Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.Packed.16045.13418.dll

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.Packed.16045.13418.dll
Analysis ID:1521518
MD5:bab4d119880ede651e1edb7d5d891599
SHA1:b06c29686d0fb77b9ece9d4c79b73859f3ab2495
SHA256:2fe5db59a191c7a857c5863344e1293724ac64b79ae3c89dda5fe172fd181243
Tags:dll
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 4632 cmdline: loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6708 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4920 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 4884 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • WerFault.exe (PID: 1936 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 620 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 4388 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll,SetDllPathA MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 6048 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 612 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 2720 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll,SetDllPathW MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 4196 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 612 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 5248 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll",SetDllPathA MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 6884 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5248 -s 612 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 592 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll",SetDllPathW MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 5948 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 592 -s 612 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.Packed.16045.13418.dllReversingLabs: Detection: 21%
Source: SecuriteInfo.com.Trojan.Packed.16045.13418.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
Source: Amcache.hve.9.drString found in binary or memory: http://upx.sf.net
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10001C40 wcslen,#800,wcscpy,#800,wcslen,#800,wcscpy,wcslen,#800,wcscpy,wcslen,#800,wcscpy,wcslen,#800,wcscpy,wcslen,#800,wcscpy,wcslen,#800,wcscpy,wcslen,#800,wcscpy,wcslen,#800,wcscpy,wcslen,#800,wcscpy,#800,NtQueryKey,0_2_10001C40
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_100026D0 NtClose,0_2_100026D0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10002120 wcslen,wcscpy,wcslen,wcscpy,wcslen,wcscpy,wcslen,wcscpy,_wcsicmp,_wcsicmp,_wcsicmp,wcslen,#800,wcscpy,wcslen,#800,wcscpy,#800,wcslen,wcslen,wcslen,#800,wcscpy,#800,wcslen,NtQueryValueKey,0_2_10002120
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10001320 GetCurrentThread,NtOpenKeyEx,0_2_10001320
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10002740 GetCurrentThread,NtOpenKeyEx,0_2_10002740
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_100013B0 NtOpenKey,0_2_100013B0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10001BF0 NtOpenKeyEx,0_2_10001BF0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10001C40 wcslen,#800,wcscpy,#800,wcslen,#800,wcscpy,wcslen,#800,wcscpy,wcslen,#800,wcscpy,wcslen,#800,wcscpy,wcslen,#800,wcscpy,wcslen,#800,wcscpy,wcslen,#800,wcscpy,wcslen,#800,wcscpy,wcslen,#800,wcscpy,#800,NtQueryKey,4_2_10001C40
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100026D0 NtClose,4_2_100026D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10002120 wcslen,wcscpy,wcslen,wcscpy,wcslen,wcscpy,wcslen,wcscpy,_wcsicmp,_wcsicmp,_wcsicmp,wcslen,#800,wcscpy,wcslen,#800,wcscpy,#800,wcslen,wcslen,wcslen,#800,wcscpy,#800,wcslen,NtQueryValueKey,4_2_10002120
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10001320 GetCurrentThread,NtOpenKeyEx,4_2_10001320
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10002740 GetCurrentThread,NtOpenKeyEx,4_2_10002740
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100013B0 NtOpenKey,4_2_100013B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10001BF0 NtOpenKeyEx,4_2_10001BF0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_100034200_2_10003420
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100034204_2_10003420
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 620
Source: SecuriteInfo.com.Trojan.Packed.16045.13418.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
Source: classification engineClassification label: mal48.winDLL@19/21@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6708:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess592
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4884
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4388
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5248
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2720
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\eaa15d8c-f3c0-497c-b71d-872187e6d6e3Jump to behavior
Source: SecuriteInfo.com.Trojan.Packed.16045.13418.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll,SetDllPathA
Source: SecuriteInfo.com.Trojan.Packed.16045.13418.dllReversingLabs: Detection: 21%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll,SetDllPathA
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll",#1
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 620
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 612
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll,SetDllPathW
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 612
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll",SetDllPathA
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll",SetDllPathW
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 592 -s 612
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5248 -s 612
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll,SetDllPathAJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll,SetDllPathWJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll",SetDllPathAJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll",SetDllPathWJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: mfc42u.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: msvcp60.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10001150 #540,LoadLibraryW,GetProcAddress,#823,#861,#825,FreeLibrary,#535,#800,0_2_10001150
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10004A34 push eax; ret 0_2_10004A52
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10004A34 push eax; ret 4_2_10004A52
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0083CCBE pushfd ; iretd 5_2_0083CCF1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0083CF5C pushad ; iretd 5_2_0083CF5D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0083FA74 pushad ; retf 5_2_0083FA7A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_02FFCF4B pushad ; iretd 11_2_02FFCF5D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_02FFC230 push B0035A34h; ret 11_2_02FFC235
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_02FFC628 push eax; ret 11_2_02FFC629
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_02FCC8F0 pushad ; ret 14_2_02FCC8F1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_02FCCAEA push esp; retf 14_2_02FCCB0D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_0019CB10 pushad ; ret 15_2_0019CB11
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_0019C7D0 push esp; retf 15_2_0019C7D1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_0019C7CC push esp; retf 0019h15_2_0019C7CD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_0019CB79 pushad ; ret 15_2_0019CBA1
Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\loaddll32.exeAPI coverage: 3.1 %
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 3.8 %
Source: C:\Windows\SysWOW64\WerFault.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\SysWOW64\WerFault.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: Amcache.hve.9.drBinary or memory string: VMware
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.9.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.9.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.9.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.9.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.9.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.9.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: Amcache.hve.9.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.9.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.9.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.9.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.9.drBinary or memory string: vmci.sys
Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.9.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.9.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.9.drBinary or memory string: VMware20,1
Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.9.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.9.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.9.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.9.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.9.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.9.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.9.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_02FCF487 LdrInitializeThunk,14_2_02FCF487
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10001150 #540,LoadLibraryW,GetProcAddress,#823,#861,#825,FreeLibrary,#535,#800,0_2_10001150
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll",#1Jump to behavior
Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
DLL Side-Loading
11
Process Injection
1
Rundll32
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
11
Virtualization/Sandbox Evasion
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager11
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1521518 Sample: SecuriteInfo.com.Trojan.Pac... Startdate: 28/09/2024 Architecture: WINDOWS Score: 48 30 Multi AV Scanner detection for submitted file 2->30 8 loaddll32.exe 1 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 rundll32.exe 8->12         started        14 rundll32.exe 8->14         started        16 3 other processes 8->16 process5 18 rundll32.exe 10->18         started        20 WerFault.exe 2 16 12->20         started        22 WerFault.exe 16 14->22         started        24 WerFault.exe 16 16->24         started        26 WerFault.exe 16 16->26         started        process6 28 WerFault.exe 23 16 18->28         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.Packed.16045.13418.dll21%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.9.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1521518
Start date and time:2024-09-28 20:35:14 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 9s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:22
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Trojan.Packed.16045.13418.dll
Detection:MAL
Classification:mal48.winDLL@19/21@0/0
EGA Information:
  • Successful, ratio: 33.3%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 5
  • Number of non-executed functions: 55
Cookbook Comments:
  • Found application associated with file extension: .dll
  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 52.168.117.173, 20.189.173.20, 20.12.23.50, 20.242.39.171, 4.245.163.56, 52.165.164.15
  • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, client.wns.windows.com, slscr.update.microsoft.com, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, blobcollector.events.data.trafficmanager.net, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, umwatson.events.data.microsoft.com, glb.sls.prod.dcat.dsp.trafficmanager.net
  • Execution Graph export aborted for target rundll32.exe, PID 2720 because there are no executed function
  • Execution Graph export aborted for target rundll32.exe, PID 4884 because there are no executed function
  • Execution Graph export aborted for target rundll32.exe, PID 5248 because there are no executed function
  • Execution Graph export aborted for target rundll32.exe, PID 592 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.
  • VT rate limit hit for: SecuriteInfo.com.Trojan.Packed.16045.13418.dll
TimeTypeDescription
14:36:21API Interceptor5x Sleep call for process: WerFault.exe modified
14:36:22API Interceptor1x Sleep call for process: loaddll32.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8557576564476563
Encrypted:false
SSDEEP:192:wniNOHgx+0BU/wjeT8zuiF1Z24IO8dci:QiEHgTBU/wjeIzuiF1Y4IO8dci
MD5:E6E4A9B3D628C71451DB8FBBF3AB5626
SHA1:5331BDA36E6E5C21BEC4A800EAA4585A3EA9D352
SHA-256:E1EC8D7F0A1DAD5C42C27C692F45487EF08EBA771E7480B6A2A7C1989DB61693
SHA-512:D643CEF5445569D52367ED4876A33E42B6ACD4737544CE3E478207490CF327DB822442DAF85C5B56B2624A83560F8CBA83E1215D3931D350B2CC364D3A7D70C1
Malicious:false
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.0.2.2.1.8.3.0.6.9.7.1.3.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.0.2.2.1.8.4.1.6.3.4.6.9.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.f.2.b.4.a.1.c.-.3.5.c.5.-.4.3.5.8.-.b.8.f.2.-.1.e.2.f.b.b.b.9.e.3.7.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.4.9.1.6.9.7.d.-.4.e.3.c.-.4.1.e.f.-.8.4.2.e.-.6.d.a.5.3.e.1.b.2.9.d.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.8.0.-.0.0.0.1.-.0.0.1.5.-.c.c.3.5.-.4.2.5.1.d.5.1.1.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.855372649796258
Encrypted:false
SSDEEP:192:QeghiNOxQgx+0BU/wjeT8zuiF1Z24IO8dci:9yiEWgTBU/wjeIzuiF1Y4IO8dci
MD5:2A4B41157284102919F373E558AF7557
SHA1:928C1AADCD7D9516DE29E9AD4C29FCCD9BD0D75A
SHA-256:761567C6B730167C16947989B2D9282E7548E4C9DFB37A76EFC6C7DC0F88DB04
SHA-512:991C6327DD1C265C4F08231021891D7612DA4B5517571A4BCE159CEAEA0266E89CC6CFAE649973D9DCCC32821F855A3A65328A3BE536B9C657B7BAA73ADA9A89
Malicious:false
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.0.2.2.1.7.7.1.0.4.8.7.7.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.0.2.2.1.7.8.5.7.3.6.4.0.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.4.4.5.b.4.3.0.-.5.4.0.4.-.4.f.1.d.-.a.b.9.e.-.1.6.2.3.0.4.9.d.d.6.e.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.9.2.1.6.0.c.f.-.4.e.0.5.-.4.2.1.c.-.a.c.0.3.-.a.f.1.e.1.7.1.8.0.f.2.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.1.2.4.-.0.0.0.1.-.0.0.1.5.-.b.c.7.d.-.a.4.4.d.d.5.1.1.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8556568359654201
Encrypted:false
SSDEEP:192:vFmiPOn7tgx+0BU/wjeT8zuiF1Z24IO8dci:Nmi27tgTBU/wjeIzuiF1Y4IO8dci
MD5:0957A4FC7D7E29C912509F02BD0FCD4F
SHA1:715C797B844DD2B2C2DD698E20F1A746202EA584
SHA-256:B5A275A67CE5FAB3DD82F243B58F37135BEC1FD55A6F921F5D4C54EAE1A956DF
SHA-512:3F2D9B29716FDCEA678BFC9E9930E5322B512EC22EE292C448A276EF75C376F6C1C04125CE318636E93E465FFF13F8773C27FB5A0336ED0693F868DAA7E5C879
Malicious:false
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.0.2.2.1.7.7.1.6.0.2.1.0.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.0.2.2.1.7.8.5.8.2.1.0.6.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.1.1.0.3.7.1.3.-.8.a.e.5.-.4.d.e.5.-.a.3.2.9.-.a.e.a.6.d.2.e.3.f.e.5.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.1.b.3.8.4.c.e.-.a.d.8.a.-.4.e.8.d.-.8.6.0.d.-.6.e.b.7.c.7.2.9.3.9.5.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.1.4.-.0.0.0.1.-.0.0.1.5.-.1.9.6.9.-.a.b.4.d.d.5.1.1.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.854895158919584
Encrypted:false
SSDEEP:192:l5AiXOlIT0BU/wjeT8zuiF1Z24IO8dcia:DAi+lXBU/wjeIzuiF1Y4IO8dci
MD5:6DDF7D3EA6A3A858C5DB0C90A283D246
SHA1:85E89464DAD6DE53CFB9BC8F8913BFA3A52AC337
SHA-256:8133F3FFC3FA2A049905E4186C495617BF69238C0C125AADCCD4F5D8E8EAC387
SHA-512:0FEE877F1A6AF2AB72E3D2204D0450C19D4159AF127D5C94A403FCB29E4F2E2E5A12F3CC0A006D8F03F3B75AFC0419BD74FE416B83CC36ADFFC0B42671862CC8
Malicious:false
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.0.2.2.1.7.9.9.7.4.0.0.9.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.0.2.2.1.8.0.3.8.0.2.6.3.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.a.4.5.7.b.1.1.-.e.e.3.7.-.4.a.8.5.-.8.a.c.3.-.6.8.9.d.3.0.f.7.3.0.f.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.2.d.9.1.9.1.6.-.8.c.4.3.-.4.b.8.b.-.9.0.e.6.-.f.4.2.5.9.9.3.6.f.e.b.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.a.a.0.-.0.0.0.1.-.0.0.1.5.-.d.1.d.3.-.7.4.4.f.d.5.1.1.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.854814170993605
Encrypted:false
SSDEEP:192:z05iUO3IT0BU/wjeT8zuiF1Z24IO8dci:zmil3XBU/wjeIzuiF1Y4IO8dci
MD5:CFA64605E126DE86FAB74A0C7A4DFD1F
SHA1:68CFA47B80EDF36C75812B9B46021E00957C2269
SHA-256:9FE55CB8BA9838C4F3DB3D967FE9CCA8C272D327AAB05515ED0EC944F95EC4D7
SHA-512:C319561B76BF95BA63ABF9ACA9C62D1B67A6E59B5992794EE82BCD8DE8C09A05511120981473C4DFA0DC6083351525496897E7B3C5CE75D3235A37F384674380
Malicious:false
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.0.2.2.1.8.3.0.2.1.4.8.4.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.0.2.2.1.8.4.0.9.9.6.0.2.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.1.7.8.4.6.2.3.-.1.2.f.c.-.4.6.0.0.-.a.3.b.b.-.c.e.e.a.5.9.9.1.a.9.f.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.1.3.1.3.3.e.b.-.5.6.4.8.-.4.a.8.8.-.8.f.c.2.-.7.b.3.a.b.0.6.9.0.8.c.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.2.5.0.-.0.0.0.1.-.0.0.1.5.-.2.f.b.2.-.4.3.5.1.d.5.1.1.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Sat Sep 28 18:36:17 2024, 0x1205a4 type
Category:dropped
Size (bytes):45180
Entropy (8bit):1.8942417152083302
Encrypted:false
SSDEEP:192:VkIc0IVS7O5H4OZeoL1kpy/28fOh6fxXvj9:ehHl5HEZBAOgVj
MD5:9CD3D7DF51637DAC8B4FCD3306C08B1A
SHA1:BD046B6E5ACB7853244B845C785525E3B2E8D242
SHA-256:D7DE99711860FE566FE4606AE58FC36CC176E95B0C2B14A6AF6EE4F17E70B38C
SHA-512:F86AEE1AB88D5E2275BB3C41A78FAF761860D5B6C8C1AB74A1926092B24EC2D414B2C1BF3245402D3298EAED4CB7E0CC55B8F43BA5EE66CE1D39ABCD96C71BE0
Malicious:false
Preview:MDMP..a..... ........L.f........................4................(..........T.......8...........T...........p...........................................................................................................eJ......T.......GenuineIntel............T.......$....L.f.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Sat Sep 28 18:36:17 2024, 0x1205a4 type
Category:dropped
Size (bytes):51560
Entropy (8bit):1.7626452770786227
Encrypted:false
SSDEEP:192:VUVUxlxtsXyx3F59O5H4wJIodqVD/gHtYfCb0:uoxk+nw5HYgqVD/gHWO
MD5:5B8A6A77199B5775F4C0B88FD3C362FF
SHA1:4EA80393D3189CEADB44C5C09CBA1E3CC83E274D
SHA-256:3C90E434F6312BA7CB10B843EE2F3993D39583543EC94567891DEF2555C12C0B
SHA-512:BC660143CF3F11358955FC0AD36C8AA884A5EE944E4CF87656015C220D7350DAAF4B2C0AE00CBE6A8D17A4A3F7E89BFD3510740BB0FF4AF5DD202E4E36DB5266
Malicious:false
Preview:MDMP..a..... ........L.f........................4................+..........T.......8...........T.......................................................................................................................eJ..............GenuineIntel............T............L.f.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8270
Entropy (8bit):3.691818947070973
Encrypted:false
SSDEEP:192:R6l7wVeJtn6Ijs6YkT6ogmfT648cO5prH89bHOsf4Nm:R6lXJN6Ijs6Y46ogmfT641O8HNf/
MD5:BB7B95C964D40763B22798F1E82E86D8
SHA1:454C5021D496D345697A3CACD6B53F6A5D571137
SHA-256:E3EA23EB214A20D9B2C20AC98824E33B58B0C48709707671B19009036C63F6FB
SHA-512:A7DAF985F166D6510ECD38EC8C3CB9CA132449AF807F20FB7423F6BF3773BBE5979C45503C1D1FD275BFBC06EB868845877F37E1D5ACB16328C62EF233C8A81D
Malicious:false
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.8.8.4.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8280
Entropy (8bit):3.6941462634817337
Encrypted:false
SSDEEP:192:R6l7wVeJC36I3V6YBV6igmfT648cO5prB89bHYsfpg1Nm:R6lXJq6I3V6Yj6igmfT641OqHLfp1
MD5:D3C7D51D7E7555E309ABB149DBDB53C2
SHA1:77E1714CC0D24F26226D6F2BE057E430D6BA8E9F
SHA-256:5802CA5B333DF10CD6B99E67FE3DAE216F7BDD3270DBD584ED4F53CA21A38A2C
SHA-512:96A4B3C9C7864E7A7165DF9F6F02807BEB4CD2DCB13E1A6A7A09450258A86F2371DBF807BEE163387A2B83F099B8340C9CA21DA76CC829B2CC3896B9B37A509B
Malicious:false
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.3.8.8.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4666
Entropy (8bit):4.477812041015737
Encrypted:false
SSDEEP:48:cvIwWl8zsEJg77aI92ioWpW8VYUYm8M4JCdP8Fs+q8/qJGScS5d:uIjfCI75B7VMJ2TJ35d
MD5:41339016D5123B1CCF44309A31EE7594
SHA1:29A08A0099E28E5167EC81B3CC2C6A689D59E714
SHA-256:D0560A06CB7A6C2996E0F7826A2DECA6B3A082B4E378F7E0D53DF6FC2D33F91D
SHA-512:8423D10F4140CA281E034782ECE360BB70975227E2BB804C5925BA38C88E7CF0C13588C821D3FC8412C9744703696EF83F000A79C3D4F39BBD501327EE8F5671
Malicious:false
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="520418" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4666
Entropy (8bit):4.475204095420498
Encrypted:false
SSDEEP:48:cvIwWl8zsEJg77aI92ioWpW8VYoYm8M4JCdP8FuW+q8/qhlGScS2d:uIjfCI75B7VsJftJ32d
MD5:0474921934F4DE123E7811A0844BBC17
SHA1:680AFAD3E0F2799730DA8FBC01CC3E5BB87EE2E4
SHA-256:082780AD7A91D0F1FBE28A59E0467FDD25FA830E6061B5419C9FBF6C7DABB988
SHA-512:FAB8E5E94D2C77BD087C5F4B03B9590AF8162FF2CEB0C4F07C60C6D3B419D450F38F5860855B4AD088CA31A5217BEEBE532D89DF5BC40144C1864D971E5032F5
Malicious:false
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="520418" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Sat Sep 28 18:36:20 2024, 0x1205a4 type
Category:dropped
Size (bytes):46252
Entropy (8bit):1.939021395867495
Encrypted:false
SSDEEP:192:okXc0IAKEXLndO5H4agIpHY04AOLXyHtn7oG2T7o5Cb8xjK2It2:ZsHa7Q5HNYbrLXyHt7a1bCm
MD5:5A663446439F1A312D9C86C7AA7F4FAA
SHA1:3FF6B17232C21AB2C08DC0ED5D4BAB8F6208454C
SHA-256:294ECB8B5B11D6CAD2BBDD99353C15E3ABED58DF5F7F01DB65B634B3C80C730F
SHA-512:92F053D1B492C9E1757485E1BF8A7975B80D14FEA556C782D5F4F69664CC4B81F22687BFB08EE74D4FC962BF8773177FBE601E3CE5B37F75F134BCDCA7E436CB
Malicious:false
Preview:MDMP..a..... ........L.f........................4................(..........T.......8...........T...........p...<.......................................................................................................eJ......T.......GenuineIntel............T............L.f.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8266
Entropy (8bit):3.6906204323842604
Encrypted:false
SSDEEP:192:R6l7wVeJCL6I3v6YB06xgmfT2LO5pr089b7Asfipm:R6lXJm6I3v6Yy6xgmfToOV7TfV
MD5:10D5C39013ABF529A5B2E9D77B99817A
SHA1:29688952EE6D67D28CBB2CF0762E4852D45413E2
SHA-256:C29BD2D1AC4DDCC4C96AA191A67F9B5251F411D2138DEFD0BA8BB4FC44040400
SHA-512:584ACEBB5C6AA1DE8BD2783CF13EEB106AD5D05F2EF33438550759198614EBE3D2C669E34CA42F1384186BA7A7DE2DE2DB31D883129BE8601A7242A787C519BC
Malicious:false
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.7.2.0.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4654
Entropy (8bit):4.459100349252224
Encrypted:false
SSDEEP:48:cvIwWl8zszJg77aI92ioWpW8VY+5Ym8M4JCdPDFbY+q8/AbaGScSEd:uIjfNI75B7VRoJMYDaJ3Ed
MD5:465B9622AB858AA26D4C1810B791BAC6
SHA1:C0335737C0B43D6E293BBEFE2D305FBC99E2B78A
SHA-256:9D18B92289F1A1FB18B81AFE5FC6C7D8AAA246137D73076C07C4830A044D4E81
SHA-512:BBEC18D30AB14A1D2B3D0C12A368D0DB8292AEA3346D75DE15EDBB5952AB56D3286AEEDD3F089FF8D38356EBC1CAABFA7467CA4BE6E93EBAA8FBC2B26D4C0C91
Malicious:false
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="520419" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Sat Sep 28 18:36:23 2024, 0x1205a4 type
Category:dropped
Size (bytes):44120
Entropy (8bit):1.9760665289365158
Encrypted:false
SSDEEP:192:PkvW0IiPVO5H4i87nFOuZ1NitYrEEy3O2l1e/Vx:8OHD5Hi7k6NitYrFy3Oui
MD5:B09F0291FF07516795CA53E0E597F6A1
SHA1:12734BF882AB8372F3FCAB7A74B0F5D6F805B90E
SHA-256:B2D6385CFF959BDB3ECE1D6CAF1806C8C8809069C04665C6B4DBD3C9946AB14E
SHA-512:8E452933C4535941EC97EAAB2C09AAD6DA78119190ADB9F6DB2CDE756ED3EA5540946423B45D587DFAD2F514640CBC312F4EEFE4EEEE9C8CCE702050FC4A843F
Malicious:false
Preview:MDMP..a..... ........L.f........................4................(..........T.......8...........T...........p..........................................................................................................eJ......T.......GenuineIntel............T.......P....L.f.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Sat Sep 28 18:36:23 2024, 0x1205a4 type
Category:dropped
Size (bytes):44524
Entropy (8bit):1.9248150151176648
Encrypted:false
SSDEEP:192:PkUVw7W0IQyZO5H43MlZov8qF/lbw2bl+YoRr5+L:8U+6HU5HEiZo8q3bw2bls
MD5:73531136CCB2CE7A746717155FB8FD86
SHA1:DCB0CFA86807C30583C7EE0AB014B4742873B65D
SHA-256:9BAC0538B85D6C2204EDC3D55077967F6D983AC6295736A4109123D9A4D88BD6
SHA-512:64AD79D90AA7AC89979459174AA9AEB75CD73F7FA3E4419B3F004A749AD05F00D493431312D3E8F1C21F69A7FFDCCEDD87DC79D414B681BCF0AE0AE3D201D16F
Malicious:false
Preview:MDMP..a..... ........L.f........................4................(..........T.......8...........T...........p...|.......................................................................................................eJ......T.......GenuineIntel............T............L.f.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8252
Entropy (8bit):3.6900816832803165
Encrypted:false
SSDEEP:192:R6l7wVeJptS6I3N6YZ+66KgmfT2LO5prT89bAtsfxAm:R6lXJpo6I3N6Yw66KgmfToOgAmfj
MD5:D45FB75D39764E7A8898AB55A550106A
SHA1:36680B316F5EC5360FD527DD6367513DD2D68B86
SHA-256:965C5B51BF91BB43FC9676763C86D125831096A6C170110372B293417B1716C6
SHA-512:0920F7E942775EF1DD2178EC0F5C0E50DA6E97741429A64CDD69F704C49EC603E8C19D0E37C8BAEB7B1DC0DF8FAFE897E0624F3F6A0FE3F9700E8AB8FCBB10A2
Malicious:false
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.9.2.<./.P.i.d.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4654
Entropy (8bit):4.459530249296044
Encrypted:false
SSDEEP:48:cvIwWl8zszJg77aI92ioWpW8VYuvYm8M4JCdPDFXMj+q8/A7GScSid:uIjfNI75B7ViJyMjTJ3id
MD5:C2100CB202CF272FBFBFA37165A39D4E
SHA1:455492EB7022DD681F92EBC98CDBE1BA25C1E84C
SHA-256:483FF484430167E2620A686CD0029911910718B31663B9F581EEDE73BC54C817
SHA-512:D4BAF88C6D05F7E5A7EC95DABE5BFE0922E3254F358DE84FEADDE62B9EF324224DA0C7D6035DABD35914FCEB74857F0E47184B344D7E0C74DC1265EB425B42B1
Malicious:false
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="520419" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8268
Entropy (8bit):3.6948844111406194
Encrypted:false
SSDEEP:192:R6l7wVeJmW6I3/6YZH66KgmfT648cO5pr089bAjsf0Am:R6lXJf6I3/6YJ66KgmfT641OVAIfy
MD5:ED557AD67E0404A36A760D3A193C11FC
SHA1:F7116D8AFF62FFE30E68CA879E34A77CBCAB707A
SHA-256:F33A0D5D600D05B193272F60AC7E7C72938017A5CE93E365437681526C0748DB
SHA-512:0406FF785DED8AAFC64567DEA12762A44736F92CD833E7F23A41DE8DCD112E2FD3141B5D8292833F638D2DFB777A7C99FB4CA8CBE8098A828FC6220C99527F18
Malicious:false
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.4.8.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4666
Entropy (8bit):4.475762693257893
Encrypted:false
SSDEEP:48:cvIwWl8zszJg77aI92ioWpW8VYunYm8M4JCdP8Fc6P+q8/qxGScSvd:uIjfNI75B7VqJNfJ3vd
MD5:53361691999184B6C3F1E6CC83B3B8CB
SHA1:2849FD3FA7237D08EA0D3D8D0661C50A788F15BB
SHA-256:6E958D92D7E0BB76DC6EAFBFEFCBF89D87B9F88EB1B5F8E3CA715AF8FFE15FCF
SHA-512:45C5BBB9CD54B0B0FB33DC05E9EFF08F4BC42D0DE9949A5FF5A42294201A7988D6820D78A46478376202FD81DFE0F7EE995D6CC339D0FF507D97DCB0426FA183
Malicious:false
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="520419" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.469383663571447
Encrypted:false
SSDEEP:6144:vzZfpi6ceLPx9skLmb0fYZWSP3aJG8nAgeiJRMMhA2zX4WABluuNFjDH5S:7ZHtYZWOKnMM6bFpHj4
MD5:2BBB84C890CCBE3F294D727C3F93DE2D
SHA1:A047D7E489861F34034BA413E1BDC1B4C7133979
SHA-256:185C12EE60419BD4CBF9ED01D22203BD5C7CC48770DDC1185DA91BE1CEEBD721
SHA-512:11406199B2D0DC2CBF8E8A55C9D835BE30612E7B3C56BF69EC77A7DF81667AC669A09BFCF3BD9C49430AC5C89E7BA938437987D3932D6FB81DBE719BEFBF0200
Malicious:false
Preview:regfI...I....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...M...................................................................................................................................................................................................................................................................................................................................................y........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Entropy (8bit):4.86992030446349
TrID:
  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
  • Generic Win/DOS Executable (2004/3) 0.20%
  • DOS Executable Generic (2002/1) 0.20%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SecuriteInfo.com.Trojan.Packed.16045.13418.dll
File size:49'152 bytes
MD5:bab4d119880ede651e1edb7d5d891599
SHA1:b06c29686d0fb77b9ece9d4c79b73859f3ab2495
SHA256:2fe5db59a191c7a857c5863344e1293724ac64b79ae3c89dda5fe172fd181243
SHA512:1d91957778318d3aae28776c18644ae84fafd97f38bb57c65b408fa91775bec0272e9e93eac330b0b0cc0bf33db1588ae0b5f300749212e6fb7063f354a06b72
SSDEEP:768:1jY5P1mAzVOBuiPn5EnsiWGFwlHZB8QACoOOy8:1GPNTA5n/lHwQdory8
TLSH:46230904A60D08A4C77D5E7CEC6B7B3B532D58CC16D90BC35B75ED78EC23422AE12A65
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........C..G"..G"..G"..%=..C"..(=..F"...>..E"..(=..C"..(=..C"..q...D"..G"..."..q...M"...$..F"......F"..RichG".........................
Icon Hash:7ae282899bbab082
Entrypoint:0x1000497b
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x10000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
DLL Characteristics:
Time Stamp:0x5628BB32 [Thu Oct 22 10:32:18 2015 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:a6401b477c5abcd084d69b0577575fd8
Instruction
push ebp
mov ebp, esp
push ebx
mov ebx, dword ptr [ebp+08h]
push esi
mov esi, dword ptr [ebp+0Ch]
push edi
mov edi, dword ptr [ebp+10h]
test esi, esi
jne 00007EFE10BA9A2Bh
cmp dword ptr [1000BF34h], 00000000h
jmp 00007EFE10BA9A48h
cmp esi, 01h
je 00007EFE10BA9A27h
cmp esi, 02h
jne 00007EFE10BA9A44h
mov eax, dword ptr [1000928Ch]
test eax, eax
je 00007EFE10BA9A2Bh
push edi
push esi
push ebx
call eax
test eax, eax
je 00007EFE10BA9A2Eh
push edi
push esi
push ebx
call 00007EFE10BA993Ah
test eax, eax
jne 00007EFE10BA9A26h
xor eax, eax
jmp 00007EFE10BA9A70h
push edi
push esi
push ebx
call 00007EFE10BA9757h
cmp esi, 01h
mov dword ptr [ebp+0Ch], eax
jne 00007EFE10BA9A2Eh
test eax, eax
jne 00007EFE10BA9A59h
push edi
push eax
push ebx
call 00007EFE10BA9916h
test esi, esi
je 00007EFE10BA9A27h
cmp esi, 03h
jne 00007EFE10BA9A48h
push edi
push esi
push ebx
call 00007EFE10BA9905h
test eax, eax
jne 00007EFE10BA9A25h
and dword ptr [ebp+0Ch], eax
cmp dword ptr [ebp+0Ch], 00000000h
je 00007EFE10BA9A33h
mov eax, dword ptr [1000928Ch]
test eax, eax
je 00007EFE10BA9A2Ah
push edi
push esi
push ebx
call eax
mov dword ptr [ebp+0Ch], eax
mov eax, dword ptr [ebp+0Ch]
pop edi
pop esi
pop ebx
pop ebp
retn 000Ch
push esi
mov esi, ecx
call 00007EFE10BA9A65h
test byte ptr [esp+08h], 00000001h
je 00007EFE10BA9A29h
push esi
call 00007EFE10BA95FAh
pop ecx
mov eax, esi
pop esi
retn 0004h
push FFFFFFFFh
push eax
mov eax, dword ptr fs:[00000000h]
push eax
mov eax, dword ptr [esp+0Ch]
Programming Language:
  • [C++] VS98 (6.0) SP6 build 8804
  • [EXP] VC++ 6.0 SP5 build 8804
  • [LNK] VC++ 6.0 SP5 build 8804
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x8d700x60.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0x87780x64.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xd0000x10.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0xe0000x99c.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x70000x1f0.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x559e0x6000c644e798c2802372fff661e4a49f754dFalse0.4974772135416667data6.0411501550711675IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x70000x1dd00x2000bd02655cb813c0446d034e916a43221cFalse0.3111572265625data4.367028796891495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x90000x31e40x1000a82036b956d903da7f02d5932e6b3cfcFalse0.162353515625data1.459255981071059IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0xd0000x100x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0xe0000xcaa0x1000013e90c93df49efa57b60744b86f895aFalse0.5048828125data4.706467340542258IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
DLLImport
MFC42u.DLL
MSVCRT.dll_except_handler3, ftell, fopen, strchr, sprintf, ??1type_info@@UAE@XZ, _adjust_fdiv, malloc, _initterm, free, _onexit, __dllonexit, memmove, fseek, fread, fclose, wcscat, wcscpy, wcslen, _wcsicmp, __CxxFrameHandler, _wfopen
KERNEL32.dllCreateFileA, LocalAlloc, LocalFree, MultiByteToWideChar, GetModuleHandleW, EnterCriticalSection, LeaveCriticalSection, GetCurrentThread, InitializeCriticalSection, GetModuleHandleA, GetCurrentProcess, GetProcAddress, FreeLibrary, GetModuleFileNameW, LoadLibraryW, VirtualQuery, InterlockedCompareExchange, GetCurrentThreadId, ResumeThread, FlushInstructionCache, GetThreadContext, SetThreadContext, GetLastError, SuspendThread, VirtualAlloc, SetLastError, GetSystemDirectoryA, VirtualFree, CloseHandle, WriteFile
MSVCP60.dll?_Xran@std@@YAXXZ, ?_Xlen@std@@YAXXZ
NameOrdinalAddress
SetDllPathA10x100031b0
SetDllPathW20x100027e0
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:14:36:16
Start date:28/09/2024
Path:C:\Windows\System32\loaddll32.exe
Wow64 process (32bit):true
Commandline:loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll"
Imagebase:0x770000
File size:126'464 bytes
MD5 hash:51E6071F9CBA48E79F10C84515AAE618
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:1
Start time:14:36:16
Start date:28/09/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff66e660000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:3
Start time:14:36:16
Start date:28/09/2024
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll",#1
Imagebase:0x1c0000
File size:236'544 bytes
MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:4
Start time:14:36:16
Start date:28/09/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll,SetDllPathA
Imagebase:0xcb0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:5
Start time:14:36:16
Start date:28/09/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll",#1
Imagebase:0xcb0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:9
Start time:14:36:16
Start date:28/09/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 620
Imagebase:0xd80000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:10
Start time:14:36:16
Start date:28/09/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 612
Imagebase:0xd80000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:11
Start time:14:36:19
Start date:28/09/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll,SetDllPathW
Imagebase:0xcb0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:13
Start time:14:36:19
Start date:28/09/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 612
Imagebase:0xd80000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:14
Start time:14:36:22
Start date:28/09/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll",SetDllPathA
Imagebase:0xcb0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:15
Start time:14:36:22
Start date:28/09/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed.16045.13418.dll",SetDllPathW
Imagebase:0xcb0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:18
Start time:14:36:22
Start date:28/09/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 592 -s 612
Imagebase:0xd80000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:19
Start time:14:36:22
Start date:28/09/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5248 -s 612
Imagebase:0xd80000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:1.2%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:27.1%
    Total number of Nodes:608
    Total number of Limit Nodes:5
    execution_graph 1368 10001020 #561 1369 10002120 1370 1000212e 1369->1370 1371 10002151 wcslen 1370->1371 1372 100021b2 1370->1372 1399 10002541 1370->1399 1373 1000216d 1371->1373 1371->1399 1374 100021b9 wcslen 1372->1374 1375 1000221a 1372->1375 1379 10002175 wcscpy 1373->1379 1373->1399 1376 100021d5 1374->1376 1374->1399 1377 10002221 wcslen 1375->1377 1378 10002282 1375->1378 1380 100021dd wcscpy 1376->1380 1376->1399 1381 1000223d 1377->1381 1377->1399 1382 10002289 wcslen 1378->1382 1383 100022ea 1378->1383 1416 100021a7 1379->1416 1380->1416 1384 10002245 wcscpy 1381->1384 1381->1399 1385 100022a5 1382->1385 1382->1399 1386 100022f5 1383->1386 1387 1000241d 1383->1387 1384->1416 1390 100022ad wcscpy 1385->1390 1385->1399 1391 10002304 _wcsicmp 1386->1391 1392 1000239d 1386->1392 1388 10002424 wcslen 1387->1388 1389 1000243f 1387->1389 1388->1389 1388->1399 1394 10002558 wcslen 1389->1394 1397 1000247c 1389->1397 1389->1399 1390->1416 1391->1392 1393 1000231d _wcsicmp 1391->1393 1419 100025b0 6 API calls 1392->1419 1396 10002337 1393->1396 1393->1399 1394->1399 1417 10002640 6 API calls 1396->1417 1401 1000249d 1397->1401 1402 10002483 wcslen 1397->1402 1398 100023a7 wcslen #800 1398->1399 1403 100023c8 1398->1403 1401->1399 1421 100025b0 6 API calls 1401->1421 1402->1399 1402->1401 1403->1399 1420 100025b0 6 API calls 1403->1420 1404 10002341 wcslen #800 1404->1399 1405 10002362 1404->1405 1405->1399 1418 10002640 6 API calls 1405->1418 1408 100024d7 wcslen #800 1408->1399 1410 100024f4 1408->1410 1409 100023ed wcscpy 1412 10002401 #800 1409->1412 1410->1399 1422 100025b0 6 API calls 1410->1422 1412->1416 1413 10002387 wcscpy 1413->1412 1415 10002515 wcscpy #800 1415->1416 1417->1404 1418->1413 1419->1398 1420->1409 1421->1408 1422->1415 1691 10001040 1692 10001048 1691->1692 1693 10001058 1692->1693 1694 1000104f #825 1692->1694 1694->1693 1695 10001c40 1696 100020fb NtQueryKey 1695->1696 1697 10001c5d 1695->1697 1698 10001cf5 1697->1698 1699 10001c75 1697->1699 1700 10001d65 1698->1700 1701 10001cfc 1698->1701 1702 10001930 10 API calls 1699->1702 1704 10001dd5 1700->1704 1705 10001d6c 1700->1705 1703 10001930 10 API calls 1701->1703 1706 10001c86 wcslen #800 1702->1706 1708 10001d0d wcslen #800 1703->1708 1707 10001e45 1704->1707 1712 10001a30 10 API calls 1704->1712 1709 10001930 10 API calls 1705->1709 1710 100020e4 1706->1710 1711 10001ca7 1706->1711 1719 10001eb5 1707->1719 1721 10001a30 10 API calls 1707->1721 1708->1710 1713 10001d2e 1708->1713 1714 10001d7d wcslen #800 1709->1714 1710->1696 1716 100020ec 1710->1716 1711->1710 1715 10001caf 1711->1715 1717 10001ded wcslen #800 1712->1717 1713->1710 1720 10001d36 1713->1720 1714->1710 1722 10001d9e 1714->1722 1723 10001930 10 API calls 1715->1723 1717->1710 1724 10001e0e 1717->1724 1718 10001f25 1727 10001f91 1718->1727 1736 10001b30 8 API calls 1718->1736 1719->1718 1725 10001a30 10 API calls 1719->1725 1726 10001930 10 API calls 1720->1726 1728 10001e5d wcslen #800 1721->1728 1722->1710 1729 10001da6 1722->1729 1730 10001cc5 wcscpy 1723->1730 1724->1710 1741 10001a30 10 API calls 1724->1741 1733 10001ecd wcslen #800 1725->1733 1735 10001d4c wcscpy 1726->1735 1734 10001ffd 1727->1734 1743 10001b30 8 API calls 1727->1743 1728->1710 1737 10001e7e 1728->1737 1731 10001930 10 API calls 1729->1731 1732 10001cd9 #800 1730->1732 1740 10001dbc wcscpy 1731->1740 1767 10001cea 1732->1767 1733->1710 1742 10001eee 1733->1742 1738 10002069 1734->1738 1744 10001b30 8 API calls 1734->1744 1735->1732 1739 10001f3b wcslen #800 1736->1739 1737->1710 1746 10001a30 10 API calls 1737->1746 1738->1696 1751 10001b30 8 API calls 1738->1751 1739->1710 1745 10001f5c 1739->1745 1740->1732 1747 10001e2c wcscpy 1741->1747 1742->1710 1752 10001a30 10 API calls 1742->1752 1748 10001fa7 wcslen #800 1743->1748 1749 10002013 wcslen #800 1744->1749 1745->1710 1755 10001b30 8 API calls 1745->1755 1750 10001e9c wcscpy 1746->1750 1747->1707 1748->1710 1753 10001fc8 1748->1753 1749->1710 1754 10002034 1749->1754 1750->1719 1756 10002083 wcslen #800 1751->1756 1757 10001f0c wcscpy 1752->1757 1753->1710 1760 10001b30 8 API calls 1753->1760 1754->1710 1761 10001b30 8 API calls 1754->1761 1758 10001f78 wcscpy 1755->1758 1756->1710 1759 100020a0 1756->1759 1757->1718 1758->1727 1759->1710 1762 100020a4 1759->1762 1763 10001fe4 wcscpy 1760->1763 1764 10002050 wcscpy 1761->1764 1765 10001b30 8 API calls 1762->1765 1763->1734 1764->1738 1766 100020b8 wcscpy #800 1765->1766 1766->1767 1791 100027e0 wcscpy 1792 100028a1 1791->1792 1793 10002828 GetModuleHandleW GetModuleFileNameW wcslen 1791->1793 1794 10002900 58 API calls 1792->1794 1795 1000286d wcscat 1793->1795 1801 10002852 1793->1801 1797 100028ae 1794->1797 1811 10002900 EnterCriticalSection wcscpy LeaveCriticalSection _wfopen 1795->1811 1799 100028c5 1797->1799 1800 100028b5 1797->1800 1798 1000288a 1798->1799 1802 10002891 1798->1802 1824 10003180 EnterCriticalSection wcscpy LeaveCriticalSection 1799->1824 1803 10002740 48 API calls 1800->1803 1801->1795 1804 10002740 48 API calls 1802->1804 1805 100028ba 1803->1805 1807 10002896 1804->1807 1808 100028e1 1825 10001320 1808->1825 1812 10002954 fseek fread 1811->1812 1813 1000294c 1811->1813 1814 10002996 1812->1814 1813->1798 1815 100029b0 MultiByteToWideChar 1814->1815 1816 10002b6e wcscpy wcscpy wcscpy 1814->1816 1843 10002f00 1815->1843 1823 10002a42 fclose 1816->1823 1820 10002f00 42 API calls 1821 100029f1 fseek fread fseek fread 1820->1821 1822 10002a51 wcscpy 1821->1822 1821->1823 1822->1823 1823->1798 1824->1808 1826 1000139d 1825->1826 1827 10001329 1825->1827 1828 10004ba0 24 API calls 1827->1828 1829 1000132e GetCurrentThread 1828->1829 1830 10005000 5 API calls 1829->1830 1831 1000133a 1830->1831 1947 10005080 1831->1947 1834 10001365 1836 10005080 33 API calls 1834->1836 1835 10005080 33 API calls 1835->1834 1837 10001376 1836->1837 1838 10005080 33 API calls 1837->1838 1839 10001387 1838->1839 1840 10005080 33 API calls 1839->1840 1841 10001398 1840->1841 1842 10004d40 35 API calls 1841->1842 1842->1826 1844 10002f28 1843->1844 1851 10003f90 1844->1851 1848 10003142 1849 100029dd 1848->1849 1850 10003150 #825 1848->1850 1849->1820 1850->1849 1852 10003fa4 1851->1852 1855 10003e00 1852->1855 1856 10003e43 1855->1856 1863 10003e4e 1855->1863 1867 100041f0 1856->1867 1859 10003f53 1860 10002fb9 25 API calls 1859->1860 1862 10003f69 #825 1859->1862 1860->1848 1860->1849 1861 10003e90 ?_Xlen@std@ 1861->1863 1862->1860 1863->1861 1864 10003ee1 ?_Xlen@std@ 1863->1864 1865 100041f0 ?_Xlen@std@ #825 #825 #823 #825 1863->1865 1866 10003f28 1863->1866 1864->1863 1865->1863 1885 10003fc0 1866->1885 1868 10004204 1867->1868 1869 100041fe ?_Xlen@std@ 1867->1869 1870 10004214 1868->1870 1871 1000423a 1868->1871 1872 1000428c 1868->1872 1869->1868 1874 1000421c 1870->1874 1876 10004360 2 API calls 1870->1876 1875 1000424c 1871->1875 1878 10004261 #825 1871->1878 1872->1870 1873 10004290 1872->1873 1873->1874 1877 100042d0 1873->1877 1879 100042c7 #825 1873->1879 1880 100042aa 1873->1880 1874->1863 1875->1863 1876->1874 1881 10004360 2 API calls 1877->1881 1878->1875 1879->1877 1920 10004360 1880->1920 1882 100042e1 1881->1882 1882->1863 1886 10003fd3 ?_Xran@std@ 1885->1886 1887 10003fd9 1885->1887 1886->1887 1888 10003ff2 1887->1888 1894 100040aa 1887->1894 1890 10004001 ?_Xran@std@ 1888->1890 1891 10004007 1888->1891 1889 10004121 1895 10004132 1889->1895 1896 1000412c ?_Xlen@std@ 1889->1896 1890->1891 1926 10004470 1891->1926 1893 1000400e 1898 1000401d memmove 1893->1898 1913 10004042 1893->1913 1894->1889 1897 100040ca 1894->1897 1899 1000415a 1895->1899 1902 10004140 1895->1902 1896->1895 1900 100040db 1897->1900 1905 100040e1 #825 1897->1905 1901 100041f0 5 API calls 1898->1901 1904 1000415e 1899->1904 1910 10004170 1899->1910 1900->1859 1901->1913 1906 10004144 1902->1906 1907 10004185 1902->1907 1903 10004470 4 API calls 1908 1000405d 1903->1908 1909 10004300 #825 1904->1909 1905->1900 1943 10004300 1906->1943 1912 10004360 2 API calls 1907->1912 1917 1000406e memmove 1908->1917 1919 10004091 1908->1919 1915 10004167 1909->1915 1911 10004300 #825 1910->1911 1910->1919 1911->1907 1912->1919 1913->1903 1915->1859 1918 100041f0 5 API calls 1917->1918 1918->1919 1919->1859 1921 10004396 #823 1920->1921 1923 100043e0 1921->1923 1924 100042bf 1923->1924 1925 10004423 #825 1923->1925 1924->1863 1925->1924 1927 10004483 1926->1927 1938 1000450c 1926->1938 1928 100044b1 ?_Xlen@std@ 1927->1928 1929 100044b9 1927->1929 1927->1938 1928->1929 1930 100044dd 1929->1930 1932 100044c7 1929->1932 1931 100044e1 1930->1931 1934 100044ef 1930->1934 1933 10004300 #825 1931->1933 1935 10004504 1932->1935 1936 100044cb 1932->1936 1937 100044ea 1933->1937 1934->1938 1939 10004300 #825 1934->1939 1940 10004360 2 API calls 1935->1940 1941 10004300 #825 1936->1941 1937->1893 1938->1893 1939->1935 1940->1938 1942 100044d8 1941->1942 1942->1893 1944 10004151 1943->1944 1945 1000430b 1943->1945 1944->1859 1945->1944 1946 10004322 #825 1945->1946 1946->1944 1950 100050a0 1947->1950 1949 1000134b 1949->1834 1949->1835 1951 100050b5 GetCurrentThreadId 1950->1951 1953 100050d9 1951->1953 1955 100050e8 1951->1955 1953->1949 1954 100050fd 1954->1949 1955->1954 1956 10004a70 VirtualQuery 1955->1956 1957 10005137 1956->1957 1958 10004a70 VirtualQuery 1957->1958 1960 10005149 1958->1960 1959 1000535b 1959->1949 1961 1000516f #823 1960->1961 1962 10005151 1960->1962 1961->1962 1963 1000518e 1961->1963 1962->1959 1965 10005352 #825 1962->1965 1976 100053c0 1963->1976 1965->1959 1966 10005e50 SetLastError 1971 10005194 1966->1971 1967 10005262 1967->1962 1968 10005bf0 22 API calls 1967->1968 1969 100052f1 1968->1969 1970 10005329 GetLastError 1969->1970 1984 100055f0 VirtualQuery 1969->1984 1970->1962 1971->1962 1971->1966 1971->1967 1974 10005bf0 22 API calls 1975 10005325 1974->1975 1975->1954 1975->1970 1980 100053d3 1976->1980 1977 10005566 1977->1971 1978 10005496 VirtualQuery 1978->1980 1981 100054c9 1978->1981 1979 10005500 VirtualQuery 1979->1977 1979->1981 1980->1977 1980->1978 1980->1981 1982 100054cb VirtualAlloc 1980->1982 1981->1977 1981->1979 1983 10005543 VirtualAlloc 1981->1983 1982->1977 1982->1981 1983->1977 1983->1981 1985 100052fb 1984->1985 1985->1954 1985->1974 1357 10004682 1358 1000468a 1357->1358 1359 10004691 #826 1358->1359 1360 10004697 1358->1360 1359->1360 1312 10004824 1313 1000485b 1312->1313 1314 1000482b LocalAlloc 1312->1314 1316 10004862 #1173 #1240 1313->1316 1317 1000486f 1313->1317 1315 1000483c LocalFree #1173 #1240 1314->1315 1314->1317 1315->1317 1316->1317 1361 10003210 1362 10003224 1361->1362 1363 1000321a 1361->1363 1363->1362 1364 1000322a #825 1363->1364 1364->1362 1423 100010b0 1426 100027d0 1423->1426 1429 10002740 1426->1429 1430 10002749 1429->1430 1446 100010b8 #2717 1429->1446 1447 10004ba0 1430->1447 1432 1000274e GetCurrentThread 1454 10005000 1432->1454 1434 1000275a 1461 10005690 GetCurrentThreadId 1434->1461 1436 1000276b 1437 10002785 1436->1437 1438 10005690 27 API calls 1436->1438 1439 10005690 27 API calls 1437->1439 1438->1437 1440 10002796 1439->1440 1441 10005690 27 API calls 1440->1441 1442 100027a7 1441->1442 1443 10005690 27 API calls 1442->1443 1444 100027b8 1443->1444 1475 10004d40 1444->1475 1448 10004bb3 GetCurrentThreadId InterlockedCompareExchange 1447->1448 1449 10004bac 1447->1449 1450 10004bd1 1448->1450 1451 10004bca 1448->1451 1449->1432 1478 10004c00 1450->1478 1451->1432 1455 1000500b GetCurrentThread 1454->1455 1459 10005064 1454->1459 1456 10005019 #823 1455->1456 1455->1459 1457 10005030 SuspendThread 1456->1457 1458 10005029 1456->1458 1457->1459 1460 1000503c GetLastError #825 1457->1460 1458->1434 1459->1434 1460->1458 1462 100056b0 1461->1462 1463 100056a3 1461->1463 1464 100056c5 1462->1464 1465 100056f0 #823 1462->1465 1463->1436 1464->1436 1466 10005700 1465->1466 1467 1000570a 1465->1467 1466->1464 1469 100057ac #825 1466->1469 1526 10004a70 1467->1526 1469->1464 1470 10005719 1470->1466 1471 10005bf0 22 API calls 1470->1471 1472 10005757 1471->1472 1473 10005765 1472->1473 1474 1000575b GetLastError 1472->1474 1473->1436 1474->1466 1533 10004d50 1475->1533 1477 10004d47 1477->1446 1479 10004bf4 1478->1479 1480 10004c0c 1478->1480 1479->1432 1480->1479 1482 10005bf0 1480->1482 1493 10005d10 1482->1493 1484 10005c07 CreateFileA 1485 10005cc1 1484->1485 1486 10005c35 WriteFile CloseHandle 1484->1486 1489 10005bc0 16 API calls 1485->1489 1487 10005cf5 1486->1487 1488 10005c9b 1486->1488 1487->1480 1499 10005bc0 1488->1499 1491 10005ce8 1489->1491 1491->1480 1494 10005d23 1493->1494 1495 10005d55 1493->1495 1494->1484 1496 10005ddb 1495->1496 1497 10005d80 sprintf CreateFileA 1495->1497 1496->1484 1497->1495 1498 10005df0 CloseHandle 1497->1498 1498->1484 1502 10005ad0 1499->1502 1501 10005bde 1501->1480 1503 10005ada GetModuleHandleA GetProcAddress 1502->1503 1504 10005b2d VirtualAlloc 1502->1504 1511 10005a40 GetModuleHandleA 1503->1511 1505 10005b44 1504->1505 1506 10005b5b VirtualFree 1504->1506 1505->1501 1506->1501 1508 10005b05 1508->1504 1510 10005b54 1508->1510 1510->1501 1518 10005900 strchr 1511->1518 1513 10005a6c 1513->1508 1514 10005a63 1514->1513 1515 10005a93 1514->1515 1516 10005a83 free 1514->1516 1517 10005aa0 free 1515->1517 1516->1508 1517->1508 1519 10005993 1518->1519 1520 1000592f GetSystemDirectoryA 1518->1520 1521 100059b1 fopen 1519->1521 1520->1521 1522 10005a24 1521->1522 1523 100059cf fseek ftell fseek malloc 1521->1523 1522->1514 1524 100059fc fread 1523->1524 1525 10005a0d fclose 1523->1525 1524->1525 1525->1514 1527 10004a7a 1526->1527 1528 10004a81 1526->1528 1527->1470 1530 10004aa5 1528->1530 1531 10004ae0 VirtualQuery 1528->1531 1530->1470 1532 10004b2a 1531->1532 1532->1530 1534 10004d61 1533->1534 1535 10004d69 GetCurrentThreadId 1533->1535 1534->1535 1536 10004d86 1535->1536 1537 10004d77 1535->1537 1538 10004da2 1536->1538 1539 10004d8e 1536->1539 1537->1477 1555 10004e6a 1538->1555 1567 10005e50 1538->1567 1557 10004c30 GetCurrentThreadId 1539->1557 1541 10004d93 1541->1477 1542 10004f1b GetCurrentProcess 1553 10004f8d 1542->1553 1554 10004f2d 1542->1554 1543 10004e7e GetThreadContext 1543->1555 1546 10004f19 1546->1542 1547 10005bf0 22 API calls 1550 10004f4e FlushInstructionCache 1547->1550 1549 10004fc1 1549->1477 1552 10004f7c #825 1550->1552 1550->1554 1551 10004faa ResumeThread #825 1551->1549 1551->1551 1552->1553 1552->1554 1571 10004ce0 1553->1571 1554->1547 1554->1552 1555->1542 1555->1543 1555->1546 1556 10004eee SetThreadContext 1555->1556 1556->1555 1558 10004c3f 1557->1558 1566 10004c46 1557->1566 1558->1541 1559 10004c99 1561 10004ce0 22 API calls 1559->1561 1560 10005bf0 22 API calls 1560->1566 1564 10004ca4 1561->1564 1562 10004c88 #825 1562->1559 1562->1566 1563 10004ccc 1563->1541 1564->1563 1565 10004cb5 ResumeThread #825 1564->1565 1565->1563 1565->1565 1566->1559 1566->1560 1566->1562 1568 10005e66 1567->1568 1575 10005ed0 1568->1575 1570 10005e79 1570->1538 1572 10004d05 1571->1572 1573 10004cec 1571->1573 1572->1549 1572->1551 1573->1572 1574 10005bf0 22 API calls 1573->1574 1574->1573 1576 10005ed9 1575->1576 1577 10005ef2 1576->1577 1578 10005ee4 SetLastError 1576->1578 1577->1570 1578->1570 1579 100013b0 1584 10001400 1579->1584 1581 100013d0 1582 100013e0 NtOpenKey 1581->1582 1583 100013d7 1581->1583 1654 10001150 #540 1584->1654 1586 10001429 1587 10001444 wcslen 1586->1587 1588 1000146b #861 1586->1588 1589 10001451 #942 #942 1587->1589 1590 10001474 1587->1590 1588->1590 1589->1590 1664 10001930 1590->1664 1592 1000148d _wcsicmp 1593 100014d9 1592->1593 1594 100014a9 1592->1594 1596 100014db #800 1593->1596 1595 10001930 10 API calls 1594->1595 1597 100014ba _wcsicmp #800 1595->1597 1598 10001506 1596->1598 1624 100014ed #800 1596->1624 1597->1593 1597->1596 1600 10001514 1598->1600 1601 1000161e 1598->1601 1602 10001930 10 API calls 1600->1602 1672 10001a30 1601->1672 1604 10001523 _wcsicmp 1602->1604 1606 10001569 1604->1606 1607 10001539 1604->1607 1605 1000162d _wcsicmp 1608 10001673 1605->1608 1609 10001643 1605->1609 1613 1000156b #800 1606->1613 1611 10001930 10 API calls 1607->1611 1610 10001675 #800 1608->1610 1612 10001a30 10 API calls 1609->1612 1614 100016a0 1610->1614 1610->1624 1615 1000154a _wcsicmp #800 1611->1615 1616 10001654 _wcsicmp #800 1612->1616 1617 10001596 1613->1617 1613->1624 1619 100016ac 1614->1619 1620 100017cd _wcsicmp 1614->1620 1615->1606 1615->1613 1616->1608 1616->1610 1618 10001930 10 API calls 1617->1618 1621 100015a7 _wcsicmp 1618->1621 1622 10001a30 10 API calls 1619->1622 1623 100017e1 1620->1623 1620->1624 1625 100015ed 1621->1625 1626 100015bd 1621->1626 1627 100016bd _wcsicmp 1622->1627 1680 10001b30 #538 #942 #942 wcslen 1623->1680 1624->1581 1632 100015ef #800 1625->1632 1629 10001930 10 API calls 1626->1629 1630 10001703 1627->1630 1631 100016d3 1627->1631 1634 100015ce _wcsicmp #800 1629->1634 1636 10001705 #800 1630->1636 1635 10001a30 10 API calls 1631->1635 1632->1624 1633 100017f0 _wcsicmp #800 1633->1624 1637 1000180f 1633->1637 1634->1625 1634->1632 1638 100016e4 _wcsicmp #800 1635->1638 1636->1624 1639 10001730 1636->1639 1640 10001843 1637->1640 1641 10001817 _wcsicmp 1637->1641 1638->1630 1638->1636 1642 10001a30 10 API calls 1639->1642 1643 10001866 1640->1643 1644 1000184b _wcsicmp 1640->1644 1641->1624 1647 10001741 _wcsicmp 1642->1647 1645 10001893 1643->1645 1646 1000186e _wcsicmp 1643->1646 1644->1624 1645->1624 1648 1000189b #800 1645->1648 1646->1624 1649 10001787 1647->1649 1650 10001757 1647->1650 1648->1581 1652 10001789 #800 1649->1652 1651 10001a30 10 API calls 1650->1651 1653 10001768 _wcsicmp #800 1651->1653 1652->1624 1653->1649 1653->1652 1655 10001235 #535 #800 1654->1655 1656 1000118f LoadLibraryW 1654->1656 1655->1586 1656->1655 1657 100011a8 GetProcAddress 1656->1657 1658 100011bb 1657->1658 1660 10001229 1657->1660 1659 100011d8 #823 1658->1659 1658->1660 1659->1660 1661 100011f5 1659->1661 1660->1655 1662 10001220 #825 1661->1662 1663 10001209 #861 1661->1663 1662->1660 1663->1662 1665 10001982 #538 1664->1665 1666 10001957 1664->1666 1668 100019ab #942 #942 wcslen 1665->1668 1669 1000199d #942 1665->1669 1666->1665 1667 10001960 #538 1666->1667 1667->1592 1670 100019f3 #535 #800 1668->1670 1671 100019db #942 #942 1668->1671 1669->1668 1670->1592 1671->1670 1673 10001a82 #538 1672->1673 1674 10001a57 1672->1674 1676 10001aab #942 #942 wcslen 1673->1676 1677 10001a9d #942 1673->1677 1674->1673 1675 10001a60 #538 1674->1675 1675->1605 1678 10001af3 #535 #800 1676->1678 1679 10001adb #942 #942 1676->1679 1677->1676 1678->1605 1679->1678 1681 10001bb0 #535 #800 1680->1681 1682 10001b98 #942 #942 1680->1682 1681->1633 1682->1681 1683 100031b0 MultiByteToWideChar SetDllPathW 1768 100010d0 1771 10001270 InitializeCriticalSection GetModuleHandleA GetProcAddress 1768->1771 1770 100010df GetModuleFileNameW LoadLibraryW #3948 1772 100012ad 10 API calls 1771->1772 1773 1000129f GetCurrentProcess 1771->1773 1772->1770 1773->1772 1774 10004650 1779 1000465a 1774->1779 1776 10004655 1781 100048aa 1776->1781 1780 10004664 #269 1779->1780 1780->1776 1784 1000487e 1781->1784 1783 100046ac 1785 10004893 __dllonexit 1784->1785 1786 10004887 _onexit 1784->1786 1785->1783 1786->1783 1986 10001070 1987 10001075 1986->1987 1988 100048aa 2 API calls 1987->1988 1989 1000109a 1988->1989 1990 10001bf0 1991 10001400 72 API calls 1990->1991 1992 10001c10 1991->1992 1993 10001c20 NtOpenKeyEx 1992->1993 1994 10001c17 1992->1994 1365 10004a18 ??1type_info@@UAE 1366 10004a27 #825 1365->1366 1367 10004a2e 1365->1367 1366->1367 1684 100046b8 1687 10004a34 1684->1687 1686 100046c2 #6466 #1571 1687->1686 1688 100043b9 1689 100043c6 1688->1689 1690 100043c8 #823 1688->1690 1689->1690 1787 100043da 1788 100043e0 1787->1788 1789 1000441d 1788->1789 1790 10004423 #825 1788->1790 1790->1789 1318 1000497b 1319 1000498e 1318->1319 1324 10004997 1318->1324 1320 100049bf 1319->1320 1333 100046fd 1319->1333 1321 100049b3 1350 100048d0 1321->1350 1324->1319 1324->1320 1324->1321 1327 100049df 1327->1320 1329 100049e8 1327->1329 1328 100049d7 1331 100048d0 3 API calls 1328->1331 1330 100048d0 3 API calls 1329->1330 1332 100049f0 1330->1332 1331->1327 1332->1320 1334 100047a0 1333->1334 1335 1000470d #1115 #1173 #1568 1333->1335 1338 100047a6 #1240 #1173 #1165 1334->1338 1339 100047ec 1334->1339 1336 10004754 #1570 1335->1336 1337 10004736 #1165 1335->1337 1344 10004789 #1173 #1240 1336->1344 1340 10004742 1337->1340 1341 1000475b #1179 #823 1337->1341 1345 100047c6 1338->1345 1346 100047cd #1194 #1563 #1570 #1248 1338->1346 1342 100047f2 #6466 #1194 #1563 #1250 1339->1342 1343 1000481c 1339->1343 1340->1341 1349 1000474d 1340->1349 1347 10004782 1341->1347 1348 10004778 #342 1341->1348 1342->1343 1343->1320 1343->1327 1343->1328 1344->1343 1345->1346 1346->1343 1347->1344 1348->1347 1349->1336 1351 100048d8 1350->1351 1352 100048f9 malloc 1351->1352 1353 1000490e 1351->1353 1355 10004938 1351->1355 1352->1353 1354 10004912 _initterm 1352->1354 1353->1319 1354->1353 1355->1353 1356 10004965 free 1355->1356 1356->1353

    Control-flow Graph

    APIs
    • #1115.MFC42U(?,?,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 10004714
    • #1173.MFC42U(?,?,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 10004719
    • #1568.MFC42U(?,00000000,10009E80,00000000,?,?,?,?,?,?,100049CB,?,?,?,?,?), ref: 1000472D
    • #1165.MFC42U(?,00000000,10009E80,00000000,?,?,?,?,?,?,100049CB,?,?,?,?,?), ref: 10004736
    • #1570.MFC42U(?,00000000,10009E80,00000000,?,?,?,?,?,?,100049CB,?,?,?,?,?), ref: 10004754
    • #1179.MFC42U(1000BF18,?,?,00000000,10009E80,00000000,?,?,?,?,?,?,100049CB,?,?,?), ref: 10004767
    • #823.MFC42U(00000040,1000BF18,?,?,00000000,10009E80,00000000,?,?,?,?,?,?,100049CB,?,?), ref: 1000476E
    • #342.MFC42U(1000BF18,00000000,1000BF18,?,?,00000000,10009E80,00000000,?,?,?,?,?,?,100049CB,?), ref: 1000477D
    • #1173.MFC42U(?,00000000,10009E80,00000000,?,?,?,?,?,?,100049CB,?,?,?,?,?), ref: 1000478C
    • #1240.MFC42U(?,?,00000000,10009E80,00000000,?,?,?,?,?,?,100049CB,?,?,?,?), ref: 10004794
    • #1240.MFC42U(10009E88,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 100047AB
    • #1173.MFC42U(10009E88,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 100047B2
    • #1165.MFC42U(10009E88,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 100047BA
    • #1194.MFC42U(10009E88,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 100047CD
    • #1563.MFC42U(000000FF,10009E88,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 100047D4
    • #1570.MFC42U(000000FF,10009E88,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 100047D9
    • #1248.MFC42U(1000BF18,00000001,000000FF,10009E88,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 100047E5
    • #6466.MFC42U(10009E88,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 100047FA
    • #1194.MFC42U(10009E88,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 100047FF
    • #1563.MFC42U(000000FF,10009E88,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 10004806
    • #1250.MFC42U(?,000000FF,10009E88,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 1000480E
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: #1173$#1165#1194#1240#1563#1570$#1115#1179#1248#1250#1568#342#6466#823
    • String ID:
    • API String ID: 933591048-0
    • Opcode ID: 7f323cdebafc7876504ee1737dfc2f78bcaa5341956db8968ccd7249556f25ef
    • Instruction ID: 42ede1d6eba9dc7262db5c255ebf041a762cd8e3cbd004f8f20c7d1455e4ffb0
    • Opcode Fuzzy Hash: 7f323cdebafc7876504ee1737dfc2f78bcaa5341956db8968ccd7249556f25ef
    • Instruction Fuzzy Hash: 3931B278100240AFFB10DFA1CC85A9D77A6EF853D0F228519F9285B26ACF70FE419A95

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 19 10004824-10004829 20 1000485b-10004860 19->20 21 1000482b-1000483a LocalAlloc 19->21 24 10004862-1000486a #1173 #1240 20->24 25 1000486f-10004871 20->25 22 10004872 21->22 23 1000483c-10004859 LocalFree #1173 #1240 21->23 23->25 24->25 25->22
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: #1173#1240Local$AllocFree
    • String ID:
    • API String ID: 762571471-0
    • Opcode ID: ad6df8680ab0087f5d550da1c51120c5d9966c5a9941d94eac5dffd23f89fe7e
    • Instruction ID: 4b1118c17bfbf70476295644f1baa115cc6297c41b66d740b9089c34fbbeaa8b
    • Opcode Fuzzy Hash: ad6df8680ab0087f5d550da1c51120c5d9966c5a9941d94eac5dffd23f89fe7e
    • Instruction Fuzzy Hash: 85E09270904391AAF220DB60CC4AB4E66D5EB453D2F22C828F708A50A9CF70E880C794

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 155 10001c40-10001c57 156 100020fb-10002112 NtQueryKey 155->156 157 10001c5d-10001c6f call 10001920 155->157 160 10001cf5-10001cfa 157->160 161 10001c75-10001ca1 call 10001930 wcslen #800 157->161 162 10001d65-10001d6a 160->162 163 10001cfc-10001d28 call 10001930 wcslen #800 160->163 173 100020e4-100020e6 161->173 174 10001ca7-10001ca9 161->174 166 10001dd5-10001dda 162->166 167 10001d6c-10001d98 call 10001930 wcslen #800 162->167 163->173 177 10001d2e-10001d30 163->177 169 10001e45-10001e4a 166->169 170 10001ddc-10001e08 call 10001a30 wcslen #800 166->170 167->173 188 10001d9e-10001da0 167->188 178 10001eb5-10001eba 169->178 179 10001e4c-10001e78 call 10001a30 wcslen #800 169->179 170->173 190 10001e0e-10001e10 170->190 173->156 175 100020e8-100020ea 173->175 174->173 181 10001caf-10001cd5 call 10001930 wcscpy 174->181 175->156 182 100020ec-100020f8 175->182 177->173 186 10001d36-10001d60 call 10001930 wcscpy 177->186 184 10001f25-10001f2a 178->184 185 10001ebc-10001ee8 call 10001a30 wcslen #800 178->185 179->173 206 10001e7e-10001e80 179->206 199 10001cd9-10001ce4 #800 181->199 193 10001f91-10001f96 184->193 194 10001f2c-10001f56 call 10001b30 wcslen #800 184->194 185->173 215 10001eee-10001ef0 185->215 186->199 188->173 196 10001da6-10001dd0 call 10001930 wcscpy 188->196 190->173 200 10001e16-10001e3c call 10001a30 wcscpy 190->200 202 10001f98-10001fc2 call 10001b30 wcslen #800 193->202 203 10001ffd-10002002 193->203 194->173 218 10001f5c-10001f5e 194->218 196->199 212 10001cea-10001cf2 199->212 213 100020db-100020e1 199->213 200->169 202->173 229 10001fc8-10001fca 202->229 207 10002004-1000202e call 10001b30 wcslen #800 203->207 208 10002069-1000206e 203->208 206->173 210 10001e86-10001eac call 10001a30 wcscpy 206->210 207->173 230 10002034-10002036 207->230 208->156 220 10002074-1000209e call 10001b30 wcslen #800 208->220 210->178 215->173 222 10001ef6-10001f1c call 10001a30 wcscpy 215->222 218->173 225 10001f64-10001f88 call 10001b30 wcscpy 218->225 220->173 237 100020a0-100020a2 220->237 222->184 225->193 229->173 234 10001fd0-10001ff4 call 10001b30 wcscpy 229->234 230->173 235 1000203c-10002060 call 10001b30 wcscpy 230->235 234->203 235->208 237->173 240 100020a4-100020d7 call 10001b30 wcscpy #800 237->240 240->213 245 100020d9 240->245 245->213
    APIs
    • wcslen.MSVCRT ref: 10001C89
    • wcscpy.MSVCRT ref: 10001CCC
    • #800.MFC42U ref: 10001C9A
      • Part of subcall function 10001930: #538.MFC42U(10009064,?,?,?,1000646F,000000FF,10001D7D,?,CurVer), ref: 1000198C
      • Part of subcall function 10001930: #942.MFC42U(\Wow6432Node,10009064,?,?,?,1000646F,000000FF), ref: 100019A6
      • Part of subcall function 10001930: #942.MFC42U(10009188,10009064,?,?,?,1000646F,000000FF), ref: 100019B4
      • Part of subcall function 10001930: #942.MFC42U(00000000,10009188,10009064,?,?,?,1000646F,000000FF), ref: 100019C4
      • Part of subcall function 10001930: wcslen.MSVCRT ref: 100019CE
      • Part of subcall function 10001930: #942.MFC42U(10009188), ref: 100019E4
      • Part of subcall function 10001930: #942.MFC42U(?,10009188), ref: 100019EE
      • Part of subcall function 10001930: #535.MFC42U(?), ref: 100019FE
      • Part of subcall function 10001930: #800.MFC42U ref: 10001A14
    • #800.MFC42U ref: 10001CD9
    • wcslen.MSVCRT ref: 10001D10
    • #800.MFC42U ref: 10001D21
    • wcscpy.MSVCRT ref: 10001D53
      • Part of subcall function 10001930: #538.MFC42U(xyxyoorljfoleuwrljfoulerfksdor,?,?,?,1000646F,000000FF,10001D7D,?,CurVer), ref: 1000196B
    • wcslen.MSVCRT ref: 10001D80
    • #800.MFC42U ref: 10001D91
    • wcscpy.MSVCRT ref: 10001DC3
    • wcslen.MSVCRT ref: 10001DF0
    • #800.MFC42U ref: 10001E01
    • wcscpy.MSVCRT ref: 10001E33
    • wcslen.MSVCRT ref: 10001E60
    • wcscpy.MSVCRT ref: 10001EA3
    • #800.MFC42U ref: 10001E71
      • Part of subcall function 10001A30: #538.MFC42U(10009064,?,?,?,1000649F,000000FF,10001ECD,?,ProgID), ref: 10001A8C
      • Part of subcall function 10001A30: #942.MFC42U(\Wow6432Node,10009064,?,?,?,1000649F,000000FF), ref: 10001AA6
      • Part of subcall function 10001A30: #942.MFC42U(\CLSID\,10009064,?,?,?,1000649F,000000FF), ref: 10001AB4
      • Part of subcall function 10001A30: #942.MFC42U(00000000,\CLSID\,10009064,?,?,?,1000649F,000000FF), ref: 10001AC4
      • Part of subcall function 10001A30: wcslen.MSVCRT ref: 10001ACE
      • Part of subcall function 10001A30: #942.MFC42U(10009188), ref: 10001AE4
      • Part of subcall function 10001A30: #942.MFC42U(?,10009188), ref: 10001AEE
      • Part of subcall function 10001A30: #535.MFC42U(?), ref: 10001AFE
      • Part of subcall function 10001A30: #800.MFC42U ref: 10001B14
    • wcslen.MSVCRT ref: 10001ED0
    • #800.MFC42U ref: 10001EE1
    • wcscpy.MSVCRT ref: 10001F13
      • Part of subcall function 10001A30: #538.MFC42U(xyxyoorljfoleuwrljfoulerfksdor,?,?,?,1000649F,000000FF,10001ECD,?,ProgID), ref: 10001A6B
    • NtQueryKey.NTDLL(?,?,?,?,?), ref: 10002108
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: #942$#800$wcslen$wcscpy$#538$#535$Query
    • String ID: 1.0$1.0\0$1.0\0\win32$CLSID$CurVer$InprocServer32$ProgID
    • API String ID: 3364588600-3032651770
    • Opcode ID: c6407b952052ce94e40f9a31da8d2529fe4a30389a6ec89255647bc4872f7d82
    • Instruction ID: e210364aa1a478c15cfc260ae6af40ed4357581bce4cc658cafd6358c502b614
    • Opcode Fuzzy Hash: c6407b952052ce94e40f9a31da8d2529fe4a30389a6ec89255647bc4872f7d82
    • Instruction Fuzzy Hash: 9CD1A071900301AFF710DF58CC84EDBB7A8EF842C8F414958F6859715AEB35EA58CBA2

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 246 10002120-10002144 call 10001920 249 1000214a-1000214f 246->249 250 1000258f-100025ab 246->250 251 10002151-10002167 wcslen 249->251 252 100021b2-100021b7 249->252 254 10002541-10002543 251->254 255 1000216d-1000216f 251->255 256 100021b9-100021cf wcslen 252->256 257 1000221a-1000221f 252->257 254->250 261 10002545-10002547 254->261 255->254 262 10002175-100021a1 wcscpy 255->262 256->254 258 100021d5-100021d7 256->258 259 10002221-10002237 wcslen 257->259 260 10002282-10002287 257->260 258->254 263 100021dd-10002209 wcscpy 258->263 259->254 264 1000223d-1000223f 259->264 265 10002289-1000229f wcslen 260->265 266 100022ea-100022ef 260->266 261->250 267 10002549-10002555 261->267 268 100021a7-100021af 262->268 269 10002538-1000253e 262->269 263->269 270 1000220f-10002217 263->270 264->254 271 10002245-10002271 wcscpy 264->271 265->254 272 100022a5-100022a7 265->272 273 100022f5-100022fe 266->273 274 1000241d-10002422 266->274 271->269 277 10002277-1000227f 271->277 272->254 278 100022ad-100022d9 wcscpy 272->278 279 10002304-10002317 _wcsicmp 273->279 280 1000239d-100023c2 call 100025b0 wcslen #800 273->280 275 10002424-10002439 wcslen 274->275 276 10002466-1000246b 274->276 275->254 282 1000243f-10002441 275->282 283 10002471-10002476 276->283 284 10002558-1000256c wcslen 276->284 278->269 286 100022df-100022e7 278->286 279->280 281 1000231d-10002331 _wcsicmp 279->281 280->254 295 100023c8-100023ca 280->295 281->250 287 10002337-1000235c call 10002640 wcslen #800 281->287 282->254 288 10002447-10002460 282->288 283->284 289 1000247c-10002481 283->289 284->254 291 1000256e-10002570 284->291 287->254 301 10002362-10002364 287->301 288->276 293 100024c2-100024c7 289->293 294 10002483-10002497 wcslen 289->294 291->254 296 10002572-10002585 291->296 293->250 300 100024cd-100024f2 call 100025b0 wcslen #800 293->300 294->254 298 1000249d-1000249f 294->298 295->254 299 100023d0-100023fd call 100025b0 wcscpy 295->299 296->250 298->254 302 100024a5-100024b8 298->302 310 10002401-1000240c #800 299->310 300->254 308 100024f4-100024f6 300->308 301->254 306 1000236a-1000239b call 10002640 wcscpy 301->306 302->293 306->310 308->254 312 100024f8-10002534 call 100025b0 wcscpy #800 308->312 310->269 311 10002412-1000241a 310->311 312->269 316 10002536 312->316 316->269
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: wcslen$wcscpy$QueryValue
    • String ID: InprocServer32$ThreadingModel$+8w`+8w
    • API String ID: 3495438468-3456325871
    • Opcode ID: c4260f03a4103386327f907f49e4696b6fc99d7f62d9331459b1c1bf3e83a945
    • Instruction ID: 2ef2c71096b13ae9e457a76c590163092a74dd924769b1517c816b7175000df9
    • Opcode Fuzzy Hash: c4260f03a4103386327f907f49e4696b6fc99d7f62d9331459b1c1bf3e83a945
    • Instruction Fuzzy Hash: D7C1D171900A118FE720DF58DCD8A9BB7E4EF443C9F01881DEC4997259E775E984CBA1

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 351 10001150-10001189 #540 352 10001235-1000126d #535 #800 351->352 353 1000118f-100011a2 LoadLibraryW 351->353 353->352 354 100011a8-100011b9 GetProcAddress 353->354 355 100011bb-100011d6 354->355 356 1000122d-10001234 354->356 355->356 359 100011d8-100011f3 #823 355->359 356->352 360 100011f5-10001207 359->360 361 10001229 359->361 363 10001220-10001226 #825 360->363 364 10001209-1000121b #861 360->364 361->356 363->361 364->363
    APIs
    • #540.MFC42U(?,?,?,?,?,?), ref: 10001176
    • LoadLibraryW.KERNEL32(ntdll.dll,?,?,?,?,?,?,?,?,?), ref: 10001194
    • GetProcAddress.KERNEL32(00000000,ZwQueryKey), ref: 100011AF
    • #823.MFC42U(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 100011E7
    • #861.MFC42U(00000004), ref: 1000121B
    • #825.MFC42U(00000000), ref: 10001221
    • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 1000122E
    • #535.MFC42U(?,?,?,?,?,?,?,?,?,?), ref: 10001240
    • #800.MFC42U(?,?,?,?,?,?,?,?,?,?), ref: 10001256
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: Library$#535#540#800#823#825#861AddressFreeLoadProc
    • String ID: ZwQueryKey$ntdll.dll$#v
    • API String ID: 2613158826-532945629
    • Opcode ID: bc5bbe6214aa5001c3c70daa38219ac9ccd12220b36cb51efc90beb907280d54
    • Instruction ID: d3dea8be48ffa99f9d5f34d600dd3274f25f708f68bf231c1563c345e68523fd
    • Opcode Fuzzy Hash: bc5bbe6214aa5001c3c70daa38219ac9ccd12220b36cb51efc90beb907280d54
    • Instruction Fuzzy Hash: 5D31BCB1404711AFE311DF24D810B9FB7E8EF84794F014A1CF899A3284EB78AA058B92
    APIs
    • GetCurrentThread.KERNEL32 ref: 1000132E
      • Part of subcall function 10005000: GetCurrentThread.KERNEL32 ref: 1000500B
      • Part of subcall function 10005000: #823.MFC42U(00000008,?,?,1000133A,00000000), ref: 1000501B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: CurrentThread$#823
    • String ID: +8w`+8w
    • API String ID: 2256706878-1206657199
    • Opcode ID: c41dc582fd7d3d25659f81c57e003db572b79c8ce65fd5bf5e1237c1e7517899
    • Instruction ID: 1c844b3ada017ffef8954220178e01bb0eba6057380872ac48717b903644d3b2
    • Opcode Fuzzy Hash: c41dc582fd7d3d25659f81c57e003db572b79c8ce65fd5bf5e1237c1e7517899
    • Instruction Fuzzy Hash: B4F0C9386C42417AF620EBE18CAAFDE7294EB047C2FA00100F3C17549EDF56B80442AF
    APIs
    • GetCurrentThread.KERNEL32 ref: 1000274E
      • Part of subcall function 10005000: GetCurrentThread.KERNEL32 ref: 1000500B
      • Part of subcall function 10005000: #823.MFC42U(00000008,?,?,1000133A,00000000), ref: 1000501B
      • Part of subcall function 10005690: GetCurrentThreadId.KERNEL32 ref: 10005695
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: CurrentThread$#823
    • String ID: +8w`+8w
    • API String ID: 2256706878-1206657199
    • Opcode ID: ef6cfeca544553a4b11261b592324b11a2f61a3ae37f80f60449017bf63b78fa
    • Instruction ID: dae003e1be8c417d5ea86d2a72ceb7b366742516b4632fbbe64b49f091171ea8
    • Opcode Fuzzy Hash: ef6cfeca544553a4b11261b592324b11a2f61a3ae37f80f60449017bf63b78fa
    • Instruction Fuzzy Hash: DCF0C0386C424176F660EFF18C8AFCA7198DB046D2FE10104F345760DDDF66B800452E
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: Close
    • String ID: `+8w
    • API String ID: 3535843008-4152678778
    • Opcode ID: e3c92ded4a8899102a8526a9b3a3cb14f1cb9637af0b23d7e3f82045eea80f8d
    • Instruction ID: d58ee0143c4e84a4a31dd44e0198682171cedcd0fe59b2b7354f87470e681304
    • Opcode Fuzzy Hash: e3c92ded4a8899102a8526a9b3a3cb14f1cb9637af0b23d7e3f82045eea80f8d
    • Instruction Fuzzy Hash: E8F07E62C0D4A899F8E3D514E4C4BEE61F4DB541D0F208C13E00BD1AEDD924DCD9C197
    APIs
      • Part of subcall function 10001400: wcslen.MSVCRT ref: 10001444
      • Part of subcall function 10001400: #942.MFC42U(10009188), ref: 1000145A
      • Part of subcall function 10001400: #942.MFC42U(?,10009188), ref: 10001464
      • Part of subcall function 10001400: _wcsicmp.MSVCRT ref: 100014A0
      • Part of subcall function 10001400: _wcsicmp.MSVCRT ref: 100014C2
      • Part of subcall function 10001400: #800.MFC42U ref: 100014D0
      • Part of subcall function 10001400: #800.MFC42U ref: 100014E4
      • Part of subcall function 10001400: #800.MFC42U ref: 100018F7
    • NtOpenKeyEx.NTDLL(?,?,?,?), ref: 10001C2C
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: #800$#942_wcsicmp$Openwcslen
    • String ID:
    • API String ID: 700594209-0
    • Opcode ID: 9f983699acc519ee4bead459c80209239c48a1bd57f530d88279fbcdf2017b4b
    • Instruction ID: a5e23e891e6b2d8738890c2112a89ae3c7bba218bb169498b29d81a7e0fae048
    • Opcode Fuzzy Hash: 9f983699acc519ee4bead459c80209239c48a1bd57f530d88279fbcdf2017b4b
    • Instruction Fuzzy Hash: E1F0F87A204211AF9200DA59D844DABB7A9EBC82A0B058D1EF59983205D370E806CBA1
    APIs
      • Part of subcall function 10001400: wcslen.MSVCRT ref: 10001444
      • Part of subcall function 10001400: #942.MFC42U(10009188), ref: 1000145A
      • Part of subcall function 10001400: #942.MFC42U(?,10009188), ref: 10001464
      • Part of subcall function 10001400: _wcsicmp.MSVCRT ref: 100014A0
      • Part of subcall function 10001400: _wcsicmp.MSVCRT ref: 100014C2
      • Part of subcall function 10001400: #800.MFC42U ref: 100014D0
      • Part of subcall function 10001400: #800.MFC42U ref: 100014E4
      • Part of subcall function 10001400: #800.MFC42U ref: 100018F7
    • NtOpenKey.NTDLL(?,?,?), ref: 100013E7
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: #800$#942_wcsicmp$Openwcslen
    • String ID:
    • API String ID: 700594209-0
    • Opcode ID: 22737021b9962da16d3a98351a932d14bc8c8bb6a6554cde58d0721a2b0cb1c1
    • Instruction ID: d080ee723748a318de7459404146d2f74d56df26b67cf6699924f63836542ac6
    • Opcode Fuzzy Hash: 22737021b9962da16d3a98351a932d14bc8c8bb6a6554cde58d0721a2b0cb1c1
    • Instruction Fuzzy Hash: F9E0C97A204251AF9604DB59D884DABF7ECEBD92A0B05891EF69983205D770F806CBA1
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 312f36b74284c62cda4085ceaa7982b1103cabd41ffa0d322e40a81b5375018f
    • Instruction ID: 34d6032b85ffee70737b1779ab684f7f6e397ec16cb9da23845eb6496991dcfc
    • Opcode Fuzzy Hash: 312f36b74284c62cda4085ceaa7982b1103cabd41ffa0d322e40a81b5375018f
    • Instruction Fuzzy Hash: 4752B13774470A4BE70CCE9ACCD11A9B3D3ABC8354B4D863C9A56C3346EDF8A91B8644

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: freadfseek$CriticalSection$ByteCharEnterLeaveMultiWide_wfopenfclosewcscpy
    • String ID: .$0$1$3$3$5$9$A$B$B$C$C$C$C$E$E$E$E$f$o$s$t${${${$}$}$}
    • API String ID: 1882367194-101255485
    • Opcode ID: b8d023a21bba30e2febaa6ecf4fe958fbf8d5c5ec60a7b436212acfc3dcec398
    • Instruction ID: d748a7da786b6bfea15dfe591960893aee9ae8f6c3cef3ff43216ee8acc7db6a
    • Opcode Fuzzy Hash: b8d023a21bba30e2febaa6ecf4fe958fbf8d5c5ec60a7b436212acfc3dcec398
    • Instruction Fuzzy Hash: 69D1C52052D38096E321CF61C894B9BB3F4FFA4384F44691EE69897361E7BA8548C75F

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 71 10001400-10001423 72 10001424 call 10001150 71->72 73 10001429-10001442 72->73 74 10001444-1000144f wcslen 73->74 75 1000146b-1000146f #861 73->75 76 10001451-10001469 #942 * 2 74->76 77 10001474-100014a7 call 10001920 call 10001930 _wcsicmp 74->77 75->77 76->77 82 100014d9 77->82 83 100014a9-100014d7 call 10001930 _wcsicmp #800 77->83 85 100014db-100014eb #800 82->85 83->82 83->85 87 10001506-1000150e 85->87 88 100014ed-10001501 85->88 90 10001514-10001537 call 10001930 _wcsicmp 87->90 91 1000161e-10001641 call 10001a30 _wcsicmp 87->91 89 100018eb-10001913 #800 88->89 96 10001569 90->96 97 10001539-10001567 call 10001930 _wcsicmp #800 90->97 98 10001673 91->98 99 10001643-10001671 call 10001a30 _wcsicmp #800 91->99 103 1000156b-1000157b #800 96->103 97->96 97->103 100 10001675-10001685 #800 98->100 99->98 99->100 104 100016a0-100016a6 100->104 105 10001687-1000169b 100->105 108 10001596-100015bb call 10001930 _wcsicmp 103->108 109 1000157d-10001591 103->109 111 100016ac-100016d1 call 10001a30 _wcsicmp 104->111 112 100017cd-100017db _wcsicmp 104->112 105->89 117 100015ed 108->117 118 100015bd-100015eb call 10001930 _wcsicmp #800 108->118 109->89 123 10001703 111->123 124 100016d3-10001701 call 10001a30 _wcsicmp #800 111->124 115 100017e1-10001809 call 10001b30 _wcsicmp #800 112->115 116 100018d7-100018db 112->116 115->116 132 1000180f-10001815 115->132 120 100018e1-100018e5 116->120 125 100015ef-100015ff #800 117->125 118->117 118->125 120->89 131 10001705-10001715 #800 123->131 124->123 124->131 129 100018c1-100018d5 125->129 130 10001605-10001619 125->130 129->89 130->89 134 10001730-10001755 call 10001a30 _wcsicmp 131->134 135 10001717-1000172b 131->135 136 10001843-10001849 132->136 137 10001817-10001824 _wcsicmp 132->137 148 10001787 134->148 149 10001757-10001785 call 10001a30 _wcsicmp #800 134->149 135->89 140 10001866-1000186c 136->140 141 1000184b-10001858 _wcsicmp 136->141 137->129 138 1000182a-1000183e 137->138 138->89 142 10001893-10001899 140->142 143 1000186e-1000187b _wcsicmp 140->143 141->129 145 1000185a-10001864 141->145 142->129 147 1000189b-100018c0 #800 142->147 143->129 146 1000187d-10001891 143->146 145->120 146->89 151 10001789-10001799 #800 148->151 149->148 149->151 153 100017b4-100017c8 151->153 154 1000179b-100017af 151->154 153->89 154->89
    APIs
      • Part of subcall function 10001150: #540.MFC42U(?,?,?,?,?,?), ref: 10001176
      • Part of subcall function 10001150: LoadLibraryW.KERNEL32(ntdll.dll,?,?,?,?,?,?,?,?,?), ref: 10001194
      • Part of subcall function 10001150: GetProcAddress.KERNEL32(00000000,ZwQueryKey), ref: 100011AF
      • Part of subcall function 10001150: #823.MFC42U(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 100011E7
      • Part of subcall function 10001150: #861.MFC42U(00000004), ref: 1000121B
      • Part of subcall function 10001150: #825.MFC42U(00000000), ref: 10001221
      • Part of subcall function 10001150: FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 1000122E
      • Part of subcall function 10001150: #535.MFC42U(?,?,?,?,?,?,?,?,?,?), ref: 10001240
      • Part of subcall function 10001150: #800.MFC42U(?,?,?,?,?,?,?,?,?,?), ref: 10001256
    • wcslen.MSVCRT ref: 10001444
    • #942.MFC42U(10009188), ref: 1000145A
    • #942.MFC42U(?,10009188), ref: 10001464
      • Part of subcall function 10001930: #538.MFC42U(xyxyoorljfoleuwrljfoulerfksdor,?,?,?,1000646F,000000FF,10001D7D,?,CurVer), ref: 1000196B
    • #861.MFC42U(?), ref: 1000146F
    • _wcsicmp.MSVCRT ref: 100014A0
    • _wcsicmp.MSVCRT ref: 100014C2
    • #800.MFC42U ref: 100014D0
    • #800.MFC42U ref: 100014E4
    • _wcsicmp.MSVCRT ref: 10001530
    • _wcsicmp.MSVCRT ref: 10001552
    • #800.MFC42U ref: 10001560
    • #800.MFC42U ref: 10001574
    • _wcsicmp.MSVCRT ref: 100015B4
    • #800.MFC42U ref: 100015F8
      • Part of subcall function 10001930: #538.MFC42U(10009064,?,?,?,1000646F,000000FF,10001D7D,?,CurVer), ref: 1000198C
      • Part of subcall function 10001930: #942.MFC42U(\Wow6432Node,10009064,?,?,?,1000646F,000000FF), ref: 100019A6
      • Part of subcall function 10001930: #942.MFC42U(10009188,10009064,?,?,?,1000646F,000000FF), ref: 100019B4
      • Part of subcall function 10001930: #942.MFC42U(00000000,10009188,10009064,?,?,?,1000646F,000000FF), ref: 100019C4
      • Part of subcall function 10001930: wcslen.MSVCRT ref: 100019CE
      • Part of subcall function 10001930: #942.MFC42U(10009188), ref: 100019E4
      • Part of subcall function 10001930: #942.MFC42U(?,10009188), ref: 100019EE
      • Part of subcall function 10001930: #535.MFC42U(?), ref: 100019FE
      • Part of subcall function 10001930: #800.MFC42U ref: 10001A14
    • _wcsicmp.MSVCRT ref: 100015D6
    • #800.MFC42U ref: 100015E4
    • _wcsicmp.MSVCRT ref: 1000163A
    • _wcsicmp.MSVCRT ref: 1000165C
    • #800.MFC42U ref: 1000166A
    • #800.MFC42U ref: 1000167E
    • _wcsicmp.MSVCRT ref: 100016CA
    • #800.MFC42U ref: 1000170E
      • Part of subcall function 10001A30: #538.MFC42U(10009064,?,?,?,1000649F,000000FF,10001ECD,?,ProgID), ref: 10001A8C
      • Part of subcall function 10001A30: #942.MFC42U(\Wow6432Node,10009064,?,?,?,1000649F,000000FF), ref: 10001AA6
      • Part of subcall function 10001A30: #942.MFC42U(\CLSID\,10009064,?,?,?,1000649F,000000FF), ref: 10001AB4
      • Part of subcall function 10001A30: #942.MFC42U(00000000,\CLSID\,10009064,?,?,?,1000649F,000000FF), ref: 10001AC4
      • Part of subcall function 10001A30: wcslen.MSVCRT ref: 10001ACE
      • Part of subcall function 10001A30: #942.MFC42U(10009188), ref: 10001AE4
      • Part of subcall function 10001A30: #942.MFC42U(?,10009188), ref: 10001AEE
      • Part of subcall function 10001A30: #535.MFC42U(?), ref: 10001AFE
      • Part of subcall function 10001A30: #800.MFC42U ref: 10001B14
    • _wcsicmp.MSVCRT ref: 100016EC
    • #800.MFC42U ref: 100016FA
    • _wcsicmp.MSVCRT ref: 1000174E
    • _wcsicmp.MSVCRT ref: 10001770
    • #800.MFC42U ref: 1000177E
    • #800.MFC42U ref: 10001792
    • _wcsicmp.MSVCRT ref: 100017D4
    • _wcsicmp.MSVCRT ref: 100017F4
    • #800.MFC42U ref: 10001802
    • _wcsicmp.MSVCRT ref: 1000181D
      • Part of subcall function 10001A30: #538.MFC42U(xyxyoorljfoleuwrljfoulerfksdor,?,?,?,1000649F,000000FF,10001ECD,?,ProgID), ref: 10001A6B
    • #800.MFC42U ref: 100018F7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: #800$_wcsicmp$#942$#538$#535wcslen$#861Library$#540#823#825AddressFreeLoadProc
    • String ID: 1.0$CLSID$CurVer$InprocServer32$ProgID$win32
    • API String ID: 2745223314-3815763076
    • Opcode ID: f4d5b1f6c3545d255a4fc4fa84683b3a68eea10578ae6f7c742b8a78975376ec
    • Instruction ID: e587bc50812e586e2bd60427c8c21f55630403218c68574d11df9dc8f3e29d0e
    • Opcode Fuzzy Hash: f4d5b1f6c3545d255a4fc4fa84683b3a68eea10578ae6f7c742b8a78975376ec
    • Instruction Fuzzy Hash: 1CD16F74209341AFE300DF64CD90BDBB7E8EF896C4F444948F98597295EB35EA05CBA2

    Control-flow Graph

    APIs
    • InitializeCriticalSection.KERNEL32(10009528,?,?,?,100010DF), ref: 10001278
    • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,100010DF), ref: 1000128E
    • GetProcAddress.KERNEL32(00000000), ref: 10001297
    • GetCurrentProcess.KERNEL32(10009540,?,?,?,100010DF), ref: 100012A4
    • GetModuleHandleA.KERNEL32(ntdll.dll,ZwOpenKey,?,?,?,100010DF), ref: 100012B7
    • GetProcAddress.KERNEL32(00000000), ref: 100012BA
    • GetModuleHandleA.KERNEL32(ntdll.dll,ZwOpenKeyEx,?,?,?,100010DF), ref: 100012CB
    • GetProcAddress.KERNEL32(00000000), ref: 100012CE
    • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQueryKey,?,?,?,100010DF), ref: 100012DF
    • GetProcAddress.KERNEL32(00000000), ref: 100012E2
    • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQueryValueKey,?,?,?,100010DF), ref: 100012F3
    • GetProcAddress.KERNEL32(00000000), ref: 100012F6
    • GetModuleHandleA.KERNEL32(ntdll.dll,ZwClose,?,?,?,100010DF), ref: 10001307
    • GetProcAddress.KERNEL32(00000000), ref: 1000130A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: AddressHandleModuleProc$CriticalCurrentInitializeProcessSection
    • String ID: IsWow64Process$ZwClose$ZwOpenKey$ZwOpenKeyEx$ZwQueryKey$ZwQueryValueKey$kernel32$ntdll.dll$+8w`+8w
    • API String ID: 2663015719-2529589178
    • Opcode ID: 172811b13e48408ddf2b8ab4dbaa0b3c0a2e83ca9b17fe80b06286a38d0ff660
    • Instruction ID: bc393e3598cc65d04037417f7a1f03f3b783a77bcc05561d6fd32471d0030434
    • Opcode Fuzzy Hash: 172811b13e48408ddf2b8ab4dbaa0b3c0a2e83ca9b17fe80b06286a38d0ff660
    • Instruction Fuzzy Hash: 42019EA1D042A9AAFA20FBF68C9CDCB7E5CDB842D53110526F7049351ADB798841CFA1

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: wcscat$#800$#4273$#4199#538#825ByteCharMultiWidewcscpy
    • String ID:
    • API String ID: 3218086493-0
    • Opcode ID: 70c7c4ec569e9afcec2c189fa726a6d1e9966894626a76c1a1deb38a02fb74fc
    • Instruction ID: 09f04f280ac1a6942a0064386c88c85055bd1199c361a2afb61791185c8fa687
    • Opcode Fuzzy Hash: 70c7c4ec569e9afcec2c189fa726a6d1e9966894626a76c1a1deb38a02fb74fc
    • Instruction Fuzzy Hash: 3461B271108781ABE715DF24CC91FAFB3A8EF95384F01092CF59583195EF25A909C7A7

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 343 10001a30-10001a55 344 10001a82-10001a9b #538 343->344 345 10001a57-10001a5e 343->345 347 10001aab-10001ad9 #942 * 2 wcslen 344->347 348 10001a9d-10001aa6 #942 344->348 345->344 346 10001a60-10001a81 #538 345->346 349 10001af3-10001b2a #535 #800 347->349 350 10001adb-10001aee #942 * 2 347->350 348->347 350->349
    APIs
    • #538.MFC42U(xyxyoorljfoleuwrljfoulerfksdor,?,?,?,1000649F,000000FF,10001ECD,?,ProgID), ref: 10001A6B
    • #538.MFC42U(10009064,?,?,?,1000649F,000000FF,10001ECD,?,ProgID), ref: 10001A8C
    • #942.MFC42U(\Wow6432Node,10009064,?,?,?,1000649F,000000FF), ref: 10001AA6
    • #942.MFC42U(\CLSID\,10009064,?,?,?,1000649F,000000FF), ref: 10001AB4
    • #942.MFC42U(00000000,\CLSID\,10009064,?,?,?,1000649F,000000FF), ref: 10001AC4
    • wcslen.MSVCRT ref: 10001ACE
    • #942.MFC42U(10009188), ref: 10001AE4
    • #942.MFC42U(?,10009188), ref: 10001AEE
    • #535.MFC42U(?), ref: 10001AFE
    • #800.MFC42U ref: 10001B14
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: #942$#538$#535#800wcslen
    • String ID: \CLSID\$\Wow6432Node$xyxyoorljfoleuwrljfoulerfksdor
    • API String ID: 3153432097-3768299153
    • Opcode ID: b22a3667cfbcf49f25b70c07b9256f71891a999a466759d11f549b470e779f78
    • Instruction ID: 08f889d4e3fb4bb5565a251bfb2ab1b94d4e6ba08e5119c4d5b5a8b23de7f138
    • Opcode Fuzzy Hash: b22a3667cfbcf49f25b70c07b9256f71891a999a466759d11f549b470e779f78
    • Instruction Fuzzy Hash: 1221B0766046619BE300CF14CD51BDAB3E4FF8AA84F40095CF58563299EF79AE04CB93

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 365 10001930-10001955 366 10001982-1000199b #538 365->366 367 10001957-1000195e 365->367 369 100019ab-100019d9 #942 * 2 wcslen 366->369 370 1000199d-100019a6 #942 366->370 367->366 368 10001960-10001981 #538 367->368 371 100019f3-10001a2a #535 #800 369->371 372 100019db-100019ee #942 * 2 369->372 370->369 372->371
    APIs
    • #538.MFC42U(xyxyoorljfoleuwrljfoulerfksdor,?,?,?,1000646F,000000FF,10001D7D,?,CurVer), ref: 1000196B
    • #538.MFC42U(10009064,?,?,?,1000646F,000000FF,10001D7D,?,CurVer), ref: 1000198C
    • #942.MFC42U(\Wow6432Node,10009064,?,?,?,1000646F,000000FF), ref: 100019A6
    • #942.MFC42U(10009188,10009064,?,?,?,1000646F,000000FF), ref: 100019B4
    • #942.MFC42U(00000000,10009188,10009064,?,?,?,1000646F,000000FF), ref: 100019C4
    • wcslen.MSVCRT ref: 100019CE
    • #942.MFC42U(10009188), ref: 100019E4
    • #942.MFC42U(?,10009188), ref: 100019EE
    • #535.MFC42U(?), ref: 100019FE
    • #800.MFC42U ref: 10001A14
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: #942$#538$#535#800wcslen
    • String ID: \Wow6432Node$xyxyoorljfoleuwrljfoulerfksdor
    • API String ID: 3153432097-2372900209
    • Opcode ID: 613f91e10275ba28aa624325a3d1f2c5f689fcc5d62542d8c4307f18b8cd6432
    • Instruction ID: 74bfcef7c59b22db7e0450e734908b9134bfe74a189a17882b269429263cd8d2
    • Opcode Fuzzy Hash: 613f91e10275ba28aa624325a3d1f2c5f689fcc5d62542d8c4307f18b8cd6432
    • Instruction Fuzzy Hash: E721B376504661ABE300CF14CD51BDAB3E4FF89A84F41095CF58553299EF79AE08CB93

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 373 10001b30-10001b96 #538 #942 * 2 wcslen 374 10001bb0-10001be7 #535 #800 373->374 375 10001b98-10001bab #942 * 2 373->375 375->374
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: #942$#535#538#800wcslen
    • String ID: \TypeLib\
    • API String ID: 3775937953-600913956
    • Opcode ID: d121028880f9f37c00128435c4e701899b645a4f73339be2d57e9d9c91fc371a
    • Instruction ID: 97af8a2b816642cbf3e83e4987fe7457cadacbba3d3d35339a73e1d59943db42
    • Opcode Fuzzy Hash: d121028880f9f37c00128435c4e701899b645a4f73339be2d57e9d9c91fc371a
    • Instruction Fuzzy Hash: 4511A3B5108651AFE300DF14CC50B9BBBA4EF85691F00891CF48943299EF35A509CB97

    Control-flow Graph

    APIs
    • wcscpy.MSVCRT ref: 10002813
    • GetModuleHandleW.KERNEL32(00000000,?,00000200), ref: 10002834
    • GetModuleFileNameW.KERNEL32(00000000,?,00000200), ref: 1000283B
    • wcslen.MSVCRT ref: 10002846
    • wcscat.MSVCRT ref: 1000287A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: Module$FileHandleNamewcscatwcscpywcslen
    • String ID: .$Apartment$Both
    • API String ID: 2054667532-1695967614
    • Opcode ID: e66a015e92e41beedde033933ee022f76622b8e0d2b7561b036895c08a9c1864
    • Instruction ID: 8dc09df306f3aeac2cb15477358e42074c0e142bab5dd9a3ac3a12d3aa31bc2b
    • Opcode Fuzzy Hash: e66a015e92e41beedde033933ee022f76622b8e0d2b7561b036895c08a9c1864
    • Instruction Fuzzy Hash: 6C21A4B95042819BF360E764DC45BAB73E8FF80384F40882CEB8992059FB75955DC7A3

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: fseek$DirectorySystemfclosefopenfreadftellmallocstrchr
    • String ID:
    • API String ID: 1390157628-0
    • Opcode ID: e506fa6d25c0440c55aefb787ab431d84a08c89064c8190344b0abc9546546ad
    • Instruction ID: ebbcbae6c0e7c7988dd8aaf0e80484ee13c507c82097ae489073b65b346a024c
    • Opcode Fuzzy Hash: e506fa6d25c0440c55aefb787ab431d84a08c89064c8190344b0abc9546546ad
    • Instruction Fuzzy Hash: FF31083260061017E7288B789C89BAF76C5FBC53B1F54072DFA2A872C4DEA99D09C295
    APIs
    • #540.MFC42U ref: 10002665
    • EnterCriticalSection.KERNEL32(?,?,?,10009528), ref: 10002677
    • #861.MFC42U(Apartment,?,?,?,10009528), ref: 10002686
    • LeaveCriticalSection.KERNEL32(10009528,Apartment,?,?,?,10009528), ref: 10002690
    • #535.MFC42U(?,?,?,?,10009528), ref: 100026A1
    • #800.MFC42U(?,?,?,?,10009528), ref: 100026B7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: CriticalSection$#535#540#800#861EnterLeave
    • String ID: Apartment
    • API String ID: 2659518386-3482315511
    • Opcode ID: 30f678aa10425c0768487384b688df8f5f3383e2401929aacce373796505cbe5
    • Instruction ID: 62e887f79e0c6814c4870c848619d622f785478aaf9b2f642893a6cad553d807
    • Opcode Fuzzy Hash: 30f678aa10425c0768487384b688df8f5f3383e2401929aacce373796505cbe5
    • Instruction Fuzzy Hash: 7501F4B4408641EFE300DF54DD54B8EBBE4FB85792F40890CF54943298DB389908CBA7
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 10004D69
    • GetThreadContext.KERNEL32 ref: 10004E8F
    • SetThreadContext.KERNEL32(?,?), ref: 10004F00
    • GetCurrentProcess.KERNEL32 ref: 10004F1B
      • Part of subcall function 10004C30: GetCurrentThreadId.KERNEL32 ref: 10004C31
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: Thread$Current$Context$Process
    • String ID:
    • API String ID: 2043380635-0
    • Opcode ID: e3fd9327122e1a0b5100c2a9f97ad9caffe351a76243ecf282890f97c32ddb3c
    • Instruction ID: 00b7f0c0d3398a48c3e32b856f74d171efe319d2e2ef352bbe66c176b0606302
    • Opcode Fuzzy Hash: e3fd9327122e1a0b5100c2a9f97ad9caffe351a76243ecf282890f97c32ddb3c
    • Instruction Fuzzy Hash: 6D8183B56007528FE324CF69C884967B3E6FB88380B16896DE89987759DF30FC45CB54
    APIs
    • GetModuleHandleA.KERNEL32(ntdll.dll,ZwProtectVirtualMemory,00000000,10005BDE,?,?,?,?,000000FF,10005CE8,000000FF,?,?,?,?), ref: 10005AE4
    • GetProcAddress.KERNEL32(00000000), ref: 10005AEB
      • Part of subcall function 10005A40: GetModuleHandleA.KERNEL32(00000000,?,00000000,?,10005B05,00000000,ntdll.dll,1000BFA4,00000005), ref: 10005A48
    • VirtualAlloc.KERNEL32(00000000,0000000B,00003000,00000040,00000000,10005BDE,?,?,?,?,000000FF,10005CE8,000000FF,?,?,?), ref: 10005B38
    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 10005BA8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: HandleModuleVirtual$AddressAllocFreeProc
    • String ID: ZwProtectVirtualMemory$ntdll.dll
    • API String ID: 388322139-613508025
    • Opcode ID: 3f2e333342cacb2edc7985fbc541f57f2e2b50b9c22888553d4749b7b8733c30
    • Instruction ID: 24d9de40e1ec38948f0626ff2d0eb67c681e120d5b9cbc94a272e34673a50bb4
    • Opcode Fuzzy Hash: 3f2e333342cacb2edc7985fbc541f57f2e2b50b9c22888553d4749b7b8733c30
    • Instruction Fuzzy Hash: 28214CB1A046229FF214CF289C94F677AA4EF497D1F018665FA08973E9D771E801CB72
    APIs
    • ?_Xran@std@@YAXXZ.MSVCP60(?,?,00000000,00000000,10003F53,?,00000000,FFFFFFFF,?,?,?,?), ref: 10003FD3
    • ?_Xran@std@@YAXXZ.MSVCP60(?,?,00000000,00000000,10003F53,?,00000000,FFFFFFFF,?,?,?,?), ref: 10004001
    • memmove.MSVCRT(?,?,?,?,?,00000000,00000000,10003F53,?,00000000,FFFFFFFF,?,?,?,?), ref: 1000402A
    • memmove.MSVCRT(?,?,?,?,?,00000000,00000000,10003F53,?,00000000,FFFFFFFF,?,?,?,?), ref: 10004079
    • #825.MFC42U(?,?,?,00000000,00000000,10003F53,?,00000000,FFFFFFFF,?,?,?,?), ref: 100040E2
    • ?_Xlen@std@@YAXXZ.MSVCP60(?,?,00000000,00000000,10003F53,?,00000000,FFFFFFFF,?,?,?,?), ref: 1000412C
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: Xran@std@@memmove$#825Xlen@std@@
    • String ID:
    • API String ID: 1058695723-0
    • Opcode ID: c99c899000f3e845d934672dc8fa5a44403cf90caa0ca127342bf30a0f941e39
    • Instruction ID: 030e978d56c2ab623cdcb170f7569a7b32d6d92317d5ad0df148ab8d32bc1acc
    • Opcode Fuzzy Hash: c99c899000f3e845d934672dc8fa5a44403cf90caa0ca127342bf30a0f941e39
    • Instruction Fuzzy Hash: 9A5124B13002459BEB04CF68D8946AEB7E6EF942D0B12816DFD09CB349DF32ED848784
    APIs
    • #540.MFC42U ref: 100025D5
    • EnterCriticalSection.KERNEL32(?,?,?,10009528), ref: 100025E7
    • #861.MFC42U(1000966C,?,?,?,10009528), ref: 100025F6
    • LeaveCriticalSection.KERNEL32(10009528,1000966C,?,?,?,10009528), ref: 10002600
    • #535.MFC42U(?,?,?,?,10009528), ref: 10002611
    • #800.MFC42U(?,?,?,?,10009528), ref: 10002627
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: CriticalSection$#535#540#800#861EnterLeave
    • String ID:
    • API String ID: 2659518386-0
    • Opcode ID: ada13aba084fd554437abbf018868ea6530f0b1f331527b19768b0ad6ad6d98d
    • Instruction ID: fd7d3a6004d433891c5c411062b12546cca0578b90f5abe4cccb98c8943f4945
    • Opcode Fuzzy Hash: ada13aba084fd554437abbf018868ea6530f0b1f331527b19768b0ad6ad6d98d
    • Instruction Fuzzy Hash: 7001F4B4408640EFE300DF54CD40B8EBBE4FB85792F40891CF68943294DB789908CB97
    APIs
    • GetCurrentThread.KERNEL32 ref: 1000500B
    • #823.MFC42U(00000008,?,?,1000133A,00000000), ref: 1000501B
    • SuspendThread.KERNEL32(?,00000000), ref: 10005031
    • GetLastError.KERNEL32 ref: 1000503C
    • #825.MFC42U(00000000), ref: 10005045
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: Thread$#823#825CurrentErrorLastSuspend
    • String ID:
    • API String ID: 3974497259-0
    • Opcode ID: cc5c28da0ed3cb80a9ca6d922b5efe33ea86db9f6fba49d33db0ad4a55a296ef
    • Instruction ID: 18245ed321afc0d90b876c41bab88f2370897c18db3d6b37bb0b96d684dff324
    • Opcode Fuzzy Hash: cc5c28da0ed3cb80a9ca6d922b5efe33ea86db9f6fba49d33db0ad4a55a296ef
    • Instruction Fuzzy Hash: 66F0A4B2900A62CBF320DF689C8465F77D4EB903E1F124636EA44C729CDB35D8458FA1
    APIs
    • sprintf.MSVCRT ref: 10005D8F
    • CreateFileA.KERNEL32(?,C0000000,00000001,00000000,00000003,00000080,00000000), ref: 10005DAB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: CreateFilesprintf
    • String ID: \\.\%c%c%d
    • API String ID: 3122967319-720341438
    • Opcode ID: fb3a7a8b64182b26fca6dd2dcfa44545cef07e93377b4d4170262b454fe4ac0d
    • Instruction ID: 8abcecb530939a06ff02b4e79d9815dd8bad28e7ee65b7157aecf8ed02193d27
    • Opcode Fuzzy Hash: fb3a7a8b64182b26fca6dd2dcfa44545cef07e93377b4d4170262b454fe4ac0d
    • Instruction Fuzzy Hash: 57314C326042050BE728CA38EC457BB7BD1FBC07B0F95072EF996832D4CAB99D09C691
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 100050CB
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: CurrentThread
    • String ID:
    • API String ID: 2882836952-0
    • Opcode ID: c516182049691b8fd8390c59d55166f2577fabcdafe1b531d33eb2f9755230c7
    • Instruction ID: 1994d0de1a42c22369135885ee02961ea05c59e3f84e2c7875db4395ffa74dba
    • Opcode Fuzzy Hash: c516182049691b8fd8390c59d55166f2577fabcdafe1b531d33eb2f9755230c7
    • Instruction Fuzzy Hash: 929111B16047468FE710CF18D880B5BB7E1FF862D1F41462EE94587298E772EE48CB92
    APIs
    • VirtualQuery.KERNEL32(?,?,0000001C), ref: 1000549E
    • VirtualAlloc.KERNEL32(?,00010000,00003000,00000040), ref: 100054D4
    • VirtualQuery.KERNEL32(?,?,0000001C), ref: 10005508
    • VirtualAlloc.KERNEL32(?,00010000,00003000,00000040), ref: 1000554C
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: Virtual$AllocQuery
    • String ID:
    • API String ID: 31662377-0
    • Opcode ID: b6d64277b744421d1ccbfd1fd9a04d209526ad95b39b0fa185daa15fb1c8d727
    • Instruction ID: 61e2964d8fc8964c7a371095edf98da1f1874e119c01a5abccf401dd21d6e409
    • Opcode Fuzzy Hash: b6d64277b744421d1ccbfd1fd9a04d209526ad95b39b0fa185daa15fb1c8d727
    • Instruction Fuzzy Hash: BD519F31A047128BEB14CF19C8D076BB7E2FB886C6F664529E844A7358E331ED818B51
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 10005695
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: CurrentThread
    • String ID:
    • API String ID: 2882836952-0
    • Opcode ID: 3549d485cfd7cc12aa0032a44624f96d3d22b46faada2d7fece3d50849546f10
    • Instruction ID: 39fa3f4efa6b89b053462ff4677e5b8989544524c2f6e52f439509726f00a3e8
    • Opcode Fuzzy Hash: 3549d485cfd7cc12aa0032a44624f96d3d22b46faada2d7fece3d50849546f10
    • Instruction Fuzzy Hash: FB31B0B6609312CBF320CF19EC80B6BB3D4EB803E2F11413EE90987248DB36A8459B55
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 10004C31
    • #825.MFC42U(?,?,?,?,?,?,?,00000000,?,10004D93), ref: 10004C8B
    • ResumeThread.KERNEL32(?,?,?,?,00000000,?,10004D93), ref: 10004CB9
    • #825.MFC42U(?,?,?,?,00000000,?,10004D93), ref: 10004CBE
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: #825Thread$CurrentResume
    • String ID:
    • API String ID: 2499501605-0
    • Opcode ID: c46582828a6bc86dbf2a66cb05b46b38f77553a760397b5702bdaa6a191d9bc6
    • Instruction ID: 52e0d458e9b236fbdc740bc952d7d616ba79252a119376830c2f6ac1994e4aa9
    • Opcode Fuzzy Hash: c46582828a6bc86dbf2a66cb05b46b38f77553a760397b5702bdaa6a191d9bc6
    • Instruction Fuzzy Hash: E81190F6902A559BF360DF689D8081BB3E9EB442D03530A6EE55A93608DF35FC408B95
    APIs
    • EnterCriticalSection.KERNEL32(10009528,100028E1,Both), ref: 10003185
    • wcscpy.MSVCRT ref: 10003195
    • LeaveCriticalSection.KERNEL32(10009528), ref: 100031A3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2276098499.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000000.00000002.2276078008.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276118813.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276140126.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2276160556.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeavewcscpy
    • String ID: Apartment
    • API String ID: 3852819969-3482315511
    • Opcode ID: 5582def3bbfb7492c8b3bcb0e8ad3b42720def95b2590fb4b905f7b3638b339f
    • Instruction ID: 98de487c64ddbc34172ffb55b37b1c67c298462f3fae1c2ed628f0bd2cb6bf1c
    • Opcode Fuzzy Hash: 5582def3bbfb7492c8b3bcb0e8ad3b42720def95b2590fb4b905f7b3638b339f
    • Instruction Fuzzy Hash: 31C002B8D00510ABF2119B99CD8CAD93A64FB85797FC44590FB0981268C72D59549B72

    Execution Graph

    Execution Coverage:1.6%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:0%
    Total number of Nodes:608
    Total number of Limit Nodes:5
    execution_graph 1369 10001020 #561 1370 10002120 1371 1000212e 1370->1371 1372 10002151 wcslen 1371->1372 1373 100021b2 1371->1373 1400 10002541 1371->1400 1374 1000216d 1372->1374 1372->1400 1375 100021b9 wcslen 1373->1375 1376 1000221a 1373->1376 1380 10002175 wcscpy 1374->1380 1374->1400 1377 100021d5 1375->1377 1375->1400 1378 10002221 wcslen 1376->1378 1379 10002282 1376->1379 1381 100021dd wcscpy 1377->1381 1377->1400 1382 1000223d 1378->1382 1378->1400 1383 10002289 wcslen 1379->1383 1384 100022ea 1379->1384 1417 100021a7 1380->1417 1381->1417 1385 10002245 wcscpy 1382->1385 1382->1400 1386 100022a5 1383->1386 1383->1400 1387 100022f5 1384->1387 1388 1000241d 1384->1388 1385->1417 1391 100022ad wcscpy 1386->1391 1386->1400 1392 10002304 _wcsicmp 1387->1392 1393 1000239d 1387->1393 1389 10002424 wcslen 1388->1389 1390 1000243f 1388->1390 1389->1390 1389->1400 1395 10002558 wcslen 1390->1395 1398 1000247c 1390->1398 1390->1400 1391->1417 1392->1393 1394 1000231d _wcsicmp 1392->1394 1420 100025b0 6 API calls 1393->1420 1397 10002337 1394->1397 1394->1400 1395->1400 1418 10002640 6 API calls 1397->1418 1402 1000249d 1398->1402 1403 10002483 wcslen 1398->1403 1399 100023a7 wcslen #800 1399->1400 1404 100023c8 1399->1404 1402->1400 1422 100025b0 6 API calls 1402->1422 1403->1400 1403->1402 1404->1400 1421 100025b0 6 API calls 1404->1421 1405 10002341 wcslen #800 1405->1400 1406 10002362 1405->1406 1406->1400 1419 10002640 6 API calls 1406->1419 1409 100024d7 wcslen #800 1409->1400 1411 100024f4 1409->1411 1410 100023ed wcscpy 1413 10002401 #800 1410->1413 1411->1400 1423 100025b0 6 API calls 1411->1423 1413->1417 1414 10002387 wcscpy 1414->1413 1416 10002515 wcscpy #800 1416->1417 1418->1405 1419->1414 1420->1399 1421->1410 1422->1409 1423->1416 1691 10001040 1692 10001048 1691->1692 1693 10001058 1692->1693 1694 1000104f #825 1692->1694 1694->1693 1695 10001c40 1696 100020fb NtQueryKey 1695->1696 1697 10001c5d 1695->1697 1698 10001cf5 1697->1698 1699 10001c75 1697->1699 1700 10001d65 1698->1700 1701 10001cfc 1698->1701 1702 10001930 10 API calls 1699->1702 1704 10001dd5 1700->1704 1705 10001d6c 1700->1705 1703 10001930 10 API calls 1701->1703 1706 10001c86 wcslen #800 1702->1706 1708 10001d0d wcslen #800 1703->1708 1707 10001e45 1704->1707 1712 10001a30 10 API calls 1704->1712 1709 10001930 10 API calls 1705->1709 1710 100020e4 1706->1710 1711 10001ca7 1706->1711 1719 10001eb5 1707->1719 1721 10001a30 10 API calls 1707->1721 1708->1710 1713 10001d2e 1708->1713 1714 10001d7d wcslen #800 1709->1714 1710->1696 1716 100020ec 1710->1716 1711->1710 1715 10001caf 1711->1715 1717 10001ded wcslen #800 1712->1717 1713->1710 1720 10001d36 1713->1720 1714->1710 1722 10001d9e 1714->1722 1723 10001930 10 API calls 1715->1723 1717->1710 1724 10001e0e 1717->1724 1718 10001f25 1727 10001f91 1718->1727 1736 10001b30 8 API calls 1718->1736 1719->1718 1725 10001a30 10 API calls 1719->1725 1726 10001930 10 API calls 1720->1726 1728 10001e5d wcslen #800 1721->1728 1722->1710 1729 10001da6 1722->1729 1730 10001cc5 wcscpy 1723->1730 1724->1710 1741 10001a30 10 API calls 1724->1741 1733 10001ecd wcslen #800 1725->1733 1735 10001d4c wcscpy 1726->1735 1734 10001ffd 1727->1734 1743 10001b30 8 API calls 1727->1743 1728->1710 1737 10001e7e 1728->1737 1731 10001930 10 API calls 1729->1731 1732 10001cd9 #800 1730->1732 1740 10001dbc wcscpy 1731->1740 1767 10001cea 1732->1767 1733->1710 1742 10001eee 1733->1742 1738 10002069 1734->1738 1744 10001b30 8 API calls 1734->1744 1735->1732 1739 10001f3b wcslen #800 1736->1739 1737->1710 1746 10001a30 10 API calls 1737->1746 1738->1696 1751 10001b30 8 API calls 1738->1751 1739->1710 1745 10001f5c 1739->1745 1740->1732 1747 10001e2c wcscpy 1741->1747 1742->1710 1752 10001a30 10 API calls 1742->1752 1748 10001fa7 wcslen #800 1743->1748 1749 10002013 wcslen #800 1744->1749 1745->1710 1755 10001b30 8 API calls 1745->1755 1750 10001e9c wcscpy 1746->1750 1747->1707 1748->1710 1753 10001fc8 1748->1753 1749->1710 1754 10002034 1749->1754 1750->1719 1756 10002083 wcslen #800 1751->1756 1757 10001f0c wcscpy 1752->1757 1753->1710 1760 10001b30 8 API calls 1753->1760 1754->1710 1761 10001b30 8 API calls 1754->1761 1758 10001f78 wcscpy 1755->1758 1756->1710 1759 100020a0 1756->1759 1757->1718 1758->1727 1759->1710 1762 100020a4 1759->1762 1763 10001fe4 wcscpy 1760->1763 1764 10002050 wcscpy 1761->1764 1765 10001b30 8 API calls 1762->1765 1763->1734 1764->1738 1766 100020b8 wcscpy #800 1765->1766 1766->1767 1791 100027e0 wcscpy 1792 100028a1 1791->1792 1793 10002828 GetModuleHandleW GetModuleFileNameW wcslen 1791->1793 1794 10002900 58 API calls 1792->1794 1795 1000286d wcscat 1793->1795 1801 10002852 1793->1801 1797 100028ae 1794->1797 1811 10002900 EnterCriticalSection wcscpy LeaveCriticalSection _wfopen 1795->1811 1799 100028c5 1797->1799 1800 100028b5 1797->1800 1798 1000288a 1798->1799 1802 10002891 1798->1802 1824 10003180 EnterCriticalSection wcscpy LeaveCriticalSection 1799->1824 1803 10002740 48 API calls 1800->1803 1801->1795 1804 10002740 48 API calls 1802->1804 1805 100028ba 1803->1805 1807 10002896 1804->1807 1808 100028e1 1825 10001320 1808->1825 1812 10002954 fseek fread 1811->1812 1813 1000294c 1811->1813 1814 10002996 1812->1814 1813->1798 1815 100029b0 MultiByteToWideChar 1814->1815 1816 10002b6e wcscpy wcscpy wcscpy 1814->1816 1843 10002f00 1815->1843 1823 10002a42 fclose 1816->1823 1820 10002f00 42 API calls 1821 100029f1 fseek fread fseek fread 1820->1821 1822 10002a51 wcscpy 1821->1822 1821->1823 1822->1823 1823->1798 1824->1808 1826 1000139d 1825->1826 1827 10001329 1825->1827 1828 10004ba0 24 API calls 1827->1828 1829 1000132e GetCurrentThread 1828->1829 1830 10005000 5 API calls 1829->1830 1831 1000133a 1830->1831 1947 10005080 1831->1947 1834 10001365 1836 10005080 33 API calls 1834->1836 1835 10005080 33 API calls 1835->1834 1837 10001376 1836->1837 1838 10005080 33 API calls 1837->1838 1839 10001387 1838->1839 1840 10005080 33 API calls 1839->1840 1841 10001398 1840->1841 1842 10004d40 35 API calls 1841->1842 1842->1826 1844 10002f28 1843->1844 1851 10003f90 1844->1851 1848 10003142 1849 100029dd 1848->1849 1850 10003150 #825 1848->1850 1849->1820 1850->1849 1852 10003fa4 1851->1852 1855 10003e00 1852->1855 1856 10003e43 1855->1856 1863 10003e4e 1855->1863 1867 100041f0 1856->1867 1859 10003f53 1860 10002fb9 25 API calls 1859->1860 1862 10003f69 #825 1859->1862 1860->1848 1860->1849 1861 10003e90 ?_Xlen@std@ 1861->1863 1862->1860 1863->1861 1864 10003ee1 ?_Xlen@std@ 1863->1864 1865 100041f0 ?_Xlen@std@ #825 #825 #823 #825 1863->1865 1866 10003f28 1863->1866 1864->1863 1865->1863 1885 10003fc0 1866->1885 1868 10004204 1867->1868 1869 100041fe ?_Xlen@std@ 1867->1869 1870 10004214 1868->1870 1871 1000423a 1868->1871 1872 1000428c 1868->1872 1869->1868 1874 1000421c 1870->1874 1876 10004360 2 API calls 1870->1876 1875 1000424c 1871->1875 1878 10004261 #825 1871->1878 1872->1870 1873 10004290 1872->1873 1873->1874 1877 100042d0 1873->1877 1879 100042c7 #825 1873->1879 1880 100042aa 1873->1880 1874->1863 1875->1863 1876->1874 1881 10004360 2 API calls 1877->1881 1878->1875 1879->1877 1920 10004360 1880->1920 1882 100042e1 1881->1882 1882->1863 1886 10003fd3 ?_Xran@std@ 1885->1886 1887 10003fd9 1885->1887 1886->1887 1888 10003ff2 1887->1888 1894 100040aa 1887->1894 1890 10004001 ?_Xran@std@ 1888->1890 1891 10004007 1888->1891 1889 10004121 1895 10004132 1889->1895 1896 1000412c ?_Xlen@std@ 1889->1896 1890->1891 1926 10004470 1891->1926 1893 1000400e 1898 1000401d memmove 1893->1898 1913 10004042 1893->1913 1894->1889 1897 100040ca 1894->1897 1899 1000415a 1895->1899 1902 10004140 1895->1902 1896->1895 1900 100040db 1897->1900 1905 100040e1 #825 1897->1905 1901 100041f0 5 API calls 1898->1901 1904 1000415e 1899->1904 1910 10004170 1899->1910 1900->1859 1901->1913 1906 10004144 1902->1906 1907 10004185 1902->1907 1903 10004470 4 API calls 1908 1000405d 1903->1908 1909 10004300 #825 1904->1909 1905->1900 1943 10004300 1906->1943 1912 10004360 2 API calls 1907->1912 1917 1000406e memmove 1908->1917 1919 10004091 1908->1919 1915 10004167 1909->1915 1911 10004300 #825 1910->1911 1910->1919 1911->1907 1912->1919 1913->1903 1915->1859 1918 100041f0 5 API calls 1917->1918 1918->1919 1919->1859 1921 10004396 #823 1920->1921 1923 100043e0 1921->1923 1924 100042bf 1923->1924 1925 10004423 #825 1923->1925 1924->1863 1925->1924 1927 10004483 1926->1927 1937 1000450c 1926->1937 1928 100044b1 ?_Xlen@std@ 1927->1928 1929 100044b9 1927->1929 1927->1937 1928->1929 1930 100044dd 1929->1930 1931 100044c7 1929->1931 1932 100044e1 1930->1932 1933 100044ef 1930->1933 1934 10004504 1931->1934 1935 100044cb 1931->1935 1936 10004300 #825 1932->1936 1933->1937 1938 10004300 #825 1933->1938 1939 10004360 2 API calls 1934->1939 1940 10004300 #825 1935->1940 1941 100044ea 1936->1941 1937->1893 1938->1934 1939->1937 1942 100044d8 1940->1942 1941->1893 1942->1893 1944 10004151 1943->1944 1945 1000430b 1943->1945 1944->1859 1945->1944 1946 10004322 #825 1945->1946 1946->1944 1950 100050a0 1947->1950 1949 1000134b 1949->1834 1949->1835 1951 100050b5 GetCurrentThreadId 1950->1951 1953 100050d9 1951->1953 1955 100050e8 1951->1955 1953->1949 1954 100050fd 1954->1949 1955->1954 1956 10004a70 VirtualQuery 1955->1956 1957 10005137 1956->1957 1958 10004a70 VirtualQuery 1957->1958 1960 10005149 1958->1960 1959 1000535b 1959->1949 1961 1000516f #823 1960->1961 1962 10005151 1960->1962 1961->1962 1963 1000518e 1961->1963 1962->1959 1965 10005352 #825 1962->1965 1976 100053c0 1963->1976 1965->1959 1966 10005e50 SetLastError 1971 10005194 1966->1971 1967 10005262 1967->1962 1968 10005bf0 22 API calls 1967->1968 1969 100052f1 1968->1969 1970 10005329 GetLastError 1969->1970 1984 100055f0 VirtualQuery 1969->1984 1970->1962 1971->1962 1971->1966 1971->1967 1974 10005bf0 22 API calls 1975 10005325 1974->1975 1975->1954 1975->1970 1980 100053d3 1976->1980 1977 10005566 1977->1971 1978 10005496 VirtualQuery 1978->1980 1981 100054c9 1978->1981 1979 10005500 VirtualQuery 1979->1977 1979->1981 1980->1977 1980->1978 1980->1981 1982 100054cb VirtualAlloc 1980->1982 1981->1977 1981->1979 1983 10005543 VirtualAlloc 1981->1983 1982->1977 1982->1981 1983->1977 1983->1981 1985 100052fb 1984->1985 1985->1954 1985->1974 1358 10004682 1359 1000468a 1358->1359 1360 10004691 #826 1359->1360 1361 10004697 1359->1361 1360->1361 1313 10004824 1314 1000485b 1313->1314 1315 1000482b LocalAlloc 1313->1315 1317 10004862 #1173 #1240 1314->1317 1318 1000486f 1314->1318 1316 1000483c LocalFree #1173 #1240 1315->1316 1315->1318 1316->1318 1317->1318 1312 100031b0 KiUserExceptionDispatcher SetDllPathW 1362 10003210 1363 10003224 1362->1363 1364 1000321a 1362->1364 1364->1363 1365 1000322a #825 1364->1365 1365->1363 1424 100010b0 1427 100027d0 1424->1427 1430 10002740 1427->1430 1431 10002749 1430->1431 1447 100010b8 #2717 1430->1447 1448 10004ba0 1431->1448 1433 1000274e GetCurrentThread 1455 10005000 1433->1455 1435 1000275a 1462 10005690 GetCurrentThreadId 1435->1462 1437 1000276b 1438 10002785 1437->1438 1439 10005690 27 API calls 1437->1439 1440 10005690 27 API calls 1438->1440 1439->1438 1441 10002796 1440->1441 1442 10005690 27 API calls 1441->1442 1443 100027a7 1442->1443 1444 10005690 27 API calls 1443->1444 1445 100027b8 1444->1445 1476 10004d40 1445->1476 1449 10004bb3 GetCurrentThreadId InterlockedCompareExchange 1448->1449 1450 10004bac 1448->1450 1451 10004bd1 1449->1451 1452 10004bca 1449->1452 1450->1433 1479 10004c00 1451->1479 1452->1433 1456 1000500b GetCurrentThread 1455->1456 1460 10005064 1455->1460 1457 10005019 #823 1456->1457 1456->1460 1458 10005030 SuspendThread 1457->1458 1459 10005029 1457->1459 1458->1460 1461 1000503c GetLastError #825 1458->1461 1459->1435 1460->1435 1461->1459 1463 100056b0 1462->1463 1464 100056a3 1462->1464 1465 100056c5 1463->1465 1466 100056f0 #823 1463->1466 1464->1437 1465->1437 1467 10005700 1466->1467 1468 1000570a 1466->1468 1467->1465 1470 100057ac #825 1467->1470 1527 10004a70 1468->1527 1470->1465 1471 10005719 1471->1467 1472 10005bf0 22 API calls 1471->1472 1473 10005757 1472->1473 1474 10005765 1473->1474 1475 1000575b GetLastError 1473->1475 1474->1437 1475->1467 1534 10004d50 1476->1534 1478 10004d47 1478->1447 1480 10004bf4 1479->1480 1481 10004c0c 1479->1481 1480->1433 1481->1480 1483 10005bf0 1481->1483 1494 10005d10 1483->1494 1485 10005c07 CreateFileA 1486 10005cc1 1485->1486 1487 10005c35 WriteFile CloseHandle 1485->1487 1490 10005bc0 16 API calls 1486->1490 1488 10005cf5 1487->1488 1489 10005c9b 1487->1489 1488->1481 1500 10005bc0 1489->1500 1492 10005ce8 1490->1492 1492->1481 1495 10005d23 1494->1495 1496 10005d55 1494->1496 1495->1485 1497 10005ddb 1496->1497 1498 10005d80 sprintf CreateFileA 1496->1498 1497->1485 1498->1496 1499 10005df0 CloseHandle 1498->1499 1499->1485 1503 10005ad0 1500->1503 1502 10005bde 1502->1481 1504 10005ada GetModuleHandleA GetProcAddress 1503->1504 1505 10005b2d VirtualAlloc 1503->1505 1512 10005a40 GetModuleHandleA 1504->1512 1506 10005b44 1505->1506 1507 10005b5b VirtualFree 1505->1507 1506->1502 1507->1502 1509 10005b05 1509->1505 1511 10005b54 1509->1511 1511->1502 1519 10005900 strchr 1512->1519 1514 10005a6c 1514->1509 1515 10005a63 1515->1514 1516 10005a93 1515->1516 1517 10005a83 free 1515->1517 1518 10005aa0 free 1516->1518 1517->1509 1518->1509 1520 10005993 1519->1520 1521 1000592f GetSystemDirectoryA 1519->1521 1522 100059b1 fopen 1520->1522 1521->1522 1523 10005a24 1522->1523 1524 100059cf fseek ftell fseek malloc 1522->1524 1523->1515 1525 100059fc fread 1524->1525 1526 10005a0d fclose 1524->1526 1525->1526 1526->1515 1528 10004a7a 1527->1528 1529 10004a81 1527->1529 1528->1471 1531 10004aa5 1529->1531 1532 10004ae0 VirtualQuery 1529->1532 1531->1471 1533 10004b2a 1532->1533 1533->1531 1535 10004d61 1534->1535 1536 10004d69 GetCurrentThreadId 1534->1536 1535->1536 1537 10004d86 1536->1537 1538 10004d77 1536->1538 1539 10004da2 1537->1539 1540 10004d8e 1537->1540 1538->1478 1556 10004e6a 1539->1556 1568 10005e50 1539->1568 1558 10004c30 GetCurrentThreadId 1540->1558 1542 10004d93 1542->1478 1543 10004f1b GetCurrentProcess 1554 10004f8d 1543->1554 1555 10004f2d 1543->1555 1544 10004e7e GetThreadContext 1544->1556 1547 10004f19 1547->1543 1548 10005bf0 22 API calls 1551 10004f4e FlushInstructionCache 1548->1551 1550 10004fc1 1550->1478 1553 10004f7c #825 1551->1553 1551->1555 1552 10004faa ResumeThread #825 1552->1550 1552->1552 1553->1554 1553->1555 1572 10004ce0 1554->1572 1555->1548 1555->1553 1556->1543 1556->1544 1556->1547 1557 10004eee SetThreadContext 1556->1557 1557->1556 1559 10004c3f 1558->1559 1566 10004c46 1558->1566 1559->1542 1560 10004c99 1561 10004ce0 22 API calls 1560->1561 1563 10004ca4 1561->1563 1562 10005bf0 22 API calls 1562->1566 1564 10004ccc 1563->1564 1567 10004cb5 ResumeThread #825 1563->1567 1564->1542 1565 10004c88 #825 1565->1560 1565->1566 1566->1560 1566->1562 1566->1565 1567->1564 1567->1567 1569 10005e66 1568->1569 1576 10005ed0 1569->1576 1571 10005e79 1571->1539 1573 10004d05 1572->1573 1574 10004cec 1572->1574 1573->1550 1573->1552 1574->1573 1575 10005bf0 22 API calls 1574->1575 1575->1574 1577 10005ed9 1576->1577 1578 10005ef2 1577->1578 1579 10005ee4 SetLastError 1577->1579 1578->1571 1579->1571 1580 100013b0 1585 10001400 1580->1585 1582 100013d0 1583 100013e0 NtOpenKey 1582->1583 1584 100013d7 1582->1584 1655 10001150 #540 1585->1655 1587 10001429 1588 10001444 wcslen 1587->1588 1589 1000146b #861 1587->1589 1590 10001451 #942 #942 1588->1590 1591 10001474 1588->1591 1589->1591 1590->1591 1665 10001930 1591->1665 1593 1000148d _wcsicmp 1594 100014d9 1593->1594 1595 100014a9 1593->1595 1597 100014db #800 1594->1597 1596 10001930 10 API calls 1595->1596 1598 100014ba _wcsicmp #800 1596->1598 1599 10001506 1597->1599 1625 100014ed #800 1597->1625 1598->1594 1598->1597 1601 10001514 1599->1601 1602 1000161e 1599->1602 1603 10001930 10 API calls 1601->1603 1673 10001a30 1602->1673 1605 10001523 _wcsicmp 1603->1605 1607 10001569 1605->1607 1608 10001539 1605->1608 1606 1000162d _wcsicmp 1609 10001673 1606->1609 1610 10001643 1606->1610 1614 1000156b #800 1607->1614 1612 10001930 10 API calls 1608->1612 1611 10001675 #800 1609->1611 1613 10001a30 10 API calls 1610->1613 1615 100016a0 1611->1615 1611->1625 1616 1000154a _wcsicmp #800 1612->1616 1617 10001654 _wcsicmp #800 1613->1617 1618 10001596 1614->1618 1614->1625 1620 100016ac 1615->1620 1621 100017cd _wcsicmp 1615->1621 1616->1607 1616->1614 1617->1609 1617->1611 1619 10001930 10 API calls 1618->1619 1622 100015a7 _wcsicmp 1619->1622 1623 10001a30 10 API calls 1620->1623 1624 100017e1 1621->1624 1621->1625 1626 100015ed 1622->1626 1627 100015bd 1622->1627 1628 100016bd _wcsicmp 1623->1628 1681 10001b30 #538 #942 #942 wcslen 1624->1681 1625->1582 1633 100015ef #800 1626->1633 1630 10001930 10 API calls 1627->1630 1631 10001703 1628->1631 1632 100016d3 1628->1632 1635 100015ce _wcsicmp #800 1630->1635 1637 10001705 #800 1631->1637 1636 10001a30 10 API calls 1632->1636 1633->1625 1634 100017f0 _wcsicmp #800 1634->1625 1638 1000180f 1634->1638 1635->1626 1635->1633 1639 100016e4 _wcsicmp #800 1636->1639 1637->1625 1640 10001730 1637->1640 1641 10001843 1638->1641 1642 10001817 _wcsicmp 1638->1642 1639->1631 1639->1637 1643 10001a30 10 API calls 1640->1643 1644 10001866 1641->1644 1645 1000184b _wcsicmp 1641->1645 1642->1625 1648 10001741 _wcsicmp 1643->1648 1646 10001893 1644->1646 1647 1000186e _wcsicmp 1644->1647 1645->1625 1646->1625 1649 1000189b #800 1646->1649 1647->1625 1650 10001787 1648->1650 1651 10001757 1648->1651 1649->1582 1653 10001789 #800 1650->1653 1652 10001a30 10 API calls 1651->1652 1654 10001768 _wcsicmp #800 1652->1654 1653->1625 1654->1650 1654->1653 1656 10001235 #535 #800 1655->1656 1657 1000118f LoadLibraryW 1655->1657 1656->1587 1657->1656 1658 100011a8 GetProcAddress 1657->1658 1659 100011bb 1658->1659 1661 10001229 1658->1661 1660 100011d8 #823 1659->1660 1659->1661 1660->1661 1662 100011f5 1660->1662 1661->1656 1663 10001220 #825 1662->1663 1664 10001209 #861 1662->1664 1663->1661 1664->1663 1666 10001982 #538 1665->1666 1667 10001957 1665->1667 1669 100019ab #942 #942 wcslen 1666->1669 1670 1000199d #942 1666->1670 1667->1666 1668 10001960 #538 1667->1668 1668->1593 1671 100019f3 #535 #800 1669->1671 1672 100019db #942 #942 1669->1672 1670->1669 1671->1593 1672->1671 1674 10001a82 #538 1673->1674 1675 10001a57 1673->1675 1677 10001aab #942 #942 wcslen 1674->1677 1678 10001a9d #942 1674->1678 1675->1674 1676 10001a60 #538 1675->1676 1676->1606 1679 10001af3 #535 #800 1677->1679 1680 10001adb #942 #942 1677->1680 1678->1677 1679->1606 1680->1679 1682 10001bb0 #535 #800 1681->1682 1683 10001b98 #942 #942 1681->1683 1682->1634 1683->1682 1768 100010d0 1771 10001270 InitializeCriticalSection GetModuleHandleA GetProcAddress 1768->1771 1770 100010df GetModuleFileNameW LoadLibraryW #3948 1772 100012ad 10 API calls 1771->1772 1773 1000129f GetCurrentProcess 1771->1773 1772->1770 1773->1772 1774 10004650 1779 1000465a 1774->1779 1776 10004655 1781 100048aa 1776->1781 1780 10004664 #269 1779->1780 1780->1776 1784 1000487e 1781->1784 1783 100046ac 1785 10004893 __dllonexit 1784->1785 1786 10004887 _onexit 1784->1786 1785->1783 1786->1783 1986 10001070 1987 10001075 1986->1987 1988 100048aa 2 API calls 1987->1988 1989 1000109a 1988->1989 1990 10001bf0 1991 10001400 72 API calls 1990->1991 1992 10001c10 1991->1992 1993 10001c20 NtOpenKeyEx 1992->1993 1994 10001c17 1992->1994 1366 10004a18 ??1type_info@@UAE 1367 10004a27 #825 1366->1367 1368 10004a2e 1366->1368 1367->1368 1684 100046b8 1687 10004a34 1684->1687 1686 100046c2 #6466 #1571 1687->1686 1688 100043b9 1689 100043c6 1688->1689 1690 100043c8 #823 1688->1690 1689->1690 1787 100043da 1788 100043e0 1787->1788 1789 1000441d 1788->1789 1790 10004423 #825 1788->1790 1790->1789 1319 1000497b 1320 1000498e 1319->1320 1325 10004997 1319->1325 1321 100049bf 1320->1321 1334 100046fd 1320->1334 1322 100049b3 1351 100048d0 1322->1351 1325->1320 1325->1321 1325->1322 1328 100049df 1328->1321 1330 100049e8 1328->1330 1329 100049d7 1332 100048d0 3 API calls 1329->1332 1331 100048d0 3 API calls 1330->1331 1333 100049f0 1331->1333 1332->1328 1333->1321 1335 100047a0 1334->1335 1336 1000470d #1115 #1173 #1568 1334->1336 1339 100047a6 #1240 #1173 #1165 1335->1339 1340 100047ec 1335->1340 1337 10004754 #1570 1336->1337 1338 10004736 #1165 1336->1338 1345 10004789 #1173 #1240 1337->1345 1341 10004742 1338->1341 1342 1000475b #1179 #823 1338->1342 1346 100047c6 1339->1346 1347 100047cd #1194 #1563 #1570 #1248 1339->1347 1343 100047f2 #6466 #1194 #1563 #1250 1340->1343 1344 1000481c 1340->1344 1341->1342 1350 1000474d 1341->1350 1348 10004782 1342->1348 1349 10004778 #342 1342->1349 1343->1344 1344->1321 1344->1328 1344->1329 1345->1344 1346->1347 1347->1344 1348->1345 1349->1348 1350->1337 1352 100048d8 1351->1352 1353 100048f9 malloc 1352->1353 1354 1000490e 1352->1354 1356 10004938 1352->1356 1353->1354 1355 10004912 _initterm 1353->1355 1354->1320 1355->1354 1356->1354 1357 10004965 free 1356->1357 1357->1354

    Control-flow Graph

    APIs
    • #1115.MFC42U(?,?,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 10004714
    • #1173.MFC42U(?,?,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 10004719
    • #1568.MFC42U(?,00000000,10009E80,00000000,?,?,?,?,?,?,100049CB,?,?,?,?,?), ref: 1000472D
    • #1165.MFC42U(?,00000000,10009E80,00000000,?,?,?,?,?,?,100049CB,?,?,?,?,?), ref: 10004736
    • #1570.MFC42U(?,00000000,10009E80,00000000,?,?,?,?,?,?,100049CB,?,?,?,?,?), ref: 10004754
    • #1179.MFC42U(1000BF18,?,?,00000000,10009E80,00000000,?,?,?,?,?,?,100049CB,?,?,?), ref: 10004767
    • #823.MFC42U(00000040,1000BF18,?,?,00000000,10009E80,00000000,?,?,?,?,?,?,100049CB,?,?), ref: 1000476E
    • #342.MFC42U(1000BF18,00000000,1000BF18,?,?,00000000,10009E80,00000000,?,?,?,?,?,?,100049CB,?), ref: 1000477D
    • #1173.MFC42U(?,00000000,10009E80,00000000,?,?,?,?,?,?,100049CB,?,?,?,?,?), ref: 1000478C
    • #1240.MFC42U(?,?,00000000,10009E80,00000000,?,?,?,?,?,?,100049CB,?,?,?,?), ref: 10004794
    • #1240.MFC42U(10009E88,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 100047AB
    • #1173.MFC42U(10009E88,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 100047B2
    • #1165.MFC42U(10009E88,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 100047BA
    • #1194.MFC42U(10009E88,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 100047CD
    • #1563.MFC42U(000000FF,10009E88,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 100047D4
    • #1570.MFC42U(000000FF,10009E88,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 100047D9
    • #1248.MFC42U(1000BF18,00000001,000000FF,10009E88,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 100047E5
    • #6466.MFC42U(10009E88,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 100047FA
    • #1194.MFC42U(10009E88,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 100047FF
    • #1563.MFC42U(000000FF,10009E88,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 10004806
    • #1250.MFC42U(?,000000FF,10009E88,?,?,?,?,100049CB,?,?,?,?,?,?), ref: 1000480E
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: #1173$#1165#1194#1240#1563#1570$#1115#1179#1248#1250#1568#342#6466#823
    • String ID:
    • API String ID: 933591048-0
    • Opcode ID: 7f323cdebafc7876504ee1737dfc2f78bcaa5341956db8968ccd7249556f25ef
    • Instruction ID: 42ede1d6eba9dc7262db5c255ebf041a762cd8e3cbd004f8f20c7d1455e4ffb0
    • Opcode Fuzzy Hash: 7f323cdebafc7876504ee1737dfc2f78bcaa5341956db8968ccd7249556f25ef
    • Instruction Fuzzy Hash: 3931B278100240AFFB10DFA1CC85A9D77A6EF853D0F228519F9285B26ACF70FE419A95

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 19 10004824-10004829 20 1000485b-10004860 19->20 21 1000482b-1000483a LocalAlloc 19->21 24 10004862-1000486a #1173 #1240 20->24 25 1000486f-10004871 20->25 22 10004872 21->22 23 1000483c-10004859 LocalFree #1173 #1240 21->23 23->25 24->25 25->22
    APIs
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: #1173#1240Local$AllocFree
    • String ID:
    • API String ID: 762571471-0
    • Opcode ID: ad6df8680ab0087f5d550da1c51120c5d9966c5a9941d94eac5dffd23f89fe7e
    • Instruction ID: 4b1118c17bfbf70476295644f1baa115cc6297c41b66d740b9089c34fbbeaa8b
    • Opcode Fuzzy Hash: ad6df8680ab0087f5d550da1c51120c5d9966c5a9941d94eac5dffd23f89fe7e
    • Instruction Fuzzy Hash: 85E09270904391AAF220DB60CC4AB4E66D5EB453D2F22C828F708A50A9CF70E880C794

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 26 100031b0-10003204 KiUserExceptionDispatcher SetDllPathW
    APIs
    • KiUserExceptionDispatcher.NTDLL(00000000,00000000,?,000000FF,00000200,00000200), ref: 100031E5
    • SetDllPathW.SECURITEINFO.COM.TROJAN.PACKED.16045.13418(00000000,?), ref: 100031F8
      • Part of subcall function 100027E0: wcscpy.MSVCRT ref: 10002813
      • Part of subcall function 100027E0: GetModuleHandleW.KERNEL32(00000000,?,00000200), ref: 10002834
      • Part of subcall function 100027E0: GetModuleFileNameW.KERNEL32(00000000,?,00000200), ref: 1000283B
      • Part of subcall function 100027E0: wcslen.MSVCRT ref: 10002846
      • Part of subcall function 100027E0: wcscat.MSVCRT ref: 1000287A
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: Module$D.16045DispatcherExceptionFileHandleNamePathUserwcscatwcscpywcslen
    • String ID:
    • API String ID: 3027356398-0
    • Opcode ID: 867b27870a5386e78fcd514d66f990f3c5f1a1412bd7dabaeaab08d45bfa72ec
    • Instruction ID: 37527c94ce8cc6bf4f2c48f5b2c910f77f7526f746cff65156f8c7d6ad573cf1
    • Opcode Fuzzy Hash: 867b27870a5386e78fcd514d66f990f3c5f1a1412bd7dabaeaab08d45bfa72ec
    • Instruction Fuzzy Hash: 91E09275208301BBF320C704CC86FABB3E9AFC4B14F108B2DB358A22D0D574A909866A

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 156 10001c40-10001c57 157 100020fb-10002112 NtQueryKey 156->157 158 10001c5d-10001c6f call 10001920 156->158 161 10001cf5-10001cfa 158->161 162 10001c75-10001ca1 call 10001930 wcslen #800 158->162 163 10001d65-10001d6a 161->163 164 10001cfc-10001d28 call 10001930 wcslen #800 161->164 174 100020e4-100020e6 162->174 175 10001ca7-10001ca9 162->175 167 10001dd5-10001dda 163->167 168 10001d6c-10001d98 call 10001930 wcslen #800 163->168 164->174 178 10001d2e-10001d30 164->178 170 10001e45-10001e4a 167->170 171 10001ddc-10001e08 call 10001a30 wcslen #800 167->171 168->174 189 10001d9e-10001da0 168->189 179 10001eb5-10001eba 170->179 180 10001e4c-10001e78 call 10001a30 wcslen #800 170->180 171->174 191 10001e0e-10001e10 171->191 174->157 176 100020e8-100020ea 174->176 175->174 182 10001caf-10001cd5 call 10001930 wcscpy 175->182 176->157 183 100020ec-100020f8 176->183 178->174 187 10001d36-10001d60 call 10001930 wcscpy 178->187 185 10001f25-10001f2a 179->185 186 10001ebc-10001ee8 call 10001a30 wcslen #800 179->186 180->174 207 10001e7e-10001e80 180->207 200 10001cd9-10001ce4 #800 182->200 194 10001f91-10001f96 185->194 195 10001f2c-10001f56 call 10001b30 wcslen #800 185->195 186->174 216 10001eee-10001ef0 186->216 187->200 189->174 197 10001da6-10001dd0 call 10001930 wcscpy 189->197 191->174 201 10001e16-10001e3c call 10001a30 wcscpy 191->201 203 10001f98-10001fc2 call 10001b30 wcslen #800 194->203 204 10001ffd-10002002 194->204 195->174 219 10001f5c-10001f5e 195->219 197->200 213 10001cea-10001cf2 200->213 214 100020db-100020e1 200->214 201->170 203->174 230 10001fc8-10001fca 203->230 208 10002004-1000202e call 10001b30 wcslen #800 204->208 209 10002069-1000206e 204->209 207->174 211 10001e86-10001eac call 10001a30 wcscpy 207->211 208->174 231 10002034-10002036 208->231 209->157 221 10002074-1000209e call 10001b30 wcslen #800 209->221 211->179 216->174 223 10001ef6-10001f1c call 10001a30 wcscpy 216->223 219->174 226 10001f64-10001f88 call 10001b30 wcscpy 219->226 221->174 238 100020a0-100020a2 221->238 223->185 226->194 230->174 235 10001fd0-10001ff4 call 10001b30 wcscpy 230->235 231->174 236 1000203c-10002060 call 10001b30 wcscpy 231->236 235->204 236->209 238->174 241 100020a4-100020d7 call 10001b30 wcscpy #800 238->241 241->214 246 100020d9 241->246 246->214
    APIs
    • wcslen.MSVCRT ref: 10001C89
    • wcscpy.MSVCRT ref: 10001CCC
    • #800.MFC42U ref: 10001C9A
      • Part of subcall function 10001930: #538.MFC42U(10009064,?,?,?,1000646F,000000FF,10001D7D,?,CurVer), ref: 1000198C
      • Part of subcall function 10001930: #942.MFC42U(\Wow6432Node,10009064,?,?,?,1000646F,000000FF), ref: 100019A6
      • Part of subcall function 10001930: #942.MFC42U(10009188,10009064,?,?,?,1000646F,000000FF), ref: 100019B4
      • Part of subcall function 10001930: #942.MFC42U(00000000,10009188,10009064,?,?,?,1000646F,000000FF), ref: 100019C4
      • Part of subcall function 10001930: wcslen.MSVCRT ref: 100019CE
      • Part of subcall function 10001930: #942.MFC42U(10009188), ref: 100019E4
      • Part of subcall function 10001930: #942.MFC42U(?,10009188), ref: 100019EE
      • Part of subcall function 10001930: #535.MFC42U(?), ref: 100019FE
      • Part of subcall function 10001930: #800.MFC42U ref: 10001A14
    • #800.MFC42U ref: 10001CD9
    • wcslen.MSVCRT ref: 10001D10
    • #800.MFC42U ref: 10001D21
    • wcscpy.MSVCRT ref: 10001D53
      • Part of subcall function 10001930: #538.MFC42U(xyxyoorljfoleuwrljfoulerfksdor,?,?,?,1000646F,000000FF,10001D7D,?,CurVer), ref: 1000196B
    • wcslen.MSVCRT ref: 10001D80
    • #800.MFC42U ref: 10001D91
    • wcscpy.MSVCRT ref: 10001DC3
    • wcslen.MSVCRT ref: 10001DF0
    • #800.MFC42U ref: 10001E01
    • wcscpy.MSVCRT ref: 10001E33
    • wcslen.MSVCRT ref: 10001E60
    • wcscpy.MSVCRT ref: 10001EA3
    • #800.MFC42U ref: 10001E71
      • Part of subcall function 10001A30: #538.MFC42U(10009064,?,?,?,1000649F,000000FF,10001ECD,?,ProgID), ref: 10001A8C
      • Part of subcall function 10001A30: #942.MFC42U(\Wow6432Node,10009064,?,?,?,1000649F,000000FF), ref: 10001AA6
      • Part of subcall function 10001A30: #942.MFC42U(\CLSID\,10009064,?,?,?,1000649F,000000FF), ref: 10001AB4
      • Part of subcall function 10001A30: #942.MFC42U(00000000,\CLSID\,10009064,?,?,?,1000649F,000000FF), ref: 10001AC4
      • Part of subcall function 10001A30: wcslen.MSVCRT ref: 10001ACE
      • Part of subcall function 10001A30: #942.MFC42U(10009188), ref: 10001AE4
      • Part of subcall function 10001A30: #942.MFC42U(?,10009188), ref: 10001AEE
      • Part of subcall function 10001A30: #535.MFC42U(?), ref: 10001AFE
      • Part of subcall function 10001A30: #800.MFC42U ref: 10001B14
    • wcslen.MSVCRT ref: 10001ED0
    • #800.MFC42U ref: 10001EE1
    • wcscpy.MSVCRT ref: 10001F13
      • Part of subcall function 10001A30: #538.MFC42U(xyxyoorljfoleuwrljfoulerfksdor,?,?,?,1000649F,000000FF,10001ECD,?,ProgID), ref: 10001A6B
    • NtQueryKey.NTDLL(?,?,?,?,?), ref: 10002108
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: #942$#800$wcslen$wcscpy$#538$#535$Query
    • String ID: 1.0$1.0\0$1.0\0\win32$CLSID$CurVer$InprocServer32$ProgID
    • API String ID: 3364588600-3032651770
    • Opcode ID: c6407b952052ce94e40f9a31da8d2529fe4a30389a6ec89255647bc4872f7d82
    • Instruction ID: e210364aa1a478c15cfc260ae6af40ed4357581bce4cc658cafd6358c502b614
    • Opcode Fuzzy Hash: c6407b952052ce94e40f9a31da8d2529fe4a30389a6ec89255647bc4872f7d82
    • Instruction Fuzzy Hash: 9CD1A071900301AFF710DF58CC84EDBB7A8EF842C8F414958F6859715AEB35EA58CBA2

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 247 10002120-10002144 call 10001920 250 1000214a-1000214f 247->250 251 1000258f-100025ab 247->251 252 10002151-10002167 wcslen 250->252 253 100021b2-100021b7 250->253 255 10002541-10002543 252->255 256 1000216d-1000216f 252->256 257 100021b9-100021cf wcslen 253->257 258 1000221a-1000221f 253->258 255->251 262 10002545-10002547 255->262 256->255 263 10002175-100021a1 wcscpy 256->263 257->255 259 100021d5-100021d7 257->259 260 10002221-10002237 wcslen 258->260 261 10002282-10002287 258->261 259->255 264 100021dd-10002209 wcscpy 259->264 260->255 265 1000223d-1000223f 260->265 266 10002289-1000229f wcslen 261->266 267 100022ea-100022ef 261->267 262->251 268 10002549-10002555 262->268 269 100021a7-100021af 263->269 270 10002538-1000253e 263->270 264->270 271 1000220f-10002217 264->271 265->255 272 10002245-10002271 wcscpy 265->272 266->255 273 100022a5-100022a7 266->273 274 100022f5-100022fe 267->274 275 1000241d-10002422 267->275 272->270 278 10002277-1000227f 272->278 273->255 279 100022ad-100022d9 wcscpy 273->279 280 10002304-10002317 _wcsicmp 274->280 281 1000239d-100023c2 call 100025b0 wcslen #800 274->281 276 10002424-10002439 wcslen 275->276 277 10002466-1000246b 275->277 276->255 283 1000243f-10002441 276->283 284 10002471-10002476 277->284 285 10002558-1000256c wcslen 277->285 279->270 287 100022df-100022e7 279->287 280->281 282 1000231d-10002331 _wcsicmp 280->282 281->255 296 100023c8-100023ca 281->296 282->251 288 10002337-1000235c call 10002640 wcslen #800 282->288 283->255 289 10002447-10002460 283->289 284->285 290 1000247c-10002481 284->290 285->255 292 1000256e-10002570 285->292 288->255 302 10002362-10002364 288->302 289->277 294 100024c2-100024c7 290->294 295 10002483-10002497 wcslen 290->295 292->255 297 10002572-10002585 292->297 294->251 301 100024cd-100024f2 call 100025b0 wcslen #800 294->301 295->255 299 1000249d-1000249f 295->299 296->255 300 100023d0-100023fd call 100025b0 wcscpy 296->300 297->251 299->255 303 100024a5-100024b8 299->303 311 10002401-1000240c #800 300->311 301->255 309 100024f4-100024f6 301->309 302->255 307 1000236a-1000239b call 10002640 wcscpy 302->307 303->294 307->311 309->255 313 100024f8-10002534 call 100025b0 wcscpy #800 309->313 311->270 312 10002412-1000241a 311->312 313->270 317 10002536 313->317 317->270
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: wcslen$wcscpy$QueryValue
    • String ID: InprocServer32$ThreadingModel$+8w`+8w
    • API String ID: 3495438468-3456325871
    • Opcode ID: c4260f03a4103386327f907f49e4696b6fc99d7f62d9331459b1c1bf3e83a945
    • Instruction ID: 2ef2c71096b13ae9e457a76c590163092a74dd924769b1517c816b7175000df9
    • Opcode Fuzzy Hash: c4260f03a4103386327f907f49e4696b6fc99d7f62d9331459b1c1bf3e83a945
    • Instruction Fuzzy Hash: D7C1D171900A118FE720DF58DCD8A9BB7E4EF443C9F01881DEC4997259E775E984CBA1

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: freadfseek$CriticalSection$ByteCharEnterLeaveMultiWide_wfopenfclosewcscpy
    • String ID: .$0$1$3$3$5$9$A$B$B$C$C$C$C$E$E$E$E$f$o$s$t${${${$}$}$}
    • API String ID: 1882367194-101255485
    • Opcode ID: b8d023a21bba30e2febaa6ecf4fe958fbf8d5c5ec60a7b436212acfc3dcec398
    • Instruction ID: d748a7da786b6bfea15dfe591960893aee9ae8f6c3cef3ff43216ee8acc7db6a
    • Opcode Fuzzy Hash: b8d023a21bba30e2febaa6ecf4fe958fbf8d5c5ec60a7b436212acfc3dcec398
    • Instruction Fuzzy Hash: 69D1C52052D38096E321CF61C894B9BB3F4FFA4384F44691EE69897361E7BA8548C75F

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 72 10001400-10001423 73 10001424 call 10001150 72->73 74 10001429-10001442 73->74 75 10001444-1000144f wcslen 74->75 76 1000146b-1000146f #861 74->76 77 10001451-10001469 #942 * 2 75->77 78 10001474-100014a7 call 10001920 call 10001930 _wcsicmp 75->78 76->78 77->78 83 100014d9 78->83 84 100014a9-100014d7 call 10001930 _wcsicmp #800 78->84 86 100014db-100014eb #800 83->86 84->83 84->86 88 10001506-1000150e 86->88 89 100014ed-10001501 86->89 91 10001514-10001537 call 10001930 _wcsicmp 88->91 92 1000161e-10001641 call 10001a30 _wcsicmp 88->92 90 100018eb-10001913 #800 89->90 97 10001569 91->97 98 10001539-10001567 call 10001930 _wcsicmp #800 91->98 99 10001673 92->99 100 10001643-10001671 call 10001a30 _wcsicmp #800 92->100 104 1000156b-1000157b #800 97->104 98->97 98->104 101 10001675-10001685 #800 99->101 100->99 100->101 105 100016a0-100016a6 101->105 106 10001687-1000169b 101->106 109 10001596-100015bb call 10001930 _wcsicmp 104->109 110 1000157d-10001591 104->110 112 100016ac-100016d1 call 10001a30 _wcsicmp 105->112 113 100017cd-100017db _wcsicmp 105->113 106->90 118 100015ed 109->118 119 100015bd-100015eb call 10001930 _wcsicmp #800 109->119 110->90 124 10001703 112->124 125 100016d3-10001701 call 10001a30 _wcsicmp #800 112->125 116 100017e1-10001809 call 10001b30 _wcsicmp #800 113->116 117 100018d7-100018db 113->117 116->117 133 1000180f-10001815 116->133 121 100018e1-100018e5 117->121 126 100015ef-100015ff #800 118->126 119->118 119->126 121->90 132 10001705-10001715 #800 124->132 125->124 125->132 130 100018c1-100018d5 126->130 131 10001605-10001619 126->131 130->90 131->90 135 10001730-10001755 call 10001a30 _wcsicmp 132->135 136 10001717-1000172b 132->136 137 10001843-10001849 133->137 138 10001817-10001824 _wcsicmp 133->138 149 10001787 135->149 150 10001757-10001785 call 10001a30 _wcsicmp #800 135->150 136->90 141 10001866-1000186c 137->141 142 1000184b-10001858 _wcsicmp 137->142 138->130 139 1000182a-1000183e 138->139 139->90 143 10001893-10001899 141->143 144 1000186e-1000187b _wcsicmp 141->144 142->130 146 1000185a-10001864 142->146 143->130 148 1000189b-100018c0 #800 143->148 144->130 147 1000187d-10001891 144->147 146->121 147->90 152 10001789-10001799 #800 149->152 150->149 150->152 154 100017b4-100017c8 152->154 155 1000179b-100017af 152->155 154->90 155->90
    APIs
      • Part of subcall function 10001150: #540.MFC42U(?,?,?,?,?,?), ref: 10001176
      • Part of subcall function 10001150: LoadLibraryW.KERNEL32(ntdll.dll,?,?,?,?,?,?,?,?,?), ref: 10001194
      • Part of subcall function 10001150: GetProcAddress.KERNEL32(00000000,ZwQueryKey), ref: 100011AF
      • Part of subcall function 10001150: #823.MFC42U(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 100011E7
      • Part of subcall function 10001150: #861.MFC42U(00000004), ref: 1000121B
      • Part of subcall function 10001150: #825.MFC42U(00000000), ref: 10001221
      • Part of subcall function 10001150: FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 1000122E
      • Part of subcall function 10001150: #535.MFC42U(?,?,?,?,?,?,?,?,?,?), ref: 10001240
      • Part of subcall function 10001150: #800.MFC42U(?,?,?,?,?,?,?,?,?,?), ref: 10001256
    • wcslen.MSVCRT ref: 10001444
    • #942.MFC42U(10009188), ref: 1000145A
    • #942.MFC42U(?,10009188), ref: 10001464
      • Part of subcall function 10001930: #538.MFC42U(xyxyoorljfoleuwrljfoulerfksdor,?,?,?,1000646F,000000FF,10001D7D,?,CurVer), ref: 1000196B
    • #861.MFC42U(?), ref: 1000146F
    • _wcsicmp.MSVCRT ref: 100014A0
    • _wcsicmp.MSVCRT ref: 100014C2
    • #800.MFC42U ref: 100014D0
    • #800.MFC42U ref: 100014E4
    • _wcsicmp.MSVCRT ref: 10001530
    • _wcsicmp.MSVCRT ref: 10001552
    • #800.MFC42U ref: 10001560
    • #800.MFC42U ref: 10001574
    • _wcsicmp.MSVCRT ref: 100015B4
    • #800.MFC42U ref: 100015F8
      • Part of subcall function 10001930: #538.MFC42U(10009064,?,?,?,1000646F,000000FF,10001D7D,?,CurVer), ref: 1000198C
      • Part of subcall function 10001930: #942.MFC42U(\Wow6432Node,10009064,?,?,?,1000646F,000000FF), ref: 100019A6
      • Part of subcall function 10001930: #942.MFC42U(10009188,10009064,?,?,?,1000646F,000000FF), ref: 100019B4
      • Part of subcall function 10001930: #942.MFC42U(00000000,10009188,10009064,?,?,?,1000646F,000000FF), ref: 100019C4
      • Part of subcall function 10001930: wcslen.MSVCRT ref: 100019CE
      • Part of subcall function 10001930: #942.MFC42U(10009188), ref: 100019E4
      • Part of subcall function 10001930: #942.MFC42U(?,10009188), ref: 100019EE
      • Part of subcall function 10001930: #535.MFC42U(?), ref: 100019FE
      • Part of subcall function 10001930: #800.MFC42U ref: 10001A14
    • _wcsicmp.MSVCRT ref: 100015D6
    • #800.MFC42U ref: 100015E4
    • _wcsicmp.MSVCRT ref: 1000163A
    • _wcsicmp.MSVCRT ref: 1000165C
    • #800.MFC42U ref: 1000166A
    • #800.MFC42U ref: 1000167E
    • _wcsicmp.MSVCRT ref: 100016CA
    • #800.MFC42U ref: 1000170E
      • Part of subcall function 10001A30: #538.MFC42U(10009064,?,?,?,1000649F,000000FF,10001ECD,?,ProgID), ref: 10001A8C
      • Part of subcall function 10001A30: #942.MFC42U(\Wow6432Node,10009064,?,?,?,1000649F,000000FF), ref: 10001AA6
      • Part of subcall function 10001A30: #942.MFC42U(\CLSID\,10009064,?,?,?,1000649F,000000FF), ref: 10001AB4
      • Part of subcall function 10001A30: #942.MFC42U(00000000,\CLSID\,10009064,?,?,?,1000649F,000000FF), ref: 10001AC4
      • Part of subcall function 10001A30: wcslen.MSVCRT ref: 10001ACE
      • Part of subcall function 10001A30: #942.MFC42U(10009188), ref: 10001AE4
      • Part of subcall function 10001A30: #942.MFC42U(?,10009188), ref: 10001AEE
      • Part of subcall function 10001A30: #535.MFC42U(?), ref: 10001AFE
      • Part of subcall function 10001A30: #800.MFC42U ref: 10001B14
    • _wcsicmp.MSVCRT ref: 100016EC
    • #800.MFC42U ref: 100016FA
    • _wcsicmp.MSVCRT ref: 1000174E
    • _wcsicmp.MSVCRT ref: 10001770
    • #800.MFC42U ref: 1000177E
    • #800.MFC42U ref: 10001792
    • _wcsicmp.MSVCRT ref: 100017D4
    • _wcsicmp.MSVCRT ref: 100017F4
    • #800.MFC42U ref: 10001802
    • _wcsicmp.MSVCRT ref: 1000181D
      • Part of subcall function 10001A30: #538.MFC42U(xyxyoorljfoleuwrljfoulerfksdor,?,?,?,1000649F,000000FF,10001ECD,?,ProgID), ref: 10001A6B
    • #800.MFC42U ref: 100018F7
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: #800$_wcsicmp$#942$#538$#535wcslen$#861Library$#540#823#825AddressFreeLoadProc
    • String ID: 1.0$CLSID$CurVer$InprocServer32$ProgID$win32
    • API String ID: 2745223314-3815763076
    • Opcode ID: f4d5b1f6c3545d255a4fc4fa84683b3a68eea10578ae6f7c742b8a78975376ec
    • Instruction ID: e587bc50812e586e2bd60427c8c21f55630403218c68574d11df9dc8f3e29d0e
    • Opcode Fuzzy Hash: f4d5b1f6c3545d255a4fc4fa84683b3a68eea10578ae6f7c742b8a78975376ec
    • Instruction Fuzzy Hash: 1CD16F74209341AFE300DF64CD90BDBB7E8EF896C4F444948F98597295EB35EA05CBA2

    Control-flow Graph

    APIs
    • InitializeCriticalSection.KERNEL32(10009528,?,?,?,100010DF), ref: 10001278
    • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,100010DF), ref: 1000128E
    • GetProcAddress.KERNEL32(00000000), ref: 10001297
    • GetCurrentProcess.KERNEL32(10009540,?,?,?,100010DF), ref: 100012A4
    • GetModuleHandleA.KERNEL32(ntdll.dll,ZwOpenKey,?,?,?,100010DF), ref: 100012B7
    • GetProcAddress.KERNEL32(00000000), ref: 100012BA
    • GetModuleHandleA.KERNEL32(ntdll.dll,ZwOpenKeyEx,?,?,?,100010DF), ref: 100012CB
    • GetProcAddress.KERNEL32(00000000), ref: 100012CE
    • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQueryKey,?,?,?,100010DF), ref: 100012DF
    • GetProcAddress.KERNEL32(00000000), ref: 100012E2
    • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQueryValueKey,?,?,?,100010DF), ref: 100012F3
    • GetProcAddress.KERNEL32(00000000), ref: 100012F6
    • GetModuleHandleA.KERNEL32(ntdll.dll,ZwClose,?,?,?,100010DF), ref: 10001307
    • GetProcAddress.KERNEL32(00000000), ref: 1000130A
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: AddressHandleModuleProc$CriticalCurrentInitializeProcessSection
    • String ID: IsWow64Process$ZwClose$ZwOpenKey$ZwOpenKeyEx$ZwQueryKey$ZwQueryValueKey$kernel32$ntdll.dll$+8w`+8w
    • API String ID: 2663015719-2529589178
    • Opcode ID: 172811b13e48408ddf2b8ab4dbaa0b3c0a2e83ca9b17fe80b06286a38d0ff660
    • Instruction ID: bc393e3598cc65d04037417f7a1f03f3b783a77bcc05561d6fd32471d0030434
    • Opcode Fuzzy Hash: 172811b13e48408ddf2b8ab4dbaa0b3c0a2e83ca9b17fe80b06286a38d0ff660
    • Instruction Fuzzy Hash: 42019EA1D042A9AAFA20FBF68C9CDCB7E5CDB842D53110526F7049351ADB798841CFA1

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: wcscat$#800$#4273$#4199#538#825ByteCharMultiWidewcscpy
    • String ID:
    • API String ID: 3218086493-0
    • Opcode ID: 70c7c4ec569e9afcec2c189fa726a6d1e9966894626a76c1a1deb38a02fb74fc
    • Instruction ID: 09f04f280ac1a6942a0064386c88c85055bd1199c361a2afb61791185c8fa687
    • Opcode Fuzzy Hash: 70c7c4ec569e9afcec2c189fa726a6d1e9966894626a76c1a1deb38a02fb74fc
    • Instruction Fuzzy Hash: 3461B271108781ABE715DF24CC91FAFB3A8EF95384F01092CF59583195EF25A909C7A7

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 344 10001a30-10001a55 345 10001a82-10001a9b #538 344->345 346 10001a57-10001a5e 344->346 348 10001aab-10001ad9 #942 * 2 wcslen 345->348 349 10001a9d-10001aa6 #942 345->349 346->345 347 10001a60-10001a81 #538 346->347 350 10001af3-10001b2a #535 #800 348->350 351 10001adb-10001aee #942 * 2 348->351 349->348 351->350
    APIs
    • #538.MFC42U(xyxyoorljfoleuwrljfoulerfksdor,?,?,?,1000649F,000000FF,10001ECD,?,ProgID), ref: 10001A6B
    • #538.MFC42U(10009064,?,?,?,1000649F,000000FF,10001ECD,?,ProgID), ref: 10001A8C
    • #942.MFC42U(\Wow6432Node,10009064,?,?,?,1000649F,000000FF), ref: 10001AA6
    • #942.MFC42U(\CLSID\,10009064,?,?,?,1000649F,000000FF), ref: 10001AB4
    • #942.MFC42U(00000000,\CLSID\,10009064,?,?,?,1000649F,000000FF), ref: 10001AC4
    • wcslen.MSVCRT ref: 10001ACE
    • #942.MFC42U(10009188), ref: 10001AE4
    • #942.MFC42U(?,10009188), ref: 10001AEE
    • #535.MFC42U(?), ref: 10001AFE
    • #800.MFC42U ref: 10001B14
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: #942$#538$#535#800wcslen
    • String ID: \CLSID\$\Wow6432Node$xyxyoorljfoleuwrljfoulerfksdor
    • API String ID: 3153432097-3768299153
    • Opcode ID: b22a3667cfbcf49f25b70c07b9256f71891a999a466759d11f549b470e779f78
    • Instruction ID: 08f889d4e3fb4bb5565a251bfb2ab1b94d4e6ba08e5119c4d5b5a8b23de7f138
    • Opcode Fuzzy Hash: b22a3667cfbcf49f25b70c07b9256f71891a999a466759d11f549b470e779f78
    • Instruction Fuzzy Hash: 1221B0766046619BE300CF14CD51BDAB3E4FF8AA84F40095CF58563299EF79AE04CB93

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 352 10001150-10001189 #540 353 10001235-1000126d #535 #800 352->353 354 1000118f-100011a2 LoadLibraryW 352->354 354->353 355 100011a8-100011b9 GetProcAddress 354->355 356 100011bb-100011d6 355->356 357 1000122d-10001234 355->357 356->357 360 100011d8-100011f3 #823 356->360 357->353 361 100011f5-10001207 360->361 362 10001229 360->362 364 10001220-10001226 #825 361->364 365 10001209-1000121b #861 361->365 362->357 364->362 365->364
    APIs
    • #540.MFC42U(?,?,?,?,?,?), ref: 10001176
    • LoadLibraryW.KERNEL32(ntdll.dll,?,?,?,?,?,?,?,?,?), ref: 10001194
    • GetProcAddress.KERNEL32(00000000,ZwQueryKey), ref: 100011AF
    • #823.MFC42U(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 100011E7
    • #861.MFC42U(00000004), ref: 1000121B
    • #825.MFC42U(00000000), ref: 10001221
    • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 1000122E
    • #535.MFC42U(?,?,?,?,?,?,?,?,?,?), ref: 10001240
    • #800.MFC42U(?,?,?,?,?,?,?,?,?,?), ref: 10001256
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: Library$#535#540#800#823#825#861AddressFreeLoadProc
    • String ID: ZwQueryKey$ntdll.dll$#v
    • API String ID: 2613158826-532945629
    • Opcode ID: bc5bbe6214aa5001c3c70daa38219ac9ccd12220b36cb51efc90beb907280d54
    • Instruction ID: d3dea8be48ffa99f9d5f34d600dd3274f25f708f68bf231c1563c345e68523fd
    • Opcode Fuzzy Hash: bc5bbe6214aa5001c3c70daa38219ac9ccd12220b36cb51efc90beb907280d54
    • Instruction Fuzzy Hash: 5D31BCB1404711AFE311DF24D810B9FB7E8EF84794F014A1CF899A3284EB78AA058B92

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 366 10001930-10001955 367 10001982-1000199b #538 366->367 368 10001957-1000195e 366->368 370 100019ab-100019d9 #942 * 2 wcslen 367->370 371 1000199d-100019a6 #942 367->371 368->367 369 10001960-10001981 #538 368->369 372 100019f3-10001a2a #535 #800 370->372 373 100019db-100019ee #942 * 2 370->373 371->370 373->372
    APIs
    • #538.MFC42U(xyxyoorljfoleuwrljfoulerfksdor,?,?,?,1000646F,000000FF,10001D7D,?,CurVer), ref: 1000196B
    • #538.MFC42U(10009064,?,?,?,1000646F,000000FF,10001D7D,?,CurVer), ref: 1000198C
    • #942.MFC42U(\Wow6432Node,10009064,?,?,?,1000646F,000000FF), ref: 100019A6
    • #942.MFC42U(10009188,10009064,?,?,?,1000646F,000000FF), ref: 100019B4
    • #942.MFC42U(00000000,10009188,10009064,?,?,?,1000646F,000000FF), ref: 100019C4
    • wcslen.MSVCRT ref: 100019CE
    • #942.MFC42U(10009188), ref: 100019E4
    • #942.MFC42U(?,10009188), ref: 100019EE
    • #535.MFC42U(?), ref: 100019FE
    • #800.MFC42U ref: 10001A14
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: #942$#538$#535#800wcslen
    • String ID: \Wow6432Node$xyxyoorljfoleuwrljfoulerfksdor
    • API String ID: 3153432097-2372900209
    • Opcode ID: 613f91e10275ba28aa624325a3d1f2c5f689fcc5d62542d8c4307f18b8cd6432
    • Instruction ID: 74bfcef7c59b22db7e0450e734908b9134bfe74a189a17882b269429263cd8d2
    • Opcode Fuzzy Hash: 613f91e10275ba28aa624325a3d1f2c5f689fcc5d62542d8c4307f18b8cd6432
    • Instruction Fuzzy Hash: E721B376504661ABE300CF14CD51BDAB3E4FF89A84F41095CF58553299EF79AE08CB93

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 374 10001b30-10001b96 #538 #942 * 2 wcslen 375 10001bb0-10001be7 #535 #800 374->375 376 10001b98-10001bab #942 * 2 374->376 376->375
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: #942$#535#538#800wcslen
    • String ID: \TypeLib\
    • API String ID: 3775937953-600913956
    • Opcode ID: d121028880f9f37c00128435c4e701899b645a4f73339be2d57e9d9c91fc371a
    • Instruction ID: 97af8a2b816642cbf3e83e4987fe7457cadacbba3d3d35339a73e1d59943db42
    • Opcode Fuzzy Hash: d121028880f9f37c00128435c4e701899b645a4f73339be2d57e9d9c91fc371a
    • Instruction Fuzzy Hash: 4511A3B5108651AFE300DF14CC50B9BBBA4EF85691F00891CF48943299EF35A509CB97

    Control-flow Graph

    APIs
    • wcscpy.MSVCRT ref: 10002813
    • GetModuleHandleW.KERNEL32(00000000,?,00000200), ref: 10002834
    • GetModuleFileNameW.KERNEL32(00000000,?,00000200), ref: 1000283B
    • wcslen.MSVCRT ref: 10002846
    • wcscat.MSVCRT ref: 1000287A
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: Module$FileHandleNamewcscatwcscpywcslen
    • String ID: .$Apartment$Both
    • API String ID: 2054667532-1695967614
    • Opcode ID: e66a015e92e41beedde033933ee022f76622b8e0d2b7561b036895c08a9c1864
    • Instruction ID: 8dc09df306f3aeac2cb15477358e42074c0e142bab5dd9a3ac3a12d3aa31bc2b
    • Opcode Fuzzy Hash: e66a015e92e41beedde033933ee022f76622b8e0d2b7561b036895c08a9c1864
    • Instruction Fuzzy Hash: 6C21A4B95042819BF360E764DC45BAB73E8FF80384F40882CEB8992059FB75955DC7A3
    APIs
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: fseek$DirectorySystemfclosefopenfreadftellmallocstrchr
    • String ID:
    • API String ID: 1390157628-0
    • Opcode ID: e506fa6d25c0440c55aefb787ab431d84a08c89064c8190344b0abc9546546ad
    • Instruction ID: ebbcbae6c0e7c7988dd8aaf0e80484ee13c507c82097ae489073b65b346a024c
    • Opcode Fuzzy Hash: e506fa6d25c0440c55aefb787ab431d84a08c89064c8190344b0abc9546546ad
    • Instruction Fuzzy Hash: FF31083260061017E7288B789C89BAF76C5FBC53B1F54072DFA2A872C4DEA99D09C295
    APIs
    • #540.MFC42U ref: 10002665
    • EnterCriticalSection.KERNEL32(?,?,?,10009528), ref: 10002677
    • #861.MFC42U(Apartment,?,?,?,10009528), ref: 10002686
    • LeaveCriticalSection.KERNEL32(10009528,Apartment,?,?,?,10009528), ref: 10002690
    • #535.MFC42U(?,?,?,?,10009528), ref: 100026A1
    • #800.MFC42U(?,?,?,?,10009528), ref: 100026B7
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$#535#540#800#861EnterLeave
    • String ID: Apartment
    • API String ID: 2659518386-3482315511
    • Opcode ID: 30f678aa10425c0768487384b688df8f5f3383e2401929aacce373796505cbe5
    • Instruction ID: 62e887f79e0c6814c4870c848619d622f785478aaf9b2f642893a6cad553d807
    • Opcode Fuzzy Hash: 30f678aa10425c0768487384b688df8f5f3383e2401929aacce373796505cbe5
    • Instruction Fuzzy Hash: 7501F4B4408641EFE300DF54DD54B8EBBE4FB85792F40890CF54943298DB389908CBA7
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 10004D69
    • GetThreadContext.KERNEL32 ref: 10004E8F
    • SetThreadContext.KERNEL32(?,?), ref: 10004F00
    • GetCurrentProcess.KERNEL32 ref: 10004F1B
      • Part of subcall function 10004C30: GetCurrentThreadId.KERNEL32 ref: 10004C31
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: Thread$Current$Context$Process
    • String ID:
    • API String ID: 2043380635-0
    • Opcode ID: e3fd9327122e1a0b5100c2a9f97ad9caffe351a76243ecf282890f97c32ddb3c
    • Instruction ID: 00b7f0c0d3398a48c3e32b856f74d171efe319d2e2ef352bbe66c176b0606302
    • Opcode Fuzzy Hash: e3fd9327122e1a0b5100c2a9f97ad9caffe351a76243ecf282890f97c32ddb3c
    • Instruction Fuzzy Hash: 6D8183B56007528FE324CF69C884967B3E6FB88380B16896DE89987759DF30FC45CB54
    APIs
    • GetModuleHandleA.KERNEL32(ntdll.dll,ZwProtectVirtualMemory,00000000,10005BDE,?,?,?,?,000000FF,10005CE8,000000FF,?,?,?,?), ref: 10005AE4
    • GetProcAddress.KERNEL32(00000000), ref: 10005AEB
      • Part of subcall function 10005A40: GetModuleHandleA.KERNEL32(00000000,?,00000000,?,10005B05,00000000,ntdll.dll,1000BFA4,00000005), ref: 10005A48
    • VirtualAlloc.KERNEL32(00000000,0000000B,00003000,00000040,00000000,10005BDE,?,?,?,?,000000FF,10005CE8,000000FF,?,?,?), ref: 10005B38
    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 10005BA8
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: HandleModuleVirtual$AddressAllocFreeProc
    • String ID: ZwProtectVirtualMemory$ntdll.dll
    • API String ID: 388322139-613508025
    • Opcode ID: 3f2e333342cacb2edc7985fbc541f57f2e2b50b9c22888553d4749b7b8733c30
    • Instruction ID: 24d9de40e1ec38948f0626ff2d0eb67c681e120d5b9cbc94a272e34673a50bb4
    • Opcode Fuzzy Hash: 3f2e333342cacb2edc7985fbc541f57f2e2b50b9c22888553d4749b7b8733c30
    • Instruction Fuzzy Hash: 28214CB1A046229FF214CF289C94F677AA4EF497D1F018665FA08973E9D771E801CB72
    APIs
    • ?_Xran@std@@YAXXZ.MSVCP60(?,?,00000000,00000000,10003F53,?,00000000,FFFFFFFF,?,?,?,?), ref: 10003FD3
    • ?_Xran@std@@YAXXZ.MSVCP60(?,?,00000000,00000000,10003F53,?,00000000,FFFFFFFF,?,?,?,?), ref: 10004001
    • memmove.MSVCRT(?,?,?,?,?,00000000,00000000,10003F53,?,00000000,FFFFFFFF,?,?,?,?), ref: 1000402A
    • memmove.MSVCRT(?,?,?,?,?,00000000,00000000,10003F53,?,00000000,FFFFFFFF,?,?,?,?), ref: 10004079
    • #825.MFC42U(?,?,?,00000000,00000000,10003F53,?,00000000,FFFFFFFF,?,?,?,?), ref: 100040E2
    • ?_Xlen@std@@YAXXZ.MSVCP60(?,?,00000000,00000000,10003F53,?,00000000,FFFFFFFF,?,?,?,?), ref: 1000412C
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: Xran@std@@memmove$#825Xlen@std@@
    • String ID:
    • API String ID: 1058695723-0
    • Opcode ID: c99c899000f3e845d934672dc8fa5a44403cf90caa0ca127342bf30a0f941e39
    • Instruction ID: 030e978d56c2ab623cdcb170f7569a7b32d6d92317d5ad0df148ab8d32bc1acc
    • Opcode Fuzzy Hash: c99c899000f3e845d934672dc8fa5a44403cf90caa0ca127342bf30a0f941e39
    • Instruction Fuzzy Hash: 9A5124B13002459BEB04CF68D8946AEB7E6EF942D0B12816DFD09CB349DF32ED848784
    APIs
    • #540.MFC42U ref: 100025D5
    • EnterCriticalSection.KERNEL32(?,?,?,10009528), ref: 100025E7
    • #861.MFC42U(1000966C,?,?,?,10009528), ref: 100025F6
    • LeaveCriticalSection.KERNEL32(10009528,1000966C,?,?,?,10009528), ref: 10002600
    • #535.MFC42U(?,?,?,?,10009528), ref: 10002611
    • #800.MFC42U(?,?,?,?,10009528), ref: 10002627
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$#535#540#800#861EnterLeave
    • String ID:
    • API String ID: 2659518386-0
    • Opcode ID: ada13aba084fd554437abbf018868ea6530f0b1f331527b19768b0ad6ad6d98d
    • Instruction ID: fd7d3a6004d433891c5c411062b12546cca0578b90f5abe4cccb98c8943f4945
    • Opcode Fuzzy Hash: ada13aba084fd554437abbf018868ea6530f0b1f331527b19768b0ad6ad6d98d
    • Instruction Fuzzy Hash: 7001F4B4408640EFE300DF54CD40B8EBBE4FB85792F40891CF68943294DB789908CB97
    APIs
    • GetCurrentThread.KERNEL32 ref: 1000500B
    • #823.MFC42U(00000008,?,?,1000133A,00000000), ref: 1000501B
    • SuspendThread.KERNEL32(?,00000000), ref: 10005031
    • GetLastError.KERNEL32 ref: 1000503C
    • #825.MFC42U(00000000), ref: 10005045
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: Thread$#823#825CurrentErrorLastSuspend
    • String ID:
    • API String ID: 3974497259-0
    • Opcode ID: cc5c28da0ed3cb80a9ca6d922b5efe33ea86db9f6fba49d33db0ad4a55a296ef
    • Instruction ID: 18245ed321afc0d90b876c41bab88f2370897c18db3d6b37bb0b96d684dff324
    • Opcode Fuzzy Hash: cc5c28da0ed3cb80a9ca6d922b5efe33ea86db9f6fba49d33db0ad4a55a296ef
    • Instruction Fuzzy Hash: 66F0A4B2900A62CBF320DF689C8465F77D4EB903E1F124636EA44C729CDB35D8458FA1
    APIs
    • sprintf.MSVCRT ref: 10005D8F
    • CreateFileA.KERNEL32(?,C0000000,00000001,00000000,00000003,00000080,00000000), ref: 10005DAB
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: CreateFilesprintf
    • String ID: \\.\%c%c%d
    • API String ID: 3122967319-720341438
    • Opcode ID: fb3a7a8b64182b26fca6dd2dcfa44545cef07e93377b4d4170262b454fe4ac0d
    • Instruction ID: 8abcecb530939a06ff02b4e79d9815dd8bad28e7ee65b7157aecf8ed02193d27
    • Opcode Fuzzy Hash: fb3a7a8b64182b26fca6dd2dcfa44545cef07e93377b4d4170262b454fe4ac0d
    • Instruction Fuzzy Hash: 57314C326042050BE728CA38EC457BB7BD1FBC07B0F95072EF996832D4CAB99D09C691
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 100050CB
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: CurrentThread
    • String ID:
    • API String ID: 2882836952-0
    • Opcode ID: c516182049691b8fd8390c59d55166f2577fabcdafe1b531d33eb2f9755230c7
    • Instruction ID: 1994d0de1a42c22369135885ee02961ea05c59e3f84e2c7875db4395ffa74dba
    • Opcode Fuzzy Hash: c516182049691b8fd8390c59d55166f2577fabcdafe1b531d33eb2f9755230c7
    • Instruction Fuzzy Hash: 929111B16047468FE710CF18D880B5BB7E1FF862D1F41462EE94587298E772EE48CB92
    APIs
    • VirtualQuery.KERNEL32(?,?,0000001C), ref: 1000549E
    • VirtualAlloc.KERNEL32(?,00010000,00003000,00000040), ref: 100054D4
    • VirtualQuery.KERNEL32(?,?,0000001C), ref: 10005508
    • VirtualAlloc.KERNEL32(?,00010000,00003000,00000040), ref: 1000554C
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: Virtual$AllocQuery
    • String ID:
    • API String ID: 31662377-0
    • Opcode ID: b6d64277b744421d1ccbfd1fd9a04d209526ad95b39b0fa185daa15fb1c8d727
    • Instruction ID: 61e2964d8fc8964c7a371095edf98da1f1874e119c01a5abccf401dd21d6e409
    • Opcode Fuzzy Hash: b6d64277b744421d1ccbfd1fd9a04d209526ad95b39b0fa185daa15fb1c8d727
    • Instruction Fuzzy Hash: BD519F31A047128BEB14CF19C8D076BB7E2FB886C6F664529E844A7358E331ED818B51
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 10005695
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: CurrentThread
    • String ID:
    • API String ID: 2882836952-0
    • Opcode ID: 3549d485cfd7cc12aa0032a44624f96d3d22b46faada2d7fece3d50849546f10
    • Instruction ID: 39fa3f4efa6b89b053462ff4677e5b8989544524c2f6e52f439509726f00a3e8
    • Opcode Fuzzy Hash: 3549d485cfd7cc12aa0032a44624f96d3d22b46faada2d7fece3d50849546f10
    • Instruction Fuzzy Hash: FB31B0B6609312CBF320CF19EC80B6BB3D4EB803E2F11413EE90987248DB36A8459B55
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 10004C31
    • #825.MFC42U(?,?,?,?,?,?,?,00000000,?,10004D93), ref: 10004C8B
    • ResumeThread.KERNEL32(?,?,?,?,00000000,?,10004D93), ref: 10004CB9
    • #825.MFC42U(?,?,?,?,00000000,?,10004D93), ref: 10004CBE
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: #825Thread$CurrentResume
    • String ID:
    • API String ID: 2499501605-0
    • Opcode ID: c46582828a6bc86dbf2a66cb05b46b38f77553a760397b5702bdaa6a191d9bc6
    • Instruction ID: 52e0d458e9b236fbdc740bc952d7d616ba79252a119376830c2f6ac1994e4aa9
    • Opcode Fuzzy Hash: c46582828a6bc86dbf2a66cb05b46b38f77553a760397b5702bdaa6a191d9bc6
    • Instruction Fuzzy Hash: E81190F6902A559BF360DF689D8081BB3E9EB442D03530A6EE55A93608DF35FC408B95
    APIs
    • EnterCriticalSection.KERNEL32(10009528,100028E1,Both), ref: 10003185
    • wcscpy.MSVCRT ref: 10003195
    • LeaveCriticalSection.KERNEL32(10009528), ref: 100031A3
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.2261648321.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
    • Associated: 00000004.00000002.2261612792.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261707000.0000000010007000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261751201.0000000010009000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.2261863396.000000001000E000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeavewcscpy
    • String ID: Apartment
    • API String ID: 3852819969-3482315511
    • Opcode ID: 5582def3bbfb7492c8b3bcb0e8ad3b42720def95b2590fb4b905f7b3638b339f
    • Instruction ID: 98de487c64ddbc34172ffb55b37b1c67c298462f3fae1c2ed628f0bd2cb6bf1c
    • Opcode Fuzzy Hash: 5582def3bbfb7492c8b3bcb0e8ad3b42720def95b2590fb4b905f7b3638b339f
    • Instruction Fuzzy Hash: 31C002B8D00510ABF2119B99CD8CAD93A64FB85797FC44590FB0981268C72D59549B72
    Memory Dump Source
    • Source File: 0000000E.00000002.2302096612.0000000002FCC000.00000004.00000010.00020000.00000000.sdmp, Offset: 02FCC000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_14_2_2fcc000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 4460e90c84f2468d3704331029508a409139f2c3f3c8a10d4ea4275dfacbf156
    • Instruction ID: 6b73d65499fff465c1433ee920a113eb07ea13a29ae0b5816885ca048405bbde
    • Opcode Fuzzy Hash: 4460e90c84f2468d3704331029508a409139f2c3f3c8a10d4ea4275dfacbf156
    • Instruction Fuzzy Hash: 65F092A244F3C14FC3178B7498BA5967F749D5719475F81DBD0C18F0A3D548484BC722