Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
EACore.dll

Overview

General Information

Sample name:EACore.dll
Analysis ID:1524375
MD5:2554e4864294dc96a5b4548dd42c7189
SHA1:8e3b3c600ab812537a84409adfc5169518862fd3
SHA256:b25c79ba507a256c9ca12a9bd34def6a33f9c087578c03d083d7863c708eca21
Tags:CeranaKeeperdlluser-JAMESWT_MHT
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Found decision node followed by non-executed suspicious APIs
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7472 cmdline: loaddll32.exe "C:\Users\user\Desktop\EACore.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7520 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\EACore.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7548 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7532 cmdline: rundll32.exe C:\Users\user\Desktop\EACore.dll,AgentAdd MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7596 cmdline: rundll32.exe C:\Users\user\Desktop\EACore.dll,AgentRemove MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7620 cmdline: rundll32.exe C:\Users\user\Desktop\EACore.dll,AgentTaskAdd MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7644 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentAdd MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7652 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentRemove MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7660 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentTaskAdd MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7668 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",ViewSetContentFilters MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7684 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserLogout MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7692 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserLogin MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7712 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserIsLoggedIn MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7724 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserGetNames MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7736 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserGetEntitlements MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7748 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserEnumContent MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7760 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",StateSetTag MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7772 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",StateSetProperty MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7784 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",StateGet MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7836 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemUse MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7844 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemUnpackStart MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7860 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemUnpackCancel MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7872 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemInstallStartBatch MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7904 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemInstallStart MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7916 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemGetStatus MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7924 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemEnumPatches MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7932 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemDownloadTogglePauseState MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7940 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemDownloadStart MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7948 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemDownloadCancel MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7960 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemDecryptStart MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7972 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemDecryptCancel MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8000 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemClearCache MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8012 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",IsConnected MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8024 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",Disconnect MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8040 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",Connect3 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8052 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",Connect MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8060 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",Command MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8124 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentTaskStatusSet MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8136 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentTaskStatusGet MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8164 cmdline: rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentTaskRemove MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: EACore.dllAvira: detected
Source: EACore.dllReversingLabs: Detection: 39%
Source: EACore.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: EACore.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: Binary string: C:\Users\admin\source\repos\YK0130\Release\YK0130.pdb` source: rundll32.exe, 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmp, EACore.dll
Source: Binary string: C:\Users\admin\source\repos\YK0130\Release\YK0130.pdb source: rundll32.exe, 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmp, EACore.dll
Source: unknownDNS traffic detected: query: www.toptipvideo.com replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 33_2_6E349A60 recv,33_2_6E349A60
Source: global trafficDNS traffic detected: DNS query: www.toptipvideo.com
Source: EACore.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: classification engineClassification label: mal56.winDLL@80/0@35/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7480:120:WilError_03
Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\Mutex8565865865
Source: EACore.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\EACore.dll,AgentAdd
Source: EACore.dllReversingLabs: Detection: 39%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\EACore.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\EACore.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\EACore.dll,AgentAdd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\EACore.dll,AgentRemove
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\EACore.dll,AgentTaskAdd
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentAdd
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentRemove
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentTaskAdd
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ViewSetContentFilters
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserLogout
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserLogin
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserIsLoggedIn
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserGetNames
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserGetEntitlements
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserEnumContent
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",StateSetTag
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",StateSetProperty
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",StateGet
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemUse
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemUnpackStart
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemUnpackCancel
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemInstallStartBatch
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemInstallStart
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemGetStatus
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemEnumPatches
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemDownloadTogglePauseState
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemDownloadStart
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemDownloadCancel
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemDecryptStart
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemDecryptCancel
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemClearCache
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",IsConnected
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",Disconnect
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",Connect3
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",Connect
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",Command
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentTaskStatusSet
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentTaskStatusGet
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentTaskRemove
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\EACore.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\EACore.dll,AgentAddJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\EACore.dll,AgentRemoveJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\EACore.dll,AgentTaskAddJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentAddJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentRemoveJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentTaskAddJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ViewSetContentFiltersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserLogoutJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserLoginJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserIsLoggedInJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserGetNamesJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserGetEntitlementsJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserEnumContentJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",StateSetTagJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",StateSetPropertyJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",StateGetJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemUseJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemUnpackStartJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemUnpackCancelJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemInstallStartBatchJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemInstallStartJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemGetStatusJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemEnumPatchesJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemDownloadTogglePauseStateJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemDownloadStartJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemDownloadCancelJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemDecryptStartJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemDecryptCancelJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemClearCacheJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",IsConnectedJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",DisconnectJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",Connect3Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",ConnectJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",CommandJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentTaskStatusSetJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentTaskStatusGetJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentTaskRemoveJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: EACore.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: EACore.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: EACore.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: EACore.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: EACore.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: EACore.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: EACore.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: EACore.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\admin\source\repos\YK0130\Release\YK0130.pdb` source: rundll32.exe, 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmp, EACore.dll
Source: Binary string: C:\Users\admin\source\repos\YK0130\Release\YK0130.pdb source: rundll32.exe, 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmp, EACore.dll
Source: EACore.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: EACore.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: EACore.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: EACore.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: EACore.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: EACore.dllStatic PE information: section name: .00cfg
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 33_2_6E343910 push eax; mov dword ptr [esp], ecx33_2_6E343915
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 33_2_6E342E00 push eax; mov dword ptr [esp], ecx33_2_6E342E03
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 33_2_6E351E50 push eax; mov dword ptr [esp], ecx33_2_6E351E53
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 33_2_6E344EA0 push eax; mov dword ptr [esp], ecx33_2_6E344EA2
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 33_2_6E342EF0 push eax; mov dword ptr [esp], ecx33_2_6E342EF3
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 33_2_6E34E4D0 push eax; mov dword ptr [esp], ecx33_2_6E34E4D3
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 33_2_6E342F60 push eax; mov dword ptr [esp], ecx33_2_6E342F63
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 33_2_6E349580 push eax; mov dword ptr [esp], ecx33_2_6E349585
Source: EACore.dllStatic PE information: section name: .text entropy: 6.9068504888777
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 1800000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_33-6222
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 4.9 %
Source: C:\Windows\SysWOW64\rundll32.exe TID: 8016Thread sleep count: 35 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 8016Thread sleep time: -70000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 8016Thread sleep time: -21600000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 1800000Jump to behavior
Source: rundll32.exe, 00000021.00000002.2920322058.0000000002C1F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_33-5453
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 33_2_6E352F3A IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,33_2_6E352F3A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 33_2_6E352F3A IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,33_2_6E352F3A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 33_2_6E3527F0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,33_2_6E3527F0
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EACore.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 33_2_6E353127 cpuid 33_2_6E353127
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 33_2_6E352BC6 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,33_2_6E352BC6
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 33_2_6E349F20 GetUserNameA,lstrlenA,33_2_6E349F20
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local System1
Ingress Tool Transfer
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Obfuscated Files or Information
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Rundll32
NTDS1
Account Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Software Packing
LSA Secrets1
System Owner/User Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials22
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1524375 Sample: EACore.dll Startdate: 02/10/2024 Architecture: WINDOWS Score: 56 20 www.toptipvideo.com 2->20 22 Antivirus / Scanner detection for submitted sample 2->22 24 Multi AV Scanner detection for submitted file 2->24 8 loaddll32.exe 1 2->8         started        signatures3 process4 process5 10 cmd.exe 1 8->10         started        12 conhost.exe 8->12         started        14 rundll32.exe 8->14         started        16 36 other processes 8->16 process6 18 rundll32.exe 10->18         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
EACore.dll39%ReversingLabsWin32.Trojan.Generic
EACore.dll100%AviraTR/Agent.tcdnf
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
www.toptipvideo.com
unknown
unknownfalse
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1524375
    Start date and time:2024-10-02 18:24:26 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 10s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:42
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:EACore.dll
    Detection:MAL
    Classification:mal56.winDLL@80/0@35/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 10
    • Number of non-executed functions: 35
    Cookbook Comments:
    • Found application associated with file extension: .dll
    • Exclude process from analysis (whitelisted): SIHClient.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size exceeded maximum capacity and may have missing behavior information.
    • VT rate limit hit for: EACore.dll
    TimeTypeDescription
    12:25:28API Interceptor1x Sleep call for process: loaddll32.exe modified
    12:25:34API Interceptor12x Sleep call for process: rundll32.exe modified
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.7858962988515925
    TrID:
    • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
    • Generic Win/DOS Executable (2004/3) 0.20%
    • DOS Executable Generic (2002/1) 0.20%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:EACore.dll
    File size:90'624 bytes
    MD5:2554e4864294dc96a5b4548dd42c7189
    SHA1:8e3b3c600ab812537a84409adfc5169518862fd3
    SHA256:b25c79ba507a256c9ca12a9bd34def6a33f9c087578c03d083d7863c708eca21
    SHA512:d8074bb68791560027d6e391110a36b6de604d6b73829bd1b1b89476f2e0a53398d6611129f3782a92b935115589763248fb90b6ba74ec5abb6d81dec3c12c1a
    SSDEEP:1536:9gSxD3zFkkt0h0BJVSIKMDSiAJtaNQ2hyAr+u6IHnQz0SuRPeJPqHO4LyFffbGqS:9gSNxkka0BRKMDSiAJtChyAr+u6IHnQq
    TLSH:DB934C8676C3B0FBD38F40F5102AD22BA7256A309B101EF3E694DD7899A13C15971B7B
    File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...*..d...........!.....&...8......X+....................................................@.........................$O.......R.....
    Icon Hash:7ae282899bbab082
    Entrypoint:0x10012b58
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x10000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
    Time Stamp:0x64EEB12A [Wed Aug 30 03:02:02 2023 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:d7b40c7a58929630429c343781a071bd
    Instruction
    push ebp
    mov ebp, esp
    cmp dword ptr [ebp+0Ch], 01h
    jne 00007F13D4ABADF7h
    call 00007F13D4ABAE0Ah
    push dword ptr [ebp+10h]
    push dword ptr [ebp+0Ch]
    push dword ptr [ebp+08h]
    call 00007F13D4ABACCEh
    add esp, 0Ch
    pop ebp
    retn 000Ch
    mov ecx, dword ptr [10017330h]
    push esi
    push edi
    mov edi, BB40E64Eh
    mov esi, FFFF0000h
    cmp ecx, edi
    je 00007F13D4ABADF6h
    test esi, ecx
    jne 00007F13D4ABAE18h
    call 00007F13D4ABAE21h
    mov ecx, eax
    cmp ecx, edi
    jne 00007F13D4ABADF9h
    mov ecx, BB40E64Fh
    jmp 00007F13D4ABAE00h
    test esi, ecx
    jne 00007F13D4ABADFCh
    or eax, 00004711h
    shl eax, 10h
    or ecx, eax
    mov dword ptr [10017330h], ecx
    not ecx
    pop edi
    mov dword ptr [1001732Ch], ecx
    pop esi
    ret
    push ebp
    mov ebp, esp
    sub esp, 14h
    and dword ptr [ebp-0Ch], 00000000h
    lea eax, dword ptr [ebp-0Ch]
    and dword ptr [ebp-08h], 00000000h
    push eax
    call dword ptr [10015540h]
    mov eax, dword ptr [ebp-08h]
    xor eax, dword ptr [ebp-0Ch]
    mov dword ptr [ebp-04h], eax
    call dword ptr [10015538h]
    xor dword ptr [ebp-04h], eax
    call dword ptr [10015534h]
    xor dword ptr [ebp-04h], eax
    lea eax, dword ptr [ebp-14h]
    push eax
    call dword ptr [10015560h]
    mov eax, dword ptr [ebp-10h]
    lea ecx, dword ptr [ebp-04h]
    xor eax, dword ptr [ebp-14h]
    xor eax, dword ptr [ebp-04h]
    xor eax, ecx
    leave
    ret
    push 10017698h
    call dword ptr [1001554Ch]
    ret
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x14f240x386.rdata
    IMAGE_DIRECTORY_ENTRY_IMPORT0x152aa0xc8.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x190000xe8.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1a0000x740.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x14e540x1c.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x147d80xbc.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x155140x1a0.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x124700x126009165d72b02e63e520899156da7d23d1fFalse0.5031090561224489data6.9068504888777IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x140000x262c0x2800b90072950bf4f3684e5e89fb65cf945dFalse0.34951171875data5.066255958576898IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x170000x6ec0x4000ade64011f16b75e4e262084d81defc4False0.2451171875data3.955903511120874IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .00cfg0x180000x40x20055b14440e19e0e31e878405a13dfbbf9False0.033203125data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x190000xe80x200d8d5560c7c0e8b679ab25180f1113416False0.306640625data2.344915704357875IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x1a0000x7400x800f2064fe2de19efe9376d521d83d87cbfFalse0.775390625data6.016678031703543IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_MANIFEST0x190600x87XML 1.0 document, ASCII textEnglishUnited States0.8222222222222222
    DLLImport
    KERNEL32.dllCloseHandle, CreateMutexA, CreateProcessW, DeleteCriticalSection, EnterCriticalSection, ExitProcess, GetComputerNameA, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetModuleFileNameW, GetSystemTimeAsFileTime, GetVolumeInformationA, InitializeCriticalSection, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, LeaveCriticalSection, OpenMutexA, QueryPerformanceCounter, SetUnhandledExceptionFilter, Sleep, TerminateProcess, UnhandledExceptionFilter, WaitForSingleObject, lstrlenA
    ADVAPI32.dllGetUserNameA
    MSVCP140.dll??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ, ??0ios_base@std@@IAE@XZ, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ, ??1ios_base@std@@UAE@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@I@Z, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ, ?_Random_device@std@@YAIXZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ, ?_Xinvalid_argument@std@@YAXPBD@Z, ?_Xlength_error@std@@YAXPBD@Z, ?_Xout_of_range@std@@YAXPBD@Z, ?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ, ?good@ios_base@std@@QBE_NXZ, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEXABVlocale@2@@Z, ?init@?$basic_ios@DU?$char_traits@D@std@@@std@@IAEXPAV?$basic_streambuf@DU?$char_traits@D@std@@@2@_N@Z, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEPAV12@PAD_J@Z, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ, ?uncaught_exception@std@@YA_NXZ, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z
    WS2_32.dllWSAStartup, closesocket, connect, gethostbyname, htons, inet_addr, inet_ntoa, recv, send, setsockopt, shutdown, socket
    VCRUNTIME140.dll_CxxThrowException, __CxxFrameHandler3, __std_exception_copy, __std_exception_destroy, __std_terminate, __std_type_info_destroy_list, _except_handler4_common, _purecall, memchr, memcmp, memcpy, memmove, memset
    api-ms-win-crt-heap-l1-1-0.dll_callnewh, free, malloc
    api-ms-win-crt-runtime-l1-1-0.dll_beginthread, _cexit, _configure_narrow_argv, _endthread, _errno, _execute_onexit_table, _initialize_narrow_environment, _initialize_onexit_table, _initterm, _initterm_e, _invalid_parameter_noinfo_noreturn, _seh_filter_dll
    api-ms-win-crt-convert-l1-1-0.dllstrtol
    api-ms-win-crt-string-l1-1-0.dllstrlen, wcslen
    NameOrdinalAddress
    AgentAdd10x10001000
    AgentRemove20x10001000
    AgentTaskAdd30x10001000
    AgentTaskRemove40x10001000
    AgentTaskStatusGet50x10001000
    AgentTaskStatusSet60x10001000
    Command70x10001000
    Connect80x10001000
    Connect390x10001000
    Disconnect100x10001000
    IsConnected110x10001010
    ItemClearCache120x10001000
    ItemDecryptCancel130x10001000
    ItemDecryptStart140x10001000
    ItemDownloadCancel150x10001000
    ItemDownloadStart160x10001000
    ItemDownloadTogglePauseState170x10001000
    ItemEnumPatches180x10001000
    ItemGetStatus190x10001000
    ItemInstallStart200x10001000
    ItemInstallStartBatch210x10001000
    ItemUnpackCancel220x10001000
    ItemUnpackStart230x10001000
    ItemUse240x10001000
    StateGet250x10001000
    StateSetProperty260x10001000
    StateSetTag270x10001000
    UserEnumContent280x10001000
    UserGetEntitlements290x10001000
    UserGetNames300x10001000
    UserIsLoggedIn310x10001000
    UserLogin320x10001000
    UserLogout330x10001000
    ViewSetContentFilters340x10001000
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    Oct 2, 2024 18:25:29.308029890 CEST6429753192.168.2.41.1.1.1
    Oct 2, 2024 18:25:29.321520090 CEST53642971.1.1.1192.168.2.4
    Oct 2, 2024 18:25:35.491889000 CEST5206753192.168.2.41.1.1.1
    Oct 2, 2024 18:25:35.502222061 CEST53520671.1.1.1192.168.2.4
    Oct 2, 2024 18:25:41.648597956 CEST5103753192.168.2.41.1.1.1
    Oct 2, 2024 18:25:41.659759998 CEST53510371.1.1.1192.168.2.4
    Oct 2, 2024 18:25:47.804610968 CEST6532753192.168.2.41.1.1.1
    Oct 2, 2024 18:25:47.822385073 CEST53653271.1.1.1192.168.2.4
    Oct 2, 2024 18:25:53.977952003 CEST5323653192.168.2.41.1.1.1
    Oct 2, 2024 18:25:53.990899086 CEST53532361.1.1.1192.168.2.4
    Oct 2, 2024 18:26:00.172275066 CEST4952453192.168.2.41.1.1.1
    Oct 2, 2024 18:26:00.202981949 CEST53495241.1.1.1192.168.2.4
    Oct 2, 2024 18:26:04.226437092 CEST5210853192.168.2.41.1.1.1
    Oct 2, 2024 18:26:04.342066050 CEST53521081.1.1.1192.168.2.4
    Oct 2, 2024 18:26:10.492182970 CEST5479453192.168.2.41.1.1.1
    Oct 2, 2024 18:26:10.502648115 CEST53547941.1.1.1192.168.2.4
    Oct 2, 2024 18:26:16.648518085 CEST5963653192.168.2.41.1.1.1
    Oct 2, 2024 18:26:17.039787054 CEST53596361.1.1.1192.168.2.4
    Oct 2, 2024 18:26:23.195262909 CEST5695153192.168.2.41.1.1.1
    Oct 2, 2024 18:26:24.211215973 CEST5695153192.168.2.41.1.1.1
    Oct 2, 2024 18:26:25.210892916 CEST5695153192.168.2.41.1.1.1
    Oct 2, 2024 18:26:27.231678009 CEST5695153192.168.2.41.1.1.1
    Oct 2, 2024 18:26:31.226234913 CEST5695153192.168.2.41.1.1.1
    Oct 2, 2024 18:26:35.243419886 CEST5536953192.168.2.41.1.1.1
    Oct 2, 2024 18:26:36.257520914 CEST5536953192.168.2.41.1.1.1
    Oct 2, 2024 18:26:36.361794949 CEST53553691.1.1.1192.168.2.4
    Oct 2, 2024 18:26:37.368302107 CEST5815953192.168.2.41.1.1.1
    Oct 2, 2024 18:26:38.382728100 CEST5815953192.168.2.41.1.1.1
    Oct 2, 2024 18:26:39.398127079 CEST5815953192.168.2.41.1.1.1
    Oct 2, 2024 18:26:41.413738012 CEST5815953192.168.2.41.1.1.1
    Oct 2, 2024 18:26:45.429389000 CEST5815953192.168.2.41.1.1.1
    Oct 2, 2024 18:26:49.430061102 CEST5268353192.168.2.41.1.1.1
    Oct 2, 2024 18:26:50.445240021 CEST5268353192.168.2.41.1.1.1
    Oct 2, 2024 18:26:51.445679903 CEST5268353192.168.2.41.1.1.1
    Oct 2, 2024 18:26:53.445229053 CEST5268353192.168.2.41.1.1.1
    Oct 2, 2024 18:26:53.670322895 CEST53526831.1.1.1192.168.2.4
    Oct 2, 2024 18:26:57.804871082 CEST5607353192.168.2.41.1.1.1
    Oct 2, 2024 18:26:58.804619074 CEST5607353192.168.2.41.1.1.1
    Oct 2, 2024 18:26:59.804692984 CEST5607353192.168.2.41.1.1.1
    Oct 2, 2024 18:27:01.804570913 CEST5607353192.168.2.41.1.1.1
    Oct 2, 2024 18:27:05.820949078 CEST5607353192.168.2.41.1.1.1
    Oct 2, 2024 18:27:09.836880922 CEST6390453192.168.2.41.1.1.1
    Oct 2, 2024 18:27:10.836477995 CEST6390453192.168.2.41.1.1.1
    Oct 2, 2024 18:27:11.852399111 CEST6390453192.168.2.41.1.1.1
    Oct 2, 2024 18:27:11.910135031 CEST53639041.1.1.1192.168.2.4
    Oct 2, 2024 18:27:18.056669950 CEST6394153192.168.2.41.1.1.1
    Oct 2, 2024 18:27:18.123241901 CEST53639411.1.1.1192.168.2.4
    Oct 2, 2024 18:27:22.259082079 CEST5683853192.168.2.41.1.1.1
    Oct 2, 2024 18:27:22.290612936 CEST53568381.1.1.1192.168.2.4
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Oct 2, 2024 18:25:29.308029890 CEST192.168.2.41.1.1.10xa2f7Standard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:25:35.491889000 CEST192.168.2.41.1.1.10xacc5Standard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:25:41.648597956 CEST192.168.2.41.1.1.10x9cd1Standard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:25:47.804610968 CEST192.168.2.41.1.1.10x91dStandard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:25:53.977952003 CEST192.168.2.41.1.1.10xada6Standard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:00.172275066 CEST192.168.2.41.1.1.10xaceaStandard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:04.226437092 CEST192.168.2.41.1.1.10xe08dStandard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:10.492182970 CEST192.168.2.41.1.1.10x16edStandard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:16.648518085 CEST192.168.2.41.1.1.10x3878Standard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:23.195262909 CEST192.168.2.41.1.1.10x1779Standard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:24.211215973 CEST192.168.2.41.1.1.10x1779Standard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:25.210892916 CEST192.168.2.41.1.1.10x1779Standard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:27.231678009 CEST192.168.2.41.1.1.10x1779Standard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:31.226234913 CEST192.168.2.41.1.1.10x1779Standard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:35.243419886 CEST192.168.2.41.1.1.10x5cbfStandard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:36.257520914 CEST192.168.2.41.1.1.10x5cbfStandard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:37.368302107 CEST192.168.2.41.1.1.10xd52eStandard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:38.382728100 CEST192.168.2.41.1.1.10xd52eStandard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:39.398127079 CEST192.168.2.41.1.1.10xd52eStandard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:41.413738012 CEST192.168.2.41.1.1.10xd52eStandard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:45.429389000 CEST192.168.2.41.1.1.10xd52eStandard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:49.430061102 CEST192.168.2.41.1.1.10xd9ffStandard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:50.445240021 CEST192.168.2.41.1.1.10xd9ffStandard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:51.445679903 CEST192.168.2.41.1.1.10xd9ffStandard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:53.445229053 CEST192.168.2.41.1.1.10xd9ffStandard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:57.804871082 CEST192.168.2.41.1.1.10x9c58Standard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:58.804619074 CEST192.168.2.41.1.1.10x9c58Standard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:59.804692984 CEST192.168.2.41.1.1.10x9c58Standard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:27:01.804570913 CEST192.168.2.41.1.1.10x9c58Standard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:27:05.820949078 CEST192.168.2.41.1.1.10x9c58Standard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:27:09.836880922 CEST192.168.2.41.1.1.10x6bdeStandard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:27:10.836477995 CEST192.168.2.41.1.1.10x6bdeStandard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:27:11.852399111 CEST192.168.2.41.1.1.10x6bdeStandard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:27:18.056669950 CEST192.168.2.41.1.1.10x4808Standard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    Oct 2, 2024 18:27:22.259082079 CEST192.168.2.41.1.1.10x7ddbStandard query (0)www.toptipvideo.comA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Oct 2, 2024 18:25:29.321520090 CEST1.1.1.1192.168.2.40xa2f7Name error (3)www.toptipvideo.comnonenoneA (IP address)IN (0x0001)false
    Oct 2, 2024 18:25:35.502222061 CEST1.1.1.1192.168.2.40xacc5Name error (3)www.toptipvideo.comnonenoneA (IP address)IN (0x0001)false
    Oct 2, 2024 18:25:41.659759998 CEST1.1.1.1192.168.2.40x9cd1Name error (3)www.toptipvideo.comnonenoneA (IP address)IN (0x0001)false
    Oct 2, 2024 18:25:47.822385073 CEST1.1.1.1192.168.2.40x91dName error (3)www.toptipvideo.comnonenoneA (IP address)IN (0x0001)false
    Oct 2, 2024 18:25:53.990899086 CEST1.1.1.1192.168.2.40xada6Name error (3)www.toptipvideo.comnonenoneA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:00.202981949 CEST1.1.1.1192.168.2.40xaceaName error (3)www.toptipvideo.comnonenoneA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:04.342066050 CEST1.1.1.1192.168.2.40xe08dName error (3)www.toptipvideo.comnonenoneA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:10.502648115 CEST1.1.1.1192.168.2.40x16edName error (3)www.toptipvideo.comnonenoneA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:17.039787054 CEST1.1.1.1192.168.2.40x3878Name error (3)www.toptipvideo.comnonenoneA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:36.361794949 CEST1.1.1.1192.168.2.40x5cbfName error (3)www.toptipvideo.comnonenoneA (IP address)IN (0x0001)false
    Oct 2, 2024 18:26:53.670322895 CEST1.1.1.1192.168.2.40xd9ffName error (3)www.toptipvideo.comnonenoneA (IP address)IN (0x0001)false
    Oct 2, 2024 18:27:11.910135031 CEST1.1.1.1192.168.2.40x6bdeName error (3)www.toptipvideo.comnonenoneA (IP address)IN (0x0001)false
    Oct 2, 2024 18:27:18.123241901 CEST1.1.1.1192.168.2.40x4808Name error (3)www.toptipvideo.comnonenoneA (IP address)IN (0x0001)false
    Oct 2, 2024 18:27:22.290612936 CEST1.1.1.1192.168.2.40x7ddbName error (3)www.toptipvideo.comnonenoneA (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:12:25:17
    Start date:02/10/2024
    Path:C:\Windows\System32\loaddll32.exe
    Wow64 process (32bit):true
    Commandline:loaddll32.exe "C:\Users\user\Desktop\EACore.dll"
    Imagebase:0x340000
    File size:126'464 bytes
    MD5 hash:51E6071F9CBA48E79F10C84515AAE618
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:1
    Start time:12:25:17
    Start date:02/10/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:2
    Start time:12:25:17
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\cmd.exe
    Wow64 process (32bit):true
    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\EACore.dll",#1
    Imagebase:0x240000
    File size:236'544 bytes
    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:3
    Start time:12:25:17
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe C:\Users\user\Desktop\EACore.dll,AgentAdd
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:4
    Start time:12:25:17
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",#1
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:5
    Start time:12:25:20
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe C:\Users\user\Desktop\EACore.dll,AgentRemove
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:6
    Start time:12:25:23
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe C:\Users\user\Desktop\EACore.dll,AgentTaskAdd
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:7
    Start time:12:25:26
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentAdd
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:8
    Start time:12:25:26
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentRemove
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:9
    Start time:12:25:26
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentTaskAdd
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:10
    Start time:12:25:26
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",ViewSetContentFilters
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:11
    Start time:12:25:26
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserLogout
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:12
    Start time:12:25:26
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserLogin
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:13
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserIsLoggedIn
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:14
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserGetNames
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:15
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserGetEntitlements
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:16
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",UserEnumContent
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:17
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",StateSetTag
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:18
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",StateSetProperty
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:19
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",StateGet
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:20
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemUse
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:21
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemUnpackStart
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:22
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemUnpackCancel
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:23
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemInstallStartBatch
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:24
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemInstallStart
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:25
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemGetStatus
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:26
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemEnumPatches
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:27
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemDownloadTogglePauseState
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:28
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemDownloadStart
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:29
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemDownloadCancel
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:30
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemDecryptStart
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:31
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemDecryptCancel
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:32
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",ItemClearCache
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:33
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",IsConnected
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:false

    Target ID:34
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",Disconnect
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:35
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",Connect3
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:36
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",Connect
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:37
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",Command
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:38
    Start time:12:25:27
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentTaskStatusSet
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:39
    Start time:12:25:28
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentTaskStatusGet
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:40
    Start time:12:25:28
    Start date:02/10/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\EACore.dll",AgentTaskRemove
    Imagebase:0x690000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:2.3%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:2%
      Total number of Nodes:840
      Total number of Limit Nodes:5
      execution_graph 5766 6e343630 5767 6e3454c0 _invalid_parameter_noinfo_noreturn 5766->5767 5768 6e343641 5767->5768 5769 6e34d230 5772 6e34e310 5769->5772 5771 6e34d272 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE ??1ios_base@std@@UAE 5773 6e34e320 5772->5773 5775 6e34e45a 5772->5775 5774 6e34e46a _invalid_parameter_noinfo_noreturn 5773->5774 5773->5775 5774->5775 5775->5771 5776 6e34d2b0 5779 6e3464d0 5776->5779 5781 6e346500 5779->5781 5780 6e346688 5781->5780 5782 6e3466aa _invalid_parameter_noinfo_noreturn 5781->5782 5785 6e353126 IsProcessorFeaturePresent 5786 6e35314b 5785->5786 5792 6e3497a0 5795 6e349da0 shutdown closesocket 5792->5795 5794 6e3497ab 5795->5794 5451 6e341010 5454 6e3410d0 OpenMutexA 5451->5454 5453 6e341015 ExitProcess 5455 6e34111b CreateMutexA 5454->5455 5467 6e3411c7 5454->5467 5468 6e3525ca 5455->5468 5457 6e341131 5480 6e3491c0 5457->5480 5460 6e3525ca 9 API calls 5461 6e341166 5460->5461 5484 6e341270 5461->5484 5464 6e3525ca 9 API calls 5465 6e341189 5464->5465 5487 6e343690 5465->5487 5467->5453 5469 6e3525dc malloc 5468->5469 5470 6e3525cf _callnewh 5469->5470 5471 6e3525e9 5469->5471 5470->5469 5473 6e3525eb 5470->5473 5471->5457 5472 6e3526d9 5474 6e3526e7 _CxxThrowException 5472->5474 5473->5472 5475 6e3526ca _CxxThrowException 5473->5475 5476 6e3526f6 IsProcessorFeaturePresent 5474->5476 5475->5472 5477 6e35270b 5476->5477 5495 6e3527f0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 5477->5495 5479 6e3527ee 5479->5457 5481 6e349210 5480->5481 5482 6e34114c 5481->5482 5496 6e34df30 5481->5496 5482->5460 5500 6e3434f0 5484->5500 5486 6e34117b 5486->5464 5488 6e3436ba 5487->5488 5489 6e3437c6 WaitForSingleObject 5488->5489 5490 6e3438b5 DeleteCriticalSection DeleteCriticalSection 5488->5490 5489->5488 5539 6e3454c0 5490->5539 5492 6e3438d8 5493 6e3454c0 _invalid_parameter_noinfo_noreturn 5492->5493 5494 6e3438f8 5493->5494 5494->5467 5495->5479 5497 6e34df58 5496->5497 5498 6e34e18f strlen 5497->5498 5499 6e34e23e 5497->5499 5498->5497 5499->5481 5508 6e3453a0 5500->5508 5503 6e3453a0 12 API calls 5504 6e343553 5503->5504 5517 6e349dc0 GetVolumeInformationA 5504->5517 5506 6e343574 5507 6e3435cf InitializeCriticalSection InitializeCriticalSection 5506->5507 5507->5486 5509 6e3453d0 5508->5509 5510 6e3453e8 5509->5510 5511 6e345400 5509->5511 5529 6e342cf0 _CxxThrowException __std_exception_copy 5510->5529 5512 6e3525ca 9 API calls 5511->5512 5514 6e34353e 5511->5514 5521 6e342b90 5511->5521 5512->5511 5514->5503 5515 6e3454b5 5518 6e349e20 5517->5518 5531 6e35263e 5518->5531 5520 6e349e83 5520->5506 5522 6e342ba9 5521->5522 5523 6e3525ca 9 API calls 5522->5523 5524 6e342cb8 5522->5524 5525 6e342cc6 _invalid_parameter_noinfo_noreturn 5522->5525 5526 6e342cd4 5522->5526 5523->5522 5524->5511 5530 6e342cf0 _CxxThrowException __std_exception_copy 5526->5530 5529->5515 5530->5524 5532 6e352647 IsProcessorFeaturePresent 5531->5532 5533 6e352646 5531->5533 5535 6e35270b 5532->5535 5533->5520 5538 6e3527f0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 5535->5538 5537 6e3527ee 5537->5520 5538->5537 5541 6e3454cb 5539->5541 5540 6e345598 5540->5492 5541->5540 5542 6e345615 _invalid_parameter_noinfo_noreturn 5541->5542 5543 6e341290 5544 6e3412ad 5543->5544 5553 6e349f20 GetUserNameA 5544->5553 5546 6e3412c7 5547 6e3412e1 Sleep 5546->5547 5548 6e34144e 5546->5548 5550 6e3414bc memcpy 5546->5550 5547->5546 5548->5546 5563 6e3415b0 wcslen 5548->5563 5593 6e344020 5548->5593 5558 6e343910 5550->5558 5555 6e349f60 lstrlenA 5553->5555 5556 6e35263e 5 API calls 5555->5556 5557 6e349fa6 5556->5557 5557->5546 5560 6e343924 5558->5560 5559 6e3439d8 5559->5546 5560->5559 5561 6e3439c0 Sleep 5560->5561 5600 6e3439f0 5560->5600 5561->5560 5568 6e341680 5563->5568 5564 6e341742 5658 6e34a4a0 5564->5658 5567 6e34175c wcslen 5569 6e3418b8 CreateProcessW 5567->5569 5574 6e34177d 5567->5574 5568->5564 5570 6e341655 memcpy 5568->5570 5646 6e342480 5568->5646 5572 6e341980 5569->5572 5570->5568 5575 6e3419bc CloseHandle CloseHandle 5572->5575 5579 6e341995 5572->5579 5573 6e342480 15 API calls 5573->5574 5574->5573 5577 6e3419dd 5574->5577 5575->5572 5578 6e341b4b memcpy 5577->5578 5580 6e341a88 5577->5580 5669 6e342fd0 5577->5669 5578->5577 5583 6e3421c2 _invalid_parameter_noinfo_noreturn 5579->5583 5585 6e3421b2 5579->5585 5581 6e341bc8 wcslen 5580->5581 5582 6e342fd0 19 API calls 5580->5582 5587 6e341cf0 5581->5587 5582->5580 5583->5585 5585->5548 5586 6e342fd0 19 API calls 5586->5587 5587->5586 5588 6e341dbb memcpy 5587->5588 5589 6e341d08 CreateProcessW 5587->5589 5588->5587 5591 6e341f00 5589->5591 5591->5579 5592 6e341f3c CloseHandle CloseHandle 5591->5592 5592->5591 5597 6e344076 5593->5597 5594 6e344050 LeaveCriticalSection Sleep 5594->5597 5595 6e344136 memcpy 5595->5597 5596 6e34415f EnterCriticalSection 5596->5597 5597->5594 5597->5595 5597->5596 5598 6e34428b 5597->5598 5599 6e344256 LeaveCriticalSection 5597->5599 5598->5548 5599->5597 5607 6e343a22 5600->5607 5601 6e343c1b WaitForSingleObject 5601->5607 5602 6e343d36 5602->5560 5605 6e343c68 _beginthread 5605->5607 5607->5601 5607->5602 5609 6e343d50 5607->5609 5614 6e3443a0 5607->5614 5622 6e3442a0 memset 5607->5622 5628 6e344bb0 5607->5628 5610 6e343d9b 5609->5610 5611 6e34400e 5610->5611 5612 6e343eef memcpy 5610->5612 5613 6e343f25 strlen 5610->5613 5611->5607 5612->5610 5613->5610 5615 6e3443f6 5614->5615 5616 6e344485 memcpy 5615->5616 5617 6e34456a 5615->5617 5641 6e349e90 GetComputerNameA 5615->5641 5616->5615 5619 6e35263e 5 API calls 5617->5619 5621 6e344578 5619->5621 5621->5607 5623 6e3442e2 5622->5623 5624 6e344325 strlen 5623->5624 5625 6e34433e memcpy 5623->5625 5627 6e344391 5624->5627 5625->5623 5627->5607 5629 6e3453a0 12 API calls 5628->5629 5634 6e344bea 5629->5634 5630 6e344d11 5632 6e3454c0 _invalid_parameter_noinfo_noreturn 5630->5632 5631 6e3454c0 _invalid_parameter_noinfo_noreturn 5631->5634 5633 6e344d1c 5632->5633 5635 6e3453a0 12 API calls 5633->5635 5634->5630 5634->5631 5640 6e344d4a 5635->5640 5636 6e344e61 5638 6e3454c0 _invalid_parameter_noinfo_noreturn 5636->5638 5637 6e3454c0 _invalid_parameter_noinfo_noreturn 5637->5640 5639 6e344e6e 5638->5639 5639->5605 5640->5636 5640->5637 5643 6e349ed0 lstrlenA 5641->5643 5644 6e35263e 5 API calls 5643->5644 5645 6e34442b memcpy 5644->5645 5645->5615 5650 6e3424d0 5646->5650 5647 6e342600 5647->5568 5648 6e342625 5683 6e342920 ?_Xlength_error@std@@YAXPBD 5648->5683 5650->5647 5650->5648 5651 6e3427d8 5650->5651 5654 6e342762 5650->5654 5655 6e3525ca 9 API calls 5650->5655 5656 6e3428b0 memcpy 5650->5656 5657 6e342b90 12 API calls 5650->5657 5684 6e342cf0 _CxxThrowException __std_exception_copy 5651->5684 5653 6e34290e _invalid_parameter_noinfo_noreturn 5654->5653 5655->5650 5656->5650 5657->5650 5659 6e34a4f0 5658->5659 5667 6e34a53d 5659->5667 5685 6e349fb0 5659->5685 5661 6e34a590 5696 6e34ae20 wcslen 5661->5696 5663 6e34a680 5663->5667 5668 6e34aa3a _invalid_parameter_noinfo_noreturn 5663->5668 5664 6e34a5ac 5664->5663 5665 6e342fd0 19 API calls 5664->5665 5666 6e34a6f0 memcpy 5664->5666 5665->5664 5666->5664 5667->5567 5668->5667 5670 6e343030 5669->5670 5671 6e3434bf 5670->5671 5672 6e3431c2 memcpy memcpy 5670->5672 5673 6e3431fd memcpy memcpy 5670->5673 5674 6e3431bd 5670->5674 5679 6e343342 5670->5679 5680 6e3433d8 5670->5680 5681 6e3525ca 9 API calls 5670->5681 5682 6e342b90 12 API calls 5670->5682 5671->5577 5672->5670 5673->5670 5732 6e342920 ?_Xlength_error@std@@YAXPBD 5674->5732 5677 6e3434d7 _invalid_parameter_noinfo_noreturn 5678 6e3533e0 __CxxFrameHandler3 5677->5678 5679->5677 5733 6e342cf0 _CxxThrowException __std_exception_copy 5680->5733 5681->5670 5682->5670 5684->5653 5706 6e352650 5685->5706 5688 6e342480 15 API calls 5689 6e34a080 5688->5689 5689->5688 5690 6e34a13f 5689->5690 5691 6e34a04c memcpy 5689->5691 5708 6e34fd30 5690->5708 5691->5689 5693 6e34a32a 5693->5661 5695 6e34a33a _invalid_parameter_noinfo_noreturn 5695->5693 5697 6e34ae80 5696->5697 5698 6e34afbf 5697->5698 5699 6e34afa8 5697->5699 5720 6e350ab0 5698->5720 5730 6e342920 ?_Xlength_error@std@@YAXPBD 5699->5730 5702 6e34b041 5704 6e35263e 5 API calls 5702->5704 5705 6e34b04f 5704->5705 5705->5664 5707 6e349fc0 memset GetModuleFileNameW wcslen 5706->5707 5707->5689 5709 6e34fd70 5708->5709 5710 6e34fd88 5709->5710 5715 6e34fd9e 5709->5715 5719 6e346fb0 ?_Xout_of_range@std@@YAXPBD 5710->5719 5712 6e34ff84 5714 6e35263e 5 API calls 5712->5714 5713 6e342480 15 API calls 5713->5715 5716 6e34a1f2 5714->5716 5715->5712 5715->5713 5717 6e34ff5e memcpy 5715->5717 5716->5693 5716->5695 5717->5715 5722 6e350ae1 5720->5722 5729 6e350b5d memcpy memcpy 5720->5729 5723 6e350e08 5722->5723 5726 6e350e1b 5722->5726 5731 6e342cf0 _CxxThrowException __std_exception_copy 5723->5731 5724 6e3525ca 9 API calls 5724->5726 5726->5724 5727 6e342b90 12 API calls 5726->5727 5726->5729 5727->5726 5728 6e350f24 5729->5702 5731->5728 5733->5677 5801 6e347810 5802 6e347ae7 strlen 5801->5802 5803 6e347863 strlen 5801->5803 5809 6e347b40 5802->5809 5811 6e3478b0 5803->5811 5804 6e347ba0 5812 6e34ccd0 52 API calls 5804->5812 5805 6e347910 5835 6e34ccd0 5805->5835 5806 6e345e50 15 API calls 5806->5809 5808 6e347c07 memcpy 5808->5809 5809->5804 5809->5806 5809->5808 5810 6e347977 memcpy 5810->5811 5811->5805 5811->5810 5825 6e345e50 5811->5825 5814 6e347c45 5812->5814 5816 6e348050 41 API calls 5814->5816 5819 6e3479c7 5816->5819 5822 6e347ae2 5819->5822 5921 6e349bb0 5819->5921 5821 6e349bb0 send 5821->5822 5823 6e347f0f _invalid_parameter_noinfo_noreturn 5822->5823 5824 6e347f01 5822->5824 5823->5824 5830 6e345ea0 5825->5830 5826 6e345fed 5925 6e342920 ?_Xlength_error@std@@YAXPBD 5826->5925 5827 6e345fbc 5827->5811 5830->5826 5830->5827 5831 6e346210 memcpy 5830->5831 5832 6e3460b4 _invalid_parameter_noinfo_noreturn 5830->5832 5833 6e3525ca 9 API calls 5830->5833 5834 6e342b90 12 API calls 5830->5834 5831->5830 5833->5830 5834->5830 5926 6e34d2d0 5835->5926 5844 6e34d9e0 9 API calls 5845 6e34cddf 5844->5845 5846 6e34d9e0 9 API calls 5845->5846 5847 6e34cdf0 5846->5847 5848 6e352190 8 API calls 5847->5848 5849 6e34ce57 5848->5849 5850 6e34d9e0 9 API calls 5849->5850 5851 6e34ce65 5850->5851 5852 6e34d9e0 9 API calls 5851->5852 5853 6e34ce76 5852->5853 5961 6e34b060 5853->5961 5855 6e34ce85 5856 6e352190 8 API calls 5855->5856 5857 6e34ceed 5856->5857 5858 6e34d9e0 9 API calls 5857->5858 5859 6e34cefb 5858->5859 5860 6e3464d0 _invalid_parameter_noinfo_noreturn 5859->5860 5861 6e34cf06 5860->5861 5862 6e34d9e0 9 API calls 5861->5862 5863 6e34cf1e ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@I 5862->5863 5864 6e34d9e0 9 API calls 5863->5864 5865 6e34cf3a 5864->5865 5866 6e34d9e0 9 API calls 5865->5866 5867 6e34cf4b 5866->5867 5868 6e34d9e0 9 API calls 5867->5868 5869 6e34cf5c 5868->5869 5870 6e34d9e0 9 API calls 5869->5870 5879 6e34cf6d 5870->5879 5871 6e34e310 _invalid_parameter_noinfo_noreturn 5872 6e34d1a8 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE ??1ios_base@std@@UAE 5871->5872 5873 6e3464d0 _invalid_parameter_noinfo_noreturn 5872->5873 5874 6e34d1c0 5873->5874 5875 6e3464d0 _invalid_parameter_noinfo_noreturn 5874->5875 5877 6e3479b5 5875->5877 5876 6e34d051 5876->5871 5881 6e348050 5877->5881 5878 6e345e50 15 API calls 5878->5879 5879->5876 5879->5878 5880 6e34d14b memcpy 5879->5880 5880->5879 5883 6e348070 5881->5883 5882 6e348209 5882->5819 5883->5882 5884 6e348216 _invalid_parameter_noinfo_noreturn 5883->5884 5892 6e348260 5884->5892 5885 6e3482d2 recv 5887 6e3482f1 strlen 5885->5887 5889 6e348565 5885->5889 5886 6e34849e 5888 6e3466b0 2 API calls 5886->5888 5887->5892 5897 6e348505 5888->5897 5895 6e34858e 5889->5895 6114 6e349da0 shutdown closesocket 5889->6114 5890 6e348430 memcpy 5890->5892 5891 6e348407 memcpy 5891->5892 5892->5885 5892->5886 5892->5890 5892->5891 6098 6e3466b0 5892->6098 6103 6e346fc0 5892->6103 5898 6e348881 5895->5898 5904 6e34888f _invalid_parameter_noinfo_noreturn 5895->5904 5897->5895 5899 6e3466b0 2 API calls 5897->5899 5898->5819 5900 6e3485aa 5899->5900 6115 6e346d40 5900->6115 5904->5898 5905 6e348643 5905->5895 5906 6e3466b0 2 API calls 5905->5906 5907 6e348915 5906->5907 5908 6e3466b0 2 API calls 5907->5908 5920 6e3489ce 5907->5920 5910 6e348987 5908->5910 5909 6e3466b0 2 API calls 5911 6e348b75 5909->5911 5912 6e346d40 18 API calls 5910->5912 5913 6e348ba4 5911->5913 5914 6e348b88 memcpy 5911->5914 5915 6e3489ba 5912->5915 5913->5895 5917 6e348bb0 recv 5913->5917 5914->5913 6130 6e348e60 _errno 5915->6130 5918 6e348bc6 memcpy 5917->5918 5919 6e348c07 5917->5919 5918->5895 5918->5917 5920->5895 5920->5909 5922 6e349bc0 5921->5922 5923 6e349d2b send 5922->5923 5924 6e347de2 5922->5924 5923->5922 5924->5821 5924->5822 5927 6e34d2e0 5926->5927 5928 6e34d365 ?_Random_device@std@ 5927->5928 5929 6e345e50 15 API calls 5927->5929 5935 6e34d492 5928->5935 5929->5927 5931 6e34d740 5932 6e3464d0 _invalid_parameter_noinfo_noreturn 5931->5932 5933 6e34cd35 5932->5933 5937 6e34d7a0 5933->5937 5935->5931 6038 6e352430 5935->6038 6042 6e3468d0 5935->6042 5938 6e34d7d5 ??0ios_base@std@@IAE 5937->5938 5939 6e34d7f2 ?init@?$basic_ios@DU?$char_traits@D@std@@@std@@IAEXPAV?$basic_streambuf@DU?$char_traits@D@std@@@2@_N ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE 5937->5939 5938->5939 5940 6e34cd4c 5939->5940 5941 6e34d9e0 strlen 5940->5941 6054 6e352000 5941->6054 5943 6e34dafd ?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N ?uncaught_exception@std@ 5946 6e34cd64 5943->5946 5947 6e34dba3 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 5943->5947 5944 6e34da64 5944->5943 5948 6e34db30 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD 5944->5948 5949 6e34da85 5944->5949 5951 6e352190 5946->5951 5947->5946 5948->5943 5948->5944 5949->5943 5950 6e34dace ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD 5949->5950 5950->5943 5950->5949 5952 6e352000 3 API calls 5951->5952 5958 6e3521ea 5952->5958 5954 6e352220 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD 5957 6e352203 5954->5957 5954->5958 5955 6e34cdce 5955->5844 5956 6e352324 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 5956->5955 5959 6e35224a ?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N ?uncaught_exception@std@ 5957->5959 5960 6e3522b4 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD 5957->5960 5958->5954 5958->5957 5958->5959 5959->5955 5959->5956 5960->5957 5960->5959 5962 6e34b070 5961->5962 5963 6e345e50 15 API calls 5962->5963 5964 6e34b105 5962->5964 5963->5962 5965 6e345e50 15 API calls 5964->5965 5966 6e34b295 5964->5966 5965->5964 5967 6e345e50 15 API calls 5966->5967 5968 6e34b405 5966->5968 5967->5966 5969 6e345e50 15 API calls 5968->5969 5970 6e34b595 5968->5970 5969->5968 5971 6e345e50 15 API calls 5970->5971 5972 6e34b725 5970->5972 5971->5970 5973 6e345e50 15 API calls 5972->5973 5974 6e34b8b5 5972->5974 5973->5972 5975 6e345e50 15 API calls 5974->5975 5976 6e34baf6 memcpy 5974->5976 5977 6e34ba45 5974->5977 5975->5974 5976->5974 5978 6e345e50 15 API calls 5977->5978 5979 6e34bc46 memcpy 5977->5979 5980 6e34bb95 5977->5980 5978->5977 5979->5977 5981 6e345e50 15 API calls 5980->5981 5982 6e34bd96 memcpy 5980->5982 5983 6e34bce5 5980->5983 5981->5980 5982->5980 5984 6e345e50 15 API calls 5983->5984 5985 6e34bee6 memcpy 5983->5985 5986 6e34be35 5983->5986 5984->5983 5985->5983 5987 6e345e50 15 API calls 5986->5987 5988 6e34bf85 5986->5988 5987->5986 5989 6e345e50 15 API calls 5988->5989 5990 6e34c0f5 5988->5990 5989->5988 5991 6e345e50 15 API calls 5990->5991 5992 6e34c285 5990->5992 5991->5990 5993 6e345e50 15 API calls 5992->5993 5995 6e34c415 5992->5995 5993->5992 5994 6e34c5a9 6060 6e350f30 5994->6060 5995->5994 5996 6e345e50 15 API calls 5995->5996 5996->5995 5998 6e34c71f 5999 6e3464d0 _invalid_parameter_noinfo_noreturn 5998->5999 6000 6e34c72d 5999->6000 6001 6e3464d0 _invalid_parameter_noinfo_noreturn 6000->6001 6002 6e34c738 6001->6002 6003 6e3464d0 _invalid_parameter_noinfo_noreturn 6002->6003 6004 6e34c743 6003->6004 6005 6e3464d0 _invalid_parameter_noinfo_noreturn 6004->6005 6006 6e34c74e 6005->6006 6007 6e3464d0 _invalid_parameter_noinfo_noreturn 6006->6007 6008 6e34c759 6007->6008 6009 6e3464d0 _invalid_parameter_noinfo_noreturn 6008->6009 6010 6e34c764 6009->6010 6011 6e3464d0 _invalid_parameter_noinfo_noreturn 6010->6011 6012 6e34c76f 6011->6012 6013 6e3464d0 _invalid_parameter_noinfo_noreturn 6012->6013 6014 6e34c77a 6013->6014 6015 6e3464d0 _invalid_parameter_noinfo_noreturn 6014->6015 6016 6e34c785 6015->6016 6017 6e3464d0 _invalid_parameter_noinfo_noreturn 6016->6017 6018 6e34c790 6017->6018 6019 6e3464d0 _invalid_parameter_noinfo_noreturn 6018->6019 6020 6e34c79b 6019->6020 6021 6e3464d0 _invalid_parameter_noinfo_noreturn 6020->6021 6022 6e34c7a6 6021->6022 6023 6e3464d0 _invalid_parameter_noinfo_noreturn 6022->6023 6024 6e34c7b1 6023->6024 6025 6e3464d0 _invalid_parameter_noinfo_noreturn 6024->6025 6026 6e34c7bc 6025->6026 6027 6e3464d0 _invalid_parameter_noinfo_noreturn 6026->6027 6028 6e34c7c7 ?_Random_device@std@ 6027->6028 6029 6e34c7f8 6028->6029 6080 6e351430 6029->6080 6033 6e3464d0 _invalid_parameter_noinfo_noreturn 6034 6e34c8fb 6033->6034 6034->6033 6035 6e34c91e 6034->6035 6036 6e34ca3a 6034->6036 6035->6036 6037 6e34ca4a _invalid_parameter_noinfo_noreturn 6035->6037 6036->5855 6037->6036 6039 6e352480 6038->6039 6040 6e35263e 5 API calls 6039->6040 6041 6e352511 6040->6041 6041->5935 6047 6e346920 6042->6047 6043 6e346bf3 memcpy 6043->6047 6044 6e346d1d 6044->5935 6045 6e346aa2 memcpy 6045->6047 6046 6e346a9d 6053 6e342920 ?_Xlength_error@std@@YAXPBD 6046->6053 6047->6043 6047->6044 6047->6045 6047->6046 6050 6e3525ca 9 API calls 6047->6050 6051 6e346b64 _invalid_parameter_noinfo_noreturn 6047->6051 6052 6e342b90 12 API calls 6047->6052 6050->6047 6052->6047 6055 6e352050 ?good@ios_base@std@ 6054->6055 6057 6e3520a2 6055->6057 6058 6e3520d2 6055->6058 6057->6058 6059 6e3520b6 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12 ?good@ios_base@std@ 6057->6059 6058->5944 6059->6058 6061 6e3511f4 6060->6061 6062 6e350f6b 6060->6062 6061->5998 6063 6e35104d 6062->6063 6064 6e351038 6062->6064 6065 6e351078 6063->6065 6069 6e351090 6063->6069 6096 6e351290 ?_Xlength_error@std@@YAXPBD 6064->6096 6097 6e342cf0 _CxxThrowException __std_exception_copy 6065->6097 6067 6e3525ca 9 API calls 6067->6069 6069->6067 6070 6e342b90 12 API calls 6069->6070 6073 6e3510e0 6069->6073 6070->6069 6071 6e35121f 6074 6e35123e 6071->6074 6075 6e3464d0 _invalid_parameter_noinfo_noreturn 6071->6075 6072 6e351198 6072->6061 6090 6e3512a0 6072->6090 6073->6072 6076 6e347490 13 API calls 6073->6076 6077 6e35128a 6074->6077 6079 6e3512a0 2 API calls 6074->6079 6075->6071 6076->6073 6077->5998 6079->6074 6081 6e351480 6080->6081 6082 6e35263e 5 API calls 6081->6082 6083 6e34c8d0 6082->6083 6084 6e347490 6083->6084 6086 6e3474c0 6084->6086 6085 6e34754c 6085->6034 6086->6085 6087 6e3477d0 memcpy 6086->6087 6088 6e342b90 12 API calls 6086->6088 6089 6e3525ca 9 API calls 6086->6089 6087->6086 6088->6086 6089->6086 6091 6e3513ea 6090->6091 6092 6e3512ae 6090->6092 6091->6072 6093 6e3464d0 _invalid_parameter_noinfo_noreturn 6092->6093 6094 6e3512ce 6092->6094 6093->6092 6094->6091 6095 6e3513fa _invalid_parameter_noinfo_noreturn 6094->6095 6095->6091 6097->6071 6099 6e346700 6098->6099 6100 6e346878 memcmp 6099->6100 6101 6e346816 memchr 6099->6101 6102 6e3468b8 6099->6102 6100->6099 6101->6099 6102->5892 6108 6e347020 6103->6108 6104 6e347476 6104->5892 6105 6e34731d memcpy memcpy 6105->6108 6106 6e347168 memcpy memcpy 6106->6108 6107 6e347201 6140 6e342920 ?_Xlength_error@std@@YAXPBD 6107->6140 6108->6104 6108->6105 6108->6106 6108->6107 6111 6e3525ca 9 API calls 6108->6111 6112 6e347274 _invalid_parameter_noinfo_noreturn 6108->6112 6113 6e342b90 12 API calls 6108->6113 6111->6108 6113->6108 6114->5895 6116 6e346d80 6115->6116 6117 6e346d98 6116->6117 6118 6e346dae 6116->6118 6141 6e346fb0 ?_Xout_of_range@std@@YAXPBD 6117->6141 6121 6e346f8e 6118->6121 6122 6e345e50 15 API calls 6118->6122 6125 6e346f43 memcpy 6118->6125 6123 6e35263e 5 API calls 6121->6123 6122->6118 6124 6e346f99 6123->6124 6126 6e349020 6124->6126 6125->6118 6127 6e349050 memcmp 6126->6127 6129 6e3490da 6127->6129 6129->5905 6131 6e348ea0 strtol 6130->6131 6133 6e348f20 6131->6133 6134 6e348fe9 6133->6134 6136 6e348ffe ?_Xout_of_range@std@@YAXPBD 6133->6136 6139 6e348fbc 6133->6139 6135 6e35263e 5 API calls 6134->6135 6137 6e348ff4 6135->6137 6138 6e349008 ?_Xinvalid_argument@std@@YAXPBD 6136->6138 6137->5920 6139->6138 6142 6e344e90 6145 6e344ea0 6142->6145 6147 6e344eb2 6145->6147 6149 6e344e99 _endthread 6147->6149 6151 6e344f90 Sleep 6147->6151 6152 6e3447c0 6147->6152 6156 6e345080 EnterCriticalSection 6147->6156 6160 6e344590 6147->6160 6151->6147 6153 6e344800 6152->6153 6155 6e344908 6153->6155 6167 6e344920 6153->6167 6155->6147 6157 6e3450e0 LeaveCriticalSection 6156->6157 6159 6e345160 6157->6159 6159->6147 6205 6e344690 EnterCriticalSection 6160->6205 6163 6e3442a0 3 API calls 6164 6e3445d8 6163->6164 6165 6e35263e 5 API calls 6164->6165 6166 6e344680 6165->6166 6166->6147 6168 6e3449ce 6167->6168 6169 6e344985 EnterCriticalSection 6168->6169 6170 6e343d50 2 API calls 6168->6170 6172 6e344b92 6168->6172 6176 6e344a46 memcpy 6168->6176 6177 6e345620 6169->6177 6170->6168 6174 6e35263e 5 API calls 6172->6174 6175 6e344ba0 6174->6175 6175->6153 6176->6168 6181 6e345650 6177->6181 6179 6e3449c1 LeaveCriticalSection 6179->6168 6180 6e3456c9 6201 6e342cf0 _CxxThrowException __std_exception_copy 6180->6201 6181->6179 6181->6180 6183 6e3525ca 9 API calls 6181->6183 6185 6e342b90 12 API calls 6181->6185 6186 6e345830 6181->6186 6183->6181 6184 6e34582c 6185->6181 6194 6e345852 6186->6194 6187 6e345bc6 memcpy memcpy 6189 6e345c2b memset 6187->6189 6188 6e3458e8 memcpy memset 6188->6189 6189->6194 6190 6e345df6 6190->6181 6191 6e345e03 6202 6e345e30 ?_Xlength_error@std@@YAXPBD 6191->6202 6193 6e345c75 6204 6e342cf0 _CxxThrowException __std_exception_copy 6193->6204 6194->6187 6194->6188 6194->6190 6194->6191 6194->6193 6196 6e345d7f memcpy 6194->6196 6197 6e345b70 6194->6197 6199 6e3525ca 9 API calls 6194->6199 6200 6e342b90 12 API calls 6194->6200 6196->6194 6198 6e345e2a _invalid_parameter_noinfo_noreturn 6197->6198 6199->6194 6200->6194 6201->6184 6203 6e3533e0 __CxxFrameHandler3 6202->6203 6204->6198 6208 6e3446e0 6205->6208 6206 6e34471d LeaveCriticalSection 6206->6208 6207 6e344745 LeaveCriticalSection 6207->6208 6208->6206 6208->6207 6209 6e3446f5 6208->6209 6210 6e35263e 5 API calls 6209->6210 6211 6e3445b0 6210->6211 6211->6163 6215 6e349390 6216 6e349bb0 send 6215->6216 6222 6e3493c0 6216->6222 6217 6e34945c 6218 6e35263e 5 API calls 6217->6218 6221 6e34946a 6218->6221 6219 6e349bb0 send 6219->6222 6222->6217 6222->6219 6223 6e349da0 shutdown closesocket 6222->6223 6223->6222 6227 6e352e1f 6229 6e352e27 ___scrt_release_startup_lock 6227->6229 6228 6e352e44 _seh_filter_dll 6229->6228 6230 6e352b18 ___scrt_dllmain_exception_filter 5734 6e349580 5735 6e3495a0 5734->5735 5738 6e349672 5735->5738 5739 6e3495f5 5735->5739 5741 6e349680 5735->5741 5755 6e349870 setsockopt 5735->5755 5739->5735 5748 6e349930 socket 5739->5748 5742 6e3496b0 5741->5742 5743 6e3496cc gethostbyname 5742->5743 5744 6e349705 5742->5744 5745 6e34971e inet_ntoa 5742->5745 5743->5742 5746 6e35263e 5 API calls 5744->5746 5745->5742 5747 6e349789 5746->5747 5747->5735 5749 6e349970 5748->5749 5750 6e349a45 5749->5750 5753 6e349994 htons inet_addr connect 5749->5753 5754 6e3499f9 shutdown closesocket 5749->5754 5751 6e35263e 5 API calls 5750->5751 5752 6e349a50 5751->5752 5752->5739 5753->5749 5754->5749 5756 6e3498c0 5755->5756 5757 6e35263e 5 API calls 5756->5757 5758 6e349925 5757->5758 5758->5735 6231 6e34ca80 6232 6e34cab0 6231->6232 6233 6e34ca93 6231->6233 6233->6232 6234 6e3464d0 _invalid_parameter_noinfo_noreturn 6233->6234 6234->6233 6235 6e349480 memset 6243 6e349a60 6235->6243 6237 6e349565 6239 6e35263e 5 API calls 6237->6239 6240 6e349573 6239->6240 6241 6e3494bc 6241->6237 6242 6e349a60 recv 6241->6242 6247 6e349da0 shutdown closesocket 6241->6247 6242->6241 6244 6e349a73 6243->6244 6245 6e349b60 recv 6244->6245 6246 6e349ba6 6244->6246 6245->6244 6246->6241 6247->6241 6248 6e342200 6249 6e342322 6248->6249 6250 6e34221c 6248->6250 6250->6249 6251 6e342332 _invalid_parameter_noinfo_noreturn 6250->6251 6251->6249 6252 6e342e00 __std_exception_destroy 6253 6e342e30 6252->6253 6254 6e34dc00 ?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N 6258 6e34cb80 6259 6e34cb92 6258->6259 6260 6e34cc8e 6258->6260 6261 6e3464d0 _invalid_parameter_noinfo_noreturn 6259->6261 6262 6e34cba7 6259->6262 6261->6259 6262->6260 6263 6e34cc9e _invalid_parameter_noinfo_noreturn 6262->6263 6263->6260 6264 6e352180 __std_terminate 6266 6e3530f5 6269 6e35330e 6266->6269 6270 6e353103 _except_handler4_common 6269->6270 6271 6e34aa70 6272 6e34ab8f 6271->6272 6273 6e34aa83 6271->6273 6273->6272 6274 6e34aba0 _invalid_parameter_noinfo_noreturn 6273->6274 6275 6e34accf 6274->6275 6276 6e34abc3 6274->6276 6276->6275 6277 6e34ace0 _invalid_parameter_noinfo_noreturn 6276->6277 6278 6e34adf4 6277->6278 6279 6e34ad1c 6277->6279 6279->6278 6280 6e34ae04 _invalid_parameter_noinfo_noreturn 6279->6280 6280->6278 6290 6e341265 6291 6e3533e0 __CxxFrameHandler3 6290->6291 6292 6e34dbe5 6293 6e34db7e ?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N ?uncaught_exception@std@ 6292->6293 6294 6e34dbb3 6293->6294 6295 6e34dba3 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 6293->6295 6295->6294 6296 6e342de6 __std_exception_destroy 5759 6e349260 5762 6e3497c0 WSAStartup 5759->5762 5763 6e349800 5762->5763 5764 6e35263e 5 API calls 5763->5764 5765 6e349266 5764->5765 6307 6e342d60 __std_exception_copy 6311 6e34e250 6312 6e34e260 6311->6312 6313 6e34e310 _invalid_parameter_noinfo_noreturn 6312->6313 6314 6e34e29c ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE ??1ios_base@std@@UAE 6313->6314 6315 6e34e2c0 6314->6315 6316 6e34e4d0 6317 6e34e310 _invalid_parameter_noinfo_noreturn 6316->6317 6318 6e34e4e9 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE 6317->6318 6319 6e34e500 6318->6319 6328 6e351e50 ??1ios_base@std@@UAE 6329 6e351e70 6328->6329 6330 6e352b58 6331 6e352b66 6330->6331 6332 6e352b61 6330->6332 6340 6e352a4d 6331->6340 6336 6e352b7b 6332->6336 6337 6e352b91 6336->6337 6339 6e352b9a 6337->6339 6351 6e352bc6 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 6337->6351 6339->6331 6341 6e352a59 ___scrt_is_nonwritable_in_current_image 6340->6341 6342 6e352a82 dllmain_raw 6341->6342 6346 6e352a7d __DllMainCRTStartup@12 6341->6346 6348 6e352a68 6341->6348 6343 6e352a9c dllmain_crt_dispatch 6342->6343 6342->6348 6343->6346 6343->6348 6344 6e352aee 6345 6e352af7 dllmain_crt_dispatch 6344->6345 6344->6348 6347 6e352b0a dllmain_raw 6345->6347 6345->6348 6346->6344 6352 6e35291f 6346->6352 6347->6348 6350 6e352ae3 dllmain_raw 6350->6344 6351->6339 6354 6e35292b ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 6352->6354 6353 6e352934 ___scrt_uninitialize_crt __RTC_Initialize __DllMainCRTStartup@12 6353->6350 6354->6353 6355 6e3529c7 6354->6355 6356 6e35295c 6354->6356 6374 6e352f3a IsProcessorFeaturePresent 6355->6374 6367 6e352e8c 6356->6367 6359 6e3529ce 6362 6e352a0d 6359->6362 6363 6e3529da 6359->6363 6360 6e352961 6373 6e352c1f __std_type_info_destroy_list 6360->6373 6364 6e35291f __DllMainCRTStartup@12 17 API calls 6362->6364 6366 6e3529df __DllMainCRTStartup@12 6362->6366 6363->6366 6378 6e352818 6363->6378 6364->6366 6366->6350 6368 6e352e91 ___scrt_release_startup_lock 6367->6368 6369 6e352e95 _execute_onexit_table 6368->6369 6370 6e352ea1 __DllMainCRTStartup@12 6368->6370 6369->6360 6371 6e35342e _cexit 6370->6371 6372 6e352eae 6370->6372 6372->6360 6373->6353 6375 6e352f50 __DllMainCRTStartup@12 6374->6375 6376 6e352f5c memset memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6375->6376 6377 6e353046 __DllMainCRTStartup@12 6376->6377 6377->6359 6379 6e352824 ___scrt_is_nonwritable_in_current_image 6378->6379 6409 6e352d37 6379->6409 6381 6e35282b __DllMainCRTStartup@12 6382 6e352917 6381->6382 6383 6e352852 6381->6383 6392 6e3528b2 ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 6381->6392 6384 6e352f3a __DllMainCRTStartup@12 6 API calls 6382->6384 6413 6e352e53 6383->6413 6389 6e35291e ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 6384->6389 6386 6e352861 __RTC_Initialize 6386->6392 6416 6e352c13 InitializeSListHead 6386->6416 6388 6e35286f __DllMainCRTStartup@12 6393 6e352874 _initterm_e 6388->6393 6390 6e3529c7 6389->6390 6391 6e35295c 6389->6391 6408 6e352934 ___scrt_uninitialize_crt __RTC_Initialize __DllMainCRTStartup@12 6389->6408 6394 6e352f3a __DllMainCRTStartup@12 6 API calls 6390->6394 6395 6e352e8c __DllMainCRTStartup@12 2 API calls 6391->6395 6392->6366 6393->6392 6396 6e352889 6393->6396 6397 6e3529ce 6394->6397 6398 6e352961 6395->6398 6417 6e352e61 6396->6417 6403 6e352a0d 6397->6403 6404 6e3529da 6397->6404 6426 6e352c1f __std_type_info_destroy_list 6398->6426 6400 6e35288e 6400->6392 6402 6e352892 _initterm 6400->6402 6402->6392 6405 6e35291f __DllMainCRTStartup@12 15 API calls 6403->6405 6407 6e3529df __DllMainCRTStartup@12 6403->6407 6406 6e352818 __DllMainCRTStartup@12 15 API calls 6404->6406 6404->6407 6405->6407 6406->6407 6407->6366 6408->6366 6410 6e352d40 6409->6410 6427 6e353127 IsProcessorFeaturePresent 6410->6427 6412 6e352d4c ___scrt_uninitialize_crt 6412->6381 6429 6e352d98 6413->6429 6415 6e352e5a 6415->6386 6416->6388 6418 6e352e66 ___scrt_release_startup_lock 6417->6418 6419 6e352e71 __DllMainCRTStartup@12 6418->6419 6420 6e352e6a 6418->6420 6423 6e352e76 _configure_narrow_argv 6419->6423 6421 6e353127 __DllMainCRTStartup@12 IsProcessorFeaturePresent 6420->6421 6422 6e352e6f 6421->6422 6422->6400 6424 6e352e84 _initialize_narrow_environment 6423->6424 6425 6e352e81 6423->6425 6424->6422 6425->6400 6426->6408 6428 6e35314b 6427->6428 6428->6412 6430 6e352da4 6429->6430 6431 6e352da8 6429->6431 6430->6415 6432 6e352e17 6431->6432 6435 6e352db5 ___scrt_release_startup_lock 6431->6435 6433 6e352f3a __DllMainCRTStartup@12 6 API calls 6432->6433 6434 6e352e1e 6433->6434 6436 6e352dc2 _initialize_onexit_table 6435->6436 6438 6e352de0 6435->6438 6437 6e352dd1 _initialize_onexit_table 6436->6437 6436->6438 6437->6438 6438->6415 6439 6e34dc40 __std_terminate 6444 6e352120 6439->6444 6442 6e34dc80 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 6443 6e34dc89 6442->6443 6445 6e34dc5f __std_terminate ?uncaught_exception@std@ 6444->6445 6445->6442 6445->6443 6446 6e34cac0 6447 6e3464d0 _invalid_parameter_noinfo_noreturn 6446->6447 6448 6e34cad2 6447->6448 6449 6e3464d0 _invalid_parameter_noinfo_noreturn 6448->6449 6450 6e34cadd 6449->6450 6451 6e3464d0 _invalid_parameter_noinfo_noreturn 6450->6451 6452 6e34cae8 6451->6452 6453 6e3464d0 _invalid_parameter_noinfo_noreturn 6452->6453 6454 6e34caf3 6453->6454 6455 6e3464d0 _invalid_parameter_noinfo_noreturn 6454->6455 6456 6e34cafe 6455->6456 6457 6e3464d0 _invalid_parameter_noinfo_noreturn 6456->6457 6458 6e34cb09 6457->6458 6459 6e3464d0 _invalid_parameter_noinfo_noreturn 6458->6459 6460 6e34cb14 6459->6460 6461 6e3464d0 _invalid_parameter_noinfo_noreturn 6460->6461 6462 6e34cb1f 6461->6462 6463 6e3464d0 _invalid_parameter_noinfo_noreturn 6462->6463 6464 6e34cb2a 6463->6464 6465 6e3464d0 _invalid_parameter_noinfo_noreturn 6464->6465 6466 6e34cb35 6465->6466 6467 6e3464d0 _invalid_parameter_noinfo_noreturn 6466->6467 6468 6e34cb40 6467->6468 6469 6e3464d0 _invalid_parameter_noinfo_noreturn 6468->6469 6470 6e34cb4b 6469->6470 6471 6e3464d0 _invalid_parameter_noinfo_noreturn 6470->6471 6472 6e34cb56 6471->6472 6473 6e3464d0 _invalid_parameter_noinfo_noreturn 6472->6473 6474 6e34cb61 6473->6474 6475 6e3464d0 _invalid_parameter_noinfo_noreturn 6474->6475 6476 6e34cb6c 6475->6476 6481 6e34e540 6482 6e34e576 6481->6482 6483 6e34ec94 6482->6483 6484 6e3525ca 9 API calls 6482->6484 6485 6e342b90 12 API calls 6482->6485 6486 6e34ec06 memcpy 6482->6486 6487 6e34eaad _invalid_parameter_noinfo_noreturn 6482->6487 6484->6482 6485->6482 6486->6482 6489 6e34ecfb 6487->6489 6490 6e34d9c0 6491 6e34d9d0 ??1ios_base@std@@UAE 6490->6491 6492 6e34d9d9 6490->6492 6491->6492 6498 6e3529cf 6499 6e352a0d 6498->6499 6500 6e3529da 6498->6500 6501 6e35291f __DllMainCRTStartup@12 17 API calls 6499->6501 6503 6e3529df __DllMainCRTStartup@12 6499->6503 6502 6e352818 __DllMainCRTStartup@12 17 API calls 6500->6502 6500->6503 6501->6503 6502->6503

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 151 6e349f20-6e349f59 GetUserNameA 152 6e349f60-6e349f66 151->152 153 6e349f86-6e349f90 152->153 154 6e349f68-6e349f6e 152->154 153->152 155 6e349f70-6e349f76 154->155 156 6e349f92-6e349fab lstrlenA call 6e35263e 154->156 155->152 157 6e349f78-6e349f84 155->157 157->152
      APIs
      • GetUserNameA.ADVAPI32(?,00000100), ref: 6E349F46
      • lstrlenA.KERNEL32(?), ref: 6E349F93
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: NameUserlstrlen
      • String ID:
      • API String ID: 188228716-0
      • Opcode ID: b2491a453bf353071e94aa4914ce6190bba136d49f6b3dd945983b87b36b04e3
      • Instruction ID: 48bb17087398adcdbb6ae47f2b872f042b62d55f743bb80dfb076af64136f0a5
      • Opcode Fuzzy Hash: b2491a453bf353071e94aa4914ce6190bba136d49f6b3dd945983b87b36b04e3
      • Instruction Fuzzy Hash: E4018B71618207EFCB189F6AC06562A77F9AFC9355F60486DE88A87350D7349881CBA2

      Control-flow Graph

      APIs
      • _callnewh.API-MS-WIN-CRT-HEAP-L1-1-0(6E341131,?,6E341131,00000024), ref: 6E3525D2
      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(6E341131,?,6E341131,00000024), ref: 6E3525DF
      • _CxxThrowException.VCRUNTIME140(?,6E356588), ref: 6E3526D3
      • _CxxThrowException.VCRUNTIME140(?,6E3561FC), ref: 6E3526F0
      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 6E352701
      • ___raise_securityfailure.LIBCMT ref: 6E3527E9
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: ExceptionThrow$FeaturePresentProcessor___raise_securityfailure_callnewhmalloc
      • String ID:
      • API String ID: 1670996968-0
      • Opcode ID: 508f945f8b0b93dc3089391c5132a970e080a69e7bfe7853452767c83b3172fa
      • Instruction ID: de6a6a2ddd12292d8d7fdff0830e97d4dad417b8089df4b6804cd5aa7d0c9590
      • Opcode Fuzzy Hash: 508f945f8b0b93dc3089391c5132a970e080a69e7bfe7853452767c83b3172fa
      • Instruction Fuzzy Hash: E23162B4500B08AFDF00DFA9D955AA47FBCBB0A314F20C46AE914973D1E7B09665CF94

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 17 6e341290-6e3412da call 6e352630 call 6e349f20 22 6e3412f0-6e3412f5 17->22 23 6e341490-6e341495 22->23 24 6e3412fb-6e341300 22->24 27 6e341527-6e34152c 23->27 28 6e34149b-6e3414a0 23->28 25 6e341306-6e34130b 24->25 26 6e341500-6e341505 24->26 31 6e341311-6e341316 25->31 32 6e341543-6e341551 25->32 35 6e3412dc 26->35 36 6e34150b-6e341510 26->36 29 6e341596-6e34159b 27->29 30 6e34152e-6e341533 27->30 33 6e3414a6-6e3414ab 28->33 34 6e341578-6e34157d 28->34 29->22 30->22 38 6e341539-6e34153e 30->38 39 6e341556-6e341573 call 6e344020 31->39 40 6e34131c-6e341321 31->40 37 6e3412e1-6e3412e8 Sleep 32->37 41 6e3414b1-6e3414b6 33->41 42 6e341582-6e341587 33->42 34->22 35->37 43 6e341512-6e341517 36->43 44 6e34158c-6e341591 36->44 37->22 38->22 39->22 40->22 47 6e341323-6e34133c 40->47 41->22 48 6e3414bc-6e3414e3 memcpy call 6e343910 41->48 42->22 43->22 45 6e34151d-6e341522 43->45 44->22 45->22 50 6e341350-6e341356 47->50 54 6e3414e8-6e3414f7 48->54 52 6e3413a0-6e3413a6 50->52 53 6e341358-6e34135e 50->53 55 6e341400-6e341406 52->55 56 6e3413a8-6e3413ae 52->56 57 6e341364-6e34136a 53->57 58 6e3413e0-6e3413e6 53->58 54->22 63 6e34144e-6e341460 call 6e3415b0 55->63 64 6e341408-6e34140e 55->64 59 6e3413b4-6e3413ba 56->59 60 6e34143a-6e34143f 56->60 65 6e341370-6e341376 57->65 66 6e34141e-6e34142a 57->66 61 6e341444-6e341449 58->61 62 6e3413e8-6e3413ee 58->62 68 6e341470-6e341476 59->68 69 6e3413c0-6e3413cc 59->69 60->50 61->50 62->50 70 6e3413f4-6e3413f9 62->70 63->50 80 6e341466-6e34146b 63->80 64->50 71 6e341414-6e341419 64->71 73 6e34133e-6e34134d 65->73 74 6e341378-6e34137e 65->74 66->50 72 6e341430-6e341435 66->72 68->50 76 6e34147c-6e341481 68->76 69->50 77 6e3413ce-6e3413d3 69->77 70->50 71->50 72->50 73->50 74->50 78 6e341380-6e34138c 74->78 76->22 77->50 78->50 79 6e34138e-6e341393 78->79 79->50 80->50
      APIs
        • Part of subcall function 6E349F20: GetUserNameA.ADVAPI32(?,00000100), ref: 6E349F46
        • Part of subcall function 6E349F20: lstrlenA.KERNEL32(?), ref: 6E349F93
      • memcpy.VCRUNTIME140(00000000,874CCA50,?), ref: 6E3414D4
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: NameUserlstrlenmemcpy
      • String ID: SD $TD $TD
      • API String ID: 2751256217-980538074
      • Opcode ID: df6603da3582b9456ed2aaff186de368279b398ae22ebf325e82776abe391867
      • Instruction ID: cd6235be1a3690c046d31c8a0df61eeee79f15276a36fe50d7764605c08f2ddd
      • Opcode Fuzzy Hash: df6603da3582b9456ed2aaff186de368279b398ae22ebf325e82776abe391867
      • Instruction Fuzzy Hash: 4C51593064DA01EFCA948BD984A0A6E72F99F81384F14089EF596CBB15D636C86C8797

      Control-flow Graph

      APIs
      • OpenMutexA.KERNEL32(001F0001,00000000,Mutex8565865865), ref: 6E341109
      • CreateMutexA.KERNELBASE(00000000,00000000,Mutex8565865865), ref: 6E341124
        • Part of subcall function 6E3525CA: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(6E341131,?,6E341131,00000024), ref: 6E3525DF
        • Part of subcall function 6E3525CA: _callnewh.API-MS-WIN-CRT-HEAP-L1-1-0(6E341131,?,6E341131,00000024), ref: 6E3525D2
        • Part of subcall function 6E3525CA: _CxxThrowException.VCRUNTIME140(?,6E356588), ref: 6E3526D3
        • Part of subcall function 6E3525CA: _CxxThrowException.VCRUNTIME140(?,6E3561FC), ref: 6E3526F0
        • Part of subcall function 6E3525CA: IsProcessorFeaturePresent.KERNEL32(00000017), ref: 6E352701
        • Part of subcall function 6E3525CA: ___raise_securityfailure.LIBCMT ref: 6E3527E9
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: ExceptionMutexThrow$CreateFeatureOpenPresentProcessor___raise_securityfailure_callnewhmalloc
      • String ID: Mutex8565865865$www.toptipvideo.com
      • API String ID: 4215415863-3626984906
      • Opcode ID: 0bf4fcdb79c3a2f0a04e8a79c8ad95b517243d5267b91ff48795a4cc13a61d23
      • Instruction ID: aff1f10630c47574633743ab27a306c3bed78856c4b54c900129de69dffc7613
      • Opcode Fuzzy Hash: 0bf4fcdb79c3a2f0a04e8a79c8ad95b517243d5267b91ff48795a4cc13a61d23
      • Instruction Fuzzy Hash: 012173B1D006559BDF049FE48C15BEEBBB5BB04724F000A28E5557B3C0E7751A258BA6

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 106 6e349680-6e3496af 107 6e3496b0-6e3496b5 106->107 108 6e3496b7-6e3496bc 107->108 109 6e3496f0-6e3496f5 107->109 110 6e349710-6e349715 108->110 111 6e3496be-6e3496c3 108->111 112 6e3496f7-6e3496fc 109->112 113 6e34974c-6e34975e 109->113 118 6e349717-6e34971c 110->118 119 6e349763-6e34976a 110->119 114 6e3496c5-6e3496ca 111->114 115 6e349742-6e349747 111->115 116 6e3496fe-6e349703 112->116 117 6e34976f-6e349776 112->117 113->107 114->107 120 6e3496cc-6e3496e4 gethostbyname 114->120 115->107 116->107 121 6e349705-6e349792 call 6e35263e 116->121 117->107 118->107 122 6e34971e-6e34973d inet_ntoa 118->122 119->107 120->107 122->107
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: gethostbynameinet_ntoa
      • String ID: UX.t$UX.t
      • API String ID: 2080845111-2708226215
      • Opcode ID: 7ddc3d3786054aaf2b22b8b233f5d1ce0fe09a8f73106fde111eaddbecd96c5a
      • Instruction ID: 492b37c029f9bfe84915b1d3d4139bf75ba345418d73480ea3e96f17fd9a35d8
      • Opcode Fuzzy Hash: 7ddc3d3786054aaf2b22b8b233f5d1ce0fe09a8f73106fde111eaddbecd96c5a
      • Instruction Fuzzy Hash: 7621B374308216DFC750EE9C86D0A1A7BE9EB89324F118C2AE599CB325D637D851CB92

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 126 6e349dc0-6e349e1c GetVolumeInformationA 127 6e349e20-6e349e26 126->127 128 6e349e50-6e349e56 127->128 129 6e349e28-6e349e2e 127->129 132 6e349e78-6e349e89 call 6e35263e 128->132 133 6e349e58-6e349e5e 128->133 130 6e349e30-6e349e36 129->130 131 6e349e6f-6e349e76 129->131 130->127 134 6e349e38-6e349e3f 130->134 131->127 133->127 135 6e349e60-6e349e6d 133->135 134->127 135->127
      APIs
      • GetVolumeInformationA.KERNELBASE ref: 6E349DFE
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: InformationVolume
      • String ID: <Yvn$<Yvn$c:\
      • API String ID: 2039140958-2283949575
      • Opcode ID: 93441be108a64f1e64ca95b0f0ffd1c0e774da6ef4d20daa667f0bfb3226cdd9
      • Instruction ID: c20e195279b1d3386b095c3b1274331b032f173b5c9c5e0c35a71cdcb8568426
      • Opcode Fuzzy Hash: 93441be108a64f1e64ca95b0f0ffd1c0e774da6ef4d20daa667f0bfb3226cdd9
      • Instruction Fuzzy Hash: BF119E34608352CFC7508FA5D68420FB7E2BFC9658F60CE1DE488AA358DB308991CB83

      Control-flow Graph

      APIs
        • Part of subcall function 6E349DC0: GetVolumeInformationA.KERNELBASE ref: 6E349DFE
      • InitializeCriticalSection.KERNEL32(00000001), ref: 6E34360E
      • InitializeCriticalSection.KERNEL32(?), ref: 6E343614
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: CriticalInitializeSection$InformationVolume
      • String ID: @b5n$I5n
      • API String ID: 1646672599-520474278
      • Opcode ID: 631ec896b2877a6c4be01801504b47b7a9e4ea2d438b55dac2b31bdc36798a52
      • Instruction ID: e53c7925b800bbdb208275bb14686e9a4775a6a58189613a05c97df698e3d5ba
      • Opcode Fuzzy Hash: 631ec896b2877a6c4be01801504b47b7a9e4ea2d438b55dac2b31bdc36798a52
      • Instruction Fuzzy Hash: 2E3122B4900609DFDB14CFA4C844BDABBB4FB08318F14862ED459AB341D77AA559CFA0

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 160 6e341010 call 6e3410d0 162 6e341015-6e341017 ExitProcess 160->162
      APIs
        • Part of subcall function 6E3410D0: OpenMutexA.KERNEL32(001F0001,00000000,Mutex8565865865), ref: 6E341109
        • Part of subcall function 6E3410D0: CreateMutexA.KERNELBASE(00000000,00000000,Mutex8565865865), ref: 6E341124
      • ExitProcess.KERNEL32 ref: 6E341017
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: Mutex$CreateExitOpenProcess
      • String ID:
      • API String ID: 2853217582-0
      • Opcode ID: 7266fd00f577ebd5b4698b78e9a15bdbb7bcb8408160b46f561876a95778adb2
      • Instruction ID: 7c1874af1d2bb08b7aad4fa1f2cb71bd7d8d038ba48c38d0f767525b122c2988
      • Opcode Fuzzy Hash: 7266fd00f577ebd5b4698b78e9a15bdbb7bcb8408160b46f561876a95778adb2
      • Instruction Fuzzy Hash: 84900230144A40A6D55116E1580974826695705656F100840A14A545844A5020549715

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 163 6e3497c0-6e3497ff WSAStartup 164 6e349800-6e349806 163->164 165 6e349820-6e349826 164->165 166 6e349808-6e34980e 164->166 169 6e349847-6e349851 165->169 170 6e349828-6e34982e 165->170 167 6e349810-6e349816 166->167 168 6e349839-6e349845 166->168 167->164 171 6e349818-6e34986a call 6e35263e 167->171 168->164 169->164 170->164 172 6e349830-6e349837 170->172 172->164
      APIs
      • WSAStartup.WS2_32(00000202,?), ref: 6E3497DF
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: Startup
      • String ID:
      • API String ID: 724789610-0
      • Opcode ID: f7da161201eaff6f06fac460b4592314b878d1d29d8b9a68753a0a4ac7770e52
      • Instruction ID: 23d05a503e892c7e310897742d99bf0d77af38501809d47fcaba84ba9d964955
      • Opcode Fuzzy Hash: f7da161201eaff6f06fac460b4592314b878d1d29d8b9a68753a0a4ac7770e52
      • Instruction Fuzzy Hash: 80012830A48252DBCB741EAC82717BA77F8EFC6318F52042EC5878A784D6250891C7E3

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 176 6e343910-6e34391f 177 6e343924-6e34392f 176->177 178 6e343930-6e343935 177->178 179 6e343937-6e34393c 178->179 180 6e343980-6e343985 178->180 181 6e3439a0-6e3439a7 179->181 182 6e34393e-6e343943 179->182 183 6e343997-6e343999 180->183 184 6e343987-6e34398c 180->184 181->177 185 6e3439d8-6e3439e4 182->185 186 6e343949-6e34394e 182->186 183->178 187 6e3439b0-6e3439b7 184->187 188 6e34398e-6e343993 184->188 186->178 189 6e343950-6e343975 call 6e3439f0 186->189 187->177 188->178 190 6e343995-6e3439d3 Sleep 188->190 189->178 190->177
      APIs
      • Sleep.KERNELBASE(000007D0,00000000,00000000,?,74DF0F00,4FFB6A0C,6E3414E8,00000001,00000000,?), ref: 6E3439C8
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: Sleep
      • String ID:
      • API String ID: 3472027048-0
      • Opcode ID: cb69cbf70640970afe9cf83d4fcf54992f1d3a9f1a3135f476fe1e253210c09a
      • Instruction ID: d91b4f1feeec32bcec3e10833019fc84d8d9a05e23da65e76c5ec13c3e761aaa
      • Opcode Fuzzy Hash: cb69cbf70640970afe9cf83d4fcf54992f1d3a9f1a3135f476fe1e253210c09a
      • Instruction Fuzzy Hash: 4211497278C280FF8A5055C958CCBBE76DCEBA5314F10091AE2C5C3322D16BC894C7A3
      APIs
      • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 6E352F46
      • memset.VCRUNTIME140(?,00000000,00000003), ref: 6E352F6C
      • memset.VCRUNTIME140(?,00000000,00000050), ref: 6E352FF6
      • IsDebuggerPresent.KERNEL32 ref: 6E353012
      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6E353032
      • UnhandledExceptionFilter.KERNEL32(?), ref: 6E35303C
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: ExceptionFilterPresentUnhandledmemset$DebuggerFeatureProcessor
      • String ID:
      • API String ID: 1045392073-0
      • Opcode ID: 58a835bcc138eadcf955e0ac4ed73739622ee882cdbeb8a49645d747fac0de9d
      • Instruction ID: 0d4c444c1626baa660c2caf6d7be64bcde1b9620b6de890d74b118f6fcb212bf
      • Opcode Fuzzy Hash: 58a835bcc138eadcf955e0ac4ed73739622ee882cdbeb8a49645d747fac0de9d
      • Instruction Fuzzy Hash: 2B3116B5D453189BDB11DFA4D989BCDBBB8BF08304F1044AAE44DAB350EB719A85CF04
      APIs
      • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6E35313D
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: FeaturePresentProcessor
      • String ID:
      • API String ID: 2325560087-0
      • Opcode ID: 56669f7e8295aa83cc6ac918f662399eaf8c7d7c4a07519d8c2f851c8a1913f3
      • Instruction ID: f486c5d90f63181c35ebea07aaa4d07a1c643e39491eeb43d48cc188bbec1ca8
      • Opcode Fuzzy Hash: 56669f7e8295aa83cc6ac918f662399eaf8c7d7c4a07519d8c2f851c8a1913f3
      • Instruction Fuzzy Hash: 135181B1910A05CFDB05CFA9C496BAABBF4FB45350F20856AE815EB384D3769920CF60
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: fa2794cd5f8265bfb38fe47ab7ea0272d9117f93e9b974dc6054a212bba267ff
      • Instruction ID: 46c004cb6ca0f039b2e2a6cc80affef837243ee12894088be0dd348c688c6870
      • Opcode Fuzzy Hash: fa2794cd5f8265bfb38fe47ab7ea0272d9117f93e9b974dc6054a212bba267ff
      • Instruction Fuzzy Hash: 2821D71434E137EBA7AC8CEA5BB067E71CA5BD9214B21459EF81356B90C4529C41C2F3

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 391 6e345830-6e345850 392 6e345870-6e345875 391->392 393 6e345877-6e34587c 392->393 394 6e3458c0-6e3458c5 392->394 395 6e345950-6e345955 393->395 396 6e345882-6e345887 393->396 397 6e345990-6e345995 394->397 398 6e3458cb-6e3458d0 394->398 405 6e345a8b-6e345a90 395->405 406 6e34595b-6e345960 395->406 401 6e345a34-6e345a39 396->401 402 6e34588d-6e345892 396->402 399 6e345b9a-6e345b9f 397->399 400 6e34599b-6e3459a0 397->400 403 6e3458d6-6e3458db 398->403 404 6e345a61-6e345a66 398->404 415 6e345ba5-6e345bc1 399->415 416 6e345df8-6e345dfd 399->416 409 6e3459a6-6e3459ab 400->409 410 6e345c92-6e345c99 400->410 419 6e345cb6-6e345cbf 401->419 420 6e345a3f-6e345a44 401->420 413 6e345bc6-6e345c27 memcpy * 2 402->413 414 6e345898-6e34589d 402->414 417 6e3458e1-6e3458e6 403->417 418 6e345852-6e34586f 403->418 407 6e345cc4-6e345cd1 404->407 408 6e345a6c-6e345a71 404->408 411 6e345a96-6e345aaa 405->411 412 6e345deb-6e345df0 405->412 421 6e345966-6e34596b 406->421 422 6e345c3d-6e345c5b 406->422 407->392 408->392 423 6e345a77-6e345a86 408->423 409->392 429 6e3459b1-6e3459d9 409->429 410->392 424 6e345dd7-6e345de6 call 6e3525ff 411->424 425 6e345ab0-6e345aeb 411->425 412->392 431 6e345df6 412->431 430 6e345c2b-6e345c38 memset 413->430 414->392 426 6e34589f-6e3458b1 414->426 415->392 416->392 434 6e345e03-6e345e06 call 6e345e30 416->434 417->392 427 6e3458e8-6e345944 memcpy memset 417->427 418->392 419->392 420->392 433 6e345a4a-6e345a5c 420->433 421->392 428 6e345971-6e34597e 421->428 432 6e345c60-6e345c65 422->432 423->392 424->392 437 6e345af0-6e345af6 425->437 426->392 427->430 428->392 436 6e3459e0-6e3459e5 429->436 430->392 439 6e345e0b-6e345e22 431->439 440 6e345c67-6e345c6c 432->440 441 6e345c7a-6e345c90 432->441 433->392 434->439 444 6e3459e7-6e3459ec 436->444 445 6e345a10-6e345a15 436->445 442 6e345b20-6e345b26 437->442 443 6e345af8-6e345afe 437->443 447 6e345cd6-6e345cff 440->447 448 6e345c6e-6e345c73 440->448 441->432 457 6e345b60-6e345b66 442->457 458 6e345b28-6e345b2e 442->458 452 6e345b40-6e345b46 443->452 453 6e345b00-6e345b06 443->453 450 6e3459f2-6e3459f7 444->450 451 6e345c9e-6e345cb1 444->451 455 6e345a17-6e345a1c 445->455 456 6e345a29-6e345a32 445->456 454 6e345d00-6e345d06 447->454 448->432 449 6e345c75-6e345e25 call 6e342cf0 448->449 481 6e345e2a _invalid_parameter_noinfo_noreturn 449->481 450->436 470 6e3459f9-6e345a0e 450->470 451->392 466 6e345b90-6e345b95 452->466 467 6e345b48-6e345b4e 452->467 460 6e345b7f-6e345b81 453->460 461 6e345b08-6e345b0e 453->461 462 6e345d30-6e345d36 454->462 463 6e345d08-6e345d0e 454->463 455->436 471 6e345a1e-6e345a27 455->471 456->436 468 6e345b75-6e345b7a 457->468 469 6e345b68-6e345b6e 457->469 464 6e345b86-6e345b8b 458->464 465 6e345b30-6e345b36 458->465 460->437 461->437 473 6e345b10-6e345b12 461->473 477 6e345d7f-6e345dcc memcpy 462->477 478 6e345d38-6e345d3e 462->478 474 6e345d10-6e345d16 463->474 475 6e345d5a-6e345d70 463->475 464->437 465->437 476 6e345b38-6e345dd3 465->476 466->437 467->437 479 6e345b50-6e345b55 467->479 468->437 469->437 480 6e345b70 469->480 470->436 471->436 473->437 482 6e345d72-6e345d74 474->482 483 6e345d18-6e345d1e 474->483 475->454 476->424 477->392 485 6e345d76-6e345d7d 478->485 486 6e345d40-6e345d46 478->486 479->437 480->481 482->454 483->454 487 6e345d20-6e345d2b call 6e3525ca 483->487 485->454 486->454 488 6e345d48-6e345d4e call 6e342b90 486->488 492 6e345d53-6e345d58 487->492 488->492 492->454
      APIs
      • memcpy.VCRUNTIME140(?,?,?), ref: 6E345912
      • memset.VCRUNTIME140(?,00000000,?), ref: 6E345935
      • memset.VCRUNTIME140(?,00000000,?), ref: 6E345C2B
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: memset$memcpy
      • String ID: ev>$fv>$fv>$fv>$|)#$|)#$|)#
      • API String ID: 368790112-2700277603
      • Opcode ID: 41328cf95faad224a69d478e317dbb486e58ae141557802ce6b66a38b50c8990
      • Instruction ID: 5e70adc8b7408f6692081b2835228cf7c640f2f99639960ef2f833092e624644
      • Opcode Fuzzy Hash: 41328cf95faad224a69d478e317dbb486e58ae141557802ce6b66a38b50c8990
      • Instruction Fuzzy Hash: 63E1EF71E08201EFC710DF9DD8C4A1EB7E8AF99354F94492AE999D7361C732EC448B92

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 493 6e342fd0-6e343027 494 6e343030-6e343036 493->494 495 6e343060-6e343066 494->495 496 6e343038-6e34303e 494->496 499 6e343081-6e343088 495->499 500 6e343068-6e34306e 495->500 497 6e343040-6e343046 496->497 498 6e34308a-6e3430b8 496->498 497->494 502 6e343048-6e34304f 497->502 501 6e3430c0-6e3430c6 498->501 499->494 500->494 503 6e343070-6e34307f 500->503 504 6e3430f0-6e3430f6 501->504 505 6e3430c8-6e3430ce 501->505 502->494 503->494 508 6e3430f8-6e3430fe 504->508 509 6e34311a-6e343145 504->509 506 6e3430d0-6e3430d6 505->506 507 6e343111-6e343118 505->507 506->501 510 6e3430d8-6e3430df 506->510 507->501 508->501 511 6e343100-6e34310f 508->511 512 6e343149-6e343166 509->512 510->501 511->501 513 6e343170-6e343175 512->513 514 6e343177-6e34317c 513->514 515 6e3431a0-6e3431a5 513->515 518 6e3431c2-6e3431f8 memcpy * 2 514->518 519 6e34317e-6e343183 514->519 516 6e3434bf-6e3434ca 515->516 517 6e3431ab-6e3431b0 515->517 520 6e3431b6-6e3431bb 517->520 521 6e343347-6e34335c 517->521 518->513 522 6e343185-6e34318a 519->522 523 6e3431fd-6e34323a memcpy * 2 519->523 520->513 524 6e3431bd-6e3434cd call 6e342920 520->524 521->513 522->513 527 6e34318c-6e3433bf call 6e342930 522->527 525 6e343240-6e34326a 523->525 526 6e34336b-6e343384 call 6e3525ff 523->526 542 6e3434d2 call 6e342cf0 524->542 531 6e343280-6e343288 525->531 526->513 546 6e3433c0-6e3433c6 527->546 534 6e3432b0-6e3432b6 531->534 535 6e34328a-6e343290 531->535 540 6e3432f0-6e3432f6 534->540 541 6e3432b8-6e3432c0 534->541 538 6e3432d0-6e3432d6 535->538 539 6e343292-6e343298 535->539 544 6e34326c-6e34327b 538->544 545 6e3432d8-6e3432de 538->545 549 6e343310-6e343315 539->549 550 6e34329a-6e3432a0 539->550 547 6e3432f8-6e343300 540->547 548 6e34331a-6e34331f 540->548 541->531 551 6e3432c2-6e3432ca 541->551 553 6e3434d7-6e3533e0 _invalid_parameter_noinfo_noreturn __CxxFrameHandler3 542->553 544->531 554 6e343334-6e34333c 545->554 555 6e3432e0-6e3432e5 545->555 556 6e3433dd-6e3433ee 546->556 557 6e3433c8-6e3433ce 546->557 547->531 558 6e343306-6e34330b 547->558 548->531 549->531 559 6e343324-6e34332c 550->559 560 6e3432a6-6e3432ab 550->560 551->531 552 6e3432cc-6e3432ce 551->552 552->531 554->531 565 6e343342 554->565 555->531 556->546 562 6e3433f0-6e34340b 557->562 563 6e3433d0-6e3433d6 557->563 558->531 559->531 564 6e343332-6e343367 559->564 560->531 567 6e343420-6e343426 562->567 563->546 566 6e3433d8 563->566 564->526 565->553 566->542 569 6e343450-6e343456 567->569 570 6e343428-6e34342e 567->570 573 6e343475-6e343477 569->573 574 6e343458-6e34345e 569->574 571 6e343430-6e343436 570->571 572 6e34340d-6e343413 call 6e3525ca 570->572 575 6e343490-6e3434ba 571->575 576 6e343438-6e34343e 571->576 582 6e343418-6e34341d 572->582 573->567 577 6e343460-6e343466 574->577 578 6e343479-6e34348e 574->578 575->512 576->567 580 6e343440-6e343447 576->580 577->567 581 6e343468-6e343473 call 6e342b90 577->581 578->567 580->567 581->582 582->567
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: CZpY$CZpY$L^|?$M^|?$M^|?$``$``$``
      • API String ID: 0-2715003150
      • Opcode ID: cdebbd5ed39e9b48441c14f323aef6b4e3e105f1f6a55018001b0cb659489c87
      • Instruction ID: 256e83703ba99efe6d9ac423459c0ea42e14bb57bff0991947f2691c353add8a
      • Opcode Fuzzy Hash: cdebbd5ed39e9b48441c14f323aef6b4e3e105f1f6a55018001b0cb659489c87
      • Instruction Fuzzy Hash: D1C15471A08301DFC7509FC9C4D895EB7E9BB89B14F114A2EE995AB310D731DC818BA3

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 585 6e342480-6e3424cd 586 6e3424d0-6e3424d6 585->586 587 6e342500-6e342506 586->587 588 6e3424d8-6e3424de 586->588 591 6e342522-6e342529 587->591 592 6e342508-6e34250e 587->592 589 6e3424e0-6e3424e6 588->589 590 6e34252b-6e34255a 588->590 589->586 593 6e3424e8-6e3424ef 589->593 595 6e342560-6e342566 590->595 591->586 592->586 594 6e342510-6e342520 592->594 593->586 594->586 596 6e342590-6e342596 595->596 597 6e342568-6e34256e 595->597 598 6e342598-6e34259e 596->598 599 6e3425bb-6e3425ce 596->599 600 6e342570-6e342576 597->600 601 6e3425b2-6e3425b9 597->601 598->595 602 6e3425a0-6e3425b0 598->602 603 6e3425d2-6e3425de 599->603 600->595 604 6e342578-6e34257f 600->604 601->595 602->595 605 6e3425e0-6e3425e5 603->605 604->595 606 6e3425e7-6e3425ec 605->606 607 6e342610-6e342615 605->607 608 6e3427a0-6e3427bb call 6e342930 606->608 609 6e3425f2-6e3425f7 606->609 610 6e342636-6e34264b 607->610 611 6e342617-6e34261c 607->611 622 6e3427c0-6e3427c6 608->622 612 6e3425f9-6e3425fe 609->612 613 6e34262a-6e342634 609->613 610->605 614 6e34264d-6e34265a 611->614 615 6e34261e-6e342623 611->615 612->605 619 6e342600-6e342901 612->619 613->605 617 6e342767-6e342769 614->617 618 6e342660-6e34268e 614->618 615->605 620 6e342625-6e342904 call 6e342920 615->620 624 6e342777-6e34278d call 6e3525ff 617->624 623 6e3426a0-6e3426a8 618->623 639 6e342909 call 6e342cf0 620->639 627 6e3427dd-6e3427ef 622->627 628 6e3427c8-6e3427ce 622->628 629 6e3426d0-6e3426d6 623->629 630 6e3426aa-6e3426b0 623->630 624->605 627->622 633 6e342800-6e34281c 628->633 634 6e3427d0-6e3427d6 628->634 637 6e342710-6e342716 629->637 638 6e3426d8-6e3426e0 629->638 635 6e3426f0-6e3426f6 630->635 636 6e3426b2-6e3426b8 630->636 644 6e342830-6e342836 633->644 634->622 643 6e3427d8 634->643 649 6e342690-6e34269f 635->649 650 6e3426f8-6e3426fe 635->650 645 6e342730-6e342735 636->645 646 6e3426ba-6e3426c0 636->646 641 6e342718-6e342720 637->641 642 6e34273a-6e34273f 637->642 638->623 647 6e3426e2-6e3426ea 638->647 657 6e34290e-6e342914 _invalid_parameter_noinfo_noreturn 639->657 641->623 651 6e342726-6e34272b 641->651 642->623 643->639 654 6e342860-6e342866 644->654 655 6e342838-6e34283e 644->655 645->623 652 6e342744-6e34274c 646->652 653 6e3426c6-6e3426cb 646->653 647->623 656 6e3426ec-6e3426ee 647->656 649->623 658 6e342754-6e34275c 650->658 659 6e342700-6e342705 650->659 651->623 652->623 660 6e342752-6e342773 652->660 653->623 664 6e342885-6e342887 654->664 665 6e342868-6e34286e 654->665 662 6e342840-6e342846 655->662 663 6e34281e-6e342824 call 6e3525ca 655->663 656->623 658->623 661 6e342762 658->661 659->623 660->624 661->657 670 6e3428b0-6e3428f2 memcpy 662->670 671 6e342848-6e34284e 662->671 673 6e342829-6e34282e 663->673 664->644 666 6e342870-6e342876 665->666 667 6e342889-6e34289f 665->667 666->644 672 6e342878-6e342883 call 6e342b90 666->672 667->644 670->603 671->644 674 6e342850-6e342857 671->674 672->673 673->644 674->644
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: CZpY$CZpY$L^|?$M^|?$M^|?$C!"$C!"$C!"$``$``$``
      • API String ID: 0-3622555438
      • Opcode ID: 4834c1605d0ecb29c39dd2884f1499d1652decf4e449a26b0a58b0fa22d6ce62
      • Instruction ID: bd489f21a1ea45af1046aa29ce894490ccbaf7fce930714c53d775a40372c3c8
      • Opcode Fuzzy Hash: 4834c1605d0ecb29c39dd2884f1499d1652decf4e449a26b0a58b0fa22d6ce62
      • Instruction Fuzzy Hash: 7BA16471A58305CFC710AEC982D0A1EB7F6AB85710F12486AED94FB310F676DC818B97

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 925 6e349930-6e34996d socket 926 6e349970-6e349975 925->926 927 6e349977-6e34997c 926->927 928 6e3499e0-6e3499e5 926->928 929 6e349982-6e349987 927->929 930 6e349a1d-6e349a31 927->930 931 6e349a45-6e349a59 call 6e35263e 928->931 932 6e3499e7-6e3499ec 928->932 934 6e349a36-6e349a40 929->934 935 6e34998d-6e349992 929->935 930->926 936 6e349a11-6e349a18 932->936 937 6e3499ee-6e3499f3 932->937 934->926 935->926 939 6e349994-6e3499d2 htons inet_addr connect 935->939 936->926 937->926 940 6e3499f9-6e349a0b shutdown closesocket 937->940 939->926 940->936
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: closesocketconnecthtonsinet_addrshutdownsocket
      • String ID: 5FiZ$5FiZ$pMxH$qMxH$qMxH$qMxH
      • API String ID: 502862507-2539853916
      • Opcode ID: 769271176a19ecf19a64033905a0ee0fab3203adf7c97c10fc98a1e60edf6745
      • Instruction ID: 0cc145ccee1d233f89c0f62f85edac78263e2a67ff8660769f228b54d3ab05d4
      • Opcode Fuzzy Hash: 769271176a19ecf19a64033905a0ee0fab3203adf7c97c10fc98a1e60edf6745
      • Instruction Fuzzy Hash: 9E210771658242EFCB108F98CC95B5A77F9BF4A760F100A56F951CB3A0D7719C40CBA2
      APIs
        • Part of subcall function 6E34D2D0: ?_Random_device@std@@YAIXZ.MSVCP140(?,?,?,6E34CD35,?,00000014), ref: 6E34D468
        • Part of subcall function 6E34D7A0: ??0ios_base@std@@IAE@XZ.MSVCP140 ref: 6E34D7E5
        • Part of subcall function 6E34D7A0: ?init@?$basic_ios@DU?$char_traits@D@std@@@std@@IAEXPAV?$basic_streambuf@DU?$char_traits@D@std@@@2@_N@Z.MSVCP140(?,00000000), ref: 6E34D84A
        • Part of subcall function 6E34D7A0: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ.MSVCP140 ref: 6E34D8A1
        • Part of subcall function 6E34D9E0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 6E34DA13
        • Part of subcall function 6E34D9E0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z.MSVCP140(?), ref: 6E34DAE3
      • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@I@Z.MSVCP140(?), ref: 6E34CF29
      • ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ.MSVCP140 ref: 6E34D1AA
      • ??1ios_base@std@@UAE@XZ.MSVCP140 ref: 6E34D1B2
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_streambuf@??0ios_base@std@@??1?$basic_streambuf@??1ios_base@std@@??6?$basic_ostream@?init@?$basic_ios@?sputc@?$basic_streambuf@D@std@@@2@_Random_device@std@@V01@V?$basic_streambuf@strlen
      • String ID: HTTP/1.1$Accept: */*$Connection: Close$Content-Length: $GET /$Host: $User-Agent:
      • API String ID: 882624657-3865628381
      • Opcode ID: b968d5419f618b53cbd3f0ba3227132b6cadbcbe57f7c4e5d501f887fdb602c0
      • Instruction ID: 057dde3bf14b8a991757780291a003daf80c9f200d37fc4c0f05fe0a177f46fd
      • Opcode Fuzzy Hash: b968d5419f618b53cbd3f0ba3227132b6cadbcbe57f7c4e5d501f887fdb602c0
      • Instruction Fuzzy Hash: 63E1AAB5600B00CFC724CFA5C891A96B7F9AF89304F408D2DE89A8B711E771F859CB91
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: nD*$nD*$nD*
      • API String ID: 0-2512186221
      • Opcode ID: 91a02d9fa0f176f6c815676359ae830d6217dff6a12a097788b1a65b6f7efd04
      • Instruction ID: ea0ac04e8d6f7fb9593d6d5cfa92becb76a4b8100d44a32e6d0fa97399287939
      • Opcode Fuzzy Hash: 91a02d9fa0f176f6c815676359ae830d6217dff6a12a097788b1a65b6f7efd04
      • Instruction Fuzzy Hash: B7B1C071958306CFC760DFD9C48062AB7E5AB89310F154D69F9A4973A1E3B2CC548BE3
      APIs
      • ??0ios_base@std@@IAE@XZ.MSVCP140 ref: 6E34D7E5
      • ?init@?$basic_ios@DU?$char_traits@D@std@@@std@@IAEXPAV?$basic_streambuf@DU?$char_traits@D@std@@@2@_N@Z.MSVCP140(?,00000000), ref: 6E34D84A
      • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ.MSVCP140 ref: 6E34D8A1
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_streambuf@??0ios_base@std@@?init@?$basic_ios@D@std@@@2@_V?$basic_streambuf@
      • String ID: LG5n$i$i$i
      • API String ID: 4279176481-459428206
      • Opcode ID: fb090c99e1ffea42e63d7aa031d85f1bdb67ee84af25bff093467f77810d7690
      • Instruction ID: 5c04d18090d71f8b6d1a92506f564a320e5fea518ab1963882764db199ac3b07
      • Opcode Fuzzy Hash: fb090c99e1ffea42e63d7aa031d85f1bdb67ee84af25bff093467f77810d7690
      • Instruction Fuzzy Hash: B2516A78A0060ACFCB28CF88D1A4A79BBF4FF59304FA0845EE5125B7A4D335A841CF91
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: nD*$nD*$nD*
      • API String ID: 0-2512186221
      • Opcode ID: ce420dc6c68f66d03e835b385675b364cf418e4b36d757b7134dc0c64ed5df62
      • Instruction ID: c3ac9a4da57b4c2d482aa60cb284d2f9eab3f552a45ca6897abdb4c777fae77f
      • Opcode Fuzzy Hash: ce420dc6c68f66d03e835b385675b364cf418e4b36d757b7134dc0c64ed5df62
      • Instruction Fuzzy Hash: 85A1127092C746CF8714DEA984D061BBBE8EB89314F10492EE9A59B351D372DC448BD3
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: nD*$nD*$nD*$nD*$nD*$nD*
      • API String ID: 0-3356428140
      • Opcode ID: 33c1912cae1a74cd2e97f86f449ee70181906ded4a66f2e060cd9b697e54aa52
      • Instruction ID: 6148b4418dcb13fe6729e957dff31aafc4aee201c7c65f8cb5412cc0f66be473
      • Opcode Fuzzy Hash: 33c1912cae1a74cd2e97f86f449ee70181906ded4a66f2e060cd9b697e54aa52
      • Instruction Fuzzy Hash: 7E91C170918202CFC7508FADC49052ABBE6AB55324F614E6DE4A8DB7E0D336D9858BD3
      APIs
      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(0000000A,00000000,-0000000F,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6E348E7A
      • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 6E348EE4
      Strings
      • invalid stoi argument, xrefs: 6E349008
      • stoi argument out of range, xrefs: 6E348FFE
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: _errnostrtol
      • String ID: invalid stoi argument$stoi argument out of range
      • API String ID: 897893115-1606216832
      • Opcode ID: afe875f16f5de7a910b71e4b2788f516cf20c9f055f73dbd7d58503a78e689e4
      • Instruction ID: c406b60021f00c741c575101904f7ba98b794163db47b629c200e199f1bf8f59
      • Opcode Fuzzy Hash: afe875f16f5de7a910b71e4b2788f516cf20c9f055f73dbd7d58503a78e689e4
      • Instruction Fuzzy Hash: B041E832608205DFCB585AA8E0E0A7E77EBAFC5358F50485EF8964B754C7325894CBD3
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: nD*$nD*$nD*$|$|
      • API String ID: 0-1944917205
      • Opcode ID: 4f6ec5cff62208e532b7b81fcef5ad7f2766faebaf7a7ac0454d8e7d3005a87a
      • Instruction ID: c152777193ed130f135f099fd1f74036cec0239458d68fc36e1b0e20279e98de
      • Opcode Fuzzy Hash: 4f6ec5cff62208e532b7b81fcef5ad7f2766faebaf7a7ac0454d8e7d3005a87a
      • Instruction Fuzzy Hash: 39519F30669301CFC650EF99C59461EB7E5AFC9614F61886DE5D88B312D732EC81CBA3
      APIs
      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 6E34DA13
        • Part of subcall function 6E352000: ?good@ios_base@std@@QBE_NXZ.MSVCP140 ref: 6E352098
        • Part of subcall function 6E352000: ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ.MSVCP140 ref: 6E3520B6
        • Part of subcall function 6E352000: ?good@ios_base@std@@QBE_NXZ.MSVCP140 ref: 6E3520C4
      • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z.MSVCP140(?), ref: 6E34DAE3
      • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z.MSVCP140(?,?), ref: 6E34DB3A
      • ?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z.MSVCP140(?,00000000,?), ref: 6E34DB94
      • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 6E34DB9A
      • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ.MSVCP140 ref: 6E34DBAD
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: D@std@@@std@@U?$char_traits@$?good@ios_base@std@@?sputc@?$basic_streambuf@$?clear@?$basic_ios@?flush@?$basic_ostream@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@strlen
      • String ID:
      • API String ID: 2744321282-0
      • Opcode ID: 4ed1f60f09d7df6868d016fa36271db2fc0bd354d706f6b4ad6309fbafbb521d
      • Instruction ID: 228a6f4539ff7c4309b5129305add009f89fdd63c4c3a393023f1193e9fe8041
      • Opcode Fuzzy Hash: 4ed1f60f09d7df6868d016fa36271db2fc0bd354d706f6b4ad6309fbafbb521d
      • Instruction Fuzzy Hash: 49515875A00618CFCB11CFA8C984BAABBF5FF49324F548658E956AB390C735AD00CF90
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: nD*$nD*$nD*
      • API String ID: 0-2512186221
      • Opcode ID: 0c71be428a06e41212a82886482e544e396d5e6eeba52d1ba8e8ded80740d606
      • Instruction ID: 8325d819620e83f0765e6665dece7d591c54d6bcfcddb537be9f4be9bd450a67
      • Opcode Fuzzy Hash: 0c71be428a06e41212a82886482e544e396d5e6eeba52d1ba8e8ded80740d606
      • Instruction Fuzzy Hash: 57913372D2C221DF8751EE9C849065EB3E9AB89310F414D6AECE5AB355D332CC858BD3
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: -[t$.[t$.[t$.[t
      • API String ID: 0-664268514
      • Opcode ID: cac5b989b2beaf67a869a02b4ab7c4ad94e07818ae5692d013ecd911f8e76ae6
      • Instruction ID: 8d34d4b50e08fd93e54604d1578a2309254eb43e0c43040af63fa3617cf214ad
      • Opcode Fuzzy Hash: cac5b989b2beaf67a869a02b4ab7c4ad94e07818ae5692d013ecd911f8e76ae6
      • Instruction Fuzzy Hash: 4F21C8A066C900DB595C8DDA07B593E39EEDE81710B210D8FF253F7F44DA1A588147B3
      APIs
      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 6E34788F
      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?), ref: 6E347B13
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: strlen
      • String ID:
      • API String ID: 39653677-0
      • Opcode ID: 4cf5e40d70f144c52a0be49349b48164e705e5836f04d480ceb266532c9a1147
      • Instruction ID: cc734babb4c5d3940de31ae033a9d5e40a7fd956660e15f68c8c00771e9d8038
      • Opcode Fuzzy Hash: 4cf5e40d70f144c52a0be49349b48164e705e5836f04d480ceb266532c9a1147
      • Instruction Fuzzy Hash: 21022672E54249CFCF50CFE9C59469EF7FAAF89310F25091AE415AB390D7318C858BA1
      APIs
      • memcpy.VCRUNTIME140(?,?,00000007), ref: 6E350EEE
      • memcpy.VCRUNTIME140(00000000,?,?), ref: 6E350F05
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: memcpy
      • String ID: DG5n$uDJl$uDJl
      • API String ID: 3510742995-1489047631
      • Opcode ID: 12fea78d6196b6c08d71ef14511f6aed694ac48b7cc7385cfe94f63b1b5757c0
      • Instruction ID: 6d96afeb0b2ceaa3fa590d87d5eb34c9e2e709212b791af4a9f902f3ecaea0af
      • Opcode Fuzzy Hash: 12fea78d6196b6c08d71ef14511f6aed694ac48b7cc7385cfe94f63b1b5757c0
      • Instruction Fuzzy Hash: 13A114729083118FC7509E89C0E0A5EB7E6AB85328F62495DE8E42B354E733DC648F93
      APIs
      • memset.VCRUNTIME140(?,00000000,00001000,CAD60A9B), ref: 6E349FF2
      • GetModuleFileNameW.KERNEL32(00000000,?,00001000,?,6E34A590,?), ref: 6E34A002
      • wcslen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 6E34A024
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: FileModuleNamememsetwcslen
      • String ID:
      • API String ID: 13871436-0
      • Opcode ID: 6381d3f51908c8148f393728770706760ad235f8e78600603059bcbe994e5a99
      • Instruction ID: 889c7c82dd52dcca5a16fb2d692bb367e247f7f762e47856b04c940671f071b1
      • Opcode Fuzzy Hash: 6381d3f51908c8148f393728770706760ad235f8e78600603059bcbe994e5a99
      • Instruction Fuzzy Hash: EC91FFB1A08214CFDB50CFD8C890BAEBBF5BB89314F154569E444AB351E3369D85CBA2
      APIs
      • memcpy.VCRUNTIME140(00000000,?,?,?,?,?,?,?,?,?,?,?,?,6E3448E5), ref: 6E344A5E
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: memcpy
      • String ID: y2q4$y2q4
      • API String ID: 3510742995-3122413610
      • Opcode ID: c341e26ddc4d1416b5c1e0209e3da052be8ac18b33394d726d2024f09ec98195
      • Instruction ID: 9c596d4bfe1e747f4e4834d78b19276eed85c5bb9f088c66df0062981d774272
      • Opcode Fuzzy Hash: c341e26ddc4d1416b5c1e0209e3da052be8ac18b33394d726d2024f09ec98195
      • Instruction Fuzzy Hash: 7E518574608200DFCBA1DF99C484B59B7E8AF5A324F14497AF0C8DB321C736A866CB53
      APIs
        • Part of subcall function 6E352000: ?good@ios_base@std@@QBE_NXZ.MSVCP140 ref: 6E352098
        • Part of subcall function 6E352000: ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ.MSVCP140 ref: 6E3520B6
        • Part of subcall function 6E352000: ?good@ios_base@std@@QBE_NXZ.MSVCP140 ref: 6E3520C4
      • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z.MSVCP140(?), ref: 6E352234
      • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z.MSVCP140(?), ref: 6E3522CC
      • ?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z.MSVCP140(?,00000000), ref: 6E352315
      • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 6E35231B
      • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ.MSVCP140 ref: 6E35232E
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: D@std@@@std@@U?$char_traits@$?good@ios_base@std@@?sputc@?$basic_streambuf@$?clear@?$basic_ios@?flush@?$basic_ostream@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
      • String ID:
      • API String ID: 3657783076-0
      • Opcode ID: 15a0e1d4228bd538769454344cfed88cb1334e25660fcae91052b91ab34ba1ce
      • Instruction ID: aaabc4903a08a75e17babdf66434a34627fe9b18d7e21438fdd73e57ae610383
      • Opcode Fuzzy Hash: 15a0e1d4228bd538769454344cfed88cb1334e25660fcae91052b91ab34ba1ce
      • Instruction Fuzzy Hash: 5C516678A00615DFDB05CF98CA94FADBBB1FF48324F148658E929AB381C735E910CB90
      APIs
      • memcmp.VCRUNTIME140(?,?,?,00000000,00000001,00000000), ref: 6E3490AC
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: memcmp
      • String ID: $dS)$$dS)$~'p$~'p
      • API String ID: 1475443563-1066583186
      • Opcode ID: 22f57edd218caf6c9cd5a2f4a1729eb1283821887e7056a7fede8a20f55ec451
      • Instruction ID: 896e42c7b4f5276985b9047aa924f6b426f55cfc6e7b001b6cff52c33c6a24f8
      • Opcode Fuzzy Hash: 22f57edd218caf6c9cd5a2f4a1729eb1283821887e7056a7fede8a20f55ec451
      • Instruction Fuzzy Hash: D531287160C303CFC6525DA986E032E73F657C5338F264AAAE6599B359C273CD42CB82
      APIs
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: dllmain_raw$dllmain_crt_dispatch
      • String ID:
      • API String ID: 3136044242-0
      • Opcode ID: 2ba5ddff63460c7f9291908c52ad196ca2ba6eef10ec97a7fdd4eac0f8c2c7cb
      • Instruction ID: 10e00550d148428f6c36190e8cc42199783a27c136d6a51a08d00559a4cf928d
      • Opcode Fuzzy Hash: 2ba5ddff63460c7f9291908c52ad196ca2ba6eef10ec97a7fdd4eac0f8c2c7cb
      • Instruction Fuzzy Hash: E021AE72D0061AAFDB628ED5CE40EAF7A7DEB91A94B014415F85467318EB328D318BE0
      APIs
      • ?_Random_device@std@@YAIXZ.MSVCP140(?,?,?,6E34CD35,?,00000014), ref: 6E34D468
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: Random_device@std@@
      • String ID: >$Q#j!$Q#j!
      • API String ID: 1041445435-139136301
      • Opcode ID: c609a6feeea94a8ccb7129cd2dd40f4ff2696d4c5c8ef1b120d75479cf0c30aa
      • Instruction ID: 5f976a00ddafc2350fa696883e577134ea8463401584fd595a427b93eeaa3afa
      • Opcode Fuzzy Hash: c609a6feeea94a8ccb7129cd2dd40f4ff2696d4c5c8ef1b120d75479cf0c30aa
      • Instruction Fuzzy Hash: E0C18974E05218CFCB14CFA8C4A06EDBBF1BF49308FA1459AD859AB391D7759980CF92
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: L^|?$M^|?$M^|?
      • API String ID: 0-714862341
      • Opcode ID: 0d87a672bfa3456764188c80164eeb229461796b14780d59e8aff9f93d06cbb7
      • Instruction ID: 4075274ea5e2797a3c47ddaae3cb77739b814aa64dfa423e1dbf7cdadaffe8b5
      • Opcode Fuzzy Hash: 0d87a672bfa3456764188c80164eeb229461796b14780d59e8aff9f93d06cbb7
      • Instruction Fuzzy Hash: EA21F771A1C601CBCA9449D2ABD460A72FA97C9344F30842BC505FF718D637EF8B4356
      APIs
      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6E342464
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn
      • String ID: L^|?$M^|?$M^|?
      • API String ID: 3668304517-714862341
      • Opcode ID: 0a61c6c952f56941a588f90761653269fc60f98ee571d416382557bd336e1bff
      • Instruction ID: 3c18da6417166a2fd00e57aa0eb2ee2f8cc32d72dbee516d07aace6843d35e6c
      • Opcode Fuzzy Hash: 0a61c6c952f56941a588f90761653269fc60f98ee571d416382557bd336e1bff
      • Instruction Fuzzy Hash: 06210571B14205CFC6200DD28BD050975FA9B88700B30882FE426FF30AD636E987431B
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 559e1622a51ab4c536e5477d7ae6d5143fbd15894bae1e28c5f477227c7526d1
      • Instruction ID: 490d51517cfe55a2087e3691be8099397110ef660045235a645bc3a0913db13e
      • Opcode Fuzzy Hash: 559e1622a51ab4c536e5477d7ae6d5143fbd15894bae1e28c5f477227c7526d1
      • Instruction Fuzzy Hash: 395190B4608341DFC7518F98C594B09BBE8AF96318F154C6AF896CF352C336DC928B52
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: $>!8$%>!8$%>!8
      • API String ID: 0-1600156571
      • Opcode ID: 76d4a886f1cdf76f16d0bdfbe9b1397499099a542f41984ac1657355f3654eef
      • Instruction ID: 2ff6875f14e3408da9aa09d6caff5332c50877102d293b887d7c41250cbef707
      • Opcode Fuzzy Hash: 76d4a886f1cdf76f16d0bdfbe9b1397499099a542f41984ac1657355f3654eef
      • Instruction Fuzzy Hash: 7A318D34608141CFCA489ED8C0B4B38B3E6EF85314F108A6DD9D74B7B5CA269C979752
      APIs
      • __RTC_Initialize.LIBCMT ref: 6E352865
        • Part of subcall function 6E352C13: InitializeSListHead.KERNEL32(6E357698,6E35286F,6E3565A8,00000010,6E352A0A,?,00000000,?,00000007,6E3565C8,00000010,6E352A1D,?,?,6E352AA6,?), ref: 6E352C18
      • _initterm_e.API-MS-WIN-CRT-RUNTIME-L1-1-0(6E354F0C,6E354F10,6E3565A8,00000010,6E352A0A,?,00000000,?,00000007,6E3565C8,00000010,6E352A1D,?,?,6E352AA6,?), ref: 6E35287E
      • _initterm.API-MS-WIN-CRT-RUNTIME-L1-1-0(6E354F04,6E354F08,6E3565A8,00000010,6E352A0A,?,00000000,?,00000007,6E3565C8,00000010,6E352A1D,?,?,6E352AA6,?), ref: 6E35289C
      • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6E3528CF
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image_initterm_initterm_e
      • String ID:
      • API String ID: 590286634-0
      • Opcode ID: 2a1bd2bc76c01e9f56851280453bc5bd1a862dc24ba6771d7df335ee8f221fc9
      • Instruction ID: 886753254e8f910c7964af76970ffdf574a0b2b3f807dfe44a278a8214a5abb0
      • Opcode Fuzzy Hash: 2a1bd2bc76c01e9f56851280453bc5bd1a862dc24ba6771d7df335ee8f221fc9
      • Instruction Fuzzy Hash: B52124322487469EEB445BE8DA14FDC37B8AF1632DF104C6AD8D66B3C1DB324035C666
      APIs
      • __std_terminate.VCRUNTIME140 ref: 6E34DC47
      • __std_terminate.VCRUNTIME140 ref: 6E34DC5F
      • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 6E34DC77
      • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ.MSVCP140 ref: 6E34DC83
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: __std_terminate$?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@U?$char_traits@
      • String ID:
      • API String ID: 2331131724-0
      • Opcode ID: 300ed7eaa1de8a700751572fb4139372efe73f42c372170a76359539150c21af
      • Instruction ID: bd939b8f4a8ba232bc7480eb2722f1283676bbe1b4211d9fdbf65c49cb901237
      • Opcode Fuzzy Hash: 300ed7eaa1de8a700751572fb4139372efe73f42c372170a76359539150c21af
      • Instruction Fuzzy Hash: B0F0E238900108CFC704BBB8E848DA87778BF15208F55449CD84A5B3A5EF316A1CCA51
      APIs
      • __std_terminate.VCRUNTIME140 ref: 6E3523C7
      • __std_terminate.VCRUNTIME140 ref: 6E3523DF
      • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 6E3523F7
      • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ.MSVCP140 ref: 6E352403
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: __std_terminate$?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@U?$char_traits@
      • String ID:
      • API String ID: 2331131724-0
      • Opcode ID: 44be16380a7898320f732b20545484d3ef7ad08ad22ef3a5a7c0044325ba46fd
      • Instruction ID: 8b60b047b96724383e7323c971a4cb7937eca85dfb9f643714f07d6eba34f2c4
      • Opcode Fuzzy Hash: 44be16380a7898320f732b20545484d3ef7ad08ad22ef3a5a7c0044325ba46fd
      • Instruction Fuzzy Hash: 48F0B478920104DFC700BBB4FD58D687778BF11208F08049CD84A4B3A6EF216929C741
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: |)#$|)#
      • API String ID: 0-3832309455
      • Opcode ID: ec0bf73e0fb9576f151174d8d7fe5d3647f3307f5093f93dbe55de0bdbc8bba1
      • Instruction ID: 09ebaac1827586a2de8b1697e7527b9925ce0f209562b0120d421c95529f4fe5
      • Opcode Fuzzy Hash: ec0bf73e0fb9576f151174d8d7fe5d3647f3307f5093f93dbe55de0bdbc8bba1
      • Instruction Fuzzy Hash: 5331F6B2E04305EFD6704E9D85D073A73FBAB89315FA1899AC02B4B365EB73D4448792
      APIs
      • _CxxThrowException.VCRUNTIME140(?,6E3561FC), ref: 6E342D12
      • __std_exception_copy.VCRUNTIME140(-00000004,?,?,?,6E3561FC), ref: 6E342D43
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: ExceptionThrow__std_exception_copy
      • String ID: 0I5n
      • API String ID: 1552479455-2787057435
      • Opcode ID: c6497ce36aecdc130ab3549365a6767364b1c00d07a23a3fe44f1e88a67fa8b1
      • Instruction ID: a0ef2a20a41d5496f4249e207f11f07105409f66b782c4c2c4ce595e0e837d4e
      • Opcode Fuzzy Hash: c6497ce36aecdc130ab3549365a6767364b1c00d07a23a3fe44f1e88a67fa8b1
      • Instruction Fuzzy Hash: 27E06DF5914301ABE2045F84DC0AF4BBEA8DB12308F418C2CE1869B700D77598768792
      APIs
      • ?_Xlength_error@std@@YAXPBD@Z.MSVCP140(deque<T> too long,6E345E0B), ref: 6E345E35
      Strings
      Memory Dump Source
      • Source File: 00000021.00000002.2920601298.000000006E341000.00000020.00000001.01000000.00000003.sdmp, Offset: 6E340000, based on PE: true
      • Associated: 00000021.00000002.2920584008.000000006E340000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920624747.000000006E354000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920643920.000000006E357000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000021.00000002.2920661278.000000006E359000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_33_2_6e340000_rundll32.jbxd
      Similarity
      • API ID: Xlength_error@std@@
      • String ID: @b5n$deque<T> too long
      • API String ID: 1004598685-1186726973
      • Opcode ID: d22f9bcaa104cc8e18c6f3084a8a7c38dce93c639ad669061e450e42689a1ed5
      • Instruction ID: 953b2ecf3272197fd5697adadf722ffe956b8e36b5c723f1a1f0091b6d68fa22
      • Opcode Fuzzy Hash: d22f9bcaa104cc8e18c6f3084a8a7c38dce93c639ad669061e450e42689a1ed5
      • Instruction Fuzzy Hash: 3FB0223880E080CB02080BCB880CE00222C3B03B23FB00CE382200AB0CCF2200B08323