Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RPHSNqfBjbKzV.dll

Overview

General Information

Sample name:RPHSNqfBjbKzV.dll
Analysis ID:1502266
MD5:fda1dd36c546a292960d7d1b4514e4c2
SHA1:485cbb48e01a940387782d27a3ebcd48ce324fc5
SHA256:8160fedad806fe4e5a2dd8053e33c39236308c4e56c6a4043346b7f7a5d88684
Tags:dll
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Tries to harvest and steal browser information (history, passwords, etc)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 4488 cmdline: loaddll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 5096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2784 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7096 cmdline: rundll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5252 cmdline: rundll32.exe C:\Users\user\Desktop\RPHSNqfBjbKzV.dll,#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6428 cmdline: rundll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: RPHSNqfBjbKzV.dllAvira: detected
Source: RPHSNqfBjbKzV.dllVirustotal: Detection: 41%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: RPHSNqfBjbKzV.dllJoe Sandbox ML: detected
Source: RPHSNqfBjbKzV.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04B433B03_2_04B433B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_056333B04_2_056333B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04EC33B06_2_04EC33B0
Source: RPHSNqfBjbKzV.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: classification engineClassification label: mal68.spyw.winDLL@10/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5096:120:WilError_03
Source: RPHSNqfBjbKzV.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\RPHSNqfBjbKzV.dll,#1
Source: RPHSNqfBjbKzV.dllVirustotal: Detection: 41%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\RPHSNqfBjbKzV.dll,#1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\RPHSNqfBjbKzV.dll,#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: RPHSNqfBjbKzV.dllStatic file information: File size 6829568 > 1048576
Source: RPHSNqfBjbKzV.dllStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x5ec600
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04B43395 push ecx; ret 3_2_04B433A8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04B564F0 push eax; ret 3_2_04B5650E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_056464F0 push eax; ret 4_2_0564650E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05633395 push ecx; ret 4_2_056333A8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04ED64F0 push eax; ret 6_2_04ED650E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04EC3395 push ecx; ret 6_2_04EC33A8
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_3-1425
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 3.4 %
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 3.4 %
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 2.0 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_3-1426
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04B4422B _memset,IsDebuggerPresent,3_2_04B4422B
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04B4F0EF EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,3_2_04B4F0EF
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04B411A4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_04B411A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_056311A4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_056311A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04EC11A4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_04EC11A4
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: __IsNonwritableInCurrentImage,___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,__invoke_watson,3_2_04B433B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,3_2_04B42C29
Source: C:\Windows\SysWOW64\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,3_2_04B4E1C6
Source: C:\Windows\SysWOW64\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,4_2_0563E1C6
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,4_2_05632C29
Source: C:\Windows\SysWOW64\rundll32.exeCode function: __IsNonwritableInCurrentImage,___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,__invoke_watson,4_2_056333B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,6_2_04ECE1C6
Source: C:\Windows\SysWOW64\rundll32.exeCode function: __IsNonwritableInCurrentImage,___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,__invoke_watson,6_2_04EC33B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,6_2_04EC2C29

Stealing of Sensitive Information

barindex
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\MANIFEST-000001Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\webappsstore.sqliteJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\CURRENTJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.logJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
11
Process Injection
1
Rundll32
1
OS Credential Dumping
2
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Data from Local System
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS11
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1502266 Sample: RPHSNqfBjbKzV.dll Startdate: 31/08/2024 Architecture: WINDOWS Score: 68 20 Antivirus / Scanner detection for submitted sample 2->20 22 Multi AV Scanner detection for submitted file 2->22 24 Machine Learning detection for sample 2->24 26 AI detected suspicious sample 2->26 7 loaddll32.exe 1 2->7         started        process3 process4 9 rundll32.exe 7->9         started        12 cmd.exe 1 7->12         started        14 rundll32.exe 7->14         started        16 conhost.exe 7->16         started        signatures5 28 Tries to harvest and steal browser information (history, passwords, etc) 9->28 18 rundll32.exe 12->18         started        process6

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
RPHSNqfBjbKzV.dll42%VirustotalBrowse
RPHSNqfBjbKzV.dll100%AviraHEUR/AGEN.1300638
RPHSNqfBjbKzV.dll100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1502266
Start date and time:2024-08-31 22:02:09 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 14s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:RPHSNqfBjbKzV.dll
Detection:MAL
Classification:mal68.spyw.winDLL@10/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .dll
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Excluded domains from analysis (whitelisted): client.wns.windows.com
  • Not all processes where analyzed, report is missing behavior information
TimeTypeDescription
16:03:01API Interceptor1x Sleep call for process: loaddll32.exe modified
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Entropy (8bit):7.7927298785282595
TrID:
  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
  • Generic Win/DOS Executable (2004/3) 0.20%
  • DOS Executable Generic (2002/1) 0.20%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:RPHSNqfBjbKzV.dll
File size:6'829'568 bytes
MD5:fda1dd36c546a292960d7d1b4514e4c2
SHA1:485cbb48e01a940387782d27a3ebcd48ce324fc5
SHA256:8160fedad806fe4e5a2dd8053e33c39236308c4e56c6a4043346b7f7a5d88684
SHA512:900c93b5cc2edddaed36ea681ade81ab6b8b5d668f7f4ec5405da041456a665ce9145dce45082e473e846cd92bb020c3534a4addf289d6c40d198574cc383f28
SSDEEP:98304:QWfg5fRmhQ1orSk3GCK4J7vADNR6oXc0/8+x0bRtI4PPgbYhiLC9kEN6+/mu:zfEfiQ15M2aIDS0i+SRi4samC9bN9O
TLSH:ED662215A200C21AF5D21176355807BE80B83F3053A515CBBBD93B09AEF96D9ED37BA3
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............._..._..._..._..._..-_..._..,__.._Zv._..._..._+.._2.)_..._2.-_..._2.._..._2.._..._Rich..._........PE..L......a...........
Icon Hash:7ae282899bbab082
Entrypoint:0x10074c6c
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x10000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
DLL Characteristics:NX_COMPAT
Time Stamp:0x617FA0D6 [Mon Nov 1 08:09:58 2021 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:e26f062d8a4cdad75aed86099b07e435
Instruction
push ebp
mov ebp, esp
cmp dword ptr [ebp+0Ch], 01h
jne 00007FA924D3ECD7h
call 00007FA924D4B69Bh
push dword ptr [ebp+10h]
push dword ptr [ebp+0Ch]
push dword ptr [ebp+08h]
call 00007FA924D3ECDCh
add esp, 0Ch
pop ebp
retn 000Ch
push 0000000Ch
push 10092DF8h
call 00007FA924D4367Ah
xor eax, eax
inc eax
mov esi, dword ptr [ebp+0Ch]
test esi, esi
jne 00007FA924D3ECDEh
cmp dword ptr [106808FCh], esi
je 00007FA924D3EDBAh
and dword ptr [ebp-04h], 00000000h
cmp esi, 01h
je 00007FA924D3ECD7h
cmp esi, 02h
jne 00007FA924D3ED07h
mov ecx, dword ptr [10002C44h]
test ecx, ecx
je 00007FA924D3ECDEh
push dword ptr [ebp+10h]
push esi
push dword ptr [ebp+08h]
call ecx
mov dword ptr [ebp-1Ch], eax
test eax, eax
je 00007FA924D3ED87h
push dword ptr [ebp+10h]
push esi
push dword ptr [ebp+08h]
call 00007FA924D3EAE6h
mov dword ptr [ebp-1Ch], eax
test eax, eax
je 00007FA924D3ED70h
mov ebx, dword ptr [ebp+10h]
push ebx
push esi
push dword ptr [ebp+08h]
call 00007FA924D4B6B0h
mov edi, eax
mov dword ptr [ebp-1Ch], edi
cmp esi, 01h
jne 00007FA924D3ECFAh
test edi, edi
jne 00007FA924D3ECF6h
push ebx
push eax
push dword ptr [ebp+08h]
call 00007FA924D4B698h
push ebx
push edi
push dword ptr [ebp+08h]
call 00007FA924D3EAACh
mov eax, dword ptr [10002C44h]
test eax, eax
je 00007FA924D3ECD9h
push ebx
push edi
push dword ptr [ebp+08h]
call eax
Programming Language:
  • [ASM] VS2013 build 21005
  • [C++] VS2013 build 21005
  • [ C ] VS2013 build 21005
  • [C++] VS2013 UPD5 build 40629
  • [EXP] VS2013 UPD5 build 40629
  • [LNK] VS2013 UPD5 build 40629
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x933900x39.text
IMAGE_DIRECTORY_ENTRY_IMPORT0x68329c0x64.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x6850000x3530.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x82c80x40.text
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x6830000x29c.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x923c90x92400286e71ffa89687b1f1fdde465cafc4a4False0.4771016960470085data6.36255048499477IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x940000x5eea080x5ec6000c532256dd48ba2fa7e132858e6818fbunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x6830000x11260x120093e2393326b84eb4a55c28b7a4fa258bFalse0.4474826388888889data5.399566335836943IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x6850000x35300x360028d655c078bfe08bf684b306c9e9c85aFalse0.7255497685185185data6.55019272587033IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
DLLImport
KERNEL32.dllGetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCurrentProcessId, QueryPerformanceCounter, SetFilePointerEx, ReadFile, GetConsoleMode, GetConsoleCP, WriteFile, CloseHandle, GetFileType, SetStdHandle, GetOEMCP, IsValidCodePage, IsDebuggerPresent, GetProcessHeap, HeapSize, AreFileApisANSI, GetModuleHandleExW, ExitProcess, EnumSystemLocalesW, GetUserDefaultLCID, LCMapStringW, CompareStringW, IsProcessorFeaturePresent, WriteConsoleW, ReadConsoleW, WaitForSingleObject, GetExitCodeProcess, GetFileAttributesExW, OutputDebugStringW, CreateFileW, SetEnvironmentVariableA, ExpandEnvironmentStringsW, LocalFree, TlsAlloc, DeleteCriticalSection, GetModuleFileNameA, EnterCriticalSection, FindFirstFileA, FlushFileBuffers, GetACP, MulDiv, GetEnvironmentVariableW, GetSystemTimeAdjustment, InitializeCriticalSectionAndSpinCount, ClearCommBreak, ExpandEnvironmentStringsA, GetCurrentThread, GetTickCount, ConnectNamedPipe, GetCurrentProcess, GetCommState, VirtualQuery, SetLastError, CreateProcessA, GetLocaleInfoW, IsValidLocale, WideCharToMultiByte, LoadLibraryExW, GetLocaleInfoA, GetStdHandle, LeaveCriticalSection, EncodePointer, DecodePointer, MultiByteToWideChar, GetStringTypeW, GetLastError, HeapReAlloc, GetSystemTimeAsFileTime, RaiseException, RtlUnwind, HeapFree, GetCommandLineA, GetCurrentThreadId, GetCPInfo, HeapAlloc, UnhandledExceptionFilter, SetUnhandledExceptionFilter, Sleep, TerminateProcess, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetModuleHandleW, GetProcAddress, SetEndOfFile
USER32.dllEndPaint, GetMessageA, IsIconic, LoadStringA, GetWindowInfo, SetFocus, CreateIconIndirect, WaitMessage, GetCapture, GetWindowTextA, UnionRect, PeekMessageA, EndDialog, DefWindowProcA, CheckDlgButton, MessageBoxW, ReleaseCapture, GetSystemMetrics, ToUnicode, TranslateMDISysAccel, SetCursor, DestroyAcceleratorTable, MapDialogRect, SetKeyboardState, SetParent, CreateMenu, GetDC, CheckMenuRadioItem, GetScrollInfo, SystemParametersInfoW, GetDlgItem, GetDesktopWindow, GetSysColor, InsertMenuA, GetDlgItemTextA, DestroyIcon, CheckMenuItem, GetMessageTime, IsRectEmpty
GDI32.dllExtCreatePen, Arc, GdiFlush, CreateHalftonePalette, GetRgnBox, SetPixel, CreateBitmap, GetPaletteEntries, CreateCompatibleDC, SetPolyFillMode, StretchDIBits, GetNearestPaletteIndex, RoundRect, CreateDIBitmap, RestoreDC, SetViewportOrgEx, SetWindowExtEx, Polygon, CreateRectRgnIndirect, Ellipse, GetTextExtentPointW, GetCharWidth32A, GetCharABCWidthsFloatA, Polyline, SetViewportExtEx, GetPixel, CloseEnhMetaFile, CreateSolidBrush, SaveDC
ADVAPI32.dllGetLengthSid, LookupPrivilegeValueW, SetSecurityDescriptorDacl, GetUserNameA, RegOpenKeyExW, AllocateAndInitializeSid
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:16:02:58
Start date:31/08/2024
Path:C:\Windows\System32\loaddll32.exe
Wow64 process (32bit):true
Commandline:loaddll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll"
Imagebase:0xf0000
File size:126'464 bytes
MD5 hash:51E6071F9CBA48E79F10C84515AAE618
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:1
Start time:16:02:58
Start date:31/08/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff66e660000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:2
Start time:16:02:58
Start date:31/08/2024
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll",#1
Imagebase:0x1c0000
File size:236'544 bytes
MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:3
Start time:16:02:58
Start date:31/08/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\RPHSNqfBjbKzV.dll,#1
Imagebase:0x450000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:4
Start time:16:02:58
Start date:31/08/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll",#1
Imagebase:0x450000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:6
Start time:16:03:01
Start date:31/08/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\RPHSNqfBjbKzV.dll",#1
Imagebase:0x450000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:1.4%
    Dynamic/Decrypted Code Coverage:100%
    Signature Coverage:14.1%
    Total number of Nodes:626
    Total number of Limit Nodes:7
    execution_graph 1263 4b393e2 1264 4b3945d 1263->1264 1272 4b393ee 1263->1272 1265 4b441f8 __calloc_impl DecodePointer 1264->1265 1266 4b39463 1265->1266 1268 4b38edb _free 57 API calls 1266->1268 1279 4b39455 1268->1279 1269 4b39421 RtlAllocateHeap 1269->1272 1269->1279 1271 4b39449 1324 4b38edb 1271->1324 1272->1269 1272->1271 1276 4b39447 1272->1276 1277 4b393f9 1272->1277 1322 4b441f8 DecodePointer 1272->1322 1278 4b38edb _free 57 API calls 1276->1278 1277->1272 1280 4b46a3a 1277->1280 1289 4b46a97 1277->1289 1319 4b42f67 1277->1319 1278->1279 1327 4b4f0af 1280->1327 1282 4b46a41 1284 4b4f0af __FF_MSGBANNER 58 API calls 1282->1284 1285 4b46a4e 1282->1285 1283 4b46a97 __NMSG_WRITE 58 API calls 1286 4b46a66 1283->1286 1284->1285 1285->1283 1287 4b46a70 1285->1287 1288 4b46a97 __NMSG_WRITE 58 API calls 1286->1288 1287->1277 1288->1287 1290 4b46ab5 __NMSG_WRITE 1289->1290 1292 4b4f0af __FF_MSGBANNER 55 API calls 1290->1292 1318 4b46bdc 1290->1318 1291 4b3e753 __call_reportfault 6 API calls 1294 4b46c45 1291->1294 1293 4b46ac8 1292->1293 1295 4b46be1 GetStdHandle 1293->1295 1296 4b4f0af __FF_MSGBANNER 55 API calls 1293->1296 1294->1277 1299 4b46bef 1295->1299 1295->1318 1297 4b46ad9 1296->1297 1297->1295 1298 4b46aeb 1297->1298 1298->1318 1373 4b4d3d6 1298->1373 1301 4b46c28 WriteFile 1299->1301 1299->1318 1301->1318 1303 4b46b18 GetModuleFileNameW 1305 4b46b38 1303->1305 1310 4b46b48 __NMSG_WRITE 1303->1310 1304 4b46c49 1306 4b44398 __invoke_watson 8 API calls 1304->1306 1307 4b4d3d6 __NMSG_WRITE 55 API calls 1305->1307 1308 4b46c53 1306->1308 1307->1310 1310->1304 1313 4b46b8e 1310->1313 1382 4b4eff1 1310->1382 1313->1304 1391 4b4ef85 1313->1391 1314 4b4ef85 __NMSG_WRITE 55 API calls 1315 4b46bc5 1314->1315 1315->1304 1316 4b46bcc 1315->1316 1400 4b4f0ef EncodePointer 1316->1400 1318->1291 1425 4b42f33 GetModuleHandleExW 1319->1425 1323 4b4420b 1322->1323 1323->1272 1428 4b44546 GetLastError 1324->1428 1326 4b38ee0 1326->1276 1328 4b4f0b9 1327->1328 1329 4b4f0c3 1328->1329 1330 4b38edb _free 58 API calls 1328->1330 1329->1282 1331 4b4f0df 1330->1331 1334 4b44388 1331->1334 1337 4b4435d DecodePointer 1334->1337 1338 4b44370 1337->1338 1343 4b44398 IsProcessorFeaturePresent 1338->1343 1341 4b4435d __NMSG_WRITE 8 API calls 1342 4b44394 1341->1342 1342->1282 1344 4b443a3 1343->1344 1349 4b4422b 1344->1349 1348 4b44387 1348->1341 1350 4b44245 _memset __call_reportfault 1349->1350 1351 4b44265 IsDebuggerPresent 1350->1351 1357 4b411a4 SetUnhandledExceptionFilter UnhandledExceptionFilter 1351->1357 1354 4b44329 __call_reportfault 1358 4b3e753 1354->1358 1355 4b4434c 1356 4b4118f GetCurrentProcess TerminateProcess 1355->1356 1356->1348 1357->1354 1359 4b3e75b 1358->1359 1360 4b3e75d IsProcessorFeaturePresent 1358->1360 1359->1355 1362 4b4bb3e 1360->1362 1365 4b4baed IsDebuggerPresent 1362->1365 1366 4b4bb02 __call_reportfault 1365->1366 1371 4b411a4 SetUnhandledExceptionFilter UnhandledExceptionFilter 1366->1371 1368 4b4bb0a __call_reportfault 1372 4b4118f GetCurrentProcess TerminateProcess 1368->1372 1370 4b4bb27 1370->1355 1371->1368 1372->1370 1374 4b4d3ef 1373->1374 1375 4b4d3e1 1373->1375 1376 4b38edb _free 58 API calls 1374->1376 1375->1374 1380 4b4d408 1375->1380 1377 4b4d3f9 1376->1377 1378 4b44388 __NMSG_WRITE 9 API calls 1377->1378 1379 4b46b0b 1378->1379 1379->1303 1379->1304 1380->1379 1381 4b38edb _free 58 API calls 1380->1381 1381->1377 1386 4b4efff 1382->1386 1383 4b4f003 1384 4b4f008 1383->1384 1385 4b38edb _free 58 API calls 1383->1385 1384->1313 1387 4b4f033 1385->1387 1386->1383 1386->1384 1389 4b4f042 1386->1389 1388 4b44388 __NMSG_WRITE 9 API calls 1387->1388 1388->1384 1389->1384 1390 4b38edb _free 58 API calls 1389->1390 1390->1387 1392 4b4ef9f 1391->1392 1395 4b4ef91 1391->1395 1393 4b38edb _free 58 API calls 1392->1393 1394 4b4efa9 1393->1394 1396 4b44388 __NMSG_WRITE 9 API calls 1394->1396 1395->1392 1398 4b4efcb 1395->1398 1397 4b46bae 1396->1397 1397->1304 1397->1314 1398->1397 1399 4b38edb _free 58 API calls 1398->1399 1399->1394 1401 4b4f123 ___crtIsPackagedApp 1400->1401 1402 4b4f1e2 IsDebuggerPresent 1401->1402 1403 4b4f132 LoadLibraryExW 1401->1403 1404 4b4f207 1402->1404 1405 4b4f1ec 1402->1405 1406 4b4f16f GetProcAddress 1403->1406 1407 4b4f149 GetLastError 1403->1407 1411 4b4f1fa 1404->1411 1412 4b4f20c DecodePointer 1404->1412 1410 4b4f1f3 OutputDebugStringW 1405->1410 1405->1411 1409 4b4f183 7 API calls 1406->1409 1415 4b4f1ff 1406->1415 1408 4b4f158 LoadLibraryExW 1407->1408 1407->1415 1408->1406 1408->1415 1413 4b4f1df 1409->1413 1414 4b4f1cb GetProcAddress EncodePointer 1409->1414 1410->1411 1411->1415 1419 4b4f233 DecodePointer DecodePointer 1411->1419 1423 4b4f24b 1411->1423 1412->1415 1413->1402 1414->1413 1416 4b3e753 __call_reportfault 6 API calls 1415->1416 1421 4b4f2d1 1416->1421 1417 4b4f26f DecodePointer 1417->1415 1418 4b4f283 DecodePointer 1418->1417 1422 4b4f28a 1418->1422 1419->1423 1421->1318 1422->1417 1424 4b4f29b DecodePointer 1422->1424 1423->1417 1423->1418 1424->1417 1426 4b42f5e ExitProcess 1425->1426 1427 4b42f4c GetProcAddress 1425->1427 1427->1426 1442 4b40e47 1428->1442 1430 4b4455b 1431 4b445a9 SetLastError 1430->1431 1445 4b40897 1430->1445 1431->1326 1435 4b44582 1436 4b445a0 1435->1436 1437 4b44588 1435->1437 1463 4b38bc4 1436->1463 1453 4b445b5 1437->1453 1440 4b44590 GetCurrentThreadId 1440->1431 1441 4b445a6 1441->1431 1443 4b40e5e TlsGetValue 1442->1443 1444 4b40e5a 1442->1444 1443->1430 1444->1430 1449 4b4089e 1445->1449 1447 4b408d9 1447->1431 1450 4b40e66 1447->1450 1449->1447 1469 4b4b30e 1449->1469 1477 4b41181 Sleep 1449->1477 1451 4b40e80 TlsSetValue 1450->1451 1452 4b40e7c 1450->1452 1451->1435 1452->1435 1454 4b445c1 __initptd 1453->1454 1478 4b3f65a 1454->1478 1456 4b445fe 1485 4b44656 1456->1485 1459 4b3f65a __initptd 58 API calls 1460 4b4461f ___addlocaleref 1459->1460 1488 4b4465f 1460->1488 1462 4b4464a __initptd 1462->1440 1464 4b38bf6 _free 1463->1464 1465 4b38bcd RtlFreeHeap 1463->1465 1464->1441 1465->1464 1466 4b38be2 1465->1466 1467 4b38edb _free 56 API calls 1466->1467 1468 4b38be8 GetLastError 1467->1468 1468->1464 1470 4b4b319 1469->1470 1475 4b4b334 1469->1475 1471 4b4b325 1470->1471 1470->1475 1472 4b38edb _free 57 API calls 1471->1472 1474 4b4b32a 1472->1474 1473 4b4b344 HeapAlloc 1473->1474 1473->1475 1474->1449 1475->1473 1475->1474 1476 4b441f8 __calloc_impl DecodePointer 1475->1476 1476->1475 1477->1449 1479 4b3f66b 1478->1479 1480 4b3f67e EnterCriticalSection 1478->1480 1491 4b3f6e2 1479->1491 1480->1456 1482 4b3f671 1482->1480 1513 4b4308a 1482->1513 1582 4b3f7c4 LeaveCriticalSection 1485->1582 1487 4b44618 1487->1459 1583 4b3f7c4 LeaveCriticalSection 1488->1583 1490 4b44666 1490->1462 1492 4b3f6ee __initptd 1491->1492 1493 4b3f70d 1492->1493 1494 4b46a3a __FF_MSGBANNER 58 API calls 1492->1494 1502 4b3f730 __initptd 1493->1502 1522 4b408df 1493->1522 1495 4b3f6fc 1494->1495 1497 4b46a97 __NMSG_WRITE 58 API calls 1495->1497 1499 4b3f703 1497->1499 1503 4b42f67 _malloc 3 API calls 1499->1503 1500 4b3f72b 1504 4b38edb _free 58 API calls 1500->1504 1501 4b3f73a 1505 4b3f65a __initptd 58 API calls 1501->1505 1502->1482 1503->1493 1504->1502 1506 4b3f741 1505->1506 1507 4b3f766 1506->1507 1508 4b3f74e 1506->1508 1510 4b38bc4 _free 58 API calls 1507->1510 1527 4b40e88 1508->1527 1511 4b3f75a 1510->1511 1530 4b3f782 1511->1530 1514 4b46a3a __FF_MSGBANNER 58 API calls 1513->1514 1515 4b43092 1514->1515 1516 4b46a97 __NMSG_WRITE 58 API calls 1515->1516 1517 4b4309a 1516->1517 1552 4b43139 1517->1552 1521 4b3f67d 1521->1480 1524 4b408ed 1522->1524 1525 4b3f724 1524->1525 1533 4b393e2 1524->1533 1550 4b41181 Sleep 1524->1550 1525->1500 1525->1501 1528 4b40ea5 InitializeCriticalSectionAndSpinCount 1527->1528 1529 4b40e98 1527->1529 1528->1511 1529->1511 1551 4b3f7c4 LeaveCriticalSection 1530->1551 1532 4b3f789 1532->1502 1534 4b3945d 1533->1534 1542 4b393ee 1533->1542 1535 4b441f8 __calloc_impl DecodePointer 1534->1535 1536 4b39463 1535->1536 1538 4b38edb _free 57 API calls 1536->1538 1537 4b46a3a __FF_MSGBANNER 57 API calls 1547 4b393f9 1537->1547 1549 4b39455 1538->1549 1539 4b39421 RtlAllocateHeap 1539->1542 1539->1549 1540 4b46a97 __NMSG_WRITE 57 API calls 1540->1547 1541 4b39449 1544 4b38edb _free 57 API calls 1541->1544 1542->1539 1542->1541 1543 4b441f8 __calloc_impl DecodePointer 1542->1543 1546 4b39447 1542->1546 1542->1547 1543->1542 1544->1546 1545 4b42f67 _malloc 3 API calls 1545->1547 1548 4b38edb _free 57 API calls 1546->1548 1547->1537 1547->1540 1547->1542 1547->1545 1548->1549 1549->1524 1550->1524 1551->1532 1553 4b431ef _doexit 58 API calls 1552->1553 1554 4b430a5 1553->1554 1555 4b431ef 1554->1555 1556 4b431fb __initptd 1555->1556 1557 4b3f65a __initptd 51 API calls 1556->1557 1558 4b43202 1557->1558 1559 4b432bb __initterm 1558->1559 1560 4b43230 DecodePointer 1558->1560 1575 4b43309 1559->1575 1560->1559 1562 4b43247 DecodePointer 1560->1562 1564 4b43257 1562->1564 1564->1559 1567 4b43264 EncodePointer 1564->1567 1572 4b43274 DecodePointer EncodePointer 1564->1572 1566 4b43318 __initptd 1566->1521 1567->1564 1568 4b43300 1569 4b43309 1568->1569 1570 4b42f67 _malloc 3 API calls 1568->1570 1571 4b43316 1569->1571 1580 4b3f7c4 LeaveCriticalSection 1569->1580 1570->1569 1571->1521 1574 4b43286 DecodePointer DecodePointer 1572->1574 1574->1564 1576 4b432e9 1575->1576 1577 4b4330f 1575->1577 1576->1566 1579 4b3f7c4 LeaveCriticalSection 1576->1579 1581 4b3f7c4 LeaveCriticalSection 1577->1581 1579->1568 1580->1571 1581->1576 1582->1487 1583->1490 1590 4b433b0 1591 4b433e7 1590->1591 1592 4b433da 1590->1592 1594 4b3e753 __call_reportfault 6 API calls 1591->1594 1593 4b3e753 __call_reportfault 6 API calls 1592->1593 1593->1591 1596 4b433f7 __except_handler4 1594->1596 1595 4b4350f 1596->1595 1597 4b434c4 __except_handler4 1596->1597 1602 4b4344e __IsNonwritableInCurrentImage 1596->1602 1597->1595 1598 4b434ff 1597->1598 1599 4b3e753 __call_reportfault 6 API calls 1597->1599 1600 4b3e753 __call_reportfault 6 API calls 1598->1600 1599->1598 1600->1595 1645 4b47492 RtlUnwind 1602->1645 1603 4b43526 1605 4b3e753 __call_reportfault 6 API calls 1603->1605 1604 4b4348c __except_handler4 1604->1603 1606 4b3e753 __call_reportfault 6 API calls 1604->1606 1607 4b43536 __except_handler4 1605->1607 1606->1603 1608 4b43681 1607->1608 1609 4b4357b 1607->1609 1610 4b436d4 1608->1610 1611 4b43686 1608->1611 1646 4b4e1c6 1609->1646 1615 4b42c29 __crtGetLocaleInfoA_stat GetLocaleInfoW 1610->1615 1628 4b4363c 1610->1628 1660 4b42c29 1611->1660 1615->1628 1616 4b43695 1621 4b40897 __calloc_crt 58 API calls 1616->1621 1636 4b436be 1616->1636 1617 4b435a8 GetLastError 1618 4b435b7 1617->1618 1617->1628 1622 4b4e1c6 ___crtGetLocaleInfoA 60 API calls 1618->1622 1619 4b3e753 __call_reportfault 6 API calls 1623 4b4364d 1619->1623 1620 4b40897 __calloc_crt 58 API calls 1625 4b43624 1620->1625 1626 4b436a6 1621->1626 1627 4b435cd 1622->1627 1624 4b38bc4 _free 58 API calls 1624->1628 1629 4b43651 1625->1629 1630 4b4362e 1625->1630 1632 4b42c29 __crtGetLocaleInfoA_stat GetLocaleInfoW 1626->1632 1626->1636 1627->1628 1633 4b40897 __calloc_crt 58 API calls 1627->1633 1628->1619 1651 4b4e03e 1629->1651 1630->1628 1635 4b38bc4 _free 58 API calls 1630->1635 1632->1636 1637 4b435e2 1633->1637 1635->1628 1636->1624 1636->1628 1637->1628 1642 4b4e1c6 ___crtGetLocaleInfoA 60 API calls 1637->1642 1638 4b43712 1640 4b44398 __invoke_watson 8 API calls 1638->1640 1639 4b4366e 1639->1628 1643 4b38bc4 _free 58 API calls 1639->1643 1641 4b4371c 1640->1641 1644 4b4360f 1642->1644 1643->1628 1644->1620 1644->1630 1645->1604 1664 4b3ca16 1646->1664 1654 4b4e04c 1651->1654 1652 4b4e050 1653 4b38edb _free 58 API calls 1652->1653 1655 4b43663 1652->1655 1659 4b4e07b 1653->1659 1654->1652 1654->1655 1656 4b4e08a 1654->1656 1655->1638 1655->1639 1656->1655 1658 4b38edb _free 58 API calls 1656->1658 1657 4b44388 __NMSG_WRITE 9 API calls 1657->1655 1658->1659 1659->1657 1661 4b42c45 1660->1661 1662 4b42c49 __crtGetLocaleInfoA_stat 1660->1662 1661->1616 1663 4b42c4e GetLocaleInfoW 1662->1663 1663->1616 1665 4b3ca27 1664->1665 1671 4b3ca74 1664->1671 1685 4b4452e 1665->1685 1668 4b3ca54 1668->1671 1705 4b49b58 1668->1705 1672 4b4e0e2 1671->1672 1673 4b42c29 __crtGetLocaleInfoA_stat GetLocaleInfoW 1672->1673 1676 4b4e10e 1673->1676 1674 4b4e144 __crtGetLocaleInfoA_stat 1678 4b42c29 __crtGetLocaleInfoA_stat GetLocaleInfoW 1674->1678 1684 4b4e117 1674->1684 1675 4b3e753 __call_reportfault 6 API calls 1677 4b4359b 1675->1677 1676->1674 1679 4b393e2 _malloc 58 API calls 1676->1679 1676->1684 1677->1617 1677->1644 1680 4b4e182 1678->1680 1679->1674 1681 4b4e1a9 1680->1681 1683 4b4e19a WideCharToMultiByte 1680->1683 1975 4b40879 1681->1975 1683->1681 1684->1675 1686 4b44546 __getptd_noexit 58 API calls 1685->1686 1687 4b44534 1686->1687 1688 4b3ca2d 1687->1688 1689 4b4308a __initptd 58 API calls 1687->1689 1688->1668 1690 4b46ee3 1688->1690 1689->1688 1691 4b46eef __initptd 1690->1691 1692 4b4452e _LocaleUpdate::_LocaleUpdate 58 API calls 1691->1692 1693 4b46ef8 1692->1693 1694 4b46f27 1693->1694 1696 4b46f0b 1693->1696 1695 4b3f65a __initptd 58 API calls 1694->1695 1698 4b46f2e 1695->1698 1697 4b4452e _LocaleUpdate::_LocaleUpdate 58 API calls 1696->1697 1699 4b46f10 1697->1699 1717 4b46f63 1698->1717 1702 4b46f1e __initptd 1699->1702 1704 4b4308a __initptd 58 API calls 1699->1704 1702->1668 1704->1702 1706 4b49b64 __initptd 1705->1706 1707 4b4452e _LocaleUpdate::_LocaleUpdate 58 API calls 1706->1707 1708 4b49b6e 1707->1708 1709 4b3f65a __initptd 58 API calls 1708->1709 1715 4b49b80 1708->1715 1710 4b49b9e 1709->1710 1711 4b49bcb 1710->1711 1716 4b38bc4 _free 58 API calls 1710->1716 1971 4b49bf5 1711->1971 1713 4b4308a __initptd 58 API calls 1714 4b49b8e __initptd 1713->1714 1714->1671 1715->1713 1715->1714 1716->1711 1718 4b46f6e ___addlocaleref ___removelocaleref 1717->1718 1720 4b46f42 1717->1720 1718->1720 1724 4b46ce9 1718->1724 1721 4b46f5a 1720->1721 1970 4b3f7c4 LeaveCriticalSection 1721->1970 1723 4b46f61 1723->1699 1725 4b46d62 1724->1725 1727 4b46cfe 1724->1727 1726 4b38bc4 _free 58 API calls 1725->1726 1728 4b46daf 1725->1728 1729 4b46d83 1726->1729 1727->1725 1735 4b46d2f 1727->1735 1737 4b38bc4 _free 58 API calls 1727->1737 1743 4b46dd8 1728->1743 1794 4b4f9df 1728->1794 1731 4b38bc4 _free 58 API calls 1729->1731 1734 4b46d96 1731->1734 1733 4b46e37 1739 4b38bc4 _free 58 API calls 1733->1739 1740 4b38bc4 _free 58 API calls 1734->1740 1741 4b38bc4 _free 58 API calls 1735->1741 1753 4b46d4d 1735->1753 1736 4b38bc4 _free 58 API calls 1742 4b46d57 1736->1742 1744 4b46d24 1737->1744 1738 4b38bc4 _free 58 API calls 1738->1743 1746 4b46e3d 1739->1746 1747 4b46da4 1740->1747 1748 4b46d42 1741->1748 1749 4b38bc4 _free 58 API calls 1742->1749 1743->1733 1751 4b38bc4 58 API calls _free 1743->1751 1754 4b4f2d5 1744->1754 1746->1720 1750 4b38bc4 _free 58 API calls 1747->1750 1782 4b4f772 1748->1782 1749->1725 1750->1728 1751->1743 1753->1736 1755 4b4f2e4 1754->1755 1781 4b4f3cd 1754->1781 1756 4b4f2f5 1755->1756 1757 4b38bc4 _free 58 API calls 1755->1757 1758 4b4f307 1756->1758 1759 4b38bc4 _free 58 API calls 1756->1759 1757->1756 1760 4b38bc4 _free 58 API calls 1758->1760 1763 4b4f319 1758->1763 1759->1758 1760->1763 1761 4b4f32b 1762 4b4f33d 1761->1762 1765 4b38bc4 _free 58 API calls 1761->1765 1766 4b4f34f 1762->1766 1767 4b38bc4 _free 58 API calls 1762->1767 1763->1761 1764 4b38bc4 _free 58 API calls 1763->1764 1764->1761 1765->1762 1768 4b4f361 1766->1768 1769 4b38bc4 _free 58 API calls 1766->1769 1767->1766 1770 4b4f373 1768->1770 1772 4b38bc4 _free 58 API calls 1768->1772 1769->1768 1771 4b4f385 1770->1771 1773 4b38bc4 _free 58 API calls 1770->1773 1774 4b4f397 1771->1774 1775 4b38bc4 _free 58 API calls 1771->1775 1772->1770 1773->1771 1776 4b4f3a9 1774->1776 1777 4b38bc4 _free 58 API calls 1774->1777 1775->1774 1778 4b4f3bb 1776->1778 1779 4b38bc4 _free 58 API calls 1776->1779 1777->1776 1780 4b38bc4 _free 58 API calls 1778->1780 1778->1781 1779->1778 1780->1781 1781->1735 1783 4b4f77d 1782->1783 1793 4b4f7d5 1782->1793 1784 4b4f78d 1783->1784 1785 4b38bc4 _free 58 API calls 1783->1785 1786 4b4f79f 1784->1786 1787 4b38bc4 _free 58 API calls 1784->1787 1785->1784 1788 4b4f7b1 1786->1788 1789 4b38bc4 _free 58 API calls 1786->1789 1787->1786 1790 4b38bc4 _free 58 API calls 1788->1790 1791 4b4f7c3 1788->1791 1789->1788 1790->1791 1792 4b38bc4 _free 58 API calls 1791->1792 1791->1793 1792->1793 1793->1753 1795 4b4f9ee 1794->1795 1969 4b46dcd 1794->1969 1796 4b38bc4 _free 58 API calls 1795->1796 1797 4b4f9f6 1796->1797 1798 4b38bc4 _free 58 API calls 1797->1798 1799 4b4f9fe 1798->1799 1800 4b38bc4 _free 58 API calls 1799->1800 1801 4b4fa06 1800->1801 1802 4b38bc4 _free 58 API calls 1801->1802 1803 4b4fa0e 1802->1803 1804 4b38bc4 _free 58 API calls 1803->1804 1805 4b4fa16 1804->1805 1806 4b38bc4 _free 58 API calls 1805->1806 1807 4b4fa1e 1806->1807 1808 4b38bc4 _free 58 API calls 1807->1808 1809 4b4fa25 1808->1809 1810 4b38bc4 _free 58 API calls 1809->1810 1811 4b4fa2d 1810->1811 1812 4b38bc4 _free 58 API calls 1811->1812 1813 4b4fa35 1812->1813 1814 4b38bc4 _free 58 API calls 1813->1814 1815 4b4fa3d 1814->1815 1816 4b38bc4 _free 58 API calls 1815->1816 1817 4b4fa45 1816->1817 1818 4b38bc4 _free 58 API calls 1817->1818 1819 4b4fa4d 1818->1819 1820 4b38bc4 _free 58 API calls 1819->1820 1821 4b4fa55 1820->1821 1822 4b38bc4 _free 58 API calls 1821->1822 1823 4b4fa5d 1822->1823 1824 4b38bc4 _free 58 API calls 1823->1824 1825 4b4fa65 1824->1825 1826 4b38bc4 _free 58 API calls 1825->1826 1827 4b4fa6d 1826->1827 1828 4b38bc4 _free 58 API calls 1827->1828 1829 4b4fa78 1828->1829 1830 4b38bc4 _free 58 API calls 1829->1830 1831 4b4fa80 1830->1831 1832 4b38bc4 _free 58 API calls 1831->1832 1833 4b4fa88 1832->1833 1834 4b38bc4 _free 58 API calls 1833->1834 1835 4b4fa90 1834->1835 1836 4b38bc4 _free 58 API calls 1835->1836 1837 4b4fa98 1836->1837 1838 4b38bc4 _free 58 API calls 1837->1838 1839 4b4faa0 1838->1839 1840 4b38bc4 _free 58 API calls 1839->1840 1841 4b4faa8 1840->1841 1842 4b38bc4 _free 58 API calls 1841->1842 1843 4b4fab0 1842->1843 1844 4b38bc4 _free 58 API calls 1843->1844 1845 4b4fab8 1844->1845 1846 4b38bc4 _free 58 API calls 1845->1846 1847 4b4fac0 1846->1847 1848 4b38bc4 _free 58 API calls 1847->1848 1849 4b4fac8 1848->1849 1850 4b38bc4 _free 58 API calls 1849->1850 1851 4b4fad0 1850->1851 1852 4b38bc4 _free 58 API calls 1851->1852 1853 4b4fad8 1852->1853 1854 4b38bc4 _free 58 API calls 1853->1854 1855 4b4fae0 1854->1855 1856 4b38bc4 _free 58 API calls 1855->1856 1857 4b4fae8 1856->1857 1858 4b38bc4 _free 58 API calls 1857->1858 1859 4b4faf0 1858->1859 1860 4b38bc4 _free 58 API calls 1859->1860 1861 4b4fafe 1860->1861 1862 4b38bc4 _free 58 API calls 1861->1862 1863 4b4fb09 1862->1863 1864 4b38bc4 _free 58 API calls 1863->1864 1865 4b4fb14 1864->1865 1866 4b38bc4 _free 58 API calls 1865->1866 1867 4b4fb1f 1866->1867 1868 4b38bc4 _free 58 API calls 1867->1868 1869 4b4fb2a 1868->1869 1870 4b38bc4 _free 58 API calls 1869->1870 1871 4b4fb35 1870->1871 1872 4b38bc4 _free 58 API calls 1871->1872 1873 4b4fb40 1872->1873 1874 4b38bc4 _free 58 API calls 1873->1874 1875 4b4fb4b 1874->1875 1876 4b38bc4 _free 58 API calls 1875->1876 1877 4b4fb56 1876->1877 1878 4b38bc4 _free 58 API calls 1877->1878 1879 4b4fb61 1878->1879 1880 4b38bc4 _free 58 API calls 1879->1880 1881 4b4fb6c 1880->1881 1882 4b38bc4 _free 58 API calls 1881->1882 1883 4b4fb77 1882->1883 1884 4b38bc4 _free 58 API calls 1883->1884 1885 4b4fb82 1884->1885 1886 4b38bc4 _free 58 API calls 1885->1886 1887 4b4fb8d 1886->1887 1888 4b38bc4 _free 58 API calls 1887->1888 1889 4b4fb98 1888->1889 1890 4b38bc4 _free 58 API calls 1889->1890 1891 4b4fba3 1890->1891 1892 4b38bc4 _free 58 API calls 1891->1892 1893 4b4fbb1 1892->1893 1894 4b38bc4 _free 58 API calls 1893->1894 1895 4b4fbbc 1894->1895 1896 4b38bc4 _free 58 API calls 1895->1896 1897 4b4fbc7 1896->1897 1898 4b38bc4 _free 58 API calls 1897->1898 1899 4b4fbd2 1898->1899 1900 4b38bc4 _free 58 API calls 1899->1900 1901 4b4fbdd 1900->1901 1902 4b38bc4 _free 58 API calls 1901->1902 1903 4b4fbe8 1902->1903 1904 4b38bc4 _free 58 API calls 1903->1904 1905 4b4fbf3 1904->1905 1906 4b38bc4 _free 58 API calls 1905->1906 1907 4b4fbfe 1906->1907 1908 4b38bc4 _free 58 API calls 1907->1908 1909 4b4fc09 1908->1909 1910 4b38bc4 _free 58 API calls 1909->1910 1911 4b4fc14 1910->1911 1912 4b38bc4 _free 58 API calls 1911->1912 1913 4b4fc1f 1912->1913 1914 4b38bc4 _free 58 API calls 1913->1914 1915 4b4fc2a 1914->1915 1916 4b38bc4 _free 58 API calls 1915->1916 1917 4b4fc35 1916->1917 1918 4b38bc4 _free 58 API calls 1917->1918 1919 4b4fc40 1918->1919 1920 4b38bc4 _free 58 API calls 1919->1920 1921 4b4fc4b 1920->1921 1922 4b38bc4 _free 58 API calls 1921->1922 1923 4b4fc56 1922->1923 1924 4b38bc4 _free 58 API calls 1923->1924 1925 4b4fc64 1924->1925 1926 4b38bc4 _free 58 API calls 1925->1926 1927 4b4fc6f 1926->1927 1928 4b38bc4 _free 58 API calls 1927->1928 1929 4b4fc7a 1928->1929 1930 4b38bc4 _free 58 API calls 1929->1930 1931 4b4fc85 1930->1931 1932 4b38bc4 _free 58 API calls 1931->1932 1933 4b4fc90 1932->1933 1934 4b38bc4 _free 58 API calls 1933->1934 1935 4b4fc9b 1934->1935 1936 4b38bc4 _free 58 API calls 1935->1936 1937 4b4fca6 1936->1937 1938 4b38bc4 _free 58 API calls 1937->1938 1939 4b4fcb1 1938->1939 1940 4b38bc4 _free 58 API calls 1939->1940 1941 4b4fcbc 1940->1941 1942 4b38bc4 _free 58 API calls 1941->1942 1943 4b4fcc7 1942->1943 1944 4b38bc4 _free 58 API calls 1943->1944 1945 4b4fcd2 1944->1945 1946 4b38bc4 _free 58 API calls 1945->1946 1947 4b4fcdd 1946->1947 1948 4b38bc4 _free 58 API calls 1947->1948 1949 4b4fce8 1948->1949 1950 4b38bc4 _free 58 API calls 1949->1950 1951 4b4fcf3 1950->1951 1952 4b38bc4 _free 58 API calls 1951->1952 1953 4b4fcfe 1952->1953 1954 4b38bc4 _free 58 API calls 1953->1954 1955 4b4fd09 1954->1955 1956 4b38bc4 _free 58 API calls 1955->1956 1957 4b4fd17 1956->1957 1958 4b38bc4 _free 58 API calls 1957->1958 1959 4b4fd22 1958->1959 1960 4b38bc4 _free 58 API calls 1959->1960 1961 4b4fd2d 1960->1961 1962 4b38bc4 _free 58 API calls 1961->1962 1963 4b4fd38 1962->1963 1964 4b38bc4 _free 58 API calls 1963->1964 1965 4b4fd43 1964->1965 1966 4b38bc4 _free 58 API calls 1965->1966 1967 4b4fd4e 1966->1967 1968 4b38bc4 _free 58 API calls 1967->1968 1968->1969 1969->1738 1970->1723 1974 4b3f7c4 LeaveCriticalSection 1971->1974 1973 4b49bfc 1973->1715 1974->1973 1976 4b40894 1975->1976 1977 4b40883 1975->1977 1976->1684 1977->1976 1978 4b38bc4 _free 58 API calls 1977->1978 1978->1976 1584 4b38bc4 1585 4b38bf6 _free 1584->1585 1586 4b38bcd RtlFreeHeap 1584->1586 1586->1585 1587 4b38be2 1586->1587 1588 4b38edb _free 56 API calls 1587->1588 1589 4b38be8 GetLastError 1588->1589 1589->1585

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_04B445B5 17 Function_04B43395 0->17 66 Function_04B46C54 0->66 70 Function_04B44656 0->70 71 Function_04B43350 0->71 74 Function_04B3F65A 0->74 76 Function_04B4465F 0->76 1 Function_04B40EB6 2 Function_04B39130 3 Function_04B433B0 5 Function_04B4E03E 3->5 14 Function_04B42C29 3->14 15 Function_04B474AB 3->15 18 Function_04B40897 3->18 21 Function_04B47492 3->21 22 Function_04B44398 3->22 45 Function_04B47479 3->45 56 Function_04B47462 3->56 65 Function_04B3E753 3->65 81 Function_04B4E1C6 3->81 84 Function_04B4DF40 3->84 85 Function_04B38BC4 3->85 4 Function_04B42F33 33 Function_04B44388 5->33 72 Function_04B38EDB 5->72 6 Function_04B43139 62 Function_04B431EF 6->62 7 Function_04B46A3A 12 Function_04B4F0AF 7->12 19 Function_04B46A97 7->19 8 Function_04B411A4 9 Function_04B1D020 49 Function_04B1D060 9->49 68 Function_04B21B50 9->68 10 Function_04B3F1A6 11 Function_04B4452E 36 Function_04B4308A 11->36 80 Function_04B44546 11->80 12->33 12->72 13 Function_04AC0930 51 Function_04B42B65 14->51 38 Function_04B47370 15->38 16 Function_04B4422B 16->2 16->8 27 Function_04B4E200 16->27 16->65 29 Function_04B41181 18->29 31 Function_04B4B30E 18->31 19->12 19->22 24 Function_04B4EF85 19->24 30 Function_04B38C8B 19->30 41 Function_04B4EFF1 19->41 43 Function_04B46A73 19->43 61 Function_04B4F0EF 19->61 19->65 69 Function_04B4D3D6 19->69 20 Function_04B3CA16 20->11 59 Function_04B46EE3 20->59 78 Function_04B49B58 20->78 22->16 32 Function_04B4118F 22->32 23 Function_04B51004 24->33 24->72 25 Function_04B3F782 86 Function_04B3F7C4 25->86 26 Function_04B43185 28 Function_04B4E000 44 Function_04B441F8 31->44 31->72 73 Function_04B4435D 33->73 34 Function_04B40E88 35 Function_04B43309 35->86 36->6 36->7 36->19 36->62 37 Function_04B49BF5 37->86 38->23 47 Function_04B50FE5 38->47 39 Function_04B4DEF0 40 Function_04B564F0 41->33 41->72 42 Function_04B4F772 42->85 45->47 46 Function_04B40879 46->85 48 Function_04B393E2 48->7 48->19 48->44 54 Function_04B42F67 48->54 48->72 50 Function_04AF3DFE 52 Function_04B3F6E2 52->7 52->17 52->19 52->25 52->34 52->54 52->71 52->72 52->74 75 Function_04B408DF 52->75 52->85 53 Function_04B40E66 54->4 55 Function_04B1D2E5 55->9 57 Function_04B4E0E2 57->14 57->46 57->48 57->65 83 Function_04B4D440 57->83 58 Function_04B46F63 64 Function_04B46CE9 58->64 58->66 87 Function_04B46E43 58->87 59->11 59->17 59->36 59->58 59->71 59->74 79 Function_04B46F5A 59->79 60 Function_04B4BAED 60->8 60->27 60->32 61->1 61->65 62->17 62->26 62->35 62->54 62->71 62->74 62->86 63 Function_04B38EEE 64->42 67 Function_04B4F2D5 64->67 77 Function_04B4F9DF 64->77 64->85 65->60 67->85 69->33 69->72 70->86 72->80 73->22 73->73 74->36 74->52 75->29 75->48 76->86 77->85 78->11 78->17 78->36 78->37 78->71 78->74 78->85 79->86 80->0 80->18 80->53 82 Function_04B40E47 80->82 80->85 81->20 81->57 84->28 84->39 85->63 85->72

    Control-flow Graph

    APIs
    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,04B4BB0A,04A2768C,00000001,?,04B4BC21,04A2768C,00000017), ref: 04B411A9
    • UnhandledExceptionFilter.KERNEL32(04A2768C,?,04B4BB0A,04A2768C,00000001,?,04B4BC21,04A2768C,00000017), ref: 04B411B2
    Memory Dump Source
    • Source File: 00000003.00000002.2114107639.0000000004A21000.00000020.00001000.00020000.00000000.sdmp, Offset: 04A20000, based on PE: true
    • Associated: 00000003.00000002.2114089319.0000000004A20000.00000004.00001000.00020000.00000000.sdmpDownload File
    • Associated: 00000003.00000002.2114268025.0000000004B7A000.00000004.00001000.00020000.00000000.sdmpDownload File
    • Associated: 00000003.00000002.2114596375.0000000004FED000.00000002.00001000.00020000.00000000.sdmpDownload File
    • Associated: 00000003.00000002.2114614077.0000000004FEF000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_4a20000_rundll32.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: 15e987a91c3f68138aa645cd747507929adc302bf4dfa96b2b864214913dfc0d
    • Instruction ID: 46bdf1c40f9bede1fa6d3da6c8959b0d0573092013c7d61c81d671a881d1f576
    • Opcode Fuzzy Hash: 15e987a91c3f68138aa645cd747507929adc302bf4dfa96b2b864214913dfc0d
    • Instruction Fuzzy Hash: BFB0923104420EABEA002FD2F809F98BF28EB84663F000010F60D4C8628BAA9851CA92

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 132 4b42c29-4b42c43 133 4b42c45-4b42c48 132->133 134 4b42c49-4b42c57 call 4b42b65 GetLocaleInfoW 132->134
    APIs
    • GetLocaleInfoW.KERNEL32(00000000,?,00000002,?,?,04B436FA,?,?,?,00000002,?,?,?), ref: 04B42C50
    Memory Dump Source
    • Source File: 00000003.00000002.2114107639.0000000004A21000.00000020.00001000.00020000.00000000.sdmp, Offset: 04A20000, based on PE: true
    • Associated: 00000003.00000002.2114089319.0000000004A20000.00000004.00001000.00020000.00000000.sdmpDownload File
    • Associated: 00000003.00000002.2114268025.0000000004B7A000.00000004.00001000.00020000.00000000.sdmpDownload File
    • Associated: 00000003.00000002.2114596375.0000000004FED000.00000002.00001000.00020000.00000000.sdmpDownload File
    • Associated: 00000003.00000002.2114614077.0000000004FEF000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_4a20000_rundll32.jbxd
    Similarity
    • API ID: InfoLocale
    • String ID:
    • API String ID: 2299586839-0
    • Opcode ID: 8159cb849f090a220336b98d8261ae503636ad92dd4be73974d94d1aeedf06fc
    • Instruction ID: 80650fdf1ddb70fe6f971b02929217f9d0bd685647b06043c3410f185db18c02
    • Opcode Fuzzy Hash: 8159cb849f090a220336b98d8261ae503636ad92dd4be73974d94d1aeedf06fc
    • Instruction Fuzzy Hash: 04D0673600120DBF9F05EFE5F845C6A3B69FB8C365B044885F9188A511D63BB920AB65