f130d3a1671bb488fef
  • Opcode Fuzzy Hash: 97567781d9f1832e7a99bfd3abd22102227f4b18fa2f0e3859c8a764d13a6cb4
  • Instruction Fuzzy Hash: 256285B26092C18EEB24CF7599903EC3BA1F34574CF50490AEA856FB8DDB798646CF41
Uniqueness

Uniqueness Score: -1.00%

Strings
Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: _Mt$ocB$AX|L
  • API String ID: 0-438003525
  • Opcode ID: e20e65a26d14688a3fe2b169c21dd3a5133e29b3ef24b75c63e78fa42e210e2e
  • Instruction ID: 6ea9f87c300cf69572582af448e71d58c43f484335e96237cfbd672fd721ae12
  • Opcode Fuzzy Hash: e20e65a26d14688a3fe2b169c21dd3a5133e29b3ef24b75c63e78fa42e210e2e
  • Instruction Fuzzy Hash: 03620172701380CAFB24CF65D850BEE7BA1FB4978CF664229DA5A5BB89DB78C501C710
Uniqueness

Uniqueness Score: -1.00%

Strings
Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: _Mt$ocB$AX|L
  • API String ID: 0-438003525
  • Opcode ID: fb04c1e50a3a7331cb6697ec5d25189f38d511496c48f32da466b06ea9ae8dc8
  • Instruction ID: f827f883eb9f6e22acc39b3d2130331f033629c8584b8b2d0573df0d89d78a9c
  • Opcode Fuzzy Hash: fb04c1e50a3a7331cb6697ec5d25189f38d511496c48f32da466b06ea9ae8dc8
  • Instruction Fuzzy Hash: 7862F2727187828AEB24CF659C403ED7BA1FB447CCF444A1ADA8A5BBC9DB3AC501D741
Uniqueness

Uniqueness Score: -1.00%

Strings
Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: Y*=$gfff$gfff
  • API String ID: 0-4005661508
  • Opcode ID: 14c27f9c4c1cac1fccd021351c7cb7988ca8a330c3b0565a83fd70f09222f175
  • Instruction ID: 1c78e9c859bb391ced98d5d54eeb13586a029766b29013c47d690b4259bc7c4d
  • Opcode Fuzzy Hash: 14c27f9c4c1cac1fccd021351c7cb7988ca8a330c3b0565a83fd70f09222f175
  • Instruction Fuzzy Hash: DF22BE72608280CEFB14CF799150BEE7BB1E78978CFA54619EA855BB5ECB38C505CB10
Uniqueness

Uniqueness Score: -1.00%

Strings
Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: Y*=$gfff$gfff
  • API String ID: 0-4005661508
  • Opcode ID: f3136231ebee3eda709011cdbd12e438870e391f2afe79d87fae62082305f674
  • Instruction ID: 6e2ed364042e029211270b4b06ae5b17f30ad20ae2a67d87f7fa970c521725c0
  • Opcode Fuzzy Hash: f3136231ebee3eda709011cdbd12e438870e391f2afe79d87fae62082305f674
  • Instruction Fuzzy Hash: B322E2767082818EEB14CF35A9503EE7BA1F78578CF40480AEAD55BB8DD73AC401EB02
Uniqueness

Uniqueness Score: -1.00%

Strings
Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: aZFS$trC5
  • API String ID: 0-3468201609
  • Opcode ID: 82381726f1dd34a24922e63707dfe87e601f8d3b12f4e70843febb8bf3877a62
  • Instruction ID: 1c376e1b636a1b08782d2b75dcab44527a1470f78189c06760174a1daa0f2971
  • Opcode Fuzzy Hash: 82381726f1dd34a24922e63707dfe87e601f8d3b12f4e70843febb8bf3877a62
  • Instruction Fuzzy Hash: 68225A726047C0CAFB20DF65E450BDD7BA0F78674CFA54229EA895BB4ADB35C946CB00
Uniqueness

Uniqueness Score: -1.00%

Strings
Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: aZFS$trC5
  • API String ID: 0-3468201609
  • Opcode ID: 6f8a57b20962e6cd28641ad64ec2d76ac99eae4e32063c46e89701ba2c4e7180
  • Instruction ID: efa5e832d7cf4f7208662193c3a66c04e1639864af9d573a2959b0f8564bb167
  • Opcode Fuzzy Hash: 6f8a57b20962e6cd28641ad64ec2d76ac99eae4e32063c46e89701ba2c4e7180
  • Instruction Fuzzy Hash: FB228B726087C58EEB24CF25E8902DD7BA0F38574CF94442AEA895BB8DDB35C945DB01
Uniqueness

Uniqueness Score: -1.00%

Strings
Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: 4[u
  • API String ID: 0-1357948871
  • Opcode ID: f3bb393a9d3ec2dc299221f010e8f70ff72a6c68711b2374eef2e7b71259c4ad
  • Instruction ID: 67a734ae742c46f407cc86dcccd2b6ce46167218624aa74447f114ef4314d87e
  • Opcode Fuzzy Hash: f3bb393a9d3ec2dc299221f010e8f70ff72a6c68711b2374eef2e7b71259c4ad
  • Instruction Fuzzy Hash: 57827B726056C0CAFB60CF65E850FED3BA1F74578CF664219DA8A5BB9ADB38C541CB00
Uniqueness

Uniqueness Score: -1.00%

Strings
Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: 4[u
  • API String ID: 0-1357948871
  • Opcode ID: 2961ccc4e3e14d4e70db66a19b8395aab64f78d3008fe6a2814544d370cef201
  • Instruction ID: cf9c45d7b009c3777302a6a982fef2596270c46b0af13e78836292f81fb9193b
  • Opcode Fuzzy Hash: 2961ccc4e3e14d4e70db66a19b8395aab64f78d3008fe6a2814544d370cef201
  • Instruction Fuzzy Hash: 7482AE726087C58EEB68CF35E8507ED3BA4F74478CF44481ADA8A5BB89DB39C541EB01
Uniqueness

Uniqueness Score: -1.00%

Strings
Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: q5Y
  • API String ID: 0-465541591
  • Opcode ID: 117153ea3d542a13b5efd9ad79bf10819877f732172d0f2a3ac8f0a6d58634f3
  • Instruction ID: b17e6b678238fdca66c1df150dbbe8d3dec2fa22754428049b3e9b2419b6839b
  • Opcode Fuzzy Hash: 117153ea3d542a13b5efd9ad79bf10819877f732172d0f2a3ac8f0a6d58634f3
  • Instruction Fuzzy Hash: 9742D172605780CAFB65CF24E440FAD7BA4F74478CF664719EA8A0BB89DB38C945CB40
Uniqueness

Uniqueness Score: -1.00%

Strings
Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: q5Y
  • API String ID: 0-465541591
  • Opcode ID: 41678b3da634816d6ee4b264a5eec00e926735b9c5272691b048ee1a44d999ac
  • Instruction ID: d36186911363c682e6e861e7e5ed574c0d404cc76793c240504e1d5d05de9477
  • Opcode Fuzzy Hash: 41678b3da634816d6ee4b264a5eec00e926735b9c5272691b048ee1a44d999ac
  • Instruction Fuzzy Hash: CC42D17620D782D9EB15CF25A8403EE7BA4F74578CF44481AEAC907BC9D73AC945EB01
Uniqueness

Uniqueness Score: -1.00%

Strings
Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: c6g
  • API String ID: 0-3546307900
  • Opcode ID: 7e85fdcfaef46ea576958985c8364f98799448bca5ba387ee1cd5ae375de3700
  • Instruction ID: cc5bb825acc77b5a3944b41004ea7192c0a84353fb5932cce5b35a5d8df53b27
  • Opcode Fuzzy Hash: 7e85fdcfaef46ea576958985c8364f98799448bca5ba387ee1cd5ae375de3700
  • Instruction Fuzzy Hash: 9E127932604B80CAFB60CF64E990BED77E4FB4578CF664219EA895BB99DB34C545CB00
Uniqueness

Uniqueness Score: -1.00%

Strings
Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: .xDa
  • API String ID: 0-2515264822
  • Opcode ID: 5a4b652798f890c03fb00f4ec91067b07ca68e5d570935ac50b58f2237a3a0aa
  • Instruction ID: 07749703c6f77db599c3d72e02135ed680e9d339f13bd1640e5b600c5f49a273
  • Opcode Fuzzy Hash: 5a4b652798f890c03fb00f4ec91067b07ca68e5d570935ac50b58f2237a3a0aa
  • Instruction Fuzzy Hash: F6023832204680CAFB60CF65E890F9D7BB0F788B88F654225EF995BB59CB34C556DB10
Uniqueness

Uniqueness Score: -1.00%

Strings
Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: .xDa
  • API String ID: 0-2515264822
  • Opcode ID: 5a0568ef909919d2dff8495ab79afe05f83796aeda0ada86b68be17b52b0ed16
  • Instruction ID: 0e08c22dc19c1bc78da6d3d94193149a9fb6dac80702d100565531e33bb193cb
  • Opcode Fuzzy Hash: 5a0568ef909919d2dff8495ab79afe05f83796aeda0ada86b68be17b52b0ed16
  • Instruction Fuzzy Hash: 70F17B322086808AEB20DF66E8407DD77B0F788B8CF544916DF9D5BB99DB35C592EB04
Uniqueness

Uniqueness Score: -1.00%

Strings
Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: {F.]
  • API String ID: 0-4155518358
  • Opcode ID: 88777eb5903a4d84b2d734bf990e3103a94104ec931c4afa7421d121b685df4b
  • Instruction ID: 85dfbd0cebe419d9397701ea647b004d31752c8230e5a655d696c018ba8032a8
  • Opcode Fuzzy Hash: 88777eb5903a4d84b2d734bf990e3103a94104ec931c4afa7421d121b685df4b
  • Instruction Fuzzy Hash: 37E1AB72610684DEFB10CF74D4A1FED3BB1E35538CFA20225EA0A6BA9DE7B48546C744
Uniqueness

Uniqueness Score: -1.00%

Strings
Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: {F.]
  • API String ID: 0-4155518358
  • Opcode ID: 88777eb5903a4d84b2d734bf990e3103a94104ec931c4afa7421d121b685df4b
  • Instruction ID: 395438c38d276ae0bf2bfe6dba32ac842a40d7e36f9fd49463db4de57336ae43
  • Opcode Fuzzy Hash: 88777eb5903a4d84b2d734bf990e3103a94104ec931c4afa7421d121b685df4b
  • Instruction Fuzzy Hash: 64E1D3326686418EEB10DF74D8916ED37B5F31578CF800816DA8A2BBEDE772C541EB42
Uniqueness

Uniqueness Score: -1.00%

Strings
Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: }]PH
  • API String ID: 0-516525640
  • Opcode ID: b61b12e815004e17e66413bbd812c9d2c78981c97bf104e233f14f9f37bf11b6
  • Instruction ID: a0433e5d6be7b265376daa483be8ba10c8ae46b305d92faf7e83d5d64dd0e828
  • Opcode Fuzzy Hash: b61b12e815004e17e66413bbd812c9d2c78981c97bf104e233f14f9f37bf11b6
  • Instruction Fuzzy Hash: D4D17766B04A80DEFB10CFB8C891BEC37F0A70578CF554A65DE496BA9ADB30D656C310
Uniqueness

Uniqueness Score: -1.00%

Strings
Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: }]PH
  • API String ID: 0-516525640
  • Opcode ID: a6e4aa2ee780097f67e8da65096b73e3d9e6036c9c20f87cd3da60671f6920c0
  • Instruction ID: 699ac102e9d07263623e451197b60f49e268afd338b9f65a53d7e4780bbe0463
  • Opcode Fuzzy Hash: a6e4aa2ee780097f67e8da65096b73e3d9e6036c9c20f87cd3da60671f6920c0
  • Instruction Fuzzy Hash: 23D16672B086809EEB10DFB9D8916EC37F0F70878CF04485ADE896BB99DA30C556E715
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: d056ce18b7daf42d52397ce6b264c4c0e2f1f651ac6fdc02f85c12e3e0687a86
  • Instruction ID: beb197fb24d62ec0b5f04b3301a5b0148b3309dcf62b5c5d1e72a933cab1e112
  • Opcode Fuzzy Hash: d056ce18b7daf42d52397ce6b264c4c0e2f1f651ac6fdc02f85c12e3e0687a86
  • Instruction Fuzzy Hash: 6E726832208BC18AEB64DF75E8903DD37A4F744788F54481ADA896BBE9CF35C5A1E701
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 90557d1a0cfa63e53d660415746253f8ae6610a9177f2b7e37e0b6ee05ce0d57
  • Instruction ID: eb655ad27a07d3f19a2406848b11f5155fc8214e2a1210b3c3c38223bcfe373b
  • Opcode Fuzzy Hash: 90557d1a0cfa63e53d660415746253f8ae6610a9177f2b7e37e0b6ee05ce0d57
  • Instruction Fuzzy Hash: A022DA22701681C6FB64DF35D440BBE77A2EB44B8CF6642269E4A67B9ADF38D801C340
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: a68bd124c6ec6cdd766a7890341b13d7b2e2c8873580eb3b537684fe02b98c4b
  • Instruction ID: 7a17de71b221f1342d3ee80484ad0e379cf91afe567e6c322f95c6e9101a4e29
  • Opcode Fuzzy Hash: a68bd124c6ec6cdd766a7890341b13d7b2e2c8873580eb3b537684fe02b98c4b
  • Instruction Fuzzy Hash: 3922C1323187C18AEB74AF25AC403ED37A5F74578CF44491A9A8A0BBD9DF36C681DB01
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: e7e0af15235c868a0dc6e32b63abcff88fdfae3149a850da9816f387f8dcf7e0
  • Instruction ID: 73fb53d49ec9b6c4aa76ff388a9879e4c033fe614980049716fe83b4a867de90
  • Opcode Fuzzy Hash: e7e0af15235c868a0dc6e32b63abcff88fdfae3149a850da9816f387f8dcf7e0
  • Instruction Fuzzy Hash: 24F19D3271964292FF689F25D9503ED63A5FB40B8CF4448178ACA47BD9EF3AD841E342
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: c1bfac3f4f665cda493c0f9279fd2e9d9b54eb2782428e57f85b3bf585eb31e4
  • Instruction ID: beed5f3257b859494d2ddef321aaa263fedb08d8400c2f85d7f5463dbe5bb7d7
  • Opcode Fuzzy Hash: c1bfac3f4f665cda493c0f9279fd2e9d9b54eb2782428e57f85b3bf585eb31e4
  • Instruction Fuzzy Hash: 91E17C77A283848EFB50CF65A150BAE7BB1E38978CF614214EA916BE4DD739C402CF00
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: c1bfac3f4f665cda493c0f9279fd2e9d9b54eb2782428e57f85b3bf585eb31e4
  • Instruction ID: c3f3ed0cd0aa2bdf248574650d467d238d827a5f5b20a971e72e337f5386b3d8
  • Opcode Fuzzy Hash: c1bfac3f4f665cda493c0f9279fd2e9d9b54eb2782428e57f85b3bf585eb31e4
  • Instruction Fuzzy Hash: 19E1BF73A282848EEB10DF69A5902EE7BB1F38A78CF544445EA856BF8DC735D442CF01
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: eafa93db8affc2acd5c2647060db7e72c7aa54e0deba0679f763eee4a553a23f
  • Instruction ID: 544b86d1d5508f5e4d8fd1d7061a5b8f660b18ecb2cff7a9efff4a6adb3b1651
  • Opcode Fuzzy Hash: eafa93db8affc2acd5c2647060db7e72c7aa54e0deba0679f763eee4a553a23f
  • Instruction Fuzzy Hash: F5B1BB32B04B80CBFB60CFB99550BAD77F1A784B8CF6646249E4967B89DB74C912C740
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 1dc573999a4a489040ee3d90808dca3b63cee57a8638242c92b7da4cb7b6b843
  • Instruction ID: 873b89c1441440456606a7a133dbb1026972dec4be9641b4dbbac489ba5d49bd
  • Opcode Fuzzy Hash: 1dc573999a4a489040ee3d90808dca3b63cee57a8638242c92b7da4cb7b6b843
  • Instruction Fuzzy Hash: 1AB1BE32709B828AFB20CF7999503ED77F1B748B8CF544856DE8967B89DA31C802E741
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 6810dc0806fbf3be3849a878c1d3b2cf35c7c6c2631d218b6b2266839d65108b
  • Instruction ID: 6ad78d9d9e3beb829426b9cd1acdae3bbda4a2d90a939f80084cdbdfb662395d
  • Opcode Fuzzy Hash: 6810dc0806fbf3be3849a878c1d3b2cf35c7c6c2631d218b6b2266839d65108b
  • Instruction Fuzzy Hash: C8A190B2721A40C7FB68DF29C550F6C73A1F744B88F268229DB5A83791DB35E9A1C700
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 5bbca2a66ea913d627b39250e4efa62feb7a4d560ef1894817cf344283eb5cb6
  • Instruction ID: 2fc652545db391cf16abcdbbf0f1ab53a96aa73dccac60848d809f005a5ffd00
  • Opcode Fuzzy Hash: 5bbca2a66ea913d627b39250e4efa62feb7a4d560ef1894817cf344283eb5cb6
  • Instruction Fuzzy Hash: 57B11672604B91C9FB10CF65E880B9D7BB0F789B8CFA54225EA8D97A59DF38C545CB00
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 139721b40f1e7df55d03e211bf99104f26b9bf6e8e547466ca31d28a7c18e22c
  • Instruction ID: 4fe089ef091ff9424234a0cb4d10dfc27c1c0b60ad9e700421d8d14ef5b79974
  • Opcode Fuzzy Hash: 139721b40f1e7df55d03e211bf99104f26b9bf6e8e547466ca31d28a7c18e22c
  • Instruction Fuzzy Hash: 8DB13B72608B8189EB10DF66EC802DD7BB4F78978CF944416EA8D97B98DF35C485DB01
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 5415d0cee7b52ba9f6e14514716308b70a6160731cec158b641d646adbbc0632
  • Instruction ID: 849ac46f27792df1590a62373768bb6693b8989988b967d9be62e0bff80b5b80
  • Opcode Fuzzy Hash: 5415d0cee7b52ba9f6e14514716308b70a6160731cec158b641d646adbbc0632
  • Instruction Fuzzy Hash: D271CF677287848ADB15CF39D090AAC7FB4F38AF88B5A9241DF9D5375ACA36C405C710
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000009.00000002.9770624450.000001673E9B0000.00000040.00000001.sdmp, Offset: 000001673E9B0000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_1673e9b0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: de03435933f17e5b8cddd10df6daf317a5b0202f989fccf81ae4220b9c4bc2a1
  • Instruction ID: 82b5e5e6c86e8672aa7d1026c2219eb9a6bda9057a7ec0eda847f291ccd294dc
  • Opcode Fuzzy Hash: de03435933f17e5b8cddd10df6daf317a5b0202f989fccf81ae4220b9c4bc2a1
  • Instruction Fuzzy Hash: 8B71BC67618B948ACB15CF39D4908AC7FB4F389F8874A9646DF9E537AACA22C405C710
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 3704 c0000ccd3c-c0000ccd3f 3705 c0000cd3a8 3704->3705 3706 c0000ccd45-c0000ccd81 3704->3706 3707 c0000ccdeb-c0000ccdfd 3706->3707 3708 c0000ccd83-c0000ccd97 3706->3708 3710 c0000cce83-c0000cceb7 3707->3710 3711 c0000cce03-c0000cce06 3707->3711 3708->3707 3709 c0000ccd99-c0000ccd9c 3708->3709 3709->3707 3715 c0000ccd9e-c0000ccda7 3709->3715 3713 c0000cceb9 3710->3713 3714 c0000cced1-c0000ccee2 call c0000b4f14 3710->3714 3711->3710 3712 c0000cce08-c0000cce11 3711->3712 3712->3712 3716 c0000cce13-c0000cce15 3712->3716 3717 c0000ccebc-c0000ccecf 3713->3717 3724 c0000ccf2e-c0000ccf32 3714->3724 3725 c0000ccee4-c0000ccf0d 3714->3725 3715->3715 3719 c0000ccda9-c0000ccdab 3715->3719 3716->3710 3720 c0000cce17-c0000cce25 call c0000bcfb8 3716->3720 3717->3714 3717->3717 3719->3707 3722 c0000ccdad-c0000ccde6 call c0000b59a8 call c0000b4f14 * 2 3719->3722 3735 c0000cce66-c0000cce69 3720->3735 3736 c0000cce27-c0000cce2e 3720->3736 3770 c0000cd388-c0000cd3a7 3722->3770 3731 c0000ccf84-c0000ccf87 3724->3731 3732 c0000ccf34-c0000ccf63 3724->3732 3728 c0000ccf0f 3725->3728 3729 c0000ccf25-c0000ccf29 3725->3729 3737 c0000ccf12-c0000ccf23 3728->3737 3738 c0000ccfd7-c0000ccfdb call c0000b4f14 3729->3738 3733 c0000ccf89-c0000ccfb8 3731->3733 3734 c0000ccfe0-c0000cd000 3731->3734 3740 c0000ccf7e-c0000ccf82 3732->3740 3741 c0000ccf65 3732->3741 3742 c0000ccfba 3733->3742 3743 c0000ccfd3 3733->3743 3746 c0000cd01d-c0000cd024 3734->3746 3747 c0000cd002-c0000cd009 3734->3747 3735->3710 3749 c0000cce6b-c0000cce81 call c0000b59a8 3735->3749 3736->3710 3745 c0000cce30-c0000cce4e call c0000b59a8 3736->3745 3737->3729 3737->3737 3738->3734 3740->3738 3750 c0000ccf68-c0000ccf7c 3741->3750 3751 c0000ccfbd-c0000ccfd1 3742->3751 3743->3738 3745->3770 3771 c0000cce54 3745->3771 3754 c0000cd026-c0000cd02d 3746->3754 3755 c0000cd041-c0000cd04b 3746->3755 3753 c0000cd019-c0000cd01b 3747->3753 3766 c0000cce5e-c0000cce61 3749->3766 3750->3740 3750->3750 3751->3743 3751->3751 3753->3746 3761 c0000cd00b-c0000cd00e 3753->3761 3762 c0000cd03d-c0000cd03f 3754->3762 3758 c0000cd04d-c0000cd05a 3755->3758 3759 c0000cd06e-c0000cd072 3755->3759 3767 c0000cd06a-c0000cd06c 3758->3767 3768 c0000cd0f8-c0000cd0fc 3759->3768 3769 c0000cd078-c0000cd07f 3759->3769 3761->3746 3772 c0000cd010-c0000cd016 3761->3772 3762->3755 3765 c0000cd02f-c0000cd032 3762->3765 3765->3755 3779 c0000cd034-c0000cd03a 3765->3779 3766->3770 3767->3759 3775 c0000cd05c-c0000cd05f 3767->3775 3773 c0000cd202-c0000cd205 3768->3773 3774 c0000cd102-c0000cd109 3768->3774 3776 c0000cd10b-c0000cd113 call c0000ccccc 3769->3776 3777 c0000cd085-c0000cd08f 3769->3777 3770->3705 3778 c0000cce57-c0000cce5c 3771->3778 3772->3753 3773->3759 3785 c0000cd20b-c0000cd212 3773->3785 3774->3776 3781 c0000cd118-c0000cd122 3774->3781 3775->3759 3780 c0000cd061-c0000cd067 3775->3780 3776->3759 3783 c0000cd354-c0000cd357 call c0000ccccc 3777->3783 3784 c0000cd095-c0000cd0a2 3777->3784 3778->3766 3778->3778 3779->3762 3780->3767 3781->3783 3790 c0000cd128-c0000cd135 3781->3790 3794 c0000cd35c-c0000cd366 3783->3794 3791 c0000cd0a9-c0000cd0b0 3784->3791 3792 c0000cd0a4-c0000cd0a7 3784->3792 3786 c0000cd25d-c0000cd273 call c0000ba448 3785->3786 3787 c0000cd214-c0000cd256 call c0000b95e0 call c0000bcfb8 call c0000bcee8 3785->3787 3810 c0000cd277-c0000cd27d 3786->3810 3787->3786 3833 c0000cd258-c0000cd25b 3787->3833 3796 c0000cd13c-c0000cd143 3790->3796 3797 c0000cd137-c0000cd13a 3790->3797 3791->3792 3799 c0000cd0b2-c0000cd0ba 3791->3799 3798 c0000cd0bd-c0000cd0c5 3792->3798 3801 c0000cd37f-c0000cd383 call c0000bcee8 3794->3801 3802 c0000cd368-c0000cd36b 3794->3802 3796->3797 3805 c0000cd145-c0000cd14d 3796->3805 3804 c0000cd150-c0000cd158 3797->3804 3798->3759 3806 c0000cd0c7-c0000cd0d0 3798->3806 3799->3798 3801->3770 3802->3801 3808 c0000cd36d-c0000cd376 3802->3808 3804->3759 3811 c0000cd15e-c0000cd167 3804->3811 3805->3804 3806->3759 3812 c0000cd0d2-c0000cd0db 3806->3812 3808->3808 3814 c0000cd378-c0000cd37a 3808->3814 3810->3783 3815 c0000cd283-c0000cd290 3810->3815 3816 c0000cd169-c0000cd172 3811->3816 3817 c0000cd174-c0000cd176 3811->3817 3812->3812 3818 c0000cd0dd-c0000cd0df 3812->3818 3814->3801 3822 c0000cd37c 3814->3822 3823 c0000cd297-c0000cd29e 3815->3823 3824 c0000cd292-c0000cd295 3815->3824 3816->3816 3816->3817 3817->3759 3820 c0000cd17c-c0000cd1b0 call c0000b4f14 call c0000bb218 3817->3820 3818->3759 3819 c0000cd0e1-c0000cd0f3 call c0000b4f14 3818->3819 3819->3794 3840 c0000cd324-c0000cd339 call c0000bcee8 3820->3840 3841 c0000cd1b6-c0000cd1b9 3820->3841 3822->3801 3823->3824 3829 c0000cd2a0-c0000cd2ab 3823->3829 3828 c0000cd2ae-c0000cd2b6 3824->3828 3828->3759 3830 c0000cd2bc-c0000cd2c5 3828->3830 3829->3828 3834 c0000cd2c7-c0000cd2d0 3830->3834 3835 c0000cd2d2-c0000cd2d4 3830->3835 3833->3810 3834->3834 3834->3835 3835->3759 3837 c0000cd2da-c0000cd30e call c0000b4f14 call c0000bb218 3835->3837 3837->3840 3850 c0000cd310-c0000cd313 3837->3850 3840->3759 3841->3840 3843 c0000cd1bf-c0000cd1c8 3841->3843 3843->3843 3846 c0000cd1ca-c0000cd1cc 3843->3846 3846->3840 3849 c0000cd1d2-c0000cd1fd call c0000b4f14 call c0000bcee8 3846->3849 3849->3794 3850->3840 3852 c0000cd315-c0000cd31e 3850->3852 3852->3852 3854 c0000cd320-c0000cd322 3852->3854 3854->3840 3856 c0000cd33e-c0000cd34b call c0000b4f14 3854->3856 3856->3783
Strings
Memory Dump Source
  • Source File: 00000009.00000002.9765385894.000000C0000B4000.00000004.00000001.sdmp, Offset: 000000C0000B4000, based on PE: true
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_9_2_c0000b4000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: "ulG$eUoG$pQuG$pSnK
  • API String ID: 0-2204601796
  • Opcode ID: 0277dc61248155910f18bfbff929d731adb5e516d9612a44ff7ae1c293a82f31
  • Instruction ID: 8dc03491963c5b4c34e4517c2c53cb765c20252b30760ca7c332963cdc23ffa2
  • Opcode Fuzzy Hash: 0277dc61248155910f18bfbff929d731adb5e516d9612a44ff7ae1c293a82f31
  • Instruction Fuzzy Hash: BB128972701780EAFB29CF24C150FAC37A1FB05748F66862ADB4927B99DB34D962D300
Uniqueness

Uniqueness Score: -1.00%