Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
YmAxTGvrQk.dll

Overview

General Information

Sample name:YmAxTGvrQk.dll
(renamed file extension from exe to dll, renamed because original name is a hash value)
Original sample name:b5814ee79455d77e2c48f889493fc3d8.dll.exe
Analysis ID:1561763
MD5:b5814ee79455d77e2c48f889493fc3d8
SHA1:03c82c5c3c7f4584f4ddb8001b29b26f1b7d864d
SHA256:cbb4f3d3777de27d21d97ac1e77e202630f4c35e39765d7e82bc10a58d3ee833
Tags:dllexeStrelaStealeruser-abuse_ch
Infos:

Detection

Strela Stealer
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Strela Stealer
AI detected suspicious sample
Machine Learning detection for sample
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
PE file does not import any functions
Program does not show much activity (idle)
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7328 cmdline: loaddll64.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 7336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7380 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 7404 cmdline: rundll32.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • regsvr32.exe (PID: 7388 cmdline: regsvr32.exe /s C:\Users\user\Desktop\YmAxTGvrQk.dll MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
    • rundll32.exe (PID: 7412 cmdline: rundll32.exe C:\Users\user\Desktop\YmAxTGvrQk.dll,DllRegisterServer MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000005.00000002.1751948158.00007FFE13246000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
    00000005.00000002.1751603344.000001A3CA651000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
      00000004.00000002.1751884781.00007FFE13246000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
        00000000.00000002.1778400098.00007FFE13246000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
          00000004.00000002.1751707509.0000021509031000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            0.2.loaddll64.exe.7ffe13246404.1.raw.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
              4.2.rundll32.exe.7ffe13240000.0.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
                0.2.loaddll64.exe.7ffe13240000.0.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
                  5.2.rundll32.exe.7ffe13246404.1.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
                    4.2.rundll32.exe.7ffe13246404.1.raw.unpackJoeSecurity_StrelaStealerYara detected Strela StealerJoe Security
                      Click to see the 7 entries
                      No Sigma rule has matched
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: YmAxTGvrQk.dllReversingLabs: Detection: 52%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.5% probability
                      Source: YmAxTGvrQk.dllJoe Sandbox ML: detected
                      Source: YmAxTGvrQk.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFE132411600_2_00007FFE13241160
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001F3AEBA1A900_2_000001F3AEBA1A90
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001F3AEBA15A00_2_000001F3AEBA15A0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001F3AEBA72BC0_2_000001F3AEBA72BC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001F3AEBA10900_2_000001F3AEBA1090
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001F3AEBAF4E80_2_000001F3AEBAF4E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026C72BC3_2_026C72BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026C1A903_2_026C1A90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026CF4E83_2_026CF4E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026C10903_2_026C1090
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026C15A03_2_026C15A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000215090310904_2_0000021509031090
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002150903F4E84_2_000002150903F4E8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021509031A904_2_0000021509031A90
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000215090372BC4_2_00000215090372BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000215090315A04_2_00000215090315A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001A3CA6510905_2_000001A3CA651090
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001A3CA65F4E85_2_000001A3CA65F4E8
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001A3CA6515A05_2_000001A3CA6515A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001A3CA6572BC5_2_000001A3CA6572BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001A3CA651A905_2_000001A3CA651A90
                      Source: YmAxTGvrQk.dllStatic PE information: No import functions for PE file found
                      Source: classification engineClassification label: mal64.troj.winDLL@10/0@0/0
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7336:120:WilError_03
                      Source: YmAxTGvrQk.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll",#1
                      Source: YmAxTGvrQk.dllReversingLabs: Detection: 52%
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\YmAxTGvrQk.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\YmAxTGvrQk.dll,DllRegisterServer
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\YmAxTGvrQk.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\YmAxTGvrQk.dll,DllRegisterServerJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeAutomated click: OK
                      Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: YmAxTGvrQk.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: YmAxTGvrQk.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\YmAxTGvrQk.dll
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001F3AEBACC35 push cs; retf 0000h0_2_000001F3AEBACC59
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001F3AEBACC6C push esi; retf 0000h0_2_000001F3AEBACC6D
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001F3AEBABBA2 push esp; ret 0_2_000001F3AEBABBA5
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001F3AEBACCA8 push 6F0000CBh; retf 0_2_000001F3AEBACCAD
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001F3AEBACC9C push ebx; retf 0_2_000001F3AEBACC9D
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026CBBA2 push esp; ret 3_2_026CBBA5
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026CCC6C push esi; retf 0000h3_2_026CCC6D
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026CCC35 push cs; retf 0000h3_2_026CCC59
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026CCCA8 push 6F0000CBh; retf 3_2_026CCCAD
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026CCC9C push ebx; retf 3_2_026CCC9D
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026D75DE push ecx; retf 003Fh3_2_026D763E
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002150903CC9C push ebx; retf 4_2_000002150903CC9D
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002150903CCA8 push 6F0000CBh; retf 4_2_000002150903CCAD
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002150903BBA2 push esp; ret 4_2_000002150903BBA5
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002150903CC35 push cs; retf 0000h4_2_000002150903CC59
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002150903CC6C push esi; retf 0000h4_2_000002150903CC6D
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001A3CA65BBA2 push esp; ret 5_2_000001A3CA65BBA5
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001A3CA65CC35 push cs; retf 0000h5_2_000001A3CA65CC59
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001A3CA65CCA8 push 6F0000CBh; retf 5_2_000001A3CA65CCAD
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001A3CA65CC9C push ebx; retf 5_2_000001A3CA65CC9D
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001A3CA65CC6C push esi; retf 0000h5_2_000001A3CA65CC6D
                      Source: YmAxTGvrQk.dllStatic PE information: section name: .text entropy: 6.80425120895919
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeCode function: GetConsoleWindow,CreateThread,GetLocaleInfoA,0_2_000001F3AEBA20E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: CreateThread,GetLocaleInfoA,3_2_026C20E0
                      Source: C:\Windows\System32\rundll32.exeCode function: CreateThread,GetLocaleInfoA,4_2_00000215090320E0
                      Source: C:\Windows\System32\rundll32.exeCode function: CreateThread,GetLocaleInfoA,5_2_000001A3CA6520E0

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ffe13246404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.7ffe13240000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ffe13240000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ffe13246404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.7ffe13246404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ffe13246404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.7ffe13246404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.7ffe13246404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.7ffe13246404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ffe13246404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ffe13240000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.7ffe13240000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.1751948158.00007FFE13246000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1751603344.000001A3CA651000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1751884781.00007FFE13246000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1778400098.00007FFE13246000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1751707509.0000021509031000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1750393412.00007FFE13246000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1749542743.00000000026C1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1777872156.000001F3AEBA1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 7328, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 7388, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7404, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7412, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ffe13246404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.7ffe13240000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ffe13240000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ffe13246404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.7ffe13246404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.7ffe13246404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.7ffe13246404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.7ffe13246404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.7ffe13246404.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ffe13246404.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.7ffe13240000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.7ffe13240000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.1751948158.00007FFE13246000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1751603344.000001A3CA651000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1751884781.00007FFE13246000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1778400098.00007FFE13246000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1751707509.0000021509031000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1750393412.00007FFE13246000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1749542743.00000000026C1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1777872156.000001F3AEBA1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 7328, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 7388, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7404, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7412, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                      DLL Side-Loading
                      11
                      Process Injection
                      1
                      Regsvr32
                      OS Credential Dumping11
                      System Information Discovery
                      Remote Services1
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Rundll32
                      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                      Software Packing
                      Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                      Process Injection
                      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      DLL Side-Loading
                      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                      Obfuscated Files or Information
                      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1561763 Sample: YmAxTGvrQk.exe Startdate: 24/11/2024 Architecture: WINDOWS Score: 64 19 Multi AV Scanner detection for submitted file 2->19 21 Yara detected Strela Stealer 2->21 23 Machine Learning detection for sample 2->23 25 AI detected suspicious sample 2->25 7 loaddll64.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 regsvr32.exe 7->11         started        13 rundll32.exe 7->13         started        15 conhost.exe 7->15         started        process5 17 rundll32.exe 9->17         started       

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      YmAxTGvrQk.dll53%ReversingLabsWin64.Trojan.Generic
                      YmAxTGvrQk.dll100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No contacted domains info
                      No contacted IP infos
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1561763
                      Start date and time:2024-11-24 08:42:31 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 2m 29s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:6
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:YmAxTGvrQk.dll
                      (renamed file extension from exe to dll, renamed because original name is a hash value)
                      Original Sample Name:b5814ee79455d77e2c48f889493fc3d8.dll.exe
                      Detection:MAL
                      Classification:mal64.troj.winDLL@10/0@0/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 19
                      • Number of non-executed functions: 21
                      Cookbook Comments:
                      • Stop behavior analysis, all processes terminated
                      • Not all processes where analyzed, report is missing behavior information
                      • VT rate limit hit for: YmAxTGvrQk.dll
                      No simulations
                      No context
                      No context
                      No context
                      No context
                      No context
                      No created / dropped files found
                      File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Entropy (8bit):7.7349656611412065
                      TrID:
                      • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                      • Win64 Executable (generic) (12005/4) 10.17%
                      • Generic Win/DOS Executable (2004/3) 1.70%
                      • DOS Executable Generic (2002/1) 1.70%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                      File name:YmAxTGvrQk.dll
                      File size:136'192 bytes
                      MD5:b5814ee79455d77e2c48f889493fc3d8
                      SHA1:03c82c5c3c7f4584f4ddb8001b29b26f1b7d864d
                      SHA256:cbb4f3d3777de27d21d97ac1e77e202630f4c35e39765d7e82bc10a58d3ee833
                      SHA512:59ca1f36e590f20f8fd825b7f50c522f2955d258588fb34b7c2cdcb019b062327f31a6da99a12ed800a1c0d0def2f9a9a6ab4b43be85a07d9133cd761f886e57
                      SSDEEP:3072:A3MtG/TbqMhqHvxRd5yrGUu8uVvLn4rrMJr2viskMdth:SyG6MKZ5ygVznCrasvd
                      TLSH:96D301BD840C702BDD071AB4A779F953A0120836FF2666DF696C546A71B2BC602F2F17
                      File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...?.1g.........." .....4..........P........................................`............`........................................
                      Icon Hash:7ae282899bbab082
                      Entrypoint:0x180001150
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x180000000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                      Time Stamp:0x67310B3F [Sun Nov 10 19:36:31 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:
                      Instruction
                      mov eax, 00000001h
                      ret
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      push ebp
                      inc ecx
                      push edi
                      inc ecx
                      push esi
                      inc ecx
                      push ebp
                      inc ecx
                      push esp
                      push esi
                      push edi
                      push ebx
                      dec eax
                      sub esp, 00000128h
                      dec eax
                      lea ebp, dword ptr [esp+00000080h]
                      inc sp
                      movq qword ptr [ebp+00000090h], mm7
                      inc sp
                      movq qword ptr [ebp+00000080h], mm6
                      inc sp
                      movq qword ptr [ebp+70h], mm5
                      inc sp
                      movq qword ptr [ebp+60h], mm4
                      inc sp
                      movq qword ptr [ebp+50h], mm3
                      inc sp
                      movq qword ptr [ebp+40h], mm2
                      inc sp
                      movq qword ptr [ebp+30h], mm1
                      inc sp
                      movq qword ptr [ebp+20h], mm0
                      movdqa dqword ptr [ebp+10h], xmm7
                      movdqa dqword ptr [ebp+00h], xmm6
                      mov eax, dword ptr [00022297h]
                      lea ecx, dword ptr [eax-01h]
                      imul ecx, eax
                      mov eax, ecx
                      not eax
                      mov edx, eax
                      and edx, 755544E9h
                      and ecx, 8AAABB16h
                      or ecx, edx
                      xor ecx, 8AAABB17h
                      xor eax, ecx
                      test eax, ecx
                      sete cl
                      setne al
                      cmp dword ptr [0002226Ah], 0Ah
                      setl dl
                      xor al, dl
                      mov ebx, eax
                      xor bl, 00000001h
                      or cl, dl
                      xor cl, 00000001h
                      or cl, bl
                      mov edi, dword ptr [00022257h]
                      inc esp
                      mov ebx, dword ptr [00022254h]
                      cmp al, cl
                      jne 00007FF4C090833Ch
                      or al, cl
                      xor al, 01h
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x51100x53.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x250000x1a8.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x240000x18.pdata
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x33240x3400c951d59bceba236e65aa2a136690dc68False0.6690955528846154data6.80425120895919IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x50000x1b00x20001cc483b695dc3c06e4c1a7debd7d853False0.37109375data4.806020279669037IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x60000x1d4980x1d6007965c8831c584641baf5f46be9fbc4f1False0.8682014627659574data7.734752166341349IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .pdata0x240000x180x2002a84d5350ed83c0ac2c2298e473ddc3aFalse0.064453125data0.23653878450968063IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .rsrc0x250000x1a80x200dc8a7a3ba49348b04c8bceefe511f730False0.482421875data4.1813331407993175IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_MANIFEST0x250600x143XML 1.0 document, ASCII textEnglishUnited States0.628482972136223
                      NameOrdinalAddress
                      DllRegisterServer10x180001070
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      No network behavior found

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:02:43:26
                      Start date:24/11/2024
                      Path:C:\Windows\System32\loaddll64.exe
                      Wow64 process (32bit):false
                      Commandline:loaddll64.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll"
                      Imagebase:0x7ff7ea3f0000
                      File size:165'888 bytes
                      MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000000.00000002.1778400098.00007FFE13246000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000000.00000002.1777872156.000001F3AEBA1000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:true

                      Target ID:1
                      Start time:02:43:26
                      Start date:24/11/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:2
                      Start time:02:43:26
                      Start date:24/11/2024
                      Path:C:\Windows\System32\cmd.exe
                      Wow64 process (32bit):false
                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll",#1
                      Imagebase:0x7ff7d0ff0000
                      File size:289'792 bytes
                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:3
                      Start time:02:43:26
                      Start date:24/11/2024
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:regsvr32.exe /s C:\Users\user\Desktop\YmAxTGvrQk.dll
                      Imagebase:0x7ff70d9b0000
                      File size:25'088 bytes
                      MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000003.00000002.1750393412.00007FFE13246000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000003.00000002.1749542743.00000000026C1000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:true

                      Target ID:4
                      Start time:02:43:26
                      Start date:24/11/2024
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll",#1
                      Imagebase:0x7ff7aff90000
                      File size:71'680 bytes
                      MD5 hash:EF3179D498793BF4234F708D3BE28633
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000004.00000002.1751884781.00007FFE13246000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000004.00000002.1751707509.0000021509031000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:true

                      Target ID:5
                      Start time:02:43:26
                      Start date:24/11/2024
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe C:\Users\user\Desktop\YmAxTGvrQk.dll,DllRegisterServer
                      Imagebase:0x7ff7aff90000
                      File size:71'680 bytes
                      MD5 hash:EF3179D498793BF4234F708D3BE28633
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000005.00000002.1751948158.00007FFE13246000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_StrelaStealer, Description: Yara detected Strela Stealer, Source: 00000005.00000002.1751603344.000001A3CA651000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:6.6%
                        Dynamic/Decrypted Code Coverage:88.2%
                        Signature Coverage:14.7%
                        Total number of Nodes:34
                        Total number of Limit Nodes:5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1778346735.00007FFE13241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE13240000, based on PE: true
                        • Associated: 00000000.00000002.1778334424.00007FFE13240000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1778359802.00007FFE13245000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1778400098.00007FFE13246000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1778506164.00007FFE13265000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_7ffe13240000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: 8'j{g"?
                        • API String ID: 0-1733800758
                        • Opcode ID: 9996f6b7db0b9050f8d1a28a97124f105651b95835a44efc6454be03b1d52e44
                        • Instruction ID: 49aabf409af6e626942a2922b3f5e214d6ec0cc02e5164b53930c55db34934f8
                        • Opcode Fuzzy Hash: 9996f6b7db0b9050f8d1a28a97124f105651b95835a44efc6454be03b1d52e44
                        • Instruction Fuzzy Hash: 3643AD6BF64A114BFB04CB3658513FA6792ABA63A4F15A335DE1DA77E4CA3CD805C300

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1777872156.000001F3AEBA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F3AEBA1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f3aeba1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: ConsoleCreateInfoLocaleThreadWindow
                        • String ID: 5
                        • API String ID: 1307802651-2226203566
                        • Opcode ID: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction ID: 0d61047ad34aa5343cf0b2d4d6be91779ddc44574dad1f1362b1338b7c94ba13
                        • Opcode Fuzzy Hash: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction Fuzzy Hash: FA41E1302186458BEB48EF26D88C7FB7BE2FBC4301F40853DE597C31A5DE3885858A52

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 313 1f3aebaa87c-1f3aebaa898 314 1f3aebaa89a-1f3aebaa8c3 313->314 315 1f3aebaa8cf-1f3aebaa8d8 314->315 316 1f3aebaa8c5-1f3aebaa8ca 314->316 318 1f3aebaa8f0 315->318 319 1f3aebaa8da-1f3aebaa8dd 315->319 317 1f3aebaa95a-1f3aebaa963 316->317 317->314 321 1f3aebaa969-1f3aebaa983 317->321 320 1f3aebaa8f5-1f3aebaa906 318->320 322 1f3aebaa8df-1f3aebaa8e7 319->322 323 1f3aebaa8e9-1f3aebaa8ee 319->323 325 1f3aebaa935-1f3aebaa94d 320->325 326 1f3aebaa908-1f3aebaa913 GetFileType 320->326 322->320 323->320 325->317 328 1f3aebaa94f-1f3aebaa953 325->328 326->325 327 1f3aebaa915-1f3aebaa920 326->327 329 1f3aebaa922-1f3aebaa927 327->329 330 1f3aebaa929-1f3aebaa92c 327->330 328->317 329->317 330->317 331 1f3aebaa92e-1f3aebaa933 330->331 331->317
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1777872156.000001F3AEBA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F3AEBA1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f3aeba1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: FileType
                        • String ID:
                        • API String ID: 3081899298-0
                        • Opcode ID: 96bd17cdbec1199f7060c8e4f9a6f8fd574a155b9e298efd3bd16726f0fb32a2
                        • Instruction ID: 5db93398ed9a1a477c002c305f548c87fb20e53e05974e51a53cb95ee2195bc5
                        • Opcode Fuzzy Hash: 96bd17cdbec1199f7060c8e4f9a6f8fd574a155b9e298efd3bd16726f0fb32a2
                        • Instruction Fuzzy Hash: 3F31C43050CE1B5FEBA59F2E848C6B47AD0FB09360F650759E8AAC71E4C634D9E1C3A1

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1777872156.000001F3AEBA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F3AEBA1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f3aeba1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: Volume$MountNamePoint
                        • String ID:
                        • API String ID: 1269602640-0
                        • Opcode ID: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction ID: 291fd9b4db61abd797c5e00082d1742aeb5a7782c7a45097cb13ef4b527ad07d
                        • Opcode Fuzzy Hash: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction Fuzzy Hash: A801627050C6448FFB06EB28D898BE67BE1F769305F008569E0CAC72A6DEBD8658C751

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1777872156.000001F3AEBA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F3AEBA1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f3aeba1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction ID: 007a152592362a0a9f15fb10fd707c6c5064bcf5de19b0f92bef5652970f6441
                        • Opcode Fuzzy Hash: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction Fuzzy Hash: 34D0177030420A0BEF187BBA599C2BD3A61CB45305F00183869A2CB6ABCD3B88898712

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 348 1f3aeba20b0-1f3aeba20d6 MessageBoxA
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1777872156.000001F3AEBA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F3AEBA1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f3aeba1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: Message
                        • String ID:
                        • API String ID: 2030045667-0
                        • Opcode ID: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction ID: f0c8c8b179c2aaeca1855f2f357fd550bc39611e5f4a8834ea67c0cbc9ad4e3c
                        • Opcode Fuzzy Hash: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction Fuzzy Hash: 1DC0123016180847E708BB34EC595D136E4FB5C304FD089399407C5450E96D82844A82
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1777872156.000001F3AEBA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F3AEBA1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f3aeba1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: _clrfp
                        • String ID:
                        • API String ID: 3618594692-0
                        • Opcode ID: 2045596ada029767b90017b957664b0b71c7a256b325aa916a96e60a40104743
                        • Instruction ID: 0d71102d7ed708b8591b76b2d609e91575ddaa1e1e15d57f75d2ce779c994bea
                        • Opcode Fuzzy Hash: 2045596ada029767b90017b957664b0b71c7a256b325aa916a96e60a40104743
                        • Instruction Fuzzy Hash: 6DC18330514A4E8FEF99DF1DC48A7A57BE0FF45304F158599E8A9CB2A1C335D892CB11
                        Memory Dump Source
                        • Source File: 00000000.00000002.1777872156.000001F3AEBA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F3AEBA1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f3aeba1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e4f9392618ee0be8b2838eee92702fec4626de7f7bd0dc604c65336cad8c2563
                        • Instruction ID: 3912bd90ef17f46149319d1b4ff4abb38bf8f233b1e2ba2ed4b840c8182ab3a5
                        • Opcode Fuzzy Hash: e4f9392618ee0be8b2838eee92702fec4626de7f7bd0dc604c65336cad8c2563
                        • Instruction Fuzzy Hash: AEE1327051CB498FEB75DF19D8897EA7BE1FB94305F00462EA89AC3160DF349685CB82
                        Memory Dump Source
                        • Source File: 00000000.00000002.1777872156.000001F3AEBA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F3AEBA1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f3aeba1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f301177accb7d0ce1b8505d76f0598128b48e2f6fca66abbe616489d302d7cc2
                        • Instruction ID: 5fe456cfab758e53be144d11e384c6bfee8e9011b49a72bf116409a6a69c01c5
                        • Opcode Fuzzy Hash: f301177accb7d0ce1b8505d76f0598128b48e2f6fca66abbe616489d302d7cc2
                        • Instruction Fuzzy Hash: 6DB1503120CA494FEB69EF29DC596FA77E1FB94301F00463AD89BC31A1DF349A458B91
                        Memory Dump Source
                        • Source File: 00000000.00000002.1777872156.000001F3AEBA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F3AEBA1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f3aeba1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 004e5bc4f416d9accfca0753fc8d67adee0aa063ac23580ea370914e8b763bcf
                        • Instruction ID: 0c4a280f9222ef0f3c49620b14a88378595b5e94beaa33e1956e4836505cd35e
                        • Opcode Fuzzy Hash: 004e5bc4f416d9accfca0753fc8d67adee0aa063ac23580ea370914e8b763bcf
                        • Instruction Fuzzy Hash: AD71B17061CB494BEB68DF29984D3BA7BD1FB89310F00856ED8DAC3261EF34D9468781
                        Memory Dump Source
                        • Source File: 00000000.00000002.1777872156.000001F3AEBA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F3AEBA1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f3aeba1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 30f0a361053a8720fb197dd7f2de9fba19a6b2a280636273193b063dd5433016
                        • Instruction ID: 8ca4913763e7c85d29a54cc19168581374dd118b4398d1c7ad5e2a2f97c5bb12
                        • Opcode Fuzzy Hash: 30f0a361053a8720fb197dd7f2de9fba19a6b2a280636273193b063dd5433016
                        • Instruction Fuzzy Hash: C251223231CE194FDB4CDF6DD4986B577D2E7AC310B15822EE84AC72A5DE70D9868780

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 375 1f3aeba40b0-1f3aeba4117 call 1f3aeba5054 378 1f3aeba411d-1f3aeba4120 375->378 379 1f3aeba4578-1f3aeba457f call 1f3aeba7854 375->379 378->379 380 1f3aeba4126-1f3aeba412c 378->380 382 1f3aeba41fb-1f3aeba420d 380->382 383 1f3aeba4132-1f3aeba4136 380->383 385 1f3aeba4213-1f3aeba4217 382->385 386 1f3aeba44c8-1f3aeba44cc 382->386 383->382 387 1f3aeba413c-1f3aeba4147 383->387 385->386 390 1f3aeba421d-1f3aeba4228 385->390 388 1f3aeba44ce-1f3aeba44d5 386->388 389 1f3aeba4505-1f3aeba450f call 1f3aeba319c 386->389 387->382 391 1f3aeba414d-1f3aeba4152 387->391 388->379 393 1f3aeba44db-1f3aeba4500 call 1f3aeba4580 388->393 389->379 403 1f3aeba4511-1f3aeba4530 call 1f3aebafa80 389->403 390->386 395 1f3aeba422e-1f3aeba4235 390->395 391->382 392 1f3aeba4158-1f3aeba4162 call 1f3aeba319c 391->392 392->403 406 1f3aeba4168-1f3aeba4193 call 1f3aeba319c * 2 call 1f3aeba3b64 392->406 393->389 396 1f3aeba423b-1f3aeba4276 call 1f3aeba385c 395->396 397 1f3aeba43f9-1f3aeba4405 395->397 396->397 411 1f3aeba427c-1f3aeba4286 396->411 397->389 404 1f3aeba440b-1f3aeba440f 397->404 408 1f3aeba4411-1f3aeba441d call 1f3aeba3b24 404->408 409 1f3aeba441f-1f3aeba4427 404->409 444 1f3aeba4195-1f3aeba4199 406->444 445 1f3aeba41b3-1f3aeba41bd call 1f3aeba319c 406->445 408->409 423 1f3aeba4440-1f3aeba4448 408->423 409->389 410 1f3aeba442d-1f3aeba443a call 1f3aeba36fc 409->410 410->389 410->423 416 1f3aeba428a-1f3aeba42bc 411->416 420 1f3aeba42c2-1f3aeba42ce 416->420 421 1f3aeba43e8-1f3aeba43ef 416->421 420->421 426 1f3aeba42d4-1f3aeba42ed 420->426 421->416 428 1f3aeba43f5-1f3aeba43f6 421->428 424 1f3aeba444e-1f3aeba4452 423->424 425 1f3aeba455b-1f3aeba4577 call 1f3aeba319c * 2 call 1f3aeba77c8 423->425 429 1f3aeba4465-1f3aeba4466 424->429 430 1f3aeba4454-1f3aeba4463 call 1f3aeba3b24 424->430 425->379 432 1f3aeba43e5-1f3aeba43e6 426->432 433 1f3aeba42f3-1f3aeba4338 call 1f3aeba3b38 * 2 426->433 428->397 438 1f3aeba4468-1f3aeba4472 call 1f3aeba50ec 429->438 430->438 432->421 458 1f3aeba4376-1f3aeba437c 433->458 459 1f3aeba433a-1f3aeba4360 call 1f3aeba3b38 call 1f3aeba47f0 433->459 438->389 453 1f3aeba4478-1f3aeba44c6 call 1f3aeba378c call 1f3aeba3990 438->453 444->445 449 1f3aeba419b-1f3aeba41a6 444->449 445->382 456 1f3aeba41bf-1f3aeba41df call 1f3aeba319c * 2 call 1f3aeba50ec 445->456 449->445 454 1f3aeba41a8-1f3aeba41ad 449->454 453->389 454->379 454->445 479 1f3aeba41e1-1f3aeba41eb call 1f3aeba51dc 456->479 480 1f3aeba41f6-1f3aeba41f7 456->480 462 1f3aeba437e-1f3aeba4382 458->462 463 1f3aeba43e0-1f3aeba43e1 458->463 474 1f3aeba4362-1f3aeba4374 459->474 475 1f3aeba4387-1f3aeba43db call 1f3aeba3fdc 459->475 462->433 463->432 474->458 474->459 475->463 483 1f3aeba41f1-1f3aeba4554 call 1f3aeba2f74 call 1f3aeba4bac call 1f3aeba53d8 479->483 484 1f3aeba4555-1f3aeba455a call 1f3aeba77c8 479->484 480->382 483->484 484->425
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1777872156.000001F3AEBA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F3AEBA1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f3aeba1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                        • String ID: csm$csm$csm
                        • API String ID: 849930591-393685449
                        • Opcode ID: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction ID: 078e961f3ee6b0b6aa41641df68cd494610150f6d7eb0ef908ace1670475ebc1
                        • Opcode Fuzzy Hash: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction Fuzzy Hash: 8FF16030518A498BEF54EF6A84897FD7BE1FB59310F50066DE899C3292DB30DAC1C792

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 494 1f3aeba4930-1f3aeba4978 call 1f3aeba3144 call 1f3aeba319c 499 1f3aeba49b2-1f3aeba49b6 494->499 500 1f3aeba497a-1f3aeba4980 494->500 502 1f3aeba49bc-1f3aeba49c0 499->502 503 1f3aeba4a4a-1f3aeba4a4e 499->503 500->499 501 1f3aeba4982-1f3aeba4984 500->501 506 1f3aeba4996-1f3aeba4998 501->506 507 1f3aeba4986-1f3aeba498a 501->507 508 1f3aeba4b41 502->508 509 1f3aeba49c6-1f3aeba49ce 502->509 504 1f3aeba4a92-1f3aeba4a98 503->504 505 1f3aeba4a50-1f3aeba4a5c 503->505 515 1f3aeba4a9a-1f3aeba4a9e 504->515 516 1f3aeba4b08-1f3aeba4b3c call 1f3aeba40b0 504->516 510 1f3aeba4a5e-1f3aeba4a62 505->510 511 1f3aeba4a72-1f3aeba4a7e 505->511 506->499 514 1f3aeba499a-1f3aeba49a6 506->514 513 1f3aeba498c-1f3aeba4994 507->513 507->514 512 1f3aeba4b46-1f3aeba4b60 508->512 509->508 517 1f3aeba49d4-1f3aeba49d8 509->517 510->511 518 1f3aeba4a64-1f3aeba4a70 call 1f3aeba3b24 510->518 511->508 520 1f3aeba4a84-1f3aeba4a8c 511->520 513->499 513->506 514->499 522 1f3aeba49a8-1f3aeba49ac 514->522 515->516 521 1f3aeba4aa0-1f3aeba4aa7 515->521 516->508 523 1f3aeba49da-1f3aeba49dc 517->523 524 1f3aeba4a37-1f3aeba4a45 call 1f3aeba3728 517->524 518->504 518->511 520->504 520->508 521->516 528 1f3aeba4aa9-1f3aeba4ab1 521->528 522->499 522->508 525 1f3aeba49de-1f3aeba49f0 call 1f3aeba3cb4 523->525 526 1f3aeba4a15-1f3aeba4a17 523->526 524->508 536 1f3aeba4b61-1f3aeba4b67 call 1f3aeba7854 525->536 539 1f3aeba49f6-1f3aeba49f9 525->539 526->524 532 1f3aeba4a19-1f3aeba4a21 526->532 528->516 533 1f3aeba4ab3-1f3aeba4ac6 call 1f3aeba3b38 528->533 532->536 537 1f3aeba4a27-1f3aeba4a2b 532->537 533->516 546 1f3aeba4ac8-1f3aeba4b06 533->546 537->536 541 1f3aeba4a31-1f3aeba4a35 537->541 539->536 543 1f3aeba49ff-1f3aeba4a03 539->543 545 1f3aeba4a05-1f3aeba4a10 call 1f3aeba4ec8 541->545 543->545 545->508 546->512
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1777872156.000001F3AEBA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F3AEBA1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f3aeba1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                        • String ID: csm$csm
                        • API String ID: 3896166516-3733052814
                        • Opcode ID: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction ID: cb23877f9556358b9b10bad489f09df4a44f1efa8eb892a3d63233132b316df7
                        • Opcode Fuzzy Hash: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction Fuzzy Hash: 80716030118A068FEFA49F1B808D3F8BBD1FB54311F54456A98E9C7692DB709AC1C792

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1777872156.000001F3AEBA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F3AEBA1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f3aeba1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: CallTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3163161869-2084237596
                        • Opcode ID: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction ID: 5a48b8cdfe4455fffb287c5926f0f6bf3f36b9d6dd20d02d2dc960c66302b461
                        • Opcode Fuzzy Hash: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction Fuzzy Hash: B971A13051CB898FEB649F1AC44ABFABBE0FB99300F044A6DE9D9C3151D774A581C792

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 550 1f3aeba2cf0-1f3aeba2d36 call 1f3aeba3144 553 1f3aeba2e2d-1f3aeba2e34 550->553 554 1f3aeba2d3c-1f3aeba2d46 550->554 555 1f3aeba2ed8-1f3aeba2ede 553->555 556 1f3aeba2e19-1f3aeba2e1b 554->556 557 1f3aeba2ee4 555->557 558 1f3aeba2e39-1f3aeba2e47 555->558 559 1f3aeba2d4b-1f3aeba2d59 556->559 560 1f3aeba2e21 556->560 563 1f3aeba2ee9-1f3aeba2f06 557->563 561 1f3aeba2e4d-1f3aeba2e55 558->561 562 1f3aeba2ed6 558->562 564 1f3aeba2d5f-1f3aeba2d66 559->564 565 1f3aeba2e17 559->565 560->557 561->562 566 1f3aeba2e57-1f3aeba2e5b 561->566 562->555 564->565 567 1f3aeba2d6c-1f3aeba2d71 564->567 565->556 568 1f3aeba2e5d-1f3aeba2e62 566->568 569 1f3aeba2e9c-1f3aeba2ead 566->569 567->565 570 1f3aeba2d77-1f3aeba2d7c 567->570 571 1f3aeba2e64-1f3aeba2e70 568->571 572 1f3aeba2e98-1f3aeba2e9a 568->572 575 1f3aeba2ebf-1f3aeba2ed3 569->575 576 1f3aeba2eaf-1f3aeba2eb5 569->576 573 1f3aeba2d7e-1f3aeba2d91 570->573 574 1f3aeba2d99-1f3aeba2d9f 570->574 579 1f3aeba2e91-1f3aeba2e96 571->579 580 1f3aeba2e72-1f3aeba2e79 571->580 572->557 572->569 590 1f3aeba2e26-1f3aeba2e28 573->590 591 1f3aeba2d97 573->591 577 1f3aeba2da1-1f3aeba2da9 574->577 578 1f3aeba2dc9-1f3aeba2e12 call 1f3aeba3110 call 1f3aeba3140 574->578 575->562 576->562 581 1f3aeba2eb7-1f3aeba2ebb 576->581 577->578 582 1f3aeba2dab-1f3aeba2db9 call 1f3aebaf940 577->582 578->565 579->571 579->572 580->579 584 1f3aeba2e7b-1f3aeba2e84 580->584 581->557 586 1f3aeba2ebd 581->586 582->578 593 1f3aeba2dbb-1f3aeba2dc1 582->593 584->579 589 1f3aeba2e86-1f3aeba2e8f 584->589 586->562 589->572 589->579 590->563 591->565 591->574 593->578
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1777872156.000001F3AEBA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F3AEBA1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1f3aeba1000_loaddll64.jbxd
                        Yara matches
                        Similarity
                        • API ID: CurrentImageNonwritable__except_validate_context_record
                        • String ID: csm
                        • API String ID: 3242871069-1018135373
                        • Opcode ID: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction ID: cc51aefbf87b98f7334da5d7a50b796fd068a6ff8e9f5ba41ec0688a1b8a7cab
                        • Opcode Fuzzy Hash: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction Fuzzy Hash: E471B53020CA068BDF68EE5EE4897B87BD1FB54350F10457EECD6C3296E624EDD18691

                        Execution Graph

                        Execution Coverage:1.5%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:23
                        Total number of Limit Nodes:2
                        execution_graph 5024 26c6e99 5028 26c6e9e 5024->5028 5025 26c6f52 5028->5025 5029 26c6f68 5028->5029 5030 26c6f75 5029->5030 5031 26c6f91 ExitProcess 5030->5031 5032 26c1000 5033 26c101b __scrt_get_show_window_mode 5032->5033 5034 26c103a GetVolumeNameForVolumeMountPointA 5033->5034 5035 26c1061 5034->5035 5036 26c2380 5047 26c2544 5036->5047 5038 26c2394 __scrt_get_show_window_mode __scrt_acquire_startup_lock __scrt_release_startup_lock 5038->5036 5040 26c23df 5038->5040 5041 26c20e0 5038->5041 5042 26c20f3 CreateThread 5041->5042 5044 26c2131 __scrt_get_show_window_mode 5042->5044 5051 26c20b0 MessageBoxA 5042->5051 5045 26c21cd GetLocaleInfoA 5044->5045 5046 26c2200 __std_exception_copy __scrt_get_show_window_mode 5044->5046 5045->5046 5046->5038 5048 26c254c 5047->5048 5049 26c2558 __scrt_dllmain_crt_thread_attach 5048->5049 5050 26c2561 5049->5050 5050->5038

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1749542743.00000000026C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 026C1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_26c1000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CreateInfoLocaleThread
                        • String ID: 5
                        • API String ID: 899703944-2226203566
                        • Opcode ID: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction ID: 6034dbff75e9a2d3b067c661b2b9541b4c91a6f4fdc813cad3614db7e31534ea
                        • Opcode Fuzzy Hash: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction Fuzzy Hash: 3241C131218A488BE719FF64DC986BB77E2FBD4305F64852DE54BC22A4DF38C449CA46

                        Control-flow Graph

                        APIs
                        • GetVolumeNameForVolumeMountPointA.KERNEL32 ref: 026C104B
                        Memory Dump Source
                        • Source File: 00000003.00000002.1749542743.00000000026C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 026C1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_26c1000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Volume$MountNamePoint
                        • String ID:
                        • API String ID: 1269602640-0
                        • Opcode ID: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction ID: 8e91bbef3289f137f0d27dfe89088027c1a18b0e6d15e3d920e47b4ac544e46b
                        • Opcode Fuzzy Hash: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction Fuzzy Hash: AA0167305085448FFB06EB28D8987E677E1F769305F00856DE0CAC72A5DEBC8558C745

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 47 26c6f68-26c6f77 call 26c6f9c 50 26c6f79-26c6f82 47->50 51 26c6f8a-26c6f9b call 26c6fc0 ExitProcess 47->51 50->51
                        APIs
                        • ExitProcess.KERNEL32(?,?,?,?,?,?,?,026C6F64), ref: 026C6F93
                        Memory Dump Source
                        • Source File: 00000003.00000002.1749542743.00000000026C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 026C1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_26c1000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction ID: 9ab3fc0b8f37eb385109b6046d0fcafef9bca943df7da07433090a263520dc42
                        • Opcode Fuzzy Hash: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction Fuzzy Hash: 8FD09B243007055FDB187BB5999813D3657D785105F10183C5513C7665CD3A9445874A

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 55 26c20b0-26c20d6 MessageBoxA
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1749542743.00000000026C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 026C1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_26c1000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Message
                        • String ID:
                        • API String ID: 2030045667-0
                        • Opcode ID: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction ID: f0c8c8b179c2aaeca1855f2f357fd550bc39611e5f4a8834ea67c0cbc9ad4e3c
                        • Opcode Fuzzy Hash: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction Fuzzy Hash: 1DC0123016180847E708BB34EC595D136E4FB5C304FD089399407C5450E96D82844A82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 72 26c40b0-26c4117 call 26c5054 75 26c411d-26c4120 72->75 76 26c4578-26c457f call 26c7854 72->76 75->76 77 26c4126-26c412c 75->77 79 26c41fb-26c420d 77->79 80 26c4132-26c4136 77->80 82 26c44c8-26c44cc 79->82 83 26c4213-26c4217 79->83 80->79 84 26c413c-26c4147 80->84 86 26c44ce-26c44d5 82->86 87 26c4505-26c450f call 26c319c 82->87 83->82 88 26c421d-26c4228 83->88 84->79 85 26c414d-26c4152 84->85 85->79 90 26c4158-26c4162 call 26c319c 85->90 86->76 91 26c44db-26c4500 call 26c4580 86->91 87->76 100 26c4511-26c4530 call 26cfa80 87->100 88->82 89 26c422e-26c4235 88->89 93 26c43f9-26c4405 89->93 94 26c423b-26c4276 call 26c385c 89->94 90->100 103 26c4168-26c4193 call 26c319c * 2 call 26c3b64 90->103 91->87 93->87 101 26c440b-26c440f 93->101 94->93 108 26c427c-26c4286 94->108 105 26c441f-26c4427 101->105 106 26c4411-26c441d call 26c3b24 101->106 141 26c4195-26c4199 103->141 142 26c41b3-26c41bd call 26c319c 103->142 105->87 107 26c442d-26c443a call 26c36fc 105->107 106->105 116 26c4440-26c4448 106->116 107->87 107->116 113 26c428a-26c42bc 108->113 118 26c43e8-26c43ef 113->118 119 26c42c2-26c42ce 113->119 121 26c444e-26c4452 116->121 122 26c455b-26c4577 call 26c319c * 2 call 26c77c8 116->122 118->113 125 26c43f5-26c43f6 118->125 119->118 123 26c42d4-26c42ed 119->123 126 26c4454-26c4463 call 26c3b24 121->126 127 26c4465-26c4466 121->127 122->76 129 26c43e5-26c43e6 123->129 130 26c42f3-26c4338 call 26c3b38 * 2 123->130 125->93 135 26c4468-26c4472 call 26c50ec 126->135 127->135 129->118 155 26c433a-26c4360 call 26c3b38 call 26c47f0 130->155 156 26c4376-26c437c 130->156 135->87 151 26c4478-26c44c6 call 26c378c call 26c3990 135->151 141->142 146 26c419b-26c41a6 141->146 142->79 153 26c41bf-26c41df call 26c319c * 2 call 26c50ec 142->153 146->142 152 26c41a8-26c41ad 146->152 151->87 152->76 152->142 176 26c41f6-26c41f7 153->176 177 26c41e1-26c41eb call 26c51dc 153->177 171 26c4387-26c43db call 26c3fdc 155->171 172 26c4362-26c4374 155->172 159 26c437e-26c4382 156->159 160 26c43e0-26c43e1 156->160 159->130 160->129 171->160 172->155 172->156 176->79 180 26c4555-26c455a call 26c77c8 177->180 181 26c41f1-26c4554 call 26c2f74 call 26c4bac call 26c53d8 177->181 180->122 181->180
                        APIs
                        • __FrameHandler3::GetHandlerSearchState.LIBVCRUNTIME ref: 026C410C
                          • Part of subcall function 026C5054: __GetUnwindTryBlock.LIBCMT ref: 026C5097
                          • Part of subcall function 026C5054: __SetUnwindTryBlock.LIBVCRUNTIME ref: 026C50BC
                        • Is_bad_exception_allowed.LIBVCRUNTIME ref: 026C41E4
                        • __FrameHandler3::ExecutionInCatch.LIBVCRUNTIME ref: 026C4433
                        • std::bad_alloc::bad_alloc.LIBCMT ref: 026C453F
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1749542743.00000000026C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 026C1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_26c1000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                        • String ID: csm$csm$csm
                        • API String ID: 849930591-393685449
                        • Opcode ID: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction ID: 2a13cf19db65b1d4340d999af5cf44cde75323d6efa88afa41d7da3c4a1126f3
                        • Opcode Fuzzy Hash: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction Fuzzy Hash: 5AE19D30918B488FDB24FF68C495AB9B7E1FB99314F64465ED489D3315DB30E882CB86

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 191 26c4930-26c4978 call 26c3144 call 26c319c 196 26c497a-26c4980 191->196 197 26c49b2-26c49b6 191->197 196->197 198 26c4982-26c4984 196->198 199 26c49bc-26c49c0 197->199 200 26c4a4a-26c4a4e 197->200 201 26c4996-26c4998 198->201 202 26c4986-26c498a 198->202 203 26c49c6-26c49ce 199->203 204 26c4b41 199->204 205 26c4a50-26c4a5c 200->205 206 26c4a92-26c4a98 200->206 201->197 209 26c499a-26c49a6 201->209 208 26c498c-26c4994 202->208 202->209 203->204 212 26c49d4-26c49d8 203->212 207 26c4b46-26c4b60 204->207 213 26c4a5e-26c4a62 205->213 214 26c4a72-26c4a7e 205->214 210 26c4b08-26c4b3c call 26c40b0 206->210 211 26c4a9a-26c4a9e 206->211 208->197 208->201 209->197 217 26c49a8-26c49ac 209->217 210->204 211->210 216 26c4aa0-26c4aa7 211->216 218 26c49da-26c49dc 212->218 219 26c4a37-26c4a45 call 26c3728 212->219 213->214 221 26c4a64-26c4a70 call 26c3b24 213->221 214->204 215 26c4a84-26c4a8c 214->215 215->204 215->206 216->210 223 26c4aa9-26c4ab1 216->223 217->197 217->204 225 26c49de-26c49f0 call 26c3cb4 218->225 226 26c4a15-26c4a17 218->226 219->204 221->206 221->214 223->210 229 26c4ab3-26c4ac6 call 26c3b38 223->229 233 26c4b61-26c4b67 call 26c7854 225->233 236 26c49f6-26c49f9 225->236 226->219 228 26c4a19-26c4a21 226->228 232 26c4a27-26c4a2b 228->232 228->233 229->210 243 26c4ac8-26c4b06 229->243 232->233 238 26c4a31-26c4a35 232->238 236->233 240 26c49ff-26c4a03 236->240 242 26c4a05-26c4a10 call 26c4ec8 238->242 240->242 242->204 243->207
                        APIs
                        • __except_validate_context_record.LIBVCRUNTIME ref: 026C4958
                        • __FrameHandler3::FrameUnwindToEmptyState.LIBVCRUNTIME ref: 026C4A40
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1749542743.00000000026C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 026C1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_26c1000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                        • String ID: csm$csm
                        • API String ID: 3896166516-3733052814
                        • Opcode ID: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction ID: 2409464ffd4a23be32f22ae5c0a36ccecbe7038950560539414714f5e92c4842
                        • Opcode Fuzzy Hash: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction Fuzzy Hash: 64618930618A498FCB68EF2880A8374B7E2FB98315F64565ED48DC7795DF34D880CB86

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 247 26c2cf0-26c2d36 call 26c3144 250 26c2d3c-26c2d46 247->250 251 26c2e2d-26c2e34 247->251 253 26c2e19-26c2e1b 250->253 252 26c2ed8-26c2ede 251->252 256 26c2e39-26c2e47 252->256 257 26c2ee4 252->257 254 26c2d4b-26c2d59 253->254 255 26c2e21 253->255 261 26c2d5f-26c2d66 254->261 262 26c2e17 254->262 255->257 258 26c2e4d-26c2e55 256->258 259 26c2ed6 256->259 260 26c2ee9-26c2f06 257->260 258->259 263 26c2e57-26c2e5b 258->263 259->252 261->262 264 26c2d6c-26c2d71 261->264 262->253 265 26c2e9c-26c2ead 263->265 266 26c2e5d-26c2e62 263->266 264->262 267 26c2d77-26c2d7c 264->267 272 26c2ebf-26c2ed3 265->272 273 26c2eaf-26c2eb5 265->273 268 26c2e98-26c2e9a 266->268 269 26c2e64-26c2e70 266->269 270 26c2d7e-26c2d91 267->270 271 26c2d99-26c2d9f 267->271 268->257 268->265 276 26c2e91-26c2e96 269->276 277 26c2e72-26c2e79 269->277 284 26c2e26-26c2e28 270->284 285 26c2d97 270->285 274 26c2dc9-26c2e12 call 26c3110 call 26c3140 271->274 275 26c2da1-26c2da9 271->275 272->259 273->259 278 26c2eb7-26c2ebb 273->278 274->262 275->274 280 26c2dab-26c2db9 call 26cf940 275->280 276->268 276->269 277->276 282 26c2e7b-26c2e84 277->282 278->257 279 26c2ebd 278->279 279->259 280->274 290 26c2dbb-26c2dc1 280->290 282->276 288 26c2e86-26c2e8f 282->288 284->260 285->262 285->271 288->268 288->276 290->274
                        APIs
                        • __except_validate_context_record.LIBVCRUNTIME ref: 026C2D1B
                        • _IsNonwritableInCurrentImage.LIBCMT ref: 026C2DB2
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1749542743.00000000026C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 026C1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_26c1000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CurrentImageNonwritable__except_validate_context_record
                        • String ID: csm
                        • API String ID: 3242871069-1018135373
                        • Opcode ID: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction ID: a745198ae24e614a948d9c41872d28acf9bbf699e128422956de0e1ae2de320c
                        • Opcode Fuzzy Hash: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction Fuzzy Hash: 13619F70208A098BCB28FE5CD495A7477D1FB58354F20456EEC8AD7256EB34E8A28BC5

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 293 26c4580-26c45b3 294 26c47cc-26c47e6 293->294 295 26c45b9-26c45db call 26c319c 293->295 298 26c45dd-26c45f1 call 26c319c 295->298 299 26c4638-26c464a 295->299 298->299 311 26c45f3-26c45f9 298->311 300 26c47e7-26c47ef call 26c7854 299->300 301 26c4650-26c4694 call 26c385c 299->301 301->294 308 26c469a-26c46a5 301->308 310 26c46ac-26c46e7 308->310 312 26c46ed-26c46f9 310->312 313 26c47ab-26c47c6 310->313 311->299 314 26c45fb-26c4601 311->314 312->313 315 26c46ff-26c4724 312->315 313->294 313->310 314->299 316 26c4603-26c4632 call 26c3644 314->316 317 26c4726-26c4732 call 26c3b24 315->317 318 26c4757-26c475a 315->318 316->294 316->299 325 26c474f-26c4750 317->325 326 26c4734-26c4737 317->326 318->313 320 26c475c-26c47a6 call 26c3fdc 318->320 320->313 325->318 327 26c4739-26c4745 call 26c3b24 326->327 328 26c4747 326->328 330 26c4749-26c474d 327->330 328->330 330->313 330->325
                        APIs
                        • _CallSETranslator.LIBVCRUNTIME ref: 026C462B
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1749542743.00000000026C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 026C1000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_26c1000_regsvr32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CallTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3163161869-2084237596
                        • Opcode ID: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction ID: 7bd34ad701cfda8d6a99c7677680722cbbe5739581d3ec79476ec5e0ee6fc73a
                        • Opcode Fuzzy Hash: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction Fuzzy Hash: A8719030518B488FD768FF18D446BBAB7E0FB99314F244A6EE489C3211DB74E591CB86

                        Execution Graph

                        Execution Coverage:1.9%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:30
                        Total number of Limit Nodes:4

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1751707509.0000021509031000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021509031000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_21509031000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CreateInfoLocaleThread
                        • String ID: 5
                        • API String ID: 899703944-2226203566
                        • Opcode ID: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction ID: e94d36a8184ffa52bc378b0c8c00e8c6f4e63aacc591919bcd8526c23dc6a2a8
                        • Opcode Fuzzy Hash: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction Fuzzy Hash: 1B41B131218A44CBE769EFA4D8AD7EA73E5FBEC305F40856DE14BC21A9DE3884058642

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000004.00000002.1751707509.0000021509031000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021509031000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_21509031000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: FileType
                        • String ID:
                        • API String ID: 3081899298-0
                        • Opcode ID: 96bd17cdbec1199f7060c8e4f9a6f8fd574a155b9e298efd3bd16726f0fb32a2
                        • Instruction ID: 47fe8be5137c17e398d499d16787c3e75f311fb7443531ceb1521b2bdf287e63
                        • Opcode Fuzzy Hash: 96bd17cdbec1199f7060c8e4f9a6f8fd574a155b9e298efd3bd16726f0fb32a2
                        • Instruction Fuzzy Hash: E7310631608E2A8EDBB5DF6C84986A077D0F76D320F65438AE09ED71E8C630D891C380

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000004.00000002.1751707509.0000021509031000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021509031000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_21509031000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Volume$MountNamePoint
                        • String ID:
                        • API String ID: 1269602640-0
                        • Opcode ID: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction ID: 505af98fa65b3c0237cd151bac0fa39a56765c930d45426e58f7338a4ef3d8f7
                        • Opcode Fuzzy Hash: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction Fuzzy Hash: 200167305089448FFB06EB68D8987D677E1F7AD305F008569E0CAC72A6DE7D8558C741

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000004.00000002.1751707509.0000021509031000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021509031000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_21509031000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction ID: 8571ed7081cebb75c77b0a6be39570f39ae411fef5cd5518809ae1b5c0b8158f
                        • Opcode Fuzzy Hash: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction Fuzzy Hash: 27D012303006085FEA28FFF4599D36D265587AD305F0058786506C769BCD3B88458702

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 74 215090320b0-215090320d6 MessageBoxA
                        APIs
                        Memory Dump Source
                        • Source File: 00000004.00000002.1751707509.0000021509031000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021509031000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_21509031000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Message
                        • String ID:
                        • API String ID: 2030045667-0
                        • Opcode ID: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction ID: f0c8c8b179c2aaeca1855f2f357fd550bc39611e5f4a8834ea67c0cbc9ad4e3c
                        • Opcode Fuzzy Hash: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction Fuzzy Hash: 1DC0123016180847E708BB34EC595D136E4FB5C304FD089399407C5450E96D82844A82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 91 215090340b0-21509034117 call 21509035054 94 21509034578-2150903457f call 21509037854 91->94 95 2150903411d-21509034120 91->95 95->94 96 21509034126-2150903412c 95->96 98 215090341fb-2150903420d 96->98 99 21509034132-21509034136 96->99 101 215090344c8-215090344cc 98->101 102 21509034213-21509034217 98->102 99->98 103 2150903413c-21509034147 99->103 105 21509034505-2150903450f call 2150903319c 101->105 106 215090344ce-215090344d5 101->106 102->101 107 2150903421d-21509034228 102->107 103->98 104 2150903414d-21509034152 103->104 104->98 109 21509034158-21509034162 call 2150903319c 104->109 105->94 119 21509034511-21509034530 call 2150903fa80 105->119 106->94 110 215090344db-21509034500 call 21509034580 106->110 107->101 108 2150903422e-21509034235 107->108 112 2150903423b-21509034276 call 2150903385c 108->112 113 215090343f9-21509034405 108->113 109->119 122 21509034168-21509034193 call 2150903319c * 2 call 21509033b64 109->122 110->105 112->113 127 2150903427c-21509034286 112->127 113->105 120 2150903440b-2150903440f 113->120 124 2150903441f-21509034427 120->124 125 21509034411-2150903441d call 21509033b24 120->125 160 21509034195-21509034199 122->160 161 215090341b3-215090341bd call 2150903319c 122->161 124->105 126 2150903442d-2150903443a call 215090336fc 124->126 125->124 135 21509034440-21509034448 125->135 126->105 126->135 132 2150903428a-215090342bc 127->132 137 215090343e8-215090343ef 132->137 138 215090342c2-215090342ce 132->138 140 2150903455b-21509034577 call 2150903319c * 2 call 215090377c8 135->140 141 2150903444e-21509034452 135->141 137->132 144 215090343f5-215090343f6 137->144 138->137 142 215090342d4-215090342ed 138->142 140->94 145 21509034465-21509034466 141->145 146 21509034454-21509034463 call 21509033b24 141->146 148 215090343e5-215090343e6 142->148 149 215090342f3-21509034338 call 21509033b38 * 2 142->149 144->113 154 21509034468-21509034472 call 215090350ec 145->154 146->154 148->137 174 21509034376-2150903437c 149->174 175 2150903433a-21509034360 call 21509033b38 call 215090347f0 149->175 154->105 170 21509034478-215090344c6 call 2150903378c call 21509033990 154->170 160->161 165 2150903419b-215090341a6 160->165 161->98 172 215090341bf-215090341df call 2150903319c * 2 call 215090350ec 161->172 165->161 171 215090341a8-215090341ad 165->171 170->105 171->94 171->161 195 215090341f6-215090341f7 172->195 196 215090341e1-215090341eb call 215090351dc 172->196 178 215090343e0-215090343e1 174->178 179 2150903437e-21509034382 174->179 190 21509034387-215090343db call 21509033fdc 175->190 191 21509034362-21509034374 175->191 178->148 179->149 190->178 191->174 191->175 195->98 199 21509034555-2150903455a call 215090377c8 196->199 200 215090341f1-21509034554 call 21509032f74 call 21509034bac call 215090353d8 196->200 199->140 200->199
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1751707509.0000021509031000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021509031000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_21509031000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                        • String ID: csm$csm$csm
                        • API String ID: 849930591-393685449
                        • Opcode ID: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction ID: 539983bcb0787b6259aca059c56405352482bb0f43dbf45b0d7c1c4c517198c1
                        • Opcode Fuzzy Hash: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction Fuzzy Hash: 98F15130918E588BEB64EF9884997E977E4FBBD310F50469DE44DC72AADB30D881C781

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 210 21509034930-21509034978 call 21509033144 call 2150903319c 215 2150903497a-21509034980 210->215 216 215090349b2-215090349b6 210->216 215->216 217 21509034982-21509034984 215->217 218 215090349bc-215090349c0 216->218 219 21509034a4a-21509034a4e 216->219 220 21509034996-21509034998 217->220 221 21509034986-2150903498a 217->221 222 215090349c6-215090349ce 218->222 223 21509034b41 218->223 224 21509034a50-21509034a5c 219->224 225 21509034a92-21509034a98 219->225 220->216 230 2150903499a-215090349a6 220->230 229 2150903498c-21509034994 221->229 221->230 222->223 233 215090349d4-215090349d8 222->233 228 21509034b46-21509034b60 223->228 226 21509034a5e-21509034a62 224->226 227 21509034a72-21509034a7e 224->227 231 21509034b08-21509034b3c call 215090340b0 225->231 232 21509034a9a-21509034a9e 225->232 226->227 234 21509034a64-21509034a70 call 21509033b24 226->234 227->223 236 21509034a84-21509034a8c 227->236 229->216 229->220 230->216 238 215090349a8-215090349ac 230->238 231->223 232->231 237 21509034aa0-21509034aa7 232->237 239 21509034a37-21509034a45 call 21509033728 233->239 240 215090349da-215090349dc 233->240 234->225 234->227 236->223 236->225 237->231 242 21509034aa9-21509034ab1 237->242 238->216 238->223 239->223 244 21509034a15-21509034a17 240->244 245 215090349de-215090349f0 call 21509033cb4 240->245 242->231 249 21509034ab3-21509034ac6 call 21509033b38 242->249 244->239 248 21509034a19-21509034a21 244->248 253 21509034b61-21509034b67 call 21509037854 245->253 255 215090349f6-215090349f9 245->255 252 21509034a27-21509034a2b 248->252 248->253 249->231 262 21509034ac8-21509034b06 249->262 252->253 257 21509034a31-21509034a35 252->257 255->253 259 215090349ff-21509034a03 255->259 261 21509034a05-21509034a10 call 21509034ec8 257->261 259->261 261->223 262->228
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1751707509.0000021509031000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021509031000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_21509031000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                        • String ID: csm$csm
                        • API String ID: 3896166516-3733052814
                        • Opcode ID: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction ID: be03610db37e6b95334e39cbcb96de9d7f0f2114a2adc2b5e8695eeaadd940ec
                        • Opcode Fuzzy Hash: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction Fuzzy Hash: 97717230114E14CBEBB4DF5980AD3A5B7D5FBBC311F54869E948DCB6AADB349880C782

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 266 21509032cf0-21509032d36 call 21509033144 269 21509032d3c-21509032d46 266->269 270 21509032e2d-21509032e34 266->270 272 21509032e19-21509032e1b 269->272 271 21509032ed8-21509032ede 270->271 275 21509032e39-21509032e47 271->275 276 21509032ee4 271->276 273 21509032d4b-21509032d59 272->273 274 21509032e21 272->274 277 21509032e17 273->277 278 21509032d5f-21509032d66 273->278 274->276 279 21509032ed6 275->279 280 21509032e4d-21509032e55 275->280 281 21509032ee9-21509032f06 276->281 277->272 278->277 282 21509032d6c-21509032d71 278->282 279->271 280->279 283 21509032e57-21509032e5b 280->283 282->277 284 21509032d77-21509032d7c 282->284 285 21509032e9c-21509032ead 283->285 286 21509032e5d-21509032e62 283->286 287 21509032d99-21509032d9f 284->287 288 21509032d7e-21509032d91 284->288 289 21509032ebf-21509032ed3 285->289 290 21509032eaf-21509032eb5 285->290 291 21509032e98-21509032e9a 286->291 292 21509032e64-21509032e70 286->292 294 21509032dc9-21509032e12 call 21509033110 call 21509033140 287->294 295 21509032da1-21509032da9 287->295 305 21509032d97 288->305 306 21509032e26-21509032e28 288->306 289->279 290->279 293 21509032eb7-21509032ebb 290->293 291->276 291->285 296 21509032e72-21509032e79 292->296 297 21509032e91-21509032e96 292->297 293->276 299 21509032ebd 293->299 294->277 295->294 300 21509032dab-21509032db9 call 2150903f940 295->300 296->297 302 21509032e7b-21509032e84 296->302 297->291 297->292 299->279 300->294 310 21509032dbb-21509032dc1 300->310 302->297 304 21509032e86-21509032e8f 302->304 304->291 304->297 305->277 305->287 306->281 310->294
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1751707509.0000021509031000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021509031000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_21509031000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CurrentImageNonwritable__except_validate_context_record
                        • String ID: csm
                        • API String ID: 3242871069-1018135373
                        • Opcode ID: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction ID: 5c04dc8f9c455f9c8bbe24bbd420291e63dc6830f10797215b968f20d489cea0
                        • Opcode Fuzzy Hash: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction Fuzzy Hash: 82718530208E14CBDB78EE9CD49A7B473D5F7BC350F1085AEE89AC319AE734E8518685

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1751707509.0000021509031000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021509031000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_21509031000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CallTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3163161869-2084237596
                        • Opcode ID: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction ID: e3ea0cc47cb28b9789629e92e28d379dfa623a187bea7c03e513401400f63989
                        • Opcode Fuzzy Hash: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction Fuzzy Hash: FE71A030518B488FE764DF58C44ABEAB7E4FBAD300F048A9DE48DC7265D774A4818782

                        Execution Graph

                        Execution Coverage:1.5%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:23
                        Total number of Limit Nodes:2

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.1751603344.000001A3CA651000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A3CA651000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_1a3ca651000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CreateInfoLocaleThread
                        • String ID: 5
                        • API String ID: 899703944-2226203566
                        • Opcode ID: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction ID: 4d0a82759b82f4b9eba3225ad3ed46b247ac373cdd74ad4c9c1dc3ea4b1651e8
                        • Opcode Fuzzy Hash: 53e6023148aec332c40765bce66317f8f0d3847e40e453e3a9759d4f43b705e2
                        • Instruction Fuzzy Hash: C041C030B15A448BE799FB24DC997EB73E2FB85311F40852EF157D31A9DE3885068B42

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.1751603344.000001A3CA651000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A3CA651000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_1a3ca651000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Volume$MountNamePoint
                        • String ID:
                        • API String ID: 1269602640-0
                        • Opcode ID: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction ID: 4639c0cc78a43a2481afa9310d4975abae4cc67177af8415ca6f3c8213485f4a
                        • Opcode Fuzzy Hash: 790c3e5c04854700e94b4d90c23288a0a6dd65ca27d7b0edd1071683d7a5972d
                        • Instruction Fuzzy Hash: C801A7306085448FFB46EB28DC987D637E1F769301F008169E0CAD72A6DEBC8658C741

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.1751603344.000001A3CA651000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A3CA651000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_1a3ca651000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction ID: 33b72960e24bf217522e80ce18d04672761bf5b145c04851f7e536035e268d0f
                        • Opcode Fuzzy Hash: 05666283937c1f08677c7088b7fd24b6f81cfbeb3c6d91aeb7e4e1034e6939b2
                        • Instruction Fuzzy Hash: 53D01234B012040BFA587BF55D883AD26538746315F041C397513D76ABCD3A8856C703

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 55 1a3ca6520b0-1a3ca6520d6 MessageBoxA
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.1751603344.000001A3CA651000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A3CA651000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_1a3ca651000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Message
                        • String ID:
                        • API String ID: 2030045667-0
                        • Opcode ID: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction ID: f0c8c8b179c2aaeca1855f2f357fd550bc39611e5f4a8834ea67c0cbc9ad4e3c
                        • Opcode Fuzzy Hash: b1c7642022b5e6b88316a0d0a9cd98790ccd3d47a32ec667f729e349532e1fef
                        • Instruction Fuzzy Hash: 1DC0123016180847E708BB34EC595D136E4FB5C304FD089399407C5450E96D82844A82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 72 1a3ca6540b0-1a3ca654117 call 1a3ca655054 75 1a3ca654578-1a3ca65457f call 1a3ca657854 72->75 76 1a3ca65411d-1a3ca654120 72->76 76->75 77 1a3ca654126-1a3ca65412c 76->77 79 1a3ca654132-1a3ca654136 77->79 80 1a3ca6541fb-1a3ca65420d 77->80 79->80 84 1a3ca65413c-1a3ca654147 79->84 82 1a3ca6544c8-1a3ca6544cc 80->82 83 1a3ca654213-1a3ca654217 80->83 87 1a3ca654505-1a3ca65450f call 1a3ca65319c 82->87 88 1a3ca6544ce-1a3ca6544d5 82->88 83->82 85 1a3ca65421d-1a3ca654228 83->85 84->80 86 1a3ca65414d-1a3ca654152 84->86 85->82 89 1a3ca65422e-1a3ca654235 85->89 86->80 90 1a3ca654158-1a3ca654162 call 1a3ca65319c 86->90 87->75 101 1a3ca654511-1a3ca654530 call 1a3ca65fa80 87->101 88->75 91 1a3ca6544db-1a3ca654500 call 1a3ca654580 88->91 93 1a3ca6543f9-1a3ca654405 89->93 94 1a3ca65423b-1a3ca654276 call 1a3ca65385c 89->94 90->101 105 1a3ca654168-1a3ca654193 call 1a3ca65319c * 2 call 1a3ca653b64 90->105 91->87 93->87 98 1a3ca65440b-1a3ca65440f 93->98 94->93 109 1a3ca65427c-1a3ca654286 94->109 102 1a3ca65441f-1a3ca654427 98->102 103 1a3ca654411-1a3ca65441d call 1a3ca653b24 98->103 102->87 108 1a3ca65442d-1a3ca65443a call 1a3ca6536fc 102->108 103->102 116 1a3ca654440-1a3ca654448 103->116 141 1a3ca6541b3-1a3ca6541bd call 1a3ca65319c 105->141 142 1a3ca654195-1a3ca654199 105->142 108->87 108->116 114 1a3ca65428a-1a3ca6542bc 109->114 118 1a3ca6543e8-1a3ca6543ef 114->118 119 1a3ca6542c2-1a3ca6542ce 114->119 121 1a3ca65455b-1a3ca654577 call 1a3ca65319c * 2 call 1a3ca6577c8 116->121 122 1a3ca65444e-1a3ca654452 116->122 118->114 125 1a3ca6543f5-1a3ca6543f6 118->125 119->118 123 1a3ca6542d4-1a3ca6542ed 119->123 121->75 126 1a3ca654454-1a3ca654463 call 1a3ca653b24 122->126 127 1a3ca654465-1a3ca654466 122->127 129 1a3ca6542f3-1a3ca654338 call 1a3ca653b38 * 2 123->129 130 1a3ca6543e5-1a3ca6543e6 123->130 125->93 135 1a3ca654468-1a3ca654472 call 1a3ca6550ec 126->135 127->135 154 1a3ca65433a-1a3ca654360 call 1a3ca653b38 call 1a3ca6547f0 129->154 155 1a3ca654376-1a3ca65437c 129->155 130->118 135->87 149 1a3ca654478-1a3ca6544c6 call 1a3ca65378c call 1a3ca653990 135->149 141->80 157 1a3ca6541bf-1a3ca6541df call 1a3ca65319c * 2 call 1a3ca6550ec 141->157 142->141 144 1a3ca65419b-1a3ca6541a6 142->144 144->141 150 1a3ca6541a8-1a3ca6541ad 144->150 149->87 150->75 150->141 171 1a3ca654387-1a3ca6543db call 1a3ca653fdc 154->171 172 1a3ca654362-1a3ca654374 154->172 161 1a3ca6543e0-1a3ca6543e1 155->161 162 1a3ca65437e-1a3ca654382 155->162 176 1a3ca6541f6-1a3ca6541f7 157->176 177 1a3ca6541e1-1a3ca6541eb call 1a3ca6551dc 157->177 161->130 162->129 171->161 172->154 172->155 176->80 180 1a3ca654555-1a3ca65455a call 1a3ca6577c8 177->180 181 1a3ca6541f1-1a3ca654554 call 1a3ca652f74 call 1a3ca654bac call 1a3ca6553d8 177->181 180->121 181->180
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.1751603344.000001A3CA651000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A3CA651000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_1a3ca651000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                        • String ID: csm$csm$csm
                        • API String ID: 849930591-393685449
                        • Opcode ID: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction ID: af9b4efd419048e5164fdacc7d2b0135171d847509022744acf294cd766f6a25
                        • Opcode Fuzzy Hash: 3ccd74b83f4e218917afb10b63cd26341559b906269fc65534a34942f520602e
                        • Instruction Fuzzy Hash: B7F17430E15A088BEB94FF68C8497E977E2FB56320F50065EE459D329ADB30D952C783

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 191 1a3ca654930-1a3ca654978 call 1a3ca653144 call 1a3ca65319c 196 1a3ca65497a-1a3ca654980 191->196 197 1a3ca6549b2-1a3ca6549b6 191->197 196->197 198 1a3ca654982-1a3ca654984 196->198 199 1a3ca654a4a-1a3ca654a4e 197->199 200 1a3ca6549bc-1a3ca6549c0 197->200 203 1a3ca654996-1a3ca654998 198->203 204 1a3ca654986-1a3ca65498a 198->204 201 1a3ca654a50-1a3ca654a5c 199->201 202 1a3ca654a92-1a3ca654a98 199->202 205 1a3ca6549c6-1a3ca6549ce 200->205 206 1a3ca654b41 200->206 207 1a3ca654a72-1a3ca654a7e 201->207 208 1a3ca654a5e-1a3ca654a62 201->208 212 1a3ca654b08-1a3ca654b3c call 1a3ca6540b0 202->212 213 1a3ca654a9a-1a3ca654a9e 202->213 203->197 210 1a3ca65499a-1a3ca6549a6 203->210 204->210 211 1a3ca65498c-1a3ca654994 204->211 205->206 214 1a3ca6549d4-1a3ca6549d8 205->214 209 1a3ca654b46-1a3ca654b60 206->209 207->206 219 1a3ca654a84-1a3ca654a8c 207->219 208->207 217 1a3ca654a64-1a3ca654a70 call 1a3ca653b24 208->217 210->197 221 1a3ca6549a8-1a3ca6549ac 210->221 211->197 211->203 212->206 213->212 220 1a3ca654aa0-1a3ca654aa7 213->220 215 1a3ca654a37-1a3ca654a45 call 1a3ca653728 214->215 216 1a3ca6549da-1a3ca6549dc 214->216 215->206 222 1a3ca654a15-1a3ca654a17 216->222 223 1a3ca6549de-1a3ca6549f0 call 1a3ca653cb4 216->223 217->202 217->207 219->202 219->206 220->212 225 1a3ca654aa9-1a3ca654ab1 220->225 221->197 221->206 222->215 229 1a3ca654a19-1a3ca654a21 222->229 234 1a3ca654b61-1a3ca654b67 call 1a3ca657854 223->234 236 1a3ca6549f6-1a3ca6549f9 223->236 225->212 230 1a3ca654ab3-1a3ca654ac6 call 1a3ca653b38 225->230 233 1a3ca654a27-1a3ca654a2b 229->233 229->234 230->212 243 1a3ca654ac8-1a3ca654b06 230->243 233->234 238 1a3ca654a31-1a3ca654a35 233->238 236->234 240 1a3ca6549ff-1a3ca654a03 236->240 242 1a3ca654a05-1a3ca654a10 call 1a3ca654ec8 238->242 240->242 242->206 243->209
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.1751603344.000001A3CA651000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A3CA651000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_1a3ca651000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                        • String ID: csm$csm
                        • API String ID: 3896166516-3733052814
                        • Opcode ID: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction ID: 8eeab1d44490eb8cc37624885216192a9de97be6a9aeea31d72daae0498eb173
                        • Opcode Fuzzy Hash: e27bbef9eb5f28e076bf3649e7203d2c4342c914ee4d718e56e88106427699c6
                        • Instruction Fuzzy Hash: EC71C530B05A088FDBE8AB18884D394B3D3FB55321F14459FB4A9D7299DB30D9A2D743

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 247 1a3ca652cf0-1a3ca652d36 call 1a3ca653144 250 1a3ca652d3c-1a3ca652d46 247->250 251 1a3ca652e2d-1a3ca652e34 247->251 253 1a3ca652e19-1a3ca652e1b 250->253 252 1a3ca652ed8-1a3ca652ede 251->252 254 1a3ca652e39-1a3ca652e47 252->254 255 1a3ca652ee4 252->255 256 1a3ca652e21 253->256 257 1a3ca652d4b-1a3ca652d59 253->257 258 1a3ca652ed6 254->258 259 1a3ca652e4d-1a3ca652e55 254->259 260 1a3ca652ee9-1a3ca652f06 255->260 256->255 261 1a3ca652e17 257->261 262 1a3ca652d5f-1a3ca652d66 257->262 258->252 259->258 263 1a3ca652e57-1a3ca652e5b 259->263 261->253 262->261 264 1a3ca652d6c-1a3ca652d71 262->264 265 1a3ca652e9c-1a3ca652ead 263->265 266 1a3ca652e5d-1a3ca652e62 263->266 264->261 267 1a3ca652d77-1a3ca652d7c 264->267 272 1a3ca652ebf-1a3ca652ed3 265->272 273 1a3ca652eaf-1a3ca652eb5 265->273 268 1a3ca652e98-1a3ca652e9a 266->268 269 1a3ca652e64-1a3ca652e70 266->269 270 1a3ca652d99-1a3ca652d9f 267->270 271 1a3ca652d7e-1a3ca652d91 267->271 268->255 268->265 276 1a3ca652e72-1a3ca652e79 269->276 277 1a3ca652e91-1a3ca652e96 269->277 274 1a3ca652dc9-1a3ca652e12 call 1a3ca653110 call 1a3ca653140 270->274 275 1a3ca652da1-1a3ca652da9 270->275 287 1a3ca652d97 271->287 288 1a3ca652e26-1a3ca652e28 271->288 272->258 273->258 278 1a3ca652eb7-1a3ca652ebb 273->278 274->261 275->274 279 1a3ca652dab-1a3ca652db9 call 1a3ca65f940 275->279 276->277 281 1a3ca652e7b-1a3ca652e84 276->281 277->268 277->269 278->255 283 1a3ca652ebd 278->283 279->274 290 1a3ca652dbb-1a3ca652dc1 279->290 281->277 286 1a3ca652e86-1a3ca652e8f 281->286 283->258 286->268 286->277 287->261 287->270 288->260 290->274
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.1751603344.000001A3CA651000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A3CA651000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_1a3ca651000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CurrentImageNonwritable__except_validate_context_record
                        • String ID: csm
                        • API String ID: 3242871069-1018135373
                        • Opcode ID: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction ID: 4059e070ac63de2618c4c35cd6cbe5a039592818ad7ae94cb560fb86a10c800a
                        • Opcode Fuzzy Hash: 43c5b6145a0bc1a6e7f1a4078bb18beee855f0c15013e264a2f6e222c992594d
                        • Instruction Fuzzy Hash: 5E71D830B09A058BDFA8FF2DD8857B473D6F755320F10456FF896D319AE620ED628682

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.1751603344.000001A3CA651000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A3CA651000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_1a3ca651000_rundll32.jbxd
                        Yara matches
                        Similarity
                        • API ID: CallTranslator
                        • String ID: MOC$RCC
                        • API String ID: 3163161869-2084237596
                        • Opcode ID: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction ID: 4bcaeeca63c2bfa30fb163f94a98d50bae920a7f79c341ebb5c9c56163b9e793
                        • Opcode Fuzzy Hash: 9263fe20008c7eccda2d837675211652d6c96f36503d8c2c93f65cb69d80355e
                        • Instruction Fuzzy Hash: 3971F530919B488FE7A5EF18C846BE6B3E1FB9A310F000A5EE499D3155D774E592C783