Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
yjF33u9fqZ.dll

Overview

General Information

Sample name:yjF33u9fqZ.dll
(renamed file extension from exe to dll, renamed because original name is a hash value)
Original sample name:a689d6c88b72b5b148ac581fcbe71902.dll.exe
Analysis ID:1561761
MD5:a689d6c88b72b5b148ac581fcbe71902
SHA1:7fe590156c8b831e0033fc971a90a949ce50f085
SHA256:410cbc2d187ca80ce22eadb4fbe77d5af071bc7c9f747f50e2ddf765167ba7d4
Tags:dllexeStrelaStealeruser-abuse_ch
Infos:

Detection

Strela Stealer
Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Strela Stealer
Machine Learning detection for sample
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
PE file does not import any functions
Program does not show much activity (idle)
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 2940 cmdline: loaddll64.exe "C:\Users\user\Desktop\yjF33u9fqZ.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 3712 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1272 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\yjF33u9fqZ.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 1840 cmdline: rundll32.exe "C:\Users\user\Desktop\yjF33u9fqZ.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • regsvr32.exe (PID: 3568 cmdline: regsvr32.exe /s C:\Users\user\Desktop\yjF33u9fqZ.dll MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
    • rundll32.exe (PID: 1868 cmdline: rundll32.exe C:\Users\user\Desktop\yjF33u9fqZ.dll,DllRegisterServer MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000005.00000002.1496761580.00007FFBC31D7000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
    00000003.00000002.1496317670.0000000002711000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
      00000003.00000002.1496681049.00007FFBC31D7000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
        00000005.00000002.1496397137.00000186B59A1000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
          00000006.00000002.1496870393.00007FFBC31D7000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            6.2.rundll32.exe.7ffbc31d7404.1.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
              6.2.rundll32.exe.7ffbc31d0000.0.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
                3.2.regsvr32.exe.7ffbc31d7404.1.raw.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
                  0.2.loaddll64.exe.7ffbc31d7404.1.raw.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
                    6.2.rundll32.exe.7ffbc31d7404.1.raw.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
                      Click to see the 7 entries
                      No Sigma rule has matched
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: yjF33u9fqZ.dllReversingLabs: Detection: 50%
                      Source: yjF33u9fqZ.dllVirustotal: Detection: 50%Perma Link
                      Source: yjF33u9fqZ.dllJoe Sandbox ML: detected
                      Source: yjF33u9fqZ.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFBC31D10000_2_00007FFBC31D1000
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF215A00_2_0000023BEAF215A0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF2F4E80_2_0000023BEAF2F4E8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF272BC0_2_0000023BEAF272BC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF21A900_2_0000023BEAF21A90
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF210900_2_0000023BEAF21090
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_027172BC3_2_027172BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02711A903_2_02711A90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0271F4E83_2_0271F4E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_027110903_2_02711090
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_027115A03_2_027115A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000186B59A1A905_2_00000186B59A1A90
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000186B59A72BC5_2_00000186B59A72BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000186B59A15A05_2_00000186B59A15A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000186B59AF4E85_2_00000186B59AF4E8
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000186B59A10905_2_00000186B59A1090
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000002AB0BF3F4E86_2_000002AB0BF3F4E8
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000002AB0BF310906_2_000002AB0BF31090
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000002AB0BF372BC6_2_000002AB0BF372BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000002AB0BF31A906_2_000002AB0BF31A90
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000002AB0BF315A06_2_000002AB0BF315A0
                      Source: yjF33u9fqZ.dllStatic PE information: No import functions for PE file found
                      Source: classification engineClassification label: mal60.troj.winDLL@10/0@0/0
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3712:120:WilError_03
                      Source: yjF33u9fqZ.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\yjF33u9fqZ.dll,DllRegisterServer
                      Source: yjF33u9fqZ.dllReversingLabs: Detection: 50%
                      Source: yjF33u9fqZ.dllVirustotal: Detection: 50%
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\yjF33u9fqZ.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\yjF33u9fqZ.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\yjF33u9fqZ.dll
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\yjF33u9fqZ.dll,DllRegisterServer
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\yjF33u9fqZ.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\yjF33u9fqZ.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\yjF33u9fqZ.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\yjF33u9fqZ.dll,DllRegisterServerJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\yjF33u9fqZ.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeAutomated click: OK
                      Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: yjF33u9fqZ.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: yjF33u9fqZ.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\yjF33u9fqZ.dll
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF375DE push ecx; retf 003Fh0_2_0000023BEAF3763E
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF2BBA2 push esp; ret 0_2_0000023BEAF2BBA5
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF31310 push esi; retf 0_2_0000023BEAF31313
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF31318 push ebp; retf 0_2_0000023BEAF3131B
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF31300 push ebp; retf 0_2_0000023BEAF31303
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF3130A push esi; retf 0_2_0000023BEAF3130B
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF312EC push ebp; retf 0_2_0000023BEAF312F3
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF312FA push ebp; retf 0_2_0000023BEAF312FB
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF312DC push ebp; retf 0_2_0000023BEAF312E3
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF312E4 push ebp; retf 0_2_0000023BEAF312EB
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF2CC9C push ebx; retf 0_2_0000023BEAF2CC9D
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF2CCA8 push 6F0000CBh; retf 0_2_0000023BEAF2CCAD
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF2CC6C push esi; retf 0000h0_2_0000023BEAF2CC6D
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF2CC35 push cs; retf 0000h0_2_0000023BEAF2CC59
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF311CC push ebp; retf 0_2_0000023BEAF311DB
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF311BC push ebp; retf 0_2_0000023BEAF311CB
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF31191 push esi; retf 0_2_0000023BEAF31193
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF31194 push ebp; retf 0_2_0000023BEAF311BB
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF3116C push ebp; retf 0_2_0000023BEAF3117B
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF31150 push ebp; retf 0_2_0000023BEAF31153
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF31154 push ebp; retf 0_2_0000023BEAF3116B
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF3114A push esi; retf 0_2_0000023BEAF3114B
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF3111C push esi; retf 0_2_0000023BEAF310FB
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF3111C push esi; retf 0_2_0000023BEAF31143
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF3110C push esi; retf 0_2_0000023BEAF31113
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF31114 push esi; retf 0_2_0000023BEAF3111B
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF310FC push ebp; retf 0_2_0000023BEAF3115B
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF31104 push esi; retf 0_2_0000023BEAF3110B
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF310EC push esi; retf 0_2_0000023BEAF310FB
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF310DC push esi; retf 0_2_0000023BEAF310E3
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000023BEAF310E4 push esi; retf 0_2_0000023BEAF310EB
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\yjF33u9fqZ.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeCode function: GetConsoleWindow,CreateThread,GetLocaleInfoA,0_2_0000023BEAF220E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: CreateThread,GetLocaleInfoA,3_2_027120E0
                      Source: C:\Windows\System32\rundll32.exeCode function: CreateThread,GetLocaleInfoA,5_2_00000186B59A20E0
                      Source: C:\Windows\System32\rundll32.exeCode function: CreateThread,GetLocaleInfoA,6_2_000002AB0BF320E0

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 6.2.rundll32.exe.7ffbc31d7404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.7ffbc31d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.7ffbc31d7404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ffbc31d7404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.7ffbc31d7404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.7ffbc31d7404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ffbc31d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.7ffbc31d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ffbc31d7404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ffbc31d7404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ffbc31d7404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ffbc31d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.1496761580.00007FFBC31D7000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1496317670.0000000002711000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1496681049.00007FFBC31D7000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1496397137.00000186B59A1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.1496870393.00007FFBC31D7000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1523579969.0000023BEAF21000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1527182250.00007FFBC31D7000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.1496760430.000002AB0BF31000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 2940, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 3568, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 1868, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 1840, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 6.2.rundll32.exe.7ffbc31d7404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.7ffbc31d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.7ffbc31d7404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ffbc31d7404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.7ffbc31d7404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.7ffbc31d7404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ffbc31d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.7ffbc31d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ffbc31d7404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ffbc31d7404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ffbc31d7404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ffbc31d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.1496761580.00007FFBC31D7000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1496317670.0000000002711000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1496681049.00007FFBC31D7000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1496397137.00000186B59A1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.1496870393.00007FFBC31D7000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1523579969.0000023BEAF21000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1527182250.00007FFBC31D7000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.1496760430.000002AB0BF31000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 2940, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 3568, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 1868, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 1840, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                      DLL Side-Loading
                      11
                      Process Injection
                      1
                      Regsvr32
                      OS Credential Dumping11
                      System Information Discovery
                      Remote Services1
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Rundll32
                      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                      Process Injection
                      Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      DLL Side-Loading
                      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Obfuscated Files or Information
                      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1561761 Sample: yjF33u9fqZ.exe Startdate: 24/11/2024 Architecture: WINDOWS Score: 60 19 Multi AV Scanner detection for submitted file 2->19 21 Yara detected Strela Stealer 2->21 23 Machine Learning detection for sample 2->23 7 loaddll64.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 regsvr32.exe 7->11         started        13 rundll32.exe 7->13         started        15 conhost.exe 7->15         started        process5 17 rundll32.exe 9->17         started       

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      yjF33u9fqZ.dll50%ReversingLabsWin64.Trojan.Generic
                      yjF33u9fqZ.dll50%VirustotalBrowse
                      yjF33u9fqZ.dll100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No contacted domains info
                      No contacted IP infos
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1561761
                      Start date and time:2024-11-24 08:41:53 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 2m 35s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:7
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:yjF33u9fqZ.dll
                      (renamed file extension from exe to dll, renamed because original name is a hash value)
                      Original Sample Name:a689d6c88b72b5b148ac581fcbe71902.dll.exe
                      Detection:MAL
                      Classification:mal60.troj.winDLL@10/0@0/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 19
                      • Number of non-executed functions: 21
                      Cookbook Comments:
                      • Stop behavior analysis, all processes terminated
                      • Exclude process from analysis (whitelisted): dllhost.exe
                      • Not all processes where analyzed, report is missing behavior information
                      No simulations
                      No context
                      No context
                      No context
                      No context
                      No context
                      No created / dropped files found
                      File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Entropy (8bit):7.730667754251411
                      TrID:
                      • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                      • Win64 Executable (generic) (12005/4) 10.17%
                      • Generic Win/DOS Executable (2004/3) 1.70%
                      • DOS Executable Generic (2002/1) 1.70%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                      File name:yjF33u9fqZ.dll
                      File size:142'336 bytes
                      MD5:a689d6c88b72b5b148ac581fcbe71902
                      SHA1:7fe590156c8b831e0033fc971a90a949ce50f085
                      SHA256:410cbc2d187ca80ce22eadb4fbe77d5af071bc7c9f747f50e2ddf765167ba7d4
                      SHA512:fa24974e5f061be72e3fc96bb5fd811d2b2df42b8285a68aed5c7575523a41c57399c8f12fdb0e0f489f8140ae4ef69d0c1e7a21ed2e75f201fde063df20780c
                      SSDEEP:3072:eyvnNShFEwLotu9CMqNwnPKgg3vXvOnIhu70FCWE7ik:NnN1wL19CMAwSN//OCE0MWc
                      TLSH:08D3E04B64D4747EF32248B664B88AF00246ADC7431DE5F370EF5521673B3498AA1FE6
                      File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d.....1g.........." .....J...........Y.......................................p............`........................................
                      Icon Hash:7ae282899bbab082
                      Entrypoint:0x1800059b0
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x180000000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                      Time Stamp:0x6731A0B7 [Mon Nov 11 06:14:15 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:
                      Instruction
                      mov eax, 00000001h
                      ret
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x62600x51.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x260000x1a8.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x250000xc.pdata
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x49b60x4a0096bdaefc7f5893af5f2da0c1d16c3e65False0.650073902027027data6.79319874185311IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x60000x2f40x4003ac46f946318536d4f869dd911082c03False0.232421875data4.893742051729495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x70000x1d4980x1d60005e6fcfb3916eccc28772bcdebbe613dFalse0.8683011968085106data7.735103278254442IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .pdata0x250000xc0x2009e4b904bbd4603c429cab8fc3c432c47False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .rsrc0x260000x1a80x200082774175c3ed4a63cb8411ddc72bd3dFalse0.482421875data4.182807530451981IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_MANIFEST0x260600x143XML 1.0 document, ASCII textEnglishUnited States0.628482972136223
                      NameOrdinalAddress
                      DllRegisterServer10x180001000
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      No network behavior found

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:02:42:52
                      Start date:24/11/2024
                      Path:C:\Windows\System32\loaddll64.exe
                      Wow64 process (32bit):false
                      Commandline:loaddll64.exe "C:\Users\user\Desktop\yjF33u9fqZ.dll"
                      Imagebase:0x7ff6c2c90000
                      File size:165'888 bytes
                      MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000000.00000002.1523579969.0000023BEAF21000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000000.00000002.1527182250.00007FFBC31D7000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:true

                      Target ID:1
                      Start time:02:42:52
                      Start date:24/11/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6ee680000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:2
                      Start time:02:42:52
                      Start date:24/11/2024
                      Path:C:\Windows\System32\cmd.exe
                      Wow64 process (32bit):false
                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\yjF33u9fqZ.dll",#1
                      Imagebase:0x7ff64cb50000
                      File size:289'792 bytes
                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:3
                      Start time:02:42:52
                      Start date:24/11/2024
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:regsvr32.exe /s C:\Users\user\Desktop\yjF33u9fqZ.dll
                      Imagebase:0x7ff734cf0000
                      File size:25'088 bytes
                      MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000003.00000002.1496317670.0000000002711000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000003.00000002.1496681049.00007FFBC31D7000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:true

                      Target ID:5
                      Start time:02:42:52
                      Start date:24/11/2024
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe C:\Users\user\Desktop\yjF33u9fqZ.dll,DllRegisterServer
                      Imagebase:0x7ff79c430000
                      File size:71'680 bytes
                      MD5 hash:EF3179D498793BF4234F708D3BE28633
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000005.00000002.1496761580.00007FFBC31D7000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000005.00000002.1496397137.00000186B59A1000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:true

                      Target ID:6
                      Start time:02:42:52
                      Start date:24/11/2024
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe "C:\Users\user\Desktop\yjF33u9fqZ.dll",#1
                      Imagebase:0x7ff79c430000
                      File size:71'680 bytes
                      MD5 hash:EF3179D498793BF4234F708D3BE28633
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000006.00000002.1496870393.00007FFBC31D7000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000006.00000002.1496760430.000002AB0BF31000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:4.2%
                        Dynamic/Decrypted Code Coverage:81.1%
                        Signature Coverage:32.4%
                        Total number of Nodes:37
                        Total number of Limit Nodes:6
                        execution_graph 6005 23beaf220b0 MessageBoxA 6006 23beaf21000 6007 23beaf2101b __scrt_get_show_window_mode 6006->6007 6008 23beaf2103a GetVolumeNameForVolumeMountPointA 6007->6008 6009 23beaf21061 6008->6009 6010 23beaf22380 6020 23beaf22544 6010->6020 6012 23beaf22394 __scrt_get_show_window_mode __scrt_acquire_startup_lock __scrt_release_startup_lock 6012->6010 6014 23beaf223df 6012->6014 6015 23beaf220e0 GetConsoleWindow 6012->6015 6016 23beaf220fe CreateThread 6015->6016 6018 23beaf22131 __scrt_get_show_window_mode 6016->6018 6017 23beaf221cd GetLocaleInfoA 6019 23beaf22200 __std_exception_copy __scrt_get_show_window_mode 6017->6019 6018->6017 6018->6019 6019->6012 6021 23beaf2254c 6020->6021 6022 23beaf22558 __scrt_dllmain_crt_thread_attach 6021->6022 6023 23beaf22561 6022->6023 6023->6012 6024 7ffbc31d1000 6027 7ffbc31d10cb 6024->6027 6025 7ffbc31d3742 VirtualAlloc 6030 7ffbc31d37f0 6025->6030 6026 7ffbc31d10cf 6026->6026 6027->6025 6027->6026 6027->6030 6028 7ffbc31d47f2 LoadLibraryA 6028->6030 6029 7ffbc31d3d50 6029->6029 6030->6028 6030->6029 6031 23beaf2a984 6033 23beaf2a994 Concurrency::details::SchedulerProxy::DeleteThis 6031->6033 6032 23beaf2a9ab Concurrency::details::SchedulerProxy::DeleteThis 6033->6032 6035 23beaf2a87c 6033->6035 6036 23beaf2a89a 6035->6036 6037 23beaf2a969 6036->6037 6038 23beaf2a908 GetFileType 6036->6038 6037->6032 6038->6036 6039 23beaf26e99 6043 23beaf26e9e 6039->6043 6040 23beaf26f52 6043->6040 6044 23beaf26f68 6043->6044 6045 23beaf26f75 6044->6045 6046 23beaf26f91 ExitProcess 6045->6046
                        Strings
                        • FacAsgbFtlXqEhswQZCLCQjgrPwhXurhpfuViCHOCyjcDIHvAgpeLwKyxuKMVRrfpvZDoLvHodCJiCHoBTTWSdZVXdvTSCFQKEzEBQAVrTlLtxgVvqGTjVYjJMIRBbxdXHVfKEKVlCmOHFturxmdYSioLvUWgpKTcCckcAopfKYSVVrjnhkEXsJbTpsyLHSbMefEjhjaSRcdAxzwOjQJOFoYfEhTyuTdEzCtPkSkdPZBMuuCJJMXctIteTJWtDuQKSko, xrefs: 00007FFBC31D2437
                        Memory Dump Source
                        • Source File: 00000000.00000002.1527100021.00007FFBC31D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBC31D0000, based on PE: true
                        • Associated: 00000000.00000002.1526930320.00007FFBC31D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1527136366.00007FFBC31D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1527182250.00007FFBC31D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1527356722.00007FFBC31F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ffbc31d0000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: FacAsgbFtlXqEhswQZCLCQjgrPwhXurhpfuViCHOCyjcDIHvAgpeLwKyxuKMVRrfpvZDoLvHodCJiCHoBTTWSdZVXdvTSCFQKEzEBQAVrTlLtxgVvqGTjVYjJMIRBbxdXHVfKEKVlCmOHFturxmdYSioLvUWgpKTcCckcAopfKYSVVrjnhkEXsJbTpsyLHSbMefEjhjaSRcdAxzwOjQJOFoYfEhTyuTdEzCtPkSkdPZBMuuCJJMXctIteTJWtDuQKSko
                        • API String ID: 0-977244299
                        • Opcode ID: e2a491c31f411c211f0efa711c27821d672d411da4d5a25e27f95955906d2a99
                        • Instruction ID: 7069355d86c5e567138c95bc70ac94d44e3d8adb1a86027927b06bbb3c8af205
                        • Opcode Fuzzy Hash: e2a491c31f411c211f0efa711c27821d672d411da4d5a25e27f95955906d2a99
                        • Instruction Fuzzy Hash: 4673AABBF64A514AEB058F36A8523FB6782AB937A4F48E331DD19637D0DE2DD5058300

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1523579969.0000023BEAF21000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023BEAF21000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_23beaf21000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: ConsoleCreateInfoLocaleThreadWindow
                        • String ID: 5
                        • API String ID: 1307802651-2226203566
                        • Opcode ID: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction ID: a47c12a13697e8553877d333ac2f5699e43d1880da9f623826ba50abf39734e4
                        • Opcode Fuzzy Hash: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction Fuzzy Hash: 4441A2302146448BF71AEF28D8AD7EB77E5FFD5305F80852DE247C61A5DF3885058A92

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 449 23beaf2a87c-23beaf2a898 450 23beaf2a89a-23beaf2a8c3 449->450 451 23beaf2a8cf-23beaf2a8d8 450->451 452 23beaf2a8c5-23beaf2a8ca 450->452 454 23beaf2a8f0 451->454 455 23beaf2a8da-23beaf2a8dd 451->455 453 23beaf2a95a-23beaf2a963 452->453 453->450 459 23beaf2a969-23beaf2a983 453->459 458 23beaf2a8f5-23beaf2a906 454->458 456 23beaf2a8df-23beaf2a8e7 455->456 457 23beaf2a8e9-23beaf2a8ee 455->457 456->458 457->458 461 23beaf2a935-23beaf2a94d 458->461 462 23beaf2a908-23beaf2a913 GetFileType 458->462 461->453 464 23beaf2a94f-23beaf2a953 461->464 462->461 463 23beaf2a915-23beaf2a920 462->463 465 23beaf2a922-23beaf2a927 463->465 466 23beaf2a929-23beaf2a92c 463->466 464->453 465->453 466->453 467 23beaf2a92e-23beaf2a933 466->467 467->453
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1523579969.0000023BEAF21000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023BEAF21000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_23beaf21000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: FileType
                        • String ID:
                        • API String ID: 3081899298-0
                        • Opcode ID: 96bd17cdbec1199f7060c8e4f9a6f8fd574a155b9e298efd3bd16726f0fb32a2
                        • Instruction ID: 8cd1411729e6fcce85da572cfbdc855e48de9333431504619dde83324063e114
                        • Opcode Fuzzy Hash: 96bd17cdbec1199f7060c8e4f9a6f8fd574a155b9e298efd3bd16726f0fb32a2
                        • Instruction Fuzzy Hash: 7F31C230508E1A9EE7A6AF2C84986E077D4FF1A360FA50749E55AC72E4C738D9A1C3D1

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1523579969.0000023BEAF21000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023BEAF21000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_23beaf21000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: Volume$MountNamePoint
                        • String ID:
                        • API String ID: 1269602640-0
                        • Opcode ID: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction ID: 197f623226313a000d799c73db793ead10bf8fd5a4471c36662834927b34ede7
                        • Opcode Fuzzy Hash: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction Fuzzy Hash: 870167305085448FFB47EB28D8987D677E1F769305F008569E1CAC72A6DE7C8658C751

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1523579969.0000023BEAF21000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023BEAF21000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_23beaf21000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction ID: f3af5c0e1cbe23d39793abb522d7f208ceb69a5ec4c32ed2e11bebb7f1e0ab1e
                        • Opcode Fuzzy Hash: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction Fuzzy Hash: 15D012203003044BEE597FB8599C26D2755CB46205F001C786602C6697DE3EC8458752

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 484 23beaf220b0-23beaf220d6 MessageBoxA
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1523579969.0000023BEAF21000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023BEAF21000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_23beaf21000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: Message
                        • String ID:
                        • API String ID: 2030045667-0
                        • Opcode ID: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction ID: f0c8c8b179c2aaeca1855f2f357fd550bc39611e5f4a8834ea67c0cbc9ad4e3c
                        • Opcode Fuzzy Hash: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction Fuzzy Hash: 1DC0123016180847E708BB34EC595D136E4FB5C304FD089399407C5450E96D82844A82
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1523579969.0000023BEAF21000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023BEAF21000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_23beaf21000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: _clrfp
                        • String ID:
                        • API String ID: 3618594692-0
                        • Opcode ID: 2045596ada029767b90017b957664b0b71c7a256b325aa916a96e60a40104743
                        • Instruction ID: a29c0995ceeb6c8dd093633833df84ff43d81f0373fe0b40619e35038ad8efea
                        • Opcode Fuzzy Hash: 2045596ada029767b90017b957664b0b71c7a256b325aa916a96e60a40104743
                        • Instruction Fuzzy Hash: B7C17030520A4D8FEB99CF1CC89AB9677E0FF4A304F558599E859CB2A1C339D862CB51
                        Memory Dump Source
                        • Source File: 00000000.00000002.1523579969.0000023BEAF21000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023BEAF21000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_23beaf21000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e4f9392618ee0be8b2838eee92702fec4626de7f7bd0dc604c65336cad8c2563
                        • Instruction ID: d9376b1910a460ce6230daa5c6f57017f08bcf791193eb0739b79557b4854a0b
                        • Opcode Fuzzy Hash: e4f9392618ee0be8b2838eee92702fec4626de7f7bd0dc604c65336cad8c2563
                        • Instruction Fuzzy Hash: DFE18D30518B488FEB65EF18D8997EA77E5FF99304F40462EA58AC3160DF349A41CBC6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1523579969.0000023BEAF21000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023BEAF21000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_23beaf21000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f301177accb7d0ce1b8505d76f0598128b48e2f6fca66abbe616489d302d7cc2
                        • Instruction ID: 48a56842d2acd4c355f548f17d5de36703daeff60158643028531ce2114e2e6c
                        • Opcode Fuzzy Hash: f301177accb7d0ce1b8505d76f0598128b48e2f6fca66abbe616489d302d7cc2
                        • Instruction Fuzzy Hash: E0B19631218A498FEB6AEF28DC597FA73E5FB95301F40422ED54BC3191DF389A058B85
                        Memory Dump Source
                        • Source File: 00000000.00000002.1523579969.0000023BEAF21000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023BEAF21000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_23beaf21000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 004e5bc4f416d9accfca0753fc8d67adee0aa063ac23580ea370914e8b763bcf
                        • Instruction ID: aa902a42034ae74ee9f8648d01e2ea2dd4f2a6dceead5d77efb8842151da5db6
                        • Opcode Fuzzy Hash: 004e5bc4f416d9accfca0753fc8d67adee0aa063ac23580ea370914e8b763bcf
                        • Instruction Fuzzy Hash: 1971B23061CB484BE769DF1C985D3BA77D5FB89310F40866EE88AC3291EF38994587C5
                        Memory Dump Source
                        • Source File: 00000000.00000002.1523579969.0000023BEAF21000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023BEAF21000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_23beaf21000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 30f0a361053a8720fb197dd7f2de9fba19a6b2a280636273193b063dd5433016
                        • Instruction ID: 544ee0f1ae38a9bb3d7f4fa1cc649c3e6b114435c041ce237caf65de4bf7eb64
                        • Opcode Fuzzy Hash: 30f0a361053a8720fb197dd7f2de9fba19a6b2a280636273193b063dd5433016
                        • Instruction Fuzzy Hash: 5A512432718E084FDB5CDF6CD4996B573D2EBAD310B14822EE40AD72A5DE74D94287C0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 485 23beaf240b0-23beaf24117 call 23beaf25054 488 23beaf2411d-23beaf24120 485->488 489 23beaf24578-23beaf2457f call 23beaf27854 485->489 488->489 490 23beaf24126-23beaf2412c 488->490 492 23beaf241fb-23beaf2420d 490->492 493 23beaf24132-23beaf24136 490->493 495 23beaf24213-23beaf24217 492->495 496 23beaf244c8-23beaf244cc 492->496 493->492 497 23beaf2413c-23beaf24147 493->497 495->496 498 23beaf2421d-23beaf24228 495->498 500 23beaf244ce-23beaf244d5 496->500 501 23beaf24505-23beaf2450f call 23beaf2319c 496->501 497->492 499 23beaf2414d-23beaf24152 497->499 498->496 503 23beaf2422e-23beaf24235 498->503 499->492 504 23beaf24158-23beaf24162 call 23beaf2319c 499->504 500->489 505 23beaf244db-23beaf24500 call 23beaf24580 500->505 501->489 511 23beaf24511-23beaf24530 call 23beaf2fa80 501->511 507 23beaf2423b-23beaf24276 call 23beaf2385c 503->507 508 23beaf243f9-23beaf24405 503->508 504->511 519 23beaf24168-23beaf24193 call 23beaf2319c * 2 call 23beaf23b64 504->519 505->501 507->508 523 23beaf2427c-23beaf24286 507->523 508->501 512 23beaf2440b-23beaf2440f 508->512 516 23beaf24411-23beaf2441d call 23beaf23b24 512->516 517 23beaf2441f-23beaf24427 512->517 516->517 530 23beaf24440-23beaf24448 516->530 517->501 522 23beaf2442d-23beaf2443a call 23beaf236fc 517->522 553 23beaf24195-23beaf24199 519->553 554 23beaf241b3-23beaf241bd call 23beaf2319c 519->554 522->501 522->530 527 23beaf2428a-23beaf242bc 523->527 532 23beaf242c2-23beaf242ce 527->532 533 23beaf243e8-23beaf243ef 527->533 537 23beaf2444e-23beaf24452 530->537 538 23beaf2455b-23beaf24577 call 23beaf2319c * 2 call 23beaf277c8 530->538 532->533 534 23beaf242d4-23beaf242ed 532->534 533->527 536 23beaf243f5-23beaf243f6 533->536 540 23beaf243e5-23beaf243e6 534->540 541 23beaf242f3-23beaf24338 call 23beaf23b38 * 2 534->541 536->508 543 23beaf24465-23beaf24466 537->543 544 23beaf24454-23beaf24463 call 23beaf23b24 537->544 538->489 540->533 567 23beaf24376-23beaf2437c 541->567 568 23beaf2433a-23beaf24360 call 23beaf23b38 call 23beaf247f0 541->568 549 23beaf24468-23beaf24472 call 23beaf250ec 543->549 544->549 549->501 564 23beaf24478-23beaf244c6 call 23beaf2378c call 23beaf23990 549->564 553->554 558 23beaf2419b-23beaf241a6 553->558 554->492 570 23beaf241bf-23beaf241df call 23beaf2319c * 2 call 23beaf250ec 554->570 558->554 563 23beaf241a8-23beaf241ad 558->563 563->489 563->554 564->501 574 23beaf2437e-23beaf24382 567->574 575 23beaf243e0-23beaf243e1 567->575 584 23beaf24362-23beaf24374 568->584 585 23beaf24387-23beaf243db call 23beaf23fdc 568->585 589 23beaf241e1-23beaf241eb call 23beaf251dc 570->589 590 23beaf241f6-23beaf241f7 570->590 574->541 575->540 584->567 584->568 585->575 593 23beaf241f1-23beaf24554 call 23beaf22f74 call 23beaf24bac call 23beaf253d8 589->593 594 23beaf24555-23beaf2455a call 23beaf277c8 589->594 590->492 593->594 594->538
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1523579969.0000023BEAF21000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023BEAF21000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_23beaf21000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                        • String ID: csm$csm$csm
                        • API String ID: 849930591-393685449
                        • Opcode ID: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction ID: 578a7ec1d50035de5e5ceedcd9bb787c97391f021e16c5c7fc02a899e92a914d
                        • Opcode Fuzzy Hash: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction Fuzzy Hash: F1F1A030918B088BEB55EF6C84597E977E4FF5A301F90021DE589C3296DB78D981CBD2

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 604 23beaf24930-23beaf24978 call 23beaf23144 call 23beaf2319c 609 23beaf249b2-23beaf249b6 604->609 610 23beaf2497a-23beaf24980 604->610 612 23beaf249bc-23beaf249c0 609->612 613 23beaf24a4a-23beaf24a4e 609->613 610->609 611 23beaf24982-23beaf24984 610->611 614 23beaf24996-23beaf24998 611->614 615 23beaf24986-23beaf2498a 611->615 616 23beaf24b41 612->616 617 23beaf249c6-23beaf249ce 612->617 618 23beaf24a92-23beaf24a98 613->618 619 23beaf24a50-23beaf24a5c 613->619 614->609 622 23beaf2499a-23beaf249a6 614->622 621 23beaf2498c-23beaf24994 615->621 615->622 620 23beaf24b46-23beaf24b60 616->620 617->616 625 23beaf249d4-23beaf249d8 617->625 623 23beaf24a9a-23beaf24a9e 618->623 624 23beaf24b08-23beaf24b3c call 23beaf240b0 618->624 626 23beaf24a5e-23beaf24a62 619->626 627 23beaf24a72-23beaf24a7e 619->627 621->609 621->614 622->609 632 23beaf249a8-23beaf249ac 622->632 623->624 631 23beaf24aa0-23beaf24aa7 623->631 624->616 633 23beaf249da-23beaf249dc 625->633 634 23beaf24a37-23beaf24a45 call 23beaf23728 625->634 626->627 629 23beaf24a64-23beaf24a70 call 23beaf23b24 626->629 627->616 630 23beaf24a84-23beaf24a8c 627->630 629->618 629->627 630->616 630->618 631->624 636 23beaf24aa9-23beaf24ab1 631->636 632->609 632->616 638 23beaf249de-23beaf249f0 call 23beaf23cb4 633->638 639 23beaf24a15-23beaf24a17 633->639 634->616 636->624 642 23beaf24ab3-23beaf24ac6 call 23beaf23b38 636->642 646 23beaf24b61-23beaf24b67 call 23beaf27854 638->646 649 23beaf249f6-23beaf249f9 638->649 639->634 641 23beaf24a19-23beaf24a21 639->641 641->646 647 23beaf24a27-23beaf24a2b 641->647 642->624 656 23beaf24ac8-23beaf24b06 642->656 647->646 651 23beaf24a31-23beaf24a35 647->651 649->646 653 23beaf249ff-23beaf24a03 649->653 655 23beaf24a05-23beaf24a10 call 23beaf24ec8 651->655 653->655 655->616 656->620
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1523579969.0000023BEAF21000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023BEAF21000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_23beaf21000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                        • String ID: csm$csm
                        • API String ID: 3896166516-3733052814
                        • Opcode ID: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction ID: 62acee11f6cddc33422ab2ef891494c2f09af1471c8346e022248c52c9553f13
                        • Opcode Fuzzy Hash: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction Fuzzy Hash: A9719230614A08CFEF66DF1C80AD3A4B3D5FF55302F94465E9589C7692CBB89A80C7D6

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1523579969.0000023BEAF21000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023BEAF21000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_23beaf21000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: CallTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3163161869-2084237596
                        • Opcode ID: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction ID: 9b8515205725ad70e9880158a87e9ad7ab25be8791b197deb3a1c8b217583a26
                        • Opcode Fuzzy Hash: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction Fuzzy Hash: FD71B030518B488FEB65DF1CC44ABEAB7E4FF9A301F440A5DE589C3152DB78A5818792

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 660 23beaf22cf0-23beaf22d36 call 23beaf23144 663 23beaf22e2d-23beaf22e34 660->663 664 23beaf22d3c-23beaf22d46 660->664 666 23beaf22ed8-23beaf22ede 663->666 665 23beaf22e19-23beaf22e1b 664->665 667 23beaf22d4b-23beaf22d59 665->667 668 23beaf22e21 665->668 669 23beaf22ee4 666->669 670 23beaf22e39-23beaf22e47 666->670 671 23beaf22d5f-23beaf22d66 667->671 672 23beaf22e17 667->672 668->669 675 23beaf22ee9-23beaf22f06 669->675 673 23beaf22e4d-23beaf22e55 670->673 674 23beaf22ed6 670->674 671->672 676 23beaf22d6c-23beaf22d71 671->676 672->665 673->674 677 23beaf22e57-23beaf22e5b 673->677 674->666 676->672 678 23beaf22d77-23beaf22d7c 676->678 679 23beaf22e5d-23beaf22e62 677->679 680 23beaf22e9c-23beaf22ead 677->680 681 23beaf22d7e-23beaf22d91 678->681 682 23beaf22d99-23beaf22d9f 678->682 685 23beaf22e64-23beaf22e70 679->685 686 23beaf22e98-23beaf22e9a 679->686 683 23beaf22ebf-23beaf22ed3 680->683 684 23beaf22eaf-23beaf22eb5 680->684 699 23beaf22e26-23beaf22e28 681->699 700 23beaf22d97 681->700 688 23beaf22da1-23beaf22da9 682->688 689 23beaf22dc9-23beaf22e12 call 23beaf23110 call 23beaf23140 682->689 683->674 684->674 687 23beaf22eb7-23beaf22ebb 684->687 690 23beaf22e91-23beaf22e96 685->690 691 23beaf22e72-23beaf22e79 685->691 686->669 686->680 687->669 695 23beaf22ebd 687->695 688->689 696 23beaf22dab-23beaf22db9 call 23beaf2f940 688->696 689->672 690->685 690->686 691->690 693 23beaf22e7b-23beaf22e84 691->693 693->690 698 23beaf22e86-23beaf22e8f 693->698 695->674 696->689 704 23beaf22dbb-23beaf22dc1 696->704 698->686 698->690 699->675 700->672 700->682 704->689
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1523579969.0000023BEAF21000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000023BEAF21000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_23beaf21000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: CurrentImageNonwritable__except_validate_context_record
                        • String ID: csm
                        • API String ID: 3242871069-1018135373
                        • Opcode ID: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction ID: a7f7db320f8958e12c4da2c71decfc520380bed441795937863d9c372ac6ad30
                        • Opcode Fuzzy Hash: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction Fuzzy Hash: 0871D630208E048BEF29EF5CE4997B4B3D9FF55310F90456EE986C3296EB28ED5186D1

                        Execution Graph

                        Execution Coverage:1.5%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:23
                        Total number of Limit Nodes:2
                        execution_graph 5170 2711000 5171 271101b __scrt_get_show_window_mode 5170->5171 5172 271103a GetVolumeNameForVolumeMountPointA 5171->5172 5173 2711061 5172->5173 5174 2712380 5185 2712544 5174->5185 5176 2712394 __scrt_get_show_window_mode __scrt_acquire_startup_lock __scrt_release_startup_lock 5176->5174 5178 27123df 5176->5178 5179 27120e0 5176->5179 5180 27120f3 CreateThread 5179->5180 5183 2712131 __scrt_get_show_window_mode 5180->5183 5189 27120b0 MessageBoxA 5180->5189 5182 27121cd GetLocaleInfoA 5184 2712200 __scrt_get_show_window_mode __vcrt_freefls 5182->5184 5183->5182 5183->5184 5184->5176 5186 271254c 5185->5186 5187 2712558 __scrt_dllmain_crt_thread_attach 5186->5187 5188 2712561 5187->5188 5188->5176 5190 2716e99 5194 2716e9e 5190->5194 5191 2716f52 5194->5191 5195 2716f68 5194->5195 5196 2716f75 5195->5196 5197 2716f91 ExitProcess 5196->5197

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1496317670.0000000002711000.00000040.00001000.00020000.00000000.sdmp, Offset: 02711000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2711000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CreateInfoLocaleThread
                        • String ID: 5
                        • API String ID: 899703944-2226203566
                        • Opcode ID: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction ID: de4734a884ce3819ed1bcebb133f8720ad11962c7c1ff771914c7f49e482db74
                        • Opcode Fuzzy Hash: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction Fuzzy Hash: C041D430214A488BE71AEF68DC9C6AB77E2FFD4305F84852DE54BC61A5DF388509CB42

                        Control-flow Graph

                        APIs
                        • GetVolumeNameForVolumeMountPointA.KERNEL32 ref: 0271104B
                        Memory Dump Source
                        • Source File: 00000003.00000002.1496317670.0000000002711000.00000040.00001000.00020000.00000000.sdmp, Offset: 02711000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2711000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Volume$MountNamePoint
                        • String ID:
                        • API String ID: 1269602640-0
                        • Opcode ID: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction ID: 6f37dfe6dddffd0bb15a4bdffdf5d89a9bd19370fbd22213184f6d93f601126d
                        • Opcode Fuzzy Hash: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction Fuzzy Hash: 290167305086448FFB06EB28D8987D677E1F769305F008569E0CAC72A5DEBC8658C741

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 47 2716f68-2716f77 call 2716f9c 50 2716f79-2716f82 47->50 51 2716f8a-2716f9b call 2716fc0 ExitProcess 47->51 50->51
                        APIs
                        • ExitProcess.KERNEL32(?,?,?,?,?,?,?,02716F64), ref: 02716F93
                        Memory Dump Source
                        • Source File: 00000003.00000002.1496317670.0000000002711000.00000040.00001000.00020000.00000000.sdmp, Offset: 02711000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2711000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction ID: 57d0993756bcd0b9e219a5a2c07b81f172a19254917d7951f2905ac365dfe76f
                        • Opcode Fuzzy Hash: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction Fuzzy Hash: CED09E243007095FEB197BBD599C22D266EDF46205F001C386903CB6A6DE3A98498B42

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 55 27120b0-27120d6 MessageBoxA
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1496317670.0000000002711000.00000040.00001000.00020000.00000000.sdmp, Offset: 02711000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2711000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Message
                        • String ID:
                        • API String ID: 2030045667-0
                        • Opcode ID: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction ID: f0c8c8b179c2aaeca1855f2f357fd550bc39611e5f4a8834ea67c0cbc9ad4e3c
                        • Opcode Fuzzy Hash: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction Fuzzy Hash: 1DC0123016180847E708BB34EC595D136E4FB5C304FD089399407C5450E96D82844A82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 72 27140b0-2714117 call 2715054 75 2714578-271457f call 2717854 72->75 76 271411d-2714120 72->76 76->75 77 2714126-271412c 76->77 79 2714132-2714136 77->79 80 27141fb-271420d 77->80 79->80 84 271413c-2714147 79->84 82 2714213-2714217 80->82 83 27144c8-27144cc 80->83 82->83 85 271421d-2714228 82->85 87 2714505-271450f call 271319c 83->87 88 27144ce-27144d5 83->88 84->80 86 271414d-2714152 84->86 85->83 89 271422e-2714235 85->89 86->80 90 2714158-2714162 call 271319c 86->90 87->75 101 2714511-2714530 call 271fa80 87->101 88->75 91 27144db-2714500 call 2714580 88->91 93 27143f9-2714405 89->93 94 271423b-2714276 call 271385c 89->94 90->101 105 2714168-2714193 call 271319c * 2 call 2713b64 90->105 91->87 93->87 98 271440b-271440f 93->98 94->93 110 271427c-2714286 94->110 102 2714411-271441d call 2713b24 98->102 103 271441f-2714427 98->103 102->103 116 2714440-2714448 102->116 103->87 109 271442d-271443a call 27136fc 103->109 138 27141b3-27141bd call 271319c 105->138 139 2714195-2714199 105->139 109->87 109->116 114 271428a-27142bc 110->114 118 27142c2-27142ce 114->118 119 27143e8-27143ef 114->119 121 271455b-2714577 call 271319c * 2 call 27177c8 116->121 122 271444e-2714452 116->122 118->119 123 27142d4-27142ed 118->123 119->114 125 27143f5-27143f6 119->125 121->75 126 2714465-2714466 122->126 127 2714454-2714463 call 2713b24 122->127 129 27142f3-2714338 call 2713b38 * 2 123->129 130 27143e5-27143e6 123->130 125->93 135 2714468-2714472 call 27150ec 126->135 127->135 154 2714376-271437c 129->154 155 271433a-2714360 call 2713b38 call 27147f0 129->155 130->119 135->87 150 2714478-27144c6 call 271378c call 2713990 135->150 138->80 157 27141bf-27141df call 271319c * 2 call 27150ec 138->157 139->138 145 271419b-27141a6 139->145 145->138 151 27141a8-27141ad 145->151 150->87 151->75 151->138 161 27143e0-27143e1 154->161 162 271437e-2714382 154->162 171 2714362-2714374 155->171 172 2714387-27143db call 2713fdc 155->172 176 27141e1-27141eb call 27151dc 157->176 177 27141f6-27141f7 157->177 161->130 162->129 171->154 171->155 172->161 180 27141f1-2714554 call 2712f74 call 2714bac call 27153d8 176->180 181 2714555-271455a call 27177c8 176->181 177->80 180->181 181->121
                        APIs
                        • __FrameHandler3::GetHandlerSearchState.LIBVCRUNTIME ref: 0271410C
                          • Part of subcall function 02715054: __GetUnwindTryBlock.LIBCMT ref: 02715097
                          • Part of subcall function 02715054: __SetUnwindTryBlock.LIBVCRUNTIME ref: 027150BC
                        • Is_bad_exception_allowed.LIBVCRUNTIME ref: 027141E4
                        • __FrameHandler3::ExecutionInCatch.LIBVCRUNTIME ref: 02714433
                        • std::bad_alloc::bad_alloc.LIBCMT ref: 0271453F
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1496317670.0000000002711000.00000040.00001000.00020000.00000000.sdmp, Offset: 02711000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2711000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                        • String ID: csm$csm$csm
                        • API String ID: 849930591-393685449
                        • Opcode ID: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction ID: 55dd3a90e60e199b121ecdca52cdc3de58e3d81f6e0d419de87b0f0b3f7d327f
                        • Opcode Fuzzy Hash: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction Fuzzy Hash: 8AE1A230918B488FDB25EF6CC499AADB7E1FF99314F54065ED489D7215DB30E881CB82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 191 2714930-2714978 call 2713144 call 271319c 196 27149b2-27149b6 191->196 197 271497a-2714980 191->197 199 2714a4a-2714a4e 196->199 200 27149bc-27149c0 196->200 197->196 198 2714982-2714984 197->198 205 2714996-2714998 198->205 206 2714986-271498a 198->206 203 2714a50-2714a5c 199->203 204 2714a92-2714a98 199->204 201 2714b41 200->201 202 27149c6-27149ce 200->202 210 2714b46-2714b60 201->210 202->201 207 27149d4-27149d8 202->207 208 2714a72-2714a7e 203->208 209 2714a5e-2714a62 203->209 213 2714b08-2714b3c call 27140b0 204->213 214 2714a9a-2714a9e 204->214 205->196 211 271499a-27149a6 205->211 206->211 212 271498c-2714994 206->212 215 2714a37-2714a45 call 2713728 207->215 216 27149da-27149dc 207->216 208->201 219 2714a84-2714a8c 208->219 209->208 217 2714a64-2714a70 call 2713b24 209->217 211->196 221 27149a8-27149ac 211->221 212->196 212->205 213->201 214->213 220 2714aa0-2714aa7 214->220 215->201 223 2714a15-2714a17 216->223 224 27149de-27149f0 call 2713cb4 216->224 217->204 217->208 219->201 219->204 220->213 226 2714aa9-2714ab1 220->226 221->196 221->201 223->215 230 2714a19-2714a21 223->230 233 2714b61-2714b67 call 2717854 224->233 237 27149f6-27149f9 224->237 226->213 231 2714ab3-2714ac6 call 2713b38 226->231 230->233 234 2714a27-2714a2b 230->234 231->213 240 2714ac8-2714b06 231->240 234->233 239 2714a31-2714a35 234->239 237->233 241 27149ff-2714a03 237->241 243 2714a05-2714a10 call 2714ec8 239->243 240->210 241->243 243->201
                        APIs
                        • __except_validate_context_record.LIBVCRUNTIME ref: 02714958
                        • __FrameHandler3::FrameUnwindToEmptyState.LIBVCRUNTIME ref: 02714A40
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1496317670.0000000002711000.00000040.00001000.00020000.00000000.sdmp, Offset: 02711000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2711000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                        • String ID: csm$csm
                        • API String ID: 3896166516-3733052814
                        • Opcode ID: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction ID: 3de8b948d1e11cfbb61e45bb01d5aca73a8796e18b9f88210f84d8f5ed682855
                        • Opcode Fuzzy Hash: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction Fuzzy Hash: A9619D34614B098FCB78DF2C80A9725B7E2FF98315F68465ED48AC7695DB34D880CB86

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 247 2712cf0-2712d36 call 2713144 250 2712e2d-2712e34 247->250 251 2712d3c-2712d46 247->251 252 2712ed8-2712ede 250->252 253 2712e19-2712e1b 251->253 254 2712ee4 252->254 255 2712e39-2712e47 252->255 256 2712e21 253->256 257 2712d4b-2712d59 253->257 260 2712ee9-2712f06 254->260 258 2712ed6 255->258 259 2712e4d-2712e55 255->259 256->254 261 2712e17 257->261 262 2712d5f-2712d66 257->262 258->252 259->258 263 2712e57-2712e5b 259->263 261->253 262->261 264 2712d6c-2712d71 262->264 265 2712e5d-2712e62 263->265 266 2712e9c-2712ead 263->266 264->261 267 2712d77-2712d7c 264->267 268 2712e64-2712e70 265->268 269 2712e98-2712e9a 265->269 272 2712ebf-2712ed3 266->272 273 2712eaf-2712eb5 266->273 270 2712d99-2712d9f 267->270 271 2712d7e-2712d91 267->271 274 2712e91-2712e96 268->274 275 2712e72-2712e79 268->275 269->254 269->266 277 2712da1-2712da9 270->277 278 2712dc9-2712e12 call 2713110 call 2713140 270->278 287 2712d97 271->287 288 2712e26-2712e28 271->288 272->258 273->258 276 2712eb7-2712ebb 273->276 274->268 274->269 275->274 280 2712e7b-2712e84 275->280 276->254 283 2712ebd 276->283 277->278 279 2712dab-2712db9 call 271f940 277->279 278->261 279->278 290 2712dbb-2712dc1 279->290 280->274 285 2712e86-2712e8f 280->285 283->258 285->269 285->274 287->261 287->270 288->260 290->278
                        APIs
                        • __except_validate_context_record.LIBVCRUNTIME ref: 02712D1B
                        • _IsNonwritableInCurrentImage.LIBCMT ref: 02712DB2
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1496317670.0000000002711000.00000040.00001000.00020000.00000000.sdmp, Offset: 02711000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2711000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CurrentImageNonwritable__except_validate_context_record
                        • String ID: csm
                        • API String ID: 3242871069-1018135373
                        • Opcode ID: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction ID: 53ba45f5ad2102472fbd87ea418f2525198cbce37f48592d92f5ff6030f100a8
                        • Opcode Fuzzy Hash: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction Fuzzy Hash: 36618F30218A298BCF28EE5CD889A7477D1FF54354B10456EEC8AC7257EB34E895CB85

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 293 2714580-27145b3 294 27145b9-27145db call 271319c 293->294 295 27147cc-27147e6 293->295 298 2714638-271464a 294->298 299 27145dd-27145f1 call 271319c 294->299 300 2714650-2714694 call 271385c 298->300 301 27147e7-27147ef call 2717854 298->301 299->298 311 27145f3-27145f9 299->311 300->295 308 271469a-27146a5 300->308 310 27146ac-27146e7 308->310 312 27147ab-27147c6 310->312 313 27146ed-27146f9 310->313 311->298 314 27145fb-2714601 311->314 312->295 312->310 313->312 315 27146ff-2714724 313->315 314->298 316 2714603-2714632 call 2713644 314->316 317 2714757-271475a 315->317 318 2714726-2714732 call 2713b24 315->318 316->295 316->298 317->312 320 271475c-27147a6 call 2713fdc 317->320 325 2714734-2714737 318->325 326 271474f-2714750 318->326 320->312 327 2714747 325->327 328 2714739-2714745 call 2713b24 325->328 326->317 330 2714749-271474d 327->330 328->330 330->312 330->326
                        APIs
                        • _CallSETranslator.LIBVCRUNTIME ref: 0271462B
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1496317670.0000000002711000.00000040.00001000.00020000.00000000.sdmp, Offset: 02711000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2711000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CallTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3163161869-2084237596
                        • Opcode ID: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction ID: 6d93f1c81776c6ef07aafcf9c0bc417321835046f1d6c2e587836531f328a791
                        • Opcode Fuzzy Hash: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction Fuzzy Hash: DA71BE30518B898FDB29EF1CD446BAAB7E0FF99314F144A5EE489C3211DB74E581CB82

                        Execution Graph

                        Execution Coverage:1.5%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:23
                        Total number of Limit Nodes:2

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.1496397137.00000186B59A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000186B59A1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_186b59a1000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CreateInfoLocaleThread
                        • String ID: 5
                        • API String ID: 899703944-2226203566
                        • Opcode ID: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction ID: 36d369c58d278520374bc5ae1cf69e2d1833336443c9a38feb82708aa46439ab
                        • Opcode Fuzzy Hash: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction Fuzzy Hash: FB419E31B14A888BE719EF64D89D7EA77E1FB94309F40852DF147C21A6DF3885058B52

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.1496397137.00000186B59A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000186B59A1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_186b59a1000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Volume$MountNamePoint
                        • String ID:
                        • API String ID: 1269602640-0
                        • Opcode ID: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction ID: 5358aaf3e3963aa82820fd9c32590dcd170d6bcb3fb131da2a5376fba3fe7728
                        • Opcode Fuzzy Hash: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction Fuzzy Hash: 1001673160C5848FFB06EB28D8987D677E1F769305F008569E0CBC72A6DE7C8658C751

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.1496397137.00000186B59A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000186B59A1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_186b59a1000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction ID: 2722973286a2687d01b7fce2a392584d12207876fd7a06baba0a60e48c4c2cd4
                        • Opcode Fuzzy Hash: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction Fuzzy Hash: 15D05E30B003080FFB187BB8998C3ED2661CB45349F006838B903CB6E7CD3A884A8712

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 55 186b59a20b0-186b59a20d6 MessageBoxA
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.1496397137.00000186B59A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000186B59A1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_186b59a1000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Message
                        • String ID:
                        • API String ID: 2030045667-0
                        • Opcode ID: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction ID: f0c8c8b179c2aaeca1855f2f357fd550bc39611e5f4a8834ea67c0cbc9ad4e3c
                        • Opcode Fuzzy Hash: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction Fuzzy Hash: 1DC0123016180847E708BB34EC595D136E4FB5C304FD089399407C5450E96D82844A82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 72 186b59a40b0-186b59a4117 call 186b59a5054 75 186b59a4578-186b59a457f call 186b59a7854 72->75 76 186b59a411d-186b59a4120 72->76 76->75 77 186b59a4126-186b59a412c 76->77 79 186b59a4132-186b59a4136 77->79 80 186b59a41fb-186b59a420d 77->80 79->80 84 186b59a413c-186b59a4147 79->84 82 186b59a4213-186b59a4217 80->82 83 186b59a44c8-186b59a44cc 80->83 82->83 85 186b59a421d-186b59a4228 82->85 87 186b59a44ce-186b59a44d5 83->87 88 186b59a4505-186b59a450f call 186b59a319c 83->88 84->80 86 186b59a414d-186b59a4152 84->86 85->83 90 186b59a422e-186b59a4235 85->90 86->80 91 186b59a4158-186b59a4162 call 186b59a319c 86->91 87->75 92 186b59a44db-186b59a4500 call 186b59a4580 87->92 88->75 98 186b59a4511-186b59a4530 call 186b59afa80 88->98 94 186b59a43f9-186b59a4405 90->94 95 186b59a423b-186b59a4276 call 186b59a385c 90->95 91->98 106 186b59a4168-186b59a4193 call 186b59a319c * 2 call 186b59a3b64 91->106 92->88 94->88 99 186b59a440b-186b59a440f 94->99 95->94 110 186b59a427c-186b59a4286 95->110 103 186b59a4411-186b59a441d call 186b59a3b24 99->103 104 186b59a441f-186b59a4427 99->104 103->104 119 186b59a4440-186b59a4448 103->119 104->88 109 186b59a442d-186b59a443a call 186b59a36fc 104->109 141 186b59a4195-186b59a4199 106->141 142 186b59a41b3-186b59a41bd call 186b59a319c 106->142 109->88 109->119 115 186b59a428a-186b59a42bc 110->115 116 186b59a42c2-186b59a42ce 115->116 117 186b59a43e8-186b59a43ef 115->117 116->117 121 186b59a42d4-186b59a42ed 116->121 117->115 123 186b59a43f5-186b59a43f6 117->123 124 186b59a444e-186b59a4452 119->124 125 186b59a455b-186b59a4577 call 186b59a319c * 2 call 186b59a77c8 119->125 129 186b59a43e5-186b59a43e6 121->129 130 186b59a42f3-186b59a4338 call 186b59a3b38 * 2 121->130 123->94 126 186b59a4454-186b59a4463 call 186b59a3b24 124->126 127 186b59a4465-186b59a4466 124->127 125->75 135 186b59a4468-186b59a4472 call 186b59a50ec 126->135 127->135 129->117 154 186b59a4376-186b59a437c 130->154 155 186b59a433a-186b59a4360 call 186b59a3b38 call 186b59a47f0 130->155 135->88 150 186b59a4478-186b59a44c6 call 186b59a378c call 186b59a3990 135->150 141->142 146 186b59a419b-186b59a41a6 141->146 142->80 157 186b59a41bf-186b59a41df call 186b59a319c * 2 call 186b59a50ec 142->157 146->142 151 186b59a41a8-186b59a41ad 146->151 150->88 151->75 151->142 161 186b59a43e0-186b59a43e1 154->161 162 186b59a437e-186b59a4382 154->162 172 186b59a4362-186b59a4374 155->172 173 186b59a4387-186b59a43db call 186b59a3fdc 155->173 176 186b59a41e1-186b59a41eb call 186b59a51dc 157->176 177 186b59a41f6-186b59a41f7 157->177 161->129 162->130 172->154 172->155 173->161 180 186b59a41f1-186b59a4554 call 186b59a2f74 call 186b59a4bac call 186b59a53d8 176->180 181 186b59a4555-186b59a455a call 186b59a77c8 176->181 177->80 180->181 181->125
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.1496397137.00000186B59A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000186B59A1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_186b59a1000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                        • String ID: csm$csm$csm
                        • API String ID: 849930591-393685449
                        • Opcode ID: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction ID: e5d43d337c1301a0a4090adfa510529f991db3ecf105995db97fcd3bd1a95093
                        • Opcode Fuzzy Hash: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction Fuzzy Hash: 7DF17030A18A888FEB54FF68C4897E977E0FB59318F54865DE449C3292DF30D981CB92

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 191 186b59a4930-186b59a4978 call 186b59a3144 call 186b59a319c 196 186b59a49b2-186b59a49b6 191->196 197 186b59a497a-186b59a4980 191->197 199 186b59a49bc-186b59a49c0 196->199 200 186b59a4a4a-186b59a4a4e 196->200 197->196 198 186b59a4982-186b59a4984 197->198 203 186b59a4996-186b59a4998 198->203 204 186b59a4986-186b59a498a 198->204 205 186b59a4b41 199->205 206 186b59a49c6-186b59a49ce 199->206 201 186b59a4a50-186b59a4a5c 200->201 202 186b59a4a92-186b59a4a98 200->202 207 186b59a4a5e-186b59a4a62 201->207 208 186b59a4a72-186b59a4a7e 201->208 212 186b59a4b08-186b59a4b3c call 186b59a40b0 202->212 213 186b59a4a9a-186b59a4a9e 202->213 203->196 211 186b59a499a-186b59a49a6 203->211 210 186b59a498c-186b59a4994 204->210 204->211 209 186b59a4b46-186b59a4b60 205->209 206->205 214 186b59a49d4-186b59a49d8 206->214 207->208 217 186b59a4a64-186b59a4a70 call 186b59a3b24 207->217 208->205 219 186b59a4a84-186b59a4a8c 208->219 210->196 210->203 211->196 221 186b59a49a8-186b59a49ac 211->221 212->205 213->212 220 186b59a4aa0-186b59a4aa7 213->220 215 186b59a4a37-186b59a4a45 call 186b59a3728 214->215 216 186b59a49da-186b59a49dc 214->216 215->205 222 186b59a49de-186b59a49f0 call 186b59a3cb4 216->222 223 186b59a4a15-186b59a4a17 216->223 217->202 217->208 219->202 219->205 220->212 225 186b59a4aa9-186b59a4ab1 220->225 221->196 221->205 233 186b59a4b61-186b59a4b67 call 186b59a7854 222->233 236 186b59a49f6-186b59a49f9 222->236 223->215 229 186b59a4a19-186b59a4a21 223->229 225->212 230 186b59a4ab3-186b59a4ac6 call 186b59a3b38 225->230 229->233 234 186b59a4a27-186b59a4a2b 229->234 230->212 243 186b59a4ac8-186b59a4b06 230->243 234->233 238 186b59a4a31-186b59a4a35 234->238 236->233 240 186b59a49ff-186b59a4a03 236->240 242 186b59a4a05-186b59a4a10 call 186b59a4ec8 238->242 240->242 242->205 243->209
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.1496397137.00000186B59A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000186B59A1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_186b59a1000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                        • String ID: csm$csm
                        • API String ID: 3896166516-3733052814
                        • Opcode ID: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction ID: b95e9d1b6f9d4572f4f5acac595052f0f748bf4b32d7d0817c5bc4b537306f4b
                        • Opcode Fuzzy Hash: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction Fuzzy Hash: 68718330B14A848FEBA4BB18808D3E8B3D5FB94319F54855EE44DC7696CF30DA80C792

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.1496397137.00000186B59A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000186B59A1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_186b59a1000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CallTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3163161869-2084237596
                        • Opcode ID: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction ID: cc4f47306922ce7f83bbaac4f1663beb9daed41d7ec0732496a3893922f15ee8
                        • Opcode Fuzzy Hash: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction Fuzzy Hash: 9C719430A18B888FE765FF18D44ABEAB7E0FB99304F04865DE48DC3151DB74A581CB92

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 247 186b59a2cf0-186b59a2d36 call 186b59a3144 250 186b59a2d3c-186b59a2d46 247->250 251 186b59a2e2d-186b59a2e34 247->251 252 186b59a2e19-186b59a2e1b 250->252 253 186b59a2ed8-186b59a2ede 251->253 254 186b59a2e21 252->254 255 186b59a2d4b-186b59a2d59 252->255 256 186b59a2ee4 253->256 257 186b59a2e39-186b59a2e47 253->257 254->256 258 186b59a2d5f-186b59a2d66 255->258 259 186b59a2e17 255->259 262 186b59a2ee9-186b59a2f06 256->262 260 186b59a2ed6 257->260 261 186b59a2e4d-186b59a2e55 257->261 258->259 263 186b59a2d6c-186b59a2d71 258->263 259->252 260->253 261->260 264 186b59a2e57-186b59a2e5b 261->264 263->259 265 186b59a2d77-186b59a2d7c 263->265 266 186b59a2e9c-186b59a2ead 264->266 267 186b59a2e5d-186b59a2e62 264->267 270 186b59a2d7e-186b59a2d91 265->270 271 186b59a2d99-186b59a2d9f 265->271 272 186b59a2ebf-186b59a2ed3 266->272 273 186b59a2eaf-186b59a2eb5 266->273 268 186b59a2e64-186b59a2e70 267->268 269 186b59a2e98-186b59a2e9a 267->269 274 186b59a2e91-186b59a2e96 268->274 275 186b59a2e72-186b59a2e79 268->275 269->256 269->266 286 186b59a2e26-186b59a2e28 270->286 287 186b59a2d97 270->287 277 186b59a2da1-186b59a2da9 271->277 278 186b59a2dc9-186b59a2e12 call 186b59a3110 call 186b59a3140 271->278 272->260 273->260 276 186b59a2eb7-186b59a2ebb 273->276 274->268 274->269 275->274 279 186b59a2e7b-186b59a2e84 275->279 276->256 282 186b59a2ebd 276->282 277->278 283 186b59a2dab-186b59a2db9 call 186b59af940 277->283 278->259 279->274 284 186b59a2e86-186b59a2e8f 279->284 282->260 283->278 291 186b59a2dbb-186b59a2dc1 283->291 284->269 284->274 286->262 287->259 287->271 291->278
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.1496397137.00000186B59A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000186B59A1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_186b59a1000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CurrentImageNonwritable__except_validate_context_record
                        • String ID: csm
                        • API String ID: 3242871069-1018135373
                        • Opcode ID: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction ID: 26350316e3751351467774684b457e76d959ab0c6eb9ec4a8108eea34fb29ba6
                        • Opcode Fuzzy Hash: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction Fuzzy Hash: 36718030B08A448BDF68BB5CD4897F873D1EB54354F20857EF886C7297EA24E99187A1

                        Execution Graph

                        Execution Coverage:1.9%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:30
                        Total number of Limit Nodes:4

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.1496760430.000002AB0BF31000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002AB0BF31000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2ab0bf31000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CreateInfoLocaleThread
                        • String ID: 5
                        • API String ID: 899703944-2226203566
                        • Opcode ID: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction ID: 14167ccccfb001675f7224c7fed0ce108603675092fa9524a05b982a4a86a2f1
                        • Opcode Fuzzy Hash: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction Fuzzy Hash: D341AE322186488BE75AEB34D89D7EB73E1FB95301F40862DE247C21A6EF389505CA42

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000006.00000002.1496760430.000002AB0BF31000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002AB0BF31000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2ab0bf31000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: FileType
                        • String ID:
                        • API String ID: 3081899298-0
                        • Opcode ID: 96bd17cdbec1199f7060c8e4f9a6f8fd574a155b9e298efd3bd16726f0fb32a2
                        • Instruction ID: 8f73c685ba07ae3fdd791131af2858c4b41658b2aa3675e2e2f049e1dcb1879a
                        • Opcode Fuzzy Hash: 96bd17cdbec1199f7060c8e4f9a6f8fd574a155b9e298efd3bd16726f0fb32a2
                        • Instruction Fuzzy Hash: 9631F631608E1A8FD7A6DF3C84987A977D0F70A760F650349E59AD71E6DB30D8A1C382

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000006.00000002.1496760430.000002AB0BF31000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002AB0BF31000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2ab0bf31000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Volume$MountNamePoint
                        • String ID:
                        • API String ID: 1269602640-0
                        • Opcode ID: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction ID: ca6f0a80d88c64db3b454879474e4b8aa279377e60c8989d220e242d4c1a79d6
                        • Opcode Fuzzy Hash: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction Fuzzy Hash: A501A73160C5448FFB06EB28D8987D637E1F769301F008169E0CAC72A6DE7C8548C741

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000006.00000002.1496760430.000002AB0BF31000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002AB0BF31000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2ab0bf31000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction ID: c1da9aa8b2fb39b536b52d899caa4972fc69cf8e5eb2f109ae782a32a8576a51
                        • Opcode Fuzzy Hash: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction Fuzzy Hash: A5D05E203043087FFB197BB8598C3AE2661EB47205F0018386A03CB6E7EE3B8849C703

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 74 2ab0bf320b0-2ab0bf320d6 MessageBoxA
                        APIs
                        Memory Dump Source
                        • Source File: 00000006.00000002.1496760430.000002AB0BF31000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002AB0BF31000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2ab0bf31000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Message
                        • String ID:
                        • API String ID: 2030045667-0
                        • Opcode ID: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction ID: f0c8c8b179c2aaeca1855f2f357fd550bc39611e5f4a8834ea67c0cbc9ad4e3c
                        • Opcode Fuzzy Hash: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction Fuzzy Hash: 1DC0123016180847E708BB34EC595D136E4FB5C304FD089399407C5450E96D82844A82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 91 2ab0bf340b0-2ab0bf34117 call 2ab0bf35054 94 2ab0bf3411d-2ab0bf34120 91->94 95 2ab0bf34578-2ab0bf3457f call 2ab0bf37854 91->95 94->95 96 2ab0bf34126-2ab0bf3412c 94->96 98 2ab0bf341fb-2ab0bf3420d 96->98 99 2ab0bf34132-2ab0bf34136 96->99 101 2ab0bf34213-2ab0bf34217 98->101 102 2ab0bf344c8-2ab0bf344cc 98->102 99->98 103 2ab0bf3413c-2ab0bf34147 99->103 101->102 104 2ab0bf3421d-2ab0bf34228 101->104 106 2ab0bf344ce-2ab0bf344d5 102->106 107 2ab0bf34505-2ab0bf3450f call 2ab0bf3319c 102->107 103->98 105 2ab0bf3414d-2ab0bf34152 103->105 104->102 108 2ab0bf3422e-2ab0bf34235 104->108 105->98 109 2ab0bf34158-2ab0bf34162 call 2ab0bf3319c 105->109 106->95 110 2ab0bf344db-2ab0bf34500 call 2ab0bf34580 106->110 107->95 117 2ab0bf34511-2ab0bf34530 call 2ab0bf3fa80 107->117 113 2ab0bf3423b-2ab0bf34276 call 2ab0bf3385c 108->113 114 2ab0bf343f9-2ab0bf34405 108->114 109->117 125 2ab0bf34168-2ab0bf34193 call 2ab0bf3319c * 2 call 2ab0bf33b64 109->125 110->107 113->114 129 2ab0bf3427c-2ab0bf34286 113->129 114->107 118 2ab0bf3440b-2ab0bf3440f 114->118 122 2ab0bf34411-2ab0bf3441d call 2ab0bf33b24 118->122 123 2ab0bf3441f-2ab0bf34427 118->123 122->123 135 2ab0bf34440-2ab0bf34448 122->135 123->107 128 2ab0bf3442d-2ab0bf3443a call 2ab0bf336fc 123->128 159 2ab0bf34195-2ab0bf34199 125->159 160 2ab0bf341b3-2ab0bf341bd call 2ab0bf3319c 125->160 128->107 128->135 133 2ab0bf3428a-2ab0bf342bc 129->133 137 2ab0bf342c2-2ab0bf342ce 133->137 138 2ab0bf343e8-2ab0bf343ef 133->138 142 2ab0bf3444e-2ab0bf34452 135->142 143 2ab0bf3455b-2ab0bf34577 call 2ab0bf3319c * 2 call 2ab0bf377c8 135->143 137->138 144 2ab0bf342d4-2ab0bf342ed 137->144 138->133 141 2ab0bf343f5-2ab0bf343f6 138->141 141->114 148 2ab0bf34465-2ab0bf34466 142->148 149 2ab0bf34454-2ab0bf34463 call 2ab0bf33b24 142->149 143->95 145 2ab0bf343e5-2ab0bf343e6 144->145 146 2ab0bf342f3-2ab0bf34338 call 2ab0bf33b38 * 2 144->146 145->138 173 2ab0bf34376-2ab0bf3437c 146->173 174 2ab0bf3433a-2ab0bf34360 call 2ab0bf33b38 call 2ab0bf347f0 146->174 154 2ab0bf34468-2ab0bf34472 call 2ab0bf350ec 148->154 149->154 154->107 170 2ab0bf34478-2ab0bf344c6 call 2ab0bf3378c call 2ab0bf33990 154->170 159->160 164 2ab0bf3419b-2ab0bf341a6 159->164 160->98 176 2ab0bf341bf-2ab0bf341df call 2ab0bf3319c * 2 call 2ab0bf350ec 160->176 164->160 169 2ab0bf341a8-2ab0bf341ad 164->169 169->95 169->160 170->107 180 2ab0bf3437e-2ab0bf34382 173->180 181 2ab0bf343e0-2ab0bf343e1 173->181 190 2ab0bf34362-2ab0bf34374 174->190 191 2ab0bf34387-2ab0bf343db call 2ab0bf33fdc 174->191 195 2ab0bf341e1-2ab0bf341eb call 2ab0bf351dc 176->195 196 2ab0bf341f6-2ab0bf341f7 176->196 180->146 181->145 190->173 190->174 191->181 199 2ab0bf341f1-2ab0bf34554 call 2ab0bf32f74 call 2ab0bf34bac call 2ab0bf353d8 195->199 200 2ab0bf34555-2ab0bf3455a call 2ab0bf377c8 195->200 196->98 199->200 200->143
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.1496760430.000002AB0BF31000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002AB0BF31000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2ab0bf31000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                        • String ID: csm$csm$csm
                        • API String ID: 849930591-393685449
                        • Opcode ID: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction ID: 975d6721177ef2c4dc52ec9e2a1bd17e63d4c356c68885b239512b64b0ed7c19
                        • Opcode Fuzzy Hash: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction Fuzzy Hash: 1AF15E31A18A488BEB55EF68C4897EA77E0FB5A710F50065DE549C3297EF30D881CB82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 210 2ab0bf34930-2ab0bf34978 call 2ab0bf33144 call 2ab0bf3319c 215 2ab0bf349b2-2ab0bf349b6 210->215 216 2ab0bf3497a-2ab0bf34980 210->216 217 2ab0bf349bc-2ab0bf349c0 215->217 218 2ab0bf34a4a-2ab0bf34a4e 215->218 216->215 219 2ab0bf34982-2ab0bf34984 216->219 220 2ab0bf34b41 217->220 221 2ab0bf349c6-2ab0bf349ce 217->221 222 2ab0bf34a92-2ab0bf34a98 218->222 223 2ab0bf34a50-2ab0bf34a5c 218->223 224 2ab0bf34996-2ab0bf34998 219->224 225 2ab0bf34986-2ab0bf3498a 219->225 232 2ab0bf34b46-2ab0bf34b60 220->232 221->220 229 2ab0bf349d4-2ab0bf349d8 221->229 226 2ab0bf34a9a-2ab0bf34a9e 222->226 227 2ab0bf34b08-2ab0bf34b3c call 2ab0bf340b0 222->227 230 2ab0bf34a5e-2ab0bf34a62 223->230 231 2ab0bf34a72-2ab0bf34a7e 223->231 224->215 228 2ab0bf3499a-2ab0bf349a6 224->228 225->228 233 2ab0bf3498c-2ab0bf34994 225->233 226->227 234 2ab0bf34aa0-2ab0bf34aa7 226->234 227->220 228->215 235 2ab0bf349a8-2ab0bf349ac 228->235 236 2ab0bf349da-2ab0bf349dc 229->236 237 2ab0bf34a37-2ab0bf34a45 call 2ab0bf33728 229->237 230->231 239 2ab0bf34a64-2ab0bf34a70 call 2ab0bf33b24 230->239 231->220 240 2ab0bf34a84-2ab0bf34a8c 231->240 233->215 233->224 234->227 241 2ab0bf34aa9-2ab0bf34ab1 234->241 235->215 235->220 243 2ab0bf349de-2ab0bf349f0 call 2ab0bf33cb4 236->243 244 2ab0bf34a15-2ab0bf34a17 236->244 237->220 239->222 239->231 240->220 240->222 241->227 247 2ab0bf34ab3-2ab0bf34ac6 call 2ab0bf33b38 241->247 251 2ab0bf34b61-2ab0bf34b67 call 2ab0bf37854 243->251 257 2ab0bf349f6-2ab0bf349f9 243->257 244->237 246 2ab0bf34a19-2ab0bf34a21 244->246 246->251 252 2ab0bf34a27-2ab0bf34a2b 246->252 247->227 260 2ab0bf34ac8-2ab0bf34b06 247->260 252->251 255 2ab0bf34a31-2ab0bf34a35 252->255 259 2ab0bf34a05-2ab0bf34a10 call 2ab0bf34ec8 255->259 257->251 261 2ab0bf349ff-2ab0bf34a03 257->261 259->220 260->232 261->259
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.1496760430.000002AB0BF31000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002AB0BF31000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2ab0bf31000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                        • String ID: csm$csm
                        • API String ID: 3896166516-3733052814
                        • Opcode ID: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction ID: b294d57f7c13259d3cfc76e0ede637a68932c616628f66d90f85e1fa3d76c15e
                        • Opcode Fuzzy Hash: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction Fuzzy Hash: B1718F32714A088BEBA9DF28808D3A6B3D1FB55B11F54465A9689C7793EF349880C787

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 266 2ab0bf32cf0-2ab0bf32d36 call 2ab0bf33144 269 2ab0bf32e2d-2ab0bf32e34 266->269 270 2ab0bf32d3c-2ab0bf32d46 266->270 271 2ab0bf32ed8-2ab0bf32ede 269->271 272 2ab0bf32e19-2ab0bf32e1b 270->272 275 2ab0bf32ee4 271->275 276 2ab0bf32e39-2ab0bf32e47 271->276 273 2ab0bf32d4b-2ab0bf32d59 272->273 274 2ab0bf32e21 272->274 280 2ab0bf32d5f-2ab0bf32d66 273->280 281 2ab0bf32e17 273->281 274->275 279 2ab0bf32ee9-2ab0bf32f06 275->279 277 2ab0bf32e4d-2ab0bf32e55 276->277 278 2ab0bf32ed6 276->278 277->278 282 2ab0bf32e57-2ab0bf32e5b 277->282 278->271 280->281 283 2ab0bf32d6c-2ab0bf32d71 280->283 281->272 284 2ab0bf32e5d-2ab0bf32e62 282->284 285 2ab0bf32e9c-2ab0bf32ead 282->285 283->281 286 2ab0bf32d77-2ab0bf32d7c 283->286 291 2ab0bf32e64-2ab0bf32e70 284->291 292 2ab0bf32e98-2ab0bf32e9a 284->292 289 2ab0bf32ebf-2ab0bf32ed3 285->289 290 2ab0bf32eaf-2ab0bf32eb5 285->290 287 2ab0bf32d7e-2ab0bf32d91 286->287 288 2ab0bf32d99-2ab0bf32d9f 286->288 303 2ab0bf32e26-2ab0bf32e28 287->303 304 2ab0bf32d97 287->304 294 2ab0bf32da1-2ab0bf32da9 288->294 295 2ab0bf32dc9-2ab0bf32e12 call 2ab0bf33110 call 2ab0bf33140 288->295 289->278 290->278 293 2ab0bf32eb7-2ab0bf32ebb 290->293 296 2ab0bf32e72-2ab0bf32e79 291->296 297 2ab0bf32e91-2ab0bf32e96 291->297 292->275 292->285 293->275 299 2ab0bf32ebd 293->299 294->295 300 2ab0bf32dab-2ab0bf32db9 call 2ab0bf3f940 294->300 295->281 296->297 302 2ab0bf32e7b-2ab0bf32e84 296->302 297->291 297->292 299->278 300->295 309 2ab0bf32dbb-2ab0bf32dc1 300->309 302->297 307 2ab0bf32e86-2ab0bf32e8f 302->307 303->279 304->281 304->288 307->292 307->297 309->295
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.1496760430.000002AB0BF31000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002AB0BF31000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2ab0bf31000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CurrentImageNonwritable__except_validate_context_record
                        • String ID: csm
                        • API String ID: 3242871069-1018135373
                        • Opcode ID: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction ID: be72413d044d5e11ac0df3a4e9a5b31e1b5d07992e69b6a059b8c251ff98372d
                        • Opcode Fuzzy Hash: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction Fuzzy Hash: AD71B332308A048BDB29EA6CD48A7B673D1FB55750F10456EE986C3297FF34EC91C686

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.1496760430.000002AB0BF31000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002AB0BF31000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2ab0bf31000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CallTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3163161869-2084237596
                        • Opcode ID: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction ID: 4a691683be783e3ec267cc556142c3516a54a907b163fd53df713d654786af68
                        • Opcode Fuzzy Hash: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction Fuzzy Hash: C971B631618B488FE765DF28C44ABE6B7E0FB9A700F04465DE589C3252EB74E581C783