Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
wlbsctrl.dll

Overview

General Information

Sample Name:wlbsctrl.dll
Analysis ID:651262
MD5:8b2356cc4b0a382e79dcd4a844839e91
SHA1:ffb6a64c9996aa9e14ab69791f610babf98784c5
SHA256:1e57baa7d7c987aebd09b43788e9388c89a1cb9e89b4cbad24a8662e606d62f2
Infos:

Detection

Score:26
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Contains functionality to detect sleep reduction / modifications
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
Contains functionality to call native functions
Contains functionality to detect sandboxes (mouse cursor move detection)
May check if the current machine is a sandbox (GetTickCount - Sleep)
Program does not show much activity (idle)
Creates a process in suspended mode (likely to inject code)

Classification

Analysis Advice

Sample monitors window changes (e.g. starting applications), analyze the sample with the 'Simulates keyboard and window changes' cookbook
Sample may be VM or Sandbox-aware, try analysis on a native machine
  • System is w10x64
  • loaddll64.exe (PID: 5068 cmdline: loaddll64.exe "C:\Users\user\Desktop\wlbsctrl.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 3352 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 5828 cmdline: rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: wlbsctrl.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: C:\Users\lemmy\Desktop\shellcodeless\syscall-xll-SecMods\x64\DLL\WhackAMole.pdb source: loaddll64.exe, 00000001.00000002.268351744.00007FFFF00EA000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.276464539.00007FFFF00EA000.00000002.00000001.01000000.00000003.sdmp, wlbsctrl.dll
Source: C:\Windows\System32\loaddll64.exeCode function: 4x nop then dec eax1_2_000002DCB240B7BA
Source: C:\Windows\System32\rundll32.exeCode function: 4x nop then dec eax4_2_00000220E1E8B7BA
Source: wlbsctrl.dllBinary or memory string: OriginalFilenameOfficev1 vs wlbsctrl.dll
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00007FFFF00E102D1_2_00007FFFF00E102D
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00007FFFF00E11401_2_00007FFFF00E1140
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000002DCB241398A1_2_000002DCB241398A
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000002DCB24193DA1_2_000002DCB24193DA
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000002DCB240C0CA1_2_000002DCB240C0CA
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000002DCB241B46A1_2_000002DCB241B46A
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000220E1E993DA4_2_00000220E1E993DA
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000220E1E9398A4_2_00000220E1E9398A
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000220E1E8C0CA4_2_00000220E1E8C0CA
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000220E1E9B46A4_2_00000220E1E9B46A
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00007FFFF00E1140 GetModuleHandleA,memset,GetCurrentProcess,NtAddBootEntry,NtAddBootEntry,NtAddBootEntry,NtAddBootEntry,CloseHandle,1_2_00007FFFF00E1140
Source: wlbsctrl.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\wlbsctrl.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1Jump to behavior
Source: classification engineClassification label: sus26.evad.winDLL@5/0@0/0
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00007FFFF00E2B00 GetTickCount,Sleep,GetCursorPos,Sleep,GetCursorPos,GetDiskFreeSpaceExA,GetModuleHandleA,GetProcAddress,GlobalMemoryStatusEx,K32EnumProcesses,EnumProcesses,Sleep,1_2_00007FFFF00E2B00
Source: wlbsctrl.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: wlbsctrl.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: wlbsctrl.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: wlbsctrl.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: wlbsctrl.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: wlbsctrl.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: wlbsctrl.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: wlbsctrl.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: wlbsctrl.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\lemmy\Desktop\shellcodeless\syscall-xll-SecMods\x64\DLL\WhackAMole.pdb source: loaddll64.exe, 00000001.00000002.268351744.00007FFFF00EA000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.276464539.00007FFFF00EA000.00000002.00000001.01000000.00000003.sdmp, wlbsctrl.dll
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000002DCB2422850 push ecx; retf 003Fh1_2_000002DCB24228B0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000220E1EA2850 push ecx; retf 003Fh4_2_00000220E1EA28B0
Source: wlbsctrl.dllStatic PE information: section name: .00cfg
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00007FFFF00E11F91_2_00007FFFF00E11F9
Source: C:\Windows\System32\loaddll64.exe TID: 2324Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Windows\System32\loaddll64.exeCode function: GetTickCount,Sleep,GetCursorPos,Sleep,GetCursorPos,GetDiskFreeSpaceExA,GetModuleHandleA,GetProcAddress,GlobalMemoryStatusEx,K32EnumProcesses,EnumProcesses,Sleep,1_2_00007FFFF00E2B00
Source: C:\Windows\System32\loaddll64.exeCode function: GetCursorPos,Sleep,GetCursorPos,IsProcessorFeaturePresent,capture_current_context,1_2_00007FFFF00E1219
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00007FFFF00E11F91_2_00007FFFF00E11F9
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\loaddll64.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00007FFFF00E11EA IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FFFF00E11EA
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00007FFFF00E11EA IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FFFF00E11EA
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00007FFFF00E5094 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,1_2_00007FFFF00E5094
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath Interception11
Process Injection
1
Rundll32
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts12
Virtualization/Sandbox Evasion
LSASS Memory13
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
Obfuscated Files or Information
NTDS12
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Application Window Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials3
System Information Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 651262 Sample: wlbsctrl.dll Startdate: 23/06/2022 Architecture: WINDOWS Score: 26 6 loaddll64.exe 1 2->6         started        signatures3 13 Contains functionality to detect sleep reduction / modifications 6->13 9 cmd.exe 1 6->9         started        process4 process5 11 rundll32.exe 9->11         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox Version:35.0.0 Citrine
Analysis ID:651262
Start date and time: 23/06/202218:03:502022-06-23 18:03:50 +02:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 8m 41s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:wlbsctrl.dll
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:32
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:SUS
Classification:sus26.evad.winDLL@5/0@0/0
EGA Information:
  • Successful, ratio: 100%
HDC Information:
  • Successful, ratio: 19.6% (good quality ratio 3.5%)
  • Quality average: 13.8%
  • Quality standard deviation: 31.9%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 9
  • Number of non-executed functions: 15
Cookbook Comments:
  • Found application associated with file extension: .dll
  • Adjust boot time
  • Enable AMSI
  • Override analysis time to 240s for rundll32
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
  • Excluded IPs from analysis (whitelisted): 23.211.6.115
  • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, fs.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, time.windows.com, arc.msn.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtWriteVirtualMemory calls found.
TimeTypeDescription
18:05:07API Interceptor1x Sleep call for process: loaddll64.exe modified
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Entropy (8bit):2.301165268606333
TrID:
  • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
  • Win64 Executable (generic) (12005/4) 10.17%
  • Generic Win/DOS Executable (2004/3) 1.70%
  • DOS Executable Generic (2002/1) 1.70%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
File name:wlbsctrl.dll
File size:775168
MD5:8b2356cc4b0a382e79dcd4a844839e91
SHA1:ffb6a64c9996aa9e14ab69791f610babf98784c5
SHA256:1e57baa7d7c987aebd09b43788e9388c89a1cb9e89b4cbad24a8662e606d62f2
SHA512:273c11f50ce23d01108c7edf484f10fc7d318cd89fcc51baf7f2721f1655340b0167214498f5e08a9e7fdae9e656f6f516a7eff7a25e7151e1f0ea5fc5d71ba0
SSDEEP:12288:FjwnXutNmopfRYxaKHFiPTLJsaVHct37frld/ibWcccccccccI6gRThD:
TLSH:59F4B75A0823D211D8244C3196377AC66F1672E9776C27D3F6A92FA2C1390C1AD77F3A
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........{Fv.(Fv.(Fv.(O.k(Bv.(...)Dv.(R..)Cv.(Fv.(pv.(...)Jv.(...)Nv.(...)Bv.(...)Gv.(...(Gv.(Fvo(Gv.(...)Gv.(RichFv.(...............
Icon Hash:74f0e4ecccdce0e4
Entrypoint:0x18000100a
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x180000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x62ACC1D8 [Fri Jun 17 18:03:04 2022 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:05dcd6eab6e64f86dc1e816425be7b14
Instruction
jmp 00007F7328B01BB2h
jmp 00007F7328B02099h
jmp 00007F7328B00C2Ch
jmp 00007F7328B02107h
jmp 00007F7328B00DF2h
jmp 00007F7328B02925h
jmp 00007F7328B02B44h
jmp 00007F7328AFFA93h
jmp 00007F7328B02342h
jmp 00007F7328B020EDh
jmp 00007F7328B05F64h
jmp 00007F7328B02B23h
jmp 00007F7328B02B32h
jmp 00007F7328B00B35h
jmp 00007F7328B05F30h
jmp 00007F7328B03D6Bh
jmp 00007F7328B01122h
jmp 00007F7328B05FA1h
jmp 00007F7328B0169Ch
jmp 00007F7328B028BBh
jmp 00007F7328B02B02h
jmp 00007F7328B0220Dh
jmp 00007F7328B03D28h
jmp 00007F7328B015F3h
jmp 00007F7328B02AE6h
jmp 00007F7328B05FD9h
jmp 00007F7328B00F1Ch
jmp 00007F7328B014D7h
jmp 00007F7328B05E8Ah
jmp 00007F7328B023F9h
jmp 00007F7328B02AD4h
jmp 00007F7328B02007h
jmp 00007F7328B05E26h
jmp 00007F7328B01FF9h
jmp 00007F7328B0225Ch
jmp 00007F7328B00467h
jmp 00007F7328B05FC2h
jmp 00007F7328B02069h
jmp 00007F7328B00C6Ch
jmp 00007F7328AFF7A3h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0xbe3b00x78.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xc10000x890.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0xbd0000x420.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0xc20000x40.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0xab640x38.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0xb0a00x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xaba00x138.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0xbe0000x3b0.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x89b50x8a00False0.24363111413043478data3.5100227973693183IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0xa0000x1f620x2000False0.1304931640625data1.5044615193257005IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0xc0000xb05390xafe00False0.1482459355010661data2.016608344146886IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0xbd0000x5ac0x600False0.3919270833333333data3.213440260810703IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.idata0xbe0000xe3d0x1000False0.23828125data3.0459227597586005IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.tls0xbf0000x3090x400False0.021484375data0.011173818721219527IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.00cfg0xc00000x1510x200False0.0546875data0.330964730370671IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0xc10000x8900xa00False0.2640625data2.6030848233720585IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0xc20000x1f10x200False0.14453125data0.7368777605793444IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountry
RT_VERSION0xc11c00x354dataEnglishUnited States
RT_MANIFEST0xc15180x17dXML 1.0 document textEnglishUnited States
DLLImport
KERNEL32.dllCreateFileA, GetDiskFreeSpaceExA, CloseHandle, Sleep, GetCurrentProcess, GetTickCount, GetModuleHandleA, GetProcAddress, CreateFileMappingA, K32EnumProcesses, K32GetModuleInformation, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, SetEvent, ResetEvent, WaitForSingleObjectEx, CreateEventW, GetModuleHandleW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, IsProcessorFeaturePresent, TerminateProcess, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead
USER32.dllGetCursorPos
VCRUNTIME140.dllmemset, __C_specific_handler, __current_exception, __current_exception_context, __std_type_info_destroy_list
api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, __stdio_common_vfprintf
api-ms-win-crt-runtime-l1-1-0.dllterminate, _initterm_e, _seh_filter_dll, _configure_narrow_argv, _initialize_narrow_environment, _initialize_onexit_table, _register_onexit_function, _execute_onexit_table, _crt_atexit, _crt_at_quick_exit, _cexit, _initterm
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:1
Start time:18:04:53
Start date:23/06/2022
Path:C:\Windows\System32\loaddll64.exe
Wow64 process (32bit):false
Commandline:loaddll64.exe "C:\Users\user\Desktop\wlbsctrl.dll"
Imagebase:0x7ff7eaf20000
File size:140288 bytes
MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Target ID:3
Start time:18:04:53
Start date:23/06/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1
Imagebase:0x7ff7bb450000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Target ID:4
Start time:18:04:54
Start date:23/06/2022
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1
Imagebase:0x7ff745220000
File size:69632 bytes
MD5 hash:73C519F050C20580F8A62C849D49215A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Reset < >

    Execution Graph

    Execution Coverage:4.2%
    Dynamic/Decrypted Code Coverage:23.2%
    Signature Coverage:16.8%
    Total number of Nodes:185
    Total number of Limit Nodes:2
    execution_graph 7577 7ffff00e117c __scrt_is_managed_app 7578 7ffff00e48fc GetModuleHandleW 7577->7578 7579 7ffff00e490d 7578->7579 7541 7ffff00e3efe 7542 7ffff00e3f1c 7541->7542 7545 7ffff00e107d __GSHandlerCheckCommon 7542->7545 7544 7ffff00e3f2f 7545->7544 7546 7ffff00e3f40 7545->7546 7491 7ffff00e3878 7492 7ffff00e3889 7491->7492 7493 7ffff00e38bb 7491->7493 7494 7ffff00e38f8 7492->7494 7496 7ffff00e388e 7492->7496 7495 7ffff00e11ea 9 API calls 7494->7495 7498 7ffff00e3902 7495->7498 7496->7493 7497 7ffff00e38ab _initialize_onexit_table 7496->7497 7497->7493 7533 7ffff00e10b9 7534 7ffff00e2df0 GetDiskFreeSpaceExA 7533->7534 7535 7ffff00e2e0f 7534->7535 7590 7ffff00e11f9 7591 7ffff00e2e50 GetTickCount Sleep GetTickCount 7590->7591 7554 7ffff00e5333 LeaveCriticalSection 7475 7ffff00e4c2f 7476 7ffff00e4c44 IsProcessorFeaturePresent 7475->7476 7477 7ffff00e4c5c 7476->7477 7480 7ffff00e5004 RtlCaptureContext 7477->7480 7479 7ffff00e4c6f 7481 7ffff00e501e RtlLookupFunctionEntry 7480->7481 7482 7ffff00e506d 7481->7482 7483 7ffff00e5034 RtlVirtualUnwind 7481->7483 7482->7479 7483->7481 7483->7482 7484 7ffff00e1032 7485 7ffff00e4c44 IsProcessorFeaturePresent 7484->7485 7486 7ffff00e4c5c 7485->7486 7487 7ffff00e5004 capture_previous_context 3 API calls 7486->7487 7488 7ffff00e4c6f 7487->7488 7547 7ffff00e52f2 CloseHandle 7580 7ffff00e53b2 GetCursorPos 7555 7ffff00e3d2c EnterCriticalSection 7556 7ffff00e3d82 _Init_thread_footer 7555->7556 7548 7ffff00e10eb 7549 7ffff00e3f1c 7548->7549 7550 7ffff00e107d __GSHandlerCheckCommon __GSHandlerCheckCommon 7549->7550 7551 7ffff00e3f2f 7550->7551 7557 7ffff00e1127 7558 7ffff00e2e90 7557->7558 7559 7ffff00e2f01 GetModuleHandleA 7558->7559 7561 7ffff00e2f17 7559->7561 7560 7ffff00e2f51 GetProcAddress 7562 7ffff00e2f6b 7560->7562 7561->7560 7561->7561 7581 7ffff00e3da4 EnterCriticalSection 7582 7ffff00e3dba 7581->7582 7583 7ffff00e3df8 LeaveCriticalSection 7582->7583 7499 2dcb2410776 7500 2dcb2410798 _CallSETranslator 7499->7500 7503 2dcb2411c3a 7500->7503 7502 2dcb24107e3 7505 2dcb2411c67 IsInExceptionSpec __except_validate_context_record _CallSETranslator 7503->7505 7506 2dcb2411cca __GetCurrentState std::bad_alloc::bad_alloc __FrameHandler3::FrameUnwindToState __FrameHandler3::FrameUnwindToEmptyState 7505->7506 7507 2dcb2411462 7505->7507 7506->7502 7510 2dcb24114b0 FindHandler IsInExceptionSpec __FrameHandler3::GetHandlerSearchState _CallSETranslator 7507->7510 7508 2dcb241183b 7513 2dcb241157e 9 library calls 7508->7513 7518 2dcb24118c6 7508->7518 7510->7508 7511 2dcb24115c6 pair TypeMatchHelper IsInExceptionSpec 7510->7511 7510->7513 7511->7513 7514 2dcb2411392 7511->7514 7513->7506 7515 2dcb24113cf _GetEstablisherFrame 7514->7515 7517 2dcb24113f5 __FrameHandler3::UnwindNestedFrames IsInExceptionSpec 7515->7517 7522 2dcb24112d2 7515->7522 7517->7511 7519 2dcb2411ad3 7518->7519 7520 2dcb24118ff pair IsInExceptionSpec _CallSETranslator 7518->7520 7519->7513 7520->7519 7521 2dcb2411392 FindHandler BuildCatchObjectHelperInternal 7520->7521 7521->7520 7523 2dcb24112f9 BuildCatchObjectHelperInternal 7522->7523 7397 2dcb240b17e 7398 2dcb240b186 7397->7398 7403 2dcb240bc3a 7398->7403 7400 2dcb240b1cb 7401 2dcb240b1a6 7401->7400 7407 2dcb240b1d6 7401->7407 7405 2dcb240bfd9 7403->7405 7406 2dcb240bc58 7403->7406 7404 2dcb240bf7e LoadLibraryA 7404->7405 7405->7401 7406->7404 7406->7405 7410 2dcb240b232 7407->7410 7416 2dcb240b3bf 7407->7416 7408 2dcb240b441 7408->7400 7409 2dcb240b445 TerminateProcess 7409->7408 7411 2dcb240b28c LoadLibraryA 7410->7411 7412 2dcb240b2ef 7411->7412 7413 2dcb240b318 GetComputerNameExW 7412->7413 7415 2dcb240b33a 7412->7415 7413->7415 7414 2dcb240b3ab NetWkstaGetInfo 7414->7416 7415->7414 7415->7416 7416->7408 7416->7409 7536 7ffff00e76d8 7539 7ffff00e11db __scrt_release_startup_lock 7536->7539 7538 7ffff00e76e9 7539->7538 7540 7ffff00e39e8 7539->7540 7540->7538 7592 7ffff00e1219 7593 7ffff00e124b IsProcessorFeaturePresent 7592->7593 7594 7ffff00e121f GetCursorPos Sleep GetCursorPos 7592->7594 7597 7ffff00e4e48 7593->7597 7598 7ffff00e2dbf 7594->7598 7599 7ffff00e4f7c capture_current_context 3 API calls 7597->7599 7600 7ffff00e4e5c 7599->7600 7417 7ffff00e3ad4 InitializeCriticalSectionAndSpinCount GetModuleHandleW 7418 7ffff00e3b1a GetProcAddress GetProcAddress 7417->7418 7419 7ffff00e3b05 GetModuleHandleW 7417->7419 7420 7ffff00e3b57 CreateEventW 7418->7420 7421 7ffff00e3b42 7418->7421 7419->7418 7422 7ffff00e3b47 7419->7422 7420->7422 7421->7420 7421->7422 7427 7ffff00e3b80 7422->7427 7436 7ffff00e11ea 7422->7436 7424 7ffff00e3ba3 InitializeCriticalSectionAndSpinCount GetModuleHandleW 7425 7ffff00e3c1e GetProcAddress GetProcAddress 7424->7425 7426 7ffff00e3c09 GetModuleHandleW 7424->7426 7429 7ffff00e3c64 CreateEventW 7425->7429 7430 7ffff00e3c46 7425->7430 7426->7425 7428 7ffff00e3c82 7426->7428 7432 7ffff00e11ea 9 API calls 7428->7432 7429->7428 7431 7ffff00e3c4b 7429->7431 7430->7429 7430->7431 7433 7ffff00e3c8c DeleteCriticalSection 7432->7433 7434 7ffff00e3cd9 CloseHandle 7433->7434 7435 7ffff00e3cdf 7433->7435 7434->7435 7436->7424 7437 7ffff00e4708 IsProcessorFeaturePresent 7436->7437 7438 7ffff00e472e 7437->7438 7439 7ffff00e473c memset RtlCaptureContext RtlLookupFunctionEntry 7438->7439 7440 7ffff00e4776 RtlVirtualUnwind 7439->7440 7441 7ffff00e47b2 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7439->7441 7440->7441 7442 7ffff00e4836 7441->7442 7442->7424 7524 7ffff00e5094 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 7584 2dcb241c14a 7585 2dcb241c161 _CallSETranslator 7584->7585 7586 2dcb2411c3a __InternalCxxFrameHandler BuildCatchObjectHelperInternal 7585->7586 7587 2dcb241c1bd _CallSETranslator 7586->7587 7563 7ffff00e114f _Init_thread_abort 7564 7ffff00e3cf0 EnterCriticalSection 7563->7564 7565 7ffff00e3d16 _Init_thread_footer 7564->7565 7525 7ffff00e448c 7526 7ffff00e44ad 7525->7526 7527 7ffff00e44a8 7525->7527 7529 7ffff00e1186 __security_init_cookie 7527->7529 7529->7526 7530 7ffff00e511c 7529->7530 7531 7ffff00e51b3 7530->7531 7532 7ffff00e513f GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 7530->7532 7531->7526 7532->7531 7566 7ffff00e4d4c 7569 7ffff00e109b 7566->7569 7568 7ffff00e4d5a 7569->7568 7570 7ffff00e4d64 IsProcessorFeaturePresent 7569->7570 7571 7ffff00e4d7b 7570->7571 7574 7ffff00e4f7c RtlCaptureContext RtlLookupFunctionEntry 7571->7574 7573 7ffff00e4d8f 7573->7568 7575 7ffff00e4fac RtlVirtualUnwind 7574->7575 7576 7ffff00e4fde 7574->7576 7575->7576 7576->7573 7601 2dcb241c112 __scrt_dllmain_exception_filter 7489 7ffff00e1244 __scrt_get_show_window_mode 7490 7ffff00e48a8 memset GetStartupInfoW 7489->7490 7552 7ffff00e5303 GetCurrentProcess 7553 7ffff019e020 7552->7553 7443 7ffff00e2b00 7444 7ffff00e1064 7443->7444 7445 7ffff00e2b15 GetTickCount Sleep 7444->7445 7459 7ffff019e028 7445->7459 7447 7ffff00e2b43 GetCursorPos Sleep GetCursorPos 7448 7ffff00e2b8a GetDiskFreeSpaceExA 7447->7448 7450 7ffff00e2bb1 7448->7450 7451 7ffff00e2c21 GetModuleHandleA 7450->7451 7453 7ffff00e2c37 7451->7453 7452 7ffff00e2c71 GetProcAddress GlobalMemoryStatusEx K32EnumProcesses 7454 7ffff00e2cbd 7452->7454 7453->7452 7453->7453 7455 7ffff00e2cdf 7454->7455 7456 7ffff00e2cd2 Sleep 7454->7456 7458 7ffff00e1140 16 API calls 7455->7458 7457 7ffff00e2ce4 7456->7457 7458->7457 7460 7ffff00e2140 7462 7ffff00e215f 7460->7462 7461 7ffff00e21a2 GetModuleHandleA GetCurrentProcess K32GetModuleInformation 7464 7ffff00e21d4 7461->7464 7462->7461 7462->7462 7463 7ffff00e2212 GetProcAddress 7466 7ffff00e222f 7463->7466 7464->7463 7464->7464 7465 7ffff00e2272 GetProcAddress VirtualAlloc 7469 7ffff00e1109 printf 7465->7469 7466->7465 7466->7466 7468 7ffff00e22bc VirtualProtect 7469->7468 7470 7ffff00e3520 __acrt_iob_func 7469->7470 7473 7ffff00e1014 7470->7473 7472 7ffff00e3556 __stdio_common_vfprintf 7472->7468 7473->7472 7474 7ffff00e3510 7473->7474 7474->7472 7588 7ffff00e11c2 7589 7ffff00e3e8c LeaveCriticalSection 7588->7589

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.267988196.00007FFFF00E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFFF00E0000, based on PE: true
    • Associated: 00000001.00000002.267975714.00007FFFF00E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268156670.00007FFFF00E7000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268351744.00007FFFF00EA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268379197.00007FFFF00EC000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272243206.00007FFFF016C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272295089.00007FFFF019B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272370215.00007FFFF019D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272383317.00007FFFF01A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffff00e0000_loaddll64.jbxd
    Similarity
    • API ID: Sleep$Cursor$AddressCountDiskEnumFreeGlobalHandleMemoryModuleProcProcessesSpaceStatusTick
    • String ID: @$C:\
    • API String ID: 1094001007-2217305858
    • Opcode ID: bf23feac25fa6789cfb7cb4e4c0ad847f7ba566056215651666ce38ee523ffbb
    • Instruction ID: ab55ec66915afdcde04eae2c897f8694e90fba9fc9211581a58cf034f692c751
    • Opcode Fuzzy Hash: bf23feac25fa6789cfb7cb4e4c0ad847f7ba566056215651666ce38ee523ffbb
    • Instruction Fuzzy Hash: 1C51D432E0868686FB108B61E4943BE67E1FB84794F580231EA6E937D9CF7CE548C700
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 158 7ffff00e102d-7ffff00e23ce call 7ffff00e2030 162 7ffff00e242d-7ffff00e248a CreateFileA CreateFileMappingA call 7ffff00e1890 158->162 163 7ffff00e23d0-7ffff00e23e8 158->163 168 7ffff00e248c-7ffff00e2499 162->168 169 7ffff00e24c1-7ffff00e24dd GetModuleHandleA call 7ffff00e1a70 162->169 164 7ffff00e23f0-7ffff00e2426 163->164 164->164 166 7ffff00e2428 164->166 166->162 170 7ffff00e24a0-7ffff00e24bb 168->170 174 7ffff00e24df-7ffff00e24ec 169->174 175 7ffff00e2511-7ffff00e254b GetProcAddress MapViewOfFile call 7ffff00e14c0 169->175 170->170 172 7ffff00e24bd 170->172 172->169 177 7ffff00e24f0-7ffff00e250b 174->177 180 7ffff00e254d-7ffff00e255a 175->180 181 7ffff00e2581-7ffff00e25bb call 7ffff00e1136 175->181 177->177 178 7ffff00e250d 177->178 178->175 182 7ffff00e2560-7ffff00e257b 180->182 186 7ffff00e2842-7ffff00e2855 call 7ffff00e11fe 181->186 187 7ffff00e25c1-7ffff00e25ce 181->187 182->182 184 7ffff00e257d 182->184 184->181 186->187 196 7ffff00e285b-7ffff00e2883 call 7ffff00e10e6 call 7ffff00e1208 186->196 188 7ffff00e2603-7ffff00e261e call 7ffff00e1136 call 7ffff00e1b70 187->188 189 7ffff00e25d0-7ffff00e25dd 187->189 202 7ffff00e2620-7ffff00e262d 188->202 203 7ffff00e2651-7ffff00e266f call 7ffff00e1136 call 7ffff00e1d50 188->203 191 7ffff00e25e0-7ffff00e25fb 189->191 191->191 195 7ffff00e25fd 191->195 195->188 196->187 205 7ffff00e2630-7ffff00e264b 202->205 211 7ffff00e26a1-7ffff00e26b8 call 7ffff00e1136 203->211 212 7ffff00e2671-7ffff00e267e 203->212 205->205 207 7ffff00e264d 205->207 207->203 217 7ffff00e26be-7ffff00e26c4 211->217 218 7ffff00e27e8-7ffff00e27fb call 7ffff00e11fe 211->218 213 7ffff00e2680-7ffff00e269b 212->213 213->213 216 7ffff00e269d 213->216 216->211 219 7ffff00e26c6-7ffff00e270c 217->219 220 7ffff00e2712-7ffff00e2732 GetModuleHandleA call 7ffff00e15a0 217->220 218->217 225 7ffff00e2801-7ffff00e283d call 7ffff00e10e6 call 7ffff00e1208 218->225 219->220 226 7ffff00e2734-7ffff00e273e 220->226 227 7ffff00e2761-7ffff00e27e1 call 7ffff00e1136 call 7ffff00e10cd * 4 CloseHandle * 2 220->227 225->217 229 7ffff00e2740-7ffff00e275a 226->229 227->218 229->229 232 7ffff00e275c 229->232 232->227
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.267988196.00007FFFF00E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFFF00E0000, based on PE: true
    • Associated: 00000001.00000002.267975714.00007FFFF00E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268156670.00007FFFF00E7000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268351744.00007FFFF00EA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268379197.00007FFFF00EC000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272243206.00007FFFF016C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272295089.00007FFFF019B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272370215.00007FFFF019D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272383317.00007FFFF01A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffff00e0000_loaddll64.jbxd
    Similarity
    • API ID: FileHandle$CreateModule$AddressCloseMappingProcView
    • String ID: NtCreateThreadEx$ntdll.dll
    • API String ID: 2780192746-690569937
    • Opcode ID: a20f02d3871e444d9c41e9ea417fa4be42467ff58e261095a7fe092d24706668
    • Instruction ID: b0807a0c186d33cd1c86e144b6653c5ec75499627aee183e8bea7f790e31c747
    • Opcode Fuzzy Hash: a20f02d3871e444d9c41e9ea417fa4be42467ff58e261095a7fe092d24706668
    • Instruction Fuzzy Hash: 1CD1F422E0D6C686F710CB26E9A46BA6BD0BB41BD8F444335DA7D177DADE6CE108C740
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.267988196.00007FFFF00E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFFF00E0000, based on PE: true
    • Associated: 00000001.00000002.267975714.00007FFFF00E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268156670.00007FFFF00E7000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268351744.00007FFFF00EA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268379197.00007FFFF00EC000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272243206.00007FFFF016C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272295089.00007FFFF019B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272370215.00007FFFF019D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272383317.00007FFFF01A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffff00e0000_loaddll64.jbxd
    Similarity
    • API ID: BootEntry$Handle$CloseCurrentModuleProcessmemset
    • String ID: ntdll.dll
    • API String ID: 3873965561-2227199552
    • Opcode ID: 8ec1fb59fc83e3fbd599cd93e82e9b1dc2d926dcafa1658c45c0997bf7e50469
    • Instruction ID: 4e6d0aec2f20f6e80bac6c732366d5884c652106b14cf92b20110f8a2bd4639c
    • Opcode Fuzzy Hash: 8ec1fb59fc83e3fbd599cd93e82e9b1dc2d926dcafa1658c45c0997bf7e50469
    • Instruction Fuzzy Hash: E3A15031E09B8685F7608F64E9942A97BE4FB44B98F440239DAAD57BE9CF3CE145C700
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.267988196.00007FFFF00E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFFF00E0000, based on PE: true
    • Associated: 00000001.00000002.267975714.00007FFFF00E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268156670.00007FFFF00E7000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268351744.00007FFFF00EA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268379197.00007FFFF00EC000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272243206.00007FFFF016C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272295089.00007FFFF019B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272370215.00007FFFF019D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272383317.00007FFFF01A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffff00e0000_loaddll64.jbxd
    Similarity
    • API ID: Handle$AddressModuleProc$CriticalSection$CountCreateEventInitializeSpin$CloseDelete
    • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
    • API String ID: 251140187-3242537097
    • Opcode ID: 9849fdbbacffd081f93dd195d024c6097c9f37e40ccc457ff2f290fb4760c6ba
    • Instruction ID: 1cf7dd0f66f4c8a0493a8d4a2a1923be78b77a5f5b27a619f755729822a69c9c
    • Opcode Fuzzy Hash: 9849fdbbacffd081f93dd195d024c6097c9f37e40ccc457ff2f290fb4760c6ba
    • Instruction Fuzzy Hash: 74414D20F19A0791FB549F10FA9967567E2AF48788F580635DA3E127E9EF6CF4488300
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.266382312.000002DCB240B000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002DCB240B000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_2dcb240b000_loaddll64.jbxd
    Similarity
    • API ID: ComputerInfoLibraryLoadNameWksta
    • String ID: .$2$3$a$d$e$i$l$l$n$p$t
    • API String ID: 3393981993-1206877643
    • Opcode ID: 9f1df4b9c6e76e77351a2f1aa7da60c0e0fb4b368d1276d023936cfa14d4e98f
    • Instruction ID: f469caa897da0e7bdf930100cdeb37dee7cd548662f9c8266b2d218218b39535
    • Opcode Fuzzy Hash: 9f1df4b9c6e76e77351a2f1aa7da60c0e0fb4b368d1276d023936cfa14d4e98f
    • Instruction Fuzzy Hash: 9D811B3011C7848FE364DB18C04975BFBE6FBA9308F64495EE089C76A9CBB5D985CB06
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 99 2dcb240bc3a-2dcb240bc52 100 2dcb240bc58-2dcb240bc80 call 2dcb240b7ba 99->100 101 2dcb240c06b-2dcb240c074 99->101 100->101 104 2dcb240bc86-2dcb240bcc4 call 2dcb240b9da call 2dcb240b7ba 100->104 109 2dcb240bd86-2dcb240bd90 104->109 110 2dcb240bcca-2dcb240bcd4 104->110 109->101 112 2dcb240bd96-2dcb240bed2 call 2dcb240b9da * 9 109->112 110->109 111 2dcb240bcda-2dcb240bd83 110->111 111->109 132 2dcb240bf73-2dcb240bf78 112->132 133 2dcb240bed8-2dcb240bee2 112->133 132->101 134 2dcb240bf7e-2dcb240bfd3 LoadLibraryA 132->134 133->132 135 2dcb240bee8-2dcb240bef2 133->135 134->101 136 2dcb240bfd9-2dcb240c049 call 2dcb240b9da * 3 134->136 135->132 137 2dcb240bef4-2dcb240befe 135->137 136->101 150 2dcb240c04b-2dcb240c055 136->150 137->132 138 2dcb240bf00-2dcb240bf0a 137->138 138->132 140 2dcb240bf0c-2dcb240bf16 138->140 140->132 143 2dcb240bf18-2dcb240bf22 140->143 143->132 145 2dcb240bf24-2dcb240bf2e 143->145 145->132 147 2dcb240bf30-2dcb240bf3a 145->147 147->132 149 2dcb240bf3c-2dcb240bf57 call 2dcb240b7ba 147->149 155 2dcb240bf63 149->155 156 2dcb240bf59-2dcb240bf61 149->156 150->101 152 2dcb240c057-2dcb240c061 150->152 152->101 154 2dcb240c063 152->154 154->101 157 2dcb240bf6b-2dcb240bf6f 155->157 156->157 157->132
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.266382312.000002DCB240B000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002DCB240B000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_2dcb240b000_loaddll64.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID: 2$3$a$a$d$i$p$v
    • API String ID: 1029625771-1673513319
    • Opcode ID: 886938e3ccb0d6dbac8807b67c971d65b303b8bc3fbc6529e8d30fe2f3ad3af2
    • Instruction ID: bb407f8c006e65cad1aaacf094d55619b722115f5d1bd05e0a659562c9efc120
    • Opcode Fuzzy Hash: 886938e3ccb0d6dbac8807b67c971d65b303b8bc3fbc6529e8d30fe2f3ad3af2
    • Instruction Fuzzy Hash: EDE1D93491CE888FD794EB28C089B1AB7E5FB99304F60495EB199C72A5C775D882CF06
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    C-Code - Quality: 17%
    			E00007FFF7FFFF00E2140(void* __ecx, void* __edx, void* __eflags, void* __rax, long long __rbx, intOrPtr* __rcx, void* __rdx, long long __rsi, void* __r8, char _a8, intOrPtr _a16, long long _a24, long long _a32) {
    				char _v40;
    				void* __rdi;
    				signed char _t35;
    				signed char _t38;
    				signed char _t40;
    				void* _t42;
    				int _t45;
    				void* _t71;
    				unsigned long long _t73;
    				unsigned long long _t75;
    				unsigned long long _t77;
    				unsigned long long _t97;
    				unsigned long long _t98;
    				unsigned long long _t100;
    				char* _t109;
    				void* _t110;
    				void* _t112;
    				unsigned long long _t113;
    				unsigned long long _t114;
    
    				_t71 = __rax;
    				_a24 = __rbx;
    				_a32 = __rsi;
    				_t35 = E00007FFF7FFFF00E17A0( &_a8, __rdx);
    				_t112 = _t71;
    				if ( *((char*)(_t71 + 0xd)) == 0) goto 0xf00e21a2;
    				r8d = 0;
    				asm("o16 nop [eax+eax]");
    				_t73 = 0x1b4949a3 >> (r8b & 7) << 3;
    				 *(__r8 + _t112) =  *(__r8 + _t112) ^ _t35;
    				if (__r8 + 1 - 0xd < 0) goto 0xf00e2180;
    				 *((char*)(_t112 + 0xd)) = 0;
    				GetModuleHandleA(??);
    				GetCurrentProcess();
    				r9d = 0x18;
    				_t109 =  &_v40;
    				0xf00e532c(); // executed
    				_t38 = E00007FFF7FFFF00E1E50( &_a8, _t73);
    				_t113 = _t73;
    				if ( *((char*)(_t73 + 0xf)) == 0) goto 0xf00e2212;
    				r8d = 0;
    				asm("o16 nop [eax+eax]");
    				_t75 = 0x9f9f81c5 >> (r8b & 7) << 3;
    				 *(_t109 + _t113) =  *(_t109 + _t113) ^ _t38;
    				_t110 = _t109 + 1;
    				if (_t110 - 0xf < 0) goto 0xf00e21f0;
    				 *((char*)(_t113 + 0xf)) = 0;
    				GetProcAddress(??, ??);
    				 *0xf019bd10 = _t75;
    				_t40 = E00007FFF7FFFF00E1C60( &_a8, _t113);
    				_t114 = _t75;
    				if ( *((char*)(_t75 + 0xd)) == 0) goto 0xf00e2272;
    				r8d = 0;
    				asm("o16 nop [eax+eax]");
    				_t77 = 0x6f49fdeb >> (r8b & 7) << 3;
    				 *(_t110 + _t114) =  *(_t110 + _t114) ^ _t40;
    				if (_t110 + 1 - 0xd < 0) goto 0xf00e2250;
    				 *((char*)(_t114 + 0xd)) = 0;
    				_t97 = _t114;
    				GetProcAddress(??, ??);
    				 *0xf019bd18 = _t77;
    				r8d = 0x3000;
    				_a8 = 0xc3e3ff41;
    				_t20 = _t97 - 0x60; // 0x4, executed
    				r9d = _t20;
    				_t42 = VirtualAlloc(??, ??, ??, ??); // executed
    				_t98 = _t77;
    				_t100 = _t77;
    				E00007FFF7FFFF00E1109(_t42, 0, _t77, 0xf00ea9a4, _t98, _t100);
    				 *_t100 =  *__rcx;
    				 *((short*)(_t100 + 4)) =  *(__rcx + 4) & 0x0000ffff;
    				 *((char*)(_t100 + 6)) =  *(__rcx + 6) & 0x000000ff;
    				_t26 = _t98 - 0x44; // 0x20
    				r8d = _t26;
    				 *((short*)(_t100 + 7)) = 0x4900;
    				 *((char*)(_t100 + 9)) = 0xbb;
    				 *((intOrPtr*)(_t100 + 0x12)) = _a8;
    				 *((long long*)(_t100 + 0xa)) =  *0xf019bd00 + __rdx;
    				_a16 = 0;
    				_t45 = VirtualProtect(??, ??, ??, ??); // executed
    				return _t45;
    			}






















    0x7ffff00e2140
    0x7ffff00e2140
    0x7ffff00e2145
    0x7ffff00e215a
    0x7ffff00e215f
    0x7ffff00e2166
    0x7ffff00e2168
    0x7ffff00e2175
    0x7ffff00e218d
    0x7ffff00e2190
    0x7ffff00e219b
    0x7ffff00e219d
    0x7ffff00e21a5
    0x7ffff00e21ae
    0x7ffff00e21b4
    0x7ffff00e21ba
    0x7ffff00e21c5
    0x7ffff00e21cf
    0x7ffff00e21d4
    0x7ffff00e21db
    0x7ffff00e21dd
    0x7ffff00e21ea
    0x7ffff00e21fd
    0x7ffff00e2200
    0x7ffff00e2204
    0x7ffff00e220b
    0x7ffff00e220d
    0x7ffff00e2218
    0x7ffff00e2223
    0x7ffff00e222a
    0x7ffff00e222f
    0x7ffff00e2236
    0x7ffff00e2238
    0x7ffff00e2245
    0x7ffff00e225d
    0x7ffff00e2260
    0x7ffff00e226b
    0x7ffff00e226d
    0x7ffff00e2272
    0x7ffff00e2278
    0x7ffff00e228c
    0x7ffff00e2293
    0x7ffff00e2299
    0x7ffff00e22a4
    0x7ffff00e22a4
    0x7ffff00e22a8
    0x7ffff00e22aa
    0x7ffff00e22b4
    0x7ffff00e22b7
    0x7ffff00e22c3
    0x7ffff00e22ce
    0x7ffff00e22d6
    0x7ffff00e22d9
    0x7ffff00e22d9
    0x7ffff00e22dd
    0x7ffff00e22e6
    0x7ffff00e22ee
    0x7ffff00e22f1
    0x7ffff00e22f5
    0x7ffff00e22fd
    0x7ffff00e2315

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.267988196.00007FFFF00E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFFF00E0000, based on PE: true
    • Associated: 00000001.00000002.267975714.00007FFFF00E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268156670.00007FFFF00E7000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268351744.00007FFFF00EA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268379197.00007FFFF00EC000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272243206.00007FFFF016C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272295089.00007FFFF019B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272370215.00007FFFF019D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272383317.00007FFFF01A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffff00e0000_loaddll64.jbxd
    Similarity
    • API ID: AddressModuleProcVirtual$AllocCurrentHandleInformationProcessProtect
    • String ID: %p
    • API String ID: 3934800070-3072491283
    • Opcode ID: e6e2722ae6fc6a8f1b979f5f3329be49983f528aa590691acc1b6b3cb0427b5b
    • Instruction ID: 835d804702162630a1b0db0cac9081730088dcd58509a1d5d96454122ba7ae92
    • Opcode Fuzzy Hash: e6e2722ae6fc6a8f1b979f5f3329be49983f528aa590691acc1b6b3cb0427b5b
    • Instruction Fuzzy Hash: 2C411322A0878683F7148B56E4547AEBBE0FB45BC4F088235EB6D13BD5CA7CE114C740
    Uniqueness

    Uniqueness Score: -1.00%

    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.266382312.000002DCB240B000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002DCB240B000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_2dcb240b000_loaddll64.jbxd
    Similarity
    • API ID:
    • String ID: Cach$Flus$GetN$Libr$Load$RtlA$Slee$Virt$Virt$aryA$ativ$ct$ddFu$eSys$hIns$lloc$ncti$onTa$p$rote$temI$tion$truc$ualA$ualP
    • API String ID: 0-924545899
    • Opcode ID: ba67eb782131c3f065ce6fb0f8a316021b757953efe746a7c66d5e51c776329b
    • Instruction ID: 84293f268abfe6748396e0cdcdb48048892ac4591eee676677c22d465a8cad70
    • Opcode Fuzzy Hash: ba67eb782131c3f065ce6fb0f8a316021b757953efe746a7c66d5e51c776329b
    • Instruction Fuzzy Hash: F072C431614A0A8BE718DF18C88A77BF7E5FB55305F24822FD88AC3655DB34D886CB85
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000001.00000002.267988196.00007FFFF00E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFFF00E0000, based on PE: true
    • Associated: 00000001.00000002.267975714.00007FFFF00E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268156670.00007FFFF00E7000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268351744.00007FFFF00EA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268379197.00007FFFF00EC000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272243206.00007FFFF016C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272295089.00007FFFF019B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272370215.00007FFFF019D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272383317.00007FFFF01A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffff00e0000_loaddll64.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 313767242-0
    • Opcode ID: 2c738ed967bc5df8c1013ba23ad59abb648def6edd02a07e1447defbd1282bbc
    • Instruction ID: 64d88d1732015a3b51611d1adf1b3de5f1627c72ceeb44db268e86d4fd6b4015
    • Opcode Fuzzy Hash: 2c738ed967bc5df8c1013ba23ad59abb648def6edd02a07e1447defbd1282bbc
    • Instruction Fuzzy Hash: AC315C72B09B8289EB608F60E8807EE63A1FB84748F444539DA9E57BD8DF78D548C710
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000001.00000002.267988196.00007FFFF00E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFFF00E0000, based on PE: true
    • Associated: 00000001.00000002.267975714.00007FFFF00E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268156670.00007FFFF00E7000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268351744.00007FFFF00EA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268379197.00007FFFF00EC000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272243206.00007FFFF016C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272295089.00007FFFF019B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272370215.00007FFFF019D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272383317.00007FFFF01A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffff00e0000_loaddll64.jbxd
    Similarity
    • API ID: Cursor$FeaturePresentProcessorSleepcapture_current_context
    • String ID:
    • API String ID: 1686489235-0
    • Opcode ID: 615716072627917ba3ce45cd08dde62bfdf5f9842916c67441e716f792528eab
    • Instruction ID: c49ecb8fb879618066074b098e0d4b24676af6571c1d6b8d03d7845bfd724014
    • Opcode Fuzzy Hash: 615716072627917ba3ce45cd08dde62bfdf5f9842916c67441e716f792528eab
    • Instruction Fuzzy Hash: C541EB72E1C646CBE750CF14E88026A77E1FB84748F500235E6AE827A9DF7DE9858B00
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000001.00000002.267988196.00007FFFF00E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFFF00E0000, based on PE: true
    • Associated: 00000001.00000002.267975714.00007FFFF00E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268156670.00007FFFF00E7000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268351744.00007FFFF00EA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268379197.00007FFFF00EC000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272243206.00007FFFF016C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272295089.00007FFFF019B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272370215.00007FFFF019D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272383317.00007FFFF01A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffff00e0000_loaddll64.jbxd
    Similarity
    • API ID: CountTick$Sleep
    • String ID:
    • API String ID: 4250438611-0
    • Opcode ID: ffafef7f60f6108d52e334d56fbdad7ae5ddcc298aed7986da1fda1fb18b02a0
    • Instruction ID: 663a1740020d95ee517cfdfccdf4485e4a52a0938817d4822794f37a3dde8c9b
    • Opcode Fuzzy Hash: ffafef7f60f6108d52e334d56fbdad7ae5ddcc298aed7986da1fda1fb18b02a0
    • Instruction Fuzzy Hash: 77D09E65F5454253FB181FB4D8DA17A12D29F0C725F180134E52B953D1CD6CA5D99620
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000001.00000002.266382312.000002DCB240B000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002DCB240B000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_2dcb240b000_loaddll64.jbxd
    Similarity
    • API ID: _clrfp
    • String ID:
    • API String ID: 3618594692-0
    • Opcode ID: 4f3d86407dd9789fcda393b78ce5ac7fd63888f80a1eb3623365494ce4a13953
    • Instruction ID: e5de6192cc269acf74fabd62a05a79b4198dca9f907d9ad557477418c9b8fd5a
    • Opcode Fuzzy Hash: 4f3d86407dd9789fcda393b78ce5ac7fd63888f80a1eb3623365494ce4a13953
    • Instruction Fuzzy Hash: 33C14D30510A4E8FEB99CF1CC88AB55B7E0FB56309F24859AE859CB6A9C375DC52CF01
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000001.00000002.266382312.000002DCB240B000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002DCB240B000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_2dcb240b000_loaddll64.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ed34afde64f4defd51681823c72b705d98dd479eeb089942ec1be46fd4c04c2d
    • Instruction ID: d26957d136dedabf4228000b8387d76cc16e7ad7d053f1df78b8cc313e6a2eb0
    • Opcode Fuzzy Hash: ed34afde64f4defd51681823c72b705d98dd479eeb089942ec1be46fd4c04c2d
    • Instruction Fuzzy Hash: 32F14530A58A4D4FD719DF58C4896E9FBE1FB96305F24822FD48BC719ADA30D906CB81
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000001.00000002.266382312.000002DCB240B000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002DCB240B000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_2dcb240b000_loaddll64.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 541710f845fd4202dd23b37e000bb6fe77ecd75944506428e97748b45ea3ae15
    • Instruction ID: a07da31f3efc3aefe263f09acb6dea44447b244b6f2a5b05379c9ad8b29feb3c
    • Opcode Fuzzy Hash: 541710f845fd4202dd23b37e000bb6fe77ecd75944506428e97748b45ea3ae15
    • Instruction Fuzzy Hash: 56511132318E094FDB1CEE6CD489675B7D2E7AD315B14822FE40AD72AADA34DC468781
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000001.00000002.266382312.000002DCB240B000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002DCB240B000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_2dcb240b000_loaddll64.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a045b2f751b5460fa633a29ece8ebdd46b3de0df5ba9f12dd207b5748212fe94
    • Instruction ID: 9fc5cde7f8068da52568cd1be201c1dcec334b9effa6132ba0436e27c3176691
    • Opcode Fuzzy Hash: a045b2f751b5460fa633a29ece8ebdd46b3de0df5ba9f12dd207b5748212fe94
    • Instruction Fuzzy Hash: 0A31B430518A498FEB94EF18C089B2AF7E1FB99345F54591AF488D36A8D774D8C0CF0A
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 588 2dcb240f016-2dcb240f01c 589 2dcb240f01e-2dcb240f021 588->589 590 2dcb240f057-2dcb240f061 588->590 592 2dcb240f023-2dcb240f026 589->592 593 2dcb240f04b-2dcb240f08a call 2dcb240ed6a 589->593 591 2dcb240f182-2dcb240f19e 590->591 597 2dcb240f1a0 591->597 598 2dcb240f1b2-2dcb240f1cd call 2dcb240ebfe 591->598 595 2dcb240f03e __scrt_dllmain_crt_thread_attach 592->595 596 2dcb240f028-2dcb240f02b 592->596 608 2dcb240f08c 593->608 609 2dcb240f0a4-2dcb240f0b9 call 2dcb240ebfe 593->609 604 2dcb240f043-2dcb240f04a 595->604 600 2dcb240f02d-2dcb240f036 596->600 601 2dcb240f037-2dcb240f03c call 2dcb240ecae 596->601 602 2dcb240f1a2-2dcb240f1b1 597->602 611 2dcb240f1cf-2dcb240f202 call 2dcb240ed26 call 2dcb240f7d2 call 2dcb240f84e call 2dcb240ed56 call 2dcb240ef2a call 2dcb240ef4e 598->611 612 2dcb240f204-2dcb240f236 call 2dcb240f5be 598->612 601->604 613 2dcb240f08e-2dcb240f0a3 608->613 621 2dcb240f0bf-2dcb240f0d0 call 2dcb240ec6e 609->621 622 2dcb240f173-2dcb240f181 call 2dcb240f5be 609->622 611->602 623 2dcb240f247-2dcb240f24d 612->623 624 2dcb240f238-2dcb240f23e 612->624 641 2dcb240f121-2dcb240f12b call 2dcb240ef2a 621->641 642 2dcb240f0d2-2dcb240f0f6 call 2dcb240f812 call 2dcb240f7c2 call 2dcb240f7ee call 2dcb2413f22 621->642 622->591 625 2dcb240f24f-2dcb240f259 623->625 626 2dcb240f294-2dcb240f2aa call 2dcb240d696 623->626 624->623 630 2dcb240f240-2dcb240f242 624->630 632 2dcb240f265-2dcb240f273 625->632 633 2dcb240f25b-2dcb240f263 625->633 647 2dcb240f2ac-2dcb240f2ae 626->647 648 2dcb240f2e4-2dcb240f2e6 626->648 631 2dcb240f337-2dcb240f344 630->631 638 2dcb240f279-2dcb240f28e call 2dcb240f016 632->638 652 2dcb240f32d-2dcb240f335 632->652 633->638 638->626 638->652 641->608 660 2dcb240f131-2dcb240f13d call 2dcb240f80a 641->660 642->641 688 2dcb240f0f8-2dcb240f0ff __scrt_dllmain_after_initialize_c 642->688 647->648 656 2dcb240f2b0-2dcb240f2d4 call 2dcb240d696 call 2dcb240f016 647->656 650 2dcb240f2ed-2dcb240f302 call 2dcb240f016 648->650 651 2dcb240f2e8-2dcb240f2eb 648->651 650->652 671 2dcb240f304-2dcb240f30e 650->671 651->650 651->652 652->631 656->648 682 2dcb240f2d6-2dcb240f2dc 656->682 679 2dcb240f13f-2dcb240f149 call 2dcb240ee8e 660->679 680 2dcb240f163-2dcb240f16e 660->680 676 2dcb240f310-2dcb240f317 671->676 677 2dcb240f319-2dcb240f329 671->677 676->652 677->652 679->680 687 2dcb240f14b-2dcb240f160 679->687 680->613 682->648 687->680 688->641 689 2dcb240f101-2dcb240f11f call 2dcb2413ebe 688->689 689->641
    APIs
    Memory Dump Source
    • Source File: 00000001.00000002.266382312.000002DCB240B000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002DCB240B000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_2dcb240b000_loaddll64.jbxd
    Similarity
    • API ID: Initialize__scrt_acquire_startup_lock__scrt_fastfail__scrt_release_startup_lock$__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_initialize_default_local_stdio_options__scrt_is_nonwritable_in_current_image__scrt_uninitialize_crt
    • String ID:
    • API String ID: 1988982384-0
    • Opcode ID: 59a5b4de44f6355801b1f155b58871900563701d3536bb07b74828003180b5cb
    • Instruction ID: 54f9a149d804e9e50c64f81f365899c64fd0fadb393f4da46782d4f4a58e8c3c
    • Opcode Fuzzy Hash: 59a5b4de44f6355801b1f155b58871900563701d3536bb07b74828003180b5cb
    • Instruction Fuzzy Hash: C891F830714A034BF794AB68984BB5BF2D9E75A308F65852BE405C769ADE34CC81CF82
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 704 2dcb241c482-2dcb241c491 705 2dcb241c4c3-2dcb241c4de 704->705 706 2dcb241c493-2dcb241c4a7 704->706 707 2dcb241c4be call 2dcb240efe2 706->707 708 2dcb241c4a9-2dcb241c4bc 706->708 707->705 708->707 709 2dcb241c4df-2dcb241c4f5 call 2dcb2412d02 708->709 713 2dcb241c527-2dcb241c542 709->713 714 2dcb241c4f7-2dcb241c508 709->714 715 2dcb241c522 call 2dcb240efe2 714->715 716 2dcb241c50a-2dcb241c51d 714->716 715->713 717 2dcb241c51f-2dcb241c520 716->717 718 2dcb241c543-2dcb241c559 call 2dcb2412d02 716->718 717->715 722 2dcb241c58b-2dcb241c5a6 718->722 723 2dcb241c55b-2dcb241c56c 718->723 724 2dcb241c56e-2dcb241c581 723->724 725 2dcb241c586 call 2dcb240efe2 723->725 726 2dcb241c583-2dcb241c584 724->726 727 2dcb241c5a7-2dcb241c5bd call 2dcb2412d02 724->727 725->722 726->725 731 2dcb241c5ef-2dcb241c60a 727->731 732 2dcb241c5bf-2dcb241c5d0 727->732 733 2dcb241c5d2-2dcb241c5e5 732->733 734 2dcb241c5ea call 2dcb240efe2 732->734 736 2dcb241c5e7-2dcb241c5e8 733->736 737 2dcb241c60b-2dcb241c621 call 2dcb2412d02 733->737 734->731 736->734 740 2dcb241c653-2dcb241c66e 737->740 741 2dcb241c623-2dcb241c634 737->741 742 2dcb241c64e call 2dcb240efe2 741->742 743 2dcb241c636-2dcb241c649 741->743 742->740 744 2dcb241c66f-2dcb241c685 call 2dcb2412d02 743->744 745 2dcb241c64b-2dcb241c64c 743->745 749 2dcb241c6b7-2dcb241c6d2 744->749 750 2dcb241c687-2dcb241c698 744->750 745->742 751 2dcb241c6b2 call 2dcb240efe2 750->751 752 2dcb241c69a-2dcb241c6ad 750->752 751->749 753 2dcb241c6af-2dcb241c6b0 752->753 754 2dcb241c6d3-2dcb241c6e9 call 2dcb2412d02 752->754 753->751
    APIs
    Memory Dump Source
    • Source File: 00000001.00000002.266382312.000002DCB240B000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002DCB240B000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_2dcb240b000_loaddll64.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo_noreturn
    • String ID:
    • API String ID: 3668304517-0
    • Opcode ID: 7fbaef9c46b0c8ee2a82887f37f94b9b3dc8bc5b9c15c2ff3529230b087d5f66
    • Instruction ID: 224b8a2abe1105c55e76e7685b39d2c56382ea7fb8377de0d6b7855a88abe6b4
    • Opcode Fuzzy Hash: 7fbaef9c46b0c8ee2a82887f37f94b9b3dc8bc5b9c15c2ff3529230b087d5f66
    • Instruction Fuzzy Hash: B761D720564C4E4AFB09F738ED4EBA9B791F399309FA0C617D045C29E9E93D99C0CB09
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.266382312.000002DCB240B000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002DCB240B000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_2dcb240b000_loaddll64.jbxd
    Similarity
    • API ID: DestructExceptionObject$__vcrt_getptd_noexit
    • String ID: csm
    • API String ID: 3780691363-1018135373
    • Opcode ID: 7c86f85e02e1cf17e2d905d46dea6ba077f0d3649df00ce6c101bcd2a45804e8
    • Instruction ID: 5cf4ccf9b12e518ea1fde8206c5645c9fb403b454bf19996554117f370ad10e3
    • Opcode Fuzzy Hash: 7c86f85e02e1cf17e2d905d46dea6ba077f0d3649df00ce6c101bcd2a45804e8
    • Instruction Fuzzy Hash: 3E316F30158B158FE764EF18C486B5ABBE1FB99319F20561ED48AC3696C731EC41CF82
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.267988196.00007FFFF00E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFFF00E0000, based on PE: true
    • Associated: 00000001.00000002.267975714.00007FFFF00E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268156670.00007FFFF00E7000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268351744.00007FFFF00EA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.268379197.00007FFFF00EC000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272243206.00007FFFF016C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272295089.00007FFFF019B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272370215.00007FFFF019D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.272383317.00007FFFF01A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffff00e0000_loaddll64.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: @
    • API String ID: 1646373207-2766056989
    • Opcode ID: e0ca159923323c96d1c3349e815427a49f6cb7f5a8f3cd0aee64a08b7ea1ebf8
    • Instruction ID: ac3540a3044b6c4bf8950f92adcad1c57a2bc280f34bb45fb9e8c54232c58cd4
    • Opcode Fuzzy Hash: e0ca159923323c96d1c3349e815427a49f6cb7f5a8f3cd0aee64a08b7ea1ebf8
    • Instruction Fuzzy Hash: FB21D613E1968A86FB508B65E0647BE67E0BB81BD4F444335EB6E577CACE2CD1088740
    Uniqueness

    Uniqueness Score: -1.00%

    Execution Graph

    Execution Coverage:1.5%
    Dynamic/Decrypted Code Coverage:100%
    Signature Coverage:0%
    Total number of Nodes:43
    Total number of Limit Nodes:0
    execution_graph 6380 220e1e9c14a 6381 220e1e9c161 _CallSETranslator 6380->6381 6382 220e1e91c3a __InternalCxxFrameHandler BuildCatchObjectHelperInternal 6381->6382 6383 220e1e9c1bd _CallSETranslator 6382->6383 6335 220e1e8b17e 6336 220e1e8b186 6335->6336 6341 220e1e8bc3a 6336->6341 6338 220e1e8b1cb 6339 220e1e8b1a6 6339->6338 6345 220e1e8b1d6 6339->6345 6343 220e1e8bfd9 6341->6343 6344 220e1e8bc58 6341->6344 6342 220e1e8bf7e LoadLibraryA 6342->6343 6343->6339 6344->6342 6344->6343 6348 220e1e8b232 6345->6348 6354 220e1e8b3bf 6345->6354 6346 220e1e8b441 6346->6338 6347 220e1e8b445 TerminateProcess 6347->6346 6349 220e1e8b28c LoadLibraryA 6348->6349 6350 220e1e8b2ef 6349->6350 6351 220e1e8b318 GetComputerNameExW 6350->6351 6353 220e1e8b33a 6350->6353 6351->6353 6352 220e1e8b3ab NetWkstaGetInfo 6352->6354 6353->6352 6353->6354 6354->6346 6354->6347 6384 220e1e9c112 __scrt_dllmain_exception_filter 6355 220e1e90776 6356 220e1e90798 _CallSETranslator 6355->6356 6359 220e1e91c3a 6356->6359 6358 220e1e907e3 6361 220e1e91c67 Is_bad_exception_allowed FindHandler __except_validate_context_record _CallSETranslator 6359->6361 6362 220e1e91cca __GetCurrentState std::exception::exception __FrameHandler3::FrameUnwindToState __FrameHandler3::FrameUnwindToEmptyState 6361->6362 6363 220e1e91462 6361->6363 6362->6358 6366 220e1e914b0 FindHandler IsInExceptionSpec __FrameHandler3::GetHandlerSearchState _CallSETranslator 6363->6366 6364 220e1e9183b 6367 220e1e9157e 9 library calls 6364->6367 6374 220e1e918c6 6364->6374 6366->6364 6366->6367 6368 220e1e915c6 pair TypeMatchHelper FindHandler 6366->6368 6367->6362 6368->6367 6370 220e1e91392 6368->6370 6371 220e1e913cf _GetEstablisherFrame 6370->6371 6373 220e1e913f5 Is_bad_exception_allowed __FrameHandler3::UnwindNestedFrames 6371->6373 6378 220e1e912d2 6371->6378 6373->6368 6375 220e1e918ff pair Is_bad_exception_allowed _CallSETranslator 6374->6375 6376 220e1e91ad3 6374->6376 6375->6376 6377 220e1e91392 FindHandlerForForeignException BuildCatchObjectHelperInternal 6375->6377 6376->6367 6377->6375 6379 220e1e912f9 BuildCatchObjectHelperInternal 6378->6379

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.276392010.00000220E1E8B000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000220E1E8B000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_220e1e8b000_rundll32.jbxd
    Similarity
    • API ID: ComputerInfoLibraryLoadNameWksta
    • String ID: .$2$3$a$d$e$i$l$l$n$p$t
    • API String ID: 3393981993-1206877643
    • Opcode ID: 9f1df4b9c6e76e77351a2f1aa7da60c0e0fb4b368d1276d023936cfa14d4e98f
    • Instruction ID: a6c1c1f1101203ce76e3e8a6bb9bebd3c40b300e273da931176278d965ab0672
    • Opcode Fuzzy Hash: 9f1df4b9c6e76e77351a2f1aa7da60c0e0fb4b368d1276d023936cfa14d4e98f
    • Instruction Fuzzy Hash: 8F81CA301187849FE368EB58C089B5AFBE1FB99308F54495DF489C72A2DBB5DD85CB02
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.276392010.00000220E1E8B000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000220E1E8B000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_220e1e8b000_rundll32.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID: 2$3$a$a$d$i$p$v
    • API String ID: 1029625771-1673513319
    • Opcode ID: 886938e3ccb0d6dbac8807b67c971d65b303b8bc3fbc6529e8d30fe2f3ad3af2
    • Instruction ID: 73b0eb3d5a86de254641e031df22e17ef8ab15814eee39bf8dd2eab42361b6cd
    • Opcode Fuzzy Hash: 886938e3ccb0d6dbac8807b67c971d65b303b8bc3fbc6529e8d30fe2f3ad3af2
    • Instruction Fuzzy Hash: DBE1E634518A889FD799EB68C089B5AB7E1FB98304F65085DB199C72B2C775DC82CF02
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 269 220e1e8f016-220e1e8f01c 270 220e1e8f01e-220e1e8f021 269->270 271 220e1e8f057-220e1e8f061 269->271 272 220e1e8f04b-220e1e8f08a call 220e1e8ed6a 270->272 273 220e1e8f023-220e1e8f026 270->273 274 220e1e8f182-220e1e8f19e 271->274 289 220e1e8f08c 272->289 290 220e1e8f0a4-220e1e8f0b9 call 220e1e8ebfe 272->290 275 220e1e8f028-220e1e8f02b 273->275 276 220e1e8f03e __scrt_dllmain_crt_thread_attach 273->276 277 220e1e8f1a0 274->277 278 220e1e8f1b2-220e1e8f1cd call 220e1e8ebfe 274->278 280 220e1e8f02d-220e1e8f036 275->280 281 220e1e8f037-220e1e8f03c call 220e1e8ecae 275->281 284 220e1e8f043-220e1e8f04a 276->284 282 220e1e8f1a2-220e1e8f1b1 277->282 292 220e1e8f1cf-220e1e8f202 call 220e1e8ed26 call 220e1e8f7d2 call 220e1e8f84e call 220e1e8ed56 call 220e1e8ef2a call 220e1e8ef4e 278->292 293 220e1e8f204-220e1e8f236 call 220e1e8f5be 278->293 281->284 294 220e1e8f08e-220e1e8f0a3 289->294 301 220e1e8f0bf-220e1e8f0d0 call 220e1e8ec6e 290->301 302 220e1e8f173-220e1e8f181 call 220e1e8f5be 290->302 292->282 303 220e1e8f238-220e1e8f23e 293->303 304 220e1e8f247-220e1e8f24d 293->304 321 220e1e8f121-220e1e8f12b call 220e1e8ef2a 301->321 322 220e1e8f0d2-220e1e8f0f6 call 220e1e8f812 call 220e1e8f7c2 call 220e1e8f7ee call 220e1e93f22 301->322 302->274 303->304 308 220e1e8f240-220e1e8f242 303->308 309 220e1e8f24f-220e1e8f259 304->309 310 220e1e8f294-220e1e8f2aa call 220e1e8d696 304->310 315 220e1e8f337-220e1e8f344 308->315 316 220e1e8f25b-220e1e8f263 309->316 317 220e1e8f265-220e1e8f273 309->317 328 220e1e8f2ac-220e1e8f2ae 310->328 329 220e1e8f2e4-220e1e8f2e6 310->329 323 220e1e8f279-220e1e8f28e call 220e1e8f016 316->323 317->323 333 220e1e8f32d-220e1e8f335 317->333 321->289 341 220e1e8f131-220e1e8f13d call 220e1e8f80a 321->341 322->321 368 220e1e8f0f8-220e1e8f0ff __scrt_dllmain_after_initialize_c 322->368 323->310 323->333 328->329 337 220e1e8f2b0-220e1e8f2d4 call 220e1e8d696 call 220e1e8f016 328->337 331 220e1e8f2e8-220e1e8f2eb 329->331 332 220e1e8f2ed-220e1e8f302 call 220e1e8f016 329->332 331->332 331->333 332->333 350 220e1e8f304-220e1e8f30e 332->350 333->315 337->329 363 220e1e8f2d6-220e1e8f2dc 337->363 358 220e1e8f13f-220e1e8f149 call 220e1e8ee8e 341->358 359 220e1e8f163-220e1e8f16e 341->359 355 220e1e8f319-220e1e8f329 350->355 356 220e1e8f310-220e1e8f317 350->356 355->333 356->333 358->359 369 220e1e8f14b-220e1e8f160 358->369 359->294 363->329 368->321 370 220e1e8f101-220e1e8f11f call 220e1e93ebe 368->370 369->359 370->321
    APIs
    Memory Dump Source
    • Source File: 00000004.00000002.276392010.00000220E1E8B000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000220E1E8B000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_220e1e8b000_rundll32.jbxd
    Similarity
    • API ID: Initialize__scrt_acquire_startup_lock__scrt_fastfail__scrt_release_startup_lock$__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_initialize_default_local_stdio_options__scrt_is_nonwritable_in_current_image__scrt_uninitialize_crt
    • String ID:
    • API String ID: 1988982384-0
    • Opcode ID: 59a5b4de44f6355801b1f155b58871900563701d3536bb07b74828003180b5cb
    • Instruction ID: 950ad2f0216337ac4de54ad1613e9a270bf58829e25d855635e011548d7d3c11
    • Opcode Fuzzy Hash: 59a5b4de44f6355801b1f155b58871900563701d3536bb07b74828003180b5cb
    • Instruction Fuzzy Hash: 82918430614A056FF7ACBBA8D8C97D9B2D1EB99700F5A4919B405C33B7DAB4CCC58782
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 373 220e1e9c482-220e1e9c491 374 220e1e9c4c3-220e1e9c4de 373->374 375 220e1e9c493-220e1e9c4a7 373->375 376 220e1e9c4a9-220e1e9c4bc 375->376 377 220e1e9c4be call 220e1e8efe2 375->377 376->377 378 220e1e9c4df-220e1e9c4f5 call 220e1e92d02 376->378 377->374 382 220e1e9c527-220e1e9c542 378->382 383 220e1e9c4f7-220e1e9c508 378->383 384 220e1e9c50a-220e1e9c51d 383->384 385 220e1e9c522 call 220e1e8efe2 383->385 386 220e1e9c51f-220e1e9c520 384->386 387 220e1e9c543-220e1e9c559 call 220e1e92d02 384->387 385->382 386->385 391 220e1e9c58b-220e1e9c5a6 387->391 392 220e1e9c55b-220e1e9c56c 387->392 393 220e1e9c56e-220e1e9c581 392->393 394 220e1e9c586 call 220e1e8efe2 392->394 395 220e1e9c583-220e1e9c584 393->395 396 220e1e9c5a7-220e1e9c5bd call 220e1e92d02 393->396 394->391 395->394 400 220e1e9c5ef-220e1e9c60a 396->400 401 220e1e9c5bf-220e1e9c5d0 396->401 402 220e1e9c5ea call 220e1e8efe2 401->402 403 220e1e9c5d2-220e1e9c5e5 401->403 402->400 405 220e1e9c60b-220e1e9c621 call 220e1e92d02 403->405 406 220e1e9c5e7-220e1e9c5e8 403->406 409 220e1e9c653-220e1e9c66e 405->409 410 220e1e9c623-220e1e9c634 405->410 406->402 411 220e1e9c64e call 220e1e8efe2 410->411 412 220e1e9c636-220e1e9c649 410->412 411->409 413 220e1e9c64b-220e1e9c64c 412->413 414 220e1e9c66f-220e1e9c685 call 220e1e92d02 412->414 413->411 418 220e1e9c6b7-220e1e9c6d2 414->418 419 220e1e9c687-220e1e9c698 414->419 420 220e1e9c69a-220e1e9c6ad 419->420 421 220e1e9c6b2 call 220e1e8efe2 419->421 422 220e1e9c6af-220e1e9c6b0 420->422 423 220e1e9c6d3-220e1e9c6e9 call 220e1e92d02 420->423 421->418 422->421
    APIs
    Memory Dump Source
    • Source File: 00000004.00000002.276392010.00000220E1E8B000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000220E1E8B000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_220e1e8b000_rundll32.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo_noreturn
    • String ID:
    • API String ID: 3668304517-0
    • Opcode ID: 7fbaef9c46b0c8ee2a82887f37f94b9b3dc8bc5b9c15c2ff3529230b087d5f66
    • Instruction ID: 71b2e47a57ead39e90acf8e6317a5c34f3898c926eb07d6181e7cc2f86bb797a
    • Opcode Fuzzy Hash: 7fbaef9c46b0c8ee2a82887f37f94b9b3dc8bc5b9c15c2ff3529230b087d5f66
    • Instruction Fuzzy Hash: 3961C320524D8D5AFB0DB7B8A88EBA8B391F3D8304F908954E045C72F7E9BD6DC48744
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.276392010.00000220E1E8B000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000220E1E8B000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_220e1e8b000_rundll32.jbxd
    Similarity
    • API ID: DestructExceptionObject$__vcrt_getptd_noexit
    • String ID: csm
    • API String ID: 3780691363-1018135373
    • Opcode ID: 7c86f85e02e1cf17e2d905d46dea6ba077f0d3649df00ce6c101bcd2a45804e8
    • Instruction ID: e83d82eeda790f4554738da3ddeb5a9c4774596243705f06ec7521d2735f1a84
    • Opcode Fuzzy Hash: 7c86f85e02e1cf17e2d905d46dea6ba077f0d3649df00ce6c101bcd2a45804e8
    • Instruction Fuzzy Hash: 4E315475118A049FDB68EF58D485B69B3E1FBD8710F51095CE48A87363C771ED81CB82
    Uniqueness

    Uniqueness Score: -1.00%