Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RtJvzroKSq.dll

Overview

General Information

Sample name:RtJvzroKSq.dll
(renamed file extension from exe to dll, renamed because original name is a hash value)
Original sample name:b9876905ef39a784dd9ab1e41288bd98.dll.exe
Analysis ID:1561759
MD5:b9876905ef39a784dd9ab1e41288bd98
SHA1:6897879ed1b961aad24cd37903d900492d279f6b
SHA256:6ae95415ed900953fcf4618b9896ed8ea93c60e1b1f5e587b356ea2b24e2acf6
Tags:dllexeStrelaStealeruser-abuse_ch
Infos:

Detection

Strela Stealer
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Strela Stealer
AI detected suspicious sample
Machine Learning detection for sample
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
PE file does not import any functions
Program does not show much activity (idle)
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 2944 cmdline: loaddll64.exe "C:\Users\user\Desktop\RtJvzroKSq.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 3636 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3116 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\RtJvzroKSq.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 3284 cmdline: rundll32.exe "C:\Users\user\Desktop\RtJvzroKSq.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • regsvr32.exe (PID: 2332 cmdline: regsvr32.exe /s C:\Users\user\Desktop\RtJvzroKSq.dll MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
    • rundll32.exe (PID: 2216 cmdline: rundll32.exe C:\Users\user\Desktop\RtJvzroKSq.dll,DllRegisterServer MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1502079368.000002093FD11000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
    00000000.00000002.1502684092.00007FFBBCA06000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
      00000006.00000002.1472814726.00000260C5271000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
        00000006.00000002.1472951159.00007FFBBCA06000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
          00000004.00000002.1465002789.0000000000591000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            4.2.regsvr32.exe.7ffbbca00000.0.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
              5.2.rundll32.exe.7ffbbca00000.0.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
                5.2.rundll32.exe.7ffbbca06404.1.raw.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
                  6.2.rundll32.exe.7ffbbca06404.1.raw.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
                    0.2.loaddll64.exe.7ffbbca00000.0.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
                      Click to see the 7 entries
                      No Sigma rule has matched
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: RtJvzroKSq.dllVirustotal: Detection: 41%Perma Link
                      Source: RtJvzroKSq.dllReversingLabs: Detection: 42%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.7% probability
                      Source: RtJvzroKSq.dllJoe Sandbox ML: detected
                      Source: RtJvzroKSq.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD1F4E80_2_000002093FD1F4E8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD110900_2_000002093FD11090
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD172BC0_2_000002093FD172BC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD11A900_2_000002093FD11A90
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD115A00_2_000002093FD115A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_0059F4E84_2_0059F4E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_005910904_2_00591090
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_005915A04_2_005915A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_00591A904_2_00591A90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4_2_005972BC4_2_005972BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000002B6D14515A05_2_000002B6D14515A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000002B6D145F4E85_2_000002B6D145F4E8
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000002B6D14510905_2_000002B6D1451090
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000002B6D14572BC5_2_000002B6D14572BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000002B6D1451A905_2_000002B6D1451A90
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000260C5271A906_2_00000260C5271A90
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000260C52772BC6_2_00000260C52772BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000260C52715A06_2_00000260C52715A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000260C52710906_2_00000260C5271090
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000260C527F4E86_2_00000260C527F4E8
                      Source: RtJvzroKSq.dllStatic PE information: No import functions for PE file found
                      Source: classification engineClassification label: mal64.troj.winDLL@10/0@0/0
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3636:120:WilError_03
                      Source: RtJvzroKSq.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RtJvzroKSq.dll",#1
                      Source: RtJvzroKSq.dllVirustotal: Detection: 41%
                      Source: RtJvzroKSq.dllReversingLabs: Detection: 42%
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\RtJvzroKSq.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\RtJvzroKSq.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\RtJvzroKSq.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RtJvzroKSq.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\RtJvzroKSq.dll,DllRegisterServer
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\RtJvzroKSq.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\RtJvzroKSq.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\RtJvzroKSq.dll,DllRegisterServerJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RtJvzroKSq.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeAutomated click: OK
                      Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: RtJvzroKSq.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: RtJvzroKSq.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\RtJvzroKSq.dll
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD210BC push esi; retf 0_2_000002093FD210C3
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD210C4 push esi; retf 0_2_000002093FD210CB
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD210AC push esi; retf 0_2_000002093FD210B3
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD210DC push esi; retf 0_2_000002093FD210E3
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD210E4 push esi; retf 0_2_000002093FD210EB
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD210CC push esi; retf 0_2_000002093FD210DB
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD21084 push esi; retf 0_2_000002093FD2108B
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD1CC6C push esi; retf 0000h0_2_000002093FD1CC6D
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD2106C push esi; retf 0_2_000002093FD210DB
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD1CC9C push ebx; retf 0_2_000002093FD1CC9D
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD2109C push ebp; retf 0_2_000002093FD210AB
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD1CCA8 push 6F0000CBh; retf 0_2_000002093FD1CCAD
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD2108C push ebp; retf 0_2_000002093FD2109B
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD1CC35 push cs; retf 0000h0_2_000002093FD1CC59
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD21064 push esi; retf 0_2_000002093FD2106B
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD21003 push esi; retf 0_2_000002093FD21063
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD1BBA2 push esp; ret 0_2_000002093FD1BBA5
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD212FA push ebp; retf 0_2_000002093FD212FB
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD21300 push ebp; retf 0_2_000002093FD21303
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD212EC push ebp; retf 0_2_000002093FD212F3
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD2130A push esi; retf 0_2_000002093FD2130B
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD21310 push esi; retf 0_2_000002093FD21313
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD21318 push ebp; retf 0_2_000002093FD2131B
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD212C4 push ebp; retf 0_2_000002093FD212CB
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD212B4 push ebp; retf 0_2_000002093FD212C3
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD212DC push ebp; retf 0_2_000002093FD212E3
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD212DA push ebp; retf 0_2_000002093FD212DB
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD212E4 push ebp; retf 0_2_000002093FD212EB
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD212D2 push esi; retf 0_2_000002093FD212D3
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD2126C push esi; retf 0_2_000002093FD2128B
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093FD212A4 push esi; retf 0_2_000002093FD212B3
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RtJvzroKSq.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeCode function: GetConsoleWindow,CreateThread,GetLocaleInfoA,0_2_000002093FD120E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: CreateThread,GetLocaleInfoA,4_2_005920E0
                      Source: C:\Windows\System32\rundll32.exeCode function: CreateThread,GetLocaleInfoA,5_2_000002B6D14520E0
                      Source: C:\Windows\System32\rundll32.exeCode function: CreateThread,GetLocaleInfoA,6_2_00000260C52720E0

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 4.2.regsvr32.exe.7ffbbca00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ffbbca00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ffbbca06404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.7ffbbca06404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ffbbca00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ffbbca06404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ffbbca06404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.7ffbbca06404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.regsvr32.exe.7ffbbca06404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ffbbca06404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.7ffbbca00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.regsvr32.exe.7ffbbca06404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1502079368.000002093FD11000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1502684092.00007FFBBCA06000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.1472814726.00000260C5271000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.1472951159.00007FFBBCA06000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1465002789.0000000000591000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1465493426.00007FFBBCA06000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1472723820.00007FFBBCA06000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1472454129.000002B6D1451000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 2944, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 2332, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 3284, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2216, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 4.2.regsvr32.exe.7ffbbca00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ffbbca00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ffbbca06404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.7ffbbca06404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ffbbca00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ffbbca06404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ffbbca06404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.7ffbbca06404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.regsvr32.exe.7ffbbca06404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ffbbca06404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.7ffbbca00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.regsvr32.exe.7ffbbca06404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1502079368.000002093FD11000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1502684092.00007FFBBCA06000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.1472814726.00000260C5271000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.1472951159.00007FFBBCA06000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1465002789.0000000000591000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1465493426.00007FFBBCA06000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1472723820.00007FFBBCA06000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1472454129.000002B6D1451000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 2944, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 2332, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 3284, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2216, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                      DLL Side-Loading
                      11
                      Process Injection
                      1
                      Regsvr32
                      OS Credential Dumping11
                      System Information Discovery
                      Remote Services1
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Rundll32
                      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                      Process Injection
                      Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      DLL Side-Loading
                      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Obfuscated Files or Information
                      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1561759 Sample: RtJvzroKSq.exe Startdate: 24/11/2024 Architecture: WINDOWS Score: 64 19 Multi AV Scanner detection for submitted file 2->19 21 Yara detected Strela Stealer 2->21 23 Machine Learning detection for sample 2->23 25 AI detected suspicious sample 2->25 7 loaddll64.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 regsvr32.exe 7->11         started        13 rundll32.exe 7->13         started        15 conhost.exe 7->15         started        process5 17 rundll32.exe 9->17         started       

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      RtJvzroKSq.dll42%VirustotalBrowse
                      RtJvzroKSq.dll42%ReversingLabsWin64.Trojan.Generic
                      RtJvzroKSq.dll100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No contacted domains info
                      No contacted IP infos
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1561759
                      Start date and time:2024-11-24 08:39:30 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 2m 29s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:7
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:RtJvzroKSq.dll
                      (renamed file extension from exe to dll, renamed because original name is a hash value)
                      Original Sample Name:b9876905ef39a784dd9ab1e41288bd98.dll.exe
                      Detection:MAL
                      Classification:mal64.troj.winDLL@10/0@0/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 94%
                      • Number of executed functions: 18
                      • Number of non-executed functions: 21
                      Cookbook Comments:
                      • Stop behavior analysis, all processes terminated
                      • Exclude process from analysis (whitelisted): dllhost.exe
                      • Not all processes where analyzed, report is missing behavior information
                      No simulations
                      No context
                      No context
                      No context
                      No context
                      No context
                      No created / dropped files found
                      File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Entropy (8bit):7.734800381103567
                      TrID:
                      • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                      • Win64 Executable (generic) (12005/4) 10.17%
                      • Generic Win/DOS Executable (2004/3) 1.70%
                      • DOS Executable Generic (2002/1) 1.70%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                      File name:RtJvzroKSq.dll
                      File size:139'776 bytes
                      MD5:b9876905ef39a784dd9ab1e41288bd98
                      SHA1:6897879ed1b961aad24cd37903d900492d279f6b
                      SHA256:6ae95415ed900953fcf4618b9896ed8ea93c60e1b1f5e587b356ea2b24e2acf6
                      SHA512:fac53ea7e508a0868362b9682d12e5bb49db016f7f862390d196ddd32237058314e76716ee0a3388c0ac19be016ecaa35cb67d7d86f7e9c453ab1666d6abeb8b
                      SSDEEP:3072:fGAFnquXnBjSa00i+OcCt8Eu0D1iian9ZNGMrR6vCBV/x/zoVFAmbL5N8f4dJJYO:+y/f098Eu0DEiqZNj4afJsrb
                      TLSH:6BD3F15BE0992034EE4A2EB7F4BA6218D093718DE79D14DB0CC49D123A1B2CB6DF7E01
                      File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d.....1g.........." .....@.......... N.......................................`............`........................................
                      Icon Hash:7ae282899bbab082
                      Entrypoint:0x180004e20
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x180000000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                      Time Stamp:0x6731A603 [Mon Nov 11 06:36:51 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:
                      Instruction
                      mov eax, dword ptr [0001E662h]
                      lea ecx, dword ptr [eax-01h]
                      imul ecx, eax
                      mov eax, ecx
                      not eax
                      and eax, EADA5B58h
                      and ecx, 1525A4A7h
                      or ecx, eax
                      mov eax, ecx
                      xor eax, 1525A4A7h
                      xor ecx, E2104348h
                      and ecx, F334C74Ch
                      mov edx, eax
                      and edx, 0CCB38B3h
                      or edx, ecx
                      xor edx, 0CCB38B2h
                      and eax, FFFFFFFEh
                      or eax, edx
                      mov ecx, eax
                      not ecx
                      and ecx, F9607F86h
                      and eax, 069F8079h
                      or eax, ecx
                      xor eax, 069F8079h
                      sete dl
                      cmp dword ptr [0001E607h], 0Ah
                      setl al
                      xor dl, al
                      mov ecx, edx
                      xor cl, 00000001h
                      and al, cl
                      cmp al, dl
                      jne 00007FAEB8BAD4DFh
                      xor al, 01h
                      or al, cl
                      xor al, 01h
                      jne 00007FAEB8BAD4D7h
                      nop dword ptr [eax]
                      jmp 00007FAEB8BAD4D0h
                      mov eax, 00000001h
                      ret
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x51f00x56.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x250000x1a8.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x240000xc.pdata
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x3ea80x4000260759e5b2e324f50ba7708522306d89False0.68011474609375data6.785578285605347IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x50000x2880x4002822e945288180223c0fef299cceb1d5False0.2177734375data4.2868783837407936IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x60000x1d4980x1d6002e80b7e300f7d384eb56671c221b1fa3False0.8682263962765957data7.7361582892642105IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .pdata0x240000xc0x20068fbf3f0bb0267cdefae78106467b1e9False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .rsrc0x250000x1a80x200dc8a7a3ba49348b04c8bceefe511f730False0.482421875data4.1813331407993175IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_MANIFEST0x250600x143XML 1.0 document, ASCII textEnglishUnited States0.628482972136223
                      NameOrdinalAddress
                      DllRegisterServer10x180001000
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      No network behavior found

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:02:40:26
                      Start date:24/11/2024
                      Path:C:\Windows\System32\loaddll64.exe
                      Wow64 process (32bit):false
                      Commandline:loaddll64.exe "C:\Users\user\Desktop\RtJvzroKSq.dll"
                      Imagebase:0x7ff644830000
                      File size:165'888 bytes
                      MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000000.00000002.1502079368.000002093FD11000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000000.00000002.1502684092.00007FFBBCA06000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:true

                      Target ID:1
                      Start time:02:40:26
                      Start date:24/11/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6ee680000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:3
                      Start time:02:40:27
                      Start date:24/11/2024
                      Path:C:\Windows\System32\cmd.exe
                      Wow64 process (32bit):false
                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\RtJvzroKSq.dll",#1
                      Imagebase:0x7ff7fcf50000
                      File size:289'792 bytes
                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:4
                      Start time:02:40:27
                      Start date:24/11/2024
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:regsvr32.exe /s C:\Users\user\Desktop\RtJvzroKSq.dll
                      Imagebase:0x7ff7f7780000
                      File size:25'088 bytes
                      MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000004.00000002.1465002789.0000000000591000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000004.00000002.1465493426.00007FFBBCA06000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:true

                      Target ID:5
                      Start time:02:40:27
                      Start date:24/11/2024
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe "C:\Users\user\Desktop\RtJvzroKSq.dll",#1
                      Imagebase:0x7ff7723c0000
                      File size:71'680 bytes
                      MD5 hash:EF3179D498793BF4234F708D3BE28633
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000005.00000002.1472723820.00007FFBBCA06000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000005.00000002.1472454129.000002B6D1451000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:true

                      Target ID:6
                      Start time:02:40:27
                      Start date:24/11/2024
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe C:\Users\user\Desktop\RtJvzroKSq.dll,DllRegisterServer
                      Imagebase:0x7ff7723c0000
                      File size:71'680 bytes
                      MD5 hash:EF3179D498793BF4234F708D3BE28633
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000006.00000002.1472814726.00000260C5271000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000006.00000002.1472951159.00007FFBBCA06000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:1.9%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:16.7%
                        Total number of Nodes:30
                        Total number of Limit Nodes:4

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1502079368.000002093FD11000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002093FD11000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2093fd11000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: ConsoleCreateInfoLocaleThreadWindow
                        • String ID: 5
                        • API String ID: 1307802651-2226203566
                        • Opcode ID: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction ID: 361c458238b7fb0778250e4a85390c784af35b0e329b653f4de1ea45fd20588d
                        • Opcode Fuzzy Hash: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction Fuzzy Hash: 6F41C0302187488BF799EB64D8AD7AB77E1FB84301F40856DE15BC21E7DF3884898A42

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1502079368.000002093FD11000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002093FD11000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2093fd11000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: FileType
                        • String ID:
                        • API String ID: 3081899298-0
                        • Opcode ID: 96bd17cdbec1199f7060c8e4f9a6f8fd574a155b9e298efd3bd16726f0fb32a2
                        • Instruction ID: 83c3fa1a2d19f693101528afa7d9c37890f6f15b7b6eaed06353547eb20650c5
                        • Opcode Fuzzy Hash: 96bd17cdbec1199f7060c8e4f9a6f8fd574a155b9e298efd3bd16726f0fb32a2
                        • Instruction Fuzzy Hash: 3D319E30508F1A9EE7A59B2C849C76476D0FB19360F65078AE46FC72E6C734D8E19B81

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1502079368.000002093FD11000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002093FD11000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2093fd11000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: Volume$MountNamePoint
                        • String ID:
                        • API String ID: 1269602640-0
                        • Opcode ID: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction ID: 716fa669bfa09ad99638e2ae584c24aaa0ac7f4328992002bc08efdc2535d4af
                        • Opcode Fuzzy Hash: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction Fuzzy Hash: 660144305086448FFB46AB68D89C7D677A1F769305F008569E0CAC72A6DEBC8558C741

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1502079368.000002093FD11000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002093FD11000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2093fd11000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction ID: c7a0534730a2836d92422b28d2fedf3eb318b516faa7c6335e0e9aa9e5b45b79
                        • Opcode Fuzzy Hash: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction Fuzzy Hash: 49D05E2030030C0FFB987BB859AC32D2665CB45205F0019787917CB6E7CE3A8889CB02

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 73 2093fd120b0-2093fd120d6 MessageBoxA
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1502079368.000002093FD11000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002093FD11000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2093fd11000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: Message
                        • String ID:
                        • API String ID: 2030045667-0
                        • Opcode ID: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction ID: f0c8c8b179c2aaeca1855f2f357fd550bc39611e5f4a8834ea67c0cbc9ad4e3c
                        • Opcode Fuzzy Hash: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction Fuzzy Hash: 1DC0123016180847E708BB34EC595D136E4FB5C304FD089399407C5450E96D82844A82
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1502079368.000002093FD11000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002093FD11000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2093fd11000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: _clrfp
                        • String ID:
                        • API String ID: 3618594692-0
                        • Opcode ID: 2045596ada029767b90017b957664b0b71c7a256b325aa916a96e60a40104743
                        • Instruction ID: c8e06144f212c59d8f64b992d04cd5b68f9916c14f637cd276e913e9e1bbfb3a
                        • Opcode Fuzzy Hash: 2045596ada029767b90017b957664b0b71c7a256b325aa916a96e60a40104743
                        • Instruction Fuzzy Hash: 86C12535510B4D8FEB99CF18C89AB5677E0FB49304F198599E86ACB2A3C335D896CF01
                        Memory Dump Source
                        • Source File: 00000000.00000002.1502079368.000002093FD11000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002093FD11000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2093fd11000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e4f9392618ee0be8b2838eee92702fec4626de7f7bd0dc604c65336cad8c2563
                        • Instruction ID: f52ac1b53e26dbefe75b358d58230f59fde939b028b5040e9482411e24ecd0e8
                        • Opcode Fuzzy Hash: e4f9392618ee0be8b2838eee92702fec4626de7f7bd0dc604c65336cad8c2563
                        • Instruction Fuzzy Hash: E7E16F70518B488FEB65EF18D8997EA77E1FB94304F00466EA45EC31A2DB349685CF82
                        Memory Dump Source
                        • Source File: 00000000.00000002.1502079368.000002093FD11000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002093FD11000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2093fd11000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f301177accb7d0ce1b8505d76f0598128b48e2f6fca66abbe616489d302d7cc2
                        • Instruction ID: d8eecd8fb75c8ee8178e9c2a55609a64f59cee26ff48713dd57dd76e19420c38
                        • Opcode Fuzzy Hash: f301177accb7d0ce1b8505d76f0598128b48e2f6fca66abbe616489d302d7cc2
                        • Instruction Fuzzy Hash: C7B16E31218A494FEB69EF28DC6D7EA73E5FB94301F00426AE45BC3192DF3499458B81
                        Memory Dump Source
                        • Source File: 00000000.00000002.1502079368.000002093FD11000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002093FD11000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2093fd11000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 004e5bc4f416d9accfca0753fc8d67adee0aa063ac23580ea370914e8b763bcf
                        • Instruction ID: 59602749460ef3c94d3635fc6fb1f5e62cd1b45fb192eddc84a5d2f552efc78b
                        • Opcode Fuzzy Hash: 004e5bc4f416d9accfca0753fc8d67adee0aa063ac23580ea370914e8b763bcf
                        • Instruction Fuzzy Hash: 5071C53161CB484BE798DF18985D3BA77D5FB89710F00856ED89FC3292EF3499468B81
                        Memory Dump Source
                        • Source File: 00000000.00000002.1502079368.000002093FD11000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002093FD11000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2093fd11000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 30f0a361053a8720fb197dd7f2de9fba19a6b2a280636273193b063dd5433016
                        • Instruction ID: dcbcc7984ac636795c894b6f84dd0971fdac925b5cb38597f84c9a7c6010b679
                        • Opcode Fuzzy Hash: 30f0a361053a8720fb197dd7f2de9fba19a6b2a280636273193b063dd5433016
                        • Instruction Fuzzy Hash: AF51E232318E084FDB5CDF6CD49D66573D2E7A8311B15826EE41EC72A6DE70D8868B81

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 90 2093fd140b0-2093fd14117 call 2093fd15054 93 2093fd1411d-2093fd14120 90->93 94 2093fd14578-2093fd1457f call 2093fd17854 90->94 93->94 95 2093fd14126-2093fd1412c 93->95 97 2093fd141fb-2093fd1420d 95->97 98 2093fd14132-2093fd14136 95->98 100 2093fd14213-2093fd14217 97->100 101 2093fd144c8-2093fd144cc 97->101 98->97 102 2093fd1413c-2093fd14147 98->102 100->101 103 2093fd1421d-2093fd14228 100->103 105 2093fd144ce-2093fd144d5 101->105 106 2093fd14505-2093fd1450f call 2093fd1319c 101->106 102->97 104 2093fd1414d-2093fd14152 102->104 103->101 107 2093fd1422e-2093fd14235 103->107 104->97 108 2093fd14158-2093fd14162 call 2093fd1319c 104->108 105->94 109 2093fd144db-2093fd14500 call 2093fd14580 105->109 106->94 116 2093fd14511-2093fd14530 call 2093fd1fa80 106->116 111 2093fd143f9-2093fd14405 107->111 112 2093fd1423b-2093fd14276 call 2093fd1385c 107->112 108->116 124 2093fd14168-2093fd14193 call 2093fd1319c * 2 call 2093fd13b64 108->124 109->106 111->106 117 2093fd1440b-2093fd1440f 111->117 112->111 128 2093fd1427c-2093fd14286 112->128 121 2093fd1441f-2093fd14427 117->121 122 2093fd14411-2093fd1441d call 2093fd13b24 117->122 121->106 127 2093fd1442d-2093fd1443a call 2093fd136fc 121->127 122->121 134 2093fd14440-2093fd14448 122->134 157 2093fd141b3-2093fd141bd call 2093fd1319c 124->157 158 2093fd14195-2093fd14199 124->158 127->106 127->134 132 2093fd1428a-2093fd142bc 128->132 136 2093fd142c2-2093fd142ce 132->136 137 2093fd143e8-2093fd143ef 132->137 140 2093fd1455b-2093fd14577 call 2093fd1319c * 2 call 2093fd177c8 134->140 141 2093fd1444e-2093fd14452 134->141 136->137 142 2093fd142d4-2093fd142ed 136->142 137->132 139 2093fd143f5-2093fd143f6 137->139 139->111 140->94 145 2093fd14454-2093fd14463 call 2093fd13b24 141->145 146 2093fd14465-2093fd14466 141->146 148 2093fd142f3-2093fd14338 call 2093fd13b38 * 2 142->148 149 2093fd143e5-2093fd143e6 142->149 152 2093fd14468-2093fd14472 call 2093fd150ec 145->152 146->152 172 2093fd1433a-2093fd14360 call 2093fd13b38 call 2093fd147f0 148->172 173 2093fd14376-2093fd1437c 148->173 149->137 152->106 169 2093fd14478-2093fd144c6 call 2093fd1378c call 2093fd13990 152->169 157->97 175 2093fd141bf-2093fd141df call 2093fd1319c * 2 call 2093fd150ec 157->175 158->157 163 2093fd1419b-2093fd141a6 158->163 163->157 168 2093fd141a8-2093fd141ad 163->168 168->94 168->157 169->106 189 2093fd14362-2093fd14374 172->189 190 2093fd14387-2093fd143db call 2093fd13fdc 172->190 179 2093fd1437e-2093fd14382 173->179 180 2093fd143e0-2093fd143e1 173->180 194 2093fd141e1-2093fd141eb call 2093fd151dc 175->194 195 2093fd141f6-2093fd141f7 175->195 179->148 180->149 189->172 189->173 190->180 198 2093fd141f1-2093fd14554 call 2093fd12f74 call 2093fd14bac call 2093fd153d8 194->198 199 2093fd14555-2093fd1455a call 2093fd177c8 194->199 195->97 198->199 199->140
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1502079368.000002093FD11000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002093FD11000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2093fd11000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                        • String ID: csm$csm$csm
                        • API String ID: 849930591-393685449
                        • Opcode ID: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction ID: 52ffea7d0426a6814de3ac8ddc8cdf2f4e5e649ee487054adcf6a9b16efd5889
                        • Opcode Fuzzy Hash: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction Fuzzy Hash: D0F14F30518B488BEB94EF68C45DBA977E0FB5A310F540699E49EC7697DB30D8C1CB82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 209 2093fd14930-2093fd14978 call 2093fd13144 call 2093fd1319c 214 2093fd1497a-2093fd14980 209->214 215 2093fd149b2-2093fd149b6 209->215 214->215 218 2093fd14982-2093fd14984 214->218 216 2093fd14a4a-2093fd14a4e 215->216 217 2093fd149bc-2093fd149c0 215->217 221 2093fd14a50-2093fd14a5c 216->221 222 2093fd14a92-2093fd14a98 216->222 219 2093fd14b41 217->219 220 2093fd149c6-2093fd149ce 217->220 223 2093fd14996-2093fd14998 218->223 224 2093fd14986-2093fd1498a 218->224 229 2093fd14b46-2093fd14b60 219->229 220->219 226 2093fd149d4-2093fd149d8 220->226 227 2093fd14a5e-2093fd14a62 221->227 228 2093fd14a72-2093fd14a7e 221->228 231 2093fd14a9a-2093fd14a9e 222->231 232 2093fd14b08-2093fd14b3c call 2093fd140b0 222->232 223->215 225 2093fd1499a-2093fd149a6 223->225 224->225 230 2093fd1498c-2093fd14994 224->230 225->215 234 2093fd149a8-2093fd149ac 225->234 235 2093fd149da-2093fd149dc 226->235 236 2093fd14a37-2093fd14a45 call 2093fd13728 226->236 227->228 237 2093fd14a64-2093fd14a70 call 2093fd13b24 227->237 228->219 239 2093fd14a84-2093fd14a8c 228->239 230->215 230->223 231->232 233 2093fd14aa0-2093fd14aa7 231->233 232->219 233->232 240 2093fd14aa9-2093fd14ab1 233->240 234->215 234->219 242 2093fd149de-2093fd149f0 call 2093fd13cb4 235->242 243 2093fd14a15-2093fd14a17 235->243 236->219 237->222 237->228 239->219 239->222 240->232 246 2093fd14ab3-2093fd14ac6 call 2093fd13b38 240->246 250 2093fd14b61-2093fd14b67 call 2093fd17854 242->250 256 2093fd149f6-2093fd149f9 242->256 243->236 245 2093fd14a19-2093fd14a21 243->245 245->250 251 2093fd14a27-2093fd14a2b 245->251 246->232 259 2093fd14ac8-2093fd14b06 246->259 251->250 254 2093fd14a31-2093fd14a35 251->254 258 2093fd14a05-2093fd14a10 call 2093fd14ec8 254->258 256->250 260 2093fd149ff-2093fd14a03 256->260 258->219 259->229 260->258
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1502079368.000002093FD11000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002093FD11000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2093fd11000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                        • String ID: csm$csm
                        • API String ID: 3896166516-3733052814
                        • Opcode ID: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction ID: d00292e8024ab205ad62f6f7b9f3c89947de25fb33d730c0a9aa264fe346851b
                        • Opcode Fuzzy Hash: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction Fuzzy Hash: 24717030614B098FEBF89B1880ADB64B7D1FB56315F64469E94AEC76D3DB3498C0CB42

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1502079368.000002093FD11000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002093FD11000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2093fd11000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: CallTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3163161869-2084237596
                        • Opcode ID: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction ID: a6878c0db5355d398c847c64d71e9fd003581916fe5e49ea40bcdd9c8e3f62ce
                        • Opcode Fuzzy Hash: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction Fuzzy Hash: 8C71B430518B488FE7A4DF18D45ABA6B7E0FB9A300F144A9DE49EC3193D774A5C5CB82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 265 2093fd12cf0-2093fd12d36 call 2093fd13144 268 2093fd12d3c-2093fd12d46 265->268 269 2093fd12e2d-2093fd12e34 265->269 270 2093fd12e19-2093fd12e1b 268->270 271 2093fd12ed8-2093fd12ede 269->271 274 2093fd12d4b-2093fd12d59 270->274 275 2093fd12e21 270->275 272 2093fd12e39-2093fd12e47 271->272 273 2093fd12ee4 271->273 279 2093fd12e4d-2093fd12e55 272->279 280 2093fd12ed6 272->280 276 2093fd12ee9-2093fd12f06 273->276 277 2093fd12d5f-2093fd12d66 274->277 278 2093fd12e17 274->278 275->273 277->278 282 2093fd12d6c-2093fd12d71 277->282 278->270 279->280 281 2093fd12e57-2093fd12e5b 279->281 280->271 283 2093fd12e9c-2093fd12ead 281->283 284 2093fd12e5d-2093fd12e62 281->284 282->278 285 2093fd12d77-2093fd12d7c 282->285 290 2093fd12ebf-2093fd12ed3 283->290 291 2093fd12eaf-2093fd12eb5 283->291 286 2093fd12e64-2093fd12e70 284->286 287 2093fd12e98-2093fd12e9a 284->287 288 2093fd12d99-2093fd12d9f 285->288 289 2093fd12d7e-2093fd12d91 285->289 292 2093fd12e72-2093fd12e79 286->292 293 2093fd12e91-2093fd12e96 286->293 287->273 287->283 295 2093fd12dc9-2093fd12e12 call 2093fd13110 call 2093fd13140 288->295 296 2093fd12da1-2093fd12da9 288->296 304 2093fd12e26-2093fd12e28 289->304 305 2093fd12d97 289->305 290->280 291->280 294 2093fd12eb7-2093fd12ebb 291->294 292->293 297 2093fd12e7b-2093fd12e84 292->297 293->286 293->287 294->273 300 2093fd12ebd 294->300 295->278 296->295 301 2093fd12dab-2093fd12db9 call 2093fd1f940 296->301 297->293 302 2093fd12e86-2093fd12e8f 297->302 300->280 301->295 308 2093fd12dbb-2093fd12dc1 301->308 302->287 302->293 304->276 305->278 305->288 308->295
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1502079368.000002093FD11000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002093FD11000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2093fd11000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: CurrentImageNonwritable__except_validate_context_record
                        • String ID: csm
                        • API String ID: 3242871069-1018135373
                        • Opcode ID: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction ID: 3c9fdb6ec12610c37cda48658e2a8e69410227d93b7328ca260de33c214280fd
                        • Opcode Fuzzy Hash: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction Fuzzy Hash: CE718330208B088BEFA8EB5CD49D77573D1FB54351F1045AEE89BC32D7E726E8918A85

                        Execution Graph

                        Execution Coverage:1.5%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:23
                        Total number of Limit Nodes:2
                        execution_graph 5163 596e99 5167 596e9e 5163->5167 5164 596f52 5167->5164 5168 596f68 5167->5168 5169 596f75 5168->5169 5170 596f91 ExitProcess 5169->5170 5171 591000 5172 59101b __scrt_get_show_window_mode 5171->5172 5173 59103a GetVolumeNameForVolumeMountPointA 5172->5173 5174 591061 5173->5174 5175 592380 5186 592544 5175->5186 5177 5923df 5178 592394 __scrt_get_show_window_mode __scrt_acquire_startup_lock __scrt_release_startup_lock 5178->5175 5178->5177 5180 5920e0 5178->5180 5181 5920f3 CreateThread 5180->5181 5184 592131 __scrt_get_show_window_mode 5181->5184 5190 5920b0 MessageBoxA 5181->5190 5183 5921cd GetLocaleInfoA 5185 592200 __scrt_get_show_window_mode __vcrt_freefls 5183->5185 5184->5183 5184->5185 5185->5178 5187 59254c 5186->5187 5188 592558 __scrt_dllmain_crt_thread_attach 5187->5188 5189 592561 5188->5189 5189->5178

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1465002789.0000000000591000.00000040.00001000.00020000.00000000.sdmp, Offset: 00591000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_591000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CreateInfoLocaleThread
                        • String ID: 5
                        • API String ID: 899703944-2226203566
                        • Opcode ID: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction ID: 9721db175efa67875ddb6b30f789c9a53d69c5806d33fc40acf3a9bb07e37715
                        • Opcode Fuzzy Hash: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction Fuzzy Hash: AB41D231218A498BEB19EF64DC9D6AB7BE2FBD4305F44853DE14BC21A5DF388409CB42

                        Control-flow Graph

                        APIs
                        • GetVolumeNameForVolumeMountPointA.KERNEL32 ref: 0059104B
                        Memory Dump Source
                        • Source File: 00000004.00000002.1465002789.0000000000591000.00000040.00001000.00020000.00000000.sdmp, Offset: 00591000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_591000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Volume$MountNamePoint
                        • String ID:
                        • API String ID: 1269602640-0
                        • Opcode ID: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction ID: ddf6aacccebe4ed9efc81433800ce547fd3d13422ddf14a00dc7f08318c3e136
                        • Opcode Fuzzy Hash: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction Fuzzy Hash: 0B0162315086448FFB06EB68D898BE67BE1F7A9305F008569E0CAC72A5DEBC8658C741

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 47 596f68-596f77 call 596f9c 50 596f79-596f82 47->50 51 596f8a-596f9b call 596fc0 ExitProcess 47->51 50->51
                        APIs
                        • ExitProcess.KERNEL32(?,?,?,?,?,?,?,00596F64), ref: 00596F93
                        Memory Dump Source
                        • Source File: 00000004.00000002.1465002789.0000000000591000.00000040.00001000.00020000.00000000.sdmp, Offset: 00591000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_591000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction ID: 0b36997fe355e6148ab02715c5b6c1697857a787db14dee0e8b1a45f8b485bd9
                        • Opcode Fuzzy Hash: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction Fuzzy Hash: ADD09E243007095FEF187BB9699D22D2A65EB85305F0018386903CB6AADD3E988D8742

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 55 5920b0-5920d6 MessageBoxA
                        APIs
                        Memory Dump Source
                        • Source File: 00000004.00000002.1465002789.0000000000591000.00000040.00001000.00020000.00000000.sdmp, Offset: 00591000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_591000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Message
                        • String ID:
                        • API String ID: 2030045667-0
                        • Opcode ID: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction ID: f0c8c8b179c2aaeca1855f2f357fd550bc39611e5f4a8834ea67c0cbc9ad4e3c
                        • Opcode Fuzzy Hash: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction Fuzzy Hash: 1DC0123016180847E708BB34EC595D136E4FB5C304FD089399407C5450E96D82844A82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 72 5940b0-594117 call 595054 75 594578-59457f call 597854 72->75 76 59411d-594120 72->76 76->75 77 594126-59412c 76->77 79 5941fb-59420d 77->79 80 594132-594136 77->80 82 5944c8-5944cc 79->82 83 594213-594217 79->83 80->79 84 59413c-594147 80->84 87 5944ce-5944d5 82->87 88 594505-59450f call 59319c 82->88 83->82 85 59421d-594228 83->85 84->79 86 59414d-594152 84->86 85->82 89 59422e-594235 85->89 86->79 90 594158-594162 call 59319c 86->90 87->75 91 5944db-594500 call 594580 87->91 88->75 101 594511-594530 call 59fa80 88->101 93 5943f9-594405 89->93 94 59423b-594276 call 59385c 89->94 90->101 105 594168-594193 call 59319c * 2 call 593b64 90->105 91->88 93->88 98 59440b-59440f 93->98 94->93 110 59427c-594286 94->110 102 59441f-594427 98->102 103 594411-59441d call 593b24 98->103 102->88 109 59442d-59443a call 5936fc 102->109 103->102 116 594440-594448 103->116 138 5941b3-5941bd call 59319c 105->138 139 594195-594199 105->139 109->88 109->116 114 59428a-5942bc 110->114 118 5943e8-5943ef 114->118 119 5942c2-5942ce 114->119 121 59455b-594577 call 59319c * 2 call 5977c8 116->121 122 59444e-594452 116->122 118->114 125 5943f5-5943f6 118->125 119->118 123 5942d4-5942ed 119->123 121->75 126 594465-594466 122->126 127 594454-594463 call 593b24 122->127 129 5942f3-594338 call 593b38 * 2 123->129 130 5943e5-5943e6 123->130 125->93 135 594468-594472 call 5950ec 126->135 127->135 154 59433a-594360 call 593b38 call 5947f0 129->154 155 594376-59437c 129->155 130->118 135->88 150 594478-5944c6 call 59378c call 593990 135->150 138->79 157 5941bf-5941df call 59319c * 2 call 5950ec 138->157 139->138 145 59419b-5941a6 139->145 145->138 151 5941a8-5941ad 145->151 150->88 151->75 151->138 171 594362-594374 154->171 172 594387-5943db call 593fdc 154->172 161 59437e-594382 155->161 162 5943e0-5943e1 155->162 176 5941e1-5941eb call 5951dc 157->176 177 5941f6-5941f7 157->177 161->129 162->130 171->154 171->155 172->162 180 5941f1-594554 call 592f74 call 594bac call 5953d8 176->180 181 594555-59455a call 5977c8 176->181 177->79 180->181 181->121
                        APIs
                        • __FrameHandler3::GetHandlerSearchState.LIBVCRUNTIME ref: 0059410C
                          • Part of subcall function 00595054: __GetUnwindTryBlock.LIBCMT ref: 00595097
                          • Part of subcall function 00595054: __SetUnwindTryBlock.LIBVCRUNTIME ref: 005950BC
                        • Is_bad_exception_allowed.LIBVCRUNTIME ref: 005941E4
                        • __FrameHandler3::ExecutionInCatch.LIBVCRUNTIME ref: 00594433
                        • std::bad_alloc::bad_alloc.LIBCMT ref: 0059453F
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1465002789.0000000000591000.00000040.00001000.00020000.00000000.sdmp, Offset: 00591000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_591000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                        • String ID: csm$csm$csm
                        • API String ID: 849930591-393685449
                        • Opcode ID: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction ID: 77befe1d7a8d703069340b015b260182a997433a2d1eaf3e561aec41f3956d10
                        • Opcode Fuzzy Hash: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction Fuzzy Hash: 43E18530918B498FDF14EF68D489AAD7BE0FB99310F54465EE489C7216DB34DD82CB82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 191 594930-594978 call 593144 call 59319c 196 59497a-594980 191->196 197 5949b2-5949b6 191->197 196->197 198 594982-594984 196->198 199 594a4a-594a4e 197->199 200 5949bc-5949c0 197->200 203 594996-594998 198->203 204 594986-59498a 198->204 201 594a50-594a5c 199->201 202 594a92-594a98 199->202 205 594b41 200->205 206 5949c6-5949ce 200->206 207 594a5e-594a62 201->207 208 594a72-594a7e 201->208 212 594b08-594b3c call 5940b0 202->212 213 594a9a-594a9e 202->213 203->197 210 59499a-5949a6 203->210 204->210 211 59498c-594994 204->211 209 594b46-594b60 205->209 206->205 214 5949d4-5949d8 206->214 207->208 217 594a64-594a70 call 593b24 207->217 208->205 219 594a84-594a8c 208->219 210->197 221 5949a8-5949ac 210->221 211->197 211->203 212->205 213->212 220 594aa0-594aa7 213->220 215 5949da-5949dc 214->215 216 594a37-594a45 call 593728 214->216 222 5949de-5949f0 call 593cb4 215->222 223 594a15-594a17 215->223 216->205 217->202 217->208 219->202 219->205 220->212 225 594aa9-594ab1 220->225 221->197 221->205 233 594b61-594b67 call 597854 222->233 236 5949f6-5949f9 222->236 223->216 229 594a19-594a21 223->229 225->212 230 594ab3-594ac6 call 593b38 225->230 229->233 234 594a27-594a2b 229->234 230->212 243 594ac8-594b06 230->243 234->233 238 594a31-594a35 234->238 236->233 240 5949ff-594a03 236->240 242 594a05-594a10 call 594ec8 238->242 240->242 242->205 243->209
                        APIs
                        • __except_validate_context_record.LIBVCRUNTIME ref: 00594958
                        • __FrameHandler3::FrameUnwindToEmptyState.LIBVCRUNTIME ref: 00594A40
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1465002789.0000000000591000.00000040.00001000.00020000.00000000.sdmp, Offset: 00591000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_591000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                        • String ID: csm$csm
                        • API String ID: 3896166516-3733052814
                        • Opcode ID: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction ID: f3fadcfaee44d54314763bb35996d12e6a2d32cfc54d2282a89c9c98b20f5c19
                        • Opcode Fuzzy Hash: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction Fuzzy Hash: 12619430618B098FCF68DF188089B69BBD2FB98311F64565ED48DC7656DB34DC82CB86

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 247 592cf0-592d36 call 593144 250 592e2d-592e34 247->250 251 592d3c-592d46 247->251 252 592ed8-592ede 250->252 253 592e19-592e1b 251->253 256 592e39-592e47 252->256 257 592ee4 252->257 254 592d4b-592d59 253->254 255 592e21 253->255 261 592d5f-592d66 254->261 262 592e17 254->262 255->257 258 592e4d-592e55 256->258 259 592ed6 256->259 260 592ee9-592f06 257->260 258->259 263 592e57-592e5b 258->263 259->252 261->262 264 592d6c-592d71 261->264 262->253 266 592e5d-592e62 263->266 267 592e9c-592ead 263->267 264->262 265 592d77-592d7c 264->265 268 592d99-592d9f 265->268 269 592d7e-592d91 265->269 272 592e98-592e9a 266->272 273 592e64-592e70 266->273 270 592ebf-592ed3 267->270 271 592eaf-592eb5 267->271 275 592dc9-592e12 call 593110 call 593140 268->275 276 592da1-592da9 268->276 284 592d97 269->284 285 592e26-592e28 269->285 270->259 271->259 274 592eb7-592ebb 271->274 272->257 272->267 277 592e91-592e96 273->277 278 592e72-592e79 273->278 274->257 280 592ebd 274->280 275->262 276->275 281 592dab-592db9 call 59f940 276->281 277->272 277->273 278->277 283 592e7b-592e84 278->283 280->259 281->275 291 592dbb-592dc1 281->291 283->277 288 592e86-592e8f 283->288 284->262 284->268 285->260 288->272 288->277 291->275
                        APIs
                        • __except_validate_context_record.LIBVCRUNTIME ref: 00592D1B
                        • _IsNonwritableInCurrentImage.LIBCMT ref: 00592DB2
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1465002789.0000000000591000.00000040.00001000.00020000.00000000.sdmp, Offset: 00591000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_591000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CurrentImageNonwritable__except_validate_context_record
                        • String ID: csm
                        • API String ID: 3242871069-1018135373
                        • Opcode ID: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction ID: 5923a622efaf80b4c857579090b00637594fd56a7ff8ccfc1b2d06ce775e04e9
                        • Opcode Fuzzy Hash: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction Fuzzy Hash: 8D61A230618A099BCF28EF5CD8C5A787BD5FB54350F10456EE88AC7256EB34EC92CB85

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 293 594580-5945b3 294 5945b9-5945db call 59319c 293->294 295 5947cc-5947e6 293->295 298 594638-59464a 294->298 299 5945dd-5945f1 call 59319c 294->299 300 594650-594694 call 59385c 298->300 301 5947e7-5947ef call 597854 298->301 299->298 311 5945f3-5945f9 299->311 300->295 308 59469a-5946a5 300->308 310 5946ac-5946e7 308->310 312 5947ab-5947c6 310->312 313 5946ed-5946f9 310->313 311->298 314 5945fb-594601 311->314 312->295 312->310 313->312 315 5946ff-594724 313->315 314->298 316 594603-594632 call 593644 314->316 317 594757-59475a 315->317 318 594726-594732 call 593b24 315->318 316->295 316->298 317->312 320 59475c-5947a6 call 593fdc 317->320 325 59474f-594750 318->325 326 594734-594737 318->326 320->312 325->317 327 594739-594745 call 593b24 326->327 328 594747 326->328 330 594749-59474d 327->330 328->330 330->312 330->325
                        APIs
                        • _CallSETranslator.LIBVCRUNTIME ref: 0059462B
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1465002789.0000000000591000.00000040.00001000.00020000.00000000.sdmp, Offset: 00591000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_591000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CallTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3163161869-2084237596
                        • Opcode ID: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction ID: c2692070e20a13b005f11cca4c4cd306cd4c7cb1dd78ea77883950278e2a60b8
                        • Opcode Fuzzy Hash: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction Fuzzy Hash: 29718530518B4D8FDB64DF58D446BAABBE0FB99314F144A5EE489C3211DB74E982CB83

                        Execution Graph

                        Execution Coverage:1.9%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:30
                        Total number of Limit Nodes:4

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.1472454129.000002B6D1451000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002B6D1451000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_2b6d1451000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CreateInfoLocaleThread
                        • String ID: 5
                        • API String ID: 899703944-2226203566
                        • Opcode ID: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction ID: af2dc38bc4c12fdb1efd4ec975a83f0752d80d9d42b9b5a7f684277b130a580f
                        • Opcode Fuzzy Hash: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction Fuzzy Hash: C441DF32314A498BF719EF64D89D7BB77E2FBC8305F44852EE147C21A6DF7884858A42

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.1472454129.000002B6D1451000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002B6D1451000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_2b6d1451000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: FileType
                        • String ID:
                        • API String ID: 3081899298-0
                        • Opcode ID: 96bd17cdbec1199f7060c8e4f9a6f8fd574a155b9e298efd3bd16726f0fb32a2
                        • Instruction ID: 2b5935daf5c53ffc56f1ddb88c0c2a1f49926bc4f715458bd278e32f542a6a18
                        • Opcode Fuzzy Hash: 96bd17cdbec1199f7060c8e4f9a6f8fd574a155b9e298efd3bd16726f0fb32a2
                        • Instruction Fuzzy Hash: 4131B031609E2B9EE7A59B2C948C6747BE0FB0D360F750749E45AC71E4C778D8E18381

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.1472454129.000002B6D1451000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002B6D1451000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_2b6d1451000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Volume$MountNamePoint
                        • String ID:
                        • API String ID: 1269602640-0
                        • Opcode ID: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction ID: dc5393866abd6c33dd319b1e9c6b7a811fc7c5f695af2b35b47ec71a357ea227
                        • Opcode Fuzzy Hash: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction Fuzzy Hash: 380162316086448FFB06EB28D89CBE677E1F76D305F008569E0CAC72A6DEBC8658C741

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.1472454129.000002B6D1451000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002B6D1451000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_2b6d1451000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction ID: 74a0797a9dfb81763b44740a289c31915afda1d313b31a560a27248f2c06693d
                        • Opcode Fuzzy Hash: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction Fuzzy Hash: 81D05E2270030A0FFB187BB859AC33D3761CB49319F0018386903CB6E7CE7E88898702

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 74 2b6d14520b0-2b6d14520d6 MessageBoxA
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.1472454129.000002B6D1451000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002B6D1451000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_2b6d1451000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Message
                        • String ID:
                        • API String ID: 2030045667-0
                        • Opcode ID: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction ID: f0c8c8b179c2aaeca1855f2f357fd550bc39611e5f4a8834ea67c0cbc9ad4e3c
                        • Opcode Fuzzy Hash: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction Fuzzy Hash: 1DC0123016180847E708BB34EC595D136E4FB5C304FD089399407C5450E96D82844A82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 91 2b6d14540b0-2b6d1454117 call 2b6d1455054 94 2b6d145411d-2b6d1454120 91->94 95 2b6d1454578-2b6d145457f call 2b6d1457854 91->95 94->95 96 2b6d1454126-2b6d145412c 94->96 98 2b6d14541fb-2b6d145420d 96->98 99 2b6d1454132-2b6d1454136 96->99 101 2b6d14544c8-2b6d14544cc 98->101 102 2b6d1454213-2b6d1454217 98->102 99->98 103 2b6d145413c-2b6d1454147 99->103 106 2b6d1454505-2b6d145450f call 2b6d145319c 101->106 107 2b6d14544ce-2b6d14544d5 101->107 102->101 104 2b6d145421d-2b6d1454228 102->104 103->98 105 2b6d145414d-2b6d1454152 103->105 104->101 108 2b6d145422e-2b6d1454235 104->108 105->98 109 2b6d1454158-2b6d1454162 call 2b6d145319c 105->109 106->95 119 2b6d1454511-2b6d1454530 call 2b6d145fa80 106->119 107->95 110 2b6d14544db-2b6d1454500 call 2b6d1454580 107->110 112 2b6d145423b-2b6d1454276 call 2b6d145385c 108->112 113 2b6d14543f9-2b6d1454405 108->113 109->119 124 2b6d1454168-2b6d1454193 call 2b6d145319c * 2 call 2b6d1453b64 109->124 110->106 112->113 128 2b6d145427c-2b6d1454286 112->128 113->106 120 2b6d145440b-2b6d145440f 113->120 121 2b6d145441f-2b6d1454427 120->121 122 2b6d1454411-2b6d145441d call 2b6d1453b24 120->122 121->106 127 2b6d145442d-2b6d145443a call 2b6d14536fc 121->127 122->121 135 2b6d1454440-2b6d1454448 122->135 160 2b6d14541b3-2b6d14541bd call 2b6d145319c 124->160 161 2b6d1454195-2b6d1454199 124->161 127->106 127->135 133 2b6d145428a-2b6d14542bc 128->133 137 2b6d14543e8-2b6d14543ef 133->137 138 2b6d14542c2-2b6d14542ce 133->138 140 2b6d145455b-2b6d1454577 call 2b6d145319c * 2 call 2b6d14577c8 135->140 141 2b6d145444e-2b6d1454452 135->141 137->133 144 2b6d14543f5-2b6d14543f6 137->144 138->137 142 2b6d14542d4-2b6d14542ed 138->142 140->95 145 2b6d1454465-2b6d1454466 141->145 146 2b6d1454454-2b6d1454463 call 2b6d1453b24 141->146 148 2b6d14542f3-2b6d1454338 call 2b6d1453b38 * 2 142->148 149 2b6d14543e5-2b6d14543e6 142->149 144->113 154 2b6d1454468-2b6d1454472 call 2b6d14550ec 145->154 146->154 172 2b6d145433a-2b6d1454360 call 2b6d1453b38 call 2b6d14547f0 148->172 173 2b6d1454376-2b6d145437c 148->173 149->137 154->106 167 2b6d1454478-2b6d14544c6 call 2b6d145378c call 2b6d1453990 154->167 160->98 175 2b6d14541bf-2b6d14541df call 2b6d145319c * 2 call 2b6d14550ec 160->175 161->160 166 2b6d145419b-2b6d14541a6 161->166 166->160 168 2b6d14541a8-2b6d14541ad 166->168 167->106 168->95 168->160 190 2b6d1454387-2b6d14543db call 2b6d1453fdc 172->190 191 2b6d1454362-2b6d1454374 172->191 180 2b6d145437e-2b6d1454382 173->180 181 2b6d14543e0-2b6d14543e1 173->181 195 2b6d14541f6-2b6d14541f7 175->195 196 2b6d14541e1-2b6d14541eb call 2b6d14551dc 175->196 180->148 181->149 190->181 191->172 191->173 195->98 199 2b6d1454555-2b6d145455a call 2b6d14577c8 196->199 200 2b6d14541f1-2b6d1454554 call 2b6d1452f74 call 2b6d1454bac call 2b6d14553d8 196->200 199->140 200->199
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.1472454129.000002B6D1451000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002B6D1451000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_2b6d1451000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                        • String ID: csm$csm$csm
                        • API String ID: 849930591-393685449
                        • Opcode ID: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction ID: 48c1e53f531e775990f0d9be91dbff539b65dfe4bc2e413308c046b16ab2d561
                        • Opcode Fuzzy Hash: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction Fuzzy Hash: 7BF19F32A18A098BFB54EF68844D7B977E0FB59314F54061DE489C7297EB78D881CB82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 210 2b6d1454930-2b6d1454978 call 2b6d1453144 call 2b6d145319c 215 2b6d145497a-2b6d1454980 210->215 216 2b6d14549b2-2b6d14549b6 210->216 215->216 217 2b6d1454982-2b6d1454984 215->217 218 2b6d1454a4a-2b6d1454a4e 216->218 219 2b6d14549bc-2b6d14549c0 216->219 220 2b6d1454996-2b6d1454998 217->220 221 2b6d1454986-2b6d145498a 217->221 224 2b6d1454a92-2b6d1454a98 218->224 225 2b6d1454a50-2b6d1454a5c 218->225 222 2b6d14549c6-2b6d14549ce 219->222 223 2b6d1454b41 219->223 220->216 229 2b6d145499a-2b6d14549a6 220->229 221->229 230 2b6d145498c-2b6d1454994 221->230 222->223 233 2b6d14549d4-2b6d14549d8 222->233 228 2b6d1454b46-2b6d1454b60 223->228 231 2b6d1454a9a-2b6d1454a9e 224->231 232 2b6d1454b08-2b6d1454b3c call 2b6d14540b0 224->232 226 2b6d1454a72-2b6d1454a7e 225->226 227 2b6d1454a5e-2b6d1454a62 225->227 226->223 236 2b6d1454a84-2b6d1454a8c 226->236 227->226 234 2b6d1454a64-2b6d1454a70 call 2b6d1453b24 227->234 229->216 238 2b6d14549a8-2b6d14549ac 229->238 230->216 230->220 231->232 237 2b6d1454aa0-2b6d1454aa7 231->237 232->223 239 2b6d14549da-2b6d14549dc 233->239 240 2b6d1454a37-2b6d1454a45 call 2b6d1453728 233->240 234->224 234->226 236->223 236->224 237->232 242 2b6d1454aa9-2b6d1454ab1 237->242 238->216 238->223 244 2b6d1454a15-2b6d1454a17 239->244 245 2b6d14549de-2b6d14549f0 call 2b6d1453cb4 239->245 240->223 242->232 249 2b6d1454ab3-2b6d1454ac6 call 2b6d1453b38 242->249 244->240 248 2b6d1454a19-2b6d1454a21 244->248 253 2b6d1454b61-2b6d1454b67 call 2b6d1457854 245->253 255 2b6d14549f6-2b6d14549f9 245->255 252 2b6d1454a27-2b6d1454a2b 248->252 248->253 249->232 262 2b6d1454ac8-2b6d1454b06 249->262 252->253 257 2b6d1454a31-2b6d1454a35 252->257 255->253 259 2b6d14549ff-2b6d1454a03 255->259 261 2b6d1454a05-2b6d1454a10 call 2b6d1454ec8 257->261 259->261 261->223 262->228
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.1472454129.000002B6D1451000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002B6D1451000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_2b6d1451000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                        • String ID: csm$csm
                        • API String ID: 3896166516-3733052814
                        • Opcode ID: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction ID: bb4e8404a58223edbccd87f4b33a88a130b6ad8a900d1629033c2b858a19d65b
                        • Opcode Fuzzy Hash: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction Fuzzy Hash: E4715132714A068BFBA8DB18808D775B7E1FB5C311F58465A9489CB693EBB898C0C746

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.1472454129.000002B6D1451000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002B6D1451000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_2b6d1451000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CallTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3163161869-2084237596
                        • Opcode ID: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction ID: 587f43465414dd1b3d20866ee1da96db3d799e2f11420403a121a10830a98c29
                        • Opcode Fuzzy Hash: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction Fuzzy Hash: 68719331618B498FE764DF18D44ABBAB7E0FB9D300F044A5DE489C7152E7B8A5C1C782

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 266 2b6d1452cf0-2b6d1452d36 call 2b6d1453144 269 2b6d1452e2d-2b6d1452e34 266->269 270 2b6d1452d3c-2b6d1452d46 266->270 271 2b6d1452ed8-2b6d1452ede 269->271 272 2b6d1452e19-2b6d1452e1b 270->272 275 2b6d1452e39-2b6d1452e47 271->275 276 2b6d1452ee4 271->276 273 2b6d1452d4b-2b6d1452d59 272->273 274 2b6d1452e21 272->274 280 2b6d1452e17 273->280 281 2b6d1452d5f-2b6d1452d66 273->281 274->276 277 2b6d1452e4d-2b6d1452e55 275->277 278 2b6d1452ed6 275->278 279 2b6d1452ee9-2b6d1452f06 276->279 277->278 282 2b6d1452e57-2b6d1452e5b 277->282 278->271 280->272 281->280 283 2b6d1452d6c-2b6d1452d71 281->283 284 2b6d1452e5d-2b6d1452e62 282->284 285 2b6d1452e9c-2b6d1452ead 282->285 283->280 286 2b6d1452d77-2b6d1452d7c 283->286 287 2b6d1452e98-2b6d1452e9a 284->287 288 2b6d1452e64-2b6d1452e70 284->288 291 2b6d1452ebf-2b6d1452ed3 285->291 292 2b6d1452eaf-2b6d1452eb5 285->292 289 2b6d1452d99-2b6d1452d9f 286->289 290 2b6d1452d7e-2b6d1452d91 286->290 287->276 287->285 295 2b6d1452e72-2b6d1452e79 288->295 296 2b6d1452e91-2b6d1452e96 288->296 293 2b6d1452dc9-2b6d1452e12 call 2b6d1453110 call 2b6d1453140 289->293 294 2b6d1452da1-2b6d1452da9 289->294 303 2b6d1452d97 290->303 304 2b6d1452e26-2b6d1452e28 290->304 291->278 292->278 297 2b6d1452eb7-2b6d1452ebb 292->297 293->280 294->293 299 2b6d1452dab-2b6d1452db9 call 2b6d145f940 294->299 295->296 301 2b6d1452e7b-2b6d1452e84 295->301 296->287 296->288 297->276 298 2b6d1452ebd 297->298 298->278 299->293 309 2b6d1452dbb-2b6d1452dc1 299->309 301->296 307 2b6d1452e86-2b6d1452e8f 301->307 303->280 303->289 304->279 307->287 307->296 309->293
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.1472454129.000002B6D1451000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002B6D1451000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_2b6d1451000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CurrentImageNonwritable__except_validate_context_record
                        • String ID: csm
                        • API String ID: 3242871069-1018135373
                        • Opcode ID: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction ID: bcd4fd8dc9a2b07bce40584e9dfff7d2097f0740367030f7f8944fca6abf566e
                        • Opcode Fuzzy Hash: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction Fuzzy Hash: 5B717531308A06CBEB68EE5CD48DB7873D1FB58360F10456EE886C7296E768EC918685

                        Execution Graph

                        Execution Coverage:1.5%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:23
                        Total number of Limit Nodes:2

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.1472814726.00000260C5271000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000260C5271000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_260c5271000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CreateInfoLocaleThread
                        • String ID: 5
                        • API String ID: 899703944-2226203566
                        • Opcode ID: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction ID: 63578b136c440dd781ff112f2ccdc8353653827318cf4967010d958f48963c3a
                        • Opcode Fuzzy Hash: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction Fuzzy Hash: 2641B2302146448BE71AEF24D8ED7AF77E1FBD9341F40862EE147C21E6DE399809DA42

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000006.00000002.1472814726.00000260C5271000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000260C5271000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_260c5271000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Volume$MountNamePoint
                        • String ID:
                        • API String ID: 1269602640-0
                        • Opcode ID: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction ID: e38af264b15f824377dfdaaa6683ba3355f0f9d401628a75b3ebc72a1d76c984
                        • Opcode Fuzzy Hash: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction Fuzzy Hash: 230144305085448FFB06EB28D898BD676E1F769305F008669E0CAC72A6DE7D8558C741

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000006.00000002.1472814726.00000260C5271000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000260C5271000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_260c5271000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction ID: 2a55f440f2af183f3ac531a7a6af9a677d59a4c0b855dadbfafb264839a88bcc
                        • Opcode Fuzzy Hash: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction Fuzzy Hash: 6AD05B343003050FFB19BBB499DD72E2691C74A285F0019396513C76D7CD3B9C558703

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 55 260c52720b0-260c52720d6 MessageBoxA
                        APIs
                        Memory Dump Source
                        • Source File: 00000006.00000002.1472814726.00000260C5271000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000260C5271000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_260c5271000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Message
                        • String ID:
                        • API String ID: 2030045667-0
                        • Opcode ID: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction ID: f0c8c8b179c2aaeca1855f2f357fd550bc39611e5f4a8834ea67c0cbc9ad4e3c
                        • Opcode Fuzzy Hash: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction Fuzzy Hash: 1DC0123016180847E708BB34EC595D136E4FB5C304FD089399407C5450E96D82844A82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 72 260c52740b0-260c5274117 call 260c5275054 75 260c527411d-260c5274120 72->75 76 260c5274578-260c527457f call 260c5277854 72->76 75->76 77 260c5274126-260c527412c 75->77 79 260c5274132-260c5274136 77->79 80 260c52741fb-260c527420d 77->80 79->80 84 260c527413c-260c5274147 79->84 82 260c5274213-260c5274217 80->82 83 260c52744c8-260c52744cc 80->83 82->83 85 260c527421d-260c5274228 82->85 87 260c5274505-260c527450f call 260c527319c 83->87 88 260c52744ce-260c52744d5 83->88 84->80 86 260c527414d-260c5274152 84->86 85->83 89 260c527422e-260c5274235 85->89 86->80 90 260c5274158-260c5274162 call 260c527319c 86->90 87->76 101 260c5274511-260c5274530 call 260c527fa80 87->101 88->76 91 260c52744db-260c5274500 call 260c5274580 88->91 93 260c527423b-260c5274276 call 260c527385c 89->93 94 260c52743f9-260c5274405 89->94 90->101 105 260c5274168-260c5274193 call 260c527319c * 2 call 260c5273b64 90->105 91->87 93->94 109 260c527427c-260c5274286 93->109 94->87 98 260c527440b-260c527440f 94->98 102 260c5274411-260c527441d call 260c5273b24 98->102 103 260c527441f-260c5274427 98->103 102->103 116 260c5274440-260c5274448 102->116 103->87 108 260c527442d-260c527443a call 260c52736fc 103->108 141 260c5274195-260c5274199 105->141 142 260c52741b3-260c52741bd call 260c527319c 105->142 108->87 108->116 114 260c527428a-260c52742bc 109->114 118 260c52742c2-260c52742ce 114->118 119 260c52743e8-260c52743ef 114->119 121 260c527444e-260c5274452 116->121 122 260c527455b-260c5274577 call 260c527319c * 2 call 260c52777c8 116->122 118->119 123 260c52742d4-260c52742ed 118->123 119->114 125 260c52743f5-260c52743f6 119->125 126 260c5274465-260c5274466 121->126 127 260c5274454-260c5274463 call 260c5273b24 121->127 122->76 129 260c52743e5-260c52743e6 123->129 130 260c52742f3-260c5274338 call 260c5273b38 * 2 123->130 125->94 135 260c5274468-260c5274472 call 260c52750ec 126->135 127->135 129->119 154 260c5274376-260c527437c 130->154 155 260c527433a-260c5274360 call 260c5273b38 call 260c52747f0 130->155 135->87 149 260c5274478-260c52744c6 call 260c527378c call 260c5273990 135->149 141->142 144 260c527419b-260c52741a6 141->144 142->80 157 260c52741bf-260c52741df call 260c527319c * 2 call 260c52750ec 142->157 144->142 150 260c52741a8-260c52741ad 144->150 149->87 150->76 150->142 161 260c52743e0-260c52743e1 154->161 162 260c527437e-260c5274382 154->162 171 260c5274387-260c52743db call 260c5273fdc 155->171 172 260c5274362-260c5274374 155->172 176 260c52741f6-260c52741f7 157->176 177 260c52741e1-260c52741eb call 260c52751dc 157->177 161->129 162->130 171->161 172->154 172->155 176->80 180 260c5274555-260c527455a call 260c52777c8 177->180 181 260c52741f1-260c5274554 call 260c5272f74 call 260c5274bac call 260c52753d8 177->181 180->122 181->180
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.1472814726.00000260C5271000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000260C5271000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_260c5271000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                        • String ID: csm$csm$csm
                        • API String ID: 849930591-393685449
                        • Opcode ID: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction ID: 72ae6ad49c49a9bb8b5b6ccc20b97b4e0bf7e28f274f2ab1f13fc5e2f7e5a44a
                        • Opcode Fuzzy Hash: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction Fuzzy Hash: 99F18E34518A488BEB55EF68C4997AE77E0FB6E350F50035EE489C3292DB31DC91DB82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 191 260c5274930-260c5274978 call 260c5273144 call 260c527319c 196 260c52749b2-260c52749b6 191->196 197 260c527497a-260c5274980 191->197 199 260c52749bc-260c52749c0 196->199 200 260c5274a4a-260c5274a4e 196->200 197->196 198 260c5274982-260c5274984 197->198 203 260c5274996-260c5274998 198->203 204 260c5274986-260c527498a 198->204 205 260c52749c6-260c52749ce 199->205 206 260c5274b41 199->206 201 260c5274a92-260c5274a98 200->201 202 260c5274a50-260c5274a5c 200->202 212 260c5274a9a-260c5274a9e 201->212 213 260c5274b08-260c5274b3c call 260c52740b0 201->213 207 260c5274a72-260c5274a7e 202->207 208 260c5274a5e-260c5274a62 202->208 203->196 211 260c527499a-260c52749a6 203->211 210 260c527498c-260c5274994 204->210 204->211 205->206 214 260c52749d4-260c52749d8 205->214 209 260c5274b46-260c5274b60 206->209 207->206 219 260c5274a84-260c5274a8c 207->219 208->207 217 260c5274a64-260c5274a70 call 260c5273b24 208->217 210->196 210->203 211->196 221 260c52749a8-260c52749ac 211->221 212->213 220 260c5274aa0-260c5274aa7 212->220 213->206 215 260c5274a37-260c5274a45 call 260c5273728 214->215 216 260c52749da-260c52749dc 214->216 215->206 222 260c5274a15-260c5274a17 216->222 223 260c52749de-260c52749f0 call 260c5273cb4 216->223 217->201 217->207 219->201 219->206 220->213 225 260c5274aa9-260c5274ab1 220->225 221->196 221->206 222->215 229 260c5274a19-260c5274a21 222->229 234 260c5274b61-260c5274b67 call 260c5277854 223->234 236 260c52749f6-260c52749f9 223->236 225->213 230 260c5274ab3-260c5274ac6 call 260c5273b38 225->230 233 260c5274a27-260c5274a2b 229->233 229->234 230->213 243 260c5274ac8-260c5274b06 230->243 233->234 238 260c5274a31-260c5274a35 233->238 236->234 240 260c52749ff-260c5274a03 236->240 242 260c5274a05-260c5274a10 call 260c5274ec8 238->242 240->242 242->206 243->209
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.1472814726.00000260C5271000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000260C5271000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_260c5271000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                        • String ID: csm$csm
                        • API String ID: 3896166516-3733052814
                        • Opcode ID: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction ID: 44a094064ec661cf13047acb2054040e7b1d0cd6a2b4209a15c4b9e74b22d798
                        • Opcode Fuzzy Hash: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction Fuzzy Hash: A671A034504E048BEBA9DB18C0ED36AB3D1FBAD341F64575F9489C7692CB329CA0D782

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.1472814726.00000260C5271000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000260C5271000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_260c5271000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CallTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3163161869-2084237596
                        • Opcode ID: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction ID: 0db43cf1e2dcd0929205e27b57ac90ebfb4c687a1193fa82fc22602dc17b72f6
                        • Opcode Fuzzy Hash: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction Fuzzy Hash: BA71C230518B488FE765DF18C48ABAAB7E0FB9E340F044B5EE489C3152D775A991CB86

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 247 260c5272cf0-260c5272d36 call 260c5273144 250 260c5272e2d-260c5272e34 247->250 251 260c5272d3c-260c5272d46 247->251 253 260c5272ed8-260c5272ede 250->253 252 260c5272e19-260c5272e1b 251->252 254 260c5272e21 252->254 255 260c5272d4b-260c5272d59 252->255 256 260c5272ee4 253->256 257 260c5272e39-260c5272e47 253->257 254->256 258 260c5272e17 255->258 259 260c5272d5f-260c5272d66 255->259 262 260c5272ee9-260c5272f06 256->262 260 260c5272ed6 257->260 261 260c5272e4d-260c5272e55 257->261 258->252 259->258 263 260c5272d6c-260c5272d71 259->263 260->253 261->260 264 260c5272e57-260c5272e5b 261->264 263->258 265 260c5272d77-260c5272d7c 263->265 266 260c5272e5d-260c5272e62 264->266 267 260c5272e9c-260c5272ead 264->267 268 260c5272d7e-260c5272d91 265->268 269 260c5272d99-260c5272d9f 265->269 272 260c5272e64-260c5272e70 266->272 273 260c5272e98-260c5272e9a 266->273 270 260c5272ebf-260c5272ed3 267->270 271 260c5272eaf-260c5272eb5 267->271 286 260c5272d97 268->286 287 260c5272e26-260c5272e28 268->287 277 260c5272da1-260c5272da9 269->277 278 260c5272dc9-260c5272e12 call 260c5273110 call 260c5273140 269->278 270->260 271->260 276 260c5272eb7-260c5272ebb 271->276 274 260c5272e72-260c5272e79 272->274 275 260c5272e91-260c5272e96 272->275 273->256 273->267 274->275 279 260c5272e7b-260c5272e84 274->279 275->272 275->273 276->256 282 260c5272ebd 276->282 277->278 283 260c5272dab-260c5272db9 call 260c527f940 277->283 278->258 279->275 284 260c5272e86-260c5272e8f 279->284 282->260 283->278 291 260c5272dbb-260c5272dc1 283->291 284->273 284->275 286->258 286->269 287->262 291->278
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.1472814726.00000260C5271000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000260C5271000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_260c5271000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CurrentImageNonwritable__except_validate_context_record
                        • String ID: csm
                        • API String ID: 3242871069-1018135373
                        • Opcode ID: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction ID: 51471664804008f50882f8372d33b9529ad6e5a9791549005e2e71ab20a57a37
                        • Opcode Fuzzy Hash: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction Fuzzy Hash: 1171C434608A048BEB29EE1CD4D977A73D1FB59390F10466FE886C3296EB21FC619781