Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DK3LmU4Xkl.dll

Overview

General Information

Sample name:DK3LmU4Xkl.dll
(renamed file extension from exe to dll, renamed because original name is a hash value)
Original sample name:990bc4b90a3d10f2ae085497a216e4f4.dll.exe
Analysis ID:1561758
MD5:990bc4b90a3d10f2ae085497a216e4f4
SHA1:1202567c49e3a8c05dca5c0ce82dc6659e425f95
SHA256:48b51a6bedbda86249a1188c36a007f1ff8fdb3355a75b68eac7aa89ea5ad77a
Tags:dllexeStrelaStealeruser-abuse_ch
Infos:

Detection

Strela Stealer
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Strela Stealer
AI detected suspicious sample
Machine Learning detection for sample
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
PE file does not import any functions
Program does not show much activity (idle)
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7312 cmdline: loaddll64.exe "C:\Users\user\Desktop\DK3LmU4Xkl.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 7320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7364 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\DK3LmU4Xkl.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 7388 cmdline: rundll32.exe "C:\Users\user\Desktop\DK3LmU4Xkl.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • regsvr32.exe (PID: 7372 cmdline: regsvr32.exe /s C:\Users\user\Desktop\DK3LmU4Xkl.dll MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
    • rundll32.exe (PID: 7396 cmdline: rundll32.exe C:\Users\user\Desktop\DK3LmU4Xkl.dll,DllRegisterServer MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.2129338789.000001D30FFC1000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
    00000003.00000002.2100895730.00007FF8B8F77000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
      00000004.00000002.2095917697.00007FF8B8F77000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
        00000005.00000002.2101067512.00007FF8B8F77000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
          00000000.00000002.2129643214.00007FF8B8F77000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            3.2.regsvr32.exe.7ff8b8f77404.1.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
              3.2.regsvr32.exe.7ff8b8f77404.1.raw.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
                0.2.loaddll64.exe.7ff8b8f77404.1.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
                  5.2.rundll32.exe.7ff8b8f77404.1.raw.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
                    4.2.rundll32.exe.7ff8b8f77404.1.raw.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
                      Click to see the 7 entries
                      No Sigma rule has matched
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: DK3LmU4Xkl.dllReversingLabs: Detection: 39%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 91.3% probability
                      Source: DK3LmU4Xkl.dllJoe Sandbox ML: detected
                      Source: DK3LmU4Xkl.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8B8F710A00_2_00007FF8B8F710A0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001D30FFC72BC0_2_000001D30FFC72BC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001D30FFC1A900_2_000001D30FFC1A90
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001D30FFC15A00_2_000001D30FFC15A0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001D30FFCF4E80_2_000001D30FFCF4E8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001D30FFC10900_2_000001D30FFC1090
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023172BC3_2_023172BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02311A903_2_02311A90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023110903_2_02311090
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231F4E83_2_0231F4E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023115A03_2_023115A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000020810AE15A04_2_0000020810AE15A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000020810AE72BC4_2_0000020810AE72BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000020810AE1A904_2_0000020810AE1A90
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000020810AE10904_2_0000020810AE1090
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000020810AEF4E84_2_0000020810AEF4E8
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000017D3F45F4E85_2_0000017D3F45F4E8
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000017D3F4515A05_2_0000017D3F4515A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000017D3F4510905_2_0000017D3F451090
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000017D3F4572BC5_2_0000017D3F4572BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000017D3F451A905_2_0000017D3F451A90
                      Source: DK3LmU4Xkl.dllStatic PE information: No import functions for PE file found
                      Source: classification engineClassification label: mal64.troj.winDLL@10/0@0/0
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7320:120:WilError_03
                      Source: DK3LmU4Xkl.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\DK3LmU4Xkl.dll",#1
                      Source: DK3LmU4Xkl.dllReversingLabs: Detection: 39%
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\DK3LmU4Xkl.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\DK3LmU4Xkl.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\DK3LmU4Xkl.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\DK3LmU4Xkl.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\DK3LmU4Xkl.dll,DllRegisterServer
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\DK3LmU4Xkl.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\DK3LmU4Xkl.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\DK3LmU4Xkl.dll,DllRegisterServerJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\DK3LmU4Xkl.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeAutomated click: OK
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: DK3LmU4Xkl.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: DK3LmU4Xkl.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\DK3LmU4Xkl.dll
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001D30FFD75DE push ecx; retf 003Fh0_2_000001D30FFD763E
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001D30FFCCCA8 push 6F0000CBh; retf 0_2_000001D30FFCCCAD
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001D30FFCCC9C push ebx; retf 0_2_000001D30FFCCC9D
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001D30FFCCC6C push esi; retf 0000h0_2_000001D30FFCCC6D
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001D30FFCCC35 push cs; retf 0000h0_2_000001D30FFCCC59
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001D30FFCBBA2 push esp; ret 0_2_000001D30FFCBBA5
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231BBA2 push esp; ret 3_2_0231BBA5
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231CC35 push cs; retf 0000h3_2_0231CC59
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231CC6C push esi; retf 0000h3_2_0231CC6D
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231CCA8 push 6F0000CBh; retf 3_2_0231CCAD
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0231CC9C push ebx; retf 3_2_0231CC9D
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000020810AEBBA2 push esp; ret 4_2_0000020810AEBBA5
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000020810AECCA8 push 6F0000CBh; retf 4_2_0000020810AECCAD
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000020810AECC9C push ebx; retf 4_2_0000020810AECC9D
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000020810AECC35 push cs; retf 0000h4_2_0000020810AECC59
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000020810AECC6C push esi; retf 0000h4_2_0000020810AECC6D
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000017D3F45CC35 push cs; retf 0000h5_2_0000017D3F45CC59
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000017D3F45CCA8 push 6F0000CBh; retf 5_2_0000017D3F45CCAD
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000017D3F45CC6C push esi; retf 0000h5_2_0000017D3F45CC6D
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000017D3F45CC9C push ebx; retf 5_2_0000017D3F45CC9D
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000017D3F45BBA2 push esp; ret 5_2_0000017D3F45BBA5
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\DK3LmU4Xkl.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeCode function: GetConsoleWindow,CreateThread,GetLocaleInfoA,0_2_000001D30FFC20E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: CreateThread,GetLocaleInfoA,3_2_023120E0
                      Source: C:\Windows\System32\rundll32.exeCode function: CreateThread,GetLocaleInfoA,4_2_0000020810AE20E0
                      Source: C:\Windows\System32\rundll32.exeCode function: CreateThread,GetLocaleInfoA,5_2_0000017D3F4520E0

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 3.2.regsvr32.exe.7ff8b8f77404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.7ff8b8f77404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ff8b8f77404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ff8b8f77404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.7ff8b8f77404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ff8b8f77404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ff8b8f70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.7ff8b8f77404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ff8b8f70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ff8b8f77404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.7ff8b8f70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.7ff8b8f70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2129338789.000001D30FFC1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2100895730.00007FF8B8F77000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.2095917697.00007FF8B8F77000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2101067512.00007FF8B8F77000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2129643214.00007FF8B8F77000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2100844159.0000017D3F451000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2100662782.0000000002311000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.2095665695.0000020810AE1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 7312, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 7372, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7388, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7396, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 3.2.regsvr32.exe.7ff8b8f77404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.7ff8b8f77404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ff8b8f77404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ff8b8f77404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.7ff8b8f77404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ff8b8f77404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ff8b8f70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.7ff8b8f77404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ff8b8f70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ff8b8f77404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.7ff8b8f70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.7ff8b8f70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2129338789.000001D30FFC1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2100895730.00007FF8B8F77000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.2095917697.00007FF8B8F77000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2101067512.00007FF8B8F77000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2129643214.00007FF8B8F77000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2100844159.0000017D3F451000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2100662782.0000000002311000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.2095665695.0000020810AE1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 7312, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 7372, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7388, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7396, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                      DLL Side-Loading
                      11
                      Process Injection
                      1
                      Regsvr32
                      OS Credential Dumping11
                      System Information Discovery
                      Remote Services1
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Rundll32
                      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                      Process Injection
                      Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      DLL Side-Loading
                      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Obfuscated Files or Information
                      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1561758 Sample: DK3LmU4Xkl.exe Startdate: 24/11/2024 Architecture: WINDOWS Score: 64 19 Multi AV Scanner detection for submitted file 2->19 21 Yara detected Strela Stealer 2->21 23 Machine Learning detection for sample 2->23 25 AI detected suspicious sample 2->25 7 loaddll64.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 regsvr32.exe 7->11         started        13 rundll32.exe 7->13         started        15 conhost.exe 7->15         started        process5 17 rundll32.exe 9->17         started       

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      DK3LmU4Xkl.dll39%ReversingLabsWin64.Trojan.Generic
                      DK3LmU4Xkl.dll100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No contacted domains info
                      No contacted IP infos
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1561758
                      Start date and time:2024-11-24 08:39:05 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 2m 29s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:7
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:DK3LmU4Xkl.dll
                      (renamed file extension from exe to dll, renamed because original name is a hash value)
                      Original Sample Name:990bc4b90a3d10f2ae085497a216e4f4.dll.exe
                      Detection:MAL
                      Classification:mal64.troj.winDLL@10/0@0/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 19
                      • Number of non-executed functions: 21
                      Cookbook Comments:
                      • Stop behavior analysis, all processes terminated
                      • Exclude process from analysis (whitelisted): dllhost.exe
                      • Not all processes where analyzed, report is missing behavior information
                      • VT rate limit hit for: DK3LmU4Xkl.dll
                      No simulations
                      No context
                      No context
                      No context
                      No context
                      No context
                      No created / dropped files found
                      File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Entropy (8bit):7.729890158124373
                      TrID:
                      • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                      • Win64 Executable (generic) (12005/4) 10.17%
                      • Generic Win/DOS Executable (2004/3) 1.70%
                      • DOS Executable Generic (2002/1) 1.70%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                      File name:DK3LmU4Xkl.dll
                      File size:141'824 bytes
                      MD5:990bc4b90a3d10f2ae085497a216e4f4
                      SHA1:1202567c49e3a8c05dca5c0ce82dc6659e425f95
                      SHA256:48b51a6bedbda86249a1188c36a007f1ff8fdb3355a75b68eac7aa89ea5ad77a
                      SHA512:edbcd7a25d42c828abf247a72b7dec03d208c5d9d2f7d18d1eeac1711444587bfcc79aec89301e3b41c14a61f37e78c92180c269722337ade3a588536d3a1140
                      SSDEEP:3072:jnJR01T5K/tVwrwnF28z5Qnfo9db/Vq1LAZmonIbTxaZeaL0Q:1R0/K/tVHhQfojbtqSdSTxaZJ
                      TLSH:5AD3F1FB2214858FFB6231FD07DEA895B0A160DAD20DF12780ED89B2887D56C455EE3D
                      File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d.....1g.........." .....H...................................................p............`........................................
                      Icon Hash:7ae282899bbab082
                      Entrypoint:0x180001090
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x180000000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                      Time Stamp:0x67311609 [Sun Nov 10 20:22:33 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:
                      Instruction
                      mov eax, 00000001h
                      ret
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      push ebp
                      inc ecx
                      push edi
                      inc ecx
                      push esi
                      inc ecx
                      push ebp
                      inc ecx
                      push esp
                      push esi
                      push edi
                      push ebx
                      dec eax
                      sub esp, 00000128h
                      dec eax
                      lea ebp, dword ptr [esp+00000080h]
                      inc sp
                      movq qword ptr [ebp+00000090h], mm7
                      inc sp
                      movq qword ptr [ebp+00000080h], mm6
                      inc sp
                      movq qword ptr [ebp+70h], mm5
                      inc sp
                      movq qword ptr [ebp+60h], mm4
                      inc sp
                      movq qword ptr [ebp+50h], mm3
                      inc sp
                      movq qword ptr [ebp+40h], mm2
                      inc sp
                      movq qword ptr [ebp+30h], mm1
                      inc sp
                      movq qword ptr [ebp+20h], mm0
                      movdqa dqword ptr [ebp+10h], xmm7
                      movdqa dqword ptr [ebp+00h], xmm6
                      mov eax, dword ptr [0002334Fh]
                      mov edx, dword ptr [0002334Dh]
                      lea ecx, dword ptr [eax-01h]
                      imul ecx, eax
                      mov eax, ecx
                      not eax
                      mov ebx, eax
                      and ebx, FFFFFFFEh
                      and ecx, 01h
                      or ecx, ebx
                      xor eax, ecx
                      test eax, ecx
                      inc ecx
                      sete al
                      setne bl
                      cmp edx, 0Ah
                      setl cl
                      cmp edx, 09h
                      setnle al
                      or al, bl
                      mov edx, eax
                      xor dl, 00000001h
                      inc esp
                      xor cl, al
                      inc esp
                      mov esi, dword ptr [00023315h]
                      inc esp
                      mov ebx, dword ptr [00023312h]
                      cmp dl, cl
                      jne 00007F38E8B100AFh
                      xor cl, 00000001h
                      or al, cl
                      xor al, 01h
                      je 00007F38E8B1019Eh
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x62200x52.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x260000x1a8.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x250000x18.pdata
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x47f70x4800c00c0f87260d6cd79c776f80f04984b3False0.6581488715277778data6.794170519589856IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x60000x2c00x400ad8b4deb0ec58a1f52f1020d1be7b956False0.23046875data4.564140817949314IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x70000x1d4980x1d6001977d27562db72bb41b8692f3a2e4e7cFalse0.8679271941489362data7.729282536350062IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .pdata0x250000x180x200eb351d287e0ffa16b2b47c1f62fa457bFalse0.0625data0.2311581448570176IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .rsrc0x260000x1a80x200082774175c3ed4a63cb8411ddc72bd3dFalse0.482421875data4.182807530451981IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_MANIFEST0x260600x143XML 1.0 document, ASCII textEnglishUnited States0.628482972136223
                      NameOrdinalAddress
                      DllRegisterServer10x180001080
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      No network behavior found

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:02:39:56
                      Start date:24/11/2024
                      Path:C:\Windows\System32\loaddll64.exe
                      Wow64 process (32bit):false
                      Commandline:loaddll64.exe "C:\Users\user\Desktop\DK3LmU4Xkl.dll"
                      Imagebase:0x7ff6039b0000
                      File size:165'888 bytes
                      MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000000.00000002.2129338789.000001D30FFC1000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000000.00000002.2129643214.00007FF8B8F77000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:true

                      Target ID:1
                      Start time:02:39:56
                      Start date:24/11/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:2
                      Start time:02:39:56
                      Start date:24/11/2024
                      Path:C:\Windows\System32\cmd.exe
                      Wow64 process (32bit):false
                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\DK3LmU4Xkl.dll",#1
                      Imagebase:0x7ff60b4e0000
                      File size:289'792 bytes
                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:3
                      Start time:02:39:56
                      Start date:24/11/2024
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:regsvr32.exe /s C:\Users\user\Desktop\DK3LmU4Xkl.dll
                      Imagebase:0x7ff788290000
                      File size:25'088 bytes
                      MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000003.00000002.2100895730.00007FF8B8F77000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000003.00000002.2100662782.0000000002311000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:true

                      Target ID:4
                      Start time:02:39:56
                      Start date:24/11/2024
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe "C:\Users\user\Desktop\DK3LmU4Xkl.dll",#1
                      Imagebase:0x7ff606c20000
                      File size:71'680 bytes
                      MD5 hash:EF3179D498793BF4234F708D3BE28633
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000004.00000002.2095917697.00007FF8B8F77000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000004.00000002.2095665695.0000020810AE1000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:true

                      Target ID:5
                      Start time:02:39:56
                      Start date:24/11/2024
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe C:\Users\user\Desktop\DK3LmU4Xkl.dll,DllRegisterServer
                      Imagebase:0x7ff606c20000
                      File size:71'680 bytes
                      MD5 hash:EF3179D498793BF4234F708D3BE28633
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000005.00000002.2101067512.00007FF8B8F77000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000005.00000002.2100844159.0000017D3F451000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:5.8%
                        Dynamic/Decrypted Code Coverage:78.9%
                        Signature Coverage:31.6%
                        Total number of Nodes:38
                        Total number of Limit Nodes:6
                        execution_graph 5404 1d30ffc20b0 MessageBoxA 5405 1d30ffc1000 5406 1d30ffc101b __scrt_get_show_window_mode 5405->5406 5407 1d30ffc103a GetVolumeNameForVolumeMountPointA 5406->5407 5408 1d30ffc1061 5407->5408 5409 1d30ffc2380 5419 1d30ffc2544 5409->5419 5411 1d30ffc2394 __scrt_get_show_window_mode __scrt_acquire_startup_lock __scrt_release_startup_lock 5411->5409 5413 1d30ffc23df 5411->5413 5414 1d30ffc20e0 GetConsoleWindow 5411->5414 5415 1d30ffc20fe CreateThread 5414->5415 5417 1d30ffc2131 __scrt_get_show_window_mode 5415->5417 5416 1d30ffc21cd GetLocaleInfoA 5418 1d30ffc2200 __std_exception_copy __scrt_get_show_window_mode 5416->5418 5417->5416 5417->5418 5418->5411 5420 1d30ffc254c 5419->5420 5421 1d30ffc2558 __scrt_dllmain_crt_thread_attach 5420->5421 5422 1d30ffc2561 5421->5422 5422->5411 5423 1d30ffc6e99 5425 1d30ffc6e9e 5423->5425 5424 1d30ffc6f52 5425->5424 5428 1d30ffc6f68 5425->5428 5429 1d30ffc6f75 5428->5429 5430 1d30ffc6f91 ExitProcess 5429->5430 5431 1d30ffca984 5433 1d30ffca994 Concurrency::details::SchedulerProxy::DeleteThis 5431->5433 5432 1d30ffca9ab Concurrency::details::SchedulerProxy::DeleteThis 5433->5432 5435 1d30ffca87c 5433->5435 5438 1d30ffca89a 5435->5438 5436 1d30ffca969 5436->5432 5437 1d30ffca908 GetFileType 5437->5438 5438->5436 5438->5437 5439 7ff8b8f71080 5442 7ff8b8f710a0 5439->5442 5444 7ff8b8f7114e 5442->5444 5443 7ff8b8f712c0 5443->5443 5444->5443 5445 7ff8b8f73652 VirtualAlloc 5444->5445 5446 7ff8b8f736ec 5445->5446 5447 7ff8b8f71089 5446->5447 5448 7ff8b8f74889 LoadLibraryA 5446->5448 5448->5446
                        Strings
                        • ZdDEUTcrHqDaPoRCMCtQfMCpqcRDvvbZViBijbEBYfpRoUhSnDipskGhWQzQcOkdDSGoSRTLOCEgdrRwxeRZjeiIziggdZmjJXYRXrmaZdyUfQYDbHXJHLfdhSaqOniYXgFGDmoEVQyhcCwqDcGnzikjsaUEFUkQTulYCOWZlrJSiUUSCaAVesAGBeGhiMTmtfUdqmQtdyHUQmkFVXLrUXohZpeFJpYdRtofwFRgTvZgfeClrOvmDGCMsQbdaBBmumBm, xrefs: 00007FF8B8F7290E
                        • j, xrefs: 00007FF8B8F717C9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2129607497.00007FF8B8F71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B8F70000, based on PE: true
                        • Associated: 00000000.00000002.2129580928.00007FF8B8F70000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2129628860.00007FF8B8F76000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2129643214.00007FF8B8F77000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2129663686.00007FF8B8F96000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ff8b8f70000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: j$ZdDEUTcrHqDaPoRCMCtQfMCpqcRDvvbZViBijbEBYfpRoUhSnDipskGhWQzQcOkdDSGoSRTLOCEgdrRwxeRZjeiIziggdZmjJXYRXrmaZdyUfQYDbHXJHLfdhSaqOniYXgFGDmoEVQyhcCwqDcGnzikjsaUEFUkQTulYCOWZlrJSiUUSCaAVesAGBeGhiMTmtfUdqmQtdyHUQmkFVXLrUXohZpeFJpYdRtofwFRgTvZgfeClrOvmDGCMsQbdaBBmumBm
                        • API String ID: 0-96800106
                        • Opcode ID: e9e195c3c8b014f90d5bc867ed007e9f1c31cd3fcc6ed35325a23fc04341cc7b
                        • Instruction ID: dea8b69de9c8b306f6b14b240fca2d4da0f4e24b18f384220675ea036cb4911e
                        • Opcode Fuzzy Hash: e9e195c3c8b014f90d5bc867ed007e9f1c31cd3fcc6ed35325a23fc04341cc7b
                        • Instruction Fuzzy Hash: 1D739F7BF24A1107FB04CB3998523FA2B92ABA63E4F15A335DE29537D5DB3DD4068204

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2129338789.000001D30FFC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001D30FFC1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1d30ffc1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: ConsoleCreateInfoLocaleThreadWindow
                        • String ID: 5
                        • API String ID: 1307802651-2226203566
                        • Opcode ID: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction ID: a1e1ae5dd12567615bc6d155de5d8ec489bc8e6e57118b0a4cfec84389909cd4
                        • Opcode Fuzzy Hash: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction Fuzzy Hash: D241B332214A448BF719EF24D9997EB77E1FBD8305F40862EF157C21E6DE388505CA82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 420 1d30ffca87c-1d30ffca898 421 1d30ffca89a-1d30ffca8c3 420->421 422 1d30ffca8cf-1d30ffca8d8 421->422 423 1d30ffca8c5-1d30ffca8ca 421->423 425 1d30ffca8f0 422->425 426 1d30ffca8da-1d30ffca8dd 422->426 424 1d30ffca95a-1d30ffca963 423->424 424->421 427 1d30ffca969-1d30ffca983 424->427 430 1d30ffca8f5-1d30ffca906 425->430 428 1d30ffca8df-1d30ffca8e7 426->428 429 1d30ffca8e9-1d30ffca8ee 426->429 428->430 429->430 432 1d30ffca908-1d30ffca913 GetFileType 430->432 433 1d30ffca935-1d30ffca94d 430->433 432->433 434 1d30ffca915-1d30ffca920 432->434 433->424 435 1d30ffca94f-1d30ffca953 433->435 436 1d30ffca922-1d30ffca927 434->436 437 1d30ffca929-1d30ffca92c 434->437 435->424 436->424 437->424 438 1d30ffca92e-1d30ffca933 437->438 438->424
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2129338789.000001D30FFC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001D30FFC1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1d30ffc1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: FileType
                        • String ID:
                        • API String ID: 3081899298-0
                        • Opcode ID: 96bd17cdbec1199f7060c8e4f9a6f8fd574a155b9e298efd3bd16726f0fb32a2
                        • Instruction ID: 15f7f069d7b40a60e09343b63c2caad344c2fb121b42510ff38be4d31b15e963
                        • Opcode Fuzzy Hash: 96bd17cdbec1199f7060c8e4f9a6f8fd574a155b9e298efd3bd16726f0fb32a2
                        • Instruction Fuzzy Hash: 9031B032508E2E9FE7A5DF2C85956A0B7D0F70D360F65074AE46AC71E4C638E9A183C6

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2129338789.000001D30FFC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001D30FFC1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1d30ffc1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: Volume$MountNamePoint
                        • String ID:
                        • API String ID: 1269602640-0
                        • Opcode ID: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction ID: 2a5b170d885a90da96480aba9e3a52478ef9beaf5a64253f88d2b4326b5c7de7
                        • Opcode Fuzzy Hash: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction Fuzzy Hash: 0F01673150C5448FFB06EB28D8987D677E1F76D305F008569E0CAC72A6DE7C8658C751

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2129338789.000001D30FFC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001D30FFC1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1d30ffc1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction ID: ee7f9604fab5c7fb0c86feca9dedc58bb051d001dddf0d0ccc3a55d76a232782
                        • Opcode Fuzzy Hash: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction Fuzzy Hash: 90D017323043081BEA287BB85A982AD27618B49305F0018397916CA6A7DD3A8849C783

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 455 1d30ffc20b0-1d30ffc20d6 MessageBoxA
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2129338789.000001D30FFC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001D30FFC1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1d30ffc1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: Message
                        • String ID:
                        • API String ID: 2030045667-0
                        • Opcode ID: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction ID: f0c8c8b179c2aaeca1855f2f357fd550bc39611e5f4a8834ea67c0cbc9ad4e3c
                        • Opcode Fuzzy Hash: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction Fuzzy Hash: 1DC0123016180847E708BB34EC595D136E4FB5C304FD089399407C5450E96D82844A82
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2129338789.000001D30FFC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001D30FFC1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1d30ffc1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: _clrfp
                        • String ID:
                        • API String ID: 3618594692-0
                        • Opcode ID: 2045596ada029767b90017b957664b0b71c7a256b325aa916a96e60a40104743
                        • Instruction ID: 9726a687ec78a057faedc703007b8b070d4ab02721044576b80c29aa7a1fe98f
                        • Opcode Fuzzy Hash: 2045596ada029767b90017b957664b0b71c7a256b325aa916a96e60a40104743
                        • Instruction Fuzzy Hash: F6C1A032510B5D8FEB98CF1CC98AB9677E1FF49304F15858AE8A9CB2A1C335D852CB51
                        Memory Dump Source
                        • Source File: 00000000.00000002.2129338789.000001D30FFC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001D30FFC1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1d30ffc1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e4f9392618ee0be8b2838eee92702fec4626de7f7bd0dc604c65336cad8c2563
                        • Instruction ID: 421a42bec5f36546fd46ce67b1cf592c2e040ce028fb7ce105a8fb7204119fc2
                        • Opcode Fuzzy Hash: e4f9392618ee0be8b2838eee92702fec4626de7f7bd0dc604c65336cad8c2563
                        • Instruction Fuzzy Hash: 2EE14072518B488FEB65EF18D8897EA77E1FB98305F00462EA49AC3161DF349645CBC3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2129338789.000001D30FFC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001D30FFC1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1d30ffc1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f301177accb7d0ce1b8505d76f0598128b48e2f6fca66abbe616489d302d7cc2
                        • Instruction ID: 00b88b217588cb4a0c40158d47b1e8a422d3a54d724fdc8389663161bb308d57
                        • Opcode Fuzzy Hash: f301177accb7d0ce1b8505d76f0598128b48e2f6fca66abbe616489d302d7cc2
                        • Instruction Fuzzy Hash: 01B15532218A594FEB69EF28DC557FA73E1FB98311F00462AE45BC3191DF349A05CB82
                        Memory Dump Source
                        • Source File: 00000000.00000002.2129338789.000001D30FFC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001D30FFC1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1d30ffc1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 004e5bc4f416d9accfca0753fc8d67adee0aa063ac23580ea370914e8b763bcf
                        • Instruction ID: 47c30349fa7e3cedaf3dafd0c097aff6c6dd6002b919222c0ee723f298744498
                        • Opcode Fuzzy Hash: 004e5bc4f416d9accfca0753fc8d67adee0aa063ac23580ea370914e8b763bcf
                        • Instruction Fuzzy Hash: C171D43261CB584FE758DF1898493BA77D1FB89711F00826EE88BC3252EF34995187C2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2129338789.000001D30FFC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001D30FFC1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1d30ffc1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 30f0a361053a8720fb197dd7f2de9fba19a6b2a280636273193b063dd5433016
                        • Instruction ID: fc3a0ae1fb0aaefbd81f8284c4b56370335e7f07b244e9203b2a0e09e236f81f
                        • Opcode Fuzzy Hash: 30f0a361053a8720fb197dd7f2de9fba19a6b2a280636273193b063dd5433016
                        • Instruction Fuzzy Hash: E851F033318E188FDB4CEE6CD4996A573D2E7AC311B15822FF40AD72A5DA70D9468BC1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 475 1d30ffc40b0-1d30ffc4117 call 1d30ffc5054 478 1d30ffc411d-1d30ffc4120 475->478 479 1d30ffc4578-1d30ffc457f call 1d30ffc7854 475->479 478->479 480 1d30ffc4126-1d30ffc412c 478->480 482 1d30ffc4132-1d30ffc4136 480->482 483 1d30ffc41fb-1d30ffc420d 480->483 482->483 487 1d30ffc413c-1d30ffc4147 482->487 485 1d30ffc44c8-1d30ffc44cc 483->485 486 1d30ffc4213-1d30ffc4217 483->486 490 1d30ffc44ce-1d30ffc44d5 485->490 491 1d30ffc4505-1d30ffc450f call 1d30ffc319c 485->491 486->485 488 1d30ffc421d-1d30ffc4228 486->488 487->483 489 1d30ffc414d-1d30ffc4152 487->489 488->485 492 1d30ffc422e-1d30ffc4235 488->492 489->483 493 1d30ffc4158-1d30ffc4162 call 1d30ffc319c 489->493 490->479 494 1d30ffc44db-1d30ffc4500 call 1d30ffc4580 490->494 491->479 501 1d30ffc4511-1d30ffc4530 call 1d30ffcfa80 491->501 497 1d30ffc423b-1d30ffc4276 call 1d30ffc385c 492->497 498 1d30ffc43f9-1d30ffc4405 492->498 493->501 509 1d30ffc4168-1d30ffc4193 call 1d30ffc319c * 2 call 1d30ffc3b64 493->509 494->491 497->498 513 1d30ffc427c-1d30ffc4286 497->513 498->491 502 1d30ffc440b-1d30ffc440f 498->502 506 1d30ffc441f-1d30ffc4427 502->506 507 1d30ffc4411-1d30ffc441d call 1d30ffc3b24 502->507 506->491 512 1d30ffc442d-1d30ffc443a call 1d30ffc36fc 506->512 507->506 519 1d30ffc4440-1d30ffc4448 507->519 543 1d30ffc41b3-1d30ffc41bd call 1d30ffc319c 509->543 544 1d30ffc4195-1d30ffc4199 509->544 512->491 512->519 517 1d30ffc428a-1d30ffc42bc 513->517 521 1d30ffc42c2-1d30ffc42ce 517->521 522 1d30ffc43e8-1d30ffc43ef 517->522 526 1d30ffc455b-1d30ffc4577 call 1d30ffc319c * 2 call 1d30ffc77c8 519->526 527 1d30ffc444e-1d30ffc4452 519->527 521->522 528 1d30ffc42d4-1d30ffc42ed 521->528 522->517 525 1d30ffc43f5-1d30ffc43f6 522->525 525->498 526->479 532 1d30ffc4454-1d30ffc4463 call 1d30ffc3b24 527->532 533 1d30ffc4465-1d30ffc4466 527->533 529 1d30ffc42f3-1d30ffc4338 call 1d30ffc3b38 * 2 528->529 530 1d30ffc43e5-1d30ffc43e6 528->530 557 1d30ffc433a-1d30ffc4360 call 1d30ffc3b38 call 1d30ffc47f0 529->557 558 1d30ffc4376-1d30ffc437c 529->558 530->522 538 1d30ffc4468-1d30ffc4472 call 1d30ffc50ec 532->538 533->538 538->491 554 1d30ffc4478-1d30ffc44c6 call 1d30ffc378c call 1d30ffc3990 538->554 543->483 560 1d30ffc41bf-1d30ffc41df call 1d30ffc319c * 2 call 1d30ffc50ec 543->560 544->543 548 1d30ffc419b-1d30ffc41a6 544->548 548->543 553 1d30ffc41a8-1d30ffc41ad 548->553 553->479 553->543 554->491 574 1d30ffc4362-1d30ffc4374 557->574 575 1d30ffc4387-1d30ffc43db call 1d30ffc3fdc 557->575 564 1d30ffc43e0-1d30ffc43e1 558->564 565 1d30ffc437e-1d30ffc4382 558->565 579 1d30ffc41e1-1d30ffc41eb call 1d30ffc51dc 560->579 580 1d30ffc41f6-1d30ffc41f7 560->580 564->530 565->529 574->557 574->558 575->564 583 1d30ffc41f1-1d30ffc4554 call 1d30ffc2f74 call 1d30ffc4bac call 1d30ffc53d8 579->583 584 1d30ffc4555-1d30ffc455a call 1d30ffc77c8 579->584 580->483 583->584 584->526
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2129338789.000001D30FFC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001D30FFC1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1d30ffc1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                        • String ID: csm$csm$csm
                        • API String ID: 849930591-393685449
                        • Opcode ID: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction ID: da248045f46985bceaba394a2791b33140d52f959df08c5157554afa7291bb75
                        • Opcode Fuzzy Hash: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction Fuzzy Hash: 07F1AF32918B188FEB54EF6885957E977E0FB98310F50061EE499C3296DB30DA81CBC2

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 594 1d30ffc4930-1d30ffc4978 call 1d30ffc3144 call 1d30ffc319c 599 1d30ffc49b2-1d30ffc49b6 594->599 600 1d30ffc497a-1d30ffc4980 594->600 601 1d30ffc49bc-1d30ffc49c0 599->601 602 1d30ffc4a4a-1d30ffc4a4e 599->602 600->599 603 1d30ffc4982-1d30ffc4984 600->603 606 1d30ffc4b41 601->606 607 1d30ffc49c6-1d30ffc49ce 601->607 608 1d30ffc4a50-1d30ffc4a5c 602->608 609 1d30ffc4a92-1d30ffc4a98 602->609 604 1d30ffc4996-1d30ffc4998 603->604 605 1d30ffc4986-1d30ffc498a 603->605 604->599 611 1d30ffc499a-1d30ffc49a6 604->611 610 1d30ffc498c-1d30ffc4994 605->610 605->611 617 1d30ffc4b46-1d30ffc4b60 606->617 607->606 614 1d30ffc49d4-1d30ffc49d8 607->614 615 1d30ffc4a72-1d30ffc4a7e 608->615 616 1d30ffc4a5e-1d30ffc4a62 608->616 612 1d30ffc4b08-1d30ffc4b3c call 1d30ffc40b0 609->612 613 1d30ffc4a9a-1d30ffc4a9e 609->613 610->599 610->604 611->599 620 1d30ffc49a8-1d30ffc49ac 611->620 612->606 613->612 619 1d30ffc4aa0-1d30ffc4aa7 613->619 621 1d30ffc4a37-1d30ffc4a45 call 1d30ffc3728 614->621 622 1d30ffc49da-1d30ffc49dc 614->622 615->606 618 1d30ffc4a84-1d30ffc4a8c 615->618 616->615 624 1d30ffc4a64-1d30ffc4a70 call 1d30ffc3b24 616->624 618->606 618->609 619->612 625 1d30ffc4aa9-1d30ffc4ab1 619->625 620->599 620->606 621->606 627 1d30ffc49de-1d30ffc49f0 call 1d30ffc3cb4 622->627 628 1d30ffc4a15-1d30ffc4a17 622->628 624->609 624->615 625->612 631 1d30ffc4ab3-1d30ffc4ac6 call 1d30ffc3b38 625->631 635 1d30ffc4b61-1d30ffc4b67 call 1d30ffc7854 627->635 642 1d30ffc49f6-1d30ffc49f9 627->642 628->621 630 1d30ffc4a19-1d30ffc4a21 628->630 630->635 636 1d30ffc4a27-1d30ffc4a2b 630->636 631->612 645 1d30ffc4ac8-1d30ffc4b06 631->645 636->635 640 1d30ffc4a31-1d30ffc4a35 636->640 644 1d30ffc4a05-1d30ffc4a10 call 1d30ffc4ec8 640->644 642->635 646 1d30ffc49ff-1d30ffc4a03 642->646 644->606 645->617 646->644
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2129338789.000001D30FFC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001D30FFC1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1d30ffc1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                        • String ID: csm$csm
                        • API String ID: 3896166516-3733052814
                        • Opcode ID: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction ID: 9656f00a71c2d32be37a3d22d00e3e43fe1fa3db1e54b1034bbf47333756e3c0
                        • Opcode Fuzzy Hash: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction Fuzzy Hash: 8B718233514A298FEBA8DF1881993A4B3D1FB5C311F64555BA4A9C76A2CB30DA80C7C7

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2129338789.000001D30FFC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001D30FFC1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1d30ffc1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: CallTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3163161869-2084237596
                        • Opcode ID: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction ID: f5eacc3f1284c3e502a5136a25ec4e4bfd2cd9fc782f07c7b5d7495420b05228
                        • Opcode Fuzzy Hash: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction Fuzzy Hash: 32718F32518B588FE764EF18C546BEAB7E0FB9D300F044A5EE499C3252D774A681CB83

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 650 1d30ffc2cf0-1d30ffc2d36 call 1d30ffc3144 653 1d30ffc2d3c-1d30ffc2d46 650->653 654 1d30ffc2e2d-1d30ffc2e34 650->654 655 1d30ffc2e19-1d30ffc2e1b 653->655 656 1d30ffc2ed8-1d30ffc2ede 654->656 659 1d30ffc2e21 655->659 660 1d30ffc2d4b-1d30ffc2d59 655->660 657 1d30ffc2e39-1d30ffc2e47 656->657 658 1d30ffc2ee4 656->658 664 1d30ffc2e4d-1d30ffc2e55 657->664 665 1d30ffc2ed6 657->665 661 1d30ffc2ee9-1d30ffc2f06 658->661 659->658 662 1d30ffc2d5f-1d30ffc2d66 660->662 663 1d30ffc2e17 660->663 662->663 667 1d30ffc2d6c-1d30ffc2d71 662->667 663->655 664->665 666 1d30ffc2e57-1d30ffc2e5b 664->666 665->656 668 1d30ffc2e9c-1d30ffc2ead 666->668 669 1d30ffc2e5d-1d30ffc2e62 666->669 667->663 670 1d30ffc2d77-1d30ffc2d7c 667->670 675 1d30ffc2ebf-1d30ffc2ed3 668->675 676 1d30ffc2eaf-1d30ffc2eb5 668->676 671 1d30ffc2e98-1d30ffc2e9a 669->671 672 1d30ffc2e64-1d30ffc2e70 669->672 673 1d30ffc2d7e-1d30ffc2d91 670->673 674 1d30ffc2d99-1d30ffc2d9f 670->674 671->658 671->668 677 1d30ffc2e91-1d30ffc2e96 672->677 678 1d30ffc2e72-1d30ffc2e79 672->678 689 1d30ffc2d97 673->689 690 1d30ffc2e26-1d30ffc2e28 673->690 680 1d30ffc2da1-1d30ffc2da9 674->680 681 1d30ffc2dc9-1d30ffc2e12 call 1d30ffc3110 call 1d30ffc3140 674->681 675->665 676->665 679 1d30ffc2eb7-1d30ffc2ebb 676->679 677->671 677->672 678->677 682 1d30ffc2e7b-1d30ffc2e84 678->682 679->658 685 1d30ffc2ebd 679->685 680->681 686 1d30ffc2dab-1d30ffc2db9 call 1d30ffcf940 680->686 681->663 682->677 687 1d30ffc2e86-1d30ffc2e8f 682->687 685->665 686->681 693 1d30ffc2dbb-1d30ffc2dc1 686->693 687->671 687->677 689->663 689->674 690->661 693->681
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2129338789.000001D30FFC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001D30FFC1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1d30ffc1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: CurrentImageNonwritable__except_validate_context_record
                        • String ID: csm
                        • API String ID: 3242871069-1018135373
                        • Opcode ID: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction ID: 122fcbd7fe2b08559be5953b17a7a182b03b311a78cfb8ec463fab7099d454bf
                        • Opcode Fuzzy Hash: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction Fuzzy Hash: 4F71D333208A288BEF28EE1CD5857B473D1FB58350F10456FF896D3296EB20ED5186C2

                        Execution Graph

                        Execution Coverage:1.5%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:23
                        Total number of Limit Nodes:2
                        execution_graph 4989 2311000 4990 231101b __scrt_get_show_window_mode 4989->4990 4991 231103a GetVolumeNameForVolumeMountPointA 4990->4991 4992 2311061 4991->4992 4993 2312380 5004 2312544 4993->5004 4995 2312394 __scrt_get_show_window_mode __scrt_acquire_startup_lock __scrt_release_startup_lock 4995->4993 4997 23123df 4995->4997 4998 23120e0 4995->4998 4999 23120f3 CreateThread 4998->4999 5002 2312131 __scrt_get_show_window_mode 4999->5002 5008 23120b0 MessageBoxA 4999->5008 5001 23121cd GetLocaleInfoA 5003 2312200 __std_exception_destroy __scrt_get_show_window_mode 5001->5003 5002->5001 5002->5003 5003->4995 5005 231254c 5004->5005 5006 2312558 __scrt_dllmain_crt_thread_attach 5005->5006 5007 2312561 5006->5007 5007->4995 5009 2316e99 5011 2316e9e 5009->5011 5010 2316f52 5011->5010 5014 2316f68 5011->5014 5015 2316f75 5014->5015 5016 2316f91 ExitProcess 5015->5016

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2100662782.0000000002311000.00000040.00001000.00020000.00000000.sdmp, Offset: 02311000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2311000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CreateInfoLocaleThread
                        • String ID: 5
                        • API String ID: 899703944-2226203566
                        • Opcode ID: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction ID: af2d445ac42481d8b8a9f94f258ccec68b0c7a7079aa1119e42e7954a7a9010f
                        • Opcode Fuzzy Hash: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction Fuzzy Hash: 8041A331214A488BE72DEF64DC986EB77E2FBD4305F44853DE58BC21A4DF38944ACA42

                        Control-flow Graph

                        APIs
                        • GetVolumeNameForVolumeMountPointA.KERNEL32 ref: 0231104B
                        Memory Dump Source
                        • Source File: 00000003.00000002.2100662782.0000000002311000.00000040.00001000.00020000.00000000.sdmp, Offset: 02311000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2311000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Volume$MountNamePoint
                        • String ID:
                        • API String ID: 1269602640-0
                        • Opcode ID: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction ID: 53e67f46a25f38678dd13078ab743a336a9114571b0b271dccea06c76fa86a6c
                        • Opcode Fuzzy Hash: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction Fuzzy Hash: 79018B3050C6448FFB06EB68DC987D677E1F769305F008569E0CAC72A5DEBC8558CB41

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 47 2316f68-2316f77 call 2316f9c 50 2316f79-2316f82 47->50 51 2316f8a-2316f9b call 2316fc0 ExitProcess 47->51 50->51
                        APIs
                        • ExitProcess.KERNEL32(?,?,?,?,?,?,?,02316F64), ref: 02316F93
                        Memory Dump Source
                        • Source File: 00000003.00000002.2100662782.0000000002311000.00000040.00001000.00020000.00000000.sdmp, Offset: 02311000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2311000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction ID: b1719d9553d5769ff6e0b6c6e61de1b7683eea0a1bd72ad8b2822ea64b5e05bd
                        • Opcode Fuzzy Hash: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction Fuzzy Hash: E8D0C7343007095FEB2C7BF9599D23D266ADB45205F001C3C6903CB6A6CE3AD849CF42

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 55 23120b0-23120d6 MessageBoxA
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.2100662782.0000000002311000.00000040.00001000.00020000.00000000.sdmp, Offset: 02311000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2311000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Message
                        • String ID:
                        • API String ID: 2030045667-0
                        • Opcode ID: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction ID: f0c8c8b179c2aaeca1855f2f357fd550bc39611e5f4a8834ea67c0cbc9ad4e3c
                        • Opcode Fuzzy Hash: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction Fuzzy Hash: 1DC0123016180847E708BB34EC595D136E4FB5C304FD089399407C5450E96D82844A82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 72 23140b0-2314117 call 2315054 75 2314578-231457f call 2317854 72->75 76 231411d-2314120 72->76 76->75 77 2314126-231412c 76->77 79 2314132-2314136 77->79 80 23141fb-231420d 77->80 79->80 84 231413c-2314147 79->84 82 2314213-2314217 80->82 83 23144c8-23144cc 80->83 82->83 85 231421d-2314228 82->85 87 2314505-231450f call 231319c 83->87 88 23144ce-23144d5 83->88 84->80 86 231414d-2314152 84->86 85->83 89 231422e-2314235 85->89 86->80 90 2314158-2314162 call 231319c 86->90 87->75 101 2314511-2314530 call 231fa80 87->101 88->75 91 23144db-2314500 call 2314580 88->91 93 23143f9-2314405 89->93 94 231423b-2314276 call 231385c 89->94 90->101 105 2314168-2314193 call 231319c * 2 call 2313b64 90->105 91->87 93->87 98 231440b-231440f 93->98 94->93 110 231427c-2314286 94->110 102 2314411-231441d call 2313b24 98->102 103 231441f-2314427 98->103 102->103 116 2314440-2314448 102->116 103->87 109 231442d-231443a call 23136fc 103->109 138 23141b3-23141bd call 231319c 105->138 139 2314195-2314199 105->139 109->87 109->116 114 231428a-23142bc 110->114 118 23142c2-23142ce 114->118 119 23143e8-23143ef 114->119 121 231455b-2314577 call 231319c * 2 call 23177c8 116->121 122 231444e-2314452 116->122 118->119 123 23142d4-23142ed 118->123 119->114 125 23143f5-23143f6 119->125 121->75 126 2314465-2314466 122->126 127 2314454-2314463 call 2313b24 122->127 129 23142f3-2314338 call 2313b38 * 2 123->129 130 23143e5-23143e6 123->130 125->93 135 2314468-2314472 call 23150ec 126->135 127->135 154 2314376-231437c 129->154 155 231433a-2314360 call 2313b38 call 23147f0 129->155 130->119 135->87 150 2314478-23144c6 call 231378c call 2313990 135->150 138->80 157 23141bf-23141df call 231319c * 2 call 23150ec 138->157 139->138 145 231419b-23141a6 139->145 145->138 151 23141a8-23141ad 145->151 150->87 151->75 151->138 161 23143e0-23143e1 154->161 162 231437e-2314382 154->162 171 2314362-2314374 155->171 172 2314387-23143db call 2313fdc 155->172 176 23141e1-23141eb call 23151dc 157->176 177 23141f6-23141f7 157->177 161->130 162->129 171->154 171->155 172->161 180 23141f1-2314554 call 2312f74 call 2314bac call 23153d8 176->180 181 2314555-231455a call 23177c8 176->181 177->80 180->181 181->121
                        APIs
                        • __FrameHandler3::GetHandlerSearchState.LIBVCRUNTIME ref: 0231410C
                          • Part of subcall function 02315054: __GetUnwindTryBlock.LIBCMT ref: 02315097
                          • Part of subcall function 02315054: __SetUnwindTryBlock.LIBVCRUNTIME ref: 023150BC
                        • Is_bad_exception_allowed.LIBVCRUNTIME ref: 023141E4
                        • __FrameHandler3::ExecutionInCatch.LIBVCRUNTIME ref: 02314433
                        • std::bad_alloc::bad_alloc.LIBCMT ref: 0231453F
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2100662782.0000000002311000.00000040.00001000.00020000.00000000.sdmp, Offset: 02311000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2311000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                        • String ID: csm$csm$csm
                        • API String ID: 849930591-393685449
                        • Opcode ID: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction ID: fc1e2fac293b437012a88f9be95e7777787d9a91408c93b44c9087ca6826ff01
                        • Opcode Fuzzy Hash: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction Fuzzy Hash: 7EE1B230918B488FDB28EF68C485BADB7E1FF99314F54465ED589D7215DB30E882CB82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 191 2314930-2314978 call 2313144 call 231319c 196 23149b2-23149b6 191->196 197 231497a-2314980 191->197 198 2314a4a-2314a4e 196->198 199 23149bc-23149c0 196->199 197->196 200 2314982-2314984 197->200 203 2314a50-2314a5c 198->203 204 2314a92-2314a98 198->204 201 2314b41 199->201 202 23149c6-23149ce 199->202 205 2314996-2314998 200->205 206 2314986-231498a 200->206 210 2314b46-2314b60 201->210 202->201 207 23149d4-23149d8 202->207 208 2314a72-2314a7e 203->208 209 2314a5e-2314a62 203->209 213 2314b08-2314b3c call 23140b0 204->213 214 2314a9a-2314a9e 204->214 205->196 211 231499a-23149a6 205->211 206->211 212 231498c-2314994 206->212 215 2314a37-2314a45 call 2313728 207->215 216 23149da-23149dc 207->216 208->201 219 2314a84-2314a8c 208->219 209->208 217 2314a64-2314a70 call 2313b24 209->217 211->196 221 23149a8-23149ac 211->221 212->196 212->205 213->201 214->213 220 2314aa0-2314aa7 214->220 215->201 223 2314a15-2314a17 216->223 224 23149de-23149f0 call 2313cb4 216->224 217->204 217->208 219->201 219->204 220->213 226 2314aa9-2314ab1 220->226 221->196 221->201 223->215 230 2314a19-2314a21 223->230 234 2314b61-2314b67 call 2317854 224->234 237 23149f6-23149f9 224->237 226->213 231 2314ab3-2314ac6 call 2313b38 226->231 230->234 235 2314a27-2314a2b 230->235 231->213 241 2314ac8-2314b06 231->241 235->234 239 2314a31-2314a35 235->239 237->234 242 23149ff-2314a03 237->242 240 2314a05-2314a10 call 2314ec8 239->240 240->201 241->210 242->240
                        APIs
                        • __except_validate_context_record.LIBVCRUNTIME ref: 02314958
                        • __FrameHandler3::FrameUnwindToEmptyState.LIBVCRUNTIME ref: 02314A40
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2100662782.0000000002311000.00000040.00001000.00020000.00000000.sdmp, Offset: 02311000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2311000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                        • String ID: csm$csm
                        • API String ID: 3896166516-3733052814
                        • Opcode ID: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction ID: 0f50a0ea9d4764e6ba7d9e8f5a6d44cc31025871e675cc69778591431e434408
                        • Opcode Fuzzy Hash: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction Fuzzy Hash: 88619034618B098FCB7CDF288089725B7E1FB98315F58865ED68DC7695DB34D880CB86

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 247 2312cf0-2312d36 call 2313144 250 2312e2d-2312e34 247->250 251 2312d3c-2312d46 247->251 253 2312ed8-2312ede 250->253 252 2312e19-2312e1b 251->252 254 2312e21 252->254 255 2312d4b-2312d59 252->255 256 2312ee4 253->256 257 2312e39-2312e47 253->257 254->256 258 2312e17 255->258 259 2312d5f-2312d66 255->259 262 2312ee9-2312f06 256->262 260 2312ed6 257->260 261 2312e4d-2312e55 257->261 258->252 259->258 263 2312d6c-2312d71 259->263 260->253 261->260 264 2312e57-2312e5b 261->264 263->258 265 2312d77-2312d7c 263->265 266 2312e5d-2312e62 264->266 267 2312e9c-2312ead 264->267 268 2312d99-2312d9f 265->268 269 2312d7e-2312d91 265->269 272 2312e64-2312e70 266->272 273 2312e98-2312e9a 266->273 270 2312ebf-2312ed3 267->270 271 2312eaf-2312eb5 267->271 275 2312da1-2312da9 268->275 276 2312dc9-2312e12 call 2313110 call 2313140 268->276 286 2312d97 269->286 287 2312e26-2312e28 269->287 270->260 271->260 274 2312eb7-2312ebb 271->274 277 2312e91-2312e96 272->277 278 2312e72-2312e79 272->278 273->256 273->267 274->256 282 2312ebd 274->282 275->276 283 2312dab-2312db9 call 231f940 275->283 276->258 277->272 277->273 278->277 280 2312e7b-2312e84 278->280 280->277 285 2312e86-2312e8f 280->285 282->260 283->276 291 2312dbb-2312dc1 283->291 285->273 285->277 286->258 286->268 287->262 291->276
                        APIs
                        • __except_validate_context_record.LIBVCRUNTIME ref: 02312D1B
                        • _IsNonwritableInCurrentImage.LIBCMT ref: 02312DB2
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2100662782.0000000002311000.00000040.00001000.00020000.00000000.sdmp, Offset: 02311000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2311000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CurrentImageNonwritable__except_validate_context_record
                        • String ID: csm
                        • API String ID: 3242871069-1018135373
                        • Opcode ID: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction ID: 117826fcb26647dfeea8f29c328cea7a353034c430f3ff44008cf20aadbf68d4
                        • Opcode Fuzzy Hash: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction Fuzzy Hash: DE61D330218A288BCF2CEE5CD885A7673D1FB54754F10456EEC8AC3256EB34E8A1CB95

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 293 2314580-23145b3 294 23145b9-23145db call 231319c 293->294 295 23147cc-23147e6 293->295 298 2314638-231464a 294->298 299 23145dd-23145f1 call 231319c 294->299 300 2314650-2314694 call 231385c 298->300 301 23147e7-23147ef call 2317854 298->301 299->298 311 23145f3-23145f9 299->311 300->295 308 231469a-23146a5 300->308 310 23146ac-23146e7 308->310 312 23147ab-23147c6 310->312 313 23146ed-23146f9 310->313 311->298 314 23145fb-2314601 311->314 312->295 312->310 313->312 315 23146ff-2314724 313->315 314->298 316 2314603-2314632 call 2313644 314->316 317 2314757-231475a 315->317 318 2314726-2314732 call 2313b24 315->318 316->295 316->298 317->312 321 231475c-23147a6 call 2313fdc 317->321 325 2314734-2314737 318->325 326 231474f-2314750 318->326 321->312 327 2314747 325->327 328 2314739-2314745 call 2313b24 325->328 326->317 329 2314749-231474d 327->329 328->329 329->312 329->326
                        APIs
                        • _CallSETranslator.LIBVCRUNTIME ref: 0231462B
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2100662782.0000000002311000.00000040.00001000.00020000.00000000.sdmp, Offset: 02311000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2311000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CallTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3163161869-2084237596
                        • Opcode ID: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction ID: e2d01bd4d96cf7b9004a95ed86fa05f366d38714f627031f736a4038092c2466
                        • Opcode Fuzzy Hash: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction Fuzzy Hash: 8A717F30518B488FDB68EF18D446BAAB7E0FF99314F144A5EE59DC3211DB74E581CB82

                        Execution Graph

                        Execution Coverage:1.9%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:30
                        Total number of Limit Nodes:4

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.2095665695.0000020810AE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020810AE1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_20810ae1000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CreateInfoLocaleThread
                        • String ID: 5
                        • API String ID: 899703944-2226203566
                        • Opcode ID: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction ID: 8765e32b16ae20e14d1cf3ff18980e24a348931e4f8cd85969abc26e471a89d7
                        • Opcode Fuzzy Hash: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction Fuzzy Hash: D94190302147548BE719EB24DC9DBEFB7E2FFD4305F40852DE18BD21A6DE7894068A42

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000004.00000002.2095665695.0000020810AE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020810AE1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_20810ae1000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: FileType
                        • String ID:
                        • API String ID: 3081899298-0
                        • Opcode ID: 96bd17cdbec1199f7060c8e4f9a6f8fd574a155b9e298efd3bd16726f0fb32a2
                        • Instruction ID: 4aa94aef12c0360b6ba08e4b24f386081ec3e7d57a42e01f9cbf1b6ce574add7
                        • Opcode Fuzzy Hash: 96bd17cdbec1199f7060c8e4f9a6f8fd574a155b9e298efd3bd16726f0fb32a2
                        • Instruction Fuzzy Hash: B631E930408F2A4FD7A5DF2C8898B65B6D0FF19360F650749E49ED71E2CA70E892C781

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000004.00000002.2095665695.0000020810AE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020810AE1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_20810ae1000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Volume$MountNamePoint
                        • String ID:
                        • API String ID: 1269602640-0
                        • Opcode ID: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction ID: 5e9163ab15e82a6a243047bee7b1ce78a367e5f697938d6056eb15e8c2b8846f
                        • Opcode Fuzzy Hash: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction Fuzzy Hash: 760167305086448FFB06EB28DC98BD677E1FB69305F008569E0CAD72A6DEBC8558C741

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000004.00000002.2095665695.0000020810AE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020810AE1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_20810ae1000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction ID: 45132b564f13ad167317d745661d317d0e3778bc97bbc6f88880d379b130cb5f
                        • Opcode Fuzzy Hash: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction Fuzzy Hash: C7D017303003080BEA187BB86D8C62E36618F49345F001C38A947DA6A7CD7A884A8B02

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 74 20810ae20b0-20810ae20d6 MessageBoxA
                        APIs
                        Memory Dump Source
                        • Source File: 00000004.00000002.2095665695.0000020810AE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020810AE1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_20810ae1000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Message
                        • String ID:
                        • API String ID: 2030045667-0
                        • Opcode ID: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction ID: f0c8c8b179c2aaeca1855f2f357fd550bc39611e5f4a8834ea67c0cbc9ad4e3c
                        • Opcode Fuzzy Hash: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction Fuzzy Hash: 1DC0123016180847E708BB34EC595D136E4FB5C304FD089399407C5450E96D82844A82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 91 20810ae40b0-20810ae4117 call 20810ae5054 94 20810ae411d-20810ae4120 91->94 95 20810ae4578-20810ae457f call 20810ae7854 91->95 94->95 96 20810ae4126-20810ae412c 94->96 98 20810ae4132-20810ae4136 96->98 99 20810ae41fb-20810ae420d 96->99 98->99 103 20810ae413c-20810ae4147 98->103 101 20810ae4213-20810ae4217 99->101 102 20810ae44c8-20810ae44cc 99->102 101->102 107 20810ae421d-20810ae4228 101->107 105 20810ae4505-20810ae450f call 20810ae319c 102->105 106 20810ae44ce-20810ae44d5 102->106 103->99 104 20810ae414d-20810ae4152 103->104 104->99 109 20810ae4158-20810ae4162 call 20810ae319c 104->109 105->95 119 20810ae4511-20810ae4530 call 20810aefa80 105->119 106->95 110 20810ae44db-20810ae4500 call 20810ae4580 106->110 107->102 108 20810ae422e-20810ae4235 107->108 112 20810ae423b-20810ae4276 call 20810ae385c 108->112 113 20810ae43f9-20810ae4405 108->113 109->119 122 20810ae4168-20810ae4193 call 20810ae319c * 2 call 20810ae3b64 109->122 110->105 112->113 127 20810ae427c-20810ae4286 112->127 113->105 120 20810ae440b-20810ae440f 113->120 124 20810ae4411-20810ae441d call 20810ae3b24 120->124 125 20810ae441f-20810ae4427 120->125 160 20810ae4195-20810ae4199 122->160 161 20810ae41b3-20810ae41bd call 20810ae319c 122->161 124->125 135 20810ae4440-20810ae4448 124->135 125->105 126 20810ae442d-20810ae443a call 20810ae36fc 125->126 126->105 126->135 132 20810ae428a-20810ae42bc 127->132 137 20810ae42c2-20810ae42ce 132->137 138 20810ae43e8-20810ae43ef 132->138 140 20810ae444e-20810ae4452 135->140 141 20810ae455b-20810ae4577 call 20810ae319c * 2 call 20810ae77c8 135->141 137->138 142 20810ae42d4-20810ae42ed 137->142 138->132 144 20810ae43f5-20810ae43f6 138->144 145 20810ae4454-20810ae4463 call 20810ae3b24 140->145 146 20810ae4465-20810ae4466 140->146 141->95 148 20810ae43e5-20810ae43e6 142->148 149 20810ae42f3-20810ae4338 call 20810ae3b38 * 2 142->149 144->113 154 20810ae4468-20810ae4472 call 20810ae50ec 145->154 146->154 148->138 174 20810ae4376-20810ae437c 149->174 175 20810ae433a-20810ae4360 call 20810ae3b38 call 20810ae47f0 149->175 154->105 170 20810ae4478-20810ae44c6 call 20810ae378c call 20810ae3990 154->170 160->161 165 20810ae419b-20810ae41a6 160->165 161->99 172 20810ae41bf-20810ae41df call 20810ae319c * 2 call 20810ae50ec 161->172 165->161 171 20810ae41a8-20810ae41ad 165->171 170->105 171->95 171->161 195 20810ae41f6-20810ae41f7 172->195 196 20810ae41e1-20810ae41eb call 20810ae51dc 172->196 178 20810ae43e0-20810ae43e1 174->178 179 20810ae437e-20810ae4382 174->179 190 20810ae4387-20810ae43db call 20810ae3fdc 175->190 191 20810ae4362-20810ae4374 175->191 178->148 179->149 190->178 191->174 191->175 195->99 199 20810ae4555-20810ae455a call 20810ae77c8 196->199 200 20810ae41f1-20810ae4554 call 20810ae2f74 call 20810ae4bac call 20810ae53d8 196->200 199->141 200->199
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.2095665695.0000020810AE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020810AE1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_20810ae1000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                        • String ID: csm$csm$csm
                        • API String ID: 849930591-393685449
                        • Opcode ID: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction ID: 3d94d6f339ab5c8742bd8fc3c4449d0b86f79c4f5422af6e510c4ab6d3ee2796
                        • Opcode Fuzzy Hash: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction Fuzzy Hash: ADF15130514B588BEB54EF688849BAEB7E4FF59310F50465DE48DD7293DF70D8828B81

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 210 20810ae4930-20810ae4978 call 20810ae3144 call 20810ae319c 215 20810ae49b2-20810ae49b6 210->215 216 20810ae497a-20810ae4980 210->216 218 20810ae49bc-20810ae49c0 215->218 219 20810ae4a4a-20810ae4a4e 215->219 216->215 217 20810ae4982-20810ae4984 216->217 220 20810ae4996-20810ae4998 217->220 221 20810ae4986-20810ae498a 217->221 222 20810ae49c6-20810ae49ce 218->222 223 20810ae4b41 218->223 224 20810ae4a92-20810ae4a98 219->224 225 20810ae4a50-20810ae4a5c 219->225 220->215 230 20810ae499a-20810ae49a6 220->230 229 20810ae498c-20810ae4994 221->229 221->230 222->223 233 20810ae49d4-20810ae49d8 222->233 228 20810ae4b46-20810ae4b60 223->228 231 20810ae4a9a-20810ae4a9e 224->231 232 20810ae4b08-20810ae4b3c call 20810ae40b0 224->232 226 20810ae4a72-20810ae4a7e 225->226 227 20810ae4a5e-20810ae4a62 225->227 226->223 236 20810ae4a84-20810ae4a8c 226->236 227->226 234 20810ae4a64-20810ae4a70 call 20810ae3b24 227->234 229->215 229->220 230->215 238 20810ae49a8-20810ae49ac 230->238 231->232 237 20810ae4aa0-20810ae4aa7 231->237 232->223 239 20810ae4a37-20810ae4a45 call 20810ae3728 233->239 240 20810ae49da-20810ae49dc 233->240 234->224 234->226 236->223 236->224 237->232 242 20810ae4aa9-20810ae4ab1 237->242 238->215 238->223 239->223 244 20810ae4a15-20810ae4a17 240->244 245 20810ae49de-20810ae49f0 call 20810ae3cb4 240->245 242->232 249 20810ae4ab3-20810ae4ac6 call 20810ae3b38 242->249 244->239 248 20810ae4a19-20810ae4a21 244->248 253 20810ae4b61-20810ae4b67 call 20810ae7854 245->253 255 20810ae49f6-20810ae49f9 245->255 252 20810ae4a27-20810ae4a2b 248->252 248->253 249->232 262 20810ae4ac8-20810ae4b06 249->262 252->253 257 20810ae4a31-20810ae4a35 252->257 255->253 259 20810ae49ff-20810ae4a03 255->259 261 20810ae4a05-20810ae4a10 call 20810ae4ec8 257->261 259->261 261->223 262->228
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.2095665695.0000020810AE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020810AE1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_20810ae1000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                        • String ID: csm$csm
                        • API String ID: 3896166516-3733052814
                        • Opcode ID: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction ID: 279b0b55276671392a805de4b673a2e3ccccd4b1e63d7511be05656615ea83d8
                        • Opcode Fuzzy Hash: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction Fuzzy Hash: AB719E30504B188BEBA89B18888DB6AF7D5FF54311F14465AD4CDE7693DFB0D882CB46

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.2095665695.0000020810AE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020810AE1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_20810ae1000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CallTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3163161869-2084237596
                        • Opcode ID: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction ID: 91d59bc741bd356b400070e7124c9d42315d77d00372012196a127bb61c1f9ef
                        • Opcode Fuzzy Hash: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction Fuzzy Hash: 6A715030518B588FE7649F18D84ABAAB7E0FF99310F144A5DE4CDD3152DFB4A582CB82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 266 20810ae2cf0-20810ae2d36 call 20810ae3144 269 20810ae2d3c-20810ae2d46 266->269 270 20810ae2e2d-20810ae2e34 266->270 272 20810ae2e19-20810ae2e1b 269->272 271 20810ae2ed8-20810ae2ede 270->271 275 20810ae2ee4 271->275 276 20810ae2e39-20810ae2e47 271->276 273 20810ae2e21 272->273 274 20810ae2d4b-20810ae2d59 272->274 273->275 280 20810ae2e17 274->280 281 20810ae2d5f-20810ae2d66 274->281 279 20810ae2ee9-20810ae2f06 275->279 277 20810ae2ed6 276->277 278 20810ae2e4d-20810ae2e55 276->278 277->271 278->277 283 20810ae2e57-20810ae2e5b 278->283 280->272 281->280 282 20810ae2d6c-20810ae2d71 281->282 282->280 284 20810ae2d77-20810ae2d7c 282->284 285 20810ae2e9c-20810ae2ead 283->285 286 20810ae2e5d-20810ae2e62 283->286 287 20810ae2d7e-20810ae2d91 284->287 288 20810ae2d99-20810ae2d9f 284->288 289 20810ae2ebf-20810ae2ed3 285->289 290 20810ae2eaf-20810ae2eb5 285->290 291 20810ae2e64-20810ae2e70 286->291 292 20810ae2e98-20810ae2e9a 286->292 303 20810ae2e26-20810ae2e28 287->303 304 20810ae2d97 287->304 294 20810ae2da1-20810ae2da9 288->294 295 20810ae2dc9-20810ae2e12 call 20810ae3110 call 20810ae3140 288->295 289->277 290->277 293 20810ae2eb7-20810ae2ebb 290->293 296 20810ae2e72-20810ae2e79 291->296 297 20810ae2e91-20810ae2e96 291->297 292->275 292->285 293->275 299 20810ae2ebd 293->299 294->295 300 20810ae2dab-20810ae2db9 call 20810aef940 294->300 295->280 296->297 302 20810ae2e7b-20810ae2e84 296->302 297->291 297->292 299->277 300->295 310 20810ae2dbb-20810ae2dc1 300->310 302->297 307 20810ae2e86-20810ae2e8f 302->307 303->279 304->280 304->288 307->292 307->297 310->295
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.2095665695.0000020810AE1000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020810AE1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_20810ae1000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CurrentImageNonwritable__except_validate_context_record
                        • String ID: csm
                        • API String ID: 3242871069-1018135373
                        • Opcode ID: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction ID: 4208958e53f50c021fd15f676ecb6e1309bbf337e9ff6318336b369619333881
                        • Opcode Fuzzy Hash: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction Fuzzy Hash: A2717530208B248FDB68EA5CD889B79B7D1FF54350F10456DE8CAD3197EE64EC528B85

                        Execution Graph

                        Execution Coverage:1.5%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:23
                        Total number of Limit Nodes:2

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.2100844159.0000017D3F451000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000017D3F451000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_17d3f451000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CreateInfoLocaleThread
                        • String ID: 5
                        • API String ID: 899703944-2226203566
                        • Opcode ID: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction ID: bcedf49f890a55f0a2095a3cb6c3e1e233db69733736b8a30f814cfc657b5441
                        • Opcode Fuzzy Hash: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction Fuzzy Hash: 8741BE70218A4C8BF719EB64E899BEB73F1FFD4301F40856EE18FC21A5DE3885058A42

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.2100844159.0000017D3F451000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000017D3F451000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_17d3f451000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Volume$MountNamePoint
                        • String ID:
                        • API String ID: 1269602640-0
                        • Opcode ID: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction ID: 306fa01e9baca4ba0b9f8b0b0794b0ef2070f4fc14b2d06344422e382155951c
                        • Opcode Fuzzy Hash: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction Fuzzy Hash: 2101677150C6488FFB06EB28D898BD677E1F769305F008569E0CEC72A6DE7C8558C742

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.2100844159.0000017D3F451000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000017D3F451000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_17d3f451000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction ID: 78ce1100051a88c121c258f3543223483f4063ff90a4c9b8080b3e6eb188052f
                        • Opcode Fuzzy Hash: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction Fuzzy Hash: C2D0177170420C0BFA187BB869886AD2671AB45309F001878694ACA6A7DD3AC8498703

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 55 17d3f4520b0-17d3f4520d6 MessageBoxA
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.2100844159.0000017D3F451000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000017D3F451000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_17d3f451000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Message
                        • String ID:
                        • API String ID: 2030045667-0
                        • Opcode ID: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction ID: f0c8c8b179c2aaeca1855f2f357fd550bc39611e5f4a8834ea67c0cbc9ad4e3c
                        • Opcode Fuzzy Hash: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction Fuzzy Hash: 1DC0123016180847E708BB34EC595D136E4FB5C304FD089399407C5450E96D82844A82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 72 17d3f4540b0-17d3f454117 call 17d3f455054 75 17d3f45411d-17d3f454120 72->75 76 17d3f454578-17d3f45457f call 17d3f457854 72->76 75->76 77 17d3f454126-17d3f45412c 75->77 79 17d3f454132-17d3f454136 77->79 80 17d3f4541fb-17d3f45420d 77->80 79->80 84 17d3f45413c-17d3f454147 79->84 82 17d3f454213-17d3f454217 80->82 83 17d3f4544c8-17d3f4544cc 80->83 82->83 87 17d3f45421d-17d3f454228 82->87 85 17d3f4544ce-17d3f4544d5 83->85 86 17d3f454505-17d3f45450f call 17d3f45319c 83->86 84->80 88 17d3f45414d-17d3f454152 84->88 85->76 90 17d3f4544db-17d3f454500 call 17d3f454580 85->90 86->76 100 17d3f454511-17d3f454530 call 17d3f45fa80 86->100 87->83 92 17d3f45422e-17d3f454235 87->92 88->80 89 17d3f454158-17d3f454162 call 17d3f45319c 88->89 89->100 103 17d3f454168-17d3f454193 call 17d3f45319c * 2 call 17d3f453b64 89->103 90->86 93 17d3f4543f9-17d3f454405 92->93 94 17d3f45423b-17d3f454276 call 17d3f45385c 92->94 93->86 101 17d3f45440b-17d3f45440f 93->101 94->93 108 17d3f45427c-17d3f454286 94->108 105 17d3f454411-17d3f45441d call 17d3f453b24 101->105 106 17d3f45441f-17d3f454427 101->106 141 17d3f4541b3-17d3f4541bd call 17d3f45319c 103->141 142 17d3f454195-17d3f454199 103->142 105->106 120 17d3f454440-17d3f454448 105->120 106->86 107 17d3f45442d-17d3f45443a call 17d3f4536fc 106->107 107->86 107->120 113 17d3f45428a-17d3f4542bc 108->113 117 17d3f4542c2-17d3f4542ce 113->117 118 17d3f4543e8-17d3f4543ef 113->118 117->118 123 17d3f4542d4-17d3f4542ed 117->123 118->113 125 17d3f4543f5-17d3f4543f6 118->125 121 17d3f45444e-17d3f454452 120->121 122 17d3f45455b-17d3f454577 call 17d3f45319c * 2 call 17d3f4577c8 120->122 126 17d3f454454-17d3f454463 call 17d3f453b24 121->126 127 17d3f454465-17d3f454466 121->127 122->76 129 17d3f4542f3-17d3f454338 call 17d3f453b38 * 2 123->129 130 17d3f4543e5-17d3f4543e6 123->130 125->93 135 17d3f454468-17d3f454472 call 17d3f4550ec 126->135 127->135 155 17d3f45433a-17d3f454360 call 17d3f453b38 call 17d3f4547f0 129->155 156 17d3f454376-17d3f45437c 129->156 130->118 135->86 150 17d3f454478-17d3f4544c6 call 17d3f45378c call 17d3f453990 135->150 141->80 153 17d3f4541bf-17d3f4541df call 17d3f45319c * 2 call 17d3f4550ec 141->153 142->141 146 17d3f45419b-17d3f4541a6 142->146 146->141 151 17d3f4541a8-17d3f4541ad 146->151 150->86 151->76 151->141 176 17d3f4541e1-17d3f4541eb call 17d3f4551dc 153->176 177 17d3f4541f6-17d3f4541f7 153->177 171 17d3f454362-17d3f454374 155->171 172 17d3f454387-17d3f4543db call 17d3f453fdc 155->172 159 17d3f45437e-17d3f454382 156->159 160 17d3f4543e0-17d3f4543e1 156->160 159->129 160->130 171->155 171->156 172->160 180 17d3f4541f1-17d3f454554 call 17d3f452f74 call 17d3f454bac call 17d3f4553d8 176->180 181 17d3f454555-17d3f45455a call 17d3f4577c8 176->181 177->80 180->181 181->122
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.2100844159.0000017D3F451000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000017D3F451000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_17d3f451000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                        • String ID: csm$csm$csm
                        • API String ID: 849930591-393685449
                        • Opcode ID: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction ID: 794a11f58709d19b83ab01fe70d67c521e0e9858243fca70c0e9c68caaccfee7
                        • Opcode Fuzzy Hash: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction Fuzzy Hash: BCF16D70918A0C8BFB54EF68A455FE977F1FF59310F540699E48DC72A6DB309881CB82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 191 17d3f454930-17d3f454978 call 17d3f453144 call 17d3f45319c 196 17d3f4549b2-17d3f4549b6 191->196 197 17d3f45497a-17d3f454980 191->197 198 17d3f454a4a-17d3f454a4e 196->198 199 17d3f4549bc-17d3f4549c0 196->199 197->196 200 17d3f454982-17d3f454984 197->200 203 17d3f454a92-17d3f454a98 198->203 204 17d3f454a50-17d3f454a5c 198->204 201 17d3f454b41 199->201 202 17d3f4549c6-17d3f4549ce 199->202 205 17d3f454996-17d3f454998 200->205 206 17d3f454986-17d3f45498a 200->206 214 17d3f454b46-17d3f454b60 201->214 202->201 211 17d3f4549d4-17d3f4549d8 202->211 209 17d3f454a9a-17d3f454a9e 203->209 210 17d3f454b08-17d3f454b3c call 17d3f4540b0 203->210 212 17d3f454a72-17d3f454a7e 204->212 213 17d3f454a5e-17d3f454a62 204->213 205->196 207 17d3f45499a-17d3f4549a6 205->207 206->207 208 17d3f45498c-17d3f454994 206->208 207->196 216 17d3f4549a8-17d3f4549ac 207->216 208->196 208->205 209->210 215 17d3f454aa0-17d3f454aa7 209->215 210->201 217 17d3f4549da-17d3f4549dc 211->217 218 17d3f454a37-17d3f454a45 call 17d3f453728 211->218 212->201 221 17d3f454a84-17d3f454a8c 212->221 213->212 220 17d3f454a64-17d3f454a70 call 17d3f453b24 213->220 215->210 222 17d3f454aa9-17d3f454ab1 215->222 216->196 216->201 224 17d3f4549de-17d3f4549f0 call 17d3f453cb4 217->224 225 17d3f454a15-17d3f454a17 217->225 218->201 220->203 220->212 221->201 221->203 222->210 228 17d3f454ab3-17d3f454ac6 call 17d3f453b38 222->228 232 17d3f454b61-17d3f454b67 call 17d3f457854 224->232 238 17d3f4549f6-17d3f4549f9 224->238 225->218 227 17d3f454a19-17d3f454a21 225->227 227->232 233 17d3f454a27-17d3f454a2b 227->233 228->210 242 17d3f454ac8-17d3f454b06 228->242 233->232 236 17d3f454a31-17d3f454a35 233->236 241 17d3f454a05-17d3f454a10 call 17d3f454ec8 236->241 238->232 243 17d3f4549ff-17d3f454a03 238->243 241->201 242->214 243->241
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.2100844159.0000017D3F451000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000017D3F451000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_17d3f451000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                        • String ID: csm$csm
                        • API String ID: 3896166516-3733052814
                        • Opcode ID: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction ID: bfee1e0c357266b4df400d37554b709b0225e42bc4e5e28a49c587f18eb79656
                        • Opcode Fuzzy Hash: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction Fuzzy Hash: EF717270518A0D8BFBA8EB19A099FA4B7F1FF54311F64459A94CDCB6A2DB309880C743

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 247 17d3f452cf0-17d3f452d36 call 17d3f453144 250 17d3f452e2d-17d3f452e34 247->250 251 17d3f452d3c-17d3f452d46 247->251 253 17d3f452ed8-17d3f452ede 250->253 252 17d3f452e19-17d3f452e1b 251->252 254 17d3f452e21 252->254 255 17d3f452d4b-17d3f452d59 252->255 256 17d3f452ee4 253->256 257 17d3f452e39-17d3f452e47 253->257 254->256 258 17d3f452d5f-17d3f452d66 255->258 259 17d3f452e17 255->259 262 17d3f452ee9-17d3f452f06 256->262 260 17d3f452e4d-17d3f452e55 257->260 261 17d3f452ed6 257->261 258->259 263 17d3f452d6c-17d3f452d71 258->263 259->252 260->261 264 17d3f452e57-17d3f452e5b 260->264 261->253 263->259 265 17d3f452d77-17d3f452d7c 263->265 266 17d3f452e5d-17d3f452e62 264->266 267 17d3f452e9c-17d3f452ead 264->267 268 17d3f452d7e-17d3f452d91 265->268 269 17d3f452d99-17d3f452d9f 265->269 272 17d3f452e64-17d3f452e70 266->272 273 17d3f452e98-17d3f452e9a 266->273 270 17d3f452ebf-17d3f452ed3 267->270 271 17d3f452eaf-17d3f452eb5 267->271 286 17d3f452e26-17d3f452e28 268->286 287 17d3f452d97 268->287 277 17d3f452da1-17d3f452da9 269->277 278 17d3f452dc9-17d3f452e12 call 17d3f453110 call 17d3f453140 269->278 270->261 271->261 276 17d3f452eb7-17d3f452ebb 271->276 274 17d3f452e72-17d3f452e79 272->274 275 17d3f452e91-17d3f452e96 272->275 273->256 273->267 274->275 279 17d3f452e7b-17d3f452e84 274->279 275->272 275->273 276->256 282 17d3f452ebd 276->282 277->278 283 17d3f452dab-17d3f452db9 call 17d3f45f940 277->283 278->259 279->275 284 17d3f452e86-17d3f452e8f 279->284 282->261 283->278 291 17d3f452dbb-17d3f452dc1 283->291 284->273 284->275 286->262 287->259 287->269 291->278
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.2100844159.0000017D3F451000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000017D3F451000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_17d3f451000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CurrentImageNonwritable__except_validate_context_record
                        • String ID: csm
                        • API String ID: 3242871069-1018135373
                        • Opcode ID: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction ID: ab8927715c533033a10fe4e630bef94d1bb099d5af6361df72e3613abd8df605
                        • Opcode Fuzzy Hash: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction Fuzzy Hash: 0371627020CA1C8BEF68FA5CE485BB473F1FF54350F1045AEE8CEC7296E624E9518696

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.2100844159.0000017D3F451000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000017D3F451000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_17d3f451000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CallTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3163161869-2084237596
                        • Opcode ID: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction ID: a936ed45a4b5b513d26039aaae831e27e29e762b958f558b0076241f1e4e4013
                        • Opcode Fuzzy Hash: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction Fuzzy Hash: F1715C7051CB4C8BE764AB19A446FEAB7F0FF99300F044A9EA4CDC7252D774A5818B83