Loading ...

Analysis Report

Overview

General Information

Joe Sandbox Version:20.0.0
Analysis ID:394065
Start time:10:18:19
Joe Sandbox Product:Cloud
Start date:25.10.2017
Overall analysis duration:0h 9m 59s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:i0YxTJ2SO.exe
Cookbook file name:default.jbs
Analysis system description:Windows 7 (Office 2010 SP2, Java 1.8.0_40, Flash 16.0.0.305, Acrobat Reader 11.0.08, Internet Explorer 11, Chrome 55, Firefox 43)
Number of analysed new started processes analysed:28
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies
  • HCA enabled
  • EGA enabled
  • GSI enabled (VBA)
  • GSI enabled (Javascript)
Detection:MAL
Classification:mal84.evad.spre.expl.rans.winEXE@35/5@0/4
HCA Information:
  • Successful, ratio: 99%
  • Number of executed functions: 101
  • Number of non-executed functions: 75
EGA Information:
  • Successful, ratio: 100%
Cookbook Comments:
  • Found application associated with file extension: .exe
Warnings:
Show All
  • Connection to analysis system has been lost
  • Exclude process from analysis (whitelisted): conhost.exe, dllhost.exe
  • Report size getting too big, too many NtDeviceIoControlFile calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.


Detection

StrategyScoreRangeReportingDetection
Threshold840 - 100Report FP / FNmalicious


Confidence

StrategyScoreRangeFurther Analysis Required?Confidence
Threshold50 - 5false
ConfidenceConfidence


Classification

Analysis Advice

Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox



Signature Overview

Click to jump to signature section


Cryptography:

barindex
Uses Microsoft's Enhanced Cryptographic ProviderShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00475507 CryptAcquireContextW,CryptAcquireContextW,GetLastError,CryptAcquireContextW,3_2_00475507
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00475BC4 GetSystemInfo,__alldiv,MapViewOfFile,CryptDuplicateHash,CryptHashData,LocalAlloc,CryptGetHashParam,memcpy,FlushViewOfFile,LocalFree,CryptDestroyHash,UnmapViewOfFile,3_2_00475BC4
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_004715A7 GetProcessHeap,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,HeapAlloc,CryptAcquireContextW,GetProcessHeap,HeapAlloc,CryptImportKey,CryptCreateHash,CryptSetHashParam,GetProcessHeap,HeapFree,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptDestroyKey,CryptReleaseContext,3_2_004715A7
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00475A73 GetSystemInfo,__alldiv,MapViewOfFile,CryptDuplicateHash,CryptHashData,LocalAlloc,CryptGetHashParam,LocalFree,CryptDestroyHash,UnmapViewOfFile,3_2_00475A73
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00475613 CryptStringToBinaryW,CryptStringToBinaryW,LocalAlloc,LocalAlloc,CryptStringToBinaryW,CryptDecodeObjectEx,CryptDecodeObjectEx,LocalAlloc,CryptDecodeObjectEx,CryptImportPublicKeyInfo,LocalFree,LocalFree,3_2_00475613
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00475D0A CryptDuplicateKey,CreateFileW,GetFileSizeEx,__alldiv,CreateFileMappingW,MapViewOfFile,CryptEncrypt,FlushViewOfFile,UnmapViewOfFile,CloseHandle,CloseHandle,CryptDestroyKey,SetEvent,3_2_00475D0A
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0047554A CryptAcquireContextW,GetLastError,CryptGenRandom,CryptReleaseContext,3_2_0047554A
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00476299 CreateEventW,CreateThread,WaitForSingleObject,CloseHandle,CryptDestroyHash,CryptDestroyKey,CryptDestroyKey,CryptReleaseContext,CloseHandle,LocalFree,3_2_00476299
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0047559B CryptSetKeyParam,CryptSetKeyParam,CryptSetKeyParam,CryptGetKeyParam,LocalAlloc,CryptSetKeyParam,LocalFree,3_2_0047559B
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00475780 CryptBinaryToStringW,CryptBinaryToStringW,LocalAlloc,CryptBinaryToStringW,LocalFree,3_2_00475780
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_004756D8 CryptEncrypt,CryptEncrypt,LocalAlloc,memcpy,CryptEncrypt,LocalFree,3_2_004756D8
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00476085 CryptCreateHash,CryptHashData,CryptDeriveKey,CryptDestroyHash,3_2_00476085
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00476246 CryptCreateHash,CryptHashData,CryptGetHashParam,3_2_00476246

Spam, unwanted Advertisements and Ransom Demands:

barindex
Contains functionality to import cryptographic keys (often used in ransomware)Show sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_004715A7 GetProcessHeap,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,HeapAlloc,CryptAcquireContextW,GetProcessHeap,HeapAlloc,CryptImportKey,CryptCreateHash,CryptSetHashParam,GetProcessHeap,HeapFree,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptDestroyKey,CryptReleaseContext,3_2_004715A7
Clears the journal logShow sources
Source: unknownProcess created: C:\Windows\System32\cmd.exe /c wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D C:
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D C:
Clears the windows event logShow sources
Source: unknownProcess created: C:\Windows\System32\cmd.exe /c wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D C:
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D C:

Exploits:

barindex
Connects to many different private IPs (likely to spread or exploit)Show sources
Source: global trafficTCP traffic: 192.168.1.1:445
Source: global trafficTCP traffic: 192.168.1.0:139
Source: global trafficTCP traffic: 192.168.1.2:80
Connects to many different private IPs via SMB (likely to spread or exploit)Show sources
Source: global trafficTCP traffic: 192.168.1.1:445
Source: global trafficTCP traffic: 192.168.1.0:139
Source: global trafficTCP traffic: 192.168.1.2:445

Networking:

barindex
Contains functionality to download additional files from the internetShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00471EB9 GetProcessHeap,GetProcessHeap,HeapAlloc,HeapAlloc,GetProcessHeap,HeapAlloc,htons,send,recv,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,3_2_00471EB9
Downloads files from webservers via HTTPShow sources
Source: global trafficHTTP traffic detected: GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBRi82PVYYKWGJWdgVNyePy5kYTdqQQUX5r1blzMzHSa1N197z%2Fb7EyALt0CEA7P9DjI%2Fr81bgTYapgbGlA%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Microsoft-CryptoAPI/6.1Host: ts-ocsp.ws.symantec.com
Source: global trafficHTTP traffic detected: GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBQd11mpyHEqFCSocj4SCu93CBydHAQUr2PWyqNOhXLgp7xB8ymiOH%2BAdWICEFRY8qrXQdZEvISpe6CWUuY%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Microsoft-CryptoAPI/6.1Host: ts-ocsp.ws.symantec.com
Urls found in memory or binary dataShow sources
Source: rundll32.exeString found in binary or memory: http://192.168.1.2/
Source: rundll32.exeString found in binary or memory: http://192.168.1.2/g
Source: i0YxTJ2SO.exe, cscc.dat.3.dr, infpub.dat.1.drString found in binary or memory: http://crl.thawte.com/thawtetimestampingca.crl0
Source: rundll32.exe, cscc.dat.3.dr, dispci.exe.3.drString found in binary or memory: http://diskcryptor.net/
Source: i0YxTJ2SO.exe, cscc.dat.3.dr, infpub.dat.1.drString found in binary or memory: http://ocsp.thawte.com0
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://rb.symcb.com/rb.crl0w
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://rb.symcb.com/rb.crt0
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://rb.symcd.com0&
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://s.symcd.com0
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://s.symcd.com06
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://sf.symcb.com/sf.crl0w
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://sf.symcb.com/sf.crt0
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://sf.symcd.com0&
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: i0YxTJ2SO.exe, cscc.dat.3.dr, infpub.dat.1.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: i0YxTJ2SO.exe, cscc.dat.3.dr, infpub.dat.1.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: i0YxTJ2SO.exe, cscc.dat.3.dr, infpub.dat.1.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: https://d.symcb.com/cps0%
Source: infpub.dat.1.drString found in binary or memory: https://d.symcb.com/rpa0
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: https://d.symcb.com/rpa0.
Source: i0YxTJ2SO.exe, infpub.dat.1.drString found in binary or memory: https://d.symcb.com/rpa06

Boot Survival:

barindex
Contains functionality to start windows servicesShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00479534 wsprintfW,wsprintfW,wsprintfW,wsprintfW,PathFindExtensionW,wsprintfW,GetLastError,WNetAddConnection2W,PathFileExistsW,GetLastError,GetLastError,WNetCancelConnection2W,OpenSCManagerW,memset,GetSystemTimeAsFileTime,wsprintfW,CreateServiceW,StartServiceW,GetLastError,QueryServiceStatus,Sleep,DeleteService,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,DeleteFileW,WNetCancelConnection2W,SetLastError,3_2_00479534
Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
Source: unknownProcess created: C:\Windows\System32\schtasks.exe schtasks /Delete /F /TN rhaegal

Persistence and Installation Behavior:

barindex
Drops PE filesShow sources
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\dispci.exe
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\cscc.dat
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\9706.tmp
Source: C:\Users\user\Desktop\i0YxTJ2SO.exeFile created: C:\Windows\infpub.dat
Drops PE files to the windows directory (C:\Windows)Show sources
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\dispci.exe
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\cscc.dat
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\9706.tmp
Source: C:\Users\user\Desktop\i0YxTJ2SO.exeFile created: C:\Windows\infpub.dat
Drops executables to the windows directory (C:\Windows) and starts themShow sources
Source: C:\Windows\System32\rundll32.exeExecutable created and started: C:\Windows\9706.tmp

Data Obfuscation:

barindex
Contains functionality to dynamically determine API callsShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00479016 VirtualProtect,LoadLibraryA,GetProcAddress,VirtualProtect,3_2_00479016
PE file contains an invalid checksumShow sources
Source: 9706.tmp.3.drStatic PE information: real checksum: 0x114bd should be: 0x1e635
Uses code obfuscation techniques (call, push, ret)Show sources
Source: C:\Windows\9706.tmpCode function: 10_2_013059E5 push ecx; ret 10_2_013059F8

Spreading:

barindex
Contains functionality to enumerate / list files inside a directoryShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00475E9F PathCombineW,FindFirstFileW,WaitForMultipleObjects,PathCombineW,StrStrIW,PathFindExtensionW,FindNextFileW,FindClose,3_2_00475E9F
Creates COM task schedule object (often to register a task for autostart)Show sources
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ProgID
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ProgID
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ProgID
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ProgID
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ProgID
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Progid
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ProgID
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Source: C:\Windows\System32\schtasks.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs
Contains functionality to enumerate network shares of other devicesShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00479534 wsprintfW,wsprintfW,wsprintfW,wsprintfW,PathFindExtensionW,wsprintfW,GetLastError,WNetAddConnection2W,PathFileExistsW,GetLastError,GetLastError,WNetCancelConnection2W,OpenSCManagerW,memset,GetSystemTimeAsFileTime,wsprintfW,CreateServiceW,StartServiceW,GetLastError,QueryServiceStatus,Sleep,DeleteService,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,DeleteFileW,WNetCancelConnection2W,SetLastError, \\%s\admin$3_2_00479534
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00479B63 wsprintfW,wsprintfW,wsprintfW,wsprintfW,PathFindExtensionW,wsprintfW,WNetAddConnection2W,PathFileExistsW,GetLastError,GetLastError,WNetCancelConnection2W,GetCurrentThread,OpenThreadToken,DuplicateTokenEx,memset,GetSystemDirectoryW,CloseHandle,PathAppendW,PathFileExistsW,wsprintfW,CreateProcessAsUserW,CreateProcessW,WaitForSingleObject,GetExitCodeProcess,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,PathFileExistsW,GetLastError,GetLastError,DeleteFileW,CloseHandle,CloseHandle,WNetCancelConnection2W,SetLastError, \\%s\admin$3_2_00479B63

System Summary:

barindex
Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
Source: i0YxTJ2SO.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Binary contains paths to debug symbolsShow sources
Source: Binary string: dcrypt.pdbp source: rundll32.exe, cscc.dat.3.dr
Source: Binary string: wdigest.pdb source: 9706.tmp
Source: Binary string: dcrypt.pdb source: rundll32.exe, cscc.dat.3.dr
Source: Binary string: wdigest.pdbJ6 source: 9706.tmp
Binary contains device paths (device paths are often used for kernel mode <-> user mode communication)Show sources
Source: cscc.dat.3.drBinary string: configFlags\Device\dcrypt\DosDevices\dcryptdump_hiber_%s\$dcsys$$dcsys$\Device\CdRom%s\$DC_TRIM_%x$$dcsys$_fail_%xNTFSFATFAT32exFATH
Binary contains paths to development resourcesShow sources
Source: dispci.exe.3.drBinary or memory string: MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5clDuVFr5sQxZ+feQlVvZcEK0k4uCSF5SkOkF9A3tR6O/xAt89/PVhowvu2TfBTRsnBs83hcFH8hjG2V5F5DxXFoSxpTqVsR4lOm5KB2S8ap4TinG/GN/SVNBFwllpRhV/vRWNmKgKIdROvkHxyALuJyUuCZlIoaJ5tB0YkATEHEyRsLcntZYsdwH1P+NmXiNg2MH5lZ9bEOk7YTMfwVKNqtHaX0LJOyAkx4NR0DPOFLDQONW9OOhZSkRx3V7PC3Q29HHhyiKVCPJsOW1l1mNtwL7KX+7kfNe0CefByEWfSBt1tbkvjdeP2xBnPjb3GE1GA/oGcGjrXc6wV8WKsfYQIDAQAB.3ds.7z.accdb.ai.asm.asp.aspx.avhd.back.bak.bmp.brw.c.cab.cc.cer.cfg.conf.cpp.crt.cs.ctl.cxx.dbf.der.dib.disk.djvu.doc.docx.dwg.eml.fdb.gz.h.hdd.hpp.hxx.iso.java.jfif.jpe.jpeg.jpg.js.kdbx.key.mail.mdb.msg.nrg.odc.odf.odg.odi.odm.odp.ods.odt.ora.ost.ova.ovf.p12.p7b.p7c.pdf.pem.pfx.php.pmf.png.ppt.pptx.ps1.pst.pvi.py.pyc.pyw.qcow.qcow2.rar.rb.rtf.scm.sln.sql.tar.tib.tif.tiff.vb.vbox.vbs.vcb.vdi.vfd.vhd.vhdx.vmc.vmdk.vmsd.vmtm.vmx.vsdx.vsv.work.xls.xlsx.xml.xvd.zip.\AppData\ProgramData\Program Files\Windows.encrypted%lS OK
Source: i0YxTJ2SO.exe, rundll32.exe, infpub.dat.1.drBinary or memory string: MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5clDuVFr5sQxZ+feQlVvZcEK0k4uCSF5SkOkF9A3tR6O/xAt89/PVhowvu2TfBTRsnBs83hcFH8hjG2V5F5DxXFoSxpTqVsR4lOm5KB2S8ap4TinG/GN/SVNBFwllpRhV/vRWNmKgKIdROvkHxyALuJyUuCZlIoaJ5tB0YkATEHEyRsLcntZYsdwH1P+NmXiNg2MH5lZ9bEOk7YTMfwVKNqtHaX0LJOyAkx4NR0DPOFLDQONW9OOhZSkRx3V7PC3Q29HHhyiKVCPJsOW1l1mNtwL7KX+7kfNe0CefByEWfSBt1tbkvjdeP2xBnPjb3GE1GA/oGcGjrXc6wV8WKsfYQIDAQAB.3ds.7z.accdb.ai.asm.asp.aspx.avhd.back.bak.bmp.brw.c.cab.cc.cer.cfg.conf.cpp.crt.cs.ctl.cxx.dbf.der.dib.disk.djvu.doc.docx.dwg.eml.fdb.gz.h.hdd.hpp.hxx.iso.java.jfif.jpe.jpeg.jpg.js.kdbx.key.mail.mdb.msg.nrg.odc.odf.odg.odi.odm.odp.ods.odt.ora.ost.ova.ovf.p12.p7b.p7c.pdf.pem.pfx.php.pmf.png.ppt.pptx.ps1.pst.pvi.py.pyc.pyw.qcow.qcow2.rar.rb.rtf.scm.sln.sql.tar.tib.tif.tiff.vb.vbox.vbs.vcb.vdi.vfd.vhd.vhdx.vmc.vmdk.vmsd.vmtm.vmx.vsdx.vsv.work.xls.xlsx.xml.xvd.zip.\AppData\ProgramData\Program Files\Windows.encrypted*..Readme.txt%s-h-f%dkernel32.dllIsWow64Process\\.\pipe\%ws"%ws" %wsiphlpapi.dllGetExtendedTcpTable%u.%u.%u.%uTERM
Classification labelShow sources
Source: classification engineClassification label: mal84.evad.spre.expl.rans.winEXE@35/5@0/4
Contains functionality to adjust token privileges (e.g. debug / backup)Show sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00477CC5 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,SetLastError,3_2_00477CC5
Contains functionality to create servicesShow sources
Source: C:\Windows\System32\rundll32.exeCode function: OpenSCManagerW,GetLastError,CreateServiceW,GetLastError,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_00471368
Source: C:\Windows\System32\rundll32.exeCode function: wsprintfW,wsprintfW,wsprintfW,wsprintfW,PathFindExtensionW,wsprintfW,GetLastError,WNetAddConnection2W,PathFileExistsW,GetLastError,GetLastError,WNetCancelConnection2W,OpenSCManagerW,memset,GetSystemTimeAsFileTime,wsprintfW,CreateServiceW,StartServiceW,GetLastError,QueryServiceStatus,Sleep,DeleteService,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,DeleteFileW,WNetCancelConnection2W,SetLastError,3_2_00479534
Contains functionality to enum processes or threadsShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_004784EE CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,3_2_004784EE
Contains functionality to load and extract PE file embedded resourcesShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00478313 FindResourceW,LoadResource,LockResource,SizeofResource,GetProcessHeap,GetProcessHeap,HeapAlloc,RtlAllocateHeap,memcpy,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,3_2_00478313
Contains functionality to modify services (start/stop/modify)Show sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00479534 wsprintfW,wsprintfW,wsprintfW,wsprintfW,PathFindExtensionW,wsprintfW,GetLastError,WNetAddConnection2W,PathFileExistsW,GetLastError,GetLastError,WNetCancelConnection2W,OpenSCManagerW,memset,GetSystemTimeAsFileTime,wsprintfW,CreateServiceW,StartServiceW,GetLastError,QueryServiceStatus,Sleep,DeleteService,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,DeleteFileW,WNetCancelConnection2W,SetLastError,3_2_00479534
Found command line outputShow sources
Source: C:\Windows\System32\schtasks.exeConsole Write: ........a.~u..0.....E.R.R.O.R.:. .............................}u..........#...}u.... .....i.,.#.G..v..#...........#.....
Source: C:\Windows\System32\schtasks.exeConsole Write: ........a.~u..0.................=.................................W...#.....................g_v.`.#.....X...j..u..(.....
Source: C:\Windows\System32\schtasks.exeConsole Write: ........a.~u..0.............0...L...........................`.....0...2...2..................................{{.....G..v
Source: C:\Windows\System32\schtasks.exeConsole Write: ........a.~u..0.............0...n...........................`.....1...3.x.3.......$...............$.........3p....$.G..v
Source: C:\Windows\System32\shutdown.exeConsole Write: ..............".....A. .s.y.s.t.e.m. .s.h.u.t.d.o.w.n. .i.s. .i.n. .p.r.o.g.r.e.s.s...(.1.1.1.5.)...P.".P...@.".....6...
PE file has an executable .text section and no other executable sectionShow sources
Source: i0YxTJ2SO.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Reads ini filesShow sources
Source: C:\Windows\System32\LogonUI.exeFile read: C:\Windows\win.ini
Reads software policiesShow sources
Source: C:\Users\user\Desktop\i0YxTJ2SO.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Runs a DLL by calling functionsShow sources
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
Spawns processesShow sources
Source: unknownProcess created: C:\Users\user\Desktop\i0YxTJ2SO.exe 'C:\Users\user\Desktop\i0YxTJ2SO.exe'
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
Source: unknownProcess created: C:\Windows\System32\cmd.exe /c schtasks /Delete /F /TN rhaegal
Source: unknownProcess created: C:\Windows\System32\schtasks.exe schtasks /Delete /F /TN rhaegal
Source: unknownProcess created: C:\Windows\System32\cmd.exe /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR 'C:\Windows\system32\cmd.exe /C Start \'\' \'C:\Windows\dispci.exe\' -id 3818518496 && exit'
Source: unknownProcess created: C:\Windows\System32\cmd.exe /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR 'C:\Windows\system32\shutdown.exe /r /t 0 /f' /ST 10:36:00
Source: unknownProcess created: C:\Windows\9706.tmp 'C:\Windows\9706.tmp' \\.\pipe\{EE91B260-F47B-4E8B-B208-21BD25A3C0CE}
Source: unknownProcess created: C:\Windows\System32\schtasks.exe schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR 'C:\Windows\system32\cmd.exe /C Start \'\' \'C:\Windows\dispci.exe\' -id 3818518496 && exit'
Source: unknownProcess created: C:\Windows\System32\schtasks.exe schtasks /Create /SC once /TN drogon /RU SYSTEM /TR 'C:\Windows\system32\shutdown.exe /r /t 0 /f' /ST 10:36:00
Source: unknownProcess created: C:\Windows\System32\cmd.exe /c wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D C:
Source: unknownProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl Setup
Source: unknownProcess created: C:\Windows\System32\shutdown.exe C:\Windows\system32\shutdown.exe /r /t 0 /f
Source: unknownProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl System
Source: unknownProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl Security
Source: unknownProcess created: C:\Windows\System32\cmd.exe /c schtasks /Delete /F /TN drogon
Source: unknownProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl Application
Source: unknownProcess created: C:\Windows\System32\LogonUI.exe 'LogonUI.exe' /flags:0x0
Source: unknownProcess created: C:\Windows\System32\schtasks.exe unknown
Source: unknownProcess created: C:\Windows\System32\fsutil.exe unknown
Source: C:\Users\user\Desktop\i0YxTJ2SO.exeProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c schtasks /Delete /F /TN rhaegal
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR 'C:\Windows\system32\cmd.exe /C Start \'\' \'C:\Windows\dispci.exe\' -id 3818518496 && exit'
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR 'C:\Windows\system32\shutdown.exe /r /t 0 /f' /ST 10:36:00
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\9706.tmp 'C:\Windows\9706.tmp' \\.\pipe\{EE91B260-F47B-4E8B-B208-21BD25A3C0CE}
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D C:
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c schtasks /Delete /F /TN drogon
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /Delete /F /TN rhaegal
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR 'C:\Windows\system32\cmd.exe /C Start \'\' \'C:\Windows\dispci.exe\' -id 3818518496 && exit'
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /Create /SC once /TN drogon /RU SYSTEM /TR 'C:\Windows\system32\shutdown.exe /r /t 0 /f' /ST 10:36:00
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl Setup
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl System
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl Security
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl Application
Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe unknown
Uses an in-process (OLE) Automation serverShow sources
Source: C:\Windows\System32\schtasks.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
PE file has section (not .text) which is very likely to contain packed code (zlib compression ratio < 0.011)Show sources
Source: infpub.dat.1.drStatic PE information: Section: .rsrc ZLIB complexity 0.995711959814
Contains functionality to call native functionsShow sources
Source: C:\Windows\9706.tmpCode function: 10_2_01301D4C GetCurrentProcess,NtQueryInformationProcess,RtlGetCurrentPeb,10_2_01301D4C
Source: C:\Windows\9706.tmpCode function: 10_2_0130184E NtQuerySystemInformation,GetModuleHandleW,GetProcAddress,LocalAlloc,NtQuerySystemInformation,LocalFree,10_2_0130184E
Contains functionality to delete servicesShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00479534 wsprintfW,wsprintfW,wsprintfW,wsprintfW,PathFindExtensionW,wsprintfW,GetLastError,WNetAddConnection2W,PathFileExistsW,GetLastError,GetLastError,WNetCancelConnection2W,OpenSCManagerW,memset,GetSystemTimeAsFileTime,wsprintfW,CreateServiceW,StartServiceW,GetLastError,QueryServiceStatus,Sleep,DeleteService,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,DeleteFileW,WNetCancelConnection2W,SetLastError,3_2_00479534
Contains functionality to launch a process as a different userShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00479B63 wsprintfW,wsprintfW,wsprintfW,wsprintfW,PathFindExtensionW,wsprintfW,WNetAddConnection2W,PathFileExistsW,GetLastError,GetLastError,WNetCancelConnection2W,GetCurrentThread,OpenThreadToken,DuplicateTokenEx,memset,GetSystemDirectoryW,CloseHandle,PathAppendW,PathFileExistsW,wsprintfW,CreateProcessAsUserW,CreateProcessW,WaitForSingleObject,GetExitCodeProcess,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,PathFileExistsW,GetLastError,GetLastError,DeleteFileW,CloseHandle,CloseHandle,WNetCancelConnection2W,SetLastError,3_2_00479B63
Contains functionality to shutdown / reboot the systemShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00478A23 InitiateSystemShutdownExW,ExitWindowsEx,ExitProcess,3_2_00478A23
Creates files inside the system directoryShow sources
Source: C:\Users\user\Desktop\i0YxTJ2SO.exeFile created: C:\Windows\infpub.dat
Creates mutexesShow sources
Source: C:\Windows\System32\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\85427E2A3AD6FDE5
Deletes Windows filesShow sources
Source: C:\Windows\System32\rundll32.exeFile deleted: C:\Windows\infpub.dat
Enables security privilegesShow sources
Source: C:\Windows\System32\wevtutil.exeProcess token adjusted: Security
PE file contains strange resourcesShow sources
Source: i0YxTJ2SO.exeStatic PE information: Resource name: RT_ICON type: ump; GLS_BINARY_LSB_FIRST
Source: i0YxTJ2SO.exeStatic PE information: Resource name: RT_ICON type: ump; GLS_BINARY_LSB_FIRST
PE file has an invalid certificateShow sources
Source: i0YxTJ2SO.exeStatic PE information: invalid certificate
Reads the hosts fileShow sources
Source: C:\Windows\System32\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hosts
Sample file is different than original file name gathered from version infoShow sources
Source: i0YxTJ2SO.exeBinary or memory string: OriginalFilenameFlashUtil.exev+ vs i0YxTJ2SO.exe
Source: i0YxTJ2SO.exeBinary or memory string: OriginalFilenameFlashUtil.exev+ vs i0YxTJ2SO.exe
Sample reads its own file contentShow sources
Source: C:\Users\user\Desktop\i0YxTJ2SO.exeFile read: C:\Users\user\Desktop\i0YxTJ2SO.exe
Contains functionality to create processes via WMIShow sources
Source: i0YxTJ2SO.exeBinary or memory string: MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5clDuVFr5sQxZ+feQlVvZcEK0k4uCSF5SkOkF9A3tR6O/xAt89/PVhowvu2TfBTRsnBs83hcFH8hjG2V5F5DxXFoSxpTqVsR4lOm5KB2S8ap4TinG/GN/SVNBFwllpRhV/vRWNmKgKIdROvkHxyALuJyUuCZlIoaJ5tB0YkATEHEyRsLcntZYsdwH1P+NmXiNg2MH5lZ9bEOk7YTMfwVKNqtHaX0LJOyAkx4NR0DPOFLDQONW9OOhZSkRx3V7PC3Q29HHhyiKVCPJsOW1l1mNtwL7KX+7kfNe0CefByEWfSBt1tbkvjdeP2xBnPjb3GE1GA/oGcGjrXc6wV8WKsfYQIDAQAB.3ds.7z.accdb.ai.asm.asp.aspx.avhd.back.bak.bmp.brw.c.cab.cc.cer.cfg.conf.cpp.crt.cs.ctl.cxx.dbf.der.dib.disk.djvu.doc.docx.dwg.eml.fdb.gz.h.hdd.hpp.hxx.iso.java.jfif.jpe.jpeg.jpg.js.kdbx.key.mail.mdb.msg.nrg.odc.odf.odg.odi.odm.odp.ods.odt.ora.ost.ova.ovf.p12.p7b.p7c.pdf.pem.pfx.php.pmf.png.ppt.pptx.ps1.pst.pvi.py.pyc.pyw.qcow.qcow2.rar.rb.rtf.scm.sln.sql.tar.tib.tif.tiff.vb.vbox.vbs.vcb.vdi.vfd.vhd.vhdx.vmc.vmdk.vmsd.vmtm.vmx.vsdx.vsv.work.xls.xlsx.xml.xvd.zip.\AppData\ProgramData\Program Files\Windows.encrypted*..Readme.txt%s-h-f%dkernel32.dllIsWow64Process\\.\pipe\%ws"%ws" %wsiphlpapi.dllGetExtendedTcpTable%u.%u.%u.%uTERM
Uses shutdown.exe to shutdown or reboot the systemShow sources
Source: unknownProcess created: C:\Windows\System32\shutdown.exe C:\Windows\system32\shutdown.exe /r /t 0 /f

HIPS / PFW / Operating System Protection Evasion:

barindex
Contains functionality to add an ACL to a security descriptorShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00476FFE GetProcessHeap,GetProcessHeap,HeapAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,ConnectNamedPipe,PeekNamedPipe,Sleep,GetProcessHeap,HeapAlloc,ReadFile,StrChrW,GetProcessHeap,HeapFree,FlushFileBuffers,DisconnectNamedPipe,CloseHandle,3_2_00476FFE
Contains functionality to create a new security descriptorShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0047841D GetCurrentProcessId,OpenProcess,OpenProcessToken,CloseHandle,DuplicateToken,AllocateAndInitializeSid,CheckTokenMembership,TerminateProcess,FreeSid,CloseHandle,CloseHandle,CloseHandle,3_2_0047841D
Creates a process in suspended mode (likely to inject code)Show sources
Source: C:\Users\user\Desktop\i0YxTJ2SO.exeProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c schtasks /Delete /F /TN rhaegal
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR 'C:\Windows\system32\cmd.exe /C Start \'\' \'C:\Windows\dispci.exe\' -id 3818518496 && exit'
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR 'C:\Windows\system32\shutdown.exe /r /t 0 /f' /ST 10:36:00
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\9706.tmp 'C:\Windows\9706.tmp' \\.\pipe\{EE91B260-F47B-4E8B-B208-21BD25A3C0CE}
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D C:
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe /c schtasks /Delete /F /TN drogon
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /Delete /F /TN rhaegal
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR 'C:\Windows\system32\cmd.exe /C Start \'\' \'C:\Windows\dispci.exe\' -id 3818518496 && exit'
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /Create /SC once /TN drogon /RU SYSTEM /TR 'C:\Windows\system32\shutdown.exe /r /t 0 /f' /ST 10:36:00
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl Setup
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl System
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl Security
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wevtutil.exe wevtutil cl Application
Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe unknown

Anti Debugging:

barindex
Contains functionality to register its own exception handlerShow sources
Source: C:\Users\user\Desktop\i0YxTJ2SO.exeCode function: 1_2_003E1499 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_003E1499
Source: C:\Windows\9706.tmpCode function: 10_2_01304D59 SetUnhandledExceptionFilter,10_2_01304D59
Source: C:\Windows\9706.tmpCode function: 10_2_01304B37 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_01304B37
Source: C:\Windows\9706.tmpCode function: 10_2_0130601E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_0130601E
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))Show sources
Source: C:\Windows\System32\rundll32.exeSystem information queried: KernelDebuggerInformation
Contains functionality to check if a debugger is running (IsDebuggerPresent)Show sources
Source: C:\Windows\9706.tmpCode function: 10_2_01304B37 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_01304B37
Contains functionality to dynamically determine API callsShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00479016 VirtualProtect,LoadLibraryA,GetProcAddress,VirtualProtect,3_2_00479016
Contains functionality which may be used to detect a debugger (GetProcessHeap)Show sources
Source: C:\Users\user\Desktop\i0YxTJ2SO.exeCode function: 1_2_003E1690 GetProcessHeap,1_2_003E1690
Enables debug privilegesShow sources
Source: C:\Windows\System32\rundll32.exeProcess token adjusted: Debug
Source: C:\Windows\9706.tmpProcess token adjusted: Debug

Malware Analysis System Evasion:

barindex
Contains functionality to enumerate / list files inside a directoryShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00475E9F PathCombineW,FindFirstFileW,WaitForMultipleObjects,PathCombineW,StrStrIW,PathFindExtensionW,FindNextFileW,FindClose,3_2_00475E9F
Contains functionality to query system informationShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00475BC4 GetSystemInfo,__alldiv,MapViewOfFile,CryptDuplicateHash,CryptHashData,LocalAlloc,CryptGetHashParam,memcpy,FlushViewOfFile,LocalFree,CryptDestroyHash,UnmapViewOfFile,3_2_00475BC4
Program exit pointsShow sources
Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_3-4855
Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_3-4748
Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_3-4766
Queries a list of all running processesShow sources
Source: C:\Windows\System32\rundll32.exeProcess information queried: ProcessInformation
Contains long sleeps (>= 3 min)Show sources
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 2000
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 500
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 1000
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 300000
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 900000
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 180000
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 3000
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 10000
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 180000
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 500
Found decision node followed by non-executed suspicious APIsShow sources
Source: C:\Windows\System32\rundll32.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_3-5612
Found dropped PE file which has not been started or loadedShow sources
Source: C:\Windows\System32\rundll32.exeDropped PE file which has not been started: C:\Windows\dispci.exe
Source: C:\Windows\System32\rundll32.exeDropped PE file which has not been started: C:\Windows\cscc.dat
Source: C:\Windows\System32\rundll32.exeDropped PE file which has not been started: C:\Windows\9706.tmp
May sleep (evasive loops) to hinder dynamic analysisShow sources
Source: C:\Windows\System32\rundll32.exe TID: 3468Thread sleep time: -2000s >= -60s
Source: C:\Windows\System32\rundll32.exe TID: 3540Thread sleep time: -5000s >= -60s
Source: C:\Windows\System32\rundll32.exe TID: 3548Thread sleep time: -1000s >= -60s
Source: C:\Windows\System32\rundll32.exe TID: 3628Thread sleep time: -300000s >= -60s
Source: C:\Windows\System32\rundll32.exe TID: 3468Thread sleep time: -900000s >= -60s
Source: C:\Windows\System32\rundll32.exe TID: 3544Thread sleep time: -540000s >= -60s
Source: C:\Windows\System32\rundll32.exe TID: 3468Thread sleep time: -3000s >= -60s
Source: C:\Windows\System32\rundll32.exe TID: 3624Thread sleep time: -10000s >= -60s
Source: C:\Windows\System32\rundll32.exe TID: 3544Thread sleep time: -180000s >= -60s
Source: C:\Windows\System32\rundll32.exe TID: 3540Thread sleep time: -500s >= -60s
Source: C:\Windows\System32\LogonUI.exe TID: 3960Thread sleep time: -60000s >= -60s
Found evasive API chain (may stop execution after checking computer name)Show sources
Source: C:\Windows\System32\rundll32.exeEvasive API call chain: GetComputerName,DecisionNodes,ExitProcessgraph_3-4844
Found evasive API chain (may stop execution after checking mutex)Show sources
Source: C:\Windows\System32\rundll32.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_3-4847

Hooking and other Techniques for Hiding and Protection:

barindex
Disables application error messsages (SetErrorMode)Show sources
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\schtasks.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Extensive use of GetProcAddress (often used to hide API calls)Show sources
Source: C:\Windows\9706.tmpCode function: 10_2_013025AC GetModuleHandleW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,10_2_013025AC

Language, Device and Operating System Detection:

barindex
Contains functionality to create pipes for IPCShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00476FFE GetProcessHeap,GetProcessHeap,HeapAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,ConnectNamedPipe,PeekNamedPipe,Sleep,GetProcessHeap,HeapAlloc,ReadFile,StrChrW,GetProcessHeap,HeapFree,FlushFileBuffers,DisconnectNamedPipe,CloseHandle,3_2_00476FFE
Contains functionality to query local / system timeShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00478192 GetLocalTime,GetSystemDirectoryW,PathAppendW,wsprintfW,3_2_00478192
Contains functionality to query time zone informationShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_004757E5 LocalAlloc,GetSystemDefaultLCID,GetTimeZoneInformation,memcpy,NetWkstaGetInfo,memcpy,memcpy,NetApiBufferFree,LocalAlloc,memcpy,LocalFree,LocalFree,3_2_004757E5
Contains functionality to query windows versionShow sources
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00471531 GetVersion,3_2_00471531
Queries the cryptographic machine GUIDShow sources
Source: C:\Windows\System32\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

Behavior Graph

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
behavior_graph main Behavior Graph ID: 394065 Sample:  i0YxTJ2SO.exe Startdate:  25/10/2017 Architecture:  WINDOWS Score:  84 1 i0YxTJ2SO.exe 1 main->1      started     18 shutdown.exe main->18      started     25 LogonUI.exe main->25      started     9823reducedSig Signatures exceeded maximum capacity for this level. 5 signatures have been hidden. 9823sig Clears the journal log 9813sig Clears the windows event log 9883sig Connects to many different private IPs (likely to spread or exploit) d1e296092reduced Connected ips exeeded maximum capacity for this level. 1 connected ip has been hidden. d1e296092 192.168.1.1, unknown unknown d1e296093 192.168.1.0, unknown unknown d1e296094 192.168.1.2, 80 unknown unknown d1e14132 cscc.dat, PE32 d1e14159 dispci.exe, PE32 d1e14186 9706.tmp, PE32 3 rundll32.exe 1 3 1->3      started     3->9823reducedSig 3->9823sig 3->9813sig 3->9883sig 3->d1e296092reduced 3->d1e296092 3->d1e296093 3->d1e296094 3->d1e14132 dropped 3->d1e14159 dropped 3->d1e14186 dropped 4reduced Processes exeeded maximum capacity for this level. 1 process has been hidden. 3->4reduced      started     4 cmd.exe 3->4      started     7 cmd.exe 3->7      started     8 cmd.exe 3->8      started     15 cmd.exe 3->15      started     22 cmd.exe 3->22      started     6 schtasks.exe 4->6      started     11 schtasks.exe 7->11      started     14 schtasks.exe 8->14      started     17 wevtutil.exe 15->17      started     26 schtasks.exe 22->26      started     process1 process3 dnsIp3 fileCreated3 signatures3 process4 process6 fileCreated1

Simulations

Behavior and APIs

TimeTypeDescription
10:18:44API Interceptor1x Sleep call for process: rundll32.exe modified from: 900000ms to: 500ms
10:18:44API Interceptor1x Sleep call for process: rundll32.exe modified from: 300000ms to: 500ms
10:18:46Task SchedulerRun new task: drogon path: C:\Windows\system32\shutdown.exe s>/r /t 0 /f
10:36:00API Interceptor4x Sleep call for process: rundll32.exe modified from: 180000ms to: 500ms
10:36:03API Interceptor1x Sleep call for process: LogonUI.exe modified from: 60000ms to: 500ms

Antivirus Detection

Initial Sample

No Antivirus matches

Dropped Files

No Antivirus matches

Domains

No Antivirus matches

Yara Overview

Initial Sample

No yara matches

PCAP (Network Traffic)

No yara matches

Dropped Files

No yara matches

Memory Dumps

No yara matches

Unpacked PEs

No yara matches

Screenshot

windows-stand

Startup

  • System is w7_1
  • i0YxTJ2SO.exe (PID: 3432 cmdline: 'C:\Users\user\Desktop\i0YxTJ2SO.exe' MD5: FBBDC39AF1139AEBBA4DA004475E8839)
    • rundll32.exe (PID: 3464 cmdline: C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15 MD5: 51138BEEA3E2C21EC44D0932C71762A8)
      • cmd.exe (PID: 3476 cmdline: /c schtasks /Delete /F /TN rhaegal MD5: AD7B9C14083B52BC532FBA5948342B98)
        • schtasks.exe (PID: 3496 cmdline: schtasks /Delete /F /TN rhaegal MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
      • cmd.exe (PID: 3512 cmdline: /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR 'C:\Windows\system32\cmd.exe /C Start \'\' \'C:\Windows\dispci.exe\' -id 3818518496 && exit' MD5: AD7B9C14083B52BC532FBA5948342B98)
        • schtasks.exe (PID: 3568 cmdline: schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR 'C:\Windows\system32\cmd.exe /C Start \'\' \'C:\Windows\dispci.exe\' -id 3818518496 && exit' MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
      • cmd.exe (PID: 3524 cmdline: /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR 'C:\Windows\system32\shutdown.exe /r /t 0 /f' /ST 10:36:00 MD5: AD7B9C14083B52BC532FBA5948342B98)
        • schtasks.exe (PID: 3608 cmdline: schtasks /Create /SC once /TN drogon /RU SYSTEM /TR 'C:\Windows\system32\shutdown.exe /r /t 0 /f' /ST 10:36:00 MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
      • 9706.tmp (PID: 3560 cmdline: 'C:\Windows\9706.tmp' \\.\pipe\{EE91B260-F47B-4E8B-B208-21BD25A3C0CE} MD5: 37945C44A897AA42A66ADCAB68F560E0)
      • cmd.exe (PID: 3656 cmdline: /c wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D C: MD5: AD7B9C14083B52BC532FBA5948342B98)
        • wevtutil.exe (PID: 3688 cmdline: wevtutil cl Setup MD5: 81538B795F922B8DA6FD897EFB04B5EE)
        • wevtutil.exe (PID: 3748 cmdline: wevtutil cl System MD5: 81538B795F922B8DA6FD897EFB04B5EE)
        • wevtutil.exe (PID: 3820 cmdline: wevtutil cl Security MD5: 81538B795F922B8DA6FD897EFB04B5EE)
        • wevtutil.exe (PID: 3844 cmdline: wevtutil cl Application MD5: 81538B795F922B8DA6FD897EFB04B5EE)
        • fsutil.exe (PID: 3976 cmdline: unknown MD5: B4834F08230A2EB7F498DE4E5B6AB814)
      • cmd.exe (PID: 3836 cmdline: /c schtasks /Delete /F /TN drogon MD5: AD7B9C14083B52BC532FBA5948342B98)
        • schtasks.exe (PID: 3928 cmdline: unknown MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
  • shutdown.exe (PID: 3708 cmdline: C:\Windows\system32\shutdown.exe /r /t 0 /f MD5: 61739432482891F2DC5745CCA0A67028)
  • LogonUI.exe (PID: 3900 cmdline: 'LogonUI.exe' /flags:0x0 MD5: 3EF0D8AB08385AAB5802E773511A2E6A)
  • cleanup

Created / dropped Files

C:\Windows\9706.tmp
File Type:PE32 executable for MS Windows (console) Intel 80386 32-bit
MD5:D41D8CD98F00B204E9800998ECF8427E
SHA1:7F10CDA876977CE8C2AFFCFE349A65F6C64D0BDB
SHA-256:785634393BDB64352EB3705F2E9D3BCAEE754E6B0199C90B4A361A5600FEA3FC
SHA-512:757F2EC10A018B4019BF9CF5FC26724C168EC0D07AF1E02EE66A5AFBEA9AC6BF255948BEBEE5867E868B3872AA9D40A08644B22F30D3C646F7E1C9AAAEE4BBE6
Malicious:true
Reputation:low
C:\Windows\cscc.dat
File Type:PE32 executable for MS Windows (native) Intel 80386 32-bit
MD5:D41D8CD98F00B204E9800998ECF8427E
SHA1:59CD4907A438B8300A467CEE1C6FC31135757039
SHA-256:682ADCB55FE4649F7B22505A54A9DBC454B4090FC2BB84AF7DB5B0908F3B7806
SHA-512:9A5FDD0512CAF7AC029C3877CC884286082E4E041F9DC38AB00735DE097D5AC93660671E772737DF3313317D80455048A6059C12ACB6F9AFC32E2E15CB2BBEDF
Malicious:false
Reputation:low
C:\Windows\dispci.exe
File Type:PE32 executable for MS Windows (console) Intel 80386 32-bit
MD5:D41D8CD98F00B204E9800998ECF8427E
SHA1:AFEEE8B4ACFF87BC469A6F0364A81AE5D60A2ADD
SHA-256:8EBC97E05C8E1073BDA2EFB6F4D00AD7E789260AFA2C276F0C72740B838A0A93
SHA-512:F5DCBF3634AEDFE5B8D6255E20015555343ADD5B1BE3801E62A5987E86A3E52495B5CE3156E4F63CF095D0CEDFB63939EAF39BEA379CCAC82A10A4182B8DED22
Malicious:false
Reputation:low
C:\Windows\infpub.dat
File Type:data
MD5:D41D8CD98F00B204E9800998ECF8427E
SHA1:E9EFC622924FB965D4A14BDB6223834D9A9007E7
SHA-256:14D82A676B63AB046AE94FA5E41F9F69A65DC7946826CB3D74CEA6C030C2F958
SHA-512:AFC2A8466F106E81D423065B07AED2529CBF690AB4C3E019334F1BEDFB42DC0E0957BE83D860A84B7285BD49285503BFE95A1CF571A678DBC9BDB07789DA928E
Malicious:false
Reputation:low

Contacted Domains/Contacted IPs

Contacted Domains

No contacted domains info

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPCountryFlagASNASN NameMalicious
192.168.1.1unknown
unknownunknownfalse
192.168.1.0unknown
unknownunknownfalse
192.168.1.2unknown
unknownunknownfalse
23.54.91.27United States
20940AKAMAI-ASN1USfalse

Static File Info

General

File type:PE32 executable for MS Windows (console) Intel 80386 32-bit
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:i0YxTJ2SO.exe
File size:441899
MD5:fbbdc39af1139aebba4da004475e8839
SHA1:de5c8d858e6e41da715dca1c019df0bfb92d32c0
SHA256:630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da
SHA512:74eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&\..G2..G2..G2..?...G2..?...G2......G2......G2..?...G2..G3..G2......G2......G2.Rich.G2.........................PE..L......Y...

File Icon

Static PE Info

General

Entrypoint:0x4012c0
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x59EC0396 [Sun Oct 22 02:33:58 2017 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:e3bda9df66f1f9b2b9b7b068518f2af1

Authenticode Signature

Signature Valid:false
Signature Issuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
Signature Validation Error:The digital signature of the object did not verify
Error Number:-2146869232
Not Before, Not After
  • 12/16/2016 1:00:00 AM 12/18/2017 12:59:59 AM
Subject Chain
  • CN=Symantec Corporation, OU=STAR Security Engines, O=Symantec Corporation, L=Mountain View, S=California, C=US
Version:3
Thumbprint:AD96BB64BA36379D2E354660780C2067B81DA2E0
Serial:0EBFEA68D677B3E26CAB41C33F3E69DE

Entrypoint Preview

Instruction
push ebp
mov ebp, esp
mov eax, 000012ACh
call 1057CFD8h
mov eax, dword ptr [00408000h]
xor eax, ebp
mov dword ptr [ebp-04h], eax
push esi
mov esi, dword ptr [00404004h]
push edi
call esi
mov edi, eax
test edi, edi
je 1057CDE2h
lea eax, dword ptr [ebp-00001250h]
push eax
mov dword ptr [ebp-00001250h], 00000000h
call esi
push eax
call dword ptr [00404050h]
mov esi, eax
test esi, esi
je 1057CDBEh
cmp dword ptr [ebp-00001250h], 01h
jne 1057CC63h
xor eax, eax
lea ebx, dword ptr [ebx+00000000h]
movzx ecx, word ptr [eax+00406CF0h]
mov word ptr [ebp+eax-0000124Ch], cx
add eax, 02h
test cx, cx
jne 1057CC2Bh
jmp 1057CC98h
mov eax, dword ptr [esi]
push eax
push edi
call dword ptr [00404060h]
mov ecx, dword ptr [esi]
add esp, 08h
lea esi, dword ptr [ecx+02h]
jmp 1057CC45h
lea ecx, dword ptr [ecx+00h]
mov dx, word ptr [ecx]
add ecx, 02h
test dx, dx
jne 1057CC37h
sub ecx, esi
sar ecx, 1
cmp word ptr [eax+ecx*2], 0022h
lea eax, dword ptr [eax+ecx*2]
jne 1057CC45h
add eax, 02h
cmp word ptr [eax], 0020h
jne 1057CC45h
add eax, 02h
lea edx, dword ptr [ebp-0000124Ch]
sub edx, eax
lea ecx, dword ptr [ecx+00h]

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x6d8c0x64.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x90000x7088.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x689a30x3488
IMAGE_DIRECTORY_ENTRY_BASERELOC0x110000x1a8.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x40000x74.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x2ed30x3000False0.610188802083ump; data6.58410377892IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rdata0x40000x302a0x3200False0.81ump; data7.17725886834IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x80000x33c0x200False0.048828125ump; data0.183338791656IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0x90000x70880x7200False0.166152686404ump; data4.20408578098IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x110000x24e0x400False0.41796875ump; data3.29313868559IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_ICON0x92540xea8ump; dataEnglishUnited States
RT_ICON0xa0fc0x8a8ump; dataEnglishUnited States
RT_ICON0xa9a40x568ump; GLS_BINARY_LSB_FIRSTEnglishUnited States
RT_ICON0xaf0c0x10a8ump; dataEnglishUnited States
RT_ICON0xbfb40x25a8ump; dataEnglishUnited States
RT_ICON0xe55c0x10a8ump; dataEnglishUnited States
RT_ICON0xf6040x468ump; GLS_BINARY_LSB_FIRSTEnglishUnited States
RT_GROUP_ICON0xfa6c0x68ump; MS Windows icon resource - 7 icons, 48x48, 256-colorsEnglishUnited States
RT_VERSION0xfad40x450ump; dataEnglishUnited States
RT_MANIFEST0xff240x161ump; ASCII text, with CRLF line terminatorsEnglishUnited States

Imports

DLLImport
KERNEL32.dllExitProcess, GetCommandLineW, GetFileSize, CreateProcessW, HeapAlloc, HeapFree, GetModuleHandleW, GetProcessHeap, WriteFile, GetSystemDirectoryW, ReadFile, GetModuleFileNameW, CreateFileW, lstrcatW, CloseHandle, UnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, SetUnhandledExceptionFilter
USER32.dllwsprintfW
SHELL32.dllCommandLineToArgvW
msvcrt.dllwcsstr, memcpy, free, malloc

Version Infos

DescriptionData
LegalCopyrightCopyright 1996-2017 Adobe Systems Incorporated
InternalNameAdobe Flash Player Installer/Uninstaller 27.0
FileVersion27,0,0,170
CompanyNameAdobe Systems Incorporated
LegalTrademarksAdobe Flash Player
ProductNameAdobe Flash Player Installer/Uninstaller
ProductVersion27,0,0,170
FileDescriptionAdobe Flash Player Installer/Uninstaller 27.0 r0
OriginalFilenameFlashUtil.exe
Translation0x0409 0x04b0

Possible Origin

Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

Network Port Distribution

TCP Packets

TimestampSource PortDest PortSource IPDest IP
Okt 25, 2017 10:19:05.549350977 MESZ4916780192.168.1.1623.54.91.27
Okt 25, 2017 10:19:05.549423933 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:05.549571991 MESZ4916780192.168.1.1623.54.91.27
Okt 25, 2017 10:19:05.549827099 MESZ4916780192.168.1.1623.54.91.27
Okt 25, 2017 10:19:05.549864054 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:06.408255100 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:06.408282995 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:06.408633947 MESZ4916780192.168.1.1623.54.91.27
Okt 25, 2017 10:19:11.537026882 MESZ4917180192.168.1.16192.168.1.2
Okt 25, 2017 10:19:11.537050009 MESZ8049171192.168.1.2192.168.1.16
Okt 25, 2017 10:19:12.107522011 MESZ4917180192.168.1.16192.168.1.2
Okt 25, 2017 10:19:12.107568979 MESZ8049171192.168.1.2192.168.1.16
Okt 25, 2017 10:19:12.607408047 MESZ4917180192.168.1.16192.168.1.2
Okt 25, 2017 10:19:12.607438087 MESZ8049171192.168.1.2192.168.1.16
Okt 25, 2017 10:19:12.633356094 MESZ4917580192.168.1.16192.168.1.2
Okt 25, 2017 10:19:12.633382082 MESZ8049175192.168.1.2192.168.1.16
Okt 25, 2017 10:19:13.217000961 MESZ4917580192.168.1.16192.168.1.2
Okt 25, 2017 10:19:13.217032909 MESZ8049175192.168.1.2192.168.1.16
Okt 25, 2017 10:19:13.716617107 MESZ4917580192.168.1.16192.168.1.2
Okt 25, 2017 10:19:13.716655016 MESZ8049175192.168.1.2192.168.1.16
Okt 25, 2017 10:19:13.901700020 MESZ4918280192.168.1.16192.168.1.2
Okt 25, 2017 10:19:13.901732922 MESZ8049182192.168.1.2192.168.1.16
Okt 25, 2017 10:19:14.102214098 MESZ804916423.54.91.27192.168.1.16
Okt 25, 2017 10:19:14.102286100 MESZ4916480192.168.1.1623.54.91.27
Okt 25, 2017 10:19:14.102366924 MESZ4916480192.168.1.1623.54.91.27
Okt 25, 2017 10:19:14.102390051 MESZ804916423.54.91.27192.168.1.16
Okt 25, 2017 10:19:14.232072115 MESZ4916780192.168.1.1623.54.91.27
Okt 25, 2017 10:19:14.232112885 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:14.435813904 MESZ4918280192.168.1.16192.168.1.2
Okt 25, 2017 10:19:14.435853958 MESZ8049182192.168.1.2192.168.1.16
Okt 25, 2017 10:19:14.935329914 MESZ4918280192.168.1.16192.168.1.2
Okt 25, 2017 10:19:14.935369968 MESZ8049182192.168.1.2192.168.1.16
Okt 25, 2017 10:19:15.028579950 MESZ4918580192.168.1.16192.168.1.2
Okt 25, 2017 10:19:15.028613091 MESZ8049185192.168.1.2192.168.1.16
Okt 25, 2017 10:19:15.518414021 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:15.518435001 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:15.518537998 MESZ4916780192.168.1.1623.54.91.27
Okt 25, 2017 10:19:15.545139074 MESZ4918580192.168.1.16192.168.1.2
Okt 25, 2017 10:19:15.545197010 MESZ8049185192.168.1.2192.168.1.16
Okt 25, 2017 10:19:16.044704914 MESZ4918580192.168.1.16192.168.1.2
Okt 25, 2017 10:19:16.044728041 MESZ8049185192.168.1.2192.168.1.16
Okt 25, 2017 10:19:31.113209963 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:31.316478968 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:31.520481110 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:31.928483963 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:32.744473934 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:34.380484104 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:37.652494907 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:44.196482897 MESZ804916723.54.91.27192.168.1.16
Okt 25, 2017 10:19:57.300494909 MESZ804916723.54.91.27192.168.1.16

HTTP Request Dependency Graph

  • ts-ocsp.ws.symantec.com

HTTP Packets

TimestampSource PortDest PortSource IPDest IPHeaderTotal Bytes Transfered (KB)
Okt 25, 2017 10:19:05.549827099 MESZ4916780192.168.1.1623.54.91.27GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBRi82PVYYKWGJWdgVNyePy5kYTdqQQUX5r1blzMzHSa1N197z%2Fb7EyALt0CEA7P9DjI%2Fr81bgTYapgbGlA%3D HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ts-ocsp.ws.symantec.com
3
Okt 25, 2017 10:19:06.408255100 MESZ804916723.54.91.27192.168.1.16HTTP/1.1 200 OK
Server: nginx/1.10.2
Content-Type: application/ocsp-response
Content-Length: 1469
content-transfer-encoding: binary
Cache-Control: max-age=419637, public, no-transform, must-revalidate
Last-Modified: Mon, 23 Oct 2017 04:49:19 GMT
Expires: Mon, 30 Oct 2017 04:49:19 GMT
Date: Wed, 25 Oct 2017 08:19:05 GMT
Connection: keep-alive
Data Raw: 30 82 05 b9 0a 01 00 a0 82 05 b2 30 82 05 ae 06 09 2b 06 01 05 05 07 30 01 01 04 82 05 9f 30 82 05 9b 30 81 9e a2 16 04 14 af f2 0c ff 31 a4 51 0e e1 aa 89 56 f6 a0 cf df 88 11 15 29 18 0f 32 30 31 37 31 30 32 33 30 34 34 39 31 39 5a 30 73 30 71 30 49 30 09 06 05 2b 0e 03 02 1a 05 00 04 14 62 f3 63 d5 61 82 96 18 95 9d 81 53 72 78 fc b9 91 84 dd a9 04 14 5f 9a f5 6e 5c cc cc 74 9a d4 dd 7d ef 3f db ec 4c 80 2e dd 02 10 0e cf f4 38 c8 fe bf 35 6e 04 d8 6a 98 1b 1a 50 80 00 18 0f 32 30 31 37 31 30 32 33 30 34 34 39 31 39 5a a0 11 18 0f 32 30 31 37 31 30 33 30 30 34 34 39 31 39 5a 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 4f 17 f0 c8 73 f0 94 0b b9 22 58 62 c1 30 57 b3 28 4d 71 d5 ba 31 9a 12 d2 e6 e7 3c 82 35 b8 dc 42 2a f8 36 10 4c 8b 3c 87 1e 8f 27 33 23 68 b9 71 49 e1 68 91 24 63 4b 57 18 90 30 40 7b 5c 95 95 d9 01 19 b3 a0 7b 23 08 e8 6f 6c e1 f7 4b 6c 68 da e9 25 31 68 dc 1c cc 4f c0 99 f6 fb a3 f3 a5 93 10 d3 17 bb 27 b0 e7 2d 23 d9 6f 2f 6d 14 43 57 36 40 6d 09 ae 84 0e 41 69 00 77 44 ee ca d9 54 26 9c 87 67 e8 c1 f8 0d a1 b6 44 90 23 e9 20 22 5f f9 4b a3 df ed 1f 35 94 9e 09 5d 6a a7 0e 0e 88 a6 3b 3c b7 9b 5b 29 e5 82 2f 96 fe b8 ee 5c 25 0c 27 6c 3a a3 70 98 2f 24 c2 4e e3 76 47 de 53 cf 9f 17 0f 8c 47 fd 21 ee 32 83 13 81 b4 78 e2 42 c5 f8 ce f9 87 5d 3c 0b 53 e0 67 7d 8c e0 61 9c a8 f4 7d 2d b3 59 80 b6 ec db d4 59 ca 05 ef fa fb 1e 9d 70 25 46 bf 0a 3b 9c 24 f8 a0 82 03 e2 30 82 03 de 30 82 03 da 30 82 02 c2 a0 03 02 01 02 02 10 1b af 02 f5 b8 fc fa 01 4e 80 47 46 73 25 7f 23 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 5e 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 1d 30 1b 06 03 55 04 0a 13 14 53 79 6d 61 6e 74 65 63 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 30 30 2e 06 03 55 04 03 13 27 53 79 6d 61 6e 74 65 63 20 54 69 6d 65 20 53 74 61 6d 70 69 6e 67 20 53 65 72 76 69 63 65 73 20 43 41 20 2d 20 47 32 30 1e 17 0d 31 36 31 32 31 33 30 30 30 30 30 30 5a 17 0d 32 31 31 32 33 31 32 33 35 39 35 39 5a 30 46 31 44 30 42 06 03 55 04 03 13 3b 53 79 6d 61 6e 74 65 63 20 54 69 6d 65 20 53 74 61 6d 70 69 6e 67 20 53 65 72 76 69 63 65 73 20 43 41 20 2d 20 47 32 20 53 48 41 31 20 4f 43 53 50 20 52 65 73 70 6f 6e 64 65 72 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 86 45 f0 3c 53 d4 0c 3c 26 6d 2a a1 c3 a5 ed 80 18 55 80 ec 8c f0 54 5b db 9e d0 0e d5 96 c5 99 82 55 2a 7e 32 c0 15 ae 4c cd e3 c6 07 53 4f 71 be ab f5 58 99 39 8f f7 c7 d6 33 35 e4 0c 6d 18 80 7a d7 0a 55 7b fd 6a 8a 8d 9b 69 d3 a7 48 f2 c1 bd 90 6e 33 cc 02 ef 1f 0d 69 69 9f f3 36 2a 8f c6 e3 14 10 7c 53 b3 66 1f 6e ec 8e a8 cd 6b e1 c9 19 a1 9c 39 96 8a 6f 9c 2c 5f 84 d9 de 5f bb af 3c 1d 31 e2 7a db 68 96 0f 9e ab 9d 49 8f 9a 8d 2f c3 d6 b8 73 7a 04 24 80 34 fa 9f 74 bb a8 59 a3 a7 f9 39 c7 4e 10 1a a1 d8 52 4e 16 a1 4c 4c b4 43 fe 47 df e3 29 08 0e 53 6c df 40 5e cb f6 d3 59 09 63 cb 6f c5 f4 fa e1 71 14 35 88 00 82 41 2f f0 4a 20 81 6d 84 81 61 ed 5e 8e 74 b0 35 e0 cc 2f b1 c3 e8 9c e3 a0 61 a4 66 be 72 70 ff fb f1 4a 0a 42 e7 50 ca 73 a8 98 fc 13 9b 02 03 01 00 01 a3 81 ab 30 81 a8 30 0c 06 03 55 1d 13 01 01 ff 04 02 30 00 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 09 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 07 80 30 0f 06 09 2b 06 01 05 05 07 30 01 05 04 02 05 00 30 22 06 03 55 1d 11 04 1b 30 19
Data Ascii: 00+0001QV)20171023044919Z0s0q0I0+bcaSrx_n\t}?L.85njP20171023044919Z20171030044919Z0*HOs"Xb0W(Mq1<5B*6L<'3#hqIh$cKW0@{\{#olKlh%1hO'-#o/mCW6@mAiwDT&gD# "_K5]j;<[)/\%'l:p/$NvGSG!2xB]<Sg}a}-YYp%F;$000NGFs%#0*H0^10UUS10USymantec Corporation100.U'Symantec Time Stamping Services CA - G20161213000000Z211231235959Z0F1D0BU;Symantec Time Stamping Services CA - G2 SHA1 OCSP Responder0"0*H0E<S<&m*UT[U*~2LSOqX935mzU{jiHn3ii6*|Sfnk9o,__<1zhI/sz$4tY9NRNLLCG)Sl@^Ycoq5A/J ma^t5/afrpJBPs00U00U%0+0U0+00"U0
4
Okt 25, 2017 10:19:06.408282995 MESZ804916723.54.91.27192.168.1.16Data Raw: a4 17 30 15 31 13 30 11 06 03 55 04 03 13 0a 54 47 56 2d 4f 46 46 2d 36 39 30 1d 06 03 55 1d 0e 04 16 04 14 af f2 0c ff 31 a4 51 0e e1 aa 89 56 f6 a0 cf df 88 11 15 29 30 1f 06 03 55 1d 23 04 18 30 16 80 14 5f 9a f5 6e 5c cc cc 74 9a d4 dd 7d ef
Data Ascii: 010UTGV-OFF-690U1QV)0U#0_n\t}?L.0*H(J.FR}7/ ~<qRb7Atze{<qOZ>'80eQzwSmQYvM\>brkF$|Z!%!S^XS:
5
Okt 25, 2017 10:19:14.232072115 MESZ4916780192.168.1.1623.54.91.27GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBQd11mpyHEqFCSocj4SCu93CBydHAQUr2PWyqNOhXLgp7xB8ymiOH%2BAdWICEFRY8qrXQdZEvISpe6CWUuY%3D HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ts-ocsp.ws.symantec.com
17
Okt 25, 2017 10:19:15.518414021 MESZ804916723.54.91.27192.168.1.16HTTP/1.1 200 OK
Server: nginx/1.10.2
Content-Type: application/ocsp-response
Content-Length: 1589
content-transfer-encoding: binary
Cache-Control: max-age=539105, public, no-transform, must-revalidate
Last-Modified: Tue, 24 Oct 2017 14:02:01 GMT
Expires: Tue, 31 Oct 2017 14:02:01 GMT
Date: Wed, 25 Oct 2017 08:19:14 GMT
Connection: keep-alive
Data Raw: 30 82 06 31 0a 01 00 a0 82 06 2a 30 82 06 26 06 09 2b 06 01 05 05 07 30 01 01 04 82 06 17 30 82 06 13 30 81 9e a2 16 04 14 d7 13 bb f6 52 bf e9 00 ca 1f 87 36 96 e5 fa 2e 46 75 48 89 18 0f 32 30 31 37 31 30 32 34 31 34 30 32 30 31 5a 30 73 30 71 30 49 30 09 06 05 2b 0e 03 02 1a 05 00 04 14 1d d7 59 a9 c8 71 2a 14 24 a8 72 3e 12 0a ef 77 08 1c 9d 1c 04 14 af 63 d6 ca a3 4e 85 72 e0 a7 bc 41 f3 29 a2 38 7f 80 75 62 02 10 54 58 f2 aa d7 41 d6 44 bc 84 a9 7b a0 96 52 e6 80 00 18 0f 32 30 31 37 31 30 32 34 31 34 30 32 30 31 5a a0 11 18 0f 32 30 31 37 31 30 33 31 31 34 30 32 30 31 5a 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 24 bb 19 33 14 54 7b 74 fd f0 45 4c 5d c1 ef ac d0 28 ad f4 11 b2 cf db 13 77 36 07 52 a7 72 31 be 76 55 e9 1d d0 fd 9f 41 7f ea 87 d8 0e 8b ca 24 91 f5 6e d2 58 e1 fe 48 97 6d 63 8f 24 56 8d 51 c2 f6 ee 77 6f df 4e 21 ca ef 3b 3e e1 c6 32 9f 7e 96 96 84 44 6b ed a3 87 c0 65 0d c2 12 f1 d9 f1 69 f2 ab 90 0f df 33 00 22 98 47 0e 5b 85 e2 f2 8b 79 27 1b 4c d1 d9 87 f0 42 62 7b 21 60 15 94 99 a1 d9 4a c6 1b 07 08 5c e0 bf 29 94 ab ae 42 60 b7 f4 74 78 23 01 33 88 80 cd 8a e6 0f 65 9f e3 ca 51 7b aa 6c 50 3b ae 23 d6 fa 68 df 52 75 27 d6 45 76 42 e7 63 09 c4 a4 ba bf cf 6d 42 79 f3 1b 5a 9b 61 dd dd 33 89 29 0b ef e5 28 5c ed 96 b8 7a d6 c3 8e 32 20 9a 02 9f 9f d3 e4 74 40 88 d3 eb f2 40 95 a8 4a 71 a8 07 41 7a ab 71 27 ed 0a 9b 5d b5 bf 14 c3 3a 09 95 7b b2 ea a0 82 04 5a 30 82 04 56 30 82 04 52 30 82 03 3a a0 03 02 01 02 02 10 61 6c b0 aa 9b 5e 44 cc a3 80 d8 ad fb c1 5c aa 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 77 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 1d 30 1b 06 03 55 04 0a 13 14 53 79 6d 61 6e 74 65 63 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 1f 30 1d 06 03 55 04 0b 13 16 53 79 6d 61 6e 74 65 63 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 31 28 30 26 06 03 55 04 03 13 1f 53 79 6d 61 6e 74 65 63 20 53 48 41 32 35 36 20 54 69 6d 65 53 74 61 6d 70 69 6e 67 20 43 41 30 1e 17 0d 31 37 30 39 31 30 30 30 30 30 30 30 5a 17 0d 31 37 31 32 30 39 32 33 35 39 35 39 5a 30 39 31 37 30 35 06 03 55 04 03 13 2e 53 79 6d 61 6e 74 65 63 20 53 48 41 32 35 36 20 54 69 6d 65 53 74 61 6d 70 69 6e 67 20 43 41 20 4f 43 53 50 20 52 65 73 70 6f 6e 64 65 72 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 c5 23 81 9b c8 ca 89 c2 fb 16 3a 43 1b 8a 8d 85 40 9a 3a c7 d1 b3 f3 90 80 ef 3f 1a 35 02 51 1f 01 83 b0 71 cb 52 a6 1f b9 e4 1e 62 1f ea 84 e8 fd dd 7a f6 3b 43 fd 90 6a 3d 81 f0 08 c1 c9 94 88 24 d3 e8 71 6f 7c 5c aa 1c 58 f6 68 c0 d3 86 3b 85 8d 28 b9 00 e2 e2 bb 57 be 3a 55 ec 4b f9 54 e9 57 bd 4a 85 57 f2 8c 2c 7c e6 cb 2b c7 47 cb a8 80 9f 8a 6a f1 d7 5f eb df 46 aa fe ce 72 e8 27 27 87 f0 b3 f8 38 4a de d4 8d 48 18 61 18 19 15 f1 f6 2c 53 55 9f 6d 65 17 4d 7c d0 17 09 38 69 d6 52 f1 f2 18 24 83 23 a6 9e f3 4c 3f d9 f9 a4 f2 3f 82 55 89 c4 e3 25 09 e4 8e 2a 90 11 8d 36 dd 7f 97 ba 79 c1 2a c1 ca 15 ce 36 f5 3c 6a d4 34 7e 17 aa ac 87 ca d7 b4 51 89 5f 0c 18 16 34 4e 8b 0c 0b d8 f4 3d 48 f2 b7 56 00 a9 aa 89 4e 4c 6b 5c 85 84 55 32 40 ea 29 a9 a2 2b ab 02 03 01 00 01 a3 82 01 16 30 82 01 12 30 0f 06 09 2b 06 01 05 05 07 30 01 05 04 02 05 00 30 22 06 03 55 1d 11 04 1b 30 19 a4 17 30 15 31 13 30 11 06 03 55 04 03 13 0a 54 47 56 2d 45 2d 32 39 31 37 30 1f 06 03 55 1d 23 04 18 30 16 80
Data Ascii: 01*0&+000R6.FuH20171024140201Z0s0q0I0+Yq*$r>wcNrA)8ubTXAD{R20171024140201Z20171031140201Z0*H$3T{tEL](w6Rr1vUA$nXHmc$VQwoN!;>2~Dkei3"G[y'LBb{!`J\)B`tx#3eQ{lP;#hRu'EvBcmByZa3)(\z2 t@@JqAzq']:{Z0V0R0:al^D\0*H0w10UUS10USymantec Corporation10USymantec Trust Network1(0&USymantec SHA256 TimeStamping CA0170910000000Z171209235959Z091705U.Symantec SHA256 TimeStamping CA OCSP Responder0"0*H0#:C@:?5QqRbz;Cj=$qo|\Xh;(W:UKTWJW,|+Gj_Fr''8JHa,SUmeM|8iR$#L??U%*6y*6<j4~Q_4N=HVNLk\U2@)+00+00"U0010UTGV-E-29170U#0
25
Okt 25, 2017 10:19:15.518435001 MESZ804916723.54.91.27192.168.1.16Data Raw: 14 af 63 d6 ca a3 4e 85 72 e0 a7 bc 41 f3 29 a2 38 7f 80 75 62 30 1d 06 03 55 1d 0e 04 16 04 14 d7 13 bb f6 52 bf e9 00 ca 1f 87 36 96 e5 fa 2e 46 75 48 89 30 0c 06 03 55 1d 13 01 01 ff 04 02 30 00 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01
Data Ascii: cNrA)8ub0UR6.FuH0U00U%0+0U0hU a0_0]`HE0N0#+https://d.symcb.com/cps0'+0 https://d.symcb.com/rpa0*HQA{l;x
25

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

High Level Behavior Distribution

Click to dive into process behavior distribution

Behavior

Click to jump to process

System Behavior

General

Start time:10:18:40
Start date:25/10/2017
Path:C:\Users\user\Desktop\i0YxTJ2SO.exe
Wow64 process (32bit):false
Commandline:'C:\Users\user\Desktop\i0YxTJ2SO.exe'
Imagebase:0x75440000
File size:441899 bytes
MD5 hash:FBBDC39AF1139AEBBA4DA004475E8839
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:18:40
Start date:25/10/2017
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
Imagebase:0x71880000
File size:44544 bytes
MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:18:40
Start date:25/10/2017
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:/c schtasks /Delete /F /TN rhaegal
Imagebase:0x75440000
File size:302592 bytes
MD5 hash:AD7B9C14083B52BC532FBA5948342B98
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:18:41
Start date:25/10/2017
Path:C:\Windows\System32\schtasks.exe
Wow64 process (32bit):false
Commandline:schtasks /Delete /F /TN rhaegal
Imagebase:0x75170000
File size:179712 bytes
MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:18:43
Start date:25/10/2017
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:/c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR 'C:\Windows\system32\cmd.exe /C Start \'\' \'C:\Windows\dispci.exe\' -id 3818518496 && exit'
Imagebase:0x77390000
File size:302592 bytes
MD5 hash:AD7B9C14083B52BC532FBA5948342B98
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:18:43
Start date:25/10/2017
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:/c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR 'C:\Windows\system32\shutdown.exe /r /t 0 /f' /ST 10:36:00
Imagebase:0x75440000
File size:302592 bytes
MD5 hash:AD7B9C14083B52BC532FBA5948342B98
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:18:43
Start date:25/10/2017
Path:C:\Windows\9706.tmp
Wow64 process (32bit):false
Commandline:'C:\Windows\9706.tmp' \\.\pipe\{EE91B260-F47B-4E8B-B208-21BD25A3C0CE}
Imagebase:0x77390000
File size:53624 bytes
MD5 hash:37945C44A897AA42A66ADCAB68F560E0
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:18:43
Start date:25/10/2017
Path:C:\Windows\System32\schtasks.exe
Wow64 process (32bit):false
Commandline:schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR 'C:\Windows\system32\cmd.exe /C Start \'\' \'C:\Windows\dispci.exe\' -id 3818518496 && exit'
Imagebase:0x73d30000
File size:179712 bytes
MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:18:43
Start date:25/10/2017
Path:C:\Windows\System32\schtasks.exe
Wow64 process (32bit):false
Commandline:schtasks /Create /SC once /TN drogon /RU SYSTEM /TR 'C:\Windows\system32\shutdown.exe /r /t 0 /f' /ST 10:36:00
Imagebase:0x73d30000
File size:179712 bytes
MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:18:45
Start date:25/10/2017
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:/c wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D C:
Imagebase:0x75790000
File size:302592 bytes
MD5 hash:AD7B9C14083B52BC532FBA5948342B98
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:36:00
Start date:25/10/2017
Path:C:\Windows\System32\wevtutil.exe
Wow64 process (32bit):false
Commandline:wevtutil cl Setup
Imagebase:0x76eb0000
File size:175616 bytes
MD5 hash:81538B795F922B8DA6FD897EFB04B5EE
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:36:00
Start date:25/10/2017
Path:C:\Windows\System32\shutdown.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\shutdown.exe /r /t 0 /f
Imagebase:0x77390000
File size:30720 bytes
MD5 hash:61739432482891F2DC5745CCA0A67028
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:36:01
Start date:25/10/2017
Path:C:\Windows\System32\wevtutil.exe
Wow64 process (32bit):false
Commandline:wevtutil cl System
Imagebase:0x74ec0000
File size:175616 bytes
MD5 hash:81538B795F922B8DA6FD897EFB04B5EE
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:36:01
Start date:25/10/2017
Path:C:\Windows\System32\wevtutil.exe
Wow64 process (32bit):false
Commandline:wevtutil cl Security
Imagebase:0x76eb0000
File size:175616 bytes
MD5 hash:81538B795F922B8DA6FD897EFB04B5EE
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:36:02
Start date:25/10/2017
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:/c schtasks /Delete /F /TN drogon
Imagebase:0x77390000
File size:302592 bytes
MD5 hash:AD7B9C14083B52BC532FBA5948342B98
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:36:02
Start date:25/10/2017
Path:C:\Windows\System32\wevtutil.exe
Wow64 process (32bit):false
Commandline:wevtutil cl Application
Imagebase:0x76eb0000
File size:175616 bytes
MD5 hash:81538B795F922B8DA6FD897EFB04B5EE
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:36:02
Start date:25/10/2017
Path:C:\Windows\System32\LogonUI.exe
Wow64 process (32bit):false
Commandline:'LogonUI.exe' /flags:0x0
Imagebase:0x74a40000
File size:10752 bytes
MD5 hash:3EF0D8AB08385AAB5802E773511A2E6A
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:36:04
Start date:25/10/2017
Path:C:\Windows\System32\schtasks.exe
Wow64 process (32bit):
Commandline:unknown
Imagebase:
File size:179712 bytes
MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
Programmed in:C, C++ or other language
Reputation:low

General

Start time:10:36:04
Start date:25/10/2017
Path:C:\Windows\System32\fsutil.exe
Wow64 process (32bit):
Commandline:unknown
Imagebase:
File size:74240 bytes
MD5 hash:B4834F08230A2EB7F498DE4E5B6AB814
Programmed in:C, C++ or other language
Reputation:low

Disassembly

Code Analysis

Reset < >

    Execution Graph

    Execution Coverage:4.3%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:7%
    Total number of Nodes:86
    Total number of Limit Nodes:13

    Graph

    %3 2358 3e28d5 2360 3e28df 2358->2360 2359 3e2dcb 3 API calls 2361 3e1dd2 2359->2361 2360->2359 2360->2361 2378 3e33a6 free 2262 3e12c0 2282 3e1660 2262->2282 2265 3e12eb GetCommandLineW CommandLineToArgvW 2266 3e1487 2265->2266 2268 3e130f 2265->2268 2310 3e1499 2266->2310 2270 3e1339 wcsstr 2268->2270 2274 3e1318 2268->2274 2269 3e1495 2270->2274 2271 3e138f GetSystemDirectoryW 2271->2266 2272 3e13a9 lstrcatW 2271->2272 2272->2266 2273 3e13c3 2272->2273 2284 3e10c0 GetModuleHandleW GetModuleFileNameW 2273->2284 2274->2271 2274->2274 2276 3e13d5 2276->2266 2305 3e1260 CreateFileW 2276->2305 2279 3e13f9 wsprintfW 2280 3e1430 2279->2280 2280->2280 2281 3e1449 CreateProcessW ExitProcess 2280->2281 2283 3e12cd GetCommandLineW 2282->2283 2283->2265 2283->2266 2285 3e123e 2284->2285 2286 3e110d 2284->2286 2287 3e1499 4 API calls 2285->2287 2314 3e1000 CreateFileW 2286->2314 2289 3e124b 2287->2289 2289->2276 2290 3e1126 2290->2285 2292 3e112e GetProcessHeap RtlAllocateHeap 2290->2292 2293 3e1225 2292->2293 2294 3e1189 memcpy 2292->2294 2297 3e1499 4 API calls 2293->2297 2295 3e11aa GetProcessHeap RtlAllocateHeap 2294->2295 2296 3e119e 2294->2296 2298 3e11d0 2295->2298 2299 3e11e5 GetProcessHeap HeapFree 2295->2299 2296->2295 2300 3e1238 2297->2300 2323 3e1690 2298->2323 2303 3e1499 4 API calls 2299->2303 2300->2276 2304 3e121f 2303->2304 2304->2276 2306 3e1284 WriteFile 2305->2306 2307 3e12aa 2305->2307 2308 3e12a3 CloseHandle 2306->2308 2309 3e1299 2306->2309 2307->2266 2307->2279 2308->2307 2309->2308 2311 3e14a1 2310->2311 2312 3e14a4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 2310->2312 2311->2269 2312->2269 2315 3e102b GetFileSize 2314->2315 2316 3e10b5 2314->2316 2317 3e1039 GetProcessHeap RtlAllocateHeap 2315->2317 2318 3e10a3 CloseHandle 2315->2318 2316->2290 2319 3e1091 2317->2319 2320 3e1050 ReadFile 2317->2320 2318->2290 2319->2318 2320->2319 2321 3e106a 2320->2321 2321->2319 2322 3e106f GetProcessHeap HeapFree CloseHandle 2321->2322 2322->2290 2328 3e2ca1 2323->2328 2327 3e16d9 2327->2299 2337 3e2c14 2328->2337 2330 3e16c9 2330->2327 2331 3e173c 2330->2331 2333 3e1750 2331->2333 2336 3e1dd0 2331->2336 2332 3e2a4f 2332->2336 2342 3e2dcb 2332->2342 2333->2332 2334 3e1b8f memcpy 2333->2334 2333->2336 2334->2333 2336->2327 2338 3e2c21 2337->2338 2339 3e2c33 2337->2339 2338->2339 2341 3e3393 malloc 2338->2341 2339->2330 2341->2339 2345 3e2de1 2342->2345 2343 3e2e21 memcpy 2346 3e2dfa 2343->2346 2344 3e2e39 memcpy 2344->2346 2347 3e2e58 memcpy 2344->2347 2345->2343 2345->2344 2345->2346 2346->2336 2347->2346 2385 3e1be4 2388 3e17be 2385->2388 2386 3e2dcb 3 API calls 2389 3e1dd0 2386->2389 2387 3e2a4f 2387->2386 2387->2389 2388->2387 2388->2389 2390 3e1b8f memcpy 2388->2390 2390->2388 2379 3e1f3b 2380 3e1f4f 2379->2380 2381 3e2012 2380->2381 2382 3e1fe4 memcpy 2380->2382 2383 3e2dcb 3 API calls 2381->2383 2384 3e1dd2 2381->2384 2382->2381 2383->2384

    Executed Functions

    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.391333230.003E1000.00000020.sdmp, Offset: 003E0000, based on PE: true
    • Associated: 00000001.00000002.391307710.003E0000.00000002.sdmp
    • Associated: 00000001.00000002.391369465.003E4000.00000002.sdmp
    • Associated: 00000001.00000002.391411778.003E8000.00000004.sdmp
    • Associated: 00000001.00000002.391460513.003E9000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_3e0000_i0YxTJ2SO.jbxd
    APIs
    • GetCommandLineW.KERNEL32 ref: 003E12DF
    • GetCommandLineW.KERNEL32 ref: 003E12FC
    • CommandLineToArgvW.SHELL32(00000000), ref: 003E12FF
    • wcsstr.MSVCRT ref: 003E133D
    • GetSystemDirectoryW.KERNEL32(?,0000030C), ref: 003E139B
    • lstrcatW.KERNEL32(?,\rundll32.exe), ref: 003E13B5
      • Part of subcall function 003E10C0: GetModuleHandleW.KERNEL32(00000000,?,0000030C,?), ref: 003E10F8
      • Part of subcall function 003E10C0: GetModuleFileNameW.KERNEL32(00000000), ref: 003E10FF
      • Part of subcall function 003E10C0: GetProcessHeap.KERNEL32(00000000,?,?,00000000,?,?), ref: 003E1172
      • Part of subcall function 003E10C0: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,?), ref: 003E1179
      • Part of subcall function 003E10C0: memcpy.MSVCRT ref: 003E1192
      • Part of subcall function 003E10C0: GetProcessHeap.KERNEL32(00000008,00000000,00000000,?,?), ref: 003E11BB
      • Part of subcall function 003E10C0: RtlAllocateHeap.NTDLL(00000000), ref: 003E11BE
      • Part of subcall function 003E10C0: GetProcessHeap.KERNEL32(00000000,00000000), ref: 003E1207
      • Part of subcall function 003E10C0: HeapFree.KERNEL32(00000000), ref: 003E120A
      • Part of subcall function 003E1260: CreateFileW.KERNEL32(C:\Windows\infpub.dat,40000000,00000000,00000000,00000002,00000000,00000000), ref: 003E1277
      • Part of subcall function 003E1260: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 003E128F
      • Part of subcall function 003E1260: CloseHandle.KERNEL32(00000000), ref: 003E12A4
    • wsprintfW.USER32 ref: 003E1418
    • CreateProcessW.KERNEL32 ref: 003E1479
    • ExitProcess.KERNEL32 ref: 003E1481
      • Part of subcall function 003E1499: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 003E1566
      • Part of subcall function 003E1499: UnhandledExceptionFilter.KERNEL32(003E4080), ref: 003E1571
      • Part of subcall function 003E1499: GetCurrentProcess.KERNEL32(C0000409), ref: 003E157C
      • Part of subcall function 003E1499: TerminateProcess.KERNEL32(00000000), ref: 003E1583
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.391333230.003E1000.00000020.sdmp, Offset: 003E0000, based on PE: true
    • Associated: 00000001.00000002.391307710.003E0000.00000002.sdmp
    • Associated: 00000001.00000002.391369465.003E4000.00000002.sdmp
    • Associated: 00000001.00000002.391411778.003E8000.00000004.sdmp
    • Associated: 00000001.00000002.391460513.003E9000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_3e0000_i0YxTJ2SO.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(00000000,?,0000030C,?), ref: 003E10F8
    • GetModuleFileNameW.KERNEL32(00000000), ref: 003E10FF
    • GetProcessHeap.KERNEL32(00000000,?,?,00000000,?,?), ref: 003E1172
    • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,?), ref: 003E1179
    • memcpy.MSVCRT ref: 003E1192
    • GetProcessHeap.KERNEL32(00000008,00000000,00000000,?,?), ref: 003E11BB
    • RtlAllocateHeap.NTDLL(00000000), ref: 003E11BE
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 003E1207
    • HeapFree.KERNEL32(00000000), ref: 003E120A
      • Part of subcall function 003E1499: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 003E1566
      • Part of subcall function 003E1499: UnhandledExceptionFilter.KERNEL32(003E4080), ref: 003E1571
      • Part of subcall function 003E1499: GetCurrentProcess.KERNEL32(C0000409), ref: 003E157C
      • Part of subcall function 003E1499: TerminateProcess.KERNEL32(00000000), ref: 003E1583
      • Part of subcall function 003E1000: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 003E101A
      • Part of subcall function 003E1000: GetFileSize.KERNEL32(00000000,00000000,?,?,?), ref: 003E102D
      • Part of subcall function 003E1000: GetProcessHeap.KERNEL32(00000000,00000000,00000000,?,?,?), ref: 003E103D
      • Part of subcall function 003E1000: RtlAllocateHeap.NTDLL(00000000,?,?,?), ref: 003E1044
      • Part of subcall function 003E1000: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 003E1060
      • Part of subcall function 003E1000: GetProcessHeap.KERNEL32(00000000,00000000,?,?), ref: 003E1071
      • Part of subcall function 003E1000: HeapFree.KERNEL32(00000000,?,?), ref: 003E1078
      • Part of subcall function 003E1000: CloseHandle.KERNEL32(00000000), ref: 003E1080
      • Part of subcall function 003E1000: CloseHandle.KERNEL32(00000000), ref: 003E10A4
    Memory Dump Source
    • Source File: 00000001.00000002.391333230.003E1000.00000020.sdmp, Offset: 003E0000, based on PE: true
    • Associated: 00000001.00000002.391307710.003E0000.00000002.sdmp
    • Associated: 00000001.00000002.391369465.003E4000.00000002.sdmp
    • Associated: 00000001.00000002.391411778.003E8000.00000004.sdmp
    • Associated: 00000001.00000002.391460513.003E9000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_3e0000_i0YxTJ2SO.jbxd
    APIs
    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 003E101A
    • GetFileSize.KERNEL32(00000000,00000000,?,?,?), ref: 003E102D
    • GetProcessHeap.KERNEL32(00000000,00000000,00000000,?,?,?), ref: 003E103D
    • RtlAllocateHeap.NTDLL(00000000,?,?,?), ref: 003E1044
    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 003E1060
    • GetProcessHeap.KERNEL32(00000000,00000000,?,?), ref: 003E1071
    • HeapFree.KERNEL32(00000000,?,?), ref: 003E1078
    • CloseHandle.KERNEL32(00000000), ref: 003E1080
    • CloseHandle.KERNEL32(00000000), ref: 003E10A4
    Memory Dump Source
    • Source File: 00000001.00000002.391333230.003E1000.00000020.sdmp, Offset: 003E0000, based on PE: true
    • Associated: 00000001.00000002.391307710.003E0000.00000002.sdmp
    • Associated: 00000001.00000002.391369465.003E4000.00000002.sdmp
    • Associated: 00000001.00000002.391411778.003E8000.00000004.sdmp
    • Associated: 00000001.00000002.391460513.003E9000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_3e0000_i0YxTJ2SO.jbxd
    APIs
    • CreateFileW.KERNEL32(C:\Windows\infpub.dat,40000000,00000000,00000000,00000002,00000000,00000000), ref: 003E1277
    • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 003E128F
    • CloseHandle.KERNEL32(00000000), ref: 003E12A4
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.391333230.003E1000.00000020.sdmp, Offset: 003E0000, based on PE: true
    • Associated: 00000001.00000002.391307710.003E0000.00000002.sdmp
    • Associated: 00000001.00000002.391369465.003E4000.00000002.sdmp
    • Associated: 00000001.00000002.391411778.003E8000.00000004.sdmp
    • Associated: 00000001.00000002.391460513.003E9000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_3e0000_i0YxTJ2SO.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000001.00000002.391333230.003E1000.00000020.sdmp, Offset: 003E0000, based on PE: true
    • Associated: 00000001.00000002.391307710.003E0000.00000002.sdmp
    • Associated: 00000001.00000002.391369465.003E4000.00000002.sdmp
    • Associated: 00000001.00000002.391411778.003E8000.00000004.sdmp
    • Associated: 00000001.00000002.391460513.003E9000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_3e0000_i0YxTJ2SO.jbxd

    Non-executed Functions

    APIs
    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 003E1566
    • UnhandledExceptionFilter.KERNEL32(003E4080), ref: 003E1571
    • GetCurrentProcess.KERNEL32(C0000409), ref: 003E157C
    • TerminateProcess.KERNEL32(00000000), ref: 003E1583
    Memory Dump Source
    • Source File: 00000001.00000002.391333230.003E1000.00000020.sdmp, Offset: 003E0000, based on PE: true
    • Associated: 00000001.00000002.391307710.003E0000.00000002.sdmp
    • Associated: 00000001.00000002.391369465.003E4000.00000002.sdmp
    • Associated: 00000001.00000002.391411778.003E8000.00000004.sdmp
    • Associated: 00000001.00000002.391460513.003E9000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_3e0000_i0YxTJ2SO.jbxd

    Execution Graph

    Execution Coverage:22.2%
    Dynamic/Decrypted Code Coverage:100%
    Signature Coverage:23.9%
    Total number of Nodes:1420
    Total number of Limit Nodes:13

    Graph

    %3 6361 47682f 6362 47683a 6361->6362 6363 476865 6361->6363 6364 47684e GetProcessHeap HeapFree 6362->6364 6365 476856 6362->6365 6364->6365 6365->6363 6366 47685d GetProcessHeap HeapFree 6365->6366 6366->6363 6367 47ace4 6371 47a8be 6367->6371 6368 47bb4f 6369 47becb 3 API calls 6368->6369 6370 47aed0 6368->6370 6369->6370 6371->6368 6371->6370 6372 47ac8f memcpy 6371->6372 6372->6371 6373 477bf7 GetSystemDirectoryW 6374 477c1c lstrcatW 6373->6374 6375 477cc0 6373->6375 6374->6375 6376 477c36 GetModuleFileNameW 6374->6376 6376->6375 6377 477c4d PathFindFileNameW wsprintfW 6376->6377 6378 477c7c 6377->6378 6378->6378 6379 477c90 CreateProcessW ExitProcess 6378->6379 6403 477938 6404 477941 DisableThreadLibraryCalls 6403->6404 6405 477950 6403->6405 6404->6405 6406 47b03b 6407 47b04f 6406->6407 6408 47b0e4 memcpy 6407->6408 6409 47b112 6407->6409 6408->6409 6410 47becb 3 API calls 6409->6410 6411 47aed2 6409->6411 6410->6411 6412 476aa8 6413 476ab1 6412->6413 6414 476aca 6412->6414 6413->6414 6415 476ab7 StrCmpIW 6413->6415 6415->6414 6380 47b9d5 6381 47b9df 6380->6381 6382 47becb 3 API calls 6381->6382 6383 47aed2 6381->6383 6382->6383 4738 479154 FreeLibrary 4739 479176 CreateFileW 4738->4739 4740 47923a 4738->4740 4741 4791a1 GetFileSize CloseHandle CreateFileW 4739->4741 4742 47920d DeleteFileW 4739->4742 4741->4742 4744 4791ca GetProcessHeap RtlAllocateHeap 4741->4744 4750 479016 4742->4750 4745 479204 CloseHandle 4744->4745 4746 4791e5 WriteFile GetProcessHeap HeapFree 4744->4746 4745->4742 4746->4745 4748 479233 ExitProcess 4751 47903a VirtualProtect 4750->4751 4752 479146 4750->4752 4751->4752 4757 47909e 4751->4757 4752->4748 4759 4779d7 4752->4759 4754 479129 VirtualProtect 4754->4752 4755 479123 4755->4752 4755->4754 4756 4790b0 LoadLibraryA 4756->4757 4757->4754 4757->4755 4757->4756 4758 4790fa GetProcAddress 4757->4758 4758->4757 4817 477897 4759->4817 4761 4779fc 4844 477f04 GetComputerNameW 4761->4844 4766 477a05 ExitProcess 4767 477a1b 4862 4784ee CreateToolhelp32Snapshot 4767->4862 4768 477a0d 4768->4767 4850 477e8e 4768->4850 4776 476c5f 13 API calls 4777 477a70 InitializeCriticalSection 4776->4777 4892 47652f 4777->4892 4784 477ad5 CreateThread 4786 477af8 4784->4786 4788 477aea 4784->4788 6119 4777d1 4784->6119 4785 477b99 4787 477bde Sleep 4785->4787 4955 47554a CryptAcquireContextW 4785->4955 4948 476cc8 4786->4948 4965 478a23 4787->4965 4788->4786 4922 477146 4788->4922 4793 477b03 4796 477b0c 4793->4796 4797 477b63 4793->4797 4800 476c5f 13 API calls 4796->4800 4799 476cc8 3 API calls 4797->4799 4803 477b6e CreateThread 4799->4803 4805 477b1e 4800->4805 4951 47a420 GetProcessHeap HeapAlloc 4803->4951 6135 47a1a9 4803->6135 4973 4785fb 4805->4973 4814 477b2f 4814->4797 4992 47a3b1 CreateThread 4814->4992 5000 47796e CreateThread 4814->5000 5007 476e66 4814->5007 4818 477936 4817->4818 4819 4778a8 GetTickCount srand GetTickCount 4817->4819 4818->4761 4832 47923f 4818->4832 5022 477cc5 GetCurrentProcess OpenProcessToken 4819->5022 4821 4778cc 4822 477cc5 6 API calls 4821->4822 4823 4778db 4822->4823 4824 477cc5 6 API calls 4823->4824 4825 4778ec 4824->4825 5027 47855f CreateToolhelp32Snapshot 4825->5027 4828 47554a 4 API calls 4829 47790e GetModuleFileNameW 4828->4829 4829->4818 4830 477931 4829->4830 5033 478832 CreateFileW 4830->5033 4833 479252 4832->4833 4834 47932c 4832->4834 4833->4834 4835 47925e VirtualAlloc 4833->4835 4834->4761 4836 47928b memcpy 4835->4836 4837 479329 4835->4837 4838 4792f8 VirtualProtect 4836->4838 4841 4792a9 4836->4841 4837->4834 4838->4837 4839 47930d VirtualFree 4838->4839 4839->4837 4841->4838 5042 478f35 VirtualProtect 4841->5042 4845 477f45 4844->4845 4846 477a01 4844->4846 4847 477f74 wsprintfW CreateMutexW 4845->4847 4846->4766 4846->4768 4848 477fab GetLastError 4847->4848 4849 477f99 GetLastError 4847->4849 4848->4846 4849->4846 5046 477e69 PathCombineW 4850->5046 4853 477eaa PathFileExistsW 4854 477ebb GetCurrentProcess 4853->4854 4855 477efc ExitProcess 4853->4855 5048 476f7c GetModuleHandleW GetProcAddress 4854->5048 4861 477ef4 4861->4767 4863 478509 Process32FirstW 4862->4863 4864 477a20 4862->4864 4865 478523 4863->4865 4871 4710a7 4864->4871 4866 478548 4865->4866 4868 47854a 4865->4868 4869 478536 Process32NextW 4865->4869 4867 478555 CloseHandle 4866->4867 4867->4864 5096 47841d 4868->5096 4869->4865 4872 4710c3 4871->4872 4873 4711e9 WSAStartup 4871->4873 4874 4710cc ExpandEnvironmentStringsW 4872->4874 4875 4710ec 4872->4875 4887 476c5f GetProcessHeap HeapAlloc 4873->4887 4874->4875 4876 478313 18 API calls 4875->4876 4877 471176 4876->4877 4877->4873 4878 471193 PathAppendW 4877->4878 4879 4711d7 GetProcessHeap HeapFree 4878->4879 4880 4711a9 4878->4880 4879->4873 4881 4787e7 3 API calls 4880->4881 4882 4711bb 4881->4882 4882->4879 5110 471000 4882->5110 4888 476cbd 4887->4888 4889 476c80 InitializeCriticalSection GetProcessHeap RtlAllocateHeap 4887->4889 4888->4776 4889->4888 4890 476cb8 4889->4890 5170 476bd1 4890->5170 4893 476540 4892->4893 4896 47660d 4892->4896 4894 47655b CommandLineToArgvW 4893->4894 4893->4896 4895 476576 4894->4895 4894->4896 4897 476606 LocalFree 4895->4897 4898 47657f StrToIntW 4895->4898 4907 477dd0 4896->4907 4897->4896 4899 476591 4898->4899 4899->4897 4900 4765a2 StrStrW 4899->4900 4905 476605 4899->4905 5177 4764a6 4899->5177 4900->4899 4901 4765c2 StrStrW 4900->4901 4901->4899 4903 4765dc StrChrW 4901->4903 4903->4899 4904 4765e9 4903->4904 5185 4769ae 4904->5185 4905->4897 5205 476477 GetTickCount 4907->5205 4909 477ddc NetServerGetInfo 4910 477e03 4909->4910 4911 477e0e NetApiBufferFree 4910->4911 4912 477aa3 4910->4912 4911->4912 4913 478192 4912->4913 4914 4781ab GetLocalTime 4913->4914 4915 477aa8 CreateEventW CreateThread 4913->4915 5206 476477 GetTickCount 4914->5206 4915->4784 4915->4785 6152 478a6f GetSystemMetrics 4915->6152 4917 4781ba GetSystemDirectoryW 4917->4915 4919 478200 PathAppendW 4917->4919 4919->4915 4920 4782b9 wsprintfW 4919->4920 4921 477fb7 6 API calls 4920->4921 4921->4915 5207 47a760 4922->5207 4925 476f7c 3 API calls 4926 477170 4925->4926 4927 478313 18 API calls 4926->4927 4929 47717f 4927->4929 4928 477339 4928->4786 4929->4928 4929->4929 4930 4771a0 GetTempFileNameW 4929->4930 4931 4771b8 CoCreateGuid 4930->4931 4934 477317 4930->4934 4932 4771d6 StringFromCLSID 4931->4932 4931->4934 4932->4934 4935 4771ef 4932->4935 4933 477328 GetProcessHeap HeapFree 4933->4928 4934->4933 4934->4934 5209 476faf CreateFileW 4935->5209 4938 477209 wsprintfW CreateThread 4940 4772dc 4938->4940 4941 477247 memset wsprintfW CreateProcessW 4938->4941 5214 476ffe GetProcessHeap HeapAlloc 4938->5214 4939 47730c CoTaskMemFree 4939->4934 4945 476faf 3 API calls 4940->4945 4942 4772b0 WaitForSingleObject 4941->4942 4943 4772d3 CloseHandle 4941->4943 4944 476cc8 3 API calls 4942->4944 4943->4940 4946 4772c9 TerminateThread 4944->4946 4947 4772ff DeleteFileW 4945->4947 4946->4943 4947->4939 4949 476cea 4948->4949 4950 476ccc EnterCriticalSection InterlockedExchange LeaveCriticalSection 4948->4950 4949->4793 4950->4793 4952 477b89 Sleep 4951->4952 4953 47a445 CreateThread 4951->4953 4952->4785 4953->4952 4954 47a461 GetProcessHeap HeapFree 4953->4954 5231 47a333 Sleep 4953->5231 4954->4952 4956 47556b GetLastError 4955->4956 4957 475578 CryptGenRandom CryptReleaseContext 4955->4957 4956->4957 4958 475594 4956->4958 4957->4958 4958->4787 4959 47636b GetLogicalDrives 4958->4959 4960 47638a 4959->4960 4961 476397 GetDriveTypeW 4960->4961 4962 476413 4960->4962 4961->4960 4963 4763c3 LocalAlloc 4961->4963 4962->4787 4963->4960 4964 4763d3 CreateThread 4963->4964 4964->4960 5814 476299 CreateEventW 4964->5814 5990 47808e wsprintfW wsprintfW wsprintfW wsprintfW 4965->5990 4968 478a3f 4970 478a67 ExitProcess 4968->4970 4971 478a48 InitiateSystemShutdownExW 4968->4971 4969 477fb7 6 API calls 4969->4968 4971->4970 4972 478a5e ExitWindowsEx 4971->4972 4972->4970 4974 47a760 4973->4974 4975 47860b memset 4974->4975 5995 478147 memset GetVersionExW 4975->5995 4978 478658 Process32FirstW 4980 4787ca GetLastError 4978->4980 4981 478674 4978->4981 4979 4787da 4979->4814 4982 4787d0 CloseHandle 4980->4982 4981->4982 4983 478689 OpenProcess 4981->4983 4985 4787b1 Process32NextW 4981->4985 4987 478798 CloseHandle CloseHandle 4981->4987 4989 4786f9 DuplicateTokenEx 4981->4989 4991 47875a SetTokenInformation 4981->4991 4982->4979 4983->4981 4984 4786b2 OpenProcessToken 4983->4984 4986 4786c7 GetTokenInformation 4984->4986 4984->4987 4985->4983 4988 4787c8 4985->4988 4986->4981 4986->4987 4987->4981 4988->4982 4989->4987 4990 478716 memset GetTokenInformation 4989->4990 4990->4981 4990->4987 4991->4981 4991->4987 4993 47a40d 4992->4993 4994 47a3d6 SetThreadToken 4992->4994 5997 47a016 GetCurrentThread OpenThreadToken 4992->5997 4995 47a410 SetLastError 4993->4995 4996 47a3f7 GetLastError 4994->4996 4997 47a3e7 ResumeThread 4994->4997 4995->4814 4998 47a3ff CloseHandle 4996->4998 4997->4995 4999 47a3f5 4997->4999 4998->4995 4999->4998 5001 4779d0 5000->5001 5002 477995 SetThreadToken 5000->5002 6100 477957 5000->6100 5001->4814 5003 4779a6 ResumeThread 5002->5003 5004 4779c7 CloseHandle 5002->5004 5005 4779b4 WaitForSingleObject 5003->5005 5006 4779c1 GetLastError 5003->5006 5004->5001 5005->5004 5006->5004 5008 476f73 5007->5008 5009 476e7c 5007->5009 5008->4814 5009->5008 5010 476e85 EnterCriticalSection 5009->5010 5011 476da4 2 API calls 5010->5011 5012 476e98 5011->5012 5013 476f6b LeaveCriticalSection 5012->5013 5014 476f31 GetProcessHeap HeapReAlloc 5012->5014 5015 476eae GetProcessHeap HeapAlloc 5012->5015 5013->5008 5014->5013 5016 476f52 5014->5016 5015->5013 5017 476ed4 GetProcessHeap HeapAlloc 5015->5017 5018 476e66 2 API calls 5016->5018 5019 476f21 GetProcessHeap HeapFree 5017->5019 5020 476ef3 memcpy 5017->5020 5021 476f68 5018->5021 5019->5013 5020->5013 5021->5013 5023 477cfa LookupPrivilegeValueW 5022->5023 5024 477d3c SetLastError 5022->5024 5023->5024 5025 477d0c AdjustTokenPrivileges GetLastError 5023->5025 5024->4821 5025->5024 5026 477d3a 5025->5026 5026->5024 5028 4778fe 5027->5028 5029 47857d Process32FirstW 5027->5029 5028->4828 5032 478597 5029->5032 5030 4785ee CloseHandle 5030->5028 5031 4785dc Process32NextW 5031->5032 5032->5030 5032->5031 5034 4788cd 5033->5034 5035 47885d GetFileSize 5033->5035 5034->4818 5036 47886c GetProcessHeap HeapAlloc 5035->5036 5037 4788c3 CloseHandle 5035->5037 5038 478882 ReadFile 5036->5038 5039 4788af 5036->5039 5037->5034 5038->5039 5040 478899 5038->5040 5039->5037 5040->5039 5041 47889e GetProcessHeap HeapFree 5040->5041 5041->5039 5043 478fc8 5042->5043 5045 478f58 5042->5045 5043->4838 5044 478fa1 VirtualProtect 5044->5045 5045->5043 5045->5044 5047 477e86 5046->5047 5047->4853 5047->4861 5049 476fa8 5048->5049 5050 476f9f IsWow64Process 5048->5050 5051 478313 FindResourceW 5049->5051 5050->5049 5052 47833a LoadResource 5051->5052 5053 477edd 5051->5053 5052->5053 5054 47834f LockResource 5052->5054 5053->4861 5066 4787e7 CreateFileW 5053->5066 5054->5053 5055 478361 SizeofResource 5054->5055 5055->5053 5056 478379 GetProcessHeap RtlAllocateHeap 5055->5056 5056->5053 5057 478395 memcpy 5056->5057 5058 4783b5 GetProcessHeap RtlAllocateHeap 5057->5058 5061 4783ab 5057->5061 5059 478407 GetProcessHeap HeapFree 5058->5059 5060 4783c7 5058->5060 5059->5053 5071 47a790 5060->5071 5061->5058 5061->5061 5063 4783e1 5064 4783fa GetProcessHeap HeapFree 5063->5064 5065 4783e5 5063->5065 5064->5059 5065->5059 5067 478809 WriteFile 5066->5067 5068 47882a 5066->5068 5069 478823 CloseHandle 5067->5069 5070 47881d 5067->5070 5068->4861 5069->5068 5070->5069 5076 47bda1 5071->5076 5075 47a7d9 5075->5063 5085 47bd14 5076->5085 5078 47a7c9 5078->5075 5079 47a83c 5078->5079 5083 47aed0 5079->5083 5084 47a850 5079->5084 5080 47bb4f 5080->5083 5090 47becb 5080->5090 5081 47ac8f memcpy 5081->5084 5083->5075 5084->5080 5084->5081 5084->5083 5086 47bd21 5085->5086 5087 47bd33 5085->5087 5086->5087 5089 47c493 malloc 5086->5089 5087->5078 5089->5087 5091 47bee1 5090->5091 5092 47bf39 memcpy 5091->5092 5093 47bf21 memcpy 5091->5093 5094 47befa 5091->5094 5092->5094 5095 47bf58 memcpy 5092->5095 5093->5094 5094->5083 5095->5094 5097 478430 GetCurrentProcessId 5096->5097 5098 4784e8 5096->5098 5097->5098 5099 47843f OpenProcess 5097->5099 5098->4867 5099->5098 5100 47845c OpenProcessToken 5099->5100 5101 4784e4 CloseHandle 5100->5101 5102 478474 DuplicateToken 5100->5102 5101->5098 5103 478487 AllocateAndInitializeSid 5102->5103 5104 4784df CloseHandle 5102->5104 5105 4784ad CheckTokenMembership 5103->5105 5106 4784da CloseHandle 5103->5106 5104->5101 5107 4784c4 5105->5107 5108 4784d1 FreeSid 5105->5108 5106->5104 5107->5108 5109 4784c9 TerminateProcess 5107->5109 5108->5106 5109->5108 5134 477fb7 wsprintfW GetEnvironmentVariableW 5110->5134 5113 47101c Sleep 5114 471027 GetEnvironmentVariableW 5113->5114 5115 47106b wsprintfW 5114->5115 5116 471043 GetSystemDirectoryW 5114->5116 5119 477fb7 6 API calls 5115->5119 5117 471055 lstrcatW 5116->5117 5118 47109d 5116->5118 5117->5115 5117->5118 5120 471531 5118->5120 5119->5118 5121 471533 5120->5121 5121->5121 5141 471368 OpenSCManagerW 5121->5141 5126 47155a 5133 4711d0 5126->5133 5149 4711ef RegOpenKeyW 5126->5149 5128 4711ef 7 API calls 5129 471582 5128->5129 5130 471588 GetVersion 5129->5130 5129->5133 5131 471592 5130->5131 5130->5133 5132 4711ef 7 API calls 5131->5132 5132->5133 5133->4879 5135 478004 GetSystemDirectoryW 5134->5135 5138 47802c 5134->5138 5136 478016 lstrcatW 5135->5136 5137 471018 5135->5137 5136->5137 5136->5138 5137->5113 5137->5114 5138->5138 5139 478046 CreateProcessW 5138->5139 5139->5137 5140 478075 Sleep 5139->5140 5140->5137 5142 471383 GetLastError 5141->5142 5143 47138e CreateServiceW 5141->5143 5146 4713e1 5142->5146 5144 4713c2 5143->5144 5145 4713c7 GetLastError 5143->5145 5147 4713da CloseServiceHandle 5144->5147 5148 4713dd CloseServiceHandle 5144->5148 5145->5144 5146->5126 5158 4713e8 wsprintfW RegOpenKeyExW 5146->5158 5147->5148 5148->5146 5150 471212 RegQueryValueExW 5149->5150 5151 471364 5149->5151 5157 47125c 5150->5157 5151->5128 5151->5133 5153 471356 RegCloseKey 5153->5151 5154 47134f 5154->5153 5155 4712f0 memmove memcpy RegSetValueExW 5155->5153 5156 471341 RegFlushKey 5155->5156 5156->5153 5157->5153 5157->5154 5157->5155 5159 471435 RegQueryValueExW 5158->5159 5160 47152b 5158->5160 5161 471520 RegCloseKey 5159->5161 5162 471461 5159->5162 5160->5126 5161->5160 5162->5161 5163 47146a RegSetValueExW 5162->5163 5163->5161 5164 471488 RegSetValueExW 5163->5164 5164->5161 5165 47149f RegSetValueExW 5164->5165 5165->5161 5166 4714b9 RegSetValueExW 5165->5166 5166->5161 5167 4714d1 RegSetValueExW 5166->5167 5167->5161 5168 4714ef RegSetValueExW 5167->5168 5168->5161 5169 471507 5168->5169 5169->5161 5171 476c5d 5170->5171 5176 476bdd 5170->5176 5171->4888 5172 476c53 GetProcessHeap HeapFree 5172->5171 5173 476c49 GetProcessHeap HeapFree 5173->5172 5174 476c2e GetProcessHeap HeapFree 5174->5176 5175 476c1c GetProcessHeap HeapFree 5175->5174 5176->5172 5176->5173 5176->5174 5176->5175 5178 4764d4 CommandLineToArgvW 5177->5178 5180 4764c0 5177->5180 5179 476528 5178->5179 5182 4764e8 5178->5182 5179->4899 5180->5178 5181 476521 LocalFree 5181->5179 5182->5181 5184 476520 5182->5184 5199 476b95 5182->5199 5184->5181 5186 4769c7 5185->5186 5186->5186 5187 4769d2 GetProcessHeap HeapAlloc 5186->5187 5188 4769f9 memcpy 5187->5188 5189 476a9e 5187->5189 5191 476a27 5188->5191 5189->4899 5191->5191 5192 476a32 GetProcessHeap HeapAlloc 5191->5192 5193 476a4f memcpy 5192->5193 5194 476a94 GetProcessHeap HeapFree 5192->5194 5196 476e66 13 API calls 5193->5196 5194->5189 5197 476a84 5196->5197 5197->5189 5198 476a8b GetProcessHeap HeapFree 5197->5198 5198->5194 5200 476b9f 5199->5200 5201 476bcb 5199->5201 5200->5201 5202 476bbc 5200->5202 5201->5182 5203 476e66 13 API calls 5202->5203 5204 476bc9 5203->5204 5204->5201 5205->4909 5206->4917 5208 477153 GetCurrentProcess 5207->5208 5208->4925 5210 476ff6 5209->5210 5211 476fd2 WriteFile 5209->5211 5210->4938 5210->4939 5212 476fef CloseHandle 5211->5212 5213 476fe9 5211->5213 5212->5210 5213->5212 5215 47713d 5214->5215 5216 477039 InitializeSecurityDescriptor 5214->5216 5216->5215 5217 47704a SetSecurityDescriptorDacl 5216->5217 5217->5215 5218 47705f CreateNamedPipeW 5217->5218 5218->5218 5219 47707d ConnectNamedPipe 5218->5219 5220 47712f CloseHandle 5219->5220 5224 47708d 5219->5224 5220->5218 5221 477090 PeekNamedPipe 5221->5224 5222 4770ae Sleep 5222->5224 5223 4770bf GetProcessHeap HeapAlloc 5225 47711d FlushFileBuffers DisconnectNamedPipe 5223->5225 5226 4770d3 ReadFile 5223->5226 5224->5221 5224->5222 5224->5223 5224->5225 5225->5220 5227 477112 GetProcessHeap HeapFree 5226->5227 5228 4770ec 5226->5228 5227->5225 5228->5227 5229 4770f4 StrChrW 5228->5229 5230 4769ae 23 API calls 5228->5230 5229->5227 5229->5228 5230->5227 5240 476b0e 5231->5240 5233 47a396 GetProcessHeap HeapFree 5235 47a35c 5235->5233 5238 47a390 5235->5238 5243 479f27 5235->5243 5249 476b5f 5235->5249 5253 476ad0 5235->5253 5256 476b46 GetProcessHeap HeapFree 5238->5256 5257 476ced GetProcessHeap HeapAlloc 5240->5257 5244 479f34 5243->5244 5269 476735 5244->5269 5246 479f51 5248 479f6d 5246->5248 5281 479376 PathFindFileNameW 5246->5281 5248->5235 5250 476b71 5249->5250 5250->5250 5802 476e1b 5250->5802 5254 476d35 3 API calls 5253->5254 5255 476ae1 5254->5255 5255->5235 5256->5233 5258 476b24 5257->5258 5259 476d0b 5257->5259 5258->5235 5263 476d35 5259->5263 5262 476d20 GetProcessHeap HeapFree 5262->5258 5264 476d3e 5263->5264 5267 476d1c 5263->5267 5265 476d43 EnterCriticalSection 5264->5265 5266 476d7e LeaveCriticalSection 5264->5266 5264->5267 5268 476d92 Sleep 5264->5268 5265->5264 5266->5264 5266->5267 5267->5258 5267->5262 5268->5265 5289 476477 GetTickCount 5269->5289 5272 476743 wsprintfW 5273 47676a 5272->5273 5273->5273 5274 476775 EnterCriticalSection 5273->5274 5275 476792 5274->5275 5276 476797 5274->5276 5290 476628 5275->5290 5278 4767bb StrCatW StrCatW 5276->5278 5279 4767dd SetLastError 5276->5279 5280 4767e5 LeaveCriticalSection 5278->5280 5279->5280 5280->5246 5282 4793aa WideCharToMultiByte WideCharToMultiByte inet_addr 5281->5282 5283 47943a 5281->5283 5284 4793f3 5282->5284 5285 479403 WideCharToMultiByte 5282->5285 5283->5248 5335 479332 gethostbyname 5284->5335 5306 475337 GetProcessHeap HeapAlloc 5285->5306 5289->5272 5299 47686c 5290->5299 5292 476722 5292->5276 5293 476661 wsprintfW 5294 476651 5293->5294 5294->5292 5294->5293 5295 4766ec StrCatW 5294->5295 5296 47671a 5294->5296 5302 476893 5295->5302 5305 476b46 GetProcessHeap HeapFree 5296->5305 5300 476ced 7 API calls 5299->5300 5301 476880 5300->5301 5301->5294 5303 476d35 3 API calls 5302->5303 5304 4768a4 5303->5304 5304->5294 5305->5292 5307 4754fd 5306->5307 5308 475365 rand 5306->5308 5307->5283 5309 475391 5308->5309 5310 475398 rand socket 5308->5310 5309->5310 5311 4753c5 htons inet_addr connect 5310->5311 5312 4754ed GetProcessHeap HeapFree 5310->5312 5313 475406 5311->5313 5317 4754d7 closesocket 5311->5317 5312->5307 5338 471ca3 GetProcessHeap RtlAllocateHeap 5313->5338 5317->5312 5321 4754c6 5403 471dd1 GetProcessHeap HeapAlloc 5321->5403 5332 4754ac 5443 47516b 5332->5443 5336 479345 wsprintfA 5335->5336 5337 47936f 5335->5337 5336->5337 5337->5283 5337->5285 5339 471dc7 5338->5339 5340 471cd3 GetProcessHeap HeapAlloc 5338->5340 5339->5317 5349 472191 5339->5349 5341 471ce6 htons send 5340->5341 5342 471db5 GetProcessHeap HeapFree 5340->5342 5343 471d30 recv 5341->5343 5344 471da5 GetProcessHeap HeapFree 5341->5344 5342->5339 5343->5344 5345 471d47 5343->5345 5344->5342 5345->5344 5468 471c3a 5345->5468 5347 471d5b 5347->5344 5476 471747 5347->5476 5350 471eb9 11 API calls 5349->5350 5352 4721a8 5350->5352 5351 472054 11 API calls 5351->5352 5352->5351 5353 4721d0 5352->5353 5353->5321 5354 4746c7 GetProcessHeap HeapAlloc 5353->5354 5355 474aa4 5354->5355 5356 4746fa 5354->5356 5390 4721dc GetProcessHeap HeapAlloc 5355->5390 5543 472497 GetProcessHeap HeapAlloc 5356->5543 5358 4747b1 GetProcessHeap HeapFree 5358->5355 5359 47471c 5359->5358 5360 474741 5359->5360 5361 474745 5360->5361 5364 47475a 5360->5364 5561 472e12 GetProcessHeap HeapAlloc 5361->5561 5365 474754 5364->5365 5366 4721dc 19 API calls 5364->5366 5369 47478a Sleep 5364->5369 5370 4747ae 5364->5370 5571 4729a2 GetProcessHeap HeapAlloc 5364->5571 5365->5358 5596 47317c GetProcessHeap HeapAlloc 5365->5596 5366->5364 5372 472191 22 API calls 5369->5372 5370->5358 5371 4747e9 GetProcessHeap HeapAlloc 5371->5358 5373 474802 5371->5373 5372->5364 5374 47480c GetProcessHeap HeapAlloc 5373->5374 5380 47486a 5373->5380 5375 47481d 5374->5375 5374->5380 5604 473209 GetProcessHeap HeapAlloc 5375->5604 5376 4749a6 GetProcessHeap HeapAlloc 5376->5380 5377 474a91 GetProcessHeap HeapFree 5377->5358 5378 474888 Sleep GetProcessHeap HeapAlloc 5378->5377 5378->5380 5380->5376 5380->5377 5380->5378 5383 474872 GetProcessHeap HeapFree 5380->5383 5385 474a42 5380->5385 5609 4732af GetProcessHeap HeapAlloc 5380->5609 5617 4733a4 GetProcessHeap HeapAlloc 5380->5617 5383->5380 5622 473680 GetProcessHeap HeapAlloc 5385->5622 5388 474a86 5388->5377 5391 47220b GetProcessHeap HeapAlloc 5390->5391 5392 47233b 5390->5392 5393 47232c GetProcessHeap HeapFree 5391->5393 5394 472222 htons send 5391->5394 5392->5321 5412 471eb9 GetProcessHeap HeapAlloc 5392->5412 5393->5392 5395 472263 recv 5394->5395 5396 472320 GetProcessHeap HeapFree 5394->5396 5395->5396 5397 47227f 5395->5397 5396->5393 5397->5396 5398 47228c memset GetProcessHeap HeapAlloc 5397->5398 5398->5396 5399 4722b3 htons send 5398->5399 5400 4722e4 recv 5399->5400 5401 472311 GetProcessHeap HeapFree 5399->5401 5400->5401 5402 4722fc 5400->5402 5401->5396 5402->5401 5404 471dff GetProcessHeap HeapAlloc 5403->5404 5405 471eb0 5403->5405 5406 471e9d GetProcessHeap HeapFree 5404->5406 5407 471e13 htons send 5404->5407 5405->5317 5406->5405 5408 471e8d GetProcessHeap HeapFree 5407->5408 5409 471e54 recv 5407->5409 5408->5406 5409->5408 5410 471e6d 5409->5410 5410->5408 5411 471e73 memset 5410->5411 5411->5408 5413 47204b 5412->5413 5414 471ee8 GetProcessHeap HeapAlloc 5412->5414 5413->5321 5423 472054 GetProcessHeap HeapAlloc 5413->5423 5416 472038 GetProcessHeap HeapFree 5414->5416 5417 471f2e htons 5414->5417 5416->5413 5418 471f79 5417->5418 5418->5418 5419 471fd7 send 5418->5419 5420 471ffb recv 5419->5420 5421 472028 GetProcessHeap HeapFree 5419->5421 5420->5421 5422 472012 5420->5422 5421->5416 5422->5421 5424 472083 GetProcessHeap HeapAlloc 5423->5424 5425 472188 5423->5425 5427 4720ab htons 5424->5427 5428 472175 GetProcessHeap HeapFree 5424->5428 5425->5321 5434 474ab5 5425->5434 5429 4720d6 5427->5429 5428->5425 5429->5429 5430 472127 send 5429->5430 5431 47213b recv 5430->5431 5432 472165 GetProcessHeap HeapFree 5430->5432 5431->5432 5433 472152 5431->5433 5432->5428 5433->5432 5435 472054 11 API calls 5434->5435 5436 474ad3 5435->5436 5437 474b10 5436->5437 5438 472f5a 12 API calls 5436->5438 5441 474b45 5436->5441 5439 472f5a 12 API calls 5437->5439 5438->5436 5440 474b34 5439->5440 5440->5441 5442 4721dc 19 API calls 5440->5442 5441->5321 5441->5332 5442->5441 5444 471eb9 11 API calls 5443->5444 5445 47518b 5444->5445 5446 47532d 5445->5446 5447 472054 11 API calls 5445->5447 5446->5321 5448 4751ab 5447->5448 5448->5446 5751 474e60 GetProcessHeap HeapAlloc 5448->5751 5451 4751c7 GetProcessHeap HeapAlloc 5451->5446 5452 4751e9 5451->5452 5760 474f43 GetProcessHeap HeapAlloc 5452->5760 5455 47531f GetProcessHeap HeapFree 5455->5446 5456 475201 GetProcessHeap HeapAlloc 5456->5455 5457 475215 6 API calls 5456->5457 5458 475311 GetProcessHeap HeapFree 5457->5458 5460 475261 sprintf 5457->5460 5458->5455 5770 474b5d 5460->5770 5463 475305 GetProcessHeap HeapFree 5463->5458 5469 47686c 7 API calls 5468->5469 5473 471c5b 5469->5473 5470 471c99 5470->5347 5471 471747 54 API calls 5471->5473 5472 471c93 5521 476b46 GetProcessHeap HeapFree 5472->5521 5473->5470 5473->5471 5473->5472 5474 476893 3 API calls 5473->5474 5474->5473 5477 47175a 5476->5477 5477->5477 5478 471765 GetProcessHeap HeapAlloc 5477->5478 5479 471c30 5478->5479 5480 47179b CharUpperW 5478->5480 5479->5347 5482 4717be 5480->5482 5482->5482 5483 4717c9 GetProcessHeap HeapAlloc 5482->5483 5484 471c22 GetProcessHeap HeapFree 5483->5484 5485 4717ec htons 5483->5485 5484->5479 5486 47184e 5485->5486 5486->5486 5487 471859 send 5486->5487 5488 471c16 GetProcessHeap HeapFree 5487->5488 5489 471871 recv 5487->5489 5488->5484 5489->5488 5490 471890 5489->5490 5490->5488 5491 4718d4 5490->5491 5492 4718d9 GetProcessHeap HeapAlloc 5490->5492 5491->5488 5492->5488 5493 47190a 5492->5493 5522 4715a7 GetProcessHeap HeapAlloc 5493->5522 5496 471c08 GetProcessHeap HeapFree 5496->5488 5497 4715a7 16 API calls 5498 471946 5497->5498 5498->5496 5499 47194e GetProcessHeap HeapAlloc 5498->5499 5500 471968 5499->5500 5501 471bfa GetProcessHeap HeapFree 5499->5501 5502 471983 rand 5500->5502 5501->5496 5502->5502 5503 471996 5502->5503 5504 4715a7 16 API calls 5503->5504 5505 4719ac 5504->5505 5506 4719b4 GetProcessHeap HeapAlloc 5505->5506 5507 471bec GetProcessHeap HeapFree 5505->5507 5508 471bde GetProcessHeap HeapFree 5506->5508 5510 4719c8 GetProcessHeap HeapAlloc 5506->5510 5507->5501 5508->5507 5511 471bc3 GetProcessHeap HeapFree 5510->5511 5512 471a26 htons 5510->5512 5511->5508 5513 471a76 memcpy 5512->5513 5515 471b57 send 5513->5515 5517 471b84 recv 5515->5517 5518 471bb3 GetProcessHeap HeapFree 5515->5518 5517->5518 5519 471b9d memset 5517->5519 5518->5511 5519->5518 5521->5470 5523 47173d 5522->5523 5524 4715f1 CryptAcquireContextW 5522->5524 5523->5496 5523->5497 5524->5523 5525 471611 5524->5525 5526 4716be CryptCreateHash 5525->5526 5527 471621 5525->5527 5528 47170b 5526->5528 5529 4716d4 5526->5529 5527->5528 5530 471628 GetProcessHeap HeapAlloc 5527->5530 5531 471717 CryptDestroyHash 5528->5531 5532 471720 5528->5532 5529->5528 5538 4716de CryptHashData 5529->5538 5530->5528 5533 471642 CryptImportKey 5530->5533 5531->5532 5536 471725 CryptDestroyKey 5532->5536 5537 47172e 5532->5537 5534 4716aa GetProcessHeap HeapFree 5533->5534 5535 471678 CryptCreateHash 5533->5535 5534->5529 5535->5534 5539 471692 CryptSetHashParam 5535->5539 5536->5537 5537->5523 5541 471733 CryptReleaseContext 5537->5541 5538->5528 5540 4716f2 CryptGetHashParam 5538->5540 5539->5534 5542 4716a6 5539->5542 5540->5528 5541->5523 5542->5534 5544 4726ff 5543->5544 5545 4724c5 GetProcessHeap HeapAlloc 5543->5545 5544->5359 5546 4724dc rand htons 5545->5546 5547 4726ec GetProcessHeap HeapFree 5545->5547 5548 47255f rand 5546->5548 5549 47256f GetProcessHeap HeapAlloc 5546->5549 5547->5544 5548->5548 5548->5549 5550 4726dc GetProcessHeap HeapFree 5549->5550 5551 472590 htons 5549->5551 5550->5547 5552 4725cd rand 5551->5552 5552->5552 5553 4725dd GetProcessHeap HeapAlloc 5552->5553 5554 4725fe memcpy memcpy send 5553->5554 5555 4726cc GetProcessHeap HeapFree 5553->5555 5556 4726ba GetProcessHeap HeapFree 5554->5556 5557 47263a send 5554->5557 5555->5550 5556->5555 5557->5556 5559 472653 5557->5559 5558 472694 recv 5558->5559 5560 47269d 5558->5560 5559->5556 5559->5558 5559->5560 5560->5556 5562 472f51 5561->5562 5563 472e48 GetProcessHeap HeapAlloc 5561->5563 5562->5365 5564 472f3e GetProcessHeap HeapFree 5563->5564 5565 472e5c htons 5563->5565 5564->5562 5566 472ed3 5565->5566 5567 472ee7 send 5566->5567 5569 472f2e GetProcessHeap HeapFree 5566->5569 5570 472f2a 5566->5570 5567->5566 5568 472efd recv 5567->5568 5568->5566 5569->5564 5570->5569 5572 4729d5 GetProcessHeap HeapAlloc 5571->5572 5573 472e08 5571->5573 5574 472df6 GetProcessHeap HeapFree 5572->5574 5575 4729eb rand htons 5572->5575 5573->5364 5574->5573 5576 472a7e rand 5575->5576 5576->5576 5579 472a8d 5576->5579 5577 472a91 rand send 5578 472ac5 recv 5577->5578 5577->5579 5578->5579 5580 472ae5 rand htons GetProcessHeap HeapAlloc 5578->5580 5579->5577 5579->5580 5581 472b82 htons 5580->5581 5582 472de6 GetProcessHeap HeapFree 5580->5582 5583 472bbe rand 5581->5583 5582->5574 5583->5583 5584 472bce GetProcessHeap HeapAlloc 5583->5584 5585 472dd6 GetProcessHeap HeapFree 5584->5585 5586 472bec htons GetProcessHeap HeapAlloc 5584->5586 5585->5582 5587 472c72 memcpy memcpy htons 5586->5587 5588 472dc3 GetProcessHeap HeapFree 5586->5588 5589 472d0c memcpy 5587->5589 5588->5585 5589->5589 5590 472d25 send 5589->5590 5591 472dae GetProcessHeap HeapFree 5590->5591 5592 472d3d send 5590->5592 5591->5588 5592->5591 5595 472d55 5592->5595 5593 472d83 recv 5594 472d8c 5593->5594 5593->5595 5594->5591 5595->5591 5595->5593 5595->5594 5597 4731a2 rand 5596->5597 5598 473201 5596->5598 5599 4731bd rand 5597->5599 5598->5358 5598->5371 5599->5599 5600 4731ca 5599->5600 5701 472f5a GetProcessHeap HeapAlloc 5600->5701 5605 4732a7 5604->5605 5606 473233 htons memcpy send 5604->5606 5605->5380 5607 473297 GetProcessHeap HeapFree 5606->5607 5608 473293 5606->5608 5607->5605 5608->5607 5610 4732e1 GetProcessHeap HeapAlloc 5609->5610 5611 47339b GetProcessHeap HeapFree 5609->5611 5612 4732fe htons memcpy send 5610->5612 5613 473388 GetProcessHeap HeapFree 5610->5613 5611->5380 5611->5385 5614 47335a recv 5612->5614 5615 473378 GetProcessHeap HeapFree 5612->5615 5613->5611 5614->5615 5616 473372 5614->5616 5615->5613 5616->5615 5618 473441 5617->5618 5619 4733ce htons memcpy send 5617->5619 5618->5380 5620 473431 GetProcessHeap HeapFree 5619->5620 5621 47342d 5619->5621 5620->5618 5621->5620 5623 473d03 5622->5623 5624 4736ad GetProcessHeap HeapAlloc 5622->5624 5623->5388 5673 4741e9 GetProcessHeap HeapAlloc 5623->5673 5625 4736c0 GetProcessHeap HeapAlloc 5624->5625 5626 473cf7 GetProcessHeap HeapFree 5624->5626 5627 4736dc 5625->5627 5628 473ce1 GetProcessHeap HeapFree 5625->5628 5626->5623 5629 4736e8 5627->5629 5630 473b39 5627->5630 5628->5626 5631 4733a4 7 API calls 5629->5631 5633 473209 7 API calls 5630->5633 5632 473745 5631->5632 5634 473cd1 GetProcessHeap HeapFree 5632->5634 5635 473787 5632->5635 5638 4733a4 7 API calls 5632->5638 5636 473baa 5633->5636 5634->5628 5635->5634 5637 47379d Sleep 5635->5637 5636->5634 5639 473bb2 Sleep 5636->5639 5641 473209 7 API calls 5637->5641 5638->5635 5640 473bca 5639->5640 5643 473209 7 API calls 5640->5643 5642 473806 5641->5642 5642->5634 5644 473876 5642->5644 5646 473209 7 API calls 5642->5646 5645 473c5b 5643->5645 5644->5634 5648 473888 Sleep 5644->5648 5645->5634 5647 473c5f Sleep rand 5645->5647 5651 473841 5646->5651 5649 473209 7 API calls 5647->5649 5650 4733a4 7 API calls 5648->5650 5653 473cbe 5649->5653 5652 4738d2 5650->5652 5651->5644 5655 4733a4 7 API calls 5651->5655 5652->5634 5656 4733a4 7 API calls 5652->5656 5653->5634 5654 473cc2 Sleep 5653->5654 5654->5634 5655->5644 5657 47392c 5656->5657 5657->5634 5658 473934 GetProcessHeap HeapAlloc 5657->5658 5658->5634 5659 473953 memset 5658->5659 5660 473209 7 API calls 5659->5660 5661 473978 5660->5661 5662 473980 recv 5661->5662 5663 473b22 GetProcessHeap HeapFree 5661->5663 5662->5663 5664 47399b 5662->5664 5663->5634 5664->5663 5665 4739a8 htons 5664->5665 5665->5663 5666 4739c1 5665->5666 5666->5663 5667 473209 7 API calls 5666->5667 5668 473a88 5667->5668 5668->5663 5669 473a90 Sleep rand 5668->5669 5670 4733a4 7 API calls 5669->5670 5671 473b0f 5670->5671 5671->5663 5672 473b13 Sleep 5671->5672 5672->5663 5674 474217 5673->5674 5675 474679 5673->5675 5709 4740e3 GetProcessHeap HeapAlloc 5674->5709 5675->5388 5678 474669 GetProcessHeap HeapFree 5678->5675 5681 474271 GetProcessHeap HeapFree 5682 4742a0 5681->5682 5684 474683 5681->5684 5683 4742e8 5682->5683 5686 473d0d 45 API calls 5682->5686 5683->5678 5687 473d0d 45 API calls 5683->5687 5685 4740e3 17 API calls 5684->5685 5700 47465e 5685->5700 5688 4742c7 5686->5688 5689 47431d 5687->5689 5688->5683 5690 4742cb GetProcessHeap HeapFree 5688->5690 5689->5678 5691 474325 GetProcessHeap HeapFree 5689->5691 5690->5683 5692 474351 5691->5692 5693 473d0d 45 API calls 5692->5693 5694 47436e 5693->5694 5694->5678 5695 474376 GetProcessHeap HeapFree memset 5694->5695 5695->5678 5696 4743c1 5695->5696 5697 4740e3 17 API calls 5696->5697 5698 474641 5697->5698 5699 4740e3 17 API calls 5698->5699 5698->5700 5699->5700 5700->5678 5702 473068 GetProcessHeap HeapFree 5701->5702 5703 472f89 GetProcessHeap HeapAlloc 5701->5703 5702->5598 5704 473055 GetProcessHeap HeapFree 5703->5704 5705 472fa6 htons memcpy send 5703->5705 5704->5702 5706 473045 GetProcessHeap HeapFree 5705->5706 5707 473025 recv 5705->5707 5706->5704 5707->5706 5708 47303c 5707->5708 5708->5706 5710 4741e0 5709->5710 5711 47410b GetProcessHeap HeapAlloc 5709->5711 5710->5678 5722 473d0d GetProcessHeap HeapAlloc 5710->5722 5713 474158 5711->5713 5714 4741d4 GetProcessHeap HeapFree 5711->5714 5715 473209 7 API calls 5713->5715 5714->5710 5716 47417b 5715->5716 5717 47417f Sleep 5716->5717 5718 4741c6 GetProcessHeap HeapFree 5716->5718 5719 473209 7 API calls 5717->5719 5718->5714 5720 4741b3 5719->5720 5720->5718 5721 4741b7 Sleep 5720->5721 5721->5718 5723 473d41 GetProcessHeap HeapAlloc 5722->5723 5724 4740da 5722->5724 5725 473d55 GetProcessHeap HeapAlloc 5723->5725 5726 4740cb GetProcessHeap HeapFree 5723->5726 5724->5678 5724->5681 5727 473d72 5725->5727 5728 4740bf GetProcessHeap HeapFree 5725->5728 5726->5724 5729 473209 7 API calls 5727->5729 5728->5726 5730 473e4e 5729->5730 5731 4740b3 GetProcessHeap HeapFree 5730->5731 5732 473e56 Sleep GetProcessHeap HeapAlloc 5730->5732 5731->5728 5732->5731 5733 473e79 rand 5732->5733 5734 4732af 12 API calls 5733->5734 5735 473ef0 5734->5735 5736 473ef8 memset 5735->5736 5737 47409b GetProcessHeap HeapFree 5735->5737 5738 473209 7 API calls 5736->5738 5737->5731 5739 473f22 5738->5739 5739->5737 5740 473f2a recv 5739->5740 5740->5737 5741 473f46 5740->5741 5741->5737 5742 473f50 htons 5741->5742 5742->5737 5743 473f73 5742->5743 5744 473209 7 API calls 5743->5744 5745 473feb 5744->5745 5745->5737 5746 473ff3 Sleep 5745->5746 5747 473209 7 API calls 5746->5747 5748 47405a 5747->5748 5748->5737 5749 47405e Sleep GetProcessHeap HeapAlloc 5748->5749 5749->5737 5750 474084 memcpy 5749->5750 5750->5737 5752 474f38 5751->5752 5753 474e89 5751->5753 5752->5446 5752->5451 5754 472f5a 12 API calls 5753->5754 5755 474ee8 5754->5755 5756 474f2f GetProcessHeap HeapFree 5755->5756 5792 473071 GetProcessHeap HeapAlloc 5755->5792 5756->5752 5759 474f27 GetProcessHeap HeapFree 5759->5756 5761 475014 5760->5761 5762 474f6f 5760->5762 5761->5455 5761->5456 5762->5762 5763 474f86 rand 5762->5763 5764 472f5a 12 API calls 5763->5764 5765 474fad 5764->5765 5766 475004 GetProcessHeap HeapFree 5765->5766 5767 473071 14 API calls 5765->5767 5766->5761 5768 474fcb 5767->5768 5768->5766 5769 474ff4 GetProcessHeap HeapFree 5768->5769 5769->5766 5771 474b77 GetProcessHeap HeapAlloc 5770->5771 5773 474c2e 5771->5773 5775 474cff 5771->5775 5773->5773 5774 474ce1 rand 5773->5774 5774->5775 5775->5463 5776 47501e 5775->5776 5777 472f5a 12 API calls 5776->5777 5778 475040 5777->5778 5779 47509b 5778->5779 5780 473071 14 API calls 5778->5780 5779->5463 5783 4750a2 GetProcessHeap HeapAlloc 5779->5783 5781 475060 5780->5781 5781->5779 5782 47508b GetProcessHeap HeapFree 5781->5782 5782->5779 5784 475162 5783->5784 5785 4750ca 5783->5785 5784->5463 5786 472f5a 12 API calls 5785->5786 5788 475117 5786->5788 5787 475155 GetProcessHeap HeapFree 5787->5784 5788->5787 5789 473071 14 API calls 5788->5789 5790 47513f 5789->5790 5790->5787 5791 475143 GetProcessHeap HeapFree 5790->5791 5791->5787 5793 473173 5792->5793 5794 47309f GetProcessHeap HeapAlloc 5792->5794 5793->5756 5793->5759 5795 4730b3 htons send 5794->5795 5796 473160 GetProcessHeap HeapFree 5794->5796 5797 473101 recv 5795->5797 5798 473150 GetProcessHeap HeapFree 5795->5798 5796->5793 5797->5798 5799 47311c 5797->5799 5798->5796 5799->5798 5800 473124 GetProcessHeap HeapAlloc 5799->5800 5800->5798 5801 47313f memcpy 5800->5801 5801->5798 5803 476e29 EnterCriticalSection 5802->5803 5804 476b90 5802->5804 5805 476e39 5803->5805 5804->5235 5809 476da4 5805->5809 5810 476e13 LeaveCriticalSection 5809->5810 5811 476db3 EnterCriticalSection 5809->5811 5810->5804 5812 476e0b LeaveCriticalSection 5811->5812 5813 476dc6 5811->5813 5812->5810 5813->5812 5815 47634f LocalFree 5814->5815 5816 4762b9 5814->5816 5835 475507 CryptAcquireContextW 5816->5835 5820 476345 CloseHandle 5820->5815 5823 47633c CryptReleaseContext 5823->5820 5826 476333 CryptDestroyKey 5826->5823 5829 47632a CryptDestroyKey 5829->5826 5830 4762ed CreateThread 5859 475e9f 5830->5859 5936 4760f9 5830->5936 5833 47630f WaitForSingleObject CloseHandle 5834 47631f CryptDestroyHash 5833->5834 5834->5829 5836 475542 5835->5836 5837 475528 GetLastError 5835->5837 5836->5820 5839 475613 CryptStringToBinaryW 5836->5839 5837->5836 5838 475535 CryptAcquireContextW 5837->5838 5838->5836 5840 475640 LocalAlloc 5839->5840 5841 4756ce 5839->5841 5840->5841 5842 475655 CryptStringToBinaryW 5840->5842 5841->5823 5849 476085 CryptCreateHash 5841->5849 5843 4756c5 LocalFree 5842->5843 5844 475668 CryptDecodeObjectEx 5842->5844 5843->5841 5844->5843 5845 475688 LocalAlloc 5844->5845 5845->5843 5846 475695 CryptDecodeObjectEx 5845->5846 5847 4756ac CryptImportPublicKeyInfo 5846->5847 5848 4756be LocalFree 5846->5848 5847->5848 5848->5843 5850 4760f1 5849->5850 5851 4760b0 CryptHashData 5849->5851 5850->5826 5855 476246 CryptCreateHash 5850->5855 5851->5850 5852 4760c4 CryptDeriveKey CryptDestroyHash 5851->5852 5852->5850 5853 4760ea 5852->5853 5873 47559b CryptSetKeyParam CryptSetKeyParam CryptGetKeyParam 5853->5873 5856 476292 5855->5856 5857 47626a CryptHashData 5855->5857 5856->5829 5856->5830 5857->5856 5858 47627d CryptGetHashParam 5857->5858 5858->5856 5860 475eb8 PathCombineW 5859->5860 5861 47607d 5859->5861 5860->5861 5862 475ed6 FindFirstFileW 5860->5862 5861->5833 5861->5834 5862->5861 5863 475ef6 WaitForMultipleObjects 5862->5863 5864 476073 FindClose 5863->5864 5870 475f17 5863->5870 5864->5861 5865 47605c FindNextFileW 5865->5863 5865->5864 5866 475fa1 PathCombineW 5866->5865 5866->5870 5867 476016 PathFindExtensionW 5867->5870 5868 475e9f 36 API calls 5868->5870 5869 475fdf StrStrIW 5869->5865 5869->5870 5870->5864 5870->5865 5870->5866 5870->5867 5870->5868 5870->5869 5878 475d0a CryptDuplicateKey 5870->5878 5901 4759b1 5870->5901 5874 47560c 5873->5874 5875 4755e4 5873->5875 5874->5850 5875->5874 5876 4755e9 LocalAlloc 5875->5876 5876->5874 5877 4755fb CryptSetKeyParam LocalFree 5876->5877 5877->5874 5879 475e98 5878->5879 5880 475d38 CreateFileW 5878->5880 5879->5865 5881 475d58 GetFileSizeEx 5880->5881 5882 475e7c CryptDestroyKey 5880->5882 5883 475d78 __alldiv 5881->5883 5884 475da2 CreateFileMappingW 5881->5884 5882->5879 5885 475e8a 5882->5885 5883->5884 5887 475dcd 5884->5887 5888 475e6e CloseHandle 5884->5888 5885->5879 5886 475e8f SetEvent 5885->5886 5886->5879 5905 475a73 GetSystemInfo 5887->5905 5888->5882 5891 475e4c 5893 475e51 CloseHandle 5891->5893 5892 475df3 MapViewOfFile 5892->5891 5894 475e0a CryptEncrypt 5892->5894 5893->5888 5895 475e5e 5893->5895 5896 475e32 UnmapViewOfFile 5894->5896 5897 475e26 FlushViewOfFile 5894->5897 5931 475a11 GetFileSizeEx 5895->5931 5896->5893 5899 475e3f 5896->5899 5897->5896 5919 475bc4 GetSystemInfo 5899->5919 5902 4759c5 5901->5902 5902->5902 5903 4759eb StrStrIW 5902->5903 5904 475a09 5903->5904 5904->5870 5906 475ac8 __alldiv 5905->5906 5907 475adb MapViewOfFile 5906->5907 5908 475bba 5907->5908 5909 475afb 5907->5909 5908->5891 5908->5892 5910 475baa 5909->5910 5911 475b26 CryptDuplicateHash 5909->5911 5912 475bb1 UnmapViewOfFile 5910->5912 5911->5912 5913 475b3c CryptHashData 5911->5913 5912->5908 5914 475b53 LocalAlloc 5913->5914 5915 475b9f CryptDestroyHash 5913->5915 5914->5915 5916 475b6b CryptGetHashParam 5914->5916 5915->5912 5917 475b84 5916->5917 5918 475b98 LocalFree 5916->5918 5917->5918 5918->5915 5920 475c19 __alldiv 5919->5920 5921 475c2c MapViewOfFile 5920->5921 5922 475d00 5921->5922 5923 475c4e CryptDuplicateHash 5921->5923 5922->5891 5924 475c6b CryptHashData 5923->5924 5925 475cf7 UnmapViewOfFile 5923->5925 5926 475cee CryptDestroyHash 5924->5926 5927 475c7f LocalAlloc 5924->5927 5925->5922 5926->5925 5927->5926 5928 475c98 CryptGetHashParam 5927->5928 5929 475cae memcpy FlushViewOfFile 5928->5929 5930 475ce5 LocalFree 5928->5930 5929->5930 5930->5926 5932 475a6b 5931->5932 5934 475a33 5931->5934 5932->5888 5933 475a45 SetFilePointerEx 5933->5932 5935 475a60 SetEndOfFile 5933->5935 5934->5932 5934->5933 5935->5932 5937 47a760 5936->5937 5938 476106 wsprintfW PathCombineW 5937->5938 5939 47623d 5938->5939 5940 476144 5938->5940 5955 476477 GetTickCount 5940->5955 5942 47615a WaitForMultipleObjects 5942->5939 5944 47617e CreateFileW 5942->5944 5943 47614a 5943->5939 5943->5942 5945 4761a2 5944->5945 5946 47623c 5944->5946 5956 4757e5 5945->5956 5946->5939 5949 4761bb memset StrCatW StrCatW 5951 4761fc 5949->5951 5950 476235 CloseHandle 5950->5946 5951->5951 5952 476207 WriteFile 5951->5952 5953 47622c LocalFree 5952->5953 5954 476225 FlushFileBuffers 5952->5954 5953->5950 5954->5953 5955->5943 5957 4757fd LocalAlloc 5956->5957 5959 4759a8 5956->5959 5958 475818 GetSystemDefaultLCID GetTimeZoneInformation 5957->5958 5957->5959 5960 475838 5958->5960 5961 475841 memcpy NetWkstaGetInfo 5958->5961 5959->5949 5959->5950 5960->5961 5962 4758fe 5961->5962 5963 47586f 5961->5963 5977 4756d8 5962->5977 5967 4758bc memcpy 5963->5967 5970 4758cf 5963->5970 5966 475918 LocalAlloc 5968 475930 memcpy 5966->5968 5969 475992 5966->5969 5967->5970 5973 47595a 5968->5973 5969->5969 5972 4759a1 LocalFree 5969->5972 5971 4758f2 NetApiBufferFree 5970->5971 5974 4758de memcpy 5970->5974 5971->5962 5972->5959 5985 475780 CryptBinaryToStringW 5973->5985 5974->5971 5978 4756ef 5977->5978 5979 475776 5977->5979 5978->5979 5980 4756f7 CryptEncrypt 5978->5980 5979->5966 5979->5969 5980->5979 5981 47571a LocalAlloc 5980->5981 5981->5979 5982 475731 memcpy CryptEncrypt 5981->5982 5982->5979 5983 475759 5982->5983 5983->5983 5984 47576d LocalFree 5983->5984 5984->5979 5986 4757a4 LocalAlloc 5985->5986 5988 4757ce LocalFree 5985->5988 5987 4757b9 CryptBinaryToStringW 5986->5987 5986->5988 5987->5988 5989 4757d5 LocalFree 5987->5989 5988->5969 5989->5988 5991 4780fa 5990->5991 5991->5991 5992 478106 wsprintfW 5991->5992 5993 477fb7 6 API calls 5992->5993 5994 478142 5993->5994 5994->4968 5994->4969 5996 478183 CreateToolhelp32Snapshot 5995->5996 5996->4978 5996->4979 5998 47a046 DuplicateTokenEx 5997->5998 5999 47a05f 5997->5999 5998->5999 6000 476c5f 13 API calls 5999->6000 6001 47a07a 6000->6001 6020 4775d8 WNetOpenEnumW 6001->6020 6006 476cc8 3 API calls 6007 47a08e 6006->6007 6008 476b0e 7 API calls 6007->6008 6009 47a09a 6008->6009 6010 47a0e5 6009->6010 6016 476ad0 3 API calls 6009->6016 6017 476b5f EnterCriticalSection LeaveCriticalSection EnterCriticalSection LeaveCriticalSection 6009->6017 6018 47a0df 6009->6018 6038 479534 6009->6038 6011 47a0fb 6010->6011 6012 47a0f1 CloseHandle 6010->6012 6014 47a101 CloseHandle 6011->6014 6015 47a107 6011->6015 6012->6011 6014->6015 6016->6009 6017->6009 6075 476b46 GetProcessHeap HeapFree 6018->6075 6021 4776e9 6020->6021 6022 47760b GlobalAlloc 6020->6022 6030 4776f2 CredEnumerateW 6021->6030 6023 4776e8 6022->6023 6027 477624 6022->6027 6023->6021 6024 477627 memset WNetEnumResourceW 6025 4776ce GlobalFree WNetCloseEnum 6024->6025 6024->6027 6025->6023 6027->6024 6028 4775d8 13 API calls 6027->6028 6029 476b95 13 API calls 6027->6029 6028->6027 6029->6027 6031 4777c9 6030->6031 6032 47771c 6030->6032 6031->6006 6033 4777c0 CredFree 6032->6033 6034 476b95 13 API calls 6032->6034 6035 4777be 6032->6035 6037 47777e 6032->6037 6033->6031 6034->6032 6035->6033 6036 4769ae 23 API calls 6036->6037 6037->6032 6037->6036 6039 479544 6038->6039 6040 479560 wsprintfW 6039->6040 6044 47985f SetLastError 6039->6044 6076 4788d3 6040->6076 6042 4795b2 wsprintfW wsprintfW PathFindExtensionW 6045 47960b wsprintfW 6042->6045 6046 479606 6042->6046 6044->6009 6047 47962a WNetAddConnection2W PathFileExistsW 6045->6047 6046->6045 6048 479653 GetLastError 6047->6048 6049 4796c8 6047->6049 6050 4787e7 3 API calls 6048->6050 6049->6044 6051 47984b WNetCancelConnection2W 6049->6051 6058 47966e 6050->6058 6051->6044 6052 4796d5 6054 4796f4 6052->6054 6055 4796df 6052->6055 6053 479674 GetLastError 6053->6049 6053->6058 6092 47944f 6054->6092 6079 4768b5 6055->6079 6058->6044 6058->6049 6058->6052 6058->6053 6063 4796ad WNetCancelConnection2W 6058->6063 6060 479726 memset GetSystemTimeAsFileTime wsprintfW CreateServiceW 6064 479791 StartServiceW 6060->6064 6065 479809 GetLastError 6060->6065 6061 47982a GetLastError 6066 479830 6061->6066 6063->6047 6069 4797a6 GetLastError 6064->6069 6072 4797b3 6064->6072 6067 479816 6065->6067 6068 47981e CloseServiceHandle 6065->6068 6066->6049 6070 479836 DeleteFileW 6066->6070 6067->6068 6068->6066 6069->6072 6070->6049 6071 4797cc QueryServiceStatus 6071->6072 6073 4797f3 DeleteService CloseServiceHandle 6071->6073 6072->6071 6072->6073 6074 4797e6 Sleep 6072->6074 6073->6068 6074->6071 6074->6073 6075->6010 6077 4788de PathFindFileNameW 6076->6077 6078 4788ed 6076->6078 6077->6078 6078->6042 6078->6078 6080 4768cd 6079->6080 6080->6080 6081 4768d8 GetProcessHeap HeapAlloc 6080->6081 6082 4769a5 6081->6082 6083 476901 6081->6083 6082->6054 6083->6083 6084 476912 memcpy 6083->6084 6085 47692f 6084->6085 6085->6085 6086 47693a GetProcessHeap HeapAlloc 6085->6086 6087 476958 memcpy 6086->6087 6088 47699a GetProcessHeap HeapFree 6086->6088 6090 476e1b 4 API calls 6087->6090 6088->6082 6091 47698e GetProcessHeap HeapFree 6090->6091 6091->6088 6093 47945c 6092->6093 6094 4788d3 PathFindFileNameW 6093->6094 6096 479489 6094->6096 6095 4794f2 OpenSCManagerW 6095->6060 6095->6061 6096->6095 6097 476cc8 3 API calls 6096->6097 6098 4794e1 6097->6098 6099 476735 18 API calls 6098->6099 6099->6095 6103 47892a GetCurrentThread OpenThreadToken 6100->6103 6104 478a17 GetLastError 6103->6104 6105 478959 GetTokenInformation 6103->6105 6106 47795f 6104->6106 6107 478977 GetLastError 6105->6107 6108 478a0c CloseHandle 6105->6108 6109 478989 GlobalAlloc 6107->6109 6114 478a0a 6107->6114 6108->6106 6110 47899b GetTokenInformation 6109->6110 6111 478a08 GetLastError 6109->6111 6112 4789fd GetLastError 6110->6112 6113 4789ae 6110->6113 6111->6114 6115 4789ff GlobalFree 6112->6115 6113->6115 6116 4789bd GetSidSubAuthorityCount 6113->6116 6117 4789ce GetSidSubAuthority 6113->6117 6118 4789fb 6113->6118 6114->6108 6115->6114 6116->6113 6117->6113 6118->6115 6120 476b95 13 API calls 6119->6120 6121 4777f1 6120->6121 6122 476b95 13 API calls 6121->6122 6123 4777fc 6122->6123 6124 476b95 13 API calls 6123->6124 6125 477807 GetComputerNameExW 6124->6125 6126 477825 6125->6126 6127 477831 CreateThread 6125->6127 6129 476b95 13 API calls 6126->6129 6128 477847 CloseHandle 6127->6128 6131 47784e 6127->6131 6194 478b2e 6127->6194 6128->6131 6129->6127 6133 47786f Sleep 6131->6133 6167 47733c LoadLibraryW 6131->6167 6177 47742c GetIpNetTable 6131->6177 6187 47751b NetServerEnum 6131->6187 6133->6131 6136 47a1c9 6135->6136 6137 47a1d0 GetProcessHeap HeapAlloc 6135->6137 6140 47a016 113 API calls 6136->6140 6138 47a200 GetProcessHeap HeapAlloc 6137->6138 6139 47a32a 6137->6139 6138->6139 6141 47a219 6138->6141 6140->6137 6142 476b0e 7 API calls 6141->6142 6147 47a222 6142->6147 6143 47a24e CreateThread 6144 47a322 6143->6144 6143->6147 6262 47a112 6143->6262 6261 476b46 GetProcessHeap HeapFree 6144->6261 6146 47a286 GetModuleHandleA GetProcAddress 6146->6147 6147->6139 6147->6143 6147->6144 6147->6146 6148 47a2ea GetProcessHeap HeapAlloc 6147->6148 6149 47a2d8 CloseHandle 6147->6149 6151 476ad0 3 API calls 6147->6151 6148->6144 6150 47a2f9 GetProcessHeap HeapAlloc 6148->6150 6149->6148 6150->6144 6150->6147 6151->6147 6153 478a95 6152->6153 6154 478a8b Sleep GetSystemMetrics 6153->6154 6155 478a99 SetEvent 6153->6155 6154->6153 6156 478aad 6155->6156 6157 478aa6 Sleep 6155->6157 6158 478a23 14 API calls 6156->6158 6157->6156 6159 478ab2 6158->6159 6160 478b1e LocalFree 6159->6160 6161 478ad3 htonl 6159->6161 6163 478ae0 htonl inet_ntoa 6159->6163 6165 476b95 13 API calls 6159->6165 6162 47a567 8 API calls 6161->6162 6162->6159 6164 47641a 4 API calls 6163->6164 6164->6159 6166 478b00 GetProcessHeap HeapFree 6165->6166 6166->6159 6168 477425 6167->6168 6169 47735b GetProcAddress 6167->6169 6168->6131 6170 477414 GetLastError 6169->6170 6171 477373 GetProcessHeap RtlAllocateHeap 6169->6171 6172 47741a FreeLibrary 6170->6172 6171->6172 6174 477398 6171->6174 6172->6168 6173 477402 GetProcessHeap HeapFree 6173->6172 6174->6173 6175 4773c0 wsprintfW 6174->6175 6176 476b95 13 API calls 6175->6176 6176->6174 6178 477458 6177->6178 6180 477451 6177->6180 6179 477461 GetProcessHeap HeapAlloc 6178->6179 6178->6180 6179->6180 6181 477480 GetIpNetTable 6179->6181 6180->6131 6182 477502 GetProcessHeap HeapFree 6181->6182 6183 47748c 6181->6183 6182->6180 6183->6182 6184 4774bc wsprintfW 6183->6184 6186 4774fe 6183->6186 6185 476b95 13 API calls 6184->6185 6185->6183 6186->6182 6192 477556 6187->6192 6188 47755d 6189 4775cf 6188->6189 6190 4775c6 NetApiBufferFree 6188->6190 6189->6131 6190->6189 6191 47751b 13 API calls 6191->6192 6192->6188 6192->6189 6192->6191 6193 476b95 13 API calls 6192->6193 6193->6192 6195 47a760 6194->6195 6196 478b3e memset memset GetAdaptersInfo 6195->6196 6197 478d2e 6196->6197 6198 478b9a LocalAlloc 6196->6198 6198->6197 6199 478bb4 GetAdaptersInfo 6198->6199 6200 478d24 LocalFree 6199->6200 6206 478bc4 6199->6206 6200->6197 6201 478bd2 inet_addr inet_addr 6219 47641a MultiByteToWideChar 6201->6219 6202 478c77 6223 477d4e NetServerGetInfo 6202->6223 6206->6201 6206->6202 6207 476b95 13 API calls 6206->6207 6212 47641a 4 API calls 6206->6212 6216 476b95 13 API calls 6206->6216 6214 478c1f GetProcessHeap HeapFree 6207->6214 6208 478d0d 6208->6200 6211 478d13 CloseHandle 6208->6211 6209 478c88 6209->6208 6213 478c94 LocalAlloc 6209->6213 6217 478ccf htonl htonl CreateThread 6209->6217 6211->6200 6211->6211 6212->6206 6213->6209 6215 478ca4 inet_addr 6213->6215 6214->6206 6215->6209 6218 478c57 GetProcessHeap HeapFree 6216->6218 6217->6209 6252 478ab3 6217->6252 6218->6206 6220 476442 GetProcessHeap HeapAlloc 6219->6220 6222 47646e 6219->6222 6221 47645a MultiByteToWideChar 6220->6221 6220->6222 6221->6222 6222->6206 6224 477d6c 6223->6224 6225 477d88 6224->6225 6226 477d81 NetApiBufferFree 6224->6226 6225->6209 6227 478d39 GetComputerNameExW DhcpEnumSubnets 6225->6227 6226->6225 6228 478ea0 6227->6228 6231 478db0 6227->6231 6228->6209 6229 478e97 DhcpRpcFreeMemory 6229->6228 6230 478dc0 DhcpGetSubnetInfo 6230->6231 6231->6229 6231->6230 6232 478de8 DhcpEnumSubnetClients 6231->6232 6233 478e7e DhcpRpcFreeMemory 6231->6233 6234 478e2e htonl 6231->6234 6236 478e42 htonl inet_ntoa 6231->6236 6238 476b95 13 API calls 6231->6238 6232->6231 6233->6231 6240 47a567 6234->6240 6237 47641a 4 API calls 6236->6237 6237->6231 6239 478e63 GetProcessHeap HeapFree 6238->6239 6239->6231 6245 47a476 memset socket 6240->6245 6243 47a476 8 API calls 6244 47a58b 6243->6244 6244->6231 6246 47a55d 6245->6246 6247 47a4d3 htons ioctlsocket 6245->6247 6246->6243 6246->6244 6248 47a556 closesocket 6247->6248 6249 47a502 connect select 6247->6249 6248->6246 6249->6248 6250 47a541 __WSAFDIsSet 6249->6250 6250->6248 6251 47a553 6250->6251 6251->6248 6253 478b1e LocalFree 6252->6253 6258 478acd 6252->6258 6254 478ad3 htonl 6255 47a567 8 API calls 6254->6255 6255->6258 6256 478ae0 htonl inet_ntoa 6257 47641a 4 API calls 6256->6257 6257->6258 6258->6253 6258->6254 6258->6256 6259 476b95 13 API calls 6258->6259 6260 478b00 GetProcessHeap HeapFree 6259->6260 6260->6258 6261->6139 6263 47a125 6262->6263 6264 47a19e 6262->6264 6268 47a14d 6263->6268 6275 479f7a 6263->6275 6266 47a155 6284 4798ab 6266->6284 6267 47a160 6270 47a182 GetProcessHeap HeapFree GetProcessHeap HeapFree 6267->6270 6273 479534 66 API calls 6267->6273 6268->6266 6268->6267 6271 47a171 6268->6271 6270->6264 6271->6270 6274 476b5f 4 API calls 6271->6274 6273->6271 6274->6270 6276 47686c 7 API calls 6275->6276 6281 479f98 6276->6281 6277 47a00c 6277->6268 6278 479534 66 API calls 6278->6281 6279 47a006 6347 476b46 GetProcessHeap HeapFree 6279->6347 6281->6277 6281->6278 6281->6279 6283 476893 3 API calls 6281->6283 6297 479b63 6281->6297 6283->6281 6285 476ced 7 API calls 6284->6285 6286 4798c8 6285->6286 6287 479969 6286->6287 6288 4798d7 CreateThread 6286->6288 6292 479961 6286->6292 6296 476d35 3 API calls 6286->6296 6287->6267 6287->6271 6288->6286 6289 47990a SetThreadToken 6288->6289 6358 47988b 6288->6358 6290 479919 ResumeThread 6289->6290 6291 47993a CloseHandle 6289->6291 6294 479927 WaitForSingleObject 6290->6294 6295 479934 GetLastError 6290->6295 6291->6286 6357 476b46 GetProcessHeap HeapFree 6292->6357 6294->6291 6295->6291 6296->6286 6298 479b70 6297->6298 6299 479b87 wsprintfW 6298->6299 6300 479f01 SetLastError 6298->6300 6301 4788d3 PathFindFileNameW 6299->6301 6300->6281 6303 479bdb wsprintfW wsprintfW PathFindExtensionW 6301->6303 6304 479c2c 6303->6304 6305 479c31 wsprintfW 6303->6305 6304->6305 6306 479c4a WNetAddConnection2W PathFileExistsW 6305->6306 6307 479c73 GetLastError 6306->6307 6330 479ceb 6306->6330 6308 4787e7 3 API calls 6307->6308 6318 479c94 6308->6318 6309 479eef WNetCancelConnection2W 6309->6300 6310 479cf3 6312 479d0e GetCurrentThread OpenThreadToken 6310->6312 6317 4768b5 14 API calls 6310->6317 6311 479c9a GetLastError 6311->6318 6311->6330 6313 479d2c DuplicateTokenEx 6312->6313 6314 479d42 memset GetSystemDirectoryW 6312->6314 6313->6314 6315 479eb0 GetLastError 6314->6315 6316 479d9e PathAppendW PathFileExistsW 6314->6316 6322 479eb6 6315->6322 6319 479dc5 wsprintfW 6316->6319 6320 479ebe DeleteFileW 6316->6320 6321 479d08 6317->6321 6318->6300 6318->6310 6318->6311 6324 479cd4 WNetCancelConnection2W 6318->6324 6318->6330 6348 479972 6319->6348 6346 479ecd 6320->6346 6321->6312 6322->6320 6322->6346 6324->6306 6325 479ed4 CloseHandle 6326 479edc 6325->6326 6329 479ee1 CloseHandle 6326->6329 6326->6330 6327 479ea6 GetLastError 6327->6322 6328 479df2 6328->6327 6331 479e2c CreateProcessW 6328->6331 6332 479e21 CreateProcessAsUserW 6328->6332 6329->6330 6330->6300 6330->6309 6333 479e32 6331->6333 6332->6333 6333->6327 6334 479e36 WaitForSingleObject GetExitCodeProcess 6333->6334 6335 479e5b 6334->6335 6336 479e56 CloseHandle 6334->6336 6337 479e60 CloseHandle 6335->6337 6338 479e65 6335->6338 6336->6335 6337->6338 6339 479e6a CloseHandle 6338->6339 6340 479e6f 6338->6340 6339->6340 6341 479e79 6340->6341 6342 479e74 CloseHandle 6340->6342 6343 479e83 6341->6343 6344 479e7e CloseHandle 6341->6344 6342->6341 6345 479e92 PathFileExistsW 6343->6345 6343->6346 6344->6343 6345->6322 6346->6325 6346->6326 6347->6277 6349 47997f 6348->6349 6350 4788d3 PathFindFileNameW 6349->6350 6351 479992 wsprintfW 6350->6351 6352 479abd 6351->6352 6352->6352 6353 479ae9 wsprintfW 6352->6353 6354 476735 18 API calls 6353->6354 6355 479b28 wsprintfW 6354->6355 6355->6328 6357->6287 6359 479534 66 API calls 6358->6359 6360 4798a2 6359->6360 6384 47c4a6 free 6420 4767f9 StrCmpIW 6421 476815 StrCmpW 6420->6421 6422 476825 6420->6422 6421->6422

    Executed Functions

    APIs
    • wsprintfW.USER32 ref: 0047957E
      • Part of subcall function 004788D3: PathFindFileNameW.SHLWAPI(C:\Windows\infpub.dat), ref: 004788E3
    • wsprintfW.USER32 ref: 004795C9
    • wsprintfW.USER32 ref: 004795EF
    • PathFindExtensionW.SHLWAPI(?), ref: 004795FC
    • wsprintfW.USER32 ref: 0047961A
    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00479637
    • PathFileExistsW.SHLWAPI(?), ref: 00479649
    • GetLastError.KERNEL32 ref: 00479653
      • Part of subcall function 004787E7: CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 004787FC
      • Part of subcall function 004787E7: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00478813
      • Part of subcall function 004787E7: CloseHandle.KERNEL32(00000000), ref: 00478824
    • GetLastError.KERNEL32(?), ref: 00479674
    • WNetCancelConnection2W.MPR(?,00000000,00000001), ref: 004796B9
    • DeleteFileW.KERNEL32(?), ref: 0047983E
      • Part of subcall function 004768B5: GetProcessHeap.KERNEL32(00000008,?,761B423D,00000000), ref: 004768EB
      • Part of subcall function 004768B5: HeapAlloc.KERNEL32(00000000), ref: 004768F4
      • Part of subcall function 004768B5: memcpy.MSVCRT ref: 00476921
      • Part of subcall function 004768B5: GetProcessHeap.KERNEL32(00000008,?,757DCF90), ref: 00476946
      • Part of subcall function 004768B5: HeapAlloc.KERNEL32(00000000), ref: 00476949
      • Part of subcall function 004768B5: memcpy.MSVCRT ref: 00476978
      • Part of subcall function 004768B5: GetProcessHeap.KERNEL32(00000000,?,?), ref: 00476995
      • Part of subcall function 004768B5: HeapFree.KERNEL32(00000000), ref: 00476998
      • Part of subcall function 004768B5: GetProcessHeap.KERNEL32(00000000,?), ref: 0047699F
      • Part of subcall function 004768B5: HeapFree.KERNEL32(00000000), ref: 004769A2
    • OpenSCManagerW.ADVAPI32(?,00000000,000F003F,?,?), ref: 00479714
    • memset.MSVCRT ref: 00479735
    • GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00479742
    • wsprintfW.USER32 ref: 0047975A
    • CreateServiceW.ADVAPI32(?,?,00000000,000F01FF,00000010,00000003,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 00479783
    • StartServiceW.ADVAPI32(00000000,00000000,00000000), ref: 00479798
    • GetLastError.KERNEL32 ref: 004797A6
    • QueryServiceStatus.ADVAPI32(?,?), ref: 004797D5
    • Sleep.KERNEL32(00001388), ref: 004797E7
    • DeleteService.ADVAPI32(?), ref: 004797F7
    • CloseServiceHandle.ADVAPI32(?), ref: 00479801
    • GetLastError.KERNEL32 ref: 00479809
    • CloseServiceHandle.ADVAPI32(?), ref: 00479822
    • GetLastError.KERNEL32 ref: 0047982A
    • WNetCancelConnection2W.MPR(?,00000000,00000001), ref: 00479857
    • SetLastError.KERNEL32(00000057,00000000,00000000,00000000,?,0047A0AD,00000000,00000000,00000000,00000000,00476AA8,00000000,00000000,00000000,00000024,00476AA8), ref: 00479878
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000010,773E29EE,?,757DFE8D), ref: 004715D9
    • HeapAlloc.KERNEL32(00000000), ref: 004715E2
    • CryptAcquireContextW.ADVAPI32(?,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,F0000008), ref: 00471603
    • GetProcessHeap.KERNEL32(00000008,00000020), ref: 00471633
    • HeapAlloc.KERNEL32(00000000), ref: 00471636
    • CryptImportKey.ADVAPI32(?,00000000,00000020,00000000,00000100,?), ref: 0047166E
    • CryptCreateHash.ADVAPI32(?,00008009,?,00000000,?), ref: 00471688
    • CryptSetHashParam.ADVAPI32(?,00000005,00008003,00000000), ref: 0047169C
    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 004716AD
    • HeapFree.KERNEL32(00000000), ref: 004716B4
    • CryptCreateHash.ADVAPI32(?,00008002,00000000,00000000,?), ref: 004716CA
    • CryptHashData.ADVAPI32(?,?,000000FF,00000000), ref: 004716E8
    • CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000), ref: 00471701
    • CryptDestroyHash.ADVAPI32(?), ref: 0047171A
    • CryptDestroyKey.ADVAPI32(?), ref: 00471728
    • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00471737
    Strings
    • Microsoft Enhanced Cryptographic Provider v1.0, xrefs: 004715F8
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000014), ref: 00477025
    • HeapAlloc.KERNEL32(00000000), ref: 00477028
    • InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 0047703C
    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,00000000,00000000), ref: 00477051
    • CreateNamedPipeW.KERNEL32(?,00000003,00000006,00000001,00000000,00000000,00000000,0000000C), ref: 0047706F
    • ConnectNamedPipe.KERNELBASE(00000000,00000000), ref: 0047707F
    • PeekNamedPipe.KERNELBASE(?,00000000,00000000,00000000,?,00000000), ref: 0047709F
    • Sleep.KERNELBASE(000003E8), ref: 004770B3
    • GetProcessHeap.KERNEL32(00000008,?), ref: 004770C4
    • HeapAlloc.KERNEL32(00000000), ref: 004770C7
    • ReadFile.KERNEL32(?,00000000,?,?,00000000), ref: 004770E2
    • StrChrW.SHLWAPI(00000000,0000003A), ref: 004770F7
      • Part of subcall function 004769AE: GetProcessHeap.KERNEL32(00000008,?,76EBE52D,00000000,00000000), ref: 004769E3
      • Part of subcall function 004769AE: HeapAlloc.KERNEL32(00000000), ref: 004769EC
      • Part of subcall function 004769AE: memcpy.MSVCRT ref: 00476A19
      • Part of subcall function 004769AE: GetProcessHeap.KERNEL32(00000008,?), ref: 00476A3D
      • Part of subcall function 004769AE: HeapAlloc.KERNEL32(00000000), ref: 00476A40
      • Part of subcall function 004769AE: memcpy.MSVCRT ref: 00476A6F
      • Part of subcall function 004769AE: GetProcessHeap.KERNEL32(00000000,?,002F16E0,?,?), ref: 00476A8F
      • Part of subcall function 004769AE: HeapFree.KERNEL32(00000000), ref: 00476A92
      • Part of subcall function 004769AE: GetProcessHeap.KERNEL32(00000000,?), ref: 00476A99
      • Part of subcall function 004769AE: HeapFree.KERNEL32(00000000), ref: 00476A9C
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00477114
    • HeapFree.KERNEL32(00000000), ref: 00477117
    • FlushFileBuffers.KERNEL32(?), ref: 00477120
    • DisconnectNamedPipe.KERNEL32(?), ref: 00477129
    • CloseHandle.KERNEL32(?), ref: 00477132
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetSystemInfo.KERNELBASE(?,00000000,?,00000000,?,?,?,?,?,?,?,?,00475E4C,?,?,00000000), ref: 00475BE3
    • __alldiv.INT64 ref: 00475C14
    • MapViewOfFile.KERNELBASE(00000000,00000006,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475C39
    • CryptDuplicateHash.ADVAPI32(?,00000000,00000000,00000000,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475C5D
    • CryptHashData.ADVAPI32(00000000,00000000,00000004,00000000,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475C75
    • LocalAlloc.KERNEL32(00000040,?,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475C8B
    • CryptGetHashParam.ADVAPI32(00000000,00000002,00000000,00000000,00000000,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475CA4
    • memcpy.MSVCRT ref: 00475CB8
    • FlushViewOfFile.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,?,?,00475E4C,?,?), ref: 00475CDC
    • LocalFree.KERNEL32(?,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475CE8
    • CryptDestroyHash.ADVAPI32(00000000,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475CF1
    • UnmapViewOfFile.KERNEL32(?,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475CFA
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000FFFF,00000000,00000000,00000000,00000000,?,0BADF00D,?,?,?,?,0047943A), ref: 00471ED2
    • HeapAlloc.KERNEL32(00000000,?,?,?,?,0047943A), ref: 00471EDB
    • GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,?,0047943A), ref: 00471F1F
    • HeapAlloc.KERNEL32(00000000,?,?,?,?,0047943A), ref: 00471F22
    • htons.WS2_32(?), ref: 00471F41
    • send.WS2_32(?,00000000,?,00000000), ref: 00471FF1
    • recv.WS2_32(0000FFFF,?,0000FFFF,00000000), ref: 00472008
    • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,?,0047943A), ref: 0047202B
    • HeapFree.KERNEL32(00000000), ref: 00472032
    • GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,0047943A), ref: 0047203D
    • HeapFree.KERNEL32(00000000), ref: 00472044
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetSystemInfo.KERNELBASE(?,00000000,?,?,?,?,?,?,00475DE8,00000000,?,?,?,00000010,?), ref: 00475A92
    • __alldiv.INT64 ref: 00475AC3
    • MapViewOfFile.KERNELBASE(00000010,00000004,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475AEA
    • CryptDuplicateHash.ADVAPI32(?,00000000,00000000,00000010,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475B32
    • CryptHashData.ADVAPI32(00000010,00000010,00000004,00000000,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475B49
    • LocalAlloc.KERNEL32(00000040,?,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475B5F
    • CryptGetHashParam.ADVAPI32(00000010,00000002,00000000,?,00000000,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475B77
    • LocalFree.KERNEL32(00000000,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475B99
    • CryptDestroyHash.ADVAPI32(00000010,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475BA2
    • UnmapViewOfFile.KERNEL32(00000010,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475BB4
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • CryptDuplicateKey.ADVAPI32(?,00000000,00000000,?,00000000,?,00000000), ref: 00475D2A
    • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,00000000,00000000), ref: 00475D46
    • GetFileSizeEx.KERNEL32(00000000,?), ref: 00475D60
    • __alldiv.INT64 ref: 00475D8D
    • CreateFileMappingW.KERNELBASE(?,00000000,00000004,00000000,?,00000000), ref: 00475DBC
    • CloseHandle.KERNEL32(?), ref: 00475E71
      • Part of subcall function 00475A73: GetSystemInfo.KERNELBASE(?,00000000,?,?,?,?,?,?,00475DE8,00000000,?,?,?,00000010,?), ref: 00475A92
      • Part of subcall function 00475A73: __alldiv.INT64 ref: 00475AC3
      • Part of subcall function 00475A73: MapViewOfFile.KERNELBASE(00000010,00000004,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475AEA
      • Part of subcall function 00475A73: CryptDuplicateHash.ADVAPI32(?,00000000,00000000,00000010,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475B32
      • Part of subcall function 00475A73: CryptHashData.ADVAPI32(00000010,00000010,00000004,00000000,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475B49
      • Part of subcall function 00475A73: LocalAlloc.KERNEL32(00000040,?,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475B5F
      • Part of subcall function 00475A73: CryptDestroyHash.ADVAPI32(00000010,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475BA2
      • Part of subcall function 00475A73: UnmapViewOfFile.KERNEL32(00000010,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475BB4
    • MapViewOfFile.KERNELBASE(?,00000006,00000000,00000000,?,00000000,?,?,?,00000010,?), ref: 00475DFD
    • CryptEncrypt.ADVAPI32(?,00000000,?,00000000,00000000,?,?), ref: 00475E1A
    • FlushViewOfFile.KERNEL32(?,?), ref: 00475E2C
    • UnmapViewOfFile.KERNEL32(?), ref: 00475E35
      • Part of subcall function 00475BC4: GetSystemInfo.KERNELBASE(?,00000000,?,00000000,?,?,?,?,?,?,?,?,00475E4C,?,?,00000000), ref: 00475BE3
      • Part of subcall function 00475BC4: __alldiv.INT64 ref: 00475C14
      • Part of subcall function 00475BC4: MapViewOfFile.KERNELBASE(00000000,00000006,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475C39
      • Part of subcall function 00475BC4: CryptDuplicateHash.ADVAPI32(?,00000000,00000000,00000000,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475C5D
      • Part of subcall function 00475BC4: CryptHashData.ADVAPI32(00000000,00000000,00000004,00000000,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475C75
      • Part of subcall function 00475BC4: LocalAlloc.KERNEL32(00000040,?,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475C8B
      • Part of subcall function 00475BC4: CryptGetHashParam.ADVAPI32(00000000,00000002,00000000,00000000,00000000,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475CA4
      • Part of subcall function 00475BC4: memcpy.MSVCRT ref: 00475CB8
      • Part of subcall function 00475BC4: LocalFree.KERNEL32(?,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475CE8
      • Part of subcall function 00475BC4: CryptDestroyHash.ADVAPI32(00000000,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475CF1
      • Part of subcall function 00475BC4: UnmapViewOfFile.KERNEL32(?,?,00000000,?,-00000001,?,?,00000000,?,?,?,00000000), ref: 00475CFA
    • CloseHandle.KERNEL32(?), ref: 00475E54
      • Part of subcall function 00475A11: GetFileSizeEx.KERNEL32(?,?,?,?,?,?,?), ref: 00475A29
      • Part of subcall function 00475A11: SetFilePointerEx.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00475A56
      • Part of subcall function 00475A11: SetEndOfFile.KERNEL32(?), ref: 00475A63
    • CryptDestroyKey.ADVAPI32(?), ref: 00475E7F
    • SetEvent.KERNEL32(?), ref: 00475E92
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • FindResourceW.KERNEL32(?,00000006,00000000), ref: 0047832A
    • LoadResource.KERNEL32(00000000), ref: 00478341
    • LockResource.KERNEL32(00000000), ref: 00478350
    • SizeofResource.KERNEL32(00000000), ref: 00478368
    • GetProcessHeap.KERNEL32(00000000,00000000,?,00000002), ref: 00478384
    • RtlAllocateHeap.NTDLL(00000000,?,00000002), ref: 0047838D
    • memcpy.MSVCRT ref: 0047839C
    • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00000002), ref: 004783B9
    • RtlAllocateHeap.NTDLL(00000000,?,?,?,00000002), ref: 004783BC
    • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,00000004,?,?,?,?,00000002), ref: 004783FE
    • HeapFree.KERNEL32(00000000), ref: 00478401
    • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,00000002), ref: 0047840A
    • HeapFree.KERNEL32(00000000), ref: 0047840D
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • OpenSCManagerW.ADVAPI32(00000000,00000000,000F003F,00000000,?,cscc,?,0047154F,00000000,004711D0,?,?,?), ref: 00471377
    • GetLastError.KERNEL32(?,0047154F,00000000,004711D0,?,?,?), ref: 00471383
    • CreateServiceW.SECHOST(00000000,cscc,Windows Client Side Caching DDriver,000F01FF,00000001,00000000,00000003,cscc.dat,Filter,00000000,FltMgr,00000000,00000000,?,?,0047154F), ref: 004713B6
    • GetLastError.KERNEL32(?,?,0047154F,00000000,004711D0,?,?,?), ref: 004713C7
    • CloseServiceHandle.ADVAPI32(00000000,?,?,0047154F,00000000,004711D0,?,?,?), ref: 004713DB
    • CloseServiceHandle.ADVAPI32(00000000,?,?,0047154F,00000000,004711D0,?,?,?), ref: 004713DE
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
      • Part of subcall function 00471368: OpenSCManagerW.ADVAPI32(00000000,00000000,000F003F,00000000,?,cscc,?,0047154F,00000000,004711D0,?,?,?), ref: 00471377
      • Part of subcall function 00471368: GetLastError.KERNEL32(?,0047154F,00000000,004711D0,?,?,?), ref: 00471383
      • Part of subcall function 00471368: CreateServiceW.SECHOST(00000000,cscc,Windows Client Side Caching DDriver,000F01FF,00000001,00000000,00000003,cscc.dat,Filter,00000000,FltMgr,00000000,00000000,?,?,0047154F), ref: 004713B6
      • Part of subcall function 00471368: GetLastError.KERNEL32(?,?,0047154F,00000000,004711D0,?,?,?), ref: 004713C7
      • Part of subcall function 00471368: CloseServiceHandle.ADVAPI32(00000000,?,?,0047154F,00000000,004711D0,?,?,?), ref: 004713DB
      • Part of subcall function 00471368: CloseServiceHandle.ADVAPI32(00000000,?,?,0047154F,00000000,004711D0,?,?,?), ref: 004713DE
    • GetVersion.KERNEL32(SYSTEM\CurrentControlSet\Control\Class\{4D36E965-E325-11CE-BFC1-08002BE10318},UpperFilters,SYSTEM\CurrentControlSet\Control\Class\{71A27CDD-812A-11D0-BEC7-08002BE2092F},LowerFilters,00000000,004711D0,?,?,?), ref: 00471588
      • Part of subcall function 004713E8: wsprintfW.USER32 ref: 00471408
      • Part of subcall function 004713E8: RegOpenKeyExW.ADVAPI32(80000002,?,00000000,000F003F,?), ref: 00471427
      • Part of subcall function 004713E8: RegQueryValueExW.ADVAPI32(?,Start,00000000,00000000,?,?,?,00000000), ref: 00471453
      • Part of subcall function 004713E8: RegSetValueExW.ADVAPI32(?,Start,00000000,00000004,?,00000004,?,00000000), ref: 0047147E
      • Part of subcall function 004713E8: RegSetValueExW.ADVAPI32(?,Start,00000000,00000004,?,00000004,?,00000000), ref: 00471495
      • Part of subcall function 004713E8: RegSetValueExW.ADVAPI32(?,Group,00000000,00000001,Filter,0000000E,?,00000000), ref: 004714B3
      • Part of subcall function 004713E8: RegSetValueExW.ADVAPI32(?,DependOnService,00000000,00000007,FltMgr,0000000E,?,00000000), ref: 004714CB
      • Part of subcall function 004713E8: RegSetValueExW.ADVAPI32(?,ErrorControl,00000000,00000004,?,00000004,?,00000000), ref: 004714E9
      • Part of subcall function 004713E8: RegCloseKey.ADVAPI32(?,?,00000000), ref: 00471523
      • Part of subcall function 004711EF: RegOpenKeyW.ADVAPI32(80000002,?,?), ref: 00471204
      • Part of subcall function 004711EF: RegQueryValueExW.KERNEL32(00000800,?,00000000,?,?,?,00000000,?), ref: 0047124F
      • Part of subcall function 004711EF: memmove.MSVCRT ref: 00471302
      • Part of subcall function 004711EF: memcpy.MSVCRT ref: 00471315
      • Part of subcall function 004711EF: RegSetValueExW.KERNEL32(00000800,00000007,00000000,00000007,?,00000800), ref: 00471334
      • Part of subcall function 004711EF: RegFlushKey.ADVAPI32(00000800), ref: 00471344
      • Part of subcall function 004711EF: RegCloseKey.ADVAPI32(00000800), ref: 00471359
    Strings
    • cscc, xrefs: 00471533
    • UpperFilters, xrefs: 00471573
    • cscc, xrefs: 0047153A
    • DumpFilters, xrefs: 00471592
    • LowerFilters, xrefs: 0047155E
    • SYSTEM\CurrentControlSet\Control\Class\{71A27CDD-812A-11D0-BEC7-08002BE2092F}, xrefs: 00471563
    • SYSTEM\CurrentControlSet\Control\Class\{4D36E965-E325-11CE-BFC1-08002BE10318}, xrefs: 00471578
    • SYSTEM\CurrentControlSet\Control\CrashControl, xrefs: 00471597
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 004762A5
    • LocalFree.KERNEL32(?), ref: 0047635D
      • Part of subcall function 00475507: CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000018,F0000000,?,00000000,?,004762C3,?), ref: 00475520
      • Part of subcall function 00475507: GetLastError.KERNEL32(?,004762C3,?), ref: 00475528
      • Part of subcall function 00475507: CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000018,00000008,?,004762C3,?), ref: 0047553E
    • CloseHandle.KERNEL32(?), ref: 00476348
      • Part of subcall function 00475613: CryptStringToBinaryW.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 00475636
      • Part of subcall function 00475613: LocalAlloc.KERNEL32(00000040,?,00000000), ref: 0047564C
      • Part of subcall function 00475613: CryptStringToBinaryW.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 00475662
      • Part of subcall function 00475613: CryptDecodeObjectEx.CRYPT32(00000001,00000008,?,?,00000000,00000000,00000000,?), ref: 00475682
      • Part of subcall function 00475613: LocalAlloc.KERNEL32(00000040,?), ref: 0047568D
      • Part of subcall function 00475613: CryptDecodeObjectEx.CRYPT32(00000001,00000008,?,?,00000000,00000000,00000000,?), ref: 004756A6
      • Part of subcall function 00475613: CryptImportPublicKeyInfo.CRYPT32(?,00000001,00000000,?), ref: 004756B5
      • Part of subcall function 00475613: LocalFree.KERNEL32(00000000), ref: 004756BF
      • Part of subcall function 00475613: LocalFree.KERNEL32(?), ref: 004756C8
    • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?), ref: 0047633F
      • Part of subcall function 00476085: CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?,?,?,00000000,?,?,?,004762E0,?,?,?,?), ref: 004760A6
      • Part of subcall function 00476085: CryptHashData.ADVAPI32(?,?,00000021,00000000,?,?,?,004762E0,?,?,?,?), ref: 004760BA
      • Part of subcall function 00476085: CryptDeriveKey.ADVAPI32(?,0000660E,?,00000001,?,?,?,?,004762E0,?,?,?,?), ref: 004760D3
      • Part of subcall function 00476085: CryptDestroyHash.ADVAPI32(?,?,?,?,004762E0,?,?,?,?), ref: 004760DF
    • CryptDestroyKey.ADVAPI32(?,?,?,?,?), ref: 00476336
      • Part of subcall function 00476246: CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?,?,00000000,?,?,004762E9,?,?,?,?), ref: 00476260
      • Part of subcall function 00476246: CryptHashData.ADVAPI32(?,?,00000021,00000000,?,?,004762E9,?,?,?,?), ref: 00476273
      • Part of subcall function 00476246: CryptGetHashParam.ADVAPI32(?,00000002,00000000,?,00000000,?,?,004762E9,?,?,?,?), ref: 00476289
    • CreateThread.KERNEL32(00000000,00000000,Function_000060F9,?,00000000,00000000), ref: 004762F7
      • Part of subcall function 00475E9F: PathCombineW.SHLWAPI(?,?,00481554), ref: 00475EC8
      • Part of subcall function 00475E9F: FindFirstFileW.KERNELBASE(?,?), ref: 00475EE3
      • Part of subcall function 00475E9F: WaitForMultipleObjects.KERNEL32(00000001,?,00000000,00000000), ref: 00475F09
      • Part of subcall function 00475E9F: PathCombineW.SHLWAPI(?,?,?), ref: 00475FB1
      • Part of subcall function 00475E9F: StrStrIW.SHLWAPI(?,00483014), ref: 00475FE9
      • Part of subcall function 00475E9F: PathFindExtensionW.SHLWAPI(?), ref: 0047601B
      • Part of subcall function 00475E9F: FindNextFileW.KERNELBASE(?,?), ref: 00476065
      • Part of subcall function 00475E9F: FindClose.KERNEL32(?), ref: 00476077
    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00476312
    • CloseHandle.KERNEL32(00000000), ref: 00476319
    • CryptDestroyHash.ADVAPI32(?,?,00000011,?), ref: 00476322
    • CryptDestroyKey.ADVAPI32(?,?,?,?,?), ref: 0047632D
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • CryptStringToBinaryW.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 00475636
    • LocalAlloc.KERNEL32(00000040,?,00000000), ref: 0047564C
    • CryptStringToBinaryW.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 00475662
    • CryptDecodeObjectEx.CRYPT32(00000001,00000008,?,?,00000000,00000000,00000000,?), ref: 00475682
    • LocalAlloc.KERNEL32(00000040,?), ref: 0047568D
    • CryptDecodeObjectEx.CRYPT32(00000001,00000008,?,?,00000000,00000000,00000000,?), ref: 004756A6
    • CryptImportPublicKeyInfo.CRYPT32(?,00000001,00000000,?), ref: 004756B5
    • LocalFree.KERNEL32(00000000), ref: 004756BF
    • LocalFree.KERNEL32(?), ref: 004756C8
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • PathCombineW.SHLWAPI(?,?,00481554), ref: 00475EC8
    • FindFirstFileW.KERNELBASE(?,?), ref: 00475EE3
    • WaitForMultipleObjects.KERNEL32(00000001,?,00000000,00000000), ref: 00475F09
    • PathCombineW.SHLWAPI(?,?,?), ref: 00475FB1
      • Part of subcall function 00475E9F: StrStrIW.SHLWAPI(?,00483014), ref: 00475FE9
    • PathFindExtensionW.SHLWAPI(?), ref: 0047601B
      • Part of subcall function 00475D0A: CryptDuplicateKey.ADVAPI32(?,00000000,00000000,?,00000000,?,00000000), ref: 00475D2A
      • Part of subcall function 00475D0A: CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,00000000,00000000), ref: 00475D46
      • Part of subcall function 00475D0A: GetFileSizeEx.KERNEL32(00000000,?), ref: 00475D60
      • Part of subcall function 00475D0A: __alldiv.INT64 ref: 00475D8D
      • Part of subcall function 00475D0A: CreateFileMappingW.KERNELBASE(?,00000000,00000004,00000000,?,00000000), ref: 00475DBC
      • Part of subcall function 00475D0A: MapViewOfFile.KERNELBASE(?,00000006,00000000,00000000,?,00000000,?,?,?,00000010,?), ref: 00475DFD
      • Part of subcall function 00475D0A: CryptEncrypt.ADVAPI32(?,00000000,?,00000000,00000000,?,?), ref: 00475E1A
      • Part of subcall function 00475D0A: FlushViewOfFile.KERNEL32(?,?), ref: 00475E2C
      • Part of subcall function 00475D0A: UnmapViewOfFile.KERNEL32(?), ref: 00475E35
      • Part of subcall function 00475D0A: CloseHandle.KERNEL32(?), ref: 00475E54
      • Part of subcall function 00475D0A: CloseHandle.KERNEL32(?), ref: 00475E71
      • Part of subcall function 00475D0A: CryptDestroyKey.ADVAPI32(?), ref: 00475E7F
      • Part of subcall function 00475D0A: SetEvent.KERNEL32(?), ref: 00475E92
      • Part of subcall function 004759B1: StrStrIW.SHLWAPI(.3ds.7z.accdb.ai.asm.asp.aspx.avhd.back.bak.bmp.brw.c.cab.cc.cer.cfg.conf.cpp.crt.cs.ctl.cxx.dbf.der.dib.disk.djvu.doc.docx.dwg.em,?), ref: 004759FD
    • FindNextFileW.KERNELBASE(?,?), ref: 00476065
    • FindClose.KERNEL32(?), ref: 00476077
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetLocalTime.KERNEL32(?,00000000), ref: 004781AF
      • Part of subcall function 00476477: GetTickCount.KERNEL32(00477DDC,?,?,00000000,?,?,00477AA3,?,?,000000FF,?,?), ref: 00476477
    • GetSystemDirectoryW.KERNEL32(?,0000030C), ref: 004781F2
    • PathAppendW.SHLWAPI(?,?), ref: 004782AF
    • wsprintfW.USER32 ref: 004782CE
      • Part of subcall function 00477FB7: wsprintfW.USER32 ref: 00477FD6
      • Part of subcall function 00477FB7: GetEnvironmentVariableW.KERNEL32(ComSpec,?,0000030C), ref: 00477FFA
      • Part of subcall function 00477FB7: GetSystemDirectoryW.KERNEL32(?,0000030C), ref: 0047800C
      • Part of subcall function 00477FB7: lstrcatW.KERNEL32(?,\cmd.exe), ref: 00478022
      • Part of subcall function 00477FB7: CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00478069
      • Part of subcall function 00477FB7: Sleep.KERNELBASE(00000000), ref: 0047807F
    Strings
    • schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "%ws" /ST %02d:%02d:00, xrefs: 004782C8
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
      • Part of subcall function 0047808E: wsprintfW.USER32 ref: 004780BC
      • Part of subcall function 0047808E: wsprintfW.USER32 ref: 004780CC
      • Part of subcall function 0047808E: wsprintfW.USER32 ref: 004780DC
      • Part of subcall function 0047808E: wsprintfW.USER32 ref: 004780EC
      • Part of subcall function 0047808E: wsprintfW.USER32 ref: 00478126
    • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000001,00000001,80000000), ref: 00478A54
    • ExitWindowsEx.USER32(00000006,00000000), ref: 00478A61
    • ExitProcess.KERNEL32 ref: 00478A68
      • Part of subcall function 00477FB7: wsprintfW.USER32 ref: 00477FD6
      • Part of subcall function 00477FB7: GetEnvironmentVariableW.KERNEL32(ComSpec,?,0000030C), ref: 00477FFA
      • Part of subcall function 00477FB7: GetSystemDirectoryW.KERNEL32(?,0000030C), ref: 0047800C
      • Part of subcall function 00477FB7: lstrcatW.KERNEL32(?,\cmd.exe), ref: 00478022
      • Part of subcall function 00477FB7: CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00478069
      • Part of subcall function 00477FB7: Sleep.KERNELBASE(00000000), ref: 0047807F
    Strings
    • schtasks /Delete /F /TN drogon, xrefs: 00478A35
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • VirtualProtect.KERNELBASE(?,?,00000004,?), ref: 00479090
    • LoadLibraryA.KERNEL32(?), ref: 004790BA
    • GetProcAddress.KERNEL32(00000000,00470000), ref: 004790FD
    • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0047913D
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 004784FC
    • Process32FirstW.KERNEL32(00000000,?), ref: 0047851B
    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0047853E
      • Part of subcall function 0047841D: GetCurrentProcessId.KERNEL32(?,00478555,?,?), ref: 00478430
      • Part of subcall function 0047841D: OpenProcess.KERNEL32(00000401,00000000,?,?,?,?,00478555,?,?), ref: 0047844C
      • Part of subcall function 0047841D: OpenProcessToken.ADVAPI32(00000000,0000000E,?,00000000,?,?,?,00478555,?,?), ref: 00478464
      • Part of subcall function 0047841D: DuplicateToken.ADVAPI32(?,00000002,?,?,?,?,00478555,?,?), ref: 0047847D
      • Part of subcall function 0047841D: AllocateAndInitializeSid.ADVAPI32(?,00000001,00000012,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 004784A3
      • Part of subcall function 0047841D: CheckTokenMembership.ADVAPI32(?,?,?), ref: 004784BA
      • Part of subcall function 0047841D: TerminateProcess.KERNEL32(00000000,00000000), ref: 004784CB
      • Part of subcall function 0047841D: FreeSid.ADVAPI32(?), ref: 004784D4
      • Part of subcall function 0047841D: CloseHandle.KERNEL32(?), ref: 004784DD
      • Part of subcall function 0047841D: CloseHandle.KERNEL32(?), ref: 004784E2
      • Part of subcall function 0047841D: CloseHandle.KERNEL32(00000000), ref: 004784E5
    • CloseHandle.KERNEL32(00000000), ref: 00478556
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000018,F0000000,?,?,?,0047790E,?,00000004,SeTcbPrivilege,SeDebugPrivilege,SeShutdownPrivilege), ref: 00475561
    • GetLastError.KERNEL32(?,?,?,0047790E,?,00000004,SeTcbPrivilege,SeDebugPrivilege,SeShutdownPrivilege,?,?,004779E8), ref: 0047556B
    • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,0047790E,?,00000004,SeTcbPrivilege,SeDebugPrivilege,SeShutdownPrivilege,?,?,004779E8), ref: 00475581
    • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,0047790E,?,00000004,SeTcbPrivilege,SeDebugPrivilege,SeShutdownPrivilege,?,?,004779E8), ref: 0047558E
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000018,F0000000,?,00000000,?,004762C3,?), ref: 00475520
    • GetLastError.KERNEL32(?,004762C3,?), ref: 00475528
    • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000018,00000008,?,004762C3,?), ref: 0047553E
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,?,00000000,002F16E0,00000000,00471C7A,00000000,?,00000000,00000000,?,?,00000003,00000000,?,00000000), ref: 00471783
    • HeapAlloc.KERNEL32(00000000), ref: 0047178C
    • CharUpperW.USER32(00000000), ref: 004717B2
    • GetProcessHeap.KERNEL32(00000008,00000086), ref: 004717DA
    • HeapAlloc.KERNEL32(00000000), ref: 004717DD
    • htons.WS2_32(00000082), ref: 00471801
    • send.WS2_32(00000086,?,00000086,00000041), ref: 00471863
    • recv.WS2_32(0000FFFF,?,0000FFFF,00000000), ref: 0047187F
    • GetProcessHeap.KERNEL32(00000008,00000018), ref: 004718F4
    • HeapAlloc.KERNEL32(00000000), ref: 004718FD
      • Part of subcall function 004715A7: GetProcessHeap.KERNEL32(00000008,00000010,773E29EE,?,757DFE8D), ref: 004715D9
      • Part of subcall function 004715A7: HeapAlloc.KERNEL32(00000000), ref: 004715E2
      • Part of subcall function 004715A7: CryptAcquireContextW.ADVAPI32(?,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,F0000008), ref: 00471603
      • Part of subcall function 004715A7: GetProcessHeap.KERNEL32(00000008,00000020), ref: 00471633
      • Part of subcall function 004715A7: HeapAlloc.KERNEL32(00000000), ref: 00471636
      • Part of subcall function 004715A7: CryptImportKey.ADVAPI32(?,00000000,00000020,00000000,00000100,?), ref: 0047166E
      • Part of subcall function 004715A7: CryptCreateHash.ADVAPI32(?,00008009,?,00000000,?), ref: 00471688
      • Part of subcall function 004715A7: CryptSetHashParam.ADVAPI32(?,00000005,00008003,00000000), ref: 0047169C
      • Part of subcall function 004715A7: GetProcessHeap.KERNEL32(00000008,00000000), ref: 004716AD
      • Part of subcall function 004715A7: HeapFree.KERNEL32(00000000), ref: 004716B4
      • Part of subcall function 004715A7: CryptCreateHash.ADVAPI32(?,00008002,00000000,00000000,?), ref: 004716CA
      • Part of subcall function 004715A7: CryptHashData.ADVAPI32(?,?,000000FF,00000000), ref: 004716E8
      • Part of subcall function 004715A7: CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000), ref: 00471701
      • Part of subcall function 004715A7: CryptDestroyHash.ADVAPI32(?), ref: 0047171A
      • Part of subcall function 004715A7: CryptDestroyKey.ADVAPI32(?), ref: 00471728
      • Part of subcall function 004715A7: CryptReleaseContext.ADVAPI32(?,00000000), ref: 00471737
    • GetProcessHeap.KERNEL32(00000008,00000010,?,00000000,?,00008003,00008003,?,?,00000000,?,00008002), ref: 00471958
    • HeapAlloc.KERNEL32(00000000), ref: 0047195B
    • rand.MSVCRT ref: 00471983
    • GetProcessHeap.KERNEL32(00000008,00000018,?,00000010,?,?,00008003), ref: 004719B8
    • HeapAlloc.KERNEL32(00000000), ref: 004719BB
    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00471A13
    • HeapAlloc.KERNEL32(00000000), ref: 00471A16
    • htons.WS2_32(-000000FC), ref: 00471A39
    • memcpy.MSVCRT ref: 00471B48
    • send.WS2_32(?,00000000,00000000,00000000), ref: 00471B7A
    • recv.WS2_32(?,?,0000FFFF,00000000), ref: 00471B93
    • memset.MSVCRT ref: 00471BAB
    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00471BB6
    • HeapFree.KERNEL32(00000000), ref: 00471BBD
    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00471BC8
    • HeapFree.KERNEL32(00000000), ref: 00471BCF
    • GetProcessHeap.KERNEL32(00000008,?), ref: 00471BE3
    • HeapFree.KERNEL32(00000000), ref: 00471BE6
    • GetProcessHeap.KERNEL32(00000008,?,?,00000010,?,?,00008003), ref: 00471BF1
    • HeapFree.KERNEL32(00000000), ref: 00471BF4
    • GetProcessHeap.KERNEL32(00000008,?), ref: 00471BFF
    • HeapFree.KERNEL32(00000000), ref: 00471C02
    • GetProcessHeap.KERNEL32(00000008,?,?,?,00000000,?,00008002), ref: 00471C0D
    • HeapFree.KERNEL32(00000000), ref: 00471C10
    • GetProcessHeap.KERNEL32(00000008,?), ref: 00471C19
    • HeapFree.KERNEL32(00000000), ref: 00471C1C
    • GetProcessHeap.KERNEL32(00000008,?), ref: 00471C27
    • HeapFree.KERNEL32(00000000), ref: 00471C2A
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000FFFF,?,00000000,?,?,?,0047471C,?,?,?,?,?), ref: 004724AF
    • HeapAlloc.KERNEL32(00000000,?,?,?,0047471C,?,?,?,?,?), ref: 004724B8
    • GetProcessHeap.KERNEL32(00000008,00001124,757DFE8D,?,?,?,0047471C,?,?,?,?,?), ref: 004724CD
    • HeapAlloc.KERNEL32(00000000,?,?,?,0047471C,?,?,?,?,?), ref: 004724D0
    • rand.MSVCRT ref: 004724E1
    • htons.WS2_32(00001120), ref: 004724FF
    • rand.MSVCRT ref: 0047255F
    • GetProcessHeap.KERNEL32(00000008,00000160,?,?,?,0047471C,?,?,?,?,?), ref: 00472576
    • HeapAlloc.KERNEL32(00000000,?,?,?,0047471C,?,?,?,?,?), ref: 0047257D
    • htons.WS2_32(0000015C), ref: 0047259F
    • rand.MSVCRT ref: 004725CD
    • GetProcessHeap.KERNEL32(00000008,00001284,?,?,?,0047471C,?,?,?,?,?), ref: 004725E4
    • HeapAlloc.KERNEL32(00000000,?,?,?,0047471C,?,?,?,?,?), ref: 004725EB
    • memcpy.MSVCRT ref: 00472605
    • memcpy.MSVCRT ref: 00472617
    • send.WS2_32(?,00000000,0000111C,00000000), ref: 00472630
    • send.WS2_32(?,?,00000168,00000000), ref: 0047264D
    • recv.WS2_32(?,?,0000FFFF,00000000), ref: 00472697
    • GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,?,0047471C,?,?,?,?,?), ref: 004726BF
    • HeapFree.KERNEL32(00000000), ref: 004726C6
    • GetProcessHeap.KERNEL32(00000008,?,?,?,?,0047471C,?,?,?,?,?), ref: 004726CF
    • HeapFree.KERNEL32(00000000), ref: 004726D6
    • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,0047471C,?,?,?,?,?), ref: 004726DF
    • HeapFree.KERNEL32(00000000), ref: 004726E6
    • GetProcessHeap.KERNEL32(00000008,?,?,?,?,0047471C,?,?,?,?,?), ref: 004726F1
    • HeapFree.KERNEL32(00000000), ref: 004726F8
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
      • Part of subcall function 00477897: GetTickCount.KERNEL32(?,?,?,004779E8), ref: 004778AF
      • Part of subcall function 00477897: srand.MSVCRT ref: 004778B2
      • Part of subcall function 00477897: GetTickCount.KERNEL32(?,?,004779E8), ref: 004778B9
      • Part of subcall function 00477897: GetModuleFileNameW.KERNEL32(C:\Windows\infpub.dat,0000030C,?,00000004,SeTcbPrivilege,SeDebugPrivilege,SeShutdownPrivilege,?,?,004779E8), ref: 00477926
      • Part of subcall function 00477F04: GetComputerNameW.KERNEL32(?,?), ref: 00477F3B
      • Part of subcall function 00477F04: wsprintfW.USER32 ref: 00477F7F
      • Part of subcall function 00477F04: CreateMutexW.KERNELBASE(00000000,00000000,?), ref: 00477F8E
      • Part of subcall function 00477F04: GetLastError.KERNEL32 ref: 00477F99
      • Part of subcall function 00477F04: GetLastError.KERNEL32 ref: 00477FAB
    • ExitProcess.KERNEL32 ref: 00477A07
    • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00477CB3
      • Part of subcall function 00477E8E: PathFileExistsW.SHLWAPI(?), ref: 00477EB1
      • Part of subcall function 00477E8E: GetCurrentProcess.KERNEL32(?,?), ref: 00477EC3
      • Part of subcall function 00477E8E: ExitProcess.KERNEL32 ref: 00477EFD
      • Part of subcall function 004784EE: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 004784FC
      • Part of subcall function 004784EE: Process32FirstW.KERNEL32(00000000,?), ref: 0047851B
      • Part of subcall function 004784EE: Process32NextW.KERNEL32(00000000,0000022C), ref: 0047853E
      • Part of subcall function 004784EE: CloseHandle.KERNEL32(00000000), ref: 00478556
      • Part of subcall function 004710A7: ExpandEnvironmentStringsW.KERNEL32(%ALLUSERSPROFILE%,?,00000104), ref: 004710DD
      • Part of subcall function 004710A7: PathAppendW.SHLWAPI(?,dispci.exe), ref: 0047119F
      • Part of subcall function 004710A7: GetProcessHeap.KERNEL32(00000000,?), ref: 004711DC
      • Part of subcall function 004710A7: HeapFree.KERNEL32(00000000), ref: 004711E3
    • WSAStartup.WS2_32(00000202,004881E0), ref: 00477A3D
      • Part of subcall function 00476C5F: GetProcessHeap.KERNEL32(00000008,00000034,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476C6F
      • Part of subcall function 00476C5F: HeapAlloc.KERNEL32(00000000,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476C78
      • Part of subcall function 00476C5F: InitializeCriticalSection.KERNEL32(00000000,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476C81
      • Part of subcall function 00476C5F: GetProcessHeap.KERNEL32(00000008,00000000,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476CAC
      • Part of subcall function 00476C5F: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476CAF
    • InitializeCriticalSection.KERNEL32(00487B9C,00000008,004767F9,0047682F,000000FF,00000024,00476AA8,00000000,0000FFFF), ref: 00477A80
      • Part of subcall function 0047652F: CommandLineToArgvW.SHELL32(?,?), ref: 00476566
      • Part of subcall function 0047652F: StrToIntW.SHLWAPI(00000000), ref: 00476581
      • Part of subcall function 0047652F: StrStrW.SHLWAPI(00000000,00481580), ref: 004765B3
      • Part of subcall function 0047652F: StrStrW.SHLWAPI(00000000,00481588), ref: 004765CD
      • Part of subcall function 0047652F: StrChrW.SHLWAPI(00000000,0000003A), ref: 004765DF
      • Part of subcall function 0047652F: LocalFree.KERNEL32(00000000,?,?,?,?,00477A8E,?), ref: 00476607
      • Part of subcall function 00477DD0: NetServerGetInfo.NETAPI32(00000000,00000065,?,?,?,00000000,?,?,00477AA3,?,?,000000FF,?,?), ref: 00477DF6
      • Part of subcall function 00477DD0: NetApiBufferFree.NETAPI32(?,?,?,00000000,?,?,00477AA3,?,?,000000FF,?,?), ref: 00477E0F
      • Part of subcall function 00478192: GetLocalTime.KERNEL32(?,00000000), ref: 004781AF
      • Part of subcall function 00478192: GetSystemDirectoryW.KERNEL32(?,0000030C), ref: 004781F2
      • Part of subcall function 00478192: PathAppendW.SHLWAPI(?,?), ref: 004782AF
      • Part of subcall function 00478192: wsprintfW.USER32 ref: 004782CE
    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,000000FF,?,?), ref: 00477AAD
    • CreateThread.KERNEL32(00000000,00000000,00478A6F,00000000,00000000,00000000), ref: 00477AC6
    • CreateThread.KERNEL32(00000000,00000000,004777D1,00000000,00000000,00000000), ref: 00477ADF
      • Part of subcall function 00476CC8: EnterCriticalSection.KERNEL32(002F16E0,00477B03), ref: 00476CCD
      • Part of subcall function 00476CC8: InterlockedExchange.KERNEL32(002F1708,00000001), ref: 00476CD9
      • Part of subcall function 00476CC8: LeaveCriticalSection.KERNEL32(002F16E0), ref: 00476CE0
    • Sleep.KERNELBASE(?,000000FF), ref: 00477B93
      • Part of subcall function 004785FB: memset.MSVCRT ref: 0047862D
      • Part of subcall function 004785FB: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00478645
      • Part of subcall function 004785FB: Process32FirstW.KERNEL32 ref: 00478666
      • Part of subcall function 004785FB: OpenProcess.KERNEL32(00000450,00000000,0000022C), ref: 004786A0
      • Part of subcall function 004785FB: OpenProcessToken.ADVAPI32(00000000,02000000,?), ref: 004786B9
      • Part of subcall function 004785FB: GetTokenInformation.ADVAPI32(000000FF,0000000C,?,00000004,?), ref: 004786DF
      • Part of subcall function 004785FB: DuplicateTokenEx.ADVAPI32(?,02000000,00000000,00000002,00000002,?), ref: 00478708
      • Part of subcall function 004785FB: memset.MSVCRT ref: 0047871E
      • Part of subcall function 004785FB: GetTokenInformation.ADVAPI32(?,0000000A,?,00000038,?,?,00000000,?), ref: 00478738
      • Part of subcall function 004785FB: SetTokenInformation.ADVAPI32(?,0000000C,?,00000004,?,00000000,?), ref: 00478767
      • Part of subcall function 004785FB: CloseHandle.KERNEL32(?), ref: 004787A2
      • Part of subcall function 004785FB: CloseHandle.KERNEL32(?), ref: 004787A8
      • Part of subcall function 004785FB: Process32NextW.KERNEL32(?,?), ref: 004787BA
      • Part of subcall function 004785FB: GetLastError.KERNEL32 ref: 004787CA
      • Part of subcall function 004785FB: CloseHandle.KERNEL32(?), ref: 004787D4
      • Part of subcall function 0047A3B1: CreateThread.KERNEL32(00000000,00000000,0047A016,00000000,00000004,00000000), ref: 0047A3C9
      • Part of subcall function 0047A3B1: SetThreadToken.ADVAPI32(?,?,?,?,00477B43,?,?,00000004,0047787C,00000000,000000FF), ref: 0047A3DD
      • Part of subcall function 0047A3B1: ResumeThread.KERNEL32(?,?,?,00477B43,?,?,00000004,0047787C,00000000,000000FF), ref: 0047A3EA
      • Part of subcall function 0047A3B1: GetLastError.KERNEL32(?,?,00477B43,?,?,00000004,0047787C,00000000,000000FF), ref: 0047A3F7
      • Part of subcall function 0047A3B1: CloseHandle.KERNEL32(?), ref: 0047A402
      • Part of subcall function 0047A3B1: SetLastError.KERNEL32(00000057,?,?,00477B43,?,?,00000004,0047787C,00000000,000000FF), ref: 0047A411
      • Part of subcall function 0047796E: CreateThread.KERNEL32(00000000,00000000,00477957,00000000,00000004,00000000), ref: 00477988
      • Part of subcall function 0047796E: SetThreadToken.ADVAPI32(?,00000000,?,?,?,00477B4A,?,?,?,00000004,0047787C,00000000,000000FF), ref: 0047799C
      • Part of subcall function 0047796E: ResumeThread.KERNEL32(?,?,?,?,00477B4A,?,?,?,00000004,0047787C,00000000,000000FF), ref: 004779A9
      • Part of subcall function 0047796E: WaitForSingleObject.KERNEL32(?,000000FF), ref: 004779B9
      • Part of subcall function 0047796E: GetLastError.KERNEL32(?,?,?,00477B4A,?,?,?,00000004,0047787C,00000000,000000FF), ref: 004779C1
      • Part of subcall function 0047796E: CloseHandle.KERNEL32(?), ref: 004779CA
      • Part of subcall function 00477146: GetCurrentProcess.KERNEL32(?,?,00000000,?,00477AF8), ref: 00477164
      • Part of subcall function 00477146: GetTempFileNameW.KERNELBASE(?,00000000,00000000,?,00000000,?,00477AF8), ref: 004771AA
      • Part of subcall function 00477146: CoCreateGuid.OLE32(?), ref: 004771C8
      • Part of subcall function 00477146: StringFromCLSID.OLE32(?,?), ref: 004771E1
      • Part of subcall function 00477146: wsprintfW.USER32 ref: 0047721F
      • Part of subcall function 00477146: CreateThread.KERNEL32(00000000,00000000,00476FFE,?,00000000,00000000), ref: 00477236
      • Part of subcall function 00477146: memset.MSVCRT ref: 00477259
      • Part of subcall function 00477146: wsprintfW.USER32 ref: 00477281
      • Part of subcall function 00477146: CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 004772A6
      • Part of subcall function 00477146: WaitForSingleObject.KERNEL32(?,0000EA60), ref: 004772B8
      • Part of subcall function 00477146: TerminateThread.KERNELBASE(?,00000000), ref: 004772CD
      • Part of subcall function 00477146: CloseHandle.KERNEL32(?), ref: 004772D6
      • Part of subcall function 00477146: DeleteFileW.KERNELBASE(?,?,?), ref: 00477306
      • Part of subcall function 00477146: CoTaskMemFree.OLE32(?), ref: 0047730F
      • Part of subcall function 00477146: GetProcessHeap.KERNEL32(00000000,?,?,00477AF8), ref: 0047732C
      • Part of subcall function 00477146: HeapFree.KERNEL32(00000000,?,00477AF8), ref: 00477333
      • Part of subcall function 00476E66: EnterCriticalSection.KERNEL32(?,002F16E0,757DC570,757DFE8D,?,?,00476A84,002F16E0,?,?), ref: 00476E87
      • Part of subcall function 00476E66: GetProcessHeap.KERNEL32(00000008,00000008,002F16E0,00000000,?,?,00476A84,002F16E0,?,?), ref: 00476EB8
      • Part of subcall function 00476E66: HeapAlloc.KERNEL32(00000000,?,?,00476A84,002F16E0,?,?), ref: 00476EC1
      • Part of subcall function 00476E66: GetProcessHeap.KERNEL32(00000008,?,?,?,00476A84,002F16E0,?,?), ref: 00476ED9
      • Part of subcall function 00476E66: HeapAlloc.KERNEL32(00000000,?,?,00476A84,002F16E0,?,?), ref: 00476EDC
      • Part of subcall function 00476E66: memcpy.MSVCRT ref: 00476F0D
      • Part of subcall function 00476E66: GetProcessHeap.KERNEL32(00000000,?,?,?,00476A84,002F16E0,?,?), ref: 00476F26
      • Part of subcall function 00476E66: HeapFree.KERNEL32(00000000), ref: 00476F29
      • Part of subcall function 00476E66: GetProcessHeap.KERNEL32(00000008,?,?,002F16E0,00000000,?,?,00476A84,002F16E0,?,?), ref: 00476F41
      • Part of subcall function 00476E66: HeapReAlloc.KERNEL32(00000000,?,?,00476A84,002F16E0,?,?), ref: 00476F48
      • Part of subcall function 00476E66: LeaveCriticalSection.KERNEL32(?,002F16E0,00000000,?,?,00476A84,002F16E0,?,?), ref: 00476F6C
    • CreateThread.KERNEL32(00000000,00000000,0047A1A9,00000000,00000000,00000000), ref: 00477B78
      • Part of subcall function 0047A420: GetProcessHeap.KERNEL32(00000008,00000004,757DDE72,00000000,00000000,?,?,00477B89,000000FF), ref: 0047A436
      • Part of subcall function 0047A420: HeapAlloc.KERNEL32(00000000,?,?,00477B89,000000FF), ref: 0047A439
      • Part of subcall function 0047A420: CreateThread.KERNEL32(00000000,00000000,0047A333,00000000,00000000,00000000), ref: 0047A454
      • Part of subcall function 0047A420: GetProcessHeap.KERNEL32(00000000,00000000,?,?,00477B89,000000FF), ref: 0047A463
      • Part of subcall function 0047A420: HeapFree.KERNEL32(00000000), ref: 0047A466
    • ExitProcess.KERNEL32 ref: 00477CBA
      • Part of subcall function 0047554A: CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000018,F0000000,?,?,?,0047790E,?,00000004,SeTcbPrivilege,SeDebugPrivilege,SeShutdownPrivilege), ref: 00475561
      • Part of subcall function 0047554A: GetLastError.KERNEL32(?,?,?,0047790E,?,00000004,SeTcbPrivilege,SeDebugPrivilege,SeShutdownPrivilege,?,?,004779E8), ref: 0047556B
      • Part of subcall function 0047554A: CryptGenRandom.ADVAPI32(?,?,?,?,?,?,0047790E,?,00000004,SeTcbPrivilege,SeDebugPrivilege,SeShutdownPrivilege,?,?,004779E8), ref: 00475581
      • Part of subcall function 0047554A: CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,0047790E,?,00000004,SeTcbPrivilege,SeDebugPrivilege,SeShutdownPrivilege,?,?,004779E8), ref: 0047558E
      • Part of subcall function 0047636B: GetLogicalDrives.KERNEL32 ref: 0047637A
      • Part of subcall function 0047636B: GetDriveTypeW.KERNELBASE(?), ref: 004763B8
      • Part of subcall function 0047636B: LocalAlloc.KERNEL32(00000040,00000050), ref: 004763C7
      • Part of subcall function 0047636B: CreateThread.KERNEL32(00000000,00000000,00476299,00000000,00000000,00000000), ref: 00476404
    • Sleep.KERNELBASE(?), ref: 00477BEB
      • Part of subcall function 00478A23: InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000001,00000001,80000000), ref: 00478A54
      • Part of subcall function 00478A23: ExitWindowsEx.USER32(00000006,00000000), ref: 00478A61
      • Part of subcall function 00478A23: ExitProcess.KERNEL32 ref: 00478A68
    • GetSystemDirectoryW.KERNEL32(?,0000030C), ref: 00477C0E
    • lstrcatW.KERNEL32(?,\rundll32.exe), ref: 00477C28
    • GetModuleFileNameW.KERNEL32(C:\Windows\infpub.dat,0000030C), ref: 00477C43
    • PathFindFileNameW.SHLWAPI(C:\Windows\infpub.dat), ref: 00477C51
    • wsprintfW.USER32 ref: 00477C6B
      • Part of subcall function 0047923F: VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?,?,?,?,004779FC,?,?,?), ref: 0047927B
      • Part of subcall function 0047923F: memcpy.MSVCRT ref: 00479294
      • Part of subcall function 0047923F: VirtualProtect.KERNEL32(00000000,?,00000004,?), ref: 00479303
      • Part of subcall function 0047923F: VirtualFree.KERNEL32(00000000,?,00004000), ref: 00479323
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • memset.MSVCRT ref: 00478B52
    • memset.MSVCRT ref: 00478B6F
    • GetAdaptersInfo.IPHLPAPI(00000000,?), ref: 00478B8F
    • LocalAlloc.KERNEL32(00000040,?), ref: 00478BA0
    • GetAdaptersInfo.IPHLPAPI(00000000,?), ref: 00478BBA
    • inet_addr.WS2_32(000001B0), ref: 00478BDF
    • inet_addr.WS2_32(000001C0), ref: 00478BF3
      • Part of subcall function 0047641A: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,774E2D57,?,757DC426), ref: 00476439
      • Part of subcall function 0047641A: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00476446
      • Part of subcall function 0047641A: HeapAlloc.KERNEL32(00000000), ref: 0047644D
      • Part of subcall function 0047641A: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?), ref: 00476465
    • GetProcessHeap.KERNEL32(00000000,?,?,000001B0), ref: 00478C24
    • HeapFree.KERNEL32(00000000), ref: 00478C2B
    • GetProcessHeap.KERNEL32(00000000,?,?,00000200,000001B0), ref: 00478C5C
    • HeapFree.KERNEL32(00000000), ref: 00478C63
      • Part of subcall function 00477D4E: NetServerGetInfo.NETAPI32(00000000,00000065,?,73349263,?,?,00478C7C), ref: 00477D5F
      • Part of subcall function 00477D4E: NetApiBufferFree.NETAPI32(?,?,?,00478C7C), ref: 00477D82
    • CloseHandle.KERNEL32(?), ref: 00478D17
      • Part of subcall function 00478D39: GetComputerNameExW.KERNEL32(00000004,?,?,00000000,73349263,00000000), ref: 00478D80
      • Part of subcall function 00478D39: DhcpEnumSubnets.DHCPSAPI(?,?,00000400,?,?,?), ref: 00478DA2
      • Part of subcall function 00478D39: DhcpGetSubnetInfo.DHCPSAPI(00000000,?,?), ref: 00478DCE
      • Part of subcall function 00478D39: DhcpEnumSubnetClients.DHCPSAPI(00000000,?,?,00010000,00000400,?,?), ref: 00478E07
      • Part of subcall function 00478D39: htonl.WS2_32(00000000), ref: 00478E36
      • Part of subcall function 00478D39: htonl.WS2_32(00000000), ref: 00478E44
      • Part of subcall function 00478D39: inet_ntoa.WS2_32(00000000), ref: 00478E47
      • Part of subcall function 00478D39: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000), ref: 00478E65
      • Part of subcall function 00478D39: HeapFree.KERNEL32(00000000), ref: 00478E6C
      • Part of subcall function 00478D39: DhcpRpcFreeMemory.DHCPSAPI(00000400), ref: 00478E81
      • Part of subcall function 00478D39: DhcpRpcFreeMemory.DHCPSAPI(?), ref: 00478E9A
    • LocalAlloc.KERNEL32(00000040,0000000C), ref: 00478C98
    • inet_addr.WS2_32(255.255.255.255), ref: 00478CA9
    • htonl.WS2_32(?), ref: 00478CD0
    • htonl.WS2_32(?), ref: 00478CD8
    • CreateThread.KERNEL32(00000000,00000000,Function_00008AB3,00000000,00000000,00000000), ref: 00478CED
    • LocalFree.KERNEL32(?), ref: 00478D28
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetCurrentProcess.KERNEL32(?,?,00000000,?,00477AF8), ref: 00477164
      • Part of subcall function 00476F7C: GetModuleHandleW.KERNEL32(kernel32.dll,IsWow64Process,?,?,00477170,00000000,?,00477AF8), ref: 00476F8E
      • Part of subcall function 00476F7C: GetProcAddress.KERNEL32(00000000,?,?,00477170,00000000,?,00477AF8), ref: 00476F95
      • Part of subcall function 00476F7C: IsWow64Process.KERNELBASE(?,00000000,?,?,00477170,00000000,?,00477AF8), ref: 00476FA6
      • Part of subcall function 00478313: FindResourceW.KERNEL32(?,00000006,00000000), ref: 0047832A
      • Part of subcall function 00478313: LoadResource.KERNEL32(00000000), ref: 00478341
      • Part of subcall function 00478313: LockResource.KERNEL32(00000000), ref: 00478350
      • Part of subcall function 00478313: SizeofResource.KERNEL32(00000000), ref: 00478368
      • Part of subcall function 00478313: GetProcessHeap.KERNEL32(00000000,00000000,?,00000002), ref: 00478384
      • Part of subcall function 00478313: RtlAllocateHeap.NTDLL(00000000,?,00000002), ref: 0047838D
      • Part of subcall function 00478313: memcpy.MSVCRT ref: 0047839C
      • Part of subcall function 00478313: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00000002), ref: 004783B9
      • Part of subcall function 00478313: RtlAllocateHeap.NTDLL(00000000,?,?,?,00000002), ref: 004783BC
      • Part of subcall function 00478313: GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,00000004,?,?,?,?,00000002), ref: 004783FE
      • Part of subcall function 00478313: HeapFree.KERNEL32(00000000), ref: 00478401
      • Part of subcall function 00478313: GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,00000002), ref: 0047840A
      • Part of subcall function 00478313: HeapFree.KERNEL32(00000000), ref: 0047840D
    • GetTempFileNameW.KERNELBASE(?,00000000,00000000,?,00000000,?,00477AF8), ref: 004771AA
    • CoCreateGuid.OLE32(?), ref: 004771C8
    • StringFromCLSID.OLE32(?,?), ref: 004771E1
      • Part of subcall function 00476FAF: CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000002,00000000), ref: 00476FC5
      • Part of subcall function 00476FAF: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00476FDF
      • Part of subcall function 00476FAF: CloseHandle.KERNEL32(00000000), ref: 00476FF0
    • wsprintfW.USER32 ref: 0047721F
    • CreateThread.KERNEL32(00000000,00000000,00476FFE,?,00000000,00000000), ref: 00477236
    • memset.MSVCRT ref: 00477259
    • wsprintfW.USER32 ref: 00477281
    • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 004772A6
    • WaitForSingleObject.KERNEL32(?,0000EA60), ref: 004772B8
      • Part of subcall function 00476CC8: EnterCriticalSection.KERNEL32(002F16E0,00477B03), ref: 00476CCD
      • Part of subcall function 00476CC8: InterlockedExchange.KERNEL32(002F1708,00000001), ref: 00476CD9
      • Part of subcall function 00476CC8: LeaveCriticalSection.KERNEL32(002F16E0), ref: 00476CE0
    • TerminateThread.KERNELBASE(?,00000000), ref: 004772CD
    • CloseHandle.KERNEL32(?), ref: 004772D6
    • DeleteFileW.KERNELBASE(?,?,?), ref: 00477306
    • CoTaskMemFree.OLE32(?), ref: 0047730F
    • GetProcessHeap.KERNEL32(00000000,?,?,00477AF8), ref: 0047732C
    • HeapFree.KERNEL32(00000000,?,00477AF8), ref: 00477333
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000FFFF,00000000,757DFE8D,?,?,?,?,?,?,?,?), ref: 004721F5
    • HeapAlloc.KERNEL32(00000000), ref: 004721FE
    • GetProcessHeap.KERNEL32(00000008,0000002D,?), ref: 00472210
    • HeapAlloc.KERNEL32(00000000), ref: 00472213
    • htons.WS2_32(00000029), ref: 0047222E
    • send.WS2_32(?,?,0000002D,00000000), ref: 00472255
    • recv.WS2_32(?,?,0000FFFF,00000000), ref: 00472271
    • memset.MSVCRT ref: 00472297
    • GetProcessHeap.KERNEL32(00000008,00000027), ref: 004722A3
    • HeapAlloc.KERNEL32(00000000), ref: 004722A6
    • htons.WS2_32(00000023), ref: 004722C1
    • send.WS2_32(?,?,00000027,00000000), ref: 004722DA
    • recv.WS2_32(?,?,0000FFFF,00000000), ref: 004722F2
    • GetProcessHeap.KERNEL32(00000008,?), ref: 00472314
    • HeapFree.KERNEL32(00000000), ref: 00472317
    • GetProcessHeap.KERNEL32(00000008,?), ref: 00472323
    • HeapFree.KERNEL32(00000000), ref: 00472326
    • GetProcessHeap.KERNEL32(00000008,?), ref: 00472331
    • HeapFree.KERNEL32(00000000), ref: 00472334
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000090,?,?,00000000,00000000,?,00000000,00000000,?), ref: 004746E4
    • HeapAlloc.KERNEL32(00000000), ref: 004746E7
      • Part of subcall function 00472497: GetProcessHeap.KERNEL32(00000008,0000FFFF,?,00000000,?,?,?,0047471C,?,?,?,?,?), ref: 004724AF
      • Part of subcall function 00472497: HeapAlloc.KERNEL32(00000000,?,?,?,0047471C,?,?,?,?,?), ref: 004724B8
      • Part of subcall function 00472497: GetProcessHeap.KERNEL32(00000008,00001124,757DFE8D,?,?,?,0047471C,?,?,?,?,?), ref: 004724CD
      • Part of subcall function 00472497: HeapAlloc.KERNEL32(00000000,?,?,?,0047471C,?,?,?,?,?), ref: 004724D0
      • Part of subcall function 00472497: rand.MSVCRT ref: 004724E1
      • Part of subcall function 00472497: htons.WS2_32(00001120), ref: 004724FF
      • Part of subcall function 00472497: rand.MSVCRT ref: 0047255F
      • Part of subcall function 00472497: GetProcessHeap.KERNEL32(00000008,00000160,?,?,?,0047471C,?,?,?,?,?), ref: 00472576
      • Part of subcall function 00472497: HeapAlloc.KERNEL32(00000000,?,?,?,0047471C,?,?,?,?,?), ref: 0047257D
      • Part of subcall function 00472497: htons.WS2_32(0000015C), ref: 0047259F
      • Part of subcall function 00472497: rand.MSVCRT ref: 004725CD
      • Part of subcall function 00472497: GetProcessHeap.KERNEL32(00000008,00001284,?,?,?,0047471C,?,?,?,?,?), ref: 004725E4
      • Part of subcall function 00472497: HeapAlloc.KERNEL32(00000000,?,?,?,0047471C,?,?,?,?,?), ref: 004725EB
      • Part of subcall function 00472497: memcpy.MSVCRT ref: 00472605
      • Part of subcall function 00472497: memcpy.MSVCRT ref: 00472617
      • Part of subcall function 00472497: send.WS2_32(?,00000000,0000111C,00000000), ref: 00472630
      • Part of subcall function 00472497: send.WS2_32(?,?,00000168,00000000), ref: 0047264D
      • Part of subcall function 00472497: recv.WS2_32(?,?,0000FFFF,00000000), ref: 00472697
      • Part of subcall function 00472497: GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,?,0047471C,?,?,?,?,?), ref: 004726BF
      • Part of subcall function 00472497: HeapFree.KERNEL32(00000000), ref: 004726C6
      • Part of subcall function 00472497: GetProcessHeap.KERNEL32(00000008,?,?,?,?,0047471C,?,?,?,?,?), ref: 004726CF
      • Part of subcall function 00472497: HeapFree.KERNEL32(00000000), ref: 004726D6
      • Part of subcall function 00472497: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,0047471C,?,?,?,?,?), ref: 004726DF
      • Part of subcall function 00472497: HeapFree.KERNEL32(00000000), ref: 004726E6
      • Part of subcall function 00472497: GetProcessHeap.KERNEL32(00000008,?,?,?,?,0047471C,?,?,?,?,?), ref: 004726F1
      • Part of subcall function 00472497: HeapFree.KERNEL32(00000000), ref: 004726F8
      • Part of subcall function 004729A2: GetProcessHeap.KERNEL32(00000008,0000FFFF,?,00000000,757DFE8D,?,00474775), ref: 004729BF
      • Part of subcall function 004729A2: HeapAlloc.KERNEL32(00000000,?,00474775), ref: 004729C8
      • Part of subcall function 004729A2: GetProcessHeap.KERNEL32(00000008,00001124,?,00474775), ref: 004729DC
      • Part of subcall function 004729A2: HeapAlloc.KERNEL32(00000000,?,00474775), ref: 004729DF
      • Part of subcall function 004729A2: rand.MSVCRT ref: 004729F0
      • Part of subcall function 004729A2: htons.WS2_32(00000050), ref: 00472A25
      • Part of subcall function 004729A2: rand.MSVCRT ref: 00472A7E
      • Part of subcall function 004729A2: rand.MSVCRT ref: 00472A96
      • Part of subcall function 004729A2: send.WS2_32(00000000,00000000,00000054,00000000), ref: 00472ABB
      • Part of subcall function 004729A2: recv.WS2_32(00000000,?,0000FFFF,00000000), ref: 00472AD2
      • Part of subcall function 004729A2: rand.MSVCRT ref: 00472AE7
      • Part of subcall function 004729A2: htons.WS2_32(00001120), ref: 00472B06
      • Part of subcall function 004729A2: GetProcessHeap.KERNEL32(00000008,00000160,?,00474775), ref: 00472B6A
      • Part of subcall function 004729A2: HeapAlloc.KERNEL32(00000000,?,00474775), ref: 00472B71
      • Part of subcall function 004729A2: htons.WS2_32(0000015C), ref: 00472B90
      • Part of subcall function 004729A2: rand.MSVCRT ref: 00472BBE
      • Part of subcall function 004729A2: GetProcessHeap.KERNEL32(00000008,00000048,?,00474775), ref: 00472BD2
      • Part of subcall function 004729A2: HeapAlloc.KERNEL32(00000000,?,00474775), ref: 00472BD9
      • Part of subcall function 004729A2: htons.WS2_32(00000044), ref: 00472BF8
      • Part of subcall function 004729A2: GetProcessHeap.KERNEL32(00000008,00001638,?,00474775), ref: 00472C58
      • Part of subcall function 004729A2: HeapAlloc.KERNEL32(00000000,?,00474775), ref: 00472C5F
      • Part of subcall function 004729A2: memcpy.MSVCRT ref: 00472C79
      • Part of subcall function 004729A2: memcpy.MSVCRT ref: 00472C90
      • Part of subcall function 004729A2: htons.WS2_32(00000050), ref: 00472C9A
      • Part of subcall function 004729A2: memcpy.MSVCRT ref: 00472D17
      • Part of subcall function 004729A2: send.WS2_32(00000004,00000004,0000111C,0000000B), ref: 00472D37
      • Part of subcall function 004729A2: send.WS2_32(00000004,-00001118,0000051C,0000000B), ref: 00472D4F
      • Part of subcall function 004729A2: recv.WS2_32(00000004,?,0000FFFF,0000000B), ref: 00472D86
      • Part of subcall function 004729A2: GetProcessHeap.KERNEL32(00000008,00000004,?,?,?,?,?,?,?,?,?,?,00474775), ref: 00472DB3
      • Part of subcall function 004729A2: HeapFree.KERNEL32(00000000), ref: 00472DBA
      • Part of subcall function 004729A2: GetProcessHeap.KERNEL32(00000008,?,?,00474775), ref: 00472DC6
      • Part of subcall function 004729A2: HeapFree.KERNEL32(00000000,?,00474775), ref: 00472DCD
      • Part of subcall function 004729A2: GetProcessHeap.KERNEL32(00000008,?,?,00474775), ref: 00472DD9
      • Part of subcall function 004729A2: HeapFree.KERNEL32(00000000,?,00474775), ref: 00472DE0
      • Part of subcall function 004729A2: GetProcessHeap.KERNEL32(00000008,00000000,?,00474775), ref: 00472DE9
      • Part of subcall function 004729A2: HeapFree.KERNEL32(00000000,?,00474775), ref: 00472DF0
      • Part of subcall function 004729A2: GetProcessHeap.KERNEL32(00000008,?,?,00474775), ref: 00472DFB
      • Part of subcall function 004729A2: HeapFree.KERNEL32(00000000,?,00474775), ref: 00472E02
      • Part of subcall function 004721DC: GetProcessHeap.KERNEL32(00000008,0000FFFF,00000000,757DFE8D,?,?,?,?,?,?,?,?), ref: 004721F5
      • Part of subcall function 004721DC: HeapAlloc.KERNEL32(00000000), ref: 004721FE
      • Part of subcall function 004721DC: GetProcessHeap.KERNEL32(00000008,0000002D,?), ref: 00472210
      • Part of subcall function 004721DC: HeapAlloc.KERNEL32(00000000), ref: 00472213
      • Part of subcall function 004721DC: htons.WS2_32(00000029), ref: 0047222E
      • Part of subcall function 004721DC: send.WS2_32(?,?,0000002D,00000000), ref: 00472255
      • Part of subcall function 004721DC: recv.WS2_32(?,?,0000FFFF,00000000), ref: 00472271
      • Part of subcall function 004721DC: memset.MSVCRT ref: 00472297
      • Part of subcall function 004721DC: GetProcessHeap.KERNEL32(00000008,00000027), ref: 004722A3
      • Part of subcall function 004721DC: HeapAlloc.KERNEL32(00000000), ref: 004722A6
      • Part of subcall function 004721DC: htons.WS2_32(00000023), ref: 004722C1
      • Part of subcall function 004721DC: send.WS2_32(?,?,00000027,00000000), ref: 004722DA
      • Part of subcall function 004721DC: recv.WS2_32(?,?,0000FFFF,00000000), ref: 004722F2
      • Part of subcall function 004721DC: GetProcessHeap.KERNEL32(00000008,?), ref: 00472314
      • Part of subcall function 004721DC: HeapFree.KERNEL32(00000000), ref: 00472317
      • Part of subcall function 004721DC: GetProcessHeap.KERNEL32(00000008,?), ref: 00472323
      • Part of subcall function 004721DC: HeapFree.KERNEL32(00000000), ref: 00472326
      • Part of subcall function 004721DC: GetProcessHeap.KERNEL32(00000008,?), ref: 00472331
      • Part of subcall function 004721DC: HeapFree.KERNEL32(00000000), ref: 00472334
    • Sleep.KERNEL32(000007D0,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0047478F
      • Part of subcall function 00472E12: GetProcessHeap.KERNEL32(00000008,0000FFFF,?,00000000,?), ref: 00472E32
      • Part of subcall function 00472E12: HeapAlloc.KERNEL32(00000000), ref: 00472E3B
      • Part of subcall function 00472E12: GetProcessHeap.KERNEL32(00000008,00000048,757DFE8D), ref: 00472E4D
      • Part of subcall function 00472E12: HeapAlloc.KERNEL32(00000000), ref: 00472E50
      • Part of subcall function 00472E12: htons.WS2_32(00000044), ref: 00472E68
      • Part of subcall function 00472E12: send.WS2_32(0BADF00D,00000000,00000048,00000000), ref: 00472EF3
      • Part of subcall function 00472E12: recv.WS2_32(0BADF00D,00000008,0000FFFF,00000000), ref: 00472F0B
      • Part of subcall function 00472E12: GetProcessHeap.KERNEL32(00000008,00000000), ref: 00472F31
      • Part of subcall function 00472E12: HeapFree.KERNEL32(00000000), ref: 00472F38
      • Part of subcall function 00472E12: GetProcessHeap.KERNEL32(00000008,?), ref: 00472F43
      • Part of subcall function 00472E12: HeapFree.KERNEL32(00000000), ref: 00472F4A
    • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,?,?), ref: 004747B4
    • HeapFree.KERNEL32(00000000), ref: 004747B7
      • Part of subcall function 0047317C: GetProcessHeap.KERNEL32(00000008,00000200,?,?,?,?,004747E5,?,?,00000000,?,?,?,?,?,?), ref: 0047318E
      • Part of subcall function 0047317C: HeapAlloc.KERNEL32(00000000,?,?,?,004747E5,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00473195
      • Part of subcall function 0047317C: rand.MSVCRT ref: 004731AF
      • Part of subcall function 0047317C: rand.MSVCRT ref: 004731BD
      • Part of subcall function 0047317C: GetProcessHeap.KERNEL32(00000008,?,?,00000000,000000FF,00000004,?,00000200,?,?,?,004747E5,?,?,00000000,?), ref: 004731F4
      • Part of subcall function 0047317C: HeapFree.KERNEL32(00000000), ref: 004731FB
    • GetProcessHeap.KERNEL32(00000008,00000100,?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 004747F0
    • HeapAlloc.KERNEL32(00000000), ref: 004747F9
    • GetProcessHeap.KERNEL32(00000008,00000027), ref: 00474810
    • HeapAlloc.KERNEL32(00000000), ref: 00474813
    • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00000000,00000000,00000002), ref: 00474875
    • HeapFree.KERNEL32(00000000), ref: 00474878
    • Sleep.KERNEL32(000007D0), ref: 0047488D
    • GetProcessHeap.KERNEL32(00000008,00000029), ref: 00474897
    • HeapAlloc.KERNEL32(00000000), ref: 0047489A
      • Part of subcall function 004732AF: GetProcessHeap.KERNEL32(00000008,0000FFFF,00000000,?), ref: 004732CB
      • Part of subcall function 004732AF: HeapAlloc.KERNEL32(00000000), ref: 004732D4
      • Part of subcall function 004732AF: GetProcessHeap.KERNEL32(00000008,?,757DFE8D), ref: 004732EF
      • Part of subcall function 004732AF: HeapAlloc.KERNEL32(00000000), ref: 004732F2
      • Part of subcall function 004732AF: htons.WS2_32(?), ref: 0047330F
      • Part of subcall function 004732AF: memcpy.MSVCRT ref: 0047333D
      • Part of subcall function 004732AF: send.WS2_32(?,00000000,?,00000000), ref: 00473350
      • Part of subcall function 004732AF: recv.WS2_32(?,?,0000FFFF,00000000), ref: 00473368
      • Part of subcall function 004732AF: GetProcessHeap.KERNEL32(00000008,00000000), ref: 0047337B
      • Part of subcall function 004732AF: HeapFree.KERNEL32(00000000), ref: 00473382
      • Part of subcall function 004732AF: GetProcessHeap.KERNEL32(00000008,?), ref: 0047338D
      • Part of subcall function 004732AF: HeapFree.KERNEL32(00000000), ref: 00473394
    • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00000000,00000000,?), ref: 00474911
    • HeapFree.KERNEL32(00000000), ref: 00474914
    • GetProcessHeap.KERNEL32(00000008,00000013), ref: 004749D2
    • HeapAlloc.KERNEL32(00000000), ref: 004749D5
      • Part of subcall function 004733A4: GetProcessHeap.KERNEL32(00000008,?,00000000,?,?,?,00473745,?,?,?,00000000,00000000,?,?,?,00474A6E), ref: 004733BB
      • Part of subcall function 004733A4: HeapAlloc.KERNEL32(00000000,?,00473745,?,?,?,00000000,00000000,?,?,?,00474A6E,?,?,?,?), ref: 004733C2
      • Part of subcall function 004733A4: htons.WS2_32(?), ref: 004733E1
      • Part of subcall function 004733A4: memcpy.MSVCRT ref: 00473410
      • Part of subcall function 004733A4: send.WS2_32(?,00000000,?,00000000), ref: 00473421
      • Part of subcall function 004733A4: GetProcessHeap.KERNEL32(00000008,00000000), ref: 00473434
      • Part of subcall function 004733A4: HeapFree.KERNEL32(00000000), ref: 0047343B
      • Part of subcall function 00473680: GetProcessHeap.KERNEL32(00000008,00000100,00000000,?,757DFE8D,?,?,00474A6E,?,?,?,?,00000000,?), ref: 00473698
      • Part of subcall function 00473680: HeapAlloc.KERNEL32(00000000,?,?,00474A6E,?,?,?,?,00000000,?), ref: 004736A1
      • Part of subcall function 00473680: GetProcessHeap.KERNEL32(00000008,00000027,?,?,00474A6E,?,?,?,?,00000000,?), ref: 004736B1
      • Part of subcall function 00473680: HeapAlloc.KERNEL32(00000000,?,?,00474A6E,?,?,?,?,00000000,?), ref: 004736B4
      • Part of subcall function 00473680: GetProcessHeap.KERNEL32(00000008,00000013,?,?,00474A6E,?,?,?,?,00000000,?), ref: 004736C7
      • Part of subcall function 00473680: HeapAlloc.KERNEL32(00000000,?,?,00474A6E,?,?,?,?,00000000,?), ref: 004736CA
      • Part of subcall function 00473680: Sleep.KERNEL32(000007D0,?,?,?,00000000,00000000,?,?,?,00474A6E,?,?,?,?,00000000,?), ref: 004737A2
      • Part of subcall function 00473680: Sleep.KERNEL32(000007D0,?,?,?,00000000,00000000,00000005,?,?,00474A6E,?,?,?,?,00000000,?), ref: 0047388D
      • Part of subcall function 00473680: GetProcessHeap.KERNEL32(00000008,0000FFFF,?,?,?,00000000,00000000,?,?,?,?,00000000,00000000,?), ref: 0047393B
      • Part of subcall function 00473680: HeapAlloc.KERNEL32(00000000,?,?,00474A6E,?,?,?,?,00000000,?), ref: 00473942
      • Part of subcall function 00473680: memset.MSVCRT ref: 00473958
      • Part of subcall function 00473680: recv.WS2_32(?,00000000,0000FFFF,00000000), ref: 0047398D
      • Part of subcall function 00473680: htons.WS2_32(?), ref: 004739AD
      • Part of subcall function 00473680: Sleep.KERNEL32(000007D0,?,?,00000000,00000000,00000000,?), ref: 00473A95
      • Part of subcall function 00473680: rand.MSVCRT ref: 00473AA3
      • Part of subcall function 00473680: Sleep.KERNEL32(000007D0,?,?,00000000,00000000,00000000,?), ref: 00473B18
      • Part of subcall function 00473680: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00000000,00000000,?), ref: 00473B27
      • Part of subcall function 00473680: HeapFree.KERNEL32(00000000), ref: 00473B2E
      • Part of subcall function 00473680: Sleep.KERNEL32(000007D0,?,?,?,00000000,00000000,?,?,?,00474A6E,?,?,?,?,00000000,?), ref: 00473BB7
      • Part of subcall function 00473680: Sleep.KERNEL32(000007D0,?,?,?,00000000,00000000,?,?,?,00474A6E,?,?,?,?,00000000,?), ref: 00473C64
      • Part of subcall function 00473680: rand.MSVCRT ref: 00473C89
      • Part of subcall function 00473680: Sleep.KERNEL32(000007D0,?,?,?,00000000,00000000,?,?,?,00474A6E,?,?,?,?,00000000,?), ref: 00473CC7
      • Part of subcall function 00473680: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00000000,00000000,?,?,?,00474A6E,?,?,?,?,00000000), ref: 00473CD4
      • Part of subcall function 00473680: HeapFree.KERNEL32(00000000), ref: 00473CDB
      • Part of subcall function 00473680: GetProcessHeap.KERNEL32(00000008,00000000,?,?,00474A6E,?,?,?,?,00000000,?), ref: 00473CE4
      • Part of subcall function 00473680: HeapFree.KERNEL32(00000000), ref: 00473CEB
      • Part of subcall function 00473680: GetProcessHeap.KERNEL32(00000008,00000000,?,?,00474A6E,?,?,?,?,00000000,?), ref: 00473CFA
      • Part of subcall function 00473680: HeapFree.KERNEL32(00000000), ref: 00473CFD
      • Part of subcall function 004741E9: GetProcessHeap.KERNEL32(00000008,00000100,00000000,?,757DFE8D), ref: 004741FD
      • Part of subcall function 004741E9: HeapAlloc.KERNEL32(00000000), ref: 00474204
      • Part of subcall function 004741E9: GetProcessHeap.KERNEL32(00000008,00000000,?,00000000,?,?,?,00000000,00000100,?,?,?,?,?,00000000,00000002), ref: 00474287
      • Part of subcall function 004741E9: HeapFree.KERNEL32(00000000), ref: 0047428E
      • Part of subcall function 004741E9: GetProcessHeap.KERNEL32(00000008,00000000,?,00000000,?,?,?,00000000,00000008,?), ref: 004742D9
      • Part of subcall function 004741E9: HeapFree.KERNEL32(00000000), ref: 004742E0
      • Part of subcall function 004741E9: GetProcessHeap.KERNEL32(00000008,00000000,?,00000000,?,?,?,00000000,00000008,?), ref: 00474336
      • Part of subcall function 004741E9: HeapFree.KERNEL32(00000000), ref: 0047433D
      • Part of subcall function 004741E9: GetProcessHeap.KERNEL32(00000008,00000000,?,00000000,?,757DFE8D,?,00000000,00000100,?), ref: 00474399
      • Part of subcall function 004741E9: HeapFree.KERNEL32(00000000), ref: 004743A0
      • Part of subcall function 004741E9: memset.MSVCRT ref: 004743AE
      • Part of subcall function 004741E9: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,?,00000000,00000002), ref: 0047466C
      • Part of subcall function 004741E9: HeapFree.KERNEL32(00000000), ref: 00474673
      • Part of subcall function 00473209: GetProcessHeap.KERNEL32(00000008,?,00000000,?,?,?,00473BAA,?,?,?,00000000,00000000,?,?,?,00474A6E), ref: 00473220
      • Part of subcall function 00473209: HeapAlloc.KERNEL32(00000000,?,00473BAA,?,?,?,00000000,00000000,?,?,?,00474A6E,?,?,?,?), ref: 00473227
      • Part of subcall function 00473209: htons.WS2_32(?), ref: 00473246
      • Part of subcall function 00473209: memcpy.MSVCRT ref: 00473276
      • Part of subcall function 00473209: send.WS2_32(?,00000000,?,00000000), ref: 00473287
      • Part of subcall function 00473209: GetProcessHeap.KERNEL32(00000008,00000000), ref: 0047329A
      • Part of subcall function 00473209: HeapFree.KERNEL32(00000000), ref: 004732A1
    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00474A96
    • HeapFree.KERNEL32(00000000), ref: 00474A99
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 0047A1EB
    • HeapAlloc.KERNEL32(00000000), ref: 0047A1F4
    • GetProcessHeap.KERNEL32(00000008,00000021), ref: 0047A209
    • HeapAlloc.KERNEL32(00000000), ref: 0047A20C
    • CreateThread.KERNEL32(00000000,00000000,Function_0000A112,00000000,00000000,00000000), ref: 0047A258
    • GetModuleHandleA.KERNEL32(kernel32,WaitForMultipleObjects,00000000), ref: 0047A290
    • GetProcAddress.KERNEL32(00000000), ref: 0047A297
    • CloseHandle.KERNEL32(00000000), ref: 0047A2E1
    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 0047A2EE
    • HeapAlloc.KERNEL32(00000000), ref: 0047A2F1
    • GetProcessHeap.KERNEL32(00000008,00000021), ref: 0047A2FD
    • HeapAlloc.KERNEL32(00000000), ref: 0047A300
      • Part of subcall function 00476B46: GetProcessHeap.KERNEL32(00000000,"gG,?,00476722,?), ref: 00476B4E
      • Part of subcall function 00476B46: HeapFree.KERNEL32(00000000,?,00476722), ref: 00476B55
      • Part of subcall function 0047A016: GetCurrentThread.KERNEL32(0000000B,00000001,?), ref: 0047A035
      • Part of subcall function 0047A016: OpenThreadToken.ADVAPI32(00000000), ref: 0047A03C
      • Part of subcall function 0047A016: DuplicateTokenEx.ADVAPI32(02000000,02000000,00000000,00000002,00000002,?), ref: 0047A059
      • Part of subcall function 0047A016: CloseHandle.KERNEL32(?), ref: 0047A0F5
      • Part of subcall function 0047A016: CloseHandle.KERNEL32(0000FFFF), ref: 0047A105
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000FFFF,?,00000000,00000000,00475414,00000000,?,0BADF00D,?,?,?,?,0047943A,?), ref: 00471CBD
    • RtlAllocateHeap.NTDLL(00000000,?,?,?,?,0047943A,?), ref: 00471CC6
    • GetProcessHeap.KERNEL32(00000008,00000033,?,?,?,?,0047943A,?), ref: 00471CD7
    • HeapAlloc.KERNEL32(00000000,?,?,?,?,0047943A,?), ref: 00471CDA
    • htons.WS2_32(0000002F), ref: 00471CF7
    • send.WS2_32(00000033,00000000,00000033,00000000), ref: 00471D26
    • recv.WS2_32(0000FFFF,?,0000FFFF,00000000), ref: 00471D3D
      • Part of subcall function 00471747: GetProcessHeap.KERNEL32(00000008,?,00000000,002F16E0,00000000,00471C7A,00000000,?,00000000,00000000,?,?,00000003,00000000,?,00000000), ref: 00471783
      • Part of subcall function 00471747: HeapAlloc.KERNEL32(00000000), ref: 0047178C
      • Part of subcall function 00471747: CharUpperW.USER32(00000000), ref: 004717B2
      • Part of subcall function 00471747: GetProcessHeap.KERNEL32(00000008,00000086), ref: 004717DA
      • Part of subcall function 00471747: HeapAlloc.KERNEL32(00000000), ref: 004717DD
      • Part of subcall function 00471747: htons.WS2_32(00000082), ref: 00471801
      • Part of subcall function 00471747: send.WS2_32(00000086,?,00000086,00000041), ref: 00471863
      • Part of subcall function 00471747: recv.WS2_32(0000FFFF,?,0000FFFF,00000000), ref: 0047187F
      • Part of subcall function 00471747: GetProcessHeap.KERNEL32(00000008,00000018), ref: 004718F4
      • Part of subcall function 00471747: HeapAlloc.KERNEL32(00000000), ref: 004718FD
      • Part of subcall function 00471747: GetProcessHeap.KERNEL32(00000008,00000010,?,00000000,?,00008003,00008003,?,?,00000000,?,00008002), ref: 00471958
      • Part of subcall function 00471747: HeapAlloc.KERNEL32(00000000), ref: 0047195B
      • Part of subcall function 00471747: rand.MSVCRT ref: 00471983
      • Part of subcall function 00471747: GetProcessHeap.KERNEL32(00000008,00000018,?,00000010,?,?,00008003), ref: 004719B8
      • Part of subcall function 00471747: HeapAlloc.KERNEL32(00000000), ref: 004719BB
      • Part of subcall function 00471747: GetProcessHeap.KERNEL32(00000008,00000000), ref: 00471A13
      • Part of subcall function 00471747: HeapAlloc.KERNEL32(00000000), ref: 00471A16
      • Part of subcall function 00471747: htons.WS2_32(-000000FC), ref: 00471A39
      • Part of subcall function 00471747: memcpy.MSVCRT ref: 00471B48
      • Part of subcall function 00471747: send.WS2_32(?,00000000,00000000,00000000), ref: 00471B7A
      • Part of subcall function 00471747: recv.WS2_32(?,?,0000FFFF,00000000), ref: 00471B93
      • Part of subcall function 00471747: memset.MSVCRT ref: 00471BAB
      • Part of subcall function 00471747: GetProcessHeap.KERNEL32(00000008,00000000), ref: 00471BB6
      • Part of subcall function 00471747: HeapFree.KERNEL32(00000000), ref: 00471BBD
      • Part of subcall function 00471747: GetProcessHeap.KERNEL32(00000008,00000000), ref: 00471BC8
      • Part of subcall function 00471747: HeapFree.KERNEL32(00000000), ref: 00471BCF
      • Part of subcall function 00471747: GetProcessHeap.KERNEL32(00000008,?), ref: 00471BE3
      • Part of subcall function 00471747: HeapFree.KERNEL32(00000000), ref: 00471BE6
      • Part of subcall function 00471747: GetProcessHeap.KERNEL32(00000008,?,?,00000010,?,?,00008003), ref: 00471BF1
      • Part of subcall function 00471747: HeapFree.KERNEL32(00000000), ref: 00471BF4
      • Part of subcall function 00471747: GetProcessHeap.KERNEL32(00000008,?), ref: 00471BFF
      • Part of subcall function 00471747: HeapFree.KERNEL32(00000000), ref: 00471C02
      • Part of subcall function 00471747: GetProcessHeap.KERNEL32(00000008,?,?,?,00000000,?,00008002), ref: 00471C0D
      • Part of subcall function 00471747: HeapFree.KERNEL32(00000000), ref: 00471C10
      • Part of subcall function 00471747: GetProcessHeap.KERNEL32(00000008,?), ref: 00471C19
      • Part of subcall function 00471747: HeapFree.KERNEL32(00000000), ref: 00471C1C
      • Part of subcall function 00471747: GetProcessHeap.KERNEL32(00000008,?), ref: 00471C27
      • Part of subcall function 00471747: HeapFree.KERNEL32(00000000), ref: 00471C2A
    • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,?,0047943A,?), ref: 00471DA8
    • HeapFree.KERNEL32(00000000), ref: 00471DAF
    • GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,0047943A,?), ref: 00471DBA
    • HeapFree.KERNEL32(00000000), ref: 00471DC1
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • FreeLibrary.KERNEL32 ref: 00479161
    • CreateFileW.KERNEL32(C:\Windows\infpub.dat,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00479198
    • GetFileSize.KERNEL32(00000000,00000000), ref: 004791A3
    • CloseHandle.KERNEL32(?), ref: 004791AF
    • CreateFileW.KERNEL32(C:\Windows\infpub.dat,40000000,00000000,00000000,00000002,00000000,00000000), ref: 004791C1
    • GetProcessHeap.KERNEL32(00000008,?), ref: 004791D5
    • RtlAllocateHeap.NTDLL(00000000), ref: 004791D8
    • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 004791F1
    • GetProcessHeap.KERNEL32(00000000,?), ref: 004791FB
    • HeapFree.KERNEL32(00000000), ref: 004791FE
    • CloseHandle.KERNEL32(?), ref: 00479207
    • DeleteFileW.KERNELBASE(C:\Windows\infpub.dat), ref: 0047920E
      • Part of subcall function 00479016: VirtualProtect.KERNELBASE(?,?,00000004,?), ref: 00479090
      • Part of subcall function 00479016: LoadLibraryA.KERNEL32(?), ref: 004790BA
      • Part of subcall function 00479016: GetProcAddress.KERNEL32(00000000,00470000), ref: 004790FD
      • Part of subcall function 00479016: VirtualProtect.KERNELBASE(?,?,?,?), ref: 0047913D
    • ExitProcess.KERNEL32 ref: 00479234
      • Part of subcall function 004779D7: ExitProcess.KERNEL32 ref: 00477A07
      • Part of subcall function 004779D7: WSAStartup.WS2_32(00000202,004881E0), ref: 00477A3D
      • Part of subcall function 004779D7: InitializeCriticalSection.KERNEL32(00487B9C,00000008,004767F9,0047682F,000000FF,00000024,00476AA8,00000000,0000FFFF), ref: 00477A80
      • Part of subcall function 004779D7: CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,000000FF,?,?), ref: 00477AAD
      • Part of subcall function 004779D7: CreateThread.KERNEL32(00000000,00000000,00478A6F,00000000,00000000,00000000), ref: 00477AC6
      • Part of subcall function 004779D7: CreateThread.KERNEL32(00000000,00000000,004777D1,00000000,00000000,00000000), ref: 00477ADF
      • Part of subcall function 004779D7: CreateThread.KERNEL32(00000000,00000000,0047A1A9,00000000,00000000,00000000), ref: 00477B78
      • Part of subcall function 004779D7: Sleep.KERNELBASE(?,000000FF), ref: 00477B93
      • Part of subcall function 004779D7: Sleep.KERNELBASE(?), ref: 00477BEB
      • Part of subcall function 004779D7: GetSystemDirectoryW.KERNEL32(?,0000030C), ref: 00477C0E
      • Part of subcall function 004779D7: lstrcatW.KERNEL32(?,\rundll32.exe), ref: 00477C28
      • Part of subcall function 004779D7: GetModuleFileNameW.KERNEL32(C:\Windows\infpub.dat,0000030C), ref: 00477C43
      • Part of subcall function 004779D7: PathFindFileNameW.SHLWAPI(C:\Windows\infpub.dat), ref: 00477C51
      • Part of subcall function 004779D7: wsprintfW.USER32 ref: 00477C6B
      • Part of subcall function 004779D7: CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00477CB3
      • Part of subcall function 004779D7: ExitProcess.KERNEL32 ref: 00477CBA
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000024,0000FDE9,757DF0AA,00000000,?,?,?,?,0047943A,?), ref: 0047534B
    • HeapAlloc.KERNEL32(00000000,?,?,?,?,0047943A,?), ref: 00475352
    • rand.MSVCRT ref: 00475388
    • rand.MSVCRT ref: 004753A8
    • socket.WS2_32(00000002,00000001,00000006), ref: 004753B4
    • htons.WS2_32(000001BD), ref: 004753DA
    • inet_addr.WS2_32(?), ref: 004753E7
    • connect.WS2_32(00000000,?,00000010), ref: 004753F7
    • closesocket.WS2_32(00000000), ref: 004754E7
      • Part of subcall function 00471CA3: GetProcessHeap.KERNEL32(00000008,0000FFFF,?,00000000,00000000,00475414,00000000,?,0BADF00D,?,?,?,?,0047943A,?), ref: 00471CBD
      • Part of subcall function 00471CA3: RtlAllocateHeap.NTDLL(00000000,?,?,?,?,0047943A,?), ref: 00471CC6
      • Part of subcall function 00471CA3: GetProcessHeap.KERNEL32(00000008,00000033,?,?,?,?,0047943A,?), ref: 00471CD7
      • Part of subcall function 00471CA3: HeapAlloc.KERNEL32(00000000,?,?,?,?,0047943A,?), ref: 00471CDA
      • Part of subcall function 00471CA3: htons.WS2_32(0000002F), ref: 00471CF7
      • Part of subcall function 00471CA3: send.WS2_32(00000033,00000000,00000033,00000000), ref: 00471D26
      • Part of subcall function 00471CA3: recv.WS2_32(0000FFFF,?,0000FFFF,00000000), ref: 00471D3D
      • Part of subcall function 00471CA3: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,?,0047943A,?), ref: 00471DA8
      • Part of subcall function 00471CA3: HeapFree.KERNEL32(00000000), ref: 00471DAF
      • Part of subcall function 00471CA3: GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,0047943A,?), ref: 00471DBA
      • Part of subcall function 00471CA3: HeapFree.KERNEL32(00000000), ref: 00471DC1
      • Part of subcall function 00471DD1: GetProcessHeap.KERNEL32(00000008,0000FFFF,?,00000000,?,?,?,004754D7,00000000,?,00000000,?,00000000,00000000,?,0BADF00D), ref: 00471DE9
      • Part of subcall function 00471DD1: HeapAlloc.KERNEL32(00000000,?,?,?,004754D7,00000000,?,00000000,?,00000000,00000000,?,0BADF00D), ref: 00471DF2
      • Part of subcall function 00471DD1: GetProcessHeap.KERNEL32(00000008,0000002B,00000000,?,?,?,004754D7,00000000,?,00000000,?,00000000,00000000,?,0BADF00D), ref: 00471E04
      • Part of subcall function 00471DD1: HeapAlloc.KERNEL32(00000000,?,?,?,004754D7,00000000,?,00000000,?,00000000,00000000,?,0BADF00D), ref: 00471E07
      • Part of subcall function 00471DD1: htons.WS2_32(00000027), ref: 00471E21
      • Part of subcall function 00471DD1: send.WS2_32(?,00000000,0000002B,00000000), ref: 00471E4A
      • Part of subcall function 00471DD1: recv.WS2_32(?,?,0000FFFF,00000000), ref: 00471E63
      • Part of subcall function 00471DD1: memset.MSVCRT ref: 00471E81
      • Part of subcall function 00471DD1: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,004754D7,00000000,?,00000000,?,00000000,00000000,?,0BADF00D), ref: 00471E90
      • Part of subcall function 00471DD1: HeapFree.KERNEL32(00000000), ref: 00471E97
      • Part of subcall function 00471DD1: GetProcessHeap.KERNEL32(00000008,?,?,?,?,004754D7,00000000,?,00000000,?,00000000,00000000,?,0BADF00D), ref: 00471EA2
      • Part of subcall function 00471DD1: HeapFree.KERNEL32(00000000), ref: 00471EA9
      • Part of subcall function 004746C7: GetProcessHeap.KERNEL32(00000008,00000090,?,?,00000000,00000000,?,00000000,00000000,?), ref: 004746E4
      • Part of subcall function 004746C7: HeapAlloc.KERNEL32(00000000), ref: 004746E7
      • Part of subcall function 004746C7: Sleep.KERNEL32(000007D0,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0047478F
      • Part of subcall function 004746C7: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,?,?), ref: 004747B4
      • Part of subcall function 004746C7: HeapFree.KERNEL32(00000000), ref: 004747B7
      • Part of subcall function 004746C7: GetProcessHeap.KERNEL32(00000008,00000100,?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 004747F0
      • Part of subcall function 004746C7: HeapAlloc.KERNEL32(00000000), ref: 004747F9
      • Part of subcall function 004746C7: GetProcessHeap.KERNEL32(00000008,00000027), ref: 00474810
      • Part of subcall function 004746C7: HeapAlloc.KERNEL32(00000000), ref: 00474813
      • Part of subcall function 004746C7: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00000000,00000000,00000002), ref: 00474875
      • Part of subcall function 004746C7: HeapFree.KERNEL32(00000000), ref: 00474878
      • Part of subcall function 004746C7: Sleep.KERNEL32(000007D0), ref: 0047488D
      • Part of subcall function 004746C7: GetProcessHeap.KERNEL32(00000008,00000029), ref: 00474897
      • Part of subcall function 004746C7: HeapAlloc.KERNEL32(00000000), ref: 0047489A
      • Part of subcall function 004746C7: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00000000,00000000,?), ref: 00474911
      • Part of subcall function 004746C7: HeapFree.KERNEL32(00000000), ref: 00474914
      • Part of subcall function 004746C7: GetProcessHeap.KERNEL32(00000008,00000013), ref: 004749D2
      • Part of subcall function 004746C7: HeapAlloc.KERNEL32(00000000), ref: 004749D5
      • Part of subcall function 004746C7: GetProcessHeap.KERNEL32(00000008,00000000), ref: 00474A96
      • Part of subcall function 004746C7: HeapFree.KERNEL32(00000000), ref: 00474A99
      • Part of subcall function 004721DC: GetProcessHeap.KERNEL32(00000008,0000FFFF,00000000,757DFE8D,?,?,?,?,?,?,?,?), ref: 004721F5
      • Part of subcall function 004721DC: HeapAlloc.KERNEL32(00000000), ref: 004721FE
      • Part of subcall function 004721DC: GetProcessHeap.KERNEL32(00000008,0000002D,?), ref: 00472210
      • Part of subcall function 004721DC: HeapAlloc.KERNEL32(00000000), ref: 00472213
      • Part of subcall function 004721DC: htons.WS2_32(00000029), ref: 0047222E
      • Part of subcall function 004721DC: send.WS2_32(?,?,0000002D,00000000), ref: 00472255
      • Part of subcall function 004721DC: recv.WS2_32(?,?,0000FFFF,00000000), ref: 00472271
      • Part of subcall function 004721DC: memset.MSVCRT ref: 00472297
      • Part of subcall function 004721DC: GetProcessHeap.KERNEL32(00000008,00000027), ref: 004722A3
      • Part of subcall function 004721DC: HeapAlloc.KERNEL32(00000000), ref: 004722A6
      • Part of subcall function 004721DC: htons.WS2_32(00000023), ref: 004722C1
      • Part of subcall function 004721DC: send.WS2_32(?,?,00000027,00000000), ref: 004722DA
      • Part of subcall function 004721DC: recv.WS2_32(?,?,0000FFFF,00000000), ref: 004722F2
      • Part of subcall function 004721DC: GetProcessHeap.KERNEL32(00000008,?), ref: 00472314
      • Part of subcall function 004721DC: HeapFree.KERNEL32(00000000), ref: 00472317
      • Part of subcall function 004721DC: GetProcessHeap.KERNEL32(00000008,?), ref: 00472323
      • Part of subcall function 004721DC: HeapFree.KERNEL32(00000000), ref: 00472326
      • Part of subcall function 004721DC: GetProcessHeap.KERNEL32(00000008,?), ref: 00472331
      • Part of subcall function 004721DC: HeapFree.KERNEL32(00000000), ref: 00472334
      • Part of subcall function 00471EB9: GetProcessHeap.KERNEL32(00000008,0000FFFF,00000000,00000000,00000000,00000000,?,0BADF00D,?,?,?,?,0047943A), ref: 00471ED2
      • Part of subcall function 00471EB9: HeapAlloc.KERNEL32(00000000,?,?,?,?,0047943A), ref: 00471EDB
      • Part of subcall function 00471EB9: GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,?,0047943A), ref: 00471F1F
      • Part of subcall function 00471EB9: HeapAlloc.KERNEL32(00000000,?,?,?,?,0047943A), ref: 00471F22
      • Part of subcall function 00471EB9: htons.WS2_32(?), ref: 00471F41
      • Part of subcall function 00471EB9: send.WS2_32(?,00000000,?,00000000), ref: 00471FF1
      • Part of subcall function 00471EB9: recv.WS2_32(0000FFFF,?,0000FFFF,00000000), ref: 00472008
      • Part of subcall function 00471EB9: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,?,0047943A), ref: 0047202B
      • Part of subcall function 00471EB9: HeapFree.KERNEL32(00000000), ref: 00472032
      • Part of subcall function 00471EB9: GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,0047943A), ref: 0047203D
      • Part of subcall function 00471EB9: HeapFree.KERNEL32(00000000), ref: 00472044
      • Part of subcall function 00472054: GetProcessHeap.KERNEL32(00000008,0000FFFF,?,00000000,00000000,?,0BADF00D,?,?,?,?,0047943A), ref: 0047206D
      • Part of subcall function 00472054: HeapAlloc.KERNEL32(00000000,?,?,?,?,0047943A), ref: 00472076
      • Part of subcall function 00472054: GetProcessHeap.KERNEL32(00000008,?,00000000,?,?,?,?,0047943A), ref: 0047209C
      • Part of subcall function 00472054: HeapAlloc.KERNEL32(00000000,?,?,?,?,0047943A), ref: 0047209F
      • Part of subcall function 00472054: htons.WS2_32(?), ref: 004720BC
      • Part of subcall function 00472054: send.WS2_32(?,00000000,?,00000000), ref: 00472131
      • Part of subcall function 00472054: recv.WS2_32(0000FFFF,?,0000FFFF,00000000), ref: 00472148
      • Part of subcall function 00472054: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,?,0047943A), ref: 00472168
      • Part of subcall function 00472054: HeapFree.KERNEL32(00000000), ref: 0047216F
      • Part of subcall function 00472054: GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,0047943A), ref: 0047217A
      • Part of subcall function 00472054: HeapFree.KERNEL32(00000000), ref: 00472181
      • Part of subcall function 0047516B: GetProcessHeap.KERNEL32(00000008,00000014,?,00000000,?,00000000,00000000,?,00000000,00000000,svcctl,00000001,?,00000000,00000000,IPC$), ref: 004751D3
      • Part of subcall function 0047516B: HeapAlloc.KERNEL32(00000000), ref: 004751DC
      • Part of subcall function 0047516B: GetProcessHeap.KERNEL32(00000008,00000020,?,?,?), ref: 00475205
      • Part of subcall function 0047516B: HeapAlloc.KERNEL32(00000000), ref: 00475208
      • Part of subcall function 0047516B: rand.MSVCRT ref: 0047521B
      • Part of subcall function 0047516B: rand.MSVCRT ref: 00475226
      • Part of subcall function 0047516B: rand.MSVCRT ref: 0047522F
      • Part of subcall function 0047516B: sprintf.MSVCRT ref: 00475246
      • Part of subcall function 0047516B: GetProcessHeap.KERNEL32(00000008,00000208,?,?,?,?,?,?,?,?,?,?,?,?,?,0047943A), ref: 00475252
      • Part of subcall function 0047516B: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,0047943A), ref: 00475255
      • Part of subcall function 0047516B: sprintf.MSVCRT ref: 004752AB
      • Part of subcall function 0047516B: GetProcessHeap.KERNEL32(00000008,00000000,?,00000000,00000000,00000000), ref: 00475308
      • Part of subcall function 0047516B: HeapFree.KERNEL32(00000000), ref: 0047530B
      • Part of subcall function 0047516B: GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0047943A), ref: 00475316
      • Part of subcall function 0047516B: HeapFree.KERNEL32(00000000), ref: 00475319
      • Part of subcall function 0047516B: GetProcessHeap.KERNEL32(00000008,?,?,?,?), ref: 00475324
      • Part of subcall function 0047516B: HeapFree.KERNEL32(00000000), ref: 00475327
    • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,?,0047943A,?), ref: 004754F0
    • HeapFree.KERNEL32(00000000), ref: 004754F7
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • LoadLibraryW.KERNEL32(iphlpapi.dll), ref: 0047734A
    • GetProcAddress.KERNEL32(00000000,GetExtendedTcpTable,002E8180,00000000), ref: 00477363
    • GetProcessHeap.KERNEL32(00000008,Actx ), ref: 0047737E
    • RtlAllocateHeap.NTDLL(00000000), ref: 00477385
    • wsprintfW.USER32 ref: 004773DC
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00477405
    • HeapFree.KERNEL32(00000000), ref: 0047740C
    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00477856), ref: 00477414
    • FreeLibrary.KERNEL32(002E8180), ref: 0047741D
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • wsprintfW.USER32 ref: 004780BC
    • wsprintfW.USER32 ref: 004780CC
    • wsprintfW.USER32 ref: 004780DC
    • wsprintfW.USER32 ref: 004780EC
    • wsprintfW.USER32 ref: 00478126
      • Part of subcall function 00477FB7: wsprintfW.USER32 ref: 00477FD6
      • Part of subcall function 00477FB7: GetEnvironmentVariableW.KERNEL32(ComSpec,?,0000030C), ref: 00477FFA
      • Part of subcall function 00477FB7: GetSystemDirectoryW.KERNEL32(?,0000030C), ref: 0047800C
      • Part of subcall function 00477FB7: lstrcatW.KERNEL32(?,\cmd.exe), ref: 00478022
      • Part of subcall function 00477FB7: CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00478069
      • Part of subcall function 00477FB7: Sleep.KERNELBASE(00000000), ref: 0047807F
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000FFFF,?,00000000,?,?,?,004754D7,00000000,?,00000000,?,00000000,00000000,?,0BADF00D), ref: 00471DE9
    • HeapAlloc.KERNEL32(00000000,?,?,?,004754D7,00000000,?,00000000,?,00000000,00000000,?,0BADF00D), ref: 00471DF2
    • GetProcessHeap.KERNEL32(00000008,0000002B,00000000,?,?,?,004754D7,00000000,?,00000000,?,00000000,00000000,?,0BADF00D), ref: 00471E04
    • HeapAlloc.KERNEL32(00000000,?,?,?,004754D7,00000000,?,00000000,?,00000000,00000000,?,0BADF00D), ref: 00471E07
    • htons.WS2_32(00000027), ref: 00471E21
    • send.WS2_32(?,00000000,0000002B,00000000), ref: 00471E4A
    • recv.WS2_32(?,?,0000FFFF,00000000), ref: 00471E63
    • memset.MSVCRT ref: 00471E81
    • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,004754D7,00000000,?,00000000,?,00000000,00000000,?,0BADF00D), ref: 00471E90
    • HeapFree.KERNEL32(00000000), ref: 00471E97
    • GetProcessHeap.KERNEL32(00000008,?,?,?,?,004754D7,00000000,?,00000000,?,00000000,00000000,?,0BADF00D), ref: 00471EA2
    • HeapFree.KERNEL32(00000000), ref: 00471EA9
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000FFFF,?,00000000,00000000,?,0BADF00D,?,?,?,?,0047943A), ref: 0047206D
    • HeapAlloc.KERNEL32(00000000,?,?,?,?,0047943A), ref: 00472076
    • GetProcessHeap.KERNEL32(00000008,?,00000000,?,?,?,?,0047943A), ref: 0047209C
    • HeapAlloc.KERNEL32(00000000,?,?,?,?,0047943A), ref: 0047209F
    • htons.WS2_32(?), ref: 004720BC
    • send.WS2_32(?,00000000,?,00000000), ref: 00472131
    • recv.WS2_32(0000FFFF,?,0000FFFF,00000000), ref: 00472148
    • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,?,0047943A), ref: 00472168
    • HeapFree.KERNEL32(00000000), ref: 0047216F
    • GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,0047943A), ref: 0047217A
    • HeapFree.KERNEL32(00000000), ref: 00472181
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetSystemMetrics.USER32(00002000), ref: 00478A81
    • Sleep.KERNELBASE(000001F4), ref: 00478A90
    • GetSystemMetrics.USER32(00002000), ref: 00478A93
    • SetEvent.KERNEL32(?), ref: 00478A9C
    • Sleep.KERNEL32(000003E8), ref: 00478AAB
      • Part of subcall function 00478A23: InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000001,00000001,80000000), ref: 00478A54
      • Part of subcall function 00478A23: ExitWindowsEx.USER32(00000006,00000000), ref: 00478A61
      • Part of subcall function 00478A23: ExitProcess.KERNEL32 ref: 00478A68
    • htonl.WS2_32(757DC426), ref: 00478AD4
    • htonl.WS2_32(757DC426), ref: 00478AE1
    • inet_ntoa.WS2_32(00000000), ref: 00478AE4
      • Part of subcall function 0047641A: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,774E2D57,?,757DC426), ref: 00476439
      • Part of subcall function 0047641A: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00476446
      • Part of subcall function 0047641A: HeapAlloc.KERNEL32(00000000), ref: 0047644D
      • Part of subcall function 0047641A: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?), ref: 00476465
    • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000), ref: 00478B02
    • HeapFree.KERNEL32(00000000), ref: 00478B09
    • LocalFree.KERNEL32(?,00002000,761A679F,757DC426), ref: 00478B1F
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • wsprintfW.USER32 ref: 00477FD6
    • GetEnvironmentVariableW.KERNEL32(ComSpec,?,0000030C), ref: 00477FFA
    • GetSystemDirectoryW.KERNEL32(?,0000030C), ref: 0047800C
    • lstrcatW.KERNEL32(?,\cmd.exe), ref: 00478022
    • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00478069
    • Sleep.KERNELBASE(00000000), ref: 0047807F
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
      • Part of subcall function 00477FB7: wsprintfW.USER32 ref: 00477FD6
      • Part of subcall function 00477FB7: GetEnvironmentVariableW.KERNEL32(ComSpec,?,0000030C), ref: 00477FFA
      • Part of subcall function 00477FB7: GetSystemDirectoryW.KERNEL32(?,0000030C), ref: 0047800C
      • Part of subcall function 00477FB7: lstrcatW.KERNEL32(?,\cmd.exe), ref: 00478022
      • Part of subcall function 00477FB7: CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00478069
      • Part of subcall function 00477FB7: Sleep.KERNELBASE(00000000), ref: 0047807F
    • Sleep.KERNELBASE(000007D0,schtasks /Delete /F /TN rhaegal,00000000,?,00000000), ref: 00471021
    • GetEnvironmentVariableW.KERNEL32(ComSpec,?,00000104,schtasks /Delete /F /TN rhaegal,00000000,?,00000000), ref: 00471039
    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0047104B
    • lstrcatW.KERNEL32(?,\cmd.exe), ref: 00471061
    • wsprintfW.USER32 ref: 00471087
    Strings
    • \cmd.exe, xrefs: 00471055
    • schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "%ws /C Start \"\" \"%wsdispci.exe\" -id %u && exit", xrefs: 00471081
    • ComSpec, xrefs: 00471034
    • schtasks /Delete /F /TN rhaegal, xrefs: 0047100E
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • RegOpenKeyW.ADVAPI32(80000002,?,?), ref: 00471204
    • RegQueryValueExW.KERNEL32(00000800,?,00000000,?,?,?,00000000,?), ref: 0047124F
    • memmove.MSVCRT ref: 00471302
    • memcpy.MSVCRT ref: 00471315
    • RegSetValueExW.KERNEL32(00000800,00000007,00000000,00000007,?,00000800), ref: 00471334
    • RegFlushKey.ADVAPI32(00000800), ref: 00471344
    • RegCloseKey.ADVAPI32(00000800), ref: 00471359
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetIpNetTable.IPHLPAPI(00000000,?,00000000), ref: 00477448
    • GetProcessHeap.KERNEL32(00000000,?,00000000), ref: 00477466
    • HeapAlloc.KERNEL32(00000000), ref: 0047746D
    • GetIpNetTable.IPHLPAPI(00000000,?,00000000), ref: 00477486
    • wsprintfW.USER32 ref: 004774D8
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00477504
    • HeapFree.KERNEL32(00000000), ref: 0047750B
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • ExpandEnvironmentStringsW.KERNEL32(%ALLUSERSPROFILE%,?,00000104), ref: 004710DD
      • Part of subcall function 00478313: FindResourceW.KERNEL32(?,00000006,00000000), ref: 0047832A
      • Part of subcall function 00478313: LoadResource.KERNEL32(00000000), ref: 00478341
      • Part of subcall function 00478313: LockResource.KERNEL32(00000000), ref: 00478350
      • Part of subcall function 00478313: SizeofResource.KERNEL32(00000000), ref: 00478368
      • Part of subcall function 00478313: GetProcessHeap.KERNEL32(00000000,00000000,?,00000002), ref: 00478384
      • Part of subcall function 00478313: RtlAllocateHeap.NTDLL(00000000,?,00000002), ref: 0047838D
      • Part of subcall function 00478313: memcpy.MSVCRT ref: 0047839C
      • Part of subcall function 00478313: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00000002), ref: 004783B9
      • Part of subcall function 00478313: RtlAllocateHeap.NTDLL(00000000,?,?,?,00000002), ref: 004783BC
      • Part of subcall function 00478313: GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,00000004,?,?,?,?,00000002), ref: 004783FE
      • Part of subcall function 00478313: HeapFree.KERNEL32(00000000), ref: 00478401
      • Part of subcall function 00478313: GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,00000002), ref: 0047840A
      • Part of subcall function 00478313: HeapFree.KERNEL32(00000000), ref: 0047840D
    • PathAppendW.SHLWAPI(?,dispci.exe), ref: 0047119F
    • HeapFree.KERNEL32(00000000), ref: 004711E3
      • Part of subcall function 004787E7: CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 004787FC
      • Part of subcall function 004787E7: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00478813
      • Part of subcall function 004787E7: CloseHandle.KERNEL32(00000000), ref: 00478824
      • Part of subcall function 00471000: Sleep.KERNELBASE(000007D0,schtasks /Delete /F /TN rhaegal,00000000,?,00000000), ref: 00471021
      • Part of subcall function 00471000: GetEnvironmentVariableW.KERNEL32(ComSpec,?,00000104,schtasks /Delete /F /TN rhaegal,00000000,?,00000000), ref: 00471039
      • Part of subcall function 00471000: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0047104B
      • Part of subcall function 00471000: lstrcatW.KERNEL32(?,\cmd.exe), ref: 00471061
      • Part of subcall function 00471000: wsprintfW.USER32 ref: 00471087
      • Part of subcall function 00471531: GetVersion.KERNEL32(SYSTEM\CurrentControlSet\Control\Class\{4D36E965-E325-11CE-BFC1-08002BE10318},UpperFilters,SYSTEM\CurrentControlSet\Control\Class\{71A27CDD-812A-11D0-BEC7-08002BE2092F},LowerFilters,00000000,004711D0,?,?,?), ref: 00471588
    • GetProcessHeap.KERNEL32(00000000,?), ref: 004711DC
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetComputerNameExW.KERNEL32(00000004,?,?,002E8180,002E8180,002E8180), ref: 0047781B
    • CreateThread.KERNEL32(00000000,00000000,Function_00008B2E,002E8180,00000000,00000000), ref: 0047783D
    • CloseHandle.KERNEL32(00000000), ref: 00477848
      • Part of subcall function 0047733C: LoadLibraryW.KERNEL32(iphlpapi.dll), ref: 0047734A
      • Part of subcall function 0047733C: GetProcAddress.KERNEL32(00000000,GetExtendedTcpTable,002E8180,00000000), ref: 00477363
      • Part of subcall function 0047733C: GetProcessHeap.KERNEL32(00000008,Actx ), ref: 0047737E
      • Part of subcall function 0047733C: RtlAllocateHeap.NTDLL(00000000), ref: 00477385
      • Part of subcall function 0047733C: wsprintfW.USER32 ref: 004773DC
      • Part of subcall function 0047733C: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00477405
      • Part of subcall function 0047733C: HeapFree.KERNEL32(00000000), ref: 0047740C
      • Part of subcall function 0047733C: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00477856), ref: 00477414
      • Part of subcall function 0047733C: FreeLibrary.KERNEL32(002E8180), ref: 0047741D
      • Part of subcall function 0047742C: GetIpNetTable.IPHLPAPI(00000000,?,00000000), ref: 00477448
      • Part of subcall function 0047742C: GetProcessHeap.KERNEL32(00000000,?,00000000), ref: 00477466
      • Part of subcall function 0047742C: HeapAlloc.KERNEL32(00000000), ref: 0047746D
      • Part of subcall function 0047742C: GetIpNetTable.IPHLPAPI(00000000,?,00000000), ref: 00477486
      • Part of subcall function 0047742C: wsprintfW.USER32 ref: 004774D8
      • Part of subcall function 0047742C: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00477504
      • Part of subcall function 0047742C: HeapFree.KERNEL32(00000000), ref: 0047750B
    • Sleep.KERNELBASE(0002BF20,002E8180,002E8180), ref: 00477874
      • Part of subcall function 0047751B: NetServerEnum.NETAPI32(00000000,00000065,?,000000FF,?,002E8180,?,002E8180,?,002E8180,00000000,002E8180), ref: 0047754C
      • Part of subcall function 0047751B: NetApiBufferFree.NETAPI32(?), ref: 004775C9
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • memset.MSVCRT ref: 0047A4A5
    • socket.WS2_32(00000002,00000001,00000000), ref: 0047A4C3
    • htons.WS2_32(?), ref: 0047A4E3
    • ioctlsocket.WS2_32(00000000,8004667E,?), ref: 0047A4F7
    • connect.WS2_32(00000000,?,00000010), ref: 0047A509
    • select.WS2_32(00000001,00000000,?,00000000,?), ref: 0047A536
    • __WSAFDIsSet.WS2_32(00000000,?), ref: 0047A549
    • closesocket.WS2_32(00000000), ref: 0047A557
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • PathFindFileNameW.SHLWAPI(C:\Windows\infpub.dat), ref: 0047939C
    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,00000104,00000000,00000000), ref: 004793C8
    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000104,00000000,00000000), ref: 004793DF
    • inet_addr.WS2_32(?), ref: 004793E8
    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000208,00000000,00000000), ref: 00479418
      • Part of subcall function 00475337: GetProcessHeap.KERNEL32(00000008,00000024,0000FDE9,757DF0AA,00000000,?,?,?,?,0047943A,?), ref: 0047534B
      • Part of subcall function 00475337: HeapAlloc.KERNEL32(00000000,?,?,?,?,0047943A,?), ref: 00475352
      • Part of subcall function 00475337: rand.MSVCRT ref: 00475388
      • Part of subcall function 00475337: rand.MSVCRT ref: 004753A8
      • Part of subcall function 00475337: socket.WS2_32(00000002,00000001,00000006), ref: 004753B4
      • Part of subcall function 00475337: htons.WS2_32(000001BD), ref: 004753DA
      • Part of subcall function 00475337: inet_addr.WS2_32(?), ref: 004753E7
      • Part of subcall function 00475337: connect.WS2_32(00000000,?,00000010), ref: 004753F7
      • Part of subcall function 00475337: closesocket.WS2_32(00000000), ref: 004754E7
      • Part of subcall function 00475337: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,?,0047943A,?), ref: 004754F0
      • Part of subcall function 00475337: HeapFree.KERNEL32(00000000), ref: 004754F7
      • Part of subcall function 00479332: gethostbyname.WS2_32(004793FF), ref: 0047933B
      • Part of subcall function 00479332: wsprintfA.USER32 ref: 00479365
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetComputerNameW.KERNEL32(?,?), ref: 00477F3B
    • wsprintfW.USER32 ref: 00477F7F
    • CreateMutexW.KERNELBASE(00000000,00000000,?), ref: 00477F8E
    • GetLastError.KERNEL32 ref: 00477F99
    • GetLastError.KERNEL32 ref: 00477FAB
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • WNetOpenEnumW.MPR(00000001,00000000,00000000,?,0000FFFF), ref: 004775FD
    • GlobalAlloc.KERNEL32(00000040,00004000,00000000,?,00000000,0000FFFF), ref: 00477611
    • memset.MSVCRT ref: 0047762C
    • WNetEnumResourceW.MPR(0000FFFF,000000FF,00000000,00004000), ref: 00477640
    • GlobalFree.KERNEL32(00000000), ref: 004776D9
    • WNetCloseEnum.MPR(0000FFFF), ref: 004776E2
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • htonl.WS2_32(757DC426), ref: 00478AD4
    • htonl.WS2_32(757DC426), ref: 00478AE1
    • inet_ntoa.WS2_32(00000000), ref: 00478AE4
      • Part of subcall function 0047641A: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,774E2D57,?,757DC426), ref: 00476439
      • Part of subcall function 0047641A: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00476446
      • Part of subcall function 0047641A: HeapAlloc.KERNEL32(00000000), ref: 0047644D
      • Part of subcall function 0047641A: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?), ref: 00476465
    • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000), ref: 00478B02
    • HeapFree.KERNEL32(00000000), ref: 00478B09
    • LocalFree.KERNEL32(?,00002000,761A679F,757DC426), ref: 00478B1F
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(kernel32.dll,IsWow64Process,?,?,00477170,00000000,?,00477AF8), ref: 00476F8E
    • GetProcAddress.KERNEL32(00000000,?,?,00477170,00000000,?,00477AF8), ref: 00476F95
    • IsWow64Process.KERNELBASE(?,00000000,?,?,00477170,00000000,?,00477AF8), ref: 00476FA6
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetCurrentThread.KERNEL32(0000000B,00000001,?), ref: 0047A035
    • OpenThreadToken.ADVAPI32(00000000), ref: 0047A03C
    • DuplicateTokenEx.ADVAPI32(02000000,02000000,00000000,00000002,00000002,?), ref: 0047A059
      • Part of subcall function 00476C5F: GetProcessHeap.KERNEL32(00000008,00000034,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476C6F
      • Part of subcall function 00476C5F: HeapAlloc.KERNEL32(00000000,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476C78
      • Part of subcall function 00476C5F: InitializeCriticalSection.KERNEL32(00000000,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476C81
      • Part of subcall function 00476C5F: GetProcessHeap.KERNEL32(00000008,00000000,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476CAC
      • Part of subcall function 00476C5F: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476CAF
      • Part of subcall function 004775D8: WNetOpenEnumW.MPR(00000001,00000000,00000000,?,0000FFFF), ref: 004775FD
      • Part of subcall function 004775D8: GlobalAlloc.KERNEL32(00000040,00004000,00000000,?,00000000,0000FFFF), ref: 00477611
      • Part of subcall function 004775D8: memset.MSVCRT ref: 0047762C
      • Part of subcall function 004775D8: WNetEnumResourceW.MPR(0000FFFF,000000FF,00000000,00004000), ref: 00477640
      • Part of subcall function 004775D8: GlobalFree.KERNEL32(00000000), ref: 004776D9
      • Part of subcall function 004775D8: WNetCloseEnum.MPR(0000FFFF), ref: 004776E2
      • Part of subcall function 004776F2: CredEnumerateW.ADVAPI32(00000000,00000000,?,?), ref: 0047770B
      • Part of subcall function 004776F2: CredFree.ADVAPI32(?,?,00000000,0000FFFF), ref: 004777C3
      • Part of subcall function 00476CC8: EnterCriticalSection.KERNEL32(002F16E0,00477B03), ref: 00476CCD
      • Part of subcall function 00476CC8: InterlockedExchange.KERNEL32(002F1708,00000001), ref: 00476CD9
      • Part of subcall function 00476CC8: LeaveCriticalSection.KERNEL32(002F16E0), ref: 00476CE0
    • CloseHandle.KERNEL32(0000FFFF), ref: 0047A105
      • Part of subcall function 00479534: wsprintfW.USER32 ref: 0047957E
      • Part of subcall function 00479534: wsprintfW.USER32 ref: 004795C9
      • Part of subcall function 00479534: wsprintfW.USER32 ref: 004795EF
      • Part of subcall function 00479534: PathFindExtensionW.SHLWAPI(?), ref: 004795FC
      • Part of subcall function 00479534: wsprintfW.USER32 ref: 0047961A
      • Part of subcall function 00479534: WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00479637
      • Part of subcall function 00479534: PathFileExistsW.SHLWAPI(?), ref: 00479649
      • Part of subcall function 00479534: GetLastError.KERNEL32 ref: 00479653
      • Part of subcall function 00479534: GetLastError.KERNEL32(?), ref: 00479674
      • Part of subcall function 00479534: WNetCancelConnection2W.MPR(?,00000000,00000001), ref: 004796B9
      • Part of subcall function 00479534: OpenSCManagerW.ADVAPI32(?,00000000,000F003F,?,?), ref: 00479714
      • Part of subcall function 00479534: memset.MSVCRT ref: 00479735
      • Part of subcall function 00479534: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00479742
      • Part of subcall function 00479534: wsprintfW.USER32 ref: 0047975A
      • Part of subcall function 00479534: CreateServiceW.ADVAPI32(?,?,00000000,000F01FF,00000010,00000003,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 00479783
      • Part of subcall function 00479534: StartServiceW.ADVAPI32(00000000,00000000,00000000), ref: 00479798
      • Part of subcall function 00479534: GetLastError.KERNEL32 ref: 004797A6
      • Part of subcall function 00479534: QueryServiceStatus.ADVAPI32(?,?), ref: 004797D5
      • Part of subcall function 00479534: Sleep.KERNEL32(00001388), ref: 004797E7
      • Part of subcall function 00479534: DeleteService.ADVAPI32(?), ref: 004797F7
      • Part of subcall function 00479534: CloseServiceHandle.ADVAPI32(?), ref: 00479801
      • Part of subcall function 00479534: GetLastError.KERNEL32 ref: 00479809
      • Part of subcall function 00479534: CloseServiceHandle.ADVAPI32(?), ref: 00479822
      • Part of subcall function 00479534: GetLastError.KERNEL32 ref: 0047982A
      • Part of subcall function 00479534: DeleteFileW.KERNEL32(?), ref: 0047983E
      • Part of subcall function 00479534: WNetCancelConnection2W.MPR(?,00000000,00000001), ref: 00479857
      • Part of subcall function 00479534: SetLastError.KERNEL32(00000057,00000000,00000000,00000000,?,0047A0AD,00000000,00000000,00000000,00000000,00476AA8,00000000,00000000,00000000,00000024,00476AA8), ref: 00479878
      • Part of subcall function 00476B46: GetProcessHeap.KERNEL32(00000000,"gG,?,00476722,?), ref: 00476B4E
      • Part of subcall function 00476B46: HeapFree.KERNEL32(00000000,?,00476722), ref: 00476B55
    • CloseHandle.KERNEL32(?), ref: 0047A0F5
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000034,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476C6F
    • HeapAlloc.KERNEL32(00000000,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476C78
    • InitializeCriticalSection.KERNEL32(00000000,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476C81
    • GetProcessHeap.KERNEL32(00000008,00000000,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476CAC
    • RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476CAF
      • Part of subcall function 00476BD1: GetProcessHeap.KERNEL32(00000000,?,757DFE8D,773E29EE,?,?,00476CBD,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476C29
      • Part of subcall function 00476BD1: HeapFree.KERNEL32(00000000), ref: 00476C2C
      • Part of subcall function 00476BD1: GetProcessHeap.KERNEL32(00000000,?,757DFE8D,773E29EE,?,?,00476CBD,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476C39
      • Part of subcall function 00476BD1: HeapFree.KERNEL32(00000000), ref: 00476C3C
      • Part of subcall function 00476BD1: GetProcessHeap.KERNEL32(00000000,?,757DFE8D,773E29EE,?,?,00476CBD,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476C4E
      • Part of subcall function 00476BD1: HeapFree.KERNEL32(00000000), ref: 00476C51
      • Part of subcall function 00476BD1: GetProcessHeap.KERNEL32(00000000,00000000,757DFE8D,773E29EE,?,?,00476CBD,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476C56
      • Part of subcall function 00476BD1: HeapFree.KERNEL32(00000000), ref: 00476C59
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000004,757DDE72,00000000,00000000,?,?,00477B89,000000FF), ref: 0047A436
    • HeapAlloc.KERNEL32(00000000,?,?,00477B89,000000FF), ref: 0047A439
    • CreateThread.KERNEL32(00000000,00000000,0047A333,00000000,00000000,00000000), ref: 0047A454
    • GetProcessHeap.KERNEL32(00000000,00000000,?,?,00477B89,000000FF), ref: 0047A463
    • HeapFree.KERNEL32(00000000), ref: 0047A466
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetLogicalDrives.KERNEL32 ref: 0047637A
    • GetDriveTypeW.KERNELBASE(?), ref: 004763B8
    • LocalAlloc.KERNEL32(00000040,00000050), ref: 004763C7
    • CreateThread.KERNEL32(00000000,00000000,00476299,00000000,00000000,00000000), ref: 00476404
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • HeapFree.KERNEL32(00000000), ref: 0047A19C
      • Part of subcall function 00479534: wsprintfW.USER32 ref: 0047957E
      • Part of subcall function 00479534: wsprintfW.USER32 ref: 004795C9
      • Part of subcall function 00479534: wsprintfW.USER32 ref: 004795EF
      • Part of subcall function 00479534: PathFindExtensionW.SHLWAPI(?), ref: 004795FC
      • Part of subcall function 00479534: wsprintfW.USER32 ref: 0047961A
      • Part of subcall function 00479534: WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00479637
      • Part of subcall function 00479534: PathFileExistsW.SHLWAPI(?), ref: 00479649
      • Part of subcall function 00479534: GetLastError.KERNEL32 ref: 00479653
      • Part of subcall function 00479534: GetLastError.KERNEL32(?), ref: 00479674
      • Part of subcall function 00479534: WNetCancelConnection2W.MPR(?,00000000,00000001), ref: 004796B9
      • Part of subcall function 00479534: OpenSCManagerW.ADVAPI32(?,00000000,000F003F,?,?), ref: 00479714
      • Part of subcall function 00479534: memset.MSVCRT ref: 00479735
      • Part of subcall function 00479534: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00479742
      • Part of subcall function 00479534: wsprintfW.USER32 ref: 0047975A
      • Part of subcall function 00479534: CreateServiceW.ADVAPI32(?,?,00000000,000F01FF,00000010,00000003,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 00479783
      • Part of subcall function 00479534: StartServiceW.ADVAPI32(00000000,00000000,00000000), ref: 00479798
      • Part of subcall function 00479534: GetLastError.KERNEL32 ref: 004797A6
      • Part of subcall function 00479534: QueryServiceStatus.ADVAPI32(?,?), ref: 004797D5
      • Part of subcall function 00479534: Sleep.KERNEL32(00001388), ref: 004797E7
      • Part of subcall function 00479534: DeleteService.ADVAPI32(?), ref: 004797F7
      • Part of subcall function 00479534: CloseServiceHandle.ADVAPI32(?), ref: 00479801
      • Part of subcall function 00479534: GetLastError.KERNEL32 ref: 00479809
      • Part of subcall function 00479534: CloseServiceHandle.ADVAPI32(?), ref: 00479822
      • Part of subcall function 00479534: GetLastError.KERNEL32 ref: 0047982A
      • Part of subcall function 00479534: DeleteFileW.KERNEL32(?), ref: 0047983E
      • Part of subcall function 00479534: WNetCancelConnection2W.MPR(?,00000000,00000001), ref: 00479857
      • Part of subcall function 00479534: SetLastError.KERNEL32(00000057,00000000,00000000,00000000,?,0047A0AD,00000000,00000000,00000000,00000000,00476AA8,00000000,00000000,00000000,00000024,00476AA8), ref: 00479878
      • Part of subcall function 004798AB: CreateThread.KERNEL32(00000000,00000000,0047988B,?,00000004,00000000), ref: 004798FD
      • Part of subcall function 004798AB: SetThreadToken.ADVAPI32(?,?,?,0047A15C,?,00000000), ref: 0047990F
      • Part of subcall function 004798AB: ResumeThread.KERNEL32(?,?,0047A15C,?,00000000), ref: 0047991C
      • Part of subcall function 004798AB: WaitForSingleObject.KERNEL32(?,000000FF), ref: 0047992C
      • Part of subcall function 004798AB: GetLastError.KERNEL32(?,0047A15C,?,00000000), ref: 00479934
      • Part of subcall function 004798AB: CloseHandle.KERNEL32(?), ref: 0047993D
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0047A18B
    • HeapFree.KERNEL32(00000000), ref: 0047A194
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0047A199
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
      • Part of subcall function 00477E69: PathCombineW.SHLWAPI(?,C:\Windows\,cscc.dat), ref: 00477E7C
    • PathFileExistsW.SHLWAPI(?), ref: 00477EB1
    • GetCurrentProcess.KERNEL32(?,?), ref: 00477EC3
      • Part of subcall function 00476F7C: GetModuleHandleW.KERNEL32(kernel32.dll,IsWow64Process,?,?,00477170,00000000,?,00477AF8), ref: 00476F8E
      • Part of subcall function 00476F7C: GetProcAddress.KERNEL32(00000000,?,?,00477170,00000000,?,00477AF8), ref: 00476F95
      • Part of subcall function 00476F7C: IsWow64Process.KERNELBASE(?,00000000,?,?,00477170,00000000,?,00477AF8), ref: 00476FA6
      • Part of subcall function 00478313: FindResourceW.KERNEL32(?,00000006,00000000), ref: 0047832A
      • Part of subcall function 00478313: LoadResource.KERNEL32(00000000), ref: 00478341
      • Part of subcall function 00478313: LockResource.KERNEL32(00000000), ref: 00478350
      • Part of subcall function 00478313: SizeofResource.KERNEL32(00000000), ref: 00478368
      • Part of subcall function 00478313: GetProcessHeap.KERNEL32(00000000,00000000,?,00000002), ref: 00478384
      • Part of subcall function 00478313: RtlAllocateHeap.NTDLL(00000000,?,00000002), ref: 0047838D
      • Part of subcall function 00478313: memcpy.MSVCRT ref: 0047839C
      • Part of subcall function 00478313: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00000002), ref: 004783B9
      • Part of subcall function 00478313: RtlAllocateHeap.NTDLL(00000000,?,?,?,00000002), ref: 004783BC
      • Part of subcall function 00478313: GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,00000004,?,?,?,?,00000002), ref: 004783FE
      • Part of subcall function 00478313: HeapFree.KERNEL32(00000000), ref: 00478401
      • Part of subcall function 00478313: GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,00000002), ref: 0047840A
      • Part of subcall function 00478313: HeapFree.KERNEL32(00000000), ref: 0047840D
      • Part of subcall function 004787E7: CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 004787FC
      • Part of subcall function 004787E7: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00478813
      • Part of subcall function 004787E7: CloseHandle.KERNEL32(00000000), ref: 00478824
    • ExitProcess.KERNEL32 ref: 00477EFD
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000002,00000000), ref: 00476FC5
    • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00476FDF
    • CloseHandle.KERNEL32(00000000), ref: 00476FF0
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 004787FC
    • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00478813
    • CloseHandle.KERNEL32(00000000), ref: 00478824
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • EnterCriticalSection.KERNEL32(00000000,757DFE8D,?,00476D1C,?,?,?,00476B24,00000000,00000000,00000000,00000000,?,0047A09A,00476AA8,00000000), ref: 00476D46
    • LeaveCriticalSection.KERNEL32(00000000,?,00476D1C,?,?,?,00476B24,00000000,00000000,00000000,00000000,?,0047A09A,00476AA8,00000000,00000000), ref: 00476D7F
    • Sleep.KERNELBASE(00002710,?,00476D1C,?,?,?,00476B24,00000000,00000000,00000000,00000000,?,0047A09A,00476AA8,00000000,00000000), ref: 00476D97
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • Sleep.KERNELBASE(?), ref: 0047A344
      • Part of subcall function 00476B46: GetProcessHeap.KERNEL32(00000000,"gG,?,00476722,?), ref: 00476B4E
      • Part of subcall function 00476B46: HeapFree.KERNEL32(00000000,?,00476722), ref: 00476B55
    • GetProcessHeap.KERNEL32(00000000,?,?), ref: 0047A399
    • HeapFree.KERNEL32(00000000), ref: 0047A3A0
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • NetServerEnum.NETAPI32(00000000,00000065,?,000000FF,?,002E8180,?,002E8180,?,002E8180,00000000,002E8180), ref: 0047754C
    • NetApiBufferFree.NETAPI32(?), ref: 004775C9
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
      • Part of subcall function 00476477: GetTickCount.KERNEL32(00477DDC,?,?,00000000,?,?,00477AA3,?,?,000000FF,?,?), ref: 00476477
    • NetServerGetInfo.NETAPI32(00000000,00000065,?,?,?,00000000,?,?,00477AA3,?,?,000000FF,?,?), ref: 00477DF6
    • NetApiBufferFree.NETAPI32(?,?,?,00000000,?,?,00477AA3,?,?,000000FF,?,?), ref: 00477E0F
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • NetServerGetInfo.NETAPI32(00000000,00000065,?,73349263,?,?,00478C7C), ref: 00477D5F
    • NetApiBufferFree.NETAPI32(?,?,?,00478C7C), ref: 00477D82
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd

    Non-executed Functions

    APIs
    • wsprintfW.USER32 ref: 00479BA5
      • Part of subcall function 004788D3: PathFindFileNameW.SHLWAPI(C:\Windows\infpub.dat), ref: 004788E3
    • wsprintfW.USER32 ref: 00479BF2
    • wsprintfW.USER32 ref: 00479C16
    • PathFindExtensionW.SHLWAPI(?), ref: 00479C22
    • wsprintfW.USER32 ref: 00479C41
    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00479C59
    • PathFileExistsW.SHLWAPI(?), ref: 00479C69
    • GetLastError.KERNEL32 ref: 00479C73
      • Part of subcall function 004787E7: CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 004787FC
      • Part of subcall function 004787E7: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00478813
      • Part of subcall function 004787E7: CloseHandle.KERNEL32(00000000), ref: 00478824
    • GetLastError.KERNEL32(?), ref: 00479C9A
    • WNetCancelConnection2W.MPR(?,00000000,00000001), ref: 00479CDD
    • CloseHandle.KERNEL32(?), ref: 00479EE4
      • Part of subcall function 004768B5: GetProcessHeap.KERNEL32(00000008,?,761B423D,00000000), ref: 004768EB
      • Part of subcall function 004768B5: HeapAlloc.KERNEL32(00000000), ref: 004768F4
      • Part of subcall function 004768B5: memcpy.MSVCRT ref: 00476921
      • Part of subcall function 004768B5: GetProcessHeap.KERNEL32(00000008,?,757DCF90), ref: 00476946
      • Part of subcall function 004768B5: HeapAlloc.KERNEL32(00000000), ref: 00476949
      • Part of subcall function 004768B5: memcpy.MSVCRT ref: 00476978
      • Part of subcall function 004768B5: GetProcessHeap.KERNEL32(00000000,?,?), ref: 00476995
      • Part of subcall function 004768B5: HeapFree.KERNEL32(00000000), ref: 00476998
      • Part of subcall function 004768B5: GetProcessHeap.KERNEL32(00000000,?), ref: 0047699F
      • Part of subcall function 004768B5: HeapFree.KERNEL32(00000000), ref: 004769A2
    • GetCurrentThread.KERNEL32(00000002,00000001,?,?), ref: 00479D1B
    • OpenThreadToken.ADVAPI32(00000000), ref: 00479D22
    • DuplicateTokenEx.ADVAPI32(?,02000000,00000000,00000002,00000001,?), ref: 00479D3C
    • memset.MSVCRT ref: 00479D62
    • GetSystemDirectoryW.KERNEL32 ref: 00479D8A
    • PathAppendW.SHLWAPI(?,wbem\wmic.exe), ref: 00479DAA
    • PathFileExistsW.SHLWAPI(?), ref: 00479DB7
    • wsprintfW.USER32 ref: 00479DD8
    • CreateProcessAsUserW.ADVAPI32(?,?,?,00000000,00000000,00000000,08000000,00000000,00000000,?,?,?,?,?,?,?), ref: 00479E24
    • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00479E2C
    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00479E3B
    • GetExitCodeProcess.KERNEL32(?,?), ref: 00479E4B
    • CloseHandle.KERNEL32(?), ref: 00479E59
    • CloseHandle.KERNEL32(?), ref: 00479E63
    • CloseHandle.KERNEL32(?), ref: 00479E6D
    • CloseHandle.KERNEL32(?), ref: 00479E77
    • CloseHandle.KERNEL32(?), ref: 00479E81
    • PathFileExistsW.SHLWAPI(?), ref: 00479E99
    • GetLastError.KERNEL32(?,?,?,?,?,00000104), ref: 00479EA6
    • GetLastError.KERNEL32 ref: 00479EB0
    • DeleteFileW.KERNEL32(?), ref: 00479EC5
    • CloseHandle.KERNEL32(?), ref: 00479ED7
    • WNetCancelConnection2W.MPR(?,00000000,00000001), ref: 00479EF9
    • SetLastError.KERNEL32(00000057,00000000,00000000,00000000,?,00479FCE,00000000,00000000,?,00000000,00000000,00000000,?,00000000,00000003,00000000), ref: 00479F17
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • LocalAlloc.KERNEL32(00000040,000000F0,00000000,00000000), ref: 00475805
    • GetSystemDefaultLCID.KERNEL32 ref: 0047581D
    • GetTimeZoneInformation.KERNEL32(?), ref: 0047582D
    • memcpy.MSVCRT ref: 0047584B
    • NetWkstaGetInfo.NETAPI32(00480494,00000064,?), ref: 00475861
    • memcpy.MSVCRT ref: 004758C7
    • memcpy.MSVCRT ref: 004758EA
    • NetApiBufferFree.NETAPI32(?,?,?,?), ref: 004758F3
      • Part of subcall function 004756D8: CryptEncrypt.ADVAPI32(00000000,00000000,00000001,00000000,00000000,?,00000000,00000000,?,00000000,?,00000000,?,?,?,?), ref: 00475714
      • Part of subcall function 004756D8: LocalAlloc.KERNEL32(00000040,?,?,?,?), ref: 0047571F
      • Part of subcall function 004756D8: memcpy.MSVCRT ref: 00475736
      • Part of subcall function 004756D8: CryptEncrypt.ADVAPI32(?,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00475750
      • Part of subcall function 004756D8: LocalFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0047576E
    • LocalAlloc.KERNEL32(00000040,?,?,00000000,?,?,?,?), ref: 00475924
    • memcpy.MSVCRT ref: 00475943
      • Part of subcall function 00475780: CryptBinaryToStringW.CRYPT32(?,00000000,00000001,00000000,?), ref: 0047579E
      • Part of subcall function 00475780: LocalAlloc.KERNEL32(00000040,?,00000000,?,00475988,00000000,?,?,?,?,?,?,?,?), ref: 004757AD
      • Part of subcall function 00475780: CryptBinaryToStringW.CRYPT32(?,00000000,00000001,00000000,?), ref: 004757C6
      • Part of subcall function 00475780: LocalFree.KERNEL32(00000000,?,00475988,00000000,?,?,?,?,?,?,?,?), ref: 004757D6
    • LocalFree.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?), ref: 0047598C
    • LocalFree.KERNEL32(00000000,00000000,?,?,?,?), ref: 004759A2
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetCurrentProcessId.KERNEL32(?,00478555,?,?), ref: 00478430
    • OpenProcess.KERNEL32(00000401,00000000,?,?,?,?,00478555,?,?), ref: 0047844C
    • OpenProcessToken.ADVAPI32(00000000,0000000E,?,00000000,?,?,?,00478555,?,?), ref: 00478464
    • DuplicateToken.ADVAPI32(?,00000002,?,?,?,?,00478555,?,?), ref: 0047847D
    • AllocateAndInitializeSid.ADVAPI32(?,00000001,00000012,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 004784A3
    • CheckTokenMembership.ADVAPI32(?,?,?), ref: 004784BA
    • TerminateProcess.KERNEL32(00000000,00000000), ref: 004784CB
    • FreeSid.ADVAPI32(?), ref: 004784D4
    • CloseHandle.KERNEL32(?), ref: 004784DD
    • CloseHandle.KERNEL32(?), ref: 004784E2
    • CloseHandle.KERNEL32(00000000), ref: 004784E5
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetCurrentProcess.KERNEL32(00000028,?,?,00000000,?,?,?,004779E8), ref: 00477CE9
    • OpenProcessToken.ADVAPI32(00000000,?,00000000,?,?,?,004779E8), ref: 00477CF0
    • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00477D02
    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00477D25
    • GetLastError.KERNEL32(?,00000000), ref: 00477D2D
    • SetLastError.KERNEL32(?,?,00000000,?,?,?,004779E8), ref: 00477D3F
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • CryptSetKeyParam.ADVAPI32(?,00000004,?,00000000,?,?,00000000), ref: 004755BC
    • CryptSetKeyParam.ADVAPI32(?,00000003,?,00000000), ref: 004755CB
    • CryptGetKeyParam.ADVAPI32(?,00000001,00000000,?,00000000), ref: 004755DA
    • LocalAlloc.KERNEL32(00000040,?), ref: 004755EE
    • CryptSetKeyParam.ADVAPI32(?,00000001,00000000,00000000), ref: 00475601
    • LocalFree.KERNEL32(?), ref: 00475606
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • CryptEncrypt.ADVAPI32(00000000,00000000,00000001,00000000,00000000,?,00000000,00000000,?,00000000,?,00000000,?,?,?,?), ref: 00475714
    • LocalAlloc.KERNEL32(00000040,?,?,?,?), ref: 0047571F
    • memcpy.MSVCRT ref: 00475736
    • CryptEncrypt.ADVAPI32(?,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00475750
    • LocalFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0047576E
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?,?,?,00000000,?,?,?,004762E0,?,?,?,?), ref: 004760A6
    • CryptHashData.ADVAPI32(?,?,00000021,00000000,?,?,?,004762E0,?,?,?,?), ref: 004760BA
    • CryptDeriveKey.ADVAPI32(?,0000660E,?,00000001,?,?,?,?,004762E0,?,?,?,?), ref: 004760D3
    • CryptDestroyHash.ADVAPI32(?,?,?,?,004762E0,?,?,?,?), ref: 004760DF
      • Part of subcall function 0047559B: CryptSetKeyParam.ADVAPI32(?,00000004,?,00000000,?,?,00000000), ref: 004755BC
      • Part of subcall function 0047559B: CryptSetKeyParam.ADVAPI32(?,00000003,?,00000000), ref: 004755CB
      • Part of subcall function 0047559B: CryptGetKeyParam.ADVAPI32(?,00000001,00000000,?,00000000), ref: 004755DA
      • Part of subcall function 0047559B: LocalAlloc.KERNEL32(00000040,?), ref: 004755EE
      • Part of subcall function 0047559B: CryptSetKeyParam.ADVAPI32(?,00000001,00000000,00000000), ref: 00475601
      • Part of subcall function 0047559B: LocalFree.KERNEL32(?), ref: 00475606
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • CryptBinaryToStringW.CRYPT32(?,00000000,00000001,00000000,?), ref: 0047579E
    • LocalAlloc.KERNEL32(00000040,?,00000000,?,00475988,00000000,?,?,?,?,?,?,?,?), ref: 004757AD
    • CryptBinaryToStringW.CRYPT32(?,00000000,00000001,00000000,?), ref: 004757C6
    • LocalFree.KERNEL32(00000000,?,00475988,00000000,?,?,?,?,?,?,?,?), ref: 004757D6
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?,?,00000000,?,?,004762E9,?,?,?,?), ref: 00476260
    • CryptHashData.ADVAPI32(?,?,00000021,00000000,?,?,004762E9,?,?,?,?), ref: 00476273
    • CryptGetHashParam.ADVAPI32(?,00000002,00000000,?,00000000,?,?,004762E9,?,?,?,?), ref: 00476289
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000FFFF,?,00000000,757DFE8D,?,00474775), ref: 004729BF
    • HeapAlloc.KERNEL32(00000000,?,00474775), ref: 004729C8
    • GetProcessHeap.KERNEL32(00000008,00001124,?,00474775), ref: 004729DC
    • HeapAlloc.KERNEL32(00000000,?,00474775), ref: 004729DF
    • rand.MSVCRT ref: 004729F0
    • htons.WS2_32(00000050), ref: 00472A25
    • rand.MSVCRT ref: 00472A7E
    • rand.MSVCRT ref: 00472A96
    • send.WS2_32(00000000,00000000,00000054,00000000), ref: 00472ABB
    • recv.WS2_32(00000000,?,0000FFFF,00000000), ref: 00472AD2
    • rand.MSVCRT ref: 00472AE7
    • htons.WS2_32(00001120), ref: 00472B06
    • GetProcessHeap.KERNEL32(00000008,00000160,?,00474775), ref: 00472B6A
    • HeapAlloc.KERNEL32(00000000,?,00474775), ref: 00472B71
    • htons.WS2_32(0000015C), ref: 00472B90
    • rand.MSVCRT ref: 00472BBE
    • GetProcessHeap.KERNEL32(00000008,00000048,?,00474775), ref: 00472BD2
    • HeapAlloc.KERNEL32(00000000,?,00474775), ref: 00472BD9
    • htons.WS2_32(00000044), ref: 00472BF8
    • GetProcessHeap.KERNEL32(00000008,00001638,?,00474775), ref: 00472C58
    • HeapAlloc.KERNEL32(00000000,?,00474775), ref: 00472C5F
    • memcpy.MSVCRT ref: 00472C79
    • memcpy.MSVCRT ref: 00472C90
    • htons.WS2_32(00000050), ref: 00472C9A
    • memcpy.MSVCRT ref: 00472D17
    • send.WS2_32(00000004,00000004,0000111C,0000000B), ref: 00472D37
    • send.WS2_32(00000004,-00001118,0000051C,0000000B), ref: 00472D4F
    • recv.WS2_32(00000004,?,0000FFFF,0000000B), ref: 00472D86
    • GetProcessHeap.KERNEL32(00000008,00000004,?,?,?,?,?,?,?,?,?,?,00474775), ref: 00472DB3
    • HeapFree.KERNEL32(00000000), ref: 00472DBA
    • GetProcessHeap.KERNEL32(00000008,?,?,00474775), ref: 00472DC6
    • HeapFree.KERNEL32(00000000,?,00474775), ref: 00472DCD
    • GetProcessHeap.KERNEL32(00000008,?,?,00474775), ref: 00472DD9
    • HeapFree.KERNEL32(00000000,?,00474775), ref: 00472DE0
    • GetProcessHeap.KERNEL32(00000008,00000000,?,00474775), ref: 00472DE9
    • HeapFree.KERNEL32(00000000,?,00474775), ref: 00472DF0
    • GetProcessHeap.KERNEL32(00000008,?,?,00474775), ref: 00472DFB
    • HeapFree.KERNEL32(00000000,?,00474775), ref: 00472E02
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000FFFF,?,757DFE8D,?,?,?,00474269,?,00000000,?,?,?,00000000,00000100,?), ref: 00473D2B
    • HeapAlloc.KERNEL32(00000000,?,?,?,00474269,?,00000000,?,?,?,00000000,00000100,?,?,?,?), ref: 00473D34
    • GetProcessHeap.KERNEL32(00000008,00000027,00000000,?,?,?,00474269,?,00000000,?,?,?,00000000,00000100,?,?), ref: 00473D46
    • HeapAlloc.KERNEL32(00000000,?,?,?,00474269,?,00000000,?,?,?,00000000,00000100,?,?,?,?), ref: 00473D49
    • GetProcessHeap.KERNEL32(00000008,0000003D,?,?,?,00474269,?,00000000,?,?,?,00000000,00000100,?,?,?), ref: 00473D63
    • HeapAlloc.KERNEL32(00000000,?,?,?,00474269,?,00000000,?,?,?,00000000,00000100,?,?,?,?), ref: 00473D66
      • Part of subcall function 00473209: GetProcessHeap.KERNEL32(00000008,?,00000000,?,?,?,00473BAA,?,?,?,00000000,00000000,?,?,?,00474A6E), ref: 00473220
      • Part of subcall function 00473209: HeapAlloc.KERNEL32(00000000,?,00473BAA,?,?,?,00000000,00000000,?,?,?,00474A6E,?,?,?,?), ref: 00473227
      • Part of subcall function 00473209: htons.WS2_32(?), ref: 00473246
      • Part of subcall function 00473209: memcpy.MSVCRT ref: 00473276
      • Part of subcall function 00473209: send.WS2_32(?,00000000,?,00000000), ref: 00473287
      • Part of subcall function 00473209: GetProcessHeap.KERNEL32(00000008,00000000), ref: 0047329A
      • Part of subcall function 00473209: HeapFree.KERNEL32(00000000), ref: 004732A1
    • Sleep.KERNEL32(000007D0,00000000,?,?,00000000,00000000,?,?,?,?,00474269,?,00000000,?,?,?), ref: 00473E5B
    • GetProcessHeap.KERNEL32(00000008,00000029,?,?,?,00474269,?,00000000,?,?,?,00000000,00000100,?,?,?), ref: 00473E65
    • HeapAlloc.KERNEL32(00000000,?,?,?,00474269,?,00000000,?,?,?,00000000,00000100,?,?,?,?), ref: 00473E68
    • rand.MSVCRT ref: 00473EC3
      • Part of subcall function 004732AF: GetProcessHeap.KERNEL32(00000008,0000FFFF,00000000,?), ref: 004732CB
      • Part of subcall function 004732AF: HeapAlloc.KERNEL32(00000000), ref: 004732D4
      • Part of subcall function 004732AF: GetProcessHeap.KERNEL32(00000008,?,757DFE8D), ref: 004732EF
      • Part of subcall function 004732AF: HeapAlloc.KERNEL32(00000000), ref: 004732F2
      • Part of subcall function 004732AF: htons.WS2_32(?), ref: 0047330F
      • Part of subcall function 004732AF: memcpy.MSVCRT ref: 0047333D
      • Part of subcall function 004732AF: send.WS2_32(?,00000000,?,00000000), ref: 00473350
      • Part of subcall function 004732AF: recv.WS2_32(?,?,0000FFFF,00000000), ref: 00473368
      • Part of subcall function 004732AF: GetProcessHeap.KERNEL32(00000008,00000000), ref: 0047337B
      • Part of subcall function 004732AF: HeapFree.KERNEL32(00000000), ref: 00473382
      • Part of subcall function 004732AF: GetProcessHeap.KERNEL32(00000008,?), ref: 0047338D
      • Part of subcall function 004732AF: HeapFree.KERNEL32(00000000), ref: 00473394
    • memset.MSVCRT ref: 00473EFC
    • recv.WS2_32(00000000,00000000,0000FFFF,00000000), ref: 00473F38
    • htons.WS2_32(?), ref: 00473F5C
    • Sleep.KERNEL32(000007D0,00000000,00000000,?,00000000,00000000,?), ref: 00473FF8
    • Sleep.KERNEL32(000007D0,00000000,00000000,?,00000000,00000000,?), ref: 00474063
    • GetProcessHeap.KERNEL32(00000008,?), ref: 0047406E
    • HeapAlloc.KERNEL32(00000000), ref: 00474075
    • memcpy.MSVCRT ref: 0047408F
    • GetProcessHeap.KERNEL32(00000008,?,00000000,00000000,?,?,00000000,?,?,?,?,00474269,?,00000000,?,?), ref: 004740A0
    • HeapFree.KERNEL32(00000000), ref: 004740A7
    • GetProcessHeap.KERNEL32(00000008,00000000,00000000,?,?,00000000,00000000,?,?,?,?,00474269,?,00000000,?,?), ref: 004740B6
    • HeapFree.KERNEL32(00000000), ref: 004740B9
    • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00474269,?,00000000,?,?,?,00000000,00000100,?,?,?), ref: 004740C2
    • HeapFree.KERNEL32(00000000), ref: 004740C5
    • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00474269,?,00000000,?,?,?,00000000,00000100,?,?,?), ref: 004740D0
    • HeapFree.KERNEL32(00000000), ref: 004740D3
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • wsprintfW.USER32 ref: 00471408
    • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,000F003F,?), ref: 00471427
    • RegQueryValueExW.ADVAPI32(?,Start,00000000,00000000,?,?,?,00000000), ref: 00471453
    • RegSetValueExW.ADVAPI32(?,Start,00000000,00000004,?,00000004,?,00000000), ref: 0047147E
    • RegSetValueExW.ADVAPI32(?,Start,00000000,00000004,?,00000004,?,00000000), ref: 00471495
    • RegSetValueExW.ADVAPI32(?,Group,00000000,00000001,Filter,0000000E,?,00000000), ref: 004714B3
    • RegSetValueExW.ADVAPI32(?,DependOnService,00000000,00000007,FltMgr,0000000E,?,00000000), ref: 004714CB
    • RegSetValueExW.ADVAPI32(?,ErrorControl,00000000,00000004,?,00000004,?,00000000), ref: 004714E9
    • RegSetValueExW.ADVAPI32(?,ImagePath,00000000,00000002,cscc.dat,00000012,?,00000000), ref: 00471501
    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00471523
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
      • Part of subcall function 00471EB9: GetProcessHeap.KERNEL32(00000008,0000FFFF,00000000,00000000,00000000,00000000,?,0BADF00D,?,?,?,?,0047943A), ref: 00471ED2
      • Part of subcall function 00471EB9: HeapAlloc.KERNEL32(00000000,?,?,?,?,0047943A), ref: 00471EDB
      • Part of subcall function 00471EB9: GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,?,0047943A), ref: 00471F1F
      • Part of subcall function 00471EB9: HeapAlloc.KERNEL32(00000000,?,?,?,?,0047943A), ref: 00471F22
      • Part of subcall function 00471EB9: htons.WS2_32(?), ref: 00471F41
      • Part of subcall function 00471EB9: send.WS2_32(?,00000000,?,00000000), ref: 00471FF1
      • Part of subcall function 00471EB9: recv.WS2_32(0000FFFF,?,0000FFFF,00000000), ref: 00472008
      • Part of subcall function 00471EB9: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,?,0047943A), ref: 0047202B
      • Part of subcall function 00471EB9: HeapFree.KERNEL32(00000000), ref: 00472032
      • Part of subcall function 00471EB9: GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,0047943A), ref: 0047203D
      • Part of subcall function 00471EB9: HeapFree.KERNEL32(00000000), ref: 00472044
      • Part of subcall function 00472054: GetProcessHeap.KERNEL32(00000008,0000FFFF,?,00000000,00000000,?,0BADF00D,?,?,?,?,0047943A), ref: 0047206D
      • Part of subcall function 00472054: HeapAlloc.KERNEL32(00000000,?,?,?,?,0047943A), ref: 00472076
      • Part of subcall function 00472054: GetProcessHeap.KERNEL32(00000008,?,00000000,?,?,?,?,0047943A), ref: 0047209C
      • Part of subcall function 00472054: HeapAlloc.KERNEL32(00000000,?,?,?,?,0047943A), ref: 0047209F
      • Part of subcall function 00472054: htons.WS2_32(?), ref: 004720BC
      • Part of subcall function 00472054: send.WS2_32(?,00000000,?,00000000), ref: 00472131
      • Part of subcall function 00472054: recv.WS2_32(0000FFFF,?,0000FFFF,00000000), ref: 00472148
      • Part of subcall function 00472054: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,?,0047943A), ref: 00472168
      • Part of subcall function 00472054: HeapFree.KERNEL32(00000000), ref: 0047216F
      • Part of subcall function 00472054: GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,0047943A), ref: 0047217A
      • Part of subcall function 00472054: HeapFree.KERNEL32(00000000), ref: 00472181
      • Part of subcall function 00474E60: GetProcessHeap.KERNEL32(00000008,00000048,?,?,00000000,IPC$,?,00000000,00000000), ref: 00474E76
      • Part of subcall function 00474E60: HeapAlloc.KERNEL32(00000000), ref: 00474E79
      • Part of subcall function 00474E60: GetProcessHeap.KERNEL32(00000008,00000000,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 00474F2A
      • Part of subcall function 00474E60: HeapFree.KERNEL32(00000000), ref: 00474F2D
      • Part of subcall function 00474E60: GetProcessHeap.KERNEL32(00000008,00000000,00000008,000000FF,0000002F,0000002F,000000FF,00000008,00000000,00000048,00000000), ref: 00474F32
      • Part of subcall function 00474E60: HeapFree.KERNEL32(00000000), ref: 00474F35
    • GetProcessHeap.KERNEL32(00000008,00000014,?,00000000,?,00000000,00000000,?,00000000,00000000,svcctl,00000001,?,00000000,00000000,IPC$), ref: 004751D3
    • HeapAlloc.KERNEL32(00000000), ref: 004751DC
      • Part of subcall function 00474F43: GetProcessHeap.KERNEL32(00000008,00000068,757DFE8D,?,773E29EE,?,004751F9,?,?,?), ref: 00474F56
      • Part of subcall function 00474F43: HeapAlloc.KERNEL32(00000000,?,004751F9,?,?,?), ref: 00474F5D
      • Part of subcall function 00474F43: rand.MSVCRT ref: 00474F86
      • Part of subcall function 00474F43: GetProcessHeap.KERNEL32(00000008,?,004751F9,?,00000000,?,004751F9,004751F9,?,00000000,00000000,000000FF,00000008,00000000,00000068), ref: 00474FF7
      • Part of subcall function 00474F43: HeapFree.KERNEL32(00000000), ref: 00474FFE
      • Part of subcall function 00474F43: GetProcessHeap.KERNEL32(00000008,00000000,004751F9,?,00000000,00000000,000000FF,00000008,00000000,00000068,?,004751F9,?,?,?), ref: 00475007
      • Part of subcall function 00474F43: HeapFree.KERNEL32(00000000,?,004751F9), ref: 0047500E
    • GetProcessHeap.KERNEL32(00000008,00000020,?,?,?), ref: 00475205
    • HeapAlloc.KERNEL32(00000000), ref: 00475208
    • rand.MSVCRT ref: 0047521B
    • rand.MSVCRT ref: 00475226
    • rand.MSVCRT ref: 0047522F
    • sprintf.MSVCRT ref: 00475246
    • GetProcessHeap.KERNEL32(00000008,00000208,?,?,?,?,?,?,?,?,?,?,?,?,?,0047943A), ref: 00475252
    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,0047943A), ref: 00475255
    • sprintf.MSVCRT ref: 004752AB
      • Part of subcall function 00474B5D: GetProcessHeap.KERNEL32(00000008,00000000,757DFE8D,76F2D354,00000000,?,00000000,00000000,00000000), ref: 00474C14
      • Part of subcall function 00474B5D: HeapAlloc.KERNEL32(00000000), ref: 00474C1B
      • Part of subcall function 00474B5D: rand.MSVCRT ref: 00474CE6
    • HeapFree.KERNEL32(00000000), ref: 0047530B
      • Part of subcall function 0047501E: GetProcessHeap.KERNEL32(00000008,?,00000000,00000000,?,?,00000000,00000000,00000000,?,00000000,000000FF,00000008,?,00000000,00000000), ref: 0047508E
      • Part of subcall function 0047501E: HeapFree.KERNEL32(00000000,?,004752E8), ref: 00475095
      • Part of subcall function 004750A2: GetProcessHeap.KERNEL32(00000008,00000034,757DFE8D,00000000,?,?,?,004752FD,?,?,?,?,?,?,?,00000000), ref: 004750B3
      • Part of subcall function 004750A2: HeapAlloc.KERNEL32(00000000,?,?,?,004752FD,?,?,?,?,?,?,?,00000000,00000000,?,?), ref: 004750BA
      • Part of subcall function 004750A2: GetProcessHeap.KERNEL32(00000008,00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,00000000,000000FF,00000008,00000000,00000034,76F2D354), ref: 00475148
      • Part of subcall function 004750A2: HeapFree.KERNEL32(00000000), ref: 0047514F
      • Part of subcall function 004750A2: GetProcessHeap.KERNEL32(00000008,00000000,00000000,00000000,?,00000000,000000FF,00000008,00000000,00000034,76F2D354,?,?,?,004752FD,?), ref: 00475158
      • Part of subcall function 004750A2: HeapFree.KERNEL32(00000000), ref: 0047515F
    • GetProcessHeap.KERNEL32(00000008,00000000,?,00000000,00000000,00000000), ref: 00475308
    • GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0047943A), ref: 00475316
    • HeapFree.KERNEL32(00000000), ref: 00475319
    • GetProcessHeap.KERNEL32(00000008,?,?,?,?), ref: 00475324
    • HeapFree.KERNEL32(00000000), ref: 00475327
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • memset.MSVCRT ref: 0047862D
      • Part of subcall function 00478147: memset.MSVCRT ref: 00478160
      • Part of subcall function 00478147: GetVersionExW.KERNEL32(?,?,?,757DDE72), ref: 00478179
    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00478645
    • Process32FirstW.KERNEL32 ref: 00478666
    • OpenProcess.KERNEL32(00000450,00000000,0000022C), ref: 004786A0
    • OpenProcessToken.ADVAPI32(00000000,02000000,?), ref: 004786B9
    • GetTokenInformation.ADVAPI32(000000FF,0000000C,?,00000004,?), ref: 004786DF
    • DuplicateTokenEx.ADVAPI32(?,02000000,00000000,00000002,00000002,?), ref: 00478708
    • memset.MSVCRT ref: 0047871E
    • GetTokenInformation.ADVAPI32(?,0000000A,?,00000038,?,?,00000000,?), ref: 00478738
    • SetTokenInformation.ADVAPI32(?,0000000C,?,00000004,?,00000000,?), ref: 00478767
    • CloseHandle.KERNEL32(?), ref: 004787A2
    • CloseHandle.KERNEL32(?), ref: 004787A8
    • Process32NextW.KERNEL32(?,?), ref: 004787BA
    • GetLastError.KERNEL32 ref: 004787CA
    • CloseHandle.KERNEL32(?), ref: 004787D4
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000100,00000000,?,757DFE8D), ref: 004741FD
    • HeapAlloc.KERNEL32(00000000), ref: 00474204
      • Part of subcall function 004740E3: GetProcessHeap.KERNEL32(00000008,00000027,?,00000000,?,?,?,0047423D,?,?,?,?,00000000,00000002), ref: 004740F8
      • Part of subcall function 004740E3: HeapAlloc.KERNEL32(00000000,?,?,?,0047423D,?,?,?,?,00000000,00000002), ref: 004740FB
      • Part of subcall function 004740E3: GetProcessHeap.KERNEL32(00000008,00000009,?,?,?,0047423D,?,?,?,?,00000000,00000002), ref: 00474148
      • Part of subcall function 004740E3: HeapAlloc.KERNEL32(00000000,?,?,?,0047423D,?,?,?,?,00000000,00000002), ref: 0047414B
      • Part of subcall function 004740E3: Sleep.KERNEL32(000007D0,00000000,?,?,00000000,00000000,?,?,?,?,0047423D,?,?,?,?,00000000), ref: 00474184
      • Part of subcall function 004740E3: Sleep.KERNEL32(000007D0,00000000,?,?,00000000,?,=BG,?,?,?,0047423D,?,?,?,?,00000000), ref: 004741BC
      • Part of subcall function 004740E3: GetProcessHeap.KERNEL32(00000008,00000000,00000000,?,?,00000000,00000000,?,?,?,?,0047423D,?,?,?,?), ref: 004741CB
      • Part of subcall function 004740E3: HeapFree.KERNEL32(00000000), ref: 004741CE
      • Part of subcall function 004740E3: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,0047423D,?,?,?,?,00000000,00000002), ref: 004741D7
      • Part of subcall function 004740E3: HeapFree.KERNEL32(00000000), ref: 004741DA
      • Part of subcall function 00473D0D: Sleep.KERNEL32(000007D0,00000000,00000000,?,00000000,00000000,?), ref: 00473FF8
      • Part of subcall function 00473D0D: Sleep.KERNEL32(000007D0,00000000,00000000,?,00000000,00000000,?), ref: 00474063
      • Part of subcall function 00473D0D: GetProcessHeap.KERNEL32(00000008,?), ref: 0047406E
      • Part of subcall function 00473D0D: HeapAlloc.KERNEL32(00000000), ref: 00474075
      • Part of subcall function 00473D0D: memcpy.MSVCRT ref: 0047408F
    • GetProcessHeap.KERNEL32(00000008,00000000,?,00000000,?,?,?,00000000,00000100,?,?,?,?,?,00000000,00000002), ref: 00474287
    • HeapFree.KERNEL32(00000000), ref: 0047428E
    • GetProcessHeap.KERNEL32(00000008,00000000,?,00000000,?,?,?,00000000,00000008,?), ref: 004742D9
    • HeapFree.KERNEL32(00000000), ref: 004742E0
    • GetProcessHeap.KERNEL32(00000008,00000000,?,00000000,?,?,?,00000000,00000008,?), ref: 00474336
    • HeapFree.KERNEL32(00000000), ref: 0047433D
    • GetProcessHeap.KERNEL32(00000008,00000000,?,00000000,?,757DFE8D,?,00000000,00000100,?), ref: 00474399
    • HeapFree.KERNEL32(00000000), ref: 004743A0
    • memset.MSVCRT ref: 004743AE
    • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,?,00000000,00000002), ref: 0047466C
    • HeapFree.KERNEL32(00000000), ref: 00474673
      • Part of subcall function 00473D0D: GetProcessHeap.KERNEL32(00000008,0000FFFF,?,757DFE8D,?,?,?,00474269,?,00000000,?,?,?,00000000,00000100,?), ref: 00473D2B
      • Part of subcall function 00473D0D: HeapAlloc.KERNEL32(00000000,?,?,?,00474269,?,00000000,?,?,?,00000000,00000100,?,?,?,?), ref: 00473D34
      • Part of subcall function 00473D0D: GetProcessHeap.KERNEL32(00000008,00000027,00000000,?,?,?,00474269,?,00000000,?,?,?,00000000,00000100,?,?), ref: 00473D46
      • Part of subcall function 00473D0D: HeapAlloc.KERNEL32(00000000,?,?,?,00474269,?,00000000,?,?,?,00000000,00000100,?,?,?,?), ref: 00473D49
      • Part of subcall function 00473D0D: GetProcessHeap.KERNEL32(00000008,0000003D,?,?,?,00474269,?,00000000,?,?,?,00000000,00000100,?,?,?), ref: 00473D63
      • Part of subcall function 00473D0D: HeapAlloc.KERNEL32(00000000,?,?,?,00474269,?,00000000,?,?,?,00000000,00000100,?,?,?,?), ref: 00473D66
      • Part of subcall function 00473D0D: Sleep.KERNEL32(000007D0,00000000,?,?,00000000,00000000,?,?,?,?,00474269,?,00000000,?,?,?), ref: 00473E5B
      • Part of subcall function 00473D0D: GetProcessHeap.KERNEL32(00000008,00000029,?,?,?,00474269,?,00000000,?,?,?,00000000,00000100,?,?,?), ref: 00473E65
      • Part of subcall function 00473D0D: HeapAlloc.KERNEL32(00000000,?,?,?,00474269,?,00000000,?,?,?,00000000,00000100,?,?,?,?), ref: 00473E68
      • Part of subcall function 00473D0D: rand.MSVCRT ref: 00473EC3
      • Part of subcall function 00473D0D: memset.MSVCRT ref: 00473EFC
      • Part of subcall function 00473D0D: recv.WS2_32(00000000,00000000,0000FFFF,00000000), ref: 00473F38
      • Part of subcall function 00473D0D: htons.WS2_32(?), ref: 00473F5C
      • Part of subcall function 00473D0D: GetProcessHeap.KERNEL32(00000008,?,00000000,00000000,?,?,00000000,?,?,?,?,00474269,?,00000000,?,?), ref: 004740A0
      • Part of subcall function 00473D0D: HeapFree.KERNEL32(00000000), ref: 004740A7
      • Part of subcall function 00473D0D: GetProcessHeap.KERNEL32(00000008,00000000,00000000,?,?,00000000,00000000,?,?,?,?,00474269,?,00000000,?,?), ref: 004740B6
      • Part of subcall function 00473D0D: HeapFree.KERNEL32(00000000), ref: 004740B9
      • Part of subcall function 00473D0D: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00474269,?,00000000,?,?,?,00000000,00000100,?,?,?), ref: 004740C2
      • Part of subcall function 00473D0D: HeapFree.KERNEL32(00000000), ref: 004740C5
      • Part of subcall function 00473D0D: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00474269,?,00000000,?,?,?,00000000,00000100,?,?,?), ref: 004740D0
      • Part of subcall function 00473D0D: HeapFree.KERNEL32(00000000), ref: 004740D3
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • wsprintfW.USER32 ref: 00476118
    • PathCombineW.SHLWAPI(?,?,?), ref: 00476136
      • Part of subcall function 00476477: GetTickCount.KERNEL32(00477DDC,?,?,00000000,?,?,00477AA3,?,?,000000FF,?,?), ref: 00476477
    • WaitForMultipleObjects.KERNEL32(00000001,?,00000000,00000000), ref: 00476170
    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000000,00000000), ref: 00476191
      • Part of subcall function 004757E5: LocalAlloc.KERNEL32(00000040,000000F0,00000000,00000000), ref: 00475805
      • Part of subcall function 004757E5: GetSystemDefaultLCID.KERNEL32 ref: 0047581D
      • Part of subcall function 004757E5: GetTimeZoneInformation.KERNEL32(?), ref: 0047582D
      • Part of subcall function 004757E5: memcpy.MSVCRT ref: 0047584B
      • Part of subcall function 004757E5: NetWkstaGetInfo.NETAPI32(00480494,00000064,?), ref: 00475861
      • Part of subcall function 004757E5: memcpy.MSVCRT ref: 004758C7
      • Part of subcall function 004757E5: memcpy.MSVCRT ref: 004758EA
      • Part of subcall function 004757E5: NetApiBufferFree.NETAPI32(?,?,?,?), ref: 004758F3
      • Part of subcall function 004757E5: LocalAlloc.KERNEL32(00000040,?,?,00000000,?,?,?,?), ref: 00475924
      • Part of subcall function 004757E5: memcpy.MSVCRT ref: 00475943
      • Part of subcall function 004757E5: LocalFree.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?), ref: 0047598C
      • Part of subcall function 004757E5: LocalFree.KERNEL32(00000000,00000000,?,?,?,?), ref: 004759A2
    • memset.MSVCRT ref: 004761C8
    • StrCatW.SHLWAPI(?,Oops! Your files have been encrypted.If you see this text, your files are no longer accessible.You might have been looking f), ref: 004761E2
    • StrCatW.SHLWAPI(?,?), ref: 004761EE
    • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 0047621B
    • FlushFileBuffers.KERNEL32(00000000), ref: 00476226
    • LocalFree.KERNEL32(?), ref: 0047622F
    • CloseHandle.KERNEL32(00000000), ref: 00476236
    Strings
    • Readme.txt, xrefs: 00476107
    • Oops! Your files have been encrypted.If you see this text, your files are no longer accessible.You might have been looking f, xrefs: 004761D6
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000FFFF,757DFE8D,00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F), ref: 00473089
    • HeapAlloc.KERNEL32(00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 00473092
    • GetProcessHeap.KERNEL32(00000008,0000003F,757DC570,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 004730A4
    • HeapAlloc.KERNEL32(00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 004730A7
    • htons.WS2_32(0000003B), ref: 004730BF
    • send.WS2_32(0000002F,00000000,0000003F,00000000), ref: 004730F7
    • recv.WS2_32(0000002F,0000002F,0000FFFF,00000000), ref: 0047310D
    • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 00473127
    • HeapAlloc.KERNEL32(00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 0047312E
    • memcpy.MSVCRT ref: 00473144
    • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 00473153
    • HeapFree.KERNEL32(00000000), ref: 0047315A
    • GetProcessHeap.KERNEL32(00000008,0000002F,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 00473165
    • HeapFree.KERNEL32(00000000), ref: 0047316C
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetCurrentThread.KERNEL32(00020008,00000001,?), ref: 00478944
    • OpenThreadToken.ADVAPI32(00000000), ref: 0047894B
    • GetTokenInformation.ADVAPI32(?,00000002,00000000,00000000,?), ref: 0047896D
    • GetLastError.KERNEL32 ref: 0047897E
    • GlobalAlloc.KERNEL32(00000040,?), ref: 0047898F
    • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?), ref: 004789A8
    • GetSidSubAuthorityCount.ADVAPI32(00000004), ref: 004789BF
    • GetSidSubAuthority.ADVAPI32(00000004,00000004), ref: 004789D2
    • GetLastError.KERNEL32 ref: 004789FD
    • GlobalFree.KERNEL32(00000000), ref: 00478A00
    • GetLastError.KERNEL32 ref: 00478A08
    • CloseHandle.KERNEL32(?), ref: 00478A0F
    • GetLastError.KERNEL32 ref: 00478A17
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000FFFF,00000001,00000200,?,?,?,?,?,?,?,?), ref: 00472F73
    • HeapAlloc.KERNEL32(00000000), ref: 00472F7C
    • GetProcessHeap.KERNEL32(00000008,?,76F1C070), ref: 00472F97
    • HeapAlloc.KERNEL32(00000000), ref: 00472F9A
    • htons.WS2_32(424D53FE), ref: 00472FBA
    • memcpy.MSVCRT ref: 0047300B
    • send.WS2_32(?,00000000,?,00000000), ref: 0047301B
    • recv.WS2_32(?,?,0000FFFF,00000000), ref: 00473032
    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00473048
    • HeapFree.KERNEL32(00000000), ref: 0047304F
    • GetProcessHeap.KERNEL32(00000008,?), ref: 0047305A
    • HeapFree.KERNEL32(00000000), ref: 00473061
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000FFFF,00000000,?), ref: 004732CB
    • HeapAlloc.KERNEL32(00000000), ref: 004732D4
    • GetProcessHeap.KERNEL32(00000008,?,757DFE8D), ref: 004732EF
    • HeapAlloc.KERNEL32(00000000), ref: 004732F2
    • htons.WS2_32(?), ref: 0047330F
    • memcpy.MSVCRT ref: 0047333D
    • send.WS2_32(?,00000000,?,00000000), ref: 00473350
    • recv.WS2_32(?,?,0000FFFF,00000000), ref: 00473368
    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 0047337B
    • HeapFree.KERNEL32(00000000), ref: 00473382
    • GetProcessHeap.KERNEL32(00000008,?), ref: 0047338D
    • HeapFree.KERNEL32(00000000), ref: 00473394
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetSystemDirectoryW.KERNEL32(?,0000030C), ref: 00477C0E
    • lstrcatW.KERNEL32(?,\rundll32.exe), ref: 00477C28
    • GetModuleFileNameW.KERNEL32(C:\Windows\infpub.dat,0000030C), ref: 00477C43
    • PathFindFileNameW.SHLWAPI(C:\Windows\infpub.dat), ref: 00477C51
    • wsprintfW.USER32 ref: 00477C6B
    • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00477CB3
    • ExitProcess.KERNEL32 ref: 00477CBA
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetComputerNameExW.KERNEL32(00000004,?,?,00000000,73349263,00000000), ref: 00478D80
    • DhcpEnumSubnets.DHCPSAPI(?,?,00000400,?,?,?), ref: 00478DA2
    • DhcpGetSubnetInfo.DHCPSAPI(00000000,?,?), ref: 00478DCE
    • DhcpEnumSubnetClients.DHCPSAPI(00000000,?,?,00010000,00000400,?,?), ref: 00478E07
    • htonl.WS2_32(00000000), ref: 00478E36
    • htonl.WS2_32(00000000), ref: 00478E44
    • inet_ntoa.WS2_32(00000000), ref: 00478E47
      • Part of subcall function 0047641A: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,774E2D57,?,757DC426), ref: 00476439
      • Part of subcall function 0047641A: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00476446
      • Part of subcall function 0047641A: HeapAlloc.KERNEL32(00000000), ref: 0047644D
      • Part of subcall function 0047641A: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?), ref: 00476465
    • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000), ref: 00478E65
    • HeapFree.KERNEL32(00000000), ref: 00478E6C
    • DhcpRpcFreeMemory.DHCPSAPI(00000400), ref: 00478E81
    • DhcpRpcFreeMemory.DHCPSAPI(?), ref: 00478E9A
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000FFFF,?,00000000,?), ref: 00472E32
    • HeapAlloc.KERNEL32(00000000), ref: 00472E3B
    • GetProcessHeap.KERNEL32(00000008,00000048,757DFE8D), ref: 00472E4D
    • HeapAlloc.KERNEL32(00000000), ref: 00472E50
    • htons.WS2_32(00000044), ref: 00472E68
    • send.WS2_32(0BADF00D,00000000,00000048,00000000), ref: 00472EF3
    • recv.WS2_32(0BADF00D,00000008,0000FFFF,00000000), ref: 00472F0B
    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00472F31
    • HeapFree.KERNEL32(00000000), ref: 00472F38
    • GetProcessHeap.KERNEL32(00000008,?), ref: 00472F43
    • HeapFree.KERNEL32(00000000), ref: 00472F4A
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000027,?,00000000,?,?,?,0047423D,?,?,?,?,00000000,00000002), ref: 004740F8
    • HeapAlloc.KERNEL32(00000000,?,?,?,0047423D,?,?,?,?,00000000,00000002), ref: 004740FB
    • GetProcessHeap.KERNEL32(00000008,00000009,?,?,?,0047423D,?,?,?,?,00000000,00000002), ref: 00474148
    • HeapAlloc.KERNEL32(00000000,?,?,?,0047423D,?,?,?,?,00000000,00000002), ref: 0047414B
    • HeapFree.KERNEL32(00000000), ref: 004741DA
      • Part of subcall function 00473209: GetProcessHeap.KERNEL32(00000008,?,00000000,?,?,?,00473BAA,?,?,?,00000000,00000000,?,?,?,00474A6E), ref: 00473220
      • Part of subcall function 00473209: HeapAlloc.KERNEL32(00000000,?,00473BAA,?,?,?,00000000,00000000,?,?,?,00474A6E,?,?,?,?), ref: 00473227
      • Part of subcall function 00473209: htons.WS2_32(?), ref: 00473246
      • Part of subcall function 00473209: memcpy.MSVCRT ref: 00473276
      • Part of subcall function 00473209: send.WS2_32(?,00000000,?,00000000), ref: 00473287
      • Part of subcall function 00473209: GetProcessHeap.KERNEL32(00000008,00000000), ref: 0047329A
      • Part of subcall function 00473209: HeapFree.KERNEL32(00000000), ref: 004732A1
    • Sleep.KERNEL32(000007D0,00000000,?,?,00000000,00000000,?,?,?,?,0047423D,?,?,?,?,00000000), ref: 00474184
    • Sleep.KERNEL32(000007D0,00000000,?,?,00000000,?,=BG,?,?,?,0047423D,?,?,?,?,00000000), ref: 004741BC
    • GetProcessHeap.KERNEL32(00000008,00000000,00000000,?,?,00000000,00000000,?,?,?,?,0047423D,?,?,?,?), ref: 004741CB
    • HeapFree.KERNEL32(00000000), ref: 004741CE
    • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,0047423D,?,?,?,?,00000000,00000002), ref: 004741D7
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • CreateFileW.KERNEL32(C:\Windows\infpub.dat,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0047884F
    • GetFileSize.KERNEL32(00000000,00000000), ref: 00478860
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0047886F
    • HeapAlloc.KERNEL32(00000000), ref: 00478876
    • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0047888F
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004788A0
    • HeapFree.KERNEL32(00000000), ref: 004788A7
    • CloseHandle.KERNEL32(?), ref: 004788C6
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetTickCount.KERNEL32(?,?,?,004779E8), ref: 004778AF
    • srand.MSVCRT ref: 004778B2
    • GetTickCount.KERNEL32(?,?,004779E8), ref: 004778B9
      • Part of subcall function 00477CC5: GetCurrentProcess.KERNEL32(00000028,?,?,00000000,?,?,?,004779E8), ref: 00477CE9
      • Part of subcall function 00477CC5: OpenProcessToken.ADVAPI32(00000000,?,00000000,?,?,?,004779E8), ref: 00477CF0
      • Part of subcall function 00477CC5: LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00477D02
      • Part of subcall function 00477CC5: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00477D25
      • Part of subcall function 00477CC5: GetLastError.KERNEL32(?,00000000), ref: 00477D2D
      • Part of subcall function 00477CC5: SetLastError.KERNEL32(?,?,00000000,?,?,?,004779E8), ref: 00477D3F
      • Part of subcall function 0047855F: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00478571
      • Part of subcall function 0047855F: Process32FirstW.KERNEL32(00000000,?), ref: 0047858F
      • Part of subcall function 0047855F: Process32NextW.KERNEL32(00000000,0000022C), ref: 004785E4
      • Part of subcall function 0047855F: CloseHandle.KERNEL32(00000000), ref: 004785EF
      • Part of subcall function 0047554A: CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000018,F0000000,?,?,?,0047790E,?,00000004,SeTcbPrivilege,SeDebugPrivilege,SeShutdownPrivilege), ref: 00475561
      • Part of subcall function 0047554A: GetLastError.KERNEL32(?,?,?,0047790E,?,00000004,SeTcbPrivilege,SeDebugPrivilege,SeShutdownPrivilege,?,?,004779E8), ref: 0047556B
      • Part of subcall function 0047554A: CryptGenRandom.ADVAPI32(?,?,?,?,?,?,0047790E,?,00000004,SeTcbPrivilege,SeDebugPrivilege,SeShutdownPrivilege,?,?,004779E8), ref: 00475581
      • Part of subcall function 0047554A: CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,0047790E,?,00000004,SeTcbPrivilege,SeDebugPrivilege,SeShutdownPrivilege,?,?,004779E8), ref: 0047558E
    • GetModuleFileNameW.KERNEL32(C:\Windows\infpub.dat,0000030C,?,00000004,SeTcbPrivilege,SeDebugPrivilege,SeShutdownPrivilege,?,?,004779E8), ref: 00477926
      • Part of subcall function 00478832: CreateFileW.KERNEL32(C:\Windows\infpub.dat,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0047884F
      • Part of subcall function 00478832: GetFileSize.KERNEL32(00000000,00000000), ref: 00478860
      • Part of subcall function 00478832: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0047886F
      • Part of subcall function 00478832: HeapAlloc.KERNEL32(00000000), ref: 00478876
      • Part of subcall function 00478832: ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0047888F
      • Part of subcall function 00478832: GetProcessHeap.KERNEL32(00000000,00000000), ref: 004788A0
      • Part of subcall function 00478832: HeapFree.KERNEL32(00000000), ref: 004788A7
      • Part of subcall function 00478832: CloseHandle.KERNEL32(?), ref: 004788C6
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • EnterCriticalSection.KERNEL32(?,002F16E0,757DC570,757DFE8D,?,?,00476A84,002F16E0,?,?), ref: 00476E87
      • Part of subcall function 00476DA4: EnterCriticalSection.KERNEL32(?,00000000,002F16E0,?,?,00476E98,002F16E0,00000000,?,?,00476A84,002F16E0,?), ref: 00476DB5
      • Part of subcall function 00476DA4: LeaveCriticalSection.KERNEL32(?,?,?,00476E98,002F16E0,00000000,?,?,00476A84,002F16E0,?), ref: 00476E0C
    • GetProcessHeap.KERNEL32(00000008,?,?,002F16E0,00000000,?,?,00476A84,002F16E0,?,?), ref: 00476F41
    • HeapReAlloc.KERNEL32(00000000,?,?,00476A84,002F16E0,?,?), ref: 00476F48
      • Part of subcall function 00476E66: GetProcessHeap.KERNEL32(00000008,00000008,002F16E0,00000000,?,?,00476A84,002F16E0,?,?), ref: 00476EB8
      • Part of subcall function 00476E66: HeapAlloc.KERNEL32(00000000,?,?,00476A84,002F16E0,?,?), ref: 00476EC1
      • Part of subcall function 00476E66: GetProcessHeap.KERNEL32(00000008,?,?,?,00476A84,002F16E0,?,?), ref: 00476ED9
      • Part of subcall function 00476E66: HeapAlloc.KERNEL32(00000000,?,?,00476A84,002F16E0,?,?), ref: 00476EDC
      • Part of subcall function 00476E66: memcpy.MSVCRT ref: 00476F0D
      • Part of subcall function 00476E66: GetProcessHeap.KERNEL32(00000000,?,?,?,00476A84,002F16E0,?,?), ref: 00476F26
      • Part of subcall function 00476E66: HeapFree.KERNEL32(00000000), ref: 00476F29
    • LeaveCriticalSection.KERNEL32(?,002F16E0,00000000,?,?,00476A84,002F16E0,?,?), ref: 00476F6C
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,?,76EBE52D,00000000,00000000), ref: 004769E3
    • HeapAlloc.KERNEL32(00000000), ref: 004769EC
    • memcpy.MSVCRT ref: 00476A19
    • GetProcessHeap.KERNEL32(00000008,?), ref: 00476A3D
    • HeapAlloc.KERNEL32(00000000), ref: 00476A40
    • memcpy.MSVCRT ref: 00476A6F
      • Part of subcall function 00476E66: EnterCriticalSection.KERNEL32(?,002F16E0,757DC570,757DFE8D,?,?,00476A84,002F16E0,?,?), ref: 00476E87
      • Part of subcall function 00476E66: GetProcessHeap.KERNEL32(00000008,00000008,002F16E0,00000000,?,?,00476A84,002F16E0,?,?), ref: 00476EB8
      • Part of subcall function 00476E66: HeapAlloc.KERNEL32(00000000,?,?,00476A84,002F16E0,?,?), ref: 00476EC1
      • Part of subcall function 00476E66: GetProcessHeap.KERNEL32(00000008,?,?,?,00476A84,002F16E0,?,?), ref: 00476ED9
      • Part of subcall function 00476E66: HeapAlloc.KERNEL32(00000000,?,?,00476A84,002F16E0,?,?), ref: 00476EDC
      • Part of subcall function 00476E66: memcpy.MSVCRT ref: 00476F0D
      • Part of subcall function 00476E66: GetProcessHeap.KERNEL32(00000000,?,?,?,00476A84,002F16E0,?,?), ref: 00476F26
      • Part of subcall function 00476E66: HeapFree.KERNEL32(00000000), ref: 00476F29
      • Part of subcall function 00476E66: GetProcessHeap.KERNEL32(00000008,?,?,002F16E0,00000000,?,?,00476A84,002F16E0,?,?), ref: 00476F41
      • Part of subcall function 00476E66: HeapReAlloc.KERNEL32(00000000,?,?,00476A84,002F16E0,?,?), ref: 00476F48
      • Part of subcall function 00476E66: LeaveCriticalSection.KERNEL32(?,002F16E0,00000000,?,?,00476A84,002F16E0,?,?), ref: 00476F6C
    • GetProcessHeap.KERNEL32(00000000,?,002F16E0,?,?), ref: 00476A8F
    • HeapFree.KERNEL32(00000000), ref: 00476A92
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00476A99
    • HeapFree.KERNEL32(00000000), ref: 00476A9C
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,?,761B423D,00000000), ref: 004768EB
    • HeapAlloc.KERNEL32(00000000), ref: 004768F4
    • memcpy.MSVCRT ref: 00476921
    • GetProcessHeap.KERNEL32(00000008,?,757DCF90), ref: 00476946
    • HeapAlloc.KERNEL32(00000000), ref: 00476949
    • memcpy.MSVCRT ref: 00476978
      • Part of subcall function 00476E1B: EnterCriticalSection.KERNEL32(?,757DC570,757DFE8D,?,?,0047698E,?), ref: 00476E2A
      • Part of subcall function 00476E1B: LeaveCriticalSection.KERNEL32(?,0047698E,?,?,?,0047698E,?), ref: 00476E58
    • GetProcessHeap.KERNEL32(00000000,?,?), ref: 00476995
    • HeapFree.KERNEL32(00000000), ref: 00476998
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0047699F
    • HeapFree.KERNEL32(00000000), ref: 004769A2
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000068,757DFE8D,?,773E29EE,?,004751F9,?,?,?), ref: 00474F56
    • HeapAlloc.KERNEL32(00000000,?,004751F9,?,?,?), ref: 00474F5D
    • rand.MSVCRT ref: 00474F86
      • Part of subcall function 00472F5A: GetProcessHeap.KERNEL32(00000008,0000FFFF,00000001,00000200,?,?,?,?,?,?,?,?), ref: 00472F73
      • Part of subcall function 00472F5A: HeapAlloc.KERNEL32(00000000), ref: 00472F7C
      • Part of subcall function 00472F5A: GetProcessHeap.KERNEL32(00000008,?,76F1C070), ref: 00472F97
      • Part of subcall function 00472F5A: HeapAlloc.KERNEL32(00000000), ref: 00472F9A
      • Part of subcall function 00472F5A: htons.WS2_32(424D53FE), ref: 00472FBA
      • Part of subcall function 00472F5A: memcpy.MSVCRT ref: 0047300B
      • Part of subcall function 00472F5A: send.WS2_32(?,00000000,?,00000000), ref: 0047301B
      • Part of subcall function 00472F5A: recv.WS2_32(?,?,0000FFFF,00000000), ref: 00473032
      • Part of subcall function 00472F5A: GetProcessHeap.KERNEL32(00000008,00000000), ref: 00473048
      • Part of subcall function 00472F5A: HeapFree.KERNEL32(00000000), ref: 0047304F
      • Part of subcall function 00472F5A: GetProcessHeap.KERNEL32(00000008,?), ref: 0047305A
      • Part of subcall function 00472F5A: HeapFree.KERNEL32(00000000), ref: 00473061
    • HeapFree.KERNEL32(00000000,?,004751F9), ref: 0047500E
      • Part of subcall function 00473071: GetProcessHeap.KERNEL32(00000008,0000FFFF,757DFE8D,00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F), ref: 00473089
      • Part of subcall function 00473071: HeapAlloc.KERNEL32(00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 00473092
      • Part of subcall function 00473071: GetProcessHeap.KERNEL32(00000008,0000003F,757DC570,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 004730A4
      • Part of subcall function 00473071: HeapAlloc.KERNEL32(00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 004730A7
      • Part of subcall function 00473071: htons.WS2_32(0000003B), ref: 004730BF
      • Part of subcall function 00473071: send.WS2_32(0000002F,00000000,0000003F,00000000), ref: 004730F7
      • Part of subcall function 00473071: recv.WS2_32(0000002F,0000002F,0000FFFF,00000000), ref: 0047310D
      • Part of subcall function 00473071: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 00473127
      • Part of subcall function 00473071: HeapAlloc.KERNEL32(00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 0047312E
      • Part of subcall function 00473071: memcpy.MSVCRT ref: 00473144
      • Part of subcall function 00473071: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 00473153
      • Part of subcall function 00473071: HeapFree.KERNEL32(00000000), ref: 0047315A
      • Part of subcall function 00473071: GetProcessHeap.KERNEL32(00000008,0000002F,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 00473165
      • Part of subcall function 00473071: HeapFree.KERNEL32(00000000), ref: 0047316C
    • GetProcessHeap.KERNEL32(00000008,?,004751F9,?,00000000,?,004751F9,004751F9,?,00000000,00000000,000000FF,00000008,00000000,00000068), ref: 00474FF7
    • HeapFree.KERNEL32(00000000), ref: 00474FFE
    • GetProcessHeap.KERNEL32(00000008,00000000,004751F9,?,00000000,00000000,000000FF,00000008,00000000,00000068,?,004751F9,?,?,?), ref: 00475007
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000048,?,?,00000000,IPC$,?,00000000,00000000), ref: 00474E76
    • HeapAlloc.KERNEL32(00000000), ref: 00474E79
      • Part of subcall function 00472F5A: GetProcessHeap.KERNEL32(00000008,0000FFFF,00000001,00000200,?,?,?,?,?,?,?,?), ref: 00472F73
      • Part of subcall function 00472F5A: HeapAlloc.KERNEL32(00000000), ref: 00472F7C
      • Part of subcall function 00472F5A: GetProcessHeap.KERNEL32(00000008,?,76F1C070), ref: 00472F97
      • Part of subcall function 00472F5A: HeapAlloc.KERNEL32(00000000), ref: 00472F9A
      • Part of subcall function 00472F5A: htons.WS2_32(424D53FE), ref: 00472FBA
      • Part of subcall function 00472F5A: memcpy.MSVCRT ref: 0047300B
      • Part of subcall function 00472F5A: send.WS2_32(?,00000000,?,00000000), ref: 0047301B
      • Part of subcall function 00472F5A: recv.WS2_32(?,?,0000FFFF,00000000), ref: 00473032
      • Part of subcall function 00472F5A: GetProcessHeap.KERNEL32(00000008,00000000), ref: 00473048
      • Part of subcall function 00472F5A: HeapFree.KERNEL32(00000000), ref: 0047304F
      • Part of subcall function 00472F5A: GetProcessHeap.KERNEL32(00000008,?), ref: 0047305A
      • Part of subcall function 00472F5A: HeapFree.KERNEL32(00000000), ref: 00473061
    • HeapFree.KERNEL32(00000000), ref: 00474F35
      • Part of subcall function 00473071: GetProcessHeap.KERNEL32(00000008,0000FFFF,757DFE8D,00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F), ref: 00473089
      • Part of subcall function 00473071: HeapAlloc.KERNEL32(00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 00473092
      • Part of subcall function 00473071: GetProcessHeap.KERNEL32(00000008,0000003F,757DC570,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 004730A4
      • Part of subcall function 00473071: HeapAlloc.KERNEL32(00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 004730A7
      • Part of subcall function 00473071: htons.WS2_32(0000003B), ref: 004730BF
      • Part of subcall function 00473071: send.WS2_32(0000002F,00000000,0000003F,00000000), ref: 004730F7
      • Part of subcall function 00473071: recv.WS2_32(0000002F,0000002F,0000FFFF,00000000), ref: 0047310D
      • Part of subcall function 00473071: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 00473127
      • Part of subcall function 00473071: HeapAlloc.KERNEL32(00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 0047312E
      • Part of subcall function 00473071: memcpy.MSVCRT ref: 00473144
      • Part of subcall function 00473071: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 00473153
      • Part of subcall function 00473071: HeapFree.KERNEL32(00000000), ref: 0047315A
      • Part of subcall function 00473071: GetProcessHeap.KERNEL32(00000008,0000002F,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 00473165
      • Part of subcall function 00473071: HeapFree.KERNEL32(00000000), ref: 0047316C
    • GetProcessHeap.KERNEL32(00000008,00000000,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 00474F2A
    • HeapFree.KERNEL32(00000000), ref: 00474F2D
    • GetProcessHeap.KERNEL32(00000008,00000000,00000008,000000FF,0000002F,0000002F,000000FF,00000008,00000000,00000048,00000000), ref: 00474F32
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000034,757DFE8D,00000000,?,?,?,004752FD,?,?,?,?,?,?,?,00000000), ref: 004750B3
    • HeapAlloc.KERNEL32(00000000,?,?,?,004752FD,?,?,?,?,?,?,?,00000000,00000000,?,?), ref: 004750BA
      • Part of subcall function 00472F5A: GetProcessHeap.KERNEL32(00000008,0000FFFF,00000001,00000200,?,?,?,?,?,?,?,?), ref: 00472F73
      • Part of subcall function 00472F5A: HeapAlloc.KERNEL32(00000000), ref: 00472F7C
      • Part of subcall function 00472F5A: GetProcessHeap.KERNEL32(00000008,?,76F1C070), ref: 00472F97
      • Part of subcall function 00472F5A: HeapAlloc.KERNEL32(00000000), ref: 00472F9A
      • Part of subcall function 00472F5A: htons.WS2_32(424D53FE), ref: 00472FBA
      • Part of subcall function 00472F5A: memcpy.MSVCRT ref: 0047300B
      • Part of subcall function 00472F5A: send.WS2_32(?,00000000,?,00000000), ref: 0047301B
      • Part of subcall function 00472F5A: recv.WS2_32(?,?,0000FFFF,00000000), ref: 00473032
      • Part of subcall function 00472F5A: GetProcessHeap.KERNEL32(00000008,00000000), ref: 00473048
      • Part of subcall function 00472F5A: HeapFree.KERNEL32(00000000), ref: 0047304F
      • Part of subcall function 00472F5A: GetProcessHeap.KERNEL32(00000008,?), ref: 0047305A
      • Part of subcall function 00472F5A: HeapFree.KERNEL32(00000000), ref: 00473061
    • HeapFree.KERNEL32(00000000), ref: 0047515F
      • Part of subcall function 00473071: GetProcessHeap.KERNEL32(00000008,0000FFFF,757DFE8D,00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F), ref: 00473089
      • Part of subcall function 00473071: HeapAlloc.KERNEL32(00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 00473092
      • Part of subcall function 00473071: GetProcessHeap.KERNEL32(00000008,0000003F,757DC570,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 004730A4
      • Part of subcall function 00473071: HeapAlloc.KERNEL32(00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 004730A7
      • Part of subcall function 00473071: htons.WS2_32(0000003B), ref: 004730BF
      • Part of subcall function 00473071: send.WS2_32(0000002F,00000000,0000003F,00000000), ref: 004730F7
      • Part of subcall function 00473071: recv.WS2_32(0000002F,0000002F,0000FFFF,00000000), ref: 0047310D
      • Part of subcall function 00473071: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 00473127
      • Part of subcall function 00473071: HeapAlloc.KERNEL32(00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 0047312E
      • Part of subcall function 00473071: memcpy.MSVCRT ref: 00473144
      • Part of subcall function 00473071: GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 00473153
      • Part of subcall function 00473071: HeapFree.KERNEL32(00000000), ref: 0047315A
      • Part of subcall function 00473071: GetProcessHeap.KERNEL32(00000008,0000002F,?,?,?,00474F10,00000000,00000000,0000002F,00000000,00000000,00000008,000000FF,0000002F,0000002F), ref: 00473165
      • Part of subcall function 00473071: HeapFree.KERNEL32(00000000), ref: 0047316C
    • GetProcessHeap.KERNEL32(00000008,00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,00000000,000000FF,00000008,00000000,00000034,76F2D354), ref: 00475148
    • HeapFree.KERNEL32(00000000), ref: 0047514F
    • GetProcessHeap.KERNEL32(00000008,00000000,00000000,00000000,?,00000000,000000FF,00000008,00000000,00000034,76F2D354,?,?,?,004752FD,?), ref: 00475158
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,?,00000000,?,?,?,00473745,?,?,?,00000000,00000000,?,?,?,00474A6E), ref: 004733BB
    • HeapAlloc.KERNEL32(00000000,?,00473745,?,?,?,00000000,00000000,?,?,?,00474A6E,?,?,?,?), ref: 004733C2
    • htons.WS2_32(?), ref: 004733E1
    • memcpy.MSVCRT ref: 00473410
    • send.WS2_32(?,00000000,?,00000000), ref: 00473421
    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00473434
    • HeapFree.KERNEL32(00000000), ref: 0047343B
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,?,00000000,?,?,?,00473BAA,?,?,?,00000000,00000000,?,?,?,00474A6E), ref: 00473220
    • HeapAlloc.KERNEL32(00000000,?,00473BAA,?,?,?,00000000,00000000,?,?,?,00474A6E,?,?,?,?), ref: 00473227
    • htons.WS2_32(?), ref: 00473246
    • memcpy.MSVCRT ref: 00473276
    • send.WS2_32(?,00000000,?,00000000), ref: 00473287
    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 0047329A
    • HeapFree.KERNEL32(00000000), ref: 004732A1
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000000,?,757DFE8D,773E29EE,?,?,00476CBD,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476C29
    • HeapFree.KERNEL32(00000000), ref: 00476C2C
    • GetProcessHeap.KERNEL32(00000000,?,757DFE8D,773E29EE,?,?,00476CBD,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476C39
    • HeapFree.KERNEL32(00000000), ref: 00476C3C
    • GetProcessHeap.KERNEL32(00000000,?,757DFE8D,773E29EE,?,?,00476CBD,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476C4E
    • HeapFree.KERNEL32(00000000), ref: 00476C51
    • GetProcessHeap.KERNEL32(00000000,00000000,757DFE8D,773E29EE,?,?,00476CBD,?,?,00000000,?,00477A55,00000024,00476AA8,00000000,0000FFFF), ref: 00476C56
    • HeapFree.KERNEL32(00000000), ref: 00476C59
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • CommandLineToArgvW.SHELL32(?,?), ref: 00476566
    • StrToIntW.SHLWAPI(00000000), ref: 00476581
    • StrStrW.SHLWAPI(00000000,00481580), ref: 004765B3
      • Part of subcall function 004764A6: CommandLineToArgvW.SHELL32(-00000004,?), ref: 004764DC
      • Part of subcall function 004764A6: LocalFree.KERNEL32(00000000,?,?,?,004765C0,?,?,?,?,?,00477A8E,?), ref: 00476522
      • Part of subcall function 004769AE: GetProcessHeap.KERNEL32(00000008,?,76EBE52D,00000000,00000000), ref: 004769E3
      • Part of subcall function 004769AE: HeapAlloc.KERNEL32(00000000), ref: 004769EC
      • Part of subcall function 004769AE: memcpy.MSVCRT ref: 00476A19
      • Part of subcall function 004769AE: GetProcessHeap.KERNEL32(00000008,?), ref: 00476A3D
      • Part of subcall function 004769AE: HeapAlloc.KERNEL32(00000000), ref: 00476A40
      • Part of subcall function 004769AE: memcpy.MSVCRT ref: 00476A6F
      • Part of subcall function 004769AE: GetProcessHeap.KERNEL32(00000000,?,002F16E0,?,?), ref: 00476A8F
      • Part of subcall function 004769AE: HeapFree.KERNEL32(00000000), ref: 00476A92
      • Part of subcall function 004769AE: GetProcessHeap.KERNEL32(00000000,?), ref: 00476A99
      • Part of subcall function 004769AE: HeapFree.KERNEL32(00000000), ref: 00476A9C
    • StrStrW.SHLWAPI(00000000,00481588), ref: 004765CD
    • StrChrW.SHLWAPI(00000000,0000003A), ref: 004765DF
    • LocalFree.KERNEL32(00000000,?,?,?,?,00477A8E,?), ref: 00476607
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
      • Part of subcall function 00476CED: GetProcessHeap.KERNEL32(00000008,00000008,00000000,?,?,00476B24,00000000,00000000,00000000,00000000,?,0047A09A,00476AA8,00000000,00000000,00000000), ref: 00476CFC
      • Part of subcall function 00476CED: HeapAlloc.KERNEL32(00000000,?,?,00476B24,00000000,00000000,00000000,00000000,?,0047A09A,00476AA8,00000000,00000000,00000000,00000024,00476AA8), ref: 00476CFF
      • Part of subcall function 00476CED: GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,00476B24,00000000,00000000,00000000,00000000,?,0047A09A,00476AA8,00000000,00000000,00000000), ref: 00476D24
      • Part of subcall function 00476CED: HeapFree.KERNEL32(00000000), ref: 00476D27
    • CreateThread.KERNEL32(00000000,00000000,0047988B,?,00000004,00000000), ref: 004798FD
    • SetThreadToken.ADVAPI32(?,?,?,0047A15C,?,00000000), ref: 0047990F
    • ResumeThread.KERNEL32(?,?,0047A15C,?,00000000), ref: 0047991C
    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0047992C
    • GetLastError.KERNEL32(?,0047A15C,?,00000000), ref: 00479934
    • CloseHandle.KERNEL32(?), ref: 0047993D
      • Part of subcall function 00476B46: GetProcessHeap.KERNEL32(00000000,"gG,?,00476722,?), ref: 00476B4E
      • Part of subcall function 00476B46: HeapFree.KERNEL32(00000000,?,00476722), ref: 00476B55
      • Part of subcall function 00476D35: EnterCriticalSection.KERNEL32(00000000,757DFE8D,?,00476D1C,?,?,?,00476B24,00000000,00000000,00000000,00000000,?,0047A09A,00476AA8,00000000), ref: 00476D46
      • Part of subcall function 00476D35: LeaveCriticalSection.KERNEL32(00000000,?,00476D1C,?,?,?,00476B24,00000000,00000000,00000000,00000000,?,0047A09A,00476AA8,00000000,00000000), ref: 00476D7F
      • Part of subcall function 00476D35: Sleep.KERNELBASE(00002710,?,00476D1C,?,?,?,00476B24,00000000,00000000,00000000,00000000,?,0047A09A,00476AA8,00000000,00000000), ref: 00476D97
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
      • Part of subcall function 00476477: GetTickCount.KERNEL32(00477DDC,?,?,00000000,?,?,00477AA3,?,?,000000FF,?,?), ref: 00476477
    • wsprintfW.USER32 ref: 00476758
    • EnterCriticalSection.KERNEL32(00487B9C,00007FD3,002F16E0,00000028), ref: 00476783
    • LeaveCriticalSection.KERNEL32(00487B9C), ref: 004767EA
      • Part of subcall function 00476628: wsprintfW.USER32 ref: 004766C0
      • Part of subcall function 00476628: StrCatW.SHLWAPI(00483B90,?), ref: 004766F8
    • StrCatW.SHLWAPI(?,?), ref: 004767D1
    • StrCatW.SHLWAPI(?,00483B90), ref: 004767D7
    • SetLastError.KERNEL32(0000007A), ref: 004767DF
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • CreateThread.KERNEL32(00000000,00000000,0047A016,00000000,00000004,00000000), ref: 0047A3C9
    • SetThreadToken.ADVAPI32(?,?,?,?,00477B43,?,?,00000004,0047787C,00000000,000000FF), ref: 0047A3DD
    • ResumeThread.KERNEL32(?,?,?,00477B43,?,?,00000004,0047787C,00000000,000000FF), ref: 0047A3EA
    • GetLastError.KERNEL32(?,?,00477B43,?,?,00000004,0047787C,00000000,000000FF), ref: 0047A3F7
    • CloseHandle.KERNEL32(?), ref: 0047A402
    • SetLastError.KERNEL32(00000057,?,?,00477B43,?,?,00000004,0047787C,00000000,000000FF), ref: 0047A411
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • CreateThread.KERNEL32(00000000,00000000,00477957,00000000,00000004,00000000), ref: 00477988
    • SetThreadToken.ADVAPI32(?,00000000,?,?,?,00477B4A,?,?,?,00000004,0047787C,00000000,000000FF), ref: 0047799C
    • ResumeThread.KERNEL32(?,?,?,?,00477B4A,?,?,?,00000004,0047787C,00000000,000000FF), ref: 004779A9
    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004779B9
    • GetLastError.KERNEL32(?,?,?,00477B4A,?,?,?,00000004,0047787C,00000000,000000FF), ref: 004779C1
    • CloseHandle.KERNEL32(?), ref: 004779CA
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000200,?,?,?,?,004747E5,?,?,00000000,?,?,?,?,?,?), ref: 0047318E
    • HeapAlloc.KERNEL32(00000000,?,?,?,004747E5,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00473195
    • rand.MSVCRT ref: 004731AF
    • rand.MSVCRT ref: 004731BD
      • Part of subcall function 00472F5A: GetProcessHeap.KERNEL32(00000008,0000FFFF,00000001,00000200,?,?,?,?,?,?,?,?), ref: 00472F73
      • Part of subcall function 00472F5A: HeapAlloc.KERNEL32(00000000), ref: 00472F7C
      • Part of subcall function 00472F5A: GetProcessHeap.KERNEL32(00000008,?,76F1C070), ref: 00472F97
      • Part of subcall function 00472F5A: HeapAlloc.KERNEL32(00000000), ref: 00472F9A
      • Part of subcall function 00472F5A: htons.WS2_32(424D53FE), ref: 00472FBA
      • Part of subcall function 00472F5A: memcpy.MSVCRT ref: 0047300B
      • Part of subcall function 00472F5A: send.WS2_32(?,00000000,?,00000000), ref: 0047301B
      • Part of subcall function 00472F5A: recv.WS2_32(?,?,0000FFFF,00000000), ref: 00473032
      • Part of subcall function 00472F5A: GetProcessHeap.KERNEL32(00000008,00000000), ref: 00473048
      • Part of subcall function 00472F5A: HeapFree.KERNEL32(00000000), ref: 0047304F
      • Part of subcall function 00472F5A: GetProcessHeap.KERNEL32(00000008,?), ref: 0047305A
      • Part of subcall function 00472F5A: HeapFree.KERNEL32(00000000), ref: 00473061
    • GetProcessHeap.KERNEL32(00000008,?,?,00000000,000000FF,00000004,?,00000200,?,?,?,004747E5,?,?,00000000,?), ref: 004731F4
    • HeapFree.KERNEL32(00000000), ref: 004731FB
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
      • Part of subcall function 004788D3: PathFindFileNameW.SHLWAPI(C:\Windows\infpub.dat), ref: 004788E3
    • wsprintfW.USER32 ref: 00479AAF
    • wsprintfW.USER32 ref: 00479B0D
      • Part of subcall function 00476735: wsprintfW.USER32 ref: 00476758
      • Part of subcall function 00476735: EnterCriticalSection.KERNEL32(00487B9C,00007FD3,002F16E0,00000028), ref: 00476783
      • Part of subcall function 00476735: StrCatW.SHLWAPI(?,?), ref: 004767D1
      • Part of subcall function 00476735: StrCatW.SHLWAPI(?,00483B90), ref: 004767D7
      • Part of subcall function 00476735: SetLastError.KERNEL32(0000007A), ref: 004767DF
      • Part of subcall function 00476735: LeaveCriticalSection.KERNEL32(00487B9C), ref: 004767EA
    • wsprintfW.USER32 ref: 00479B56
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000000,757DFE8D,76F2D354,00000000,?,00000000,00000000,00000000), ref: 00474C14
    • HeapAlloc.KERNEL32(00000000), ref: 00474C1B
    • rand.MSVCRT ref: 00474CE6
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?,?,?,?,004779FC,?,?,?), ref: 0047927B
    • memcpy.MSVCRT ref: 00479294
    • VirtualProtect.KERNEL32(00000000,?,00000004,?), ref: 00479303
    • VirtualFree.KERNEL32(00000000,?,00004000), ref: 00479323
      • Part of subcall function 00478F35: VirtualProtect.KERNEL32(00000000,?,00000002,00000000,00000000,00000000,00000000), ref: 00478F52
      • Part of subcall function 00478F35: VirtualProtect.KERNEL32(00000000,?,00000002,?,002F2308), ref: 00478FB0
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00478571
    • Process32FirstW.KERNEL32(00000000,?), ref: 0047858F
    • Process32NextW.KERNEL32(00000000,0000022C), ref: 004785E4
    • CloseHandle.KERNEL32(00000000), ref: 004785EF
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • CredEnumerateW.ADVAPI32(00000000,00000000,?,?), ref: 0047770B
      • Part of subcall function 004769AE: GetProcessHeap.KERNEL32(00000008,?,76EBE52D,00000000,00000000), ref: 004769E3
      • Part of subcall function 004769AE: HeapAlloc.KERNEL32(00000000), ref: 004769EC
      • Part of subcall function 004769AE: memcpy.MSVCRT ref: 00476A19
      • Part of subcall function 004769AE: GetProcessHeap.KERNEL32(00000008,?), ref: 00476A3D
      • Part of subcall function 004769AE: HeapAlloc.KERNEL32(00000000), ref: 00476A40
      • Part of subcall function 004769AE: memcpy.MSVCRT ref: 00476A6F
      • Part of subcall function 004769AE: GetProcessHeap.KERNEL32(00000000,?,002F16E0,?,?), ref: 00476A8F
      • Part of subcall function 004769AE: HeapFree.KERNEL32(00000000), ref: 00476A92
      • Part of subcall function 004769AE: GetProcessHeap.KERNEL32(00000000,?), ref: 00476A99
      • Part of subcall function 004769AE: HeapFree.KERNEL32(00000000), ref: 00476A9C
    • CredFree.ADVAPI32(?,?,00000000,0000FFFF), ref: 004777C3
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • PathCombineW.SHLWAPI(?,C:\Windows\,cscc.dat), ref: 00477E7C
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,774E2D57,?,757DC426), ref: 00476439
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00476446
    • HeapAlloc.KERNEL32(00000000), ref: 0047644D
    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?), ref: 00476465
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000000), ref: 00476851
    • HeapFree.KERNEL32(00000000), ref: 00476854
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00476860
    • HeapFree.KERNEL32(00000000), ref: 00476863
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000008,00000000,?,?,00476B24,00000000,00000000,00000000,00000000,?,0047A09A,00476AA8,00000000,00000000,00000000), ref: 00476CFC
    • HeapAlloc.KERNEL32(00000000,?,?,00476B24,00000000,00000000,00000000,00000000,?,0047A09A,00476AA8,00000000,00000000,00000000,00000024,00476AA8), ref: 00476CFF
      • Part of subcall function 00476D35: EnterCriticalSection.KERNEL32(00000000,757DFE8D,?,00476D1C,?,?,?,00476B24,00000000,00000000,00000000,00000000,?,0047A09A,00476AA8,00000000), ref: 00476D46
      • Part of subcall function 00476D35: LeaveCriticalSection.KERNEL32(00000000,?,00476D1C,?,?,?,00476B24,00000000,00000000,00000000,00000000,?,0047A09A,00476AA8,00000000,00000000), ref: 00476D7F
      • Part of subcall function 00476D35: Sleep.KERNELBASE(00002710,?,00476D1C,?,?,?,00476B24,00000000,00000000,00000000,00000000,?,0047A09A,00476AA8,00000000,00000000), ref: 00476D97
    • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,00476B24,00000000,00000000,00000000,00000000,?,0047A09A,00476AA8,00000000,00000000,00000000), ref: 00476D24
    • HeapFree.KERNEL32(00000000), ref: 00476D27
    Memory Dump Source
    • Source File: 00000003.00000002.413534229.00471000.00000020.sdmp, Offset: 00470000, based on PE: true
    • Associated: 00000003.00000002.413525796.00470000.00000002.sdmp
    • Associated: 00000003.00000002.413541428.0047D000.00000002.sdmp
    • Associated: 00000003.00000002.413549631.00483000.00000004.sdmp
    • Associated: 00000003.00000002.413556402.00489000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_470000_rundll32.jbxd

    Execution Graph

    Execution Coverage:22.4%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:2.8%
    Total number of Nodes:1292
    Total number of Limit Nodes:37

    Graph

    %3 4864 13076e0 4865 13076f2 4864->4865 4867 1307700 @_EH4_CallFilterFunc@8 4864->4867 4866 130601e setSBUpLow 5 API calls 4865->4866 4866->4867 4709 1303bed 4712 1305b8f 4709->4712 4711 1303bf2 4711->4711 4713 1305bb4 4712->4713 4714 1305bc1 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 4712->4714 4713->4714 4715 1305bb8 4713->4715 4714->4715 4715->4711 4868 1303baf 4871 1305260 4868->4871 4872 130474b __XcptFilter 66 API calls 4871->4872 4873 1303bc0 4872->4873 4874 1302130 4875 1302162 4874->4875 4889 13023c8 4874->4889 4876 1302170 GetModuleHandleW GetProcAddress 4875->4876 4877 130218a 4875->4877 4876->4877 4877->4889 4890 1301ce8 4877->4890 4880 1302243 GetProcAddress 4881 13022b3 4880->4881 4882 130228c GetProcAddress 4880->4882 4883 13012c3 13 API calls 4881->4883 4881->4889 4882->4881 4884 13022a1 4882->4884 4885 130230b 4883->4885 4886 13012c3 13 API calls 4884->4886 4887 130238a GetModuleHandleW GetProcAddress 4885->4887 4885->4889 4886->4881 4888 13023ac GetModuleHandleW GetProcAddress 4887->4888 4888->4889 4891 1301d2c 4890->4891 4892 1301d02 RtlInitUnicodeString 4890->4892 4894 1301961 33 API calls 4891->4894 4893 1301961 33 API calls 4892->4893 4895 1301d21 4893->4895 4894->4895 4895->4880 4895->4881 4895->4889 4716 1306da4 4717 1306da7 4716->4717 4720 1307c84 4717->4720 4729 1306e1f DecodePointer 4720->4729 4722 1307c89 4727 1307c94 4722->4727 4730 1306e2c 4722->4730 4724 1307cac 4725 1305000 __amsg_exit 66 API calls 4724->4725 4728 1307cb6 4725->4728 4726 1304b37 __CxxUnhandledExceptionFilter 8 API calls 4726->4724 4727->4724 4727->4726 4729->4722 4732 1306e38 __CxxUnhandledExceptionFilter 4730->4732 4731 1306e93 4734 1306e75 DecodePointer 4731->4734 4737 1306ea2 4731->4737 4732->4731 4733 1306e5f 4732->4733 4732->4734 4739 1306e5b 4732->4739 4736 130474b __XcptFilter 66 API calls 4733->4736 4738 1306e64 _siglookup 4734->4738 4736->4738 4740 1304d04 __wcsicoll 66 API calls 4737->4740 4743 1306eff 4738->4743 4744 1305000 __amsg_exit 66 API calls 4738->4744 4750 1306e6d __CxxUnhandledExceptionFilter 4738->4750 4739->4733 4739->4737 4741 1306ea7 4740->4741 4742 1304cb2 __wcsicoll 11 API calls 4741->4742 4742->4750 4745 1306f0a 4743->4745 4746 13061a7 __amsg_exit 66 API calls 4743->4746 4744->4743 4748 1306f3f 4745->4748 4751 1304614 EncodePointer 4745->4751 4746->4745 4752 1306f93 4748->4752 4750->4727 4751->4748 4753 1306f99 4752->4753 4755 1306fa0 4752->4755 4756 13060ce LeaveCriticalSection 4753->4756 4755->4750 4756->4755 4238 13023f7 4239 1302406 4238->4239 4240 1302402 LocalFree 4238->4240 4241 130240f LocalFree 4239->4241 4242 1302413 4239->4242 4240->4239 4241->4242 4243 130241d FreeLibrary 4242->4243 4244 1302424 4242->4244 4243->4244 4757 1307d00 RtlUnwind 4758 130785c IsProcessorFeaturePresent 4896 13028b7 4897 13028bb LocalFree 4896->4897 4900 13028ec LocalFree 4897->4900 4759 1302427 4761 1302486 4759->4761 4760 13012c3 13 API calls 4762 13024b4 4760->4762 4761->4760 4763 1301108 9 API calls 4762->4763 4770 1302540 4762->4770 4764 13024dc 4763->4764 4765 1301108 9 API calls 4764->4765 4764->4770 4766 13024fd 4765->4766 4766->4770 4771 1302556 4766->4771 4769 1302556 9 API calls 4769->4770 4772 1301108 9 API calls 4771->4772 4773 1302575 4772->4773 4774 1302521 4773->4774 4775 1301108 9 API calls 4773->4775 4774->4769 4774->4770 4776 1302588 4775->4776 4776->4774 4777 1301108 9 API calls 4776->4777 4777->4774 4778 13047de 4779 13047ea __CxxUnhandledExceptionFilter 4778->4779 4780 13061da __freea 66 API calls 4779->4780 4781 13048ec __CxxUnhandledExceptionFilter 4779->4781 4783 1304802 4779->4783 4780->4783 4782 13061da __freea 66 API calls 4784 1304810 4782->4784 4783->4782 4783->4784 4785 130481e 4784->4785 4786 13061da __freea 66 API calls 4784->4786 4787 130482c 4785->4787 4788 13061da __freea 66 API calls 4785->4788 4786->4785 4789 13061da __freea 66 API calls 4787->4789 4792 130483a 4787->4792 4788->4787 4789->4792 4790 1304848 4793 1304856 4790->4793 4795 13061da __freea 66 API calls 4790->4795 4791 13061da __freea 66 API calls 4791->4790 4792->4790 4792->4791 4794 1304867 4793->4794 4797 13061da __freea 66 API calls 4793->4797 4796 13061a7 __amsg_exit 66 API calls 4794->4796 4795->4793 4798 130486f 4796->4798 4797->4794 4799 130487b InterlockedDecrement 4798->4799 4805 1304894 4798->4805 4801 1304886 4799->4801 4799->4805 4803 13061da __freea 66 API calls 4801->4803 4801->4805 4803->4805 4804 13061a7 __amsg_exit 66 API calls 4806 13048a8 4804->4806 4814 13048f8 4805->4814 4807 13048d9 4806->4807 4809 130436a ___crtLCMapStringA 8 API calls 4806->4809 4817 1304904 4807->4817 4812 13048bd 4809->4812 4811 13061da __freea 66 API calls 4811->4781 4812->4807 4813 1304403 ___crtLCMapStringA 66 API calls 4812->4813 4813->4807 4820 13060ce LeaveCriticalSection 4814->4820 4816 13048a1 4816->4804 4821 13060ce LeaveCriticalSection 4817->4821 4819 13048e6 4819->4811 4820->4816 4821->4819 4901 1301c9a RtlEqualUnicodeString 4902 1301cbb 4901->4902 4249 1303bc3 4250 1303bd8 4249->4250 4251 1303bd2 4249->4251 4255 1305025 4250->4255 4252 1305000 __amsg_exit 66 API calls 4251->4252 4252->4250 4254 1303bdd __CxxUnhandledExceptionFilter 4256 1304eaa __amsg_exit 66 API calls 4255->4256 4257 1305030 4256->4257 4257->4254 4903 130461d TlsAlloc 4822 1302781 FreeLibrary 4258 13042be 4261 1304123 4258->4261 4260 13042cd 4262 130412f __CxxUnhandledExceptionFilter 4261->4262 4292 13047c4 4262->4292 4266 1304142 4313 1303ebe 4266->4313 4269 1306214 __amsg_exit 66 API calls 4270 1304163 4269->4270 4271 1304282 __CxxUnhandledExceptionFilter 4270->4271 4320 1303f3a 4270->4320 4271->4260 4274 1304193 InterlockedDecrement 4275 13041a3 4274->4275 4276 13041b4 InterlockedIncrement 4274->4276 4275->4276 4278 13061da __freea 66 API calls 4275->4278 4276->4271 4281 13041ca 4276->4281 4277 130428f 4277->4271 4280 13061da __freea 66 API calls 4277->4280 4283 13042a2 4277->4283 4282 13041b3 4278->4282 4279 1304d04 __wcsicoll 66 API calls 4279->4271 4280->4283 4281->4271 4284 13061a7 __amsg_exit 66 API calls 4281->4284 4282->4276 4283->4279 4285 13041de InterlockedDecrement 4284->4285 4287 130425a 4285->4287 4288 130426d InterlockedIncrement 4285->4288 4287->4288 4290 13061da __freea 66 API calls 4287->4290 4330 1304284 4288->4330 4291 130426c 4290->4291 4291->4288 4293 130474b __XcptFilter 66 API calls 4292->4293 4294 13047cc 4293->4294 4295 1304138 4294->4295 4296 1305034 __amsg_exit 66 API calls 4294->4296 4297 1303e1a 4295->4297 4296->4295 4298 1303e26 __CxxUnhandledExceptionFilter 4297->4298 4299 13047c4 __getptd 66 API calls 4298->4299 4300 1303e2b 4299->4300 4301 1303e3d 4300->4301 4302 13061a7 __amsg_exit 66 API calls 4300->4302 4308 1305034 __amsg_exit 66 API calls 4301->4308 4310 1303e4b __CxxUnhandledExceptionFilter 4301->4310 4303 1303e5b 4302->4303 4304 1303ea4 4303->4304 4306 1303e72 InterlockedDecrement 4303->4306 4307 1303e8c InterlockedIncrement 4303->4307 4333 1303eb5 4304->4333 4306->4307 4309 1303e7d 4306->4309 4307->4304 4308->4310 4309->4307 4311 13061da __freea 66 API calls 4309->4311 4310->4266 4312 1303e8b 4311->4312 4312->4307 4337 13037ee 4313->4337 4316 1303edd GetOEMCP 4319 1303eed 4316->4319 4317 1303efb 4318 1303f00 GetACP 4317->4318 4317->4319 4318->4319 4319->4269 4319->4271 4321 1303ebe 78 API calls 4320->4321 4322 1303f5a 4321->4322 4323 1303fce setSBUpLow 4322->4323 4324 1303f65 setSBCS 4322->4324 4326 1303fa9 IsValidCodePage 4322->4326 4630 1303c8a GetCPInfo 4323->4630 4325 130601e setSBUpLow 5 API calls 4324->4325 4327 1304121 4325->4327 4326->4324 4328 1303fbb GetCPInfo 4326->4328 4327->4274 4327->4277 4328->4323 4328->4324 4691 13060ce LeaveCriticalSection 4330->4691 4332 130428b 4332->4271 4336 13060ce LeaveCriticalSection 4333->4336 4335 1303ebc 4335->4301 4336->4335 4338 1303801 4337->4338 4343 130384e 4337->4343 4339 13047c4 __getptd 66 API calls 4338->4339 4340 1303806 4339->4340 4341 130382e 4340->4341 4345 130459b 4340->4345 4341->4343 4344 1303e1a ___crtLCMapStringA 68 API calls 4341->4344 4343->4316 4343->4317 4344->4343 4346 13045a7 __CxxUnhandledExceptionFilter 4345->4346 4347 13047c4 __getptd 66 API calls 4346->4347 4348 13045ac 4347->4348 4349 13045da 4348->4349 4351 13045be 4348->4351 4350 13061a7 __amsg_exit 66 API calls 4349->4350 4353 13045e1 4350->4353 4352 13047c4 __getptd 66 API calls 4351->4352 4355 13045c3 4352->4355 4360 130454e 4353->4360 4357 13045d1 __CxxUnhandledExceptionFilter 4355->4357 4359 1305034 __amsg_exit 66 API calls 4355->4359 4357->4341 4359->4357 4361 130455b 4360->4361 4367 1304590 4360->4367 4362 13042db __XcptFilter 8 API calls 4361->4362 4361->4367 4363 1304571 4362->4363 4363->4367 4371 130436a 4363->4371 4368 1304608 4367->4368 4629 13060ce LeaveCriticalSection 4368->4629 4370 130460f 4370->4355 4372 13043fe 4371->4372 4373 130437b InterlockedDecrement 4371->4373 4372->4367 4385 1304403 4372->4385 4374 1304393 4373->4374 4375 1304390 InterlockedDecrement 4373->4375 4376 130439d InterlockedDecrement 4374->4376 4377 13043a0 4374->4377 4375->4374 4376->4377 4378 13043ad 4377->4378 4379 13043aa InterlockedDecrement 4377->4379 4380 13043b7 InterlockedDecrement 4378->4380 4382 13043ba 4378->4382 4379->4378 4380->4382 4381 13043d3 InterlockedDecrement 4381->4382 4382->4381 4383 13043ee InterlockedDecrement 4382->4383 4384 13043e3 InterlockedDecrement 4382->4384 4383->4372 4384->4382 4386 1304487 4385->4386 4389 130441a 4385->4389 4388 13061da __freea 66 API calls 4386->4388 4390 13044d4 4386->4390 4387 13044fd 4399 1304542 4387->4399 4402 13061da 66 API calls __freea 4387->4402 4391 13044a8 4388->4391 4389->4386 4395 130444e 4389->4395 4400 13061da __freea 66 API calls 4389->4400 4390->4387 4455 13062f3 4390->4455 4393 13061da __freea 66 API calls 4391->4393 4396 13044bb 4393->4396 4405 13061da __freea 66 API calls 4395->4405 4414 130446f 4395->4414 4404 13061da __freea 66 API calls 4396->4404 4397 13061da __freea 66 API calls 4406 130447c 4397->4406 4398 13061da __freea 66 API calls 4398->4387 4403 13061da __freea 66 API calls 4399->4403 4401 1304443 4400->4401 4415 13066d3 4401->4415 4402->4387 4409 1304548 4403->4409 4408 13044c9 4404->4408 4410 1304464 4405->4410 4411 13061da __freea 66 API calls 4406->4411 4413 13061da __freea 66 API calls 4408->4413 4409->4367 4443 130666a 4410->4443 4411->4386 4413->4390 4414->4397 4416 13066e4 4415->4416 4417 13067cd 4415->4417 4418 13061da __freea 66 API calls 4416->4418 4420 13066f5 4416->4420 4417->4395 4418->4420 4419 1306707 4422 13061da __freea 66 API calls 4419->4422 4424 1306719 4419->4424 4420->4419 4421 13061da __freea 66 API calls 4420->4421 4421->4419 4422->4424 4423 130672b 4426 13061da __freea 66 API calls 4423->4426 4427 130673d 4423->4427 4424->4423 4425 13061da __freea 66 API calls 4424->4425 4425->4423 4426->4427 4428 130674f 4427->4428 4429 13061da __freea 66 API calls 4427->4429 4430 1306761 4428->4430 4431 13061da __freea 66 API calls 4428->4431 4429->4428 4432 1306773 4430->4432 4433 13061da __freea 66 API calls 4430->4433 4431->4430 4434 1306785 4432->4434 4435 13061da __freea 66 API calls 4432->4435 4433->4432 4436 1306797 4434->4436 4438 13061da __freea 66 API calls 4434->4438 4435->4434 4437 13067a9 4436->4437 4439 13061da __freea 66 API calls 4436->4439 4440 13061da __freea 66 API calls 4437->4440 4441 13067bb 4437->4441 4438->4436 4439->4437 4440->4441 4441->4417 4442 13061da __freea 66 API calls 4441->4442 4442->4417 4444 13066cf 4443->4444 4445 1306677 4443->4445 4444->4414 4446 1306687 4445->4446 4448 13061da __freea 66 API calls 4445->4448 4447 1306699 4446->4447 4450 13061da __freea 66 API calls 4446->4450 4449 13066ab 4447->4449 4452 13061da __freea 66 API calls 4447->4452 4448->4446 4451 13066bd 4449->4451 4453 13061da __freea 66 API calls 4449->4453 4450->4447 4451->4444 4454 13061da __freea 66 API calls 4451->4454 4452->4449 4453->4451 4454->4444 4456 1306304 4455->4456 4628 13044f2 4455->4628 4457 13061da __freea 66 API calls 4456->4457 4458 130630c 4457->4458 4459 13061da __freea 66 API calls 4458->4459 4460 1306314 4459->4460 4461 13061da __freea 66 API calls 4460->4461 4462 130631c 4461->4462 4463 13061da __freea 66 API calls 4462->4463 4464 1306324 4463->4464 4465 13061da __freea 66 API calls 4464->4465 4466 130632c 4465->4466 4467 13061da __freea 66 API calls 4466->4467 4468 1306334 4467->4468 4469 13061da __freea 66 API calls 4468->4469 4470 130633b 4469->4470 4471 13061da __freea 66 API calls 4470->4471 4472 1306343 4471->4472 4473 13061da __freea 66 API calls 4472->4473 4474 130634b 4473->4474 4475 13061da __freea 66 API calls 4474->4475 4476 1306353 4475->4476 4477 13061da __freea 66 API calls 4476->4477 4478 130635b 4477->4478 4479 13061da __freea 66 API calls 4478->4479 4480 1306363 4479->4480 4481 13061da __freea 66 API calls 4480->4481 4482 130636b 4481->4482 4483 13061da __freea 66 API calls 4482->4483 4484 1306373 4483->4484 4485 13061da __freea 66 API calls 4484->4485 4486 130637b 4485->4486 4487 13061da __freea 66 API calls 4486->4487 4488 1306383 4487->4488 4489 13061da __freea 66 API calls 4488->4489 4490 130638e 4489->4490 4491 13061da __freea 66 API calls 4490->4491 4492 1306396 4491->4492 4493 13061da __freea 66 API calls 4492->4493 4494 130639e 4493->4494 4495 13061da __freea 66 API calls 4494->4495 4496 13063a6 4495->4496 4497 13061da __freea 66 API calls 4496->4497 4498 13063ae 4497->4498 4499 13061da __freea 66 API calls 4498->4499 4500 13063b6 4499->4500 4501 13061da __freea 66 API calls 4500->4501 4502 13063be 4501->4502 4503 13061da __freea 66 API calls 4502->4503 4504 13063c6 4503->4504 4505 13061da __freea 66 API calls 4504->4505 4506 13063ce 4505->4506 4507 13061da __freea 66 API calls 4506->4507 4508 13063d6 4507->4508 4509 13061da __freea 66 API calls 4508->4509 4510 13063de 4509->4510 4511 13061da __freea 66 API calls 4510->4511 4512 13063e6 4511->4512 4513 13061da __freea 66 API calls 4512->4513 4514 13063ee 4513->4514 4515 13061da __freea 66 API calls 4514->4515 4516 13063f6 4515->4516 4517 13061da __freea 66 API calls 4516->4517 4518 13063fe 4517->4518 4519 13061da __freea 66 API calls 4518->4519 4520 1306406 4519->4520 4521 13061da __freea 66 API calls 4520->4521 4522 1306414 4521->4522 4523 13061da __freea 66 API calls 4522->4523 4524 130641f 4523->4524 4525 13061da __freea 66 API calls 4524->4525 4526 130642a 4525->4526 4527 13061da __freea 66 API calls 4526->4527 4528 1306435 4527->4528 4529 13061da __freea 66 API calls 4528->4529 4530 1306440 4529->4530 4531 13061da __freea 66 API calls 4530->4531 4532 130644b 4531->4532 4533 13061da __freea 66 API calls 4532->4533 4534 1306456 4533->4534 4535 13061da __freea 66 API calls 4534->4535 4536 1306461 4535->4536 4537 13061da __freea 66 API calls 4536->4537 4538 130646c 4537->4538 4539 13061da __freea 66 API calls 4538->4539 4540 1306477 4539->4540 4541 13061da __freea 66 API calls 4540->4541 4542 1306482 4541->4542 4543 13061da __freea 66 API calls 4542->4543 4544 130648d 4543->4544 4545 13061da __freea 66 API calls 4544->4545 4546 1306498 4545->4546 4547 13061da __freea 66 API calls 4546->4547 4548 13064a3 4547->4548 4549 13061da __freea 66 API calls 4548->4549 4550 13064ae 4549->4550 4551 13061da __freea 66 API calls 4550->4551 4552 13064b9 4551->4552 4553 13061da __freea 66 API calls 4552->4553 4554 13064c7 4553->4554 4555 13061da __freea 66 API calls 4554->4555 4556 13064d2 4555->4556 4557 13061da __freea 66 API calls 4556->4557 4558 13064dd 4557->4558 4559 13061da __freea 66 API calls 4558->4559 4560 13064e8 4559->4560 4561 13061da __freea 66 API calls 4560->4561 4562 13064f3 4561->4562 4563 13061da __freea 66 API calls 4562->4563 4564 13064fe 4563->4564 4565 13061da __freea 66 API calls 4564->4565 4566 1306509 4565->4566 4567 13061da __freea 66 API calls 4566->4567 4568 1306514 4567->4568 4569 13061da __freea 66 API calls 4568->4569 4570 130651f 4569->4570 4571 13061da __freea 66 API calls 4570->4571 4572 130652a 4571->4572 4573 13061da __freea 66 API calls 4572->4573 4574 1306535 4573->4574 4575 13061da __freea 66 API calls 4574->4575 4576 1306540 4575->4576 4577 13061da __freea 66 API calls 4576->4577 4578 130654b 4577->4578 4579 13061da __freea 66 API calls 4578->4579 4580 1306556 4579->4580 4581 13061da __freea 66 API calls 4580->4581 4582 1306561 4581->4582 4583 13061da __freea 66 API calls 4582->4583 4584 130656c 4583->4584 4585 13061da __freea 66 API calls 4584->4585 4586 130657a 4585->4586 4587 13061da __freea 66 API calls 4586->4587 4588 1306585 4587->4588 4589 13061da __freea 66 API calls 4588->4589 4590 1306590 4589->4590 4591 13061da __freea 66 API calls 4590->4591 4592 130659b 4591->4592 4593 13061da __freea 66 API calls 4592->4593 4594 13065a6 4593->4594 4595 13061da __freea 66 API calls 4594->4595 4596 13065b1 4595->4596 4597 13061da __freea 66 API calls 4596->4597 4598 13065bc 4597->4598 4599 13061da __freea 66 API calls 4598->4599 4600 13065c7 4599->4600 4601 13061da __freea 66 API calls 4600->4601 4602 13065d2 4601->4602 4603 13061da __freea 66 API calls 4602->4603 4604 13065dd 4603->4604 4605 13061da __freea 66 API calls 4604->4605 4606 13065e8 4605->4606 4607 13061da __freea 66 API calls 4606->4607 4608 13065f3 4607->4608 4609 13061da __freea 66 API calls 4608->4609 4610 13065fe 4609->4610 4611 13061da __freea 66 API calls 4610->4611 4612 1306609 4611->4612 4613 13061da __freea 66 API calls 4612->4613 4614 1306614 4613->4614 4615 13061da __freea 66 API calls 4614->4615 4616 130661f 4615->4616 4617 13061da __freea 66 API calls 4616->4617 4618 130662d 4617->4618 4619 13061da __freea 66 API calls 4618->4619 4620 1306638 4619->4620 4621 13061da __freea 66 API calls 4620->4621 4622 1306643 4621->4622 4623 13061da __freea 66 API calls 4622->4623 4624 130664e 4623->4624 4625 13061da __freea 66 API calls 4624->4625 4626 1306659 4625->4626 4627 13061da __freea 66 API calls 4626->4627 4627->4628 4628->4398 4629->4370 4631 1303d72 4630->4631 4633 1303cbe setSBUpLow 4630->4633 4635 130601e setSBUpLow 5 API calls 4631->4635 4640 1305fde 4633->4640 4637 1303e18 4635->4637 4637->4323 4639 1305eb1 ___crtLCMapStringA 82 API calls 4639->4631 4641 13037ee ___crtLCMapStringA 76 API calls 4640->4641 4642 1305ff1 4641->4642 4650 1305ef7 4642->4650 4645 1305eb1 4646 13037ee ___crtLCMapStringA 76 API calls 4645->4646 4647 1305ec4 4646->4647 4667 1305cca 4647->4667 4651 1305f15 4650->4651 4652 1305f20 MultiByteToWideChar 4650->4652 4651->4652 4653 1305f49 4652->4653 4654 1305f4d 4652->4654 4655 130601e setSBUpLow 5 API calls 4653->4655 4657 130786c ___crtLCMapStringA 66 API calls 4654->4657 4659 1305f62 setSBUpLow __alloca_probe_16 4654->4659 4656 1303d2d 4655->4656 4656->4645 4657->4659 4658 1305f9b MultiByteToWideChar 4660 1305fc2 4658->4660 4661 1305fb1 GetStringTypeW 4658->4661 4659->4653 4659->4658 4663 1305caa 4660->4663 4661->4660 4664 1305cb6 4663->4664 4665 1305cc7 4663->4665 4664->4665 4666 13061da __freea 66 API calls 4664->4666 4665->4653 4666->4665 4668 1305ce8 MultiByteToWideChar 4667->4668 4670 1305d4d 4668->4670 4679 1305d46 4668->4679 4676 130786c ___crtLCMapStringA 66 API calls 4670->4676 4681 1305d66 __alloca_probe_16 4670->4681 4671 130601e setSBUpLow 5 API calls 4672 1303d4d 4671->4672 4672->4639 4673 1305d9a MultiByteToWideChar 4674 1305db3 LCMapStringW 4673->4674 4675 1305e92 4673->4675 4674->4675 4678 1305dd2 4674->4678 4677 1305caa __freea 66 API calls 4675->4677 4676->4681 4677->4679 4680 1305ddc 4678->4680 4684 1305e05 4678->4684 4679->4671 4680->4675 4682 1305df0 LCMapStringW 4680->4682 4681->4673 4681->4679 4682->4675 4683 1305e54 LCMapStringW 4686 1305e8c 4683->4686 4687 1305e6a WideCharToMultiByte 4683->4687 4685 130786c ___crtLCMapStringA 66 API calls 4684->4685 4689 1305e20 __alloca_probe_16 4684->4689 4685->4689 4688 1305caa __freea 66 API calls 4686->4688 4687->4686 4688->4675 4689->4675 4689->4683 4691->4332 3396 13070da 3400 1306259 3396->3400 3399 13070ff 3403 1306262 3400->3403 3402 130629f EncodePointer 3402->3399 3403->3402 3404 1306280 Sleep 3403->3404 3406 1307a32 3403->3406 3405 1306295 3404->3405 3405->3402 3405->3403 3407 1307a3e 3406->3407 3411 1307a59 3406->3411 3408 1307a4a 3407->3408 3407->3411 3415 1304d04 3408->3415 3410 1307a6c RtlAllocateHeap 3410->3411 3414 1307a93 3410->3414 3411->3410 3411->3414 3418 1306ffc DecodePointer 3411->3418 3414->3403 3420 130474b GetLastError 3415->3420 3417 1304d09 3417->3403 3419 1307011 3418->3419 3419->3411 3434 1304626 TlsGetValue 3420->3434 3423 13047b8 SetLastError 3423->3417 3424 1306259 __XcptFilter 62 API calls 3425 1304776 3424->3425 3425->3423 3426 130477e DecodePointer 3425->3426 3427 1304793 3426->3427 3428 1304797 3427->3428 3429 13047af 3427->3429 3437 1304697 3428->3437 3450 13061da 3429->3450 3432 13047b5 3432->3423 3433 130479f GetCurrentThreadId 3433->3423 3435 130463b DecodePointer TlsSetValue 3434->3435 3436 1304656 3434->3436 3435->3436 3436->3423 3436->3424 3456 13059a0 3437->3456 3439 13046a3 GetModuleHandleW 3457 13061a7 3439->3457 3441 13046e1 InterlockedIncrement 3464 1304739 3441->3464 3444 13061a7 __amsg_exit 64 API calls 3445 1304702 3444->3445 3467 13042db InterlockedIncrement 3445->3467 3447 1304720 3479 1304742 3447->3479 3449 130472d __CxxUnhandledExceptionFilter 3449->3433 3451 13061e5 HeapFree 3450->3451 3455 130620e __freea 3450->3455 3452 13061fa 3451->3452 3451->3455 3453 1304d04 __wcsicoll 64 API calls 3452->3453 3454 1306200 GetLastError 3453->3454 3454->3455 3455->3432 3456->3439 3458 13061cf EnterCriticalSection 3457->3458 3459 13061bc 3457->3459 3458->3441 3482 13060e5 3459->3482 3461 13061c2 3461->3458 3507 1305034 3461->3507 3676 13060ce LeaveCriticalSection 3464->3676 3466 13046fb 3466->3444 3468 13042f9 InterlockedIncrement 3467->3468 3469 13042fc 3467->3469 3468->3469 3470 1304306 InterlockedIncrement 3469->3470 3471 1304309 3469->3471 3470->3471 3472 1304316 3471->3472 3473 1304313 InterlockedIncrement 3471->3473 3474 1304320 InterlockedIncrement 3472->3474 3475 1304323 3472->3475 3473->3472 3474->3475 3476 130433c InterlockedIncrement 3475->3476 3477 1304357 InterlockedIncrement 3475->3477 3478 130434c InterlockedIncrement 3475->3478 3476->3475 3477->3447 3478->3475 3677 13060ce LeaveCriticalSection 3479->3677 3481 1304749 3481->3449 3483 13060f1 __CxxUnhandledExceptionFilter 3482->3483 3495 1306117 3483->3495 3514 1305227 3483->3514 3488 1306132 3490 1306139 3488->3490 3491 1306148 3488->3491 3489 130610d 3547 1304d92 3489->3547 3494 1304d04 __wcsicoll 65 API calls 3490->3494 3493 13061a7 __amsg_exit 65 API calls 3491->3493 3496 130614f 3493->3496 3497 1306127 __CxxUnhandledExceptionFilter 3494->3497 3495->3497 3550 1306214 3495->3550 3498 1306157 InitializeCriticalSectionAndSpinCount 3496->3498 3499 1306182 3496->3499 3497->3461 3500 1306167 3498->3500 3503 1306173 3498->3503 3501 13061da __freea 65 API calls 3499->3501 3502 13061da __freea 65 API calls 3500->3502 3501->3503 3504 130616d 3502->3504 3555 130619e 3503->3555 3506 1304d04 __wcsicoll 65 API calls 3504->3506 3506->3503 3508 1305227 __amsg_exit 66 API calls 3507->3508 3509 130503e 3508->3509 3510 1305078 __amsg_exit 66 API calls 3509->3510 3511 1305046 3510->3511 3644 1305000 3511->3644 3558 1307608 3514->3558 3516 130522e 3518 1307608 __amsg_exit 66 API calls 3516->3518 3521 130523b 3516->3521 3517 1305078 __amsg_exit 66 API calls 3519 1305253 3517->3519 3518->3521 3520 1305078 __amsg_exit 66 API calls 3519->3520 3522 130525d 3520->3522 3521->3517 3521->3522 3523 1305078 3522->3523 3524 1305099 __amsg_exit 3523->3524 3525 13051b5 3524->3525 3527 1307608 __amsg_exit 63 API calls 3524->3527 3607 130601e 3525->3607 3529 13050b3 3527->3529 3528 1305225 3528->3489 3530 13051c4 GetStdHandle 3529->3530 3531 1307608 __amsg_exit 63 API calls 3529->3531 3530->3525 3535 13051d2 _strlen 3530->3535 3532 13050c4 3531->3532 3532->3530 3533 13050d6 3532->3533 3533->3525 3568 13075a5 3533->3568 3535->3525 3536 1305208 WriteFile 3535->3536 3536->3525 3538 1305102 GetModuleFileNameW 3539 130512f _wcslen 3538->3539 3540 1305123 3538->3540 3543 1307448 63 API calls __amsg_exit 3539->3543 3545 13051a5 3539->3545 3577 1304c60 3539->3577 3580 13074bd 3539->3580 3541 13075a5 __amsg_exit 63 API calls 3540->3541 3541->3539 3543->3539 3589 13072dc 3545->3589 3623 1304d67 GetModuleHandleW 3547->3623 3554 130621d 3550->3554 3552 1306253 3552->3488 3553 1306234 Sleep 3553->3554 3554->3552 3554->3553 3627 130786c 3554->3627 3643 13060ce LeaveCriticalSection 3555->3643 3557 13061a5 3557->3497 3559 1307614 3558->3559 3560 130761e 3559->3560 3561 1304d04 __wcsicoll 66 API calls 3559->3561 3560->3516 3562 1307637 3561->3562 3565 1304cb2 3562->3565 3566 1304c85 __wcsicoll 11 API calls 3565->3566 3567 1304cbe 3566->3567 3567->3516 3570 13075b3 3568->3570 3571 13075ba 3568->3571 3569 1304d04 __wcsicoll 66 API calls 3572 13075bf 3569->3572 3570->3571 3575 13075db 3570->3575 3571->3569 3573 1304cb2 __wcsicoll 11 API calls 3572->3573 3574 13050f7 3573->3574 3574->3538 3574->3539 3575->3574 3576 1304d04 __wcsicoll 66 API calls 3575->3576 3576->3572 3615 1304b37 3577->3615 3582 13074cf 3580->3582 3581 1304d04 __wcsicoll 66 API calls 3588 13074ef 3581->3588 3583 13074d8 3582->3583 3584 13074d3 3582->3584 3585 1307516 3582->3585 3583->3539 3584->3581 3584->3583 3585->3583 3587 1304d04 __wcsicoll 66 API calls 3585->3587 3586 1304cb2 __wcsicoll 11 API calls 3586->3583 3587->3588 3588->3586 3621 1304614 EncodePointer 3589->3621 3591 1307302 3592 130738f 3591->3592 3593 1307312 LoadLibraryW 3591->3593 3599 13073a9 DecodePointer DecodePointer 3592->3599 3604 13073bc 3592->3604 3594 1307327 GetProcAddress 3593->3594 3595 1307427 3593->3595 3594->3595 3596 130733d 7 API calls 3594->3596 3600 130601e setSBUpLow 5 API calls 3595->3600 3596->3592 3602 130737f GetProcAddress EncodePointer 3596->3602 3597 130741b DecodePointer 3597->3595 3598 13073f2 DecodePointer 3598->3597 3601 13073f9 3598->3601 3599->3604 3603 1307446 3600->3603 3601->3597 3605 130740c DecodePointer 3601->3605 3602->3592 3603->3525 3604->3597 3604->3598 3606 13073df 3604->3606 3605->3597 3605->3606 3606->3597 3608 1306026 3607->3608 3609 1306028 IsDebuggerPresent 3607->3609 3608->3528 3622 1306855 3609->3622 3612 13079f9 SetUnhandledExceptionFilter UnhandledExceptionFilter 3613 1307a16 setSBUpLow 3612->3613 3614 1307a1e GetCurrentProcess TerminateProcess 3612->3614 3613->3614 3614->3528 3616 1304b56 setSBUpLow 3615->3616 3617 1304b74 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 3616->3617 3620 1304c42 setSBUpLow 3617->3620 3618 130601e setSBUpLow 5 API calls 3619 1304c5e GetCurrentProcess TerminateProcess 3618->3619 3619->3539 3620->3618 3621->3591 3622->3612 3624 1304d90 ExitProcess 3623->3624 3625 1304d7b GetProcAddress 3623->3625 3625->3624 3626 1304d8b 3625->3626 3626->3624 3628 13078e9 3627->3628 3636 130787a 3627->3636 3629 1306ffc ___crtLCMapStringA DecodePointer 3628->3629 3630 13078ef 3629->3630 3631 1304d04 __wcsicoll 65 API calls 3630->3631 3634 13078e1 3631->3634 3632 1305227 __amsg_exit 65 API calls 3632->3636 3633 13078a8 HeapAlloc 3633->3634 3633->3636 3634->3554 3635 1305078 __amsg_exit 65 API calls 3635->3636 3636->3632 3636->3633 3636->3635 3637 13078d5 3636->3637 3638 1306ffc ___crtLCMapStringA DecodePointer 3636->3638 3640 1304d92 __amsg_exit 3 API calls 3636->3640 3641 13078d3 3636->3641 3639 1304d04 __wcsicoll 65 API calls 3637->3639 3638->3636 3639->3641 3640->3636 3642 1304d04 __wcsicoll 65 API calls 3641->3642 3642->3634 3643->3557 3647 1304eaa 3644->3647 3646 1305011 3648 1304eb6 __CxxUnhandledExceptionFilter 3647->3648 3649 13061a7 __amsg_exit 61 API calls 3648->3649 3650 1304ebd 3649->3650 3651 1304f67 3650->3651 3653 1304ee8 DecodePointer 3650->3653 3670 1304fd5 3651->3670 3653->3651 3655 1304eff DecodePointer 3653->3655 3662 1304f12 3655->3662 3657 1304fcc 3660 1304d92 __amsg_exit 3 API calls 3657->3660 3659 1304fe4 __CxxUnhandledExceptionFilter 3659->3646 3661 1304fd5 3660->3661 3666 1304fe2 3661->3666 3675 13060ce LeaveCriticalSection 3661->3675 3662->3651 3663 1304f29 DecodePointer 3662->3663 3667 1304f38 DecodePointer DecodePointer 3662->3667 3668 1304614 EncodePointer 3662->3668 3669 1304614 EncodePointer 3663->3669 3666->3646 3667->3662 3668->3662 3669->3662 3671 1304fdb 3670->3671 3673 1304fb5 3670->3673 3672 13060ce __amsg_exit LeaveCriticalSection 3671->3672 3672->3673 3673->3659 3674 13060ce LeaveCriticalSection 3673->3674 3674->3657 3675->3666 3676->3466 3677->3481 4692 1305a00 4693 1305a2c 4692->4693 4694 1305a39 4692->4694 4696 130601e setSBUpLow 5 API calls 4693->4696 4695 130601e setSBUpLow 5 API calls 4694->4695 4697 1305a49 4695->4697 4696->4694 4698 1305acc 4697->4698 4699 1305aa2 4697->4699 4708 1307772 RtlUnwind 4697->4708 4699->4698 4700 1305abc 4699->4700 4702 130601e setSBUpLow 5 API calls 4699->4702 4701 130601e setSBUpLow 5 API calls 4700->4701 4701->4698 4702->4700 4704 1305b52 4706 130601e setSBUpLow 5 API calls 4704->4706 4705 1305b1e 4705->4704 4707 130601e setSBUpLow 5 API calls 4705->4707 4706->4699 4707->4704 4708->4705 3678 1303a8c 3679 1303a98 __CxxUnhandledExceptionFilter 3678->3679 3680 1303aa2 HeapSetInformation 3679->3680 3681 1303aad 3679->3681 3680->3681 3715 1305973 HeapCreate 3681->3715 3683 1303afb 3684 1303b06 3683->3684 3800 1303a63 3683->3800 3716 130490d GetModuleHandleW 3684->3716 3687 1303b0c 3688 1303a63 66 API calls 3687->3688 3689 1303b17 __RTC_Initialize 3687->3689 3688->3689 3741 13056e2 GetStartupInfoW 3689->3741 3691 1303b31 GetCommandLineW 3754 130568a GetEnvironmentStringsW 3691->3754 3693 1305034 __amsg_exit 66 API calls 3695 1303b30 3693->3695 3695->3691 3696 1303b41 3761 13055dc GetModuleFileNameW 3696->3761 3699 1305034 __amsg_exit 66 API calls 3702 1303b56 3699->3702 3701 1303b5c 3703 1305034 __amsg_exit 66 API calls 3701->3703 3705 1303b67 3701->3705 3767 13053aa 3702->3767 3703->3705 3781 1304e13 3705->3781 3706 1303b6f 3707 1305034 __amsg_exit 66 API calls 3706->3707 3709 1303b7a 3706->3709 3707->3709 3787 13020a4 3709->3787 3710 1303ba8 3808 1305016 3710->3808 3714 1303bad __CxxUnhandledExceptionFilter 3715->3683 3717 1304921 3716->3717 3718 130492a GetProcAddress GetProcAddress GetProcAddress GetProcAddress 3716->3718 3820 130465a 3717->3820 3722 1304974 TlsAlloc 3718->3722 3723 13049c2 TlsSetValue 3722->3723 3724 1304a83 3722->3724 3723->3724 3725 13049d3 3723->3725 3724->3687 3811 1304dbc 3725->3811 3730 1304a7e 3732 130465a 70 API calls 3730->3732 3731 1304a1b DecodePointer 3733 1304a30 3731->3733 3732->3724 3733->3730 3734 1306259 __XcptFilter 66 API calls 3733->3734 3735 1304a46 3734->3735 3735->3730 3736 1304a4e DecodePointer 3735->3736 3737 1304a5f 3736->3737 3737->3730 3738 1304a63 3737->3738 3739 1304697 __XcptFilter 66 API calls 3738->3739 3740 1304a6b GetCurrentThreadId 3739->3740 3740->3724 3742 1306259 __XcptFilter 66 API calls 3741->3742 3748 1305700 3742->3748 3743 1303b25 3743->3691 3743->3693 3744 13058ab GetStdHandle 3749 1305875 3744->3749 3745 130590f SetHandleCount 3745->3743 3746 1306259 __XcptFilter 66 API calls 3746->3748 3747 13058bd GetFileType 3747->3749 3748->3743 3748->3746 3748->3749 3752 13057f5 3748->3752 3749->3744 3749->3745 3749->3747 3753 13058e3 InitializeCriticalSectionAndSpinCount 3749->3753 3750 1305821 GetFileType 3751 130582c InitializeCriticalSectionAndSpinCount 3750->3751 3750->3752 3751->3743 3751->3752 3752->3749 3752->3750 3752->3751 3753->3743 3753->3749 3755 130569f 3754->3755 3756 130569b 3754->3756 3758 1306214 __amsg_exit 66 API calls 3755->3758 3756->3696 3760 13056c1 3758->3760 3759 13056c8 FreeEnvironmentStringsW 3759->3696 3760->3759 3762 1305611 _wparse_cmdline 3761->3762 3763 1303b4b 3762->3763 3764 130564e 3762->3764 3763->3699 3763->3702 3765 1306214 __amsg_exit 66 API calls 3764->3765 3766 1305654 _wparse_cmdline 3765->3766 3766->3763 3768 13053ba 3767->3768 3769 13053c2 _wcslen 3767->3769 3768->3701 3770 1306259 __XcptFilter 66 API calls 3769->3770 3771 13053e6 _wcslen 3770->3771 3771->3768 3772 130543c 3771->3772 3774 1306259 __XcptFilter 66 API calls 3771->3774 3775 1305462 3771->3775 3776 13075a5 __amsg_exit 66 API calls 3771->3776 3778 1305479 3771->3778 3773 13061da __freea 66 API calls 3772->3773 3773->3768 3774->3771 3777 13061da __freea 66 API calls 3775->3777 3776->3771 3777->3768 3779 1304c60 __amsg_exit 10 API calls 3778->3779 3780 1305485 3779->3780 3780->3701 3783 1304e21 3781->3783 3832 130715e 3783->3832 3784 1304e3f __initterm_e 3785 1304e60 3784->3785 3835 1307147 3784->3835 3785->3706 3788 13020ad 3787->3788 3789 13020be RtlGetNtVersionNumbers RtlAdjustPrivilege 3787->3789 3905 1301fd9 GetProcessHeap HeapAlloc 3788->3905 3790 13020f1 3789->3790 3791 1302113 3789->3791 3902 130338c 3790->3902 3793 1302125 CloseHandle 3791->3793 3794 130212c 3791->3794 3793->3794 3794->3710 3797 1304fea 3794->3797 3798 1304eaa __amsg_exit 66 API calls 3797->3798 3799 1304ffb 3798->3799 3799->3710 3801 1303a76 3800->3801 3802 1303a71 3800->3802 3804 1305078 __amsg_exit 66 API calls 3801->3804 3803 1305227 __amsg_exit 66 API calls 3802->3803 3803->3801 3805 1303a7e 3804->3805 3806 1304d92 __amsg_exit 3 API calls 3805->3806 3807 1303a88 3806->3807 3807->3684 3809 1304eaa __amsg_exit 66 API calls 3808->3809 3810 1305021 3809->3810 3810->3714 3830 1304614 EncodePointer 3811->3830 3813 1304dc4 3831 1306db9 EncodePointer 3813->3831 3815 13049d8 EncodePointer EncodePointer EncodePointer EncodePointer 3816 130602d 3815->3816 3818 1306038 3816->3818 3817 1306042 InitializeCriticalSectionAndSpinCount 3817->3818 3819 1304a17 3817->3819 3818->3817 3818->3819 3819->3730 3819->3731 3821 1304673 3820->3821 3822 1304664 DecodePointer 3820->3822 3823 1304684 TlsFree 3821->3823 3824 1304692 3821->3824 3822->3821 3823->3824 3825 1306093 DeleteCriticalSection 3824->3825 3827 13060ab 3824->3827 3826 13061da __freea 66 API calls 3825->3826 3826->3824 3828 1304926 3827->3828 3829 13060bd DeleteCriticalSection 3827->3829 3828->3687 3829->3827 3830->3813 3831->3815 3833 1307164 EncodePointer 3832->3833 3833->3833 3834 130717e 3833->3834 3834->3784 3838 130710b 3835->3838 3837 1307154 3837->3785 3839 1307117 __CxxUnhandledExceptionFilter 3838->3839 3846 1304daa 3839->3846 3845 1307138 __CxxUnhandledExceptionFilter 3845->3837 3847 13061a7 __amsg_exit 66 API calls 3846->3847 3848 1304db1 3847->3848 3849 1307024 DecodePointer DecodePointer 3848->3849 3850 13070d3 3849->3850 3851 1307052 3849->3851 3862 1307141 3850->3862 3851->3850 3865 1307cb7 3851->3865 3853 13070b6 EncodePointer EncodePointer 3853->3850 3854 1307064 3854->3853 3855 130708e 3854->3855 3856 130707f 3854->3856 3855->3850 3858 1307088 3855->3858 3872 13062a5 3856->3872 3858->3855 3859 13062a5 70 API calls 3858->3859 3860 13070a4 EncodePointer 3858->3860 3861 130709e 3859->3861 3860->3853 3861->3850 3861->3860 3898 1304db3 3862->3898 3866 1307cd7 HeapSize 3865->3866 3867 1307cc2 3865->3867 3866->3854 3868 1304d04 __wcsicoll 66 API calls 3867->3868 3869 1307cc7 3868->3869 3870 1304cb2 __wcsicoll 11 API calls 3869->3870 3871 1307cd2 3870->3871 3871->3854 3876 13062ae 3872->3876 3874 13062ed 3874->3858 3875 13062ce Sleep 3875->3876 3876->3874 3876->3875 3877 1307ab4 3876->3877 3878 1307aca 3877->3878 3879 1307abf 3877->3879 3880 1307ad2 3878->3880 3886 1307adf 3878->3886 3881 130786c ___crtLCMapStringA 66 API calls 3879->3881 3882 13061da __freea 66 API calls 3880->3882 3883 1307ac7 3881->3883 3884 1307ada __freea 3882->3884 3883->3876 3884->3876 3885 1307b17 3888 1306ffc ___crtLCMapStringA DecodePointer 3885->3888 3886->3885 3887 1307ae7 HeapReAlloc 3886->3887 3890 1307b47 3886->3890 3892 1306ffc ___crtLCMapStringA DecodePointer 3886->3892 3895 1307b2f 3886->3895 3887->3884 3887->3886 3889 1307b1d 3888->3889 3891 1304d04 __wcsicoll 66 API calls 3889->3891 3893 1304d04 __wcsicoll 66 API calls 3890->3893 3891->3884 3892->3886 3894 1307b4c GetLastError 3893->3894 3894->3884 3896 1304d04 __wcsicoll 66 API calls 3895->3896 3897 1307b34 GetLastError 3896->3897 3897->3884 3901 13060ce LeaveCriticalSection 3898->3901 3900 1304dba 3900->3845 3901->3900 3914 1302fa7 3902->3914 3906 1302019 InitializeSecurityDescriptor 3905->3906 3910 130209a 3905->3910 3907 1302026 SetSecurityDescriptorDacl 3906->3907 3906->3910 3908 1302038 3907->3908 3907->3910 3909 130203e CreateFileW 3908->3909 3908->3910 3912 1302088 WaitNamedPipeW 3908->3912 3913 1302080 Sleep 3908->3913 3909->3910 3911 130205f GetModuleHandleW GetProcAddress 3909->3911 3910->3789 3911->3908 3912->3908 3912->3910 3913->3908 3930 1302c5b 3914->3930 3917 13032eb 3917->3791 3919 13030a2 GetModuleHandleW GetProcAddress 3922 130308b 3919->3922 3920 13032ca LocalFree 3920->3922 3921 1301108 9 API calls 3921->3922 3922->3917 3922->3919 3922->3920 3922->3921 3923 1301ee7 11 API calls 3922->3923 3924 130321e GetModuleHandleW GetProcAddress 3922->3924 3926 1303287 LocalFree 3922->3926 3927 1303295 LocalFree 3922->3927 3928 13032a6 LocalFree 3922->3928 3929 13032b0 LocalFree 3922->3929 3972 1303339 3922->3972 3923->3922 3924->3922 3926->3922 3927->3922 3928->3922 3929->3922 3931 1302ee0 3930->3931 3932 1302cd5 3930->3932 3931->3917 3931->3922 3954 1301108 3931->3954 3977 1302798 3932->3977 3984 13025ac 3932->3984 3933 1302ce3 3933->3931 3934 1302cf4 CreateFileW 3933->3934 3935 1302d12 3933->3935 3939 1302d3e 3934->3939 3991 13018f7 RtlInitUnicodeString 3935->3991 3938 1302db5 3938->3931 4057 13010cd 3938->4057 3939->3938 3997 1301000 GetModuleHandleW GetProcAddress 3939->3997 3941 1302d30 OpenProcess 3941->3939 3943 1302ed2 CloseHandle 3943->3931 3945 1302ddb GetCurrentProcess IsWow64Process 3946 1302d70 3945->3946 3946->3938 4010 1301961 3946->4010 3955 1301136 3954->3955 3958 13011c4 3954->3958 3956 1301139 3955->3956 3957 13011a1 3955->3957 3961 1301142 3956->3961 3965 1301198 3956->3965 3959 13011af WriteProcessMemory 3957->3959 3960 130125e GetModuleHandleW GetProcAddress 3957->3960 3962 13011d3 3958->3962 3963 130122d ReadProcessMemory 3958->3963 3958->3965 3959->3965 3970 130127c 3960->3970 3961->3960 3964 1301150 3961->3964 3962->3965 3968 13011df SetFilePointer 3962->3968 3963->3965 3966 1301156 SetFilePointer 3964->3966 3967 130116c GetModuleHandleW GetProcAddress 3964->3967 3965->3922 3966->3965 3966->3967 3967->3965 3968->3965 3968->3967 3970->3965 3971 13012ae LocalFree 3970->3971 3971->3965 3973 1303384 3972->3973 3974 1303347 3972->3974 3973->3922 3974->3973 4150 13036e8 3974->4150 4163 13036ea 3974->4163 3979 13027af 3977->3979 3978 13028ac 3978->3933 3979->3978 3980 1302804 GetModuleHandleW GetProcAddress 3979->3980 3981 130282c 3980->3981 3982 1302890 GetModuleHandleW GetProcAddress 3981->3982 3983 13028a5 3981->3983 3982->3983 3983->3978 3985 1302655 3984->3985 3990 1302764 3984->3990 3986 1302662 GetModuleHandleW GetProcAddress LoadLibraryW 3985->3986 3988 130271f 3985->3988 3987 130268e 8 API calls 3986->3987 3986->3990 3987->3988 3987->3990 3989 1302798 4 API calls 3988->3989 3988->3990 3989->3990 3990->3933 4064 130184e 3991->4064 3993 130195b 3993->3938 3993->3941 3994 130192a 3994->3993 3996 130194f LocalFree 3994->3996 4071 13018c0 RtlEqualUnicodeString 3994->4071 3996->3993 4000 130102a 3997->4000 3998 13010c4 3998->3938 3998->3945 3998->3946 3999 13010ad 3999->3998 4002 13010bc LocalFree 3999->4002 4000->3998 4000->3999 4001 130104f GetModuleHandleW GetProcAddress 4000->4001 4003 1301047 4000->4003 4004 130107e GetModuleHandleW GetProcAddress 4000->4004 4005 1301060 4001->4005 4002->3998 4003->4001 4003->4002 4007 130108f 4004->4007 4005->4002 4006 1301069 4005->4006 4006->3998 4007->4002 4073 13013fc GetModuleHandleW GetProcAddress 4007->4073 4011 130199f 4010->4011 4012 1301c11 4010->4012 4013 1301b01 4011->4013 4014 13019a6 4011->4014 4015 1301d4c 12 API calls 4012->4015 4085 1301d4c 4013->4085 4016 13019ad 4014->4016 4026 1301a6f _wcsrchr 4014->4026 4023 1301c1b 4015->4023 4018 13019b0 4016->4018 4020 130184e 6 API calls 4016->4020 4018->3938 4037 130357c 4018->4037 4024 13019c6 4020->4024 4021 1301108 9 API calls 4025 1301b37 4021->4025 4022 1301c6d 16 API calls 4022->4023 4023->4018 4023->4022 4024->4018 4031 1301a25 4024->4031 4025->4018 4030 1301b84 GetModuleHandleW GetProcAddress 4025->4030 4034 1301108 9 API calls 4025->4034 4035 1301bf8 LocalFree 4025->4035 4094 1301c6d 4025->4094 4026->4018 4027 1301ac6 RtlInitUnicodeString 4026->4027 4028 1301c6d 16 API calls 4027->4028 4028->4026 4030->4025 4031->4024 4032 1301a34 RtlInitUnicodeString 4031->4032 4099 1301f96 4031->4099 4033 1301a4d LocalFree 4032->4033 4033->4031 4034->4025 4035->4025 4038 13035b7 4037->4038 4044 1302ead 4038->4044 4117 13012c3 4038->4117 4041 1301108 9 API calls 4042 1303608 4041->4042 4043 1301108 9 API calls 4042->4043 4042->4044 4043->4044 4044->3938 4045 1302997 4044->4045 4046 13029ea 4045->4046 4047 1302ab2 4046->4047 4048 13012c3 13 API calls 4046->4048 4047->3938 4049 1302a20 4048->4049 4049->4047 4050 1301108 9 API calls 4049->4050 4051 1302a4b 4050->4051 4051->4047 4052 1301108 9 API calls 4051->4052 4053 1302a6b 4052->4053 4053->4047 4130 1302ac8 4053->4130 4056 1302ac8 15 API calls 4056->4047 4058 1301105 4057->4058 4062 13010d1 4057->4062 4058->3943 4059 13010e0 4060 13010eb LocalFree 4059->4060 4061 13010ed LocalFree 4059->4061 4060->4061 4061->3943 4062->4059 4062->4061 4063 1301478 2 API calls 4062->4063 4063->4059 4065 130185a NtQuerySystemInformation 4064->4065 4066 130186d 4064->4066 4068 13018bb 4065->4068 4067 1301873 GetModuleHandleW GetProcAddress LocalAlloc 4066->4067 4066->4068 4067->4068 4069 1301895 NtQuerySystemInformation 4067->4069 4068->3994 4069->4066 4070 13018a9 LocalFree 4069->4070 4070->4066 4072 13018e2 4071->4072 4072->3994 4074 130141c 4073->4074 4075 1301422 CreateFileMappingW 4074->4075 4076 13010a6 4074->4076 4077 130143c MapViewOfFile 4075->4077 4078 1301452 4075->4078 4076->3999 4077->4078 4078->4076 4080 1301478 4078->4080 4081 1301482 UnmapViewOfFile 4080->4081 4082 1301489 4080->4082 4081->4082 4083 1301496 4082->4083 4084 130148f CloseHandle 4082->4084 4083->4076 4084->4083 4086 1301d68 GetCurrentProcess 4085->4086 4087 1301d61 4085->4087 4086->4087 4088 1301d86 4087->4088 4089 1301dcb RtlGetCurrentPeb 4087->4089 4090 1301b11 4088->4090 4091 1301d89 NtQueryInformationProcess 4088->4091 4089->4090 4090->4018 4090->4021 4091->4090 4092 1301d9f 4091->4092 4092->4090 4093 1301108 9 API calls 4092->4093 4093->4090 4103 1301de0 4094->4103 4097 1301c94 4097->4025 4098 1301c82 LocalFree 4098->4025 4100 1301f9c 4099->4100 4102 1301fc0 4099->4102 4101 1301fa0 GetModuleHandleW GetProcAddress 4100->4101 4100->4102 4101->4102 4102->4031 4104 1301108 9 API calls 4103->4104 4105 1301e19 4104->4105 4106 1301c7d 4105->4106 4107 1301e33 GetModuleHandleW GetProcAddress 4105->4107 4106->4097 4106->4098 4108 1301e5d 4107->4108 4108->4106 4109 1301108 9 API calls 4108->4109 4110 1301e73 GetModuleHandleW GetProcAddress 4109->4110 4111 1301ea4 4110->4111 4112 1301eda LocalFree 4111->4112 4113 1301108 9 API calls 4111->4113 4112->4106 4114 1301ec1 4113->4114 4115 1301ed5 LocalFree 4114->4115 4116 1301ecb 4114->4116 4115->4112 4116->4112 4118 1301314 4117->4118 4119 13012f9 4117->4119 4118->4041 4118->4044 4119->4118 4120 1301363 GetModuleHandleW GetProcAddress LocalAlloc 4119->4120 4121 130130c 4119->4121 4123 130132a 4119->4123 4120->4118 4122 1301386 4120->4122 4121->4118 4121->4120 4124 1301108 9 API calls 4122->4124 4123->4118 4126 13012c3 9 API calls 4123->4126 4125 1301393 4124->4125 4128 13012c3 9 API calls 4125->4128 4129 13013aa LocalFree 4125->4129 4126->4118 4128->4129 4129->4118 4132 1302aef GetModuleHandleW GetProcAddress 4130->4132 4133 1302b46 4132->4133 4134 1302a90 4133->4134 4135 1301108 9 API calls 4133->4135 4134->4047 4134->4056 4137 1302b61 4135->4137 4136 1302c4c LocalFree 4136->4134 4137->4136 4138 1301108 9 API calls 4137->4138 4139 1302b7a 4138->4139 4139->4136 4140 1301108 9 API calls 4139->4140 4141 1302b99 4140->4141 4141->4136 4142 1301108 9 API calls 4141->4142 4143 1302bc9 4142->4143 4143->4136 4144 1302bd9 GetModuleHandleW GetProcAddress 4143->4144 4145 1302bf1 4144->4145 4146 1302c49 4145->4146 4147 1301108 9 API calls 4145->4147 4146->4136 4148 1302c13 LocalFree 4147->4148 4148->4146 4151 13036ea 4150->4151 4153 130357c 13 API calls 4151->4153 4155 1303737 4151->4155 4153->4155 4156 13037b7 4155->4156 4176 130363c GetModuleHandleW GetProcAddress 4155->4176 4156->3974 4157 1303764 GetModuleHandleW GetProcAddress 4158 1303780 4157->4158 4158->4156 4159 1301108 9 API calls 4158->4159 4161 1303796 4159->4161 4160 13037ad LocalFree 4160->4156 4161->4160 4184 13033ab 4161->4184 4164 130371b 4163->4164 4165 1303737 4163->4165 4167 130357c 13 API calls 4164->4167 4166 130363c 12 API calls 4165->4166 4169 13037b7 4165->4169 4168 130375c 4166->4168 4167->4165 4168->4169 4170 1303764 GetModuleHandleW GetProcAddress 4168->4170 4169->3974 4171 1303780 4170->4171 4171->4169 4172 1301108 9 API calls 4171->4172 4173 1303796 4172->4173 4174 13037ad LocalFree 4173->4174 4175 13033ab 25 API calls 4173->4175 4174->4169 4175->4174 4177 1303676 4176->4177 4178 13036e2 4177->4178 4179 1301108 9 API calls 4177->4179 4178->4156 4178->4157 4183 1303689 4179->4183 4180 13036d1 LocalFree 4180->4178 4182 1301108 9 API calls 4182->4183 4183->4180 4183->4182 4186 13033cc 4184->4186 4187 1303577 4186->4187 4224 1301ee7 4186->4224 4187->4160 4190 1301ee7 11 API calls 4191 1303405 4190->4191 4194 1301f5a 2 API calls 4191->4194 4195 130340e 4191->4195 4192 13033f0 4192->4190 4193 1301ee7 11 API calls 4201 1303423 4193->4201 4194->4195 4195->4193 4196 1303547 4197 130354e LocalFree 4196->4197 4198 1303557 4196->4198 4197->4198 4199 130355e LocalFree 4198->4199 4200 1303567 4198->4200 4199->4200 4200->4187 4203 130356e LocalFree 4200->4203 4201->4196 4202 1301f5a 2 API calls 4201->4202 4204 1303442 4202->4204 4203->4187 4204->4196 4205 1303455 4204->4205 4234 13032f6 4205->4234 4207 130345d 4208 13032f6 2 API calls 4207->4208 4209 1303467 4208->4209 4210 13032f6 2 API calls 4209->4210 4211 1303472 4210->4211 4212 130347d StrChrW 4211->4212 4213 1303491 wsprintfW 4211->4213 4212->4213 4215 13034dd 4213->4215 4215->4215 4216 13034e8 GetModuleHandleW GetProcAddress 4215->4216 4217 130351e 4216->4217 4218 1303529 4217->4218 4219 1303522 LocalFree 4217->4219 4220 130352e LocalFree 4218->4220 4221 1303537 4218->4221 4219->4218 4220->4221 4222 130353c LocalFree 4221->4222 4223 1303545 4221->4223 4222->4223 4223->4196 4225 1301f0f 4224->4225 4226 1301f50 4224->4226 4225->4226 4227 1301f18 GetModuleHandleW GetProcAddress 4225->4227 4226->4192 4230 1301f5a 4226->4230 4228 1301f34 4227->4228 4228->4226 4229 1301108 9 API calls 4228->4229 4229->4226 4231 1301f69 IsCharAlphaNumericW 4230->4231 4232 1301f7a IsTextUnicode 4230->4232 4231->4232 4233 1301f8f 4231->4233 4232->4233 4233->4192 4235 13032fd GetModuleHandleW GetProcAddress 4234->4235 4236 130331f 4234->4236 4235->4236 4236->4207 4237 1304d59 SetUnhandledExceptionFilter 4823 1304d17 4824 1304d53 4823->4824 4826 1304d29 4823->4826 4826->4824 4827 1306d80 4826->4827 4828 1306d8c __CxxUnhandledExceptionFilter 4827->4828 4829 13047c4 __getptd 66 API calls 4828->4829 4832 1306d91 4829->4832 4830 1307c84 __CxxUnhandledExceptionFilter 68 API calls 4831 1306db3 __CxxUnhandledExceptionFilter 4830->4831 4831->4824 4832->4830 4833 1302ee8 4838 1303978 4833->4838 4836 1303978 __wcsicoll 78 API calls 4837 1302f7b 4836->4837 4839 1303987 4838->4839 4840 13039f0 4838->4840 4842 1304d04 __wcsicoll 66 API calls 4839->4842 4843 1302f4c 4839->4843 4846 1303875 4840->4846 4844 1303993 4842->4844 4843->4836 4845 1304cb2 __wcsicoll 11 API calls 4844->4845 4845->4843 4847 13037ee ___crtLCMapStringA 76 API calls 4846->4847 4848 1303889 4847->4848 4849 13038b6 4848->4849 4850 1303890 4848->4850 4852 13038be 4849->4852 4858 13038e5 4849->4858 4851 1304d04 __wcsicoll 66 API calls 4850->4851 4853 1303895 4851->4853 4854 1304d04 __wcsicoll 66 API calls 4852->4854 4856 1304cb2 __wcsicoll 11 API calls 4853->4856 4857 13038c3 4854->4857 4855 1304a88 78 API calls __wcsicoll 4855->4858 4860 13038a0 4856->4860 4859 1304cb2 __wcsicoll 11 API calls 4857->4859 4858->4855 4858->4860 4859->4860 4860->4843 4861 1307cea 4862 1305034 __amsg_exit 66 API calls 4861->4862 4863 1307cf1 4862->4863

    Executed Functions

    APIs
    • GetModuleHandleW.KERNEL32(kernel32,LoadLibraryW,?), ref: 01302670
    • GetProcAddress.KERNEL32(00000000), ref: 0130267D
    • LoadLibraryW.KERNEL32 ref: 0130267F
    • GetProcAddress.KERNEL32(00000000,BCryptOpenAlgorithmProviderBCryptGenerateSymmetricKey), ref: 01302693
    • GetProcAddress.KERNEL32(BCryptSetProperty), ref: 013026A5
    • GetProcAddress.KERNEL32(BCryptGetProperty), ref: 013026B7
    • GetProcAddress.KERNEL32(BCryptGenerateSymmetricKey), ref: 013026C8
    • GetProcAddress.KERNEL32(BCryptEncrypt), ref: 013026DA
    • GetProcAddress.KERNEL32(BCryptDecrypt), ref: 013026EC
    • GetProcAddress.KERNEL32(BCryptDestroyKey), ref: 013026FE
    • GetProcAddress.KERNEL32(BCryptCloseAlgorithmProvider), ref: 01302710
      • Part of subcall function 01302798: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,?,00000000,?,?,?,01302764), ref: 0130281F
      • Part of subcall function 01302798: GetProcAddress.KERNEL32(00000000,?,00000000,?,?,?,01302764), ref: 01302828
      • Part of subcall function 01302798: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,?,00000000,?,?,?,01302764), ref: 0130289E
      • Part of subcall function 01302798: GetProcAddress.KERNEL32(00000000,?,00000000,?,?,?,01302764), ref: 013028A1
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • NtQuerySystemInformation.NTDLL(00000000,00000000,00000000,00000000), ref: 01301863
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,00001000,?,00000000,0130192A,00000005), ref: 01301880
    • GetProcAddress.KERNEL32(00000000,?,00000000,0130192A,00000005), ref: 01301887
    • LocalAlloc.KERNELBASE(?,00000000,0130192A,00000005), ref: 0130188D
    • NtQuerySystemInformation.NTDLL(?,00000000,00001000,00000000), ref: 0130189D
    • LocalFree.KERNEL32(?,?,00000000,0130192A,00000005), ref: 013018AB
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,01301C1B), ref: 01301D68
    • NtQueryInformationProcess.NTDLL(00000000,?,?,00000018,?), ref: 01301D95
      • Part of subcall function 01301108: SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 0130115E
      • Part of subcall function 01301108: GetModuleHandleW.KERNEL32(kernel32,ReadFile,?,?,?,0130CD30,00000000), ref: 01301189
      • Part of subcall function 01301108: GetProcAddress.KERNEL32(00000000), ref: 01301190
      • Part of subcall function 01301108: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 013011BC
      • Part of subcall function 01301108: SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 013011E8
      • Part of subcall function 01301108: ReadProcessMemory.KERNELBASE(?,?,?,?,00000000), ref: 0130123A
      • Part of subcall function 01301108: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,?), ref: 0130126D
      • Part of subcall function 01301108: GetProcAddress.KERNEL32(00000000), ref: 01301274
      • Part of subcall function 01301108: LocalFree.KERNEL32(?), ref: 013012B2
    • RtlGetCurrentPeb.NTDLL ref: 01301DCB
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(Function_00004D17), ref: 01304D5E
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,01303B0C,01309D28,00000014), ref: 01304915
    • GetProcAddress.KERNEL32(00000000,FlsAlloc,00000000,?,01303B0C,01309D28,00000014), ref: 01304937
    • GetProcAddress.KERNEL32(00000000,FlsGetValue,?,01303B0C,01309D28,00000014), ref: 01304944
    • GetProcAddress.KERNEL32(00000000,FlsSetValue,?,01303B0C,01309D28,00000014), ref: 01304951
    • GetProcAddress.KERNEL32(00000000,FlsFree,?,01303B0C,01309D28,00000014), ref: 0130495E
    • TlsAlloc.KERNEL32(?,01303B0C,01309D28,00000014), ref: 013049AE
    • TlsSetValue.KERNEL32(00000000,?,01303B0C,01309D28,00000014), ref: 013049C9
    • EncodePointer.KERNEL32(?,01303B0C,01309D28,00000014), ref: 013049E4
    • EncodePointer.KERNEL32(?,01303B0C,01309D28,00000014), ref: 013049F1
    • EncodePointer.KERNEL32(?,01303B0C,01309D28,00000014), ref: 013049FE
    • EncodePointer.KERNEL32(?,01303B0C,01309D28,00000014), ref: 01304A0B
      • Part of subcall function 0130602D: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000FA0), ref: 01306055
    • DecodePointer.KERNEL32(013047DE,?,01303B0C,01309D28,00000014), ref: 01304A2C
      • Part of subcall function 01306259: Sleep.KERNEL32(00000000,01303889,?,?,?), ref: 01306281
    • DecodePointer.KERNEL32(00000000,?,01303B0C,01309D28,00000014), ref: 01304A5B
      • Part of subcall function 01304697: GetModuleHandleW.KERNEL32(KERNEL32.DLL,01309DA8,00000008,0130479F,00000000,00000000,?,?,013047CC,?,01303806,?,?,01303889,?,?), ref: 013046A8
      • Part of subcall function 01304697: InterlockedIncrement.KERNEL32(0130B008), ref: 013046E9
    • GetCurrentThreadId.KERNEL32(?,01303B0C,01309D28,00000014), ref: 01304A6D
      • Part of subcall function 0130465A: DecodePointer.KERNEL32(00000003,01304A83,?,01303B0C,01309D28,00000014), ref: 0130466B
      • Part of subcall function 0130465A: TlsFree.KERNEL32(00000007,01304A83,?,01303B0C,01309D28,00000014), ref: 01304685
      • Part of subcall function 0130465A: DeleteCriticalSection.KERNEL32(00000000,00000000,773EA0FD,?,01304A83,?,01303B0C,01309D28,00000014), ref: 01306094
      • Part of subcall function 0130465A: DeleteCriticalSection.KERNEL32(00000007,773EA0FD,?,01304A83,?,01303B0C,01309D28,00000014), ref: 013060BE
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
      • Part of subcall function 01301EE7: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,?), ref: 01301F25
      • Part of subcall function 01301EE7: GetProcAddress.KERNEL32(00000000), ref: 01301F2C
    • LocalFree.KERNEL32(?), ref: 01303571
      • Part of subcall function 01301F5A: IsCharAlphaNumericW.USER32(?), ref: 01301F70
      • Part of subcall function 01301F5A: IsTextUnicode.ADVAPI32(?,?,?), ref: 01301F85
      • Part of subcall function 013032F6: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,-00000002,?,0130345D), ref: 01303310
      • Part of subcall function 013032F6: GetProcAddress.KERNEL32(00000000,?,0130345D), ref: 01303317
    • StrChrW.SHLWAPI(00000000,0000005C), ref: 01303480
    • wsprintfW.USER32 ref: 013034CB
    • GetModuleHandleW.KERNEL32(kernel32,WriteFile,?,?,?,00000000), ref: 0130350F
    • GetProcAddress.KERNEL32(00000000), ref: 01303516
    • LocalFree.KERNEL32(00000000), ref: 01303523
    • LocalFree.KERNEL32(00000000), ref: 01303531
    • LocalFree.KERNEL32(?), ref: 0130353F
    • LocalFree.KERNEL32(?), ref: 01303551
    • LocalFree.KERNEL32(?), ref: 01303561
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • ReadProcessMemory.KERNELBASE(?,?,?,?,00000000), ref: 0130123A
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,?), ref: 0130126D
    • GetProcAddress.KERNEL32(00000000), ref: 01301274
      • Part of subcall function 01301108: SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 0130115E
      • Part of subcall function 01301108: GetModuleHandleW.KERNEL32(kernel32,ReadFile,?,?,?,0130CD30,00000000), ref: 01301189
      • Part of subcall function 01301108: GetProcAddress.KERNEL32(00000000), ref: 01301190
      • Part of subcall function 01301108: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 013011BC
      • Part of subcall function 01301108: SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 013011E8
      • Part of subcall function 01301108: LocalFree.KERNEL32(?), ref: 013012B2
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,0000003C,00000000,?,00000000), ref: 01302B39
    • GetProcAddress.KERNEL32(00000000), ref: 01302B42
      • Part of subcall function 01301108: SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 0130115E
      • Part of subcall function 01301108: GetModuleHandleW.KERNEL32(kernel32,ReadFile,?,?,?,0130CD30,00000000), ref: 01301189
      • Part of subcall function 01301108: GetProcAddress.KERNEL32(00000000), ref: 01301190
      • Part of subcall function 01301108: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 013011BC
      • Part of subcall function 01301108: SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 013011E8
      • Part of subcall function 01301108: ReadProcessMemory.KERNELBASE(?,?,?,?,00000000), ref: 0130123A
      • Part of subcall function 01301108: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,?), ref: 0130126D
      • Part of subcall function 01301108: GetProcAddress.KERNEL32(00000000), ref: 01301274
      • Part of subcall function 01301108: LocalFree.KERNEL32(?), ref: 013012B2
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,00000034), ref: 01302BEA
    • GetProcAddress.KERNEL32(00000000), ref: 01302BED
    • LocalFree.KERNEL32(?), ref: 01302C43
    • LocalFree.KERNEL32(00000000), ref: 01302C4D
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,?,00000000,?,?,?,01302764), ref: 0130281F
    • GetProcAddress.KERNEL32(00000000,?,00000000,?,?,?,01302764), ref: 01302828
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,?,00000000,?,?,?,01302764), ref: 0130289E
    • GetProcAddress.KERNEL32(00000000,?,00000000,?,?,?,01302764), ref: 013028A1
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
      • Part of subcall function 01302C5B: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 01302D0A
      • Part of subcall function 01302C5B: OpenProcess.KERNEL32(0130BD30,00000000,?,?,0130CD30,00000000), ref: 01302D35
      • Part of subcall function 01302C5B: GetCurrentProcess.KERNEL32(?,?,0130CD30,00000000), ref: 01302DDF
      • Part of subcall function 01302C5B: IsWow64Process.KERNELBASE(00000000,?,0130CD30,00000000), ref: 01302DE6
      • Part of subcall function 01302C5B: CloseHandle.KERNEL32(?), ref: 01302EDA
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,01309C3C), ref: 013030CC
    • GetProcAddress.KERNEL32(00000000), ref: 013030D3
      • Part of subcall function 01301108: SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 0130115E
      • Part of subcall function 01301108: GetModuleHandleW.KERNEL32(kernel32,ReadFile,?,?,?,0130CD30,00000000), ref: 01301189
      • Part of subcall function 01301108: GetProcAddress.KERNEL32(00000000), ref: 01301190
      • Part of subcall function 01301108: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 013011BC
      • Part of subcall function 01301108: SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 013011E8
      • Part of subcall function 01301108: ReadProcessMemory.KERNELBASE(?,?,?,?,00000000), ref: 0130123A
      • Part of subcall function 01301108: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,?), ref: 0130126D
      • Part of subcall function 01301108: GetProcAddress.KERNEL32(00000000), ref: 01301274
      • Part of subcall function 01301108: LocalFree.KERNEL32(?), ref: 013012B2
      • Part of subcall function 01301EE7: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,?), ref: 01301F25
      • Part of subcall function 01301EE7: GetProcAddress.KERNEL32(00000000), ref: 01301F2C
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,?), ref: 0130323B
    • GetProcAddress.KERNEL32(00000000), ref: 01303242
    • LocalFree.KERNEL32(00000002,?,01309B58), ref: 01303288
    • LocalFree.KERNEL32(00000002,?,01309B58), ref: 01303296
    • LocalFree.KERNEL32(00000002,?,01309B58), ref: 013032A7
    • LocalFree.KERNEL32(00000000), ref: 013032B4
    • LocalFree.KERNEL32(?), ref: 013032CE
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
      • Part of subcall function 0130184E: NtQuerySystemInformation.NTDLL(00000000,00000000,00000000,00000000), ref: 01301863
      • Part of subcall function 0130184E: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,00001000,?,00000000,0130192A,00000005), ref: 01301880
      • Part of subcall function 0130184E: GetProcAddress.KERNEL32(00000000,?,00000000,0130192A,00000005), ref: 01301887
      • Part of subcall function 0130184E: LocalAlloc.KERNELBASE(?,00000000,0130192A,00000005), ref: 0130188D
      • Part of subcall function 0130184E: NtQuerySystemInformation.NTDLL(?,00000000,00001000,00000000), ref: 0130189D
      • Part of subcall function 0130184E: LocalFree.KERNEL32(?,?,00000000,0130192A,00000005), ref: 013018AB
      • Part of subcall function 01301F96: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,0000000100000013,01301A2E), ref: 01301FB1
      • Part of subcall function 01301F96: GetProcAddress.KERNEL32(00000000), ref: 01301FB8
    • RtlInitUnicodeString.NTDLL(?,00000000), ref: 01301A39
    • LocalFree.KERNEL32(00000000), ref: 01301A51
    • _wcsrchr.LIBCMT ref: 01301AC1
    • RtlInitUnicodeString.NTDLL(?,-00000002), ref: 01301AD0
      • Part of subcall function 01301108: SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 0130115E
      • Part of subcall function 01301108: GetModuleHandleW.KERNEL32(kernel32,ReadFile,?,?,?,0130CD30,00000000), ref: 01301189
      • Part of subcall function 01301108: GetProcAddress.KERNEL32(00000000), ref: 01301190
      • Part of subcall function 01301108: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 013011BC
      • Part of subcall function 01301108: SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 013011E8
      • Part of subcall function 01301108: ReadProcessMemory.KERNELBASE(?,?,?,?,00000000), ref: 0130123A
      • Part of subcall function 01301108: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,?), ref: 0130126D
      • Part of subcall function 01301108: GetProcAddress.KERNEL32(00000000), ref: 01301274
      • Part of subcall function 01301108: LocalFree.KERNEL32(?), ref: 013012B2
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,?), ref: 01301BAC
    • GetProcAddress.KERNEL32(00000000), ref: 01301BB3
    • LocalFree.KERNEL32(?), ref: 01301BFB
      • Part of subcall function 01301D4C: GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,01301C1B), ref: 01301D68
      • Part of subcall function 01301D4C: NtQueryInformationProcess.NTDLL(00000000,?,?,00000018,?), ref: 01301D95
      • Part of subcall function 01301D4C: RtlGetCurrentPeb.NTDLL ref: 01301DCB
      • Part of subcall function 01301C6D: LocalFree.KERNEL32(?,?,?,?,01301C46), ref: 01301C8C
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
      • Part of subcall function 01301108: SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 0130115E
      • Part of subcall function 01301108: GetModuleHandleW.KERNEL32(kernel32,ReadFile,?,?,?,0130CD30,00000000), ref: 01301189
      • Part of subcall function 01301108: GetProcAddress.KERNEL32(00000000), ref: 01301190
      • Part of subcall function 01301108: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 013011BC
      • Part of subcall function 01301108: SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 013011E8
      • Part of subcall function 01301108: ReadProcessMemory.KERNELBASE(?,?,?,?,00000000), ref: 0130123A
      • Part of subcall function 01301108: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,?), ref: 0130126D
      • Part of subcall function 01301108: GetProcAddress.KERNEL32(00000000), ref: 01301274
      • Part of subcall function 01301108: LocalFree.KERNEL32(?), ref: 013012B2
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,00000018,?,?,00000000), ref: 01301E50
    • GetProcAddress.KERNEL32(00000000), ref: 01301E59
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,-00000109), ref: 01301E9D
    • GetProcAddress.KERNEL32(00000000), ref: 01301EA0
    • LocalFree.KERNEL32(?), ref: 01301ED8
    • LocalFree.KERNEL32(?), ref: 01301EDD
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • GetStartupInfoW.KERNEL32(?), ref: 013056EF
      • Part of subcall function 01306259: Sleep.KERNEL32(00000000,01303889,?,?,?), ref: 01306281
    • GetFileType.KERNEL32(?), ref: 01305822
    • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000C,00000FA0), ref: 01305858
    • GetStdHandle.KERNEL32(-000000F6), ref: 013058AC
    • GetFileType.KERNEL32(00000000), ref: 013058BE
    • InitializeCriticalSectionAndSpinCount.KERNEL32(-0130CD94,00000FA0), ref: 013058EC
    • SetHandleCount.KERNEL32 ref: 01305915
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • HeapSetInformation.KERNEL32(00000000,00000001,00000000,00000000,01309D28,00000014), ref: 01303AA7
      • Part of subcall function 01305973: HeapCreate.KERNELBASE(00000000,00001000,00000000,01303AFB,01309D28,00000014), ref: 0130597C
      • Part of subcall function 0130490D: GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,01303B0C,01309D28,00000014), ref: 01304915
      • Part of subcall function 0130490D: GetProcAddress.KERNEL32(00000000,FlsAlloc,00000000,?,01303B0C,01309D28,00000014), ref: 01304937
      • Part of subcall function 0130490D: GetProcAddress.KERNEL32(00000000,FlsGetValue,?,01303B0C,01309D28,00000014), ref: 01304944
      • Part of subcall function 0130490D: GetProcAddress.KERNEL32(00000000,FlsSetValue,?,01303B0C,01309D28,00000014), ref: 01304951
      • Part of subcall function 0130490D: GetProcAddress.KERNEL32(00000000,FlsFree,?,01303B0C,01309D28,00000014), ref: 0130495E
      • Part of subcall function 0130490D: TlsAlloc.KERNEL32(?,01303B0C,01309D28,00000014), ref: 013049AE
      • Part of subcall function 0130490D: TlsSetValue.KERNEL32(00000000,?,01303B0C,01309D28,00000014), ref: 013049C9
      • Part of subcall function 0130490D: EncodePointer.KERNEL32(?,01303B0C,01309D28,00000014), ref: 013049E4
      • Part of subcall function 0130490D: EncodePointer.KERNEL32(?,01303B0C,01309D28,00000014), ref: 013049F1
      • Part of subcall function 0130490D: EncodePointer.KERNEL32(?,01303B0C,01309D28,00000014), ref: 013049FE
      • Part of subcall function 0130490D: EncodePointer.KERNEL32(?,01303B0C,01309D28,00000014), ref: 01304A0B
      • Part of subcall function 0130490D: DecodePointer.KERNEL32(013047DE,?,01303B0C,01309D28,00000014), ref: 01304A2C
      • Part of subcall function 0130490D: DecodePointer.KERNEL32(00000000,?,01303B0C,01309D28,00000014), ref: 01304A5B
      • Part of subcall function 0130490D: GetCurrentThreadId.KERNEL32(?,01303B0C,01309D28,00000014), ref: 01304A6D
    • __RTC_Initialize.LIBCMT ref: 01303B18
      • Part of subcall function 013056E2: GetStartupInfoW.KERNEL32(?), ref: 013056EF
      • Part of subcall function 013056E2: GetFileType.KERNEL32(?), ref: 01305822
      • Part of subcall function 013056E2: InitializeCriticalSectionAndSpinCount.KERNEL32(0000000C,00000FA0), ref: 01305858
      • Part of subcall function 013056E2: GetStdHandle.KERNEL32(-000000F6), ref: 013058AC
      • Part of subcall function 013056E2: GetFileType.KERNEL32(00000000), ref: 013058BE
      • Part of subcall function 013056E2: InitializeCriticalSectionAndSpinCount.KERNEL32(-0130CD94,00000FA0), ref: 013058EC
      • Part of subcall function 013056E2: SetHandleCount.KERNEL32 ref: 01305915
    • __amsg_exit.LIBCMT ref: 01303B2B
    • GetCommandLineW.KERNEL32(01309D28,00000014), ref: 01303B31
      • Part of subcall function 0130568A: GetEnvironmentStringsW.KERNEL32(00000000,01303B41), ref: 0130568D
      • Part of subcall function 0130568A: FreeEnvironmentStringsW.KERNEL32(00000000), ref: 013056C9
      • Part of subcall function 013055DC: GetModuleFileNameW.KERNEL32(00000000,C:\Windows\9706.tmp,00000104), ref: 013055FC
      • Part of subcall function 013055DC: _wparse_cmdline.LIBCMT ref: 01305626
      • Part of subcall function 013055DC: _wparse_cmdline.LIBCMT ref: 01305668
    • __amsg_exit.LIBCMT ref: 01303B51
      • Part of subcall function 013053AA: _wcslen.LIBCMT ref: 013053CA
      • Part of subcall function 013053AA: _wcslen.LIBCMT ref: 01305402
    • __amsg_exit.LIBCMT ref: 01303B62
      • Part of subcall function 01304E13: __initterm_e.LIBCMT ref: 01304E49
    • __amsg_exit.LIBCMT ref: 01303B75
      • Part of subcall function 013020A4: RtlGetNtVersionNumbers.NTDLL(0130CFD0,0130CFCC,0130CFD4), ref: 013020CD
      • Part of subcall function 013020A4: RtlAdjustPrivilege.NTDLL(00000014,00000001,00000000,00000001), ref: 013020E7
      • Part of subcall function 013020A4: CloseHandle.KERNEL32(0000004C), ref: 01302126
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
      • Part of subcall function 0130363C: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,00000018), ref: 01303667
      • Part of subcall function 0130363C: GetProcAddress.KERNEL32(00000000), ref: 0130366E
      • Part of subcall function 0130363C: LocalFree.KERNEL32(?), ref: 013036DC
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,00000008), ref: 01303771
    • GetProcAddress.KERNEL32(00000000), ref: 01303778
      • Part of subcall function 01301108: SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 0130115E
      • Part of subcall function 01301108: GetModuleHandleW.KERNEL32(kernel32,ReadFile,?,?,?,0130CD30,00000000), ref: 01301189
      • Part of subcall function 01301108: GetProcAddress.KERNEL32(00000000), ref: 01301190
      • Part of subcall function 01301108: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 013011BC
      • Part of subcall function 01301108: SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 013011E8
      • Part of subcall function 01301108: ReadProcessMemory.KERNELBASE(?,?,?,?,00000000), ref: 0130123A
      • Part of subcall function 01301108: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,?), ref: 0130126D
      • Part of subcall function 01301108: GetProcAddress.KERNEL32(00000000), ref: 01301274
      • Part of subcall function 01301108: LocalFree.KERNEL32(?), ref: 013012B2
    • LocalFree.KERNEL32(?), ref: 013037B1
      • Part of subcall function 013033AB: StrChrW.SHLWAPI(00000000,0000005C), ref: 01303480
      • Part of subcall function 013033AB: wsprintfW.USER32 ref: 013034CB
      • Part of subcall function 013033AB: GetModuleHandleW.KERNEL32(kernel32,WriteFile,?,?,?,00000000), ref: 0130350F
      • Part of subcall function 013033AB: GetProcAddress.KERNEL32(00000000), ref: 01303516
      • Part of subcall function 013033AB: LocalFree.KERNEL32(00000000), ref: 01303523
      • Part of subcall function 013033AB: LocalFree.KERNEL32(00000000), ref: 01303531
      • Part of subcall function 013033AB: LocalFree.KERNEL32(?), ref: 0130353F
      • Part of subcall function 013033AB: LocalFree.KERNEL32(?), ref: 01303551
      • Part of subcall function 013033AB: LocalFree.KERNEL32(?), ref: 01303561
      • Part of subcall function 013033AB: LocalFree.KERNEL32(?), ref: 01303571
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
      • Part of subcall function 0130363C: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,00000018), ref: 01303667
      • Part of subcall function 0130363C: GetProcAddress.KERNEL32(00000000), ref: 0130366E
      • Part of subcall function 0130363C: LocalFree.KERNEL32(?), ref: 013036DC
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,00000008), ref: 01303771
    • GetProcAddress.KERNEL32(00000000), ref: 01303778
      • Part of subcall function 01301108: SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 0130115E
      • Part of subcall function 01301108: GetModuleHandleW.KERNEL32(kernel32,ReadFile,?,?,?,0130CD30,00000000), ref: 01301189
      • Part of subcall function 01301108: GetProcAddress.KERNEL32(00000000), ref: 01301190
      • Part of subcall function 01301108: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 013011BC
      • Part of subcall function 01301108: SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 013011E8
      • Part of subcall function 01301108: ReadProcessMemory.KERNELBASE(?,?,?,?,00000000), ref: 0130123A
      • Part of subcall function 01301108: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,?), ref: 0130126D
      • Part of subcall function 01301108: GetProcAddress.KERNEL32(00000000), ref: 01301274
      • Part of subcall function 01301108: LocalFree.KERNEL32(?), ref: 013012B2
    • LocalFree.KERNEL32(?), ref: 013037B1
      • Part of subcall function 013033AB: StrChrW.SHLWAPI(00000000,0000005C), ref: 01303480
      • Part of subcall function 013033AB: wsprintfW.USER32 ref: 013034CB
      • Part of subcall function 013033AB: GetModuleHandleW.KERNEL32(kernel32,WriteFile,?,?,?,00000000), ref: 0130350F
      • Part of subcall function 013033AB: GetProcAddress.KERNEL32(00000000), ref: 01303516
      • Part of subcall function 013033AB: LocalFree.KERNEL32(00000000), ref: 01303523
      • Part of subcall function 013033AB: LocalFree.KERNEL32(00000000), ref: 01303531
      • Part of subcall function 013033AB: LocalFree.KERNEL32(?), ref: 0130353F
      • Part of subcall function 013033AB: LocalFree.KERNEL32(?), ref: 01303551
      • Part of subcall function 013033AB: LocalFree.KERNEL32(?), ref: 01303561
      • Part of subcall function 013033AB: LocalFree.KERNEL32(?), ref: 01303571
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,00000018), ref: 01303667
    • GetProcAddress.KERNEL32(00000000), ref: 0130366E
      • Part of subcall function 01301108: SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 0130115E
      • Part of subcall function 01301108: GetModuleHandleW.KERNEL32(kernel32,ReadFile,?,?,?,0130CD30,00000000), ref: 01301189
      • Part of subcall function 01301108: GetProcAddress.KERNEL32(00000000), ref: 01301190
      • Part of subcall function 01301108: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 013011BC
      • Part of subcall function 01301108: SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 013011E8
      • Part of subcall function 01301108: ReadProcessMemory.KERNELBASE(?,?,?,?,00000000), ref: 0130123A
      • Part of subcall function 01301108: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,?), ref: 0130126D
      • Part of subcall function 01301108: GetProcAddress.KERNEL32(00000000), ref: 01301274
      • Part of subcall function 01301108: LocalFree.KERNEL32(?), ref: 013012B2
    • LocalFree.KERNEL32(?), ref: 013036DC
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 01302D0A
      • Part of subcall function 013018F7: RtlInitUnicodeString.NTDLL(?,?), ref: 01301917
      • Part of subcall function 013018F7: LocalFree.KERNEL32(?,?,?), ref: 01301952
    • OpenProcess.KERNEL32(0130BD30,00000000,?,?,0130CD30,00000000), ref: 01302D35
      • Part of subcall function 01301000: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,00000008,00000001,?,00000000,?,01302D60,00000001,00000000,?,0130CD30,00000000), ref: 0130101D
      • Part of subcall function 01301000: GetProcAddress.KERNEL32(00000000,?,00000000,?,01302D60,00000001,00000000,?,0130CD30,00000000), ref: 01301026
      • Part of subcall function 01301000: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,00000004,?,00000000,?,01302D60,00000001,00000000,?,0130CD30,00000000), ref: 01301059
      • Part of subcall function 01301000: GetProcAddress.KERNEL32(00000000,?,00000000,?,01302D60,00000001,00000000,?,0130CD30,00000000), ref: 0130105C
      • Part of subcall function 01301000: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,00000004,?,00000000,?,01302D60,00000001,00000000,?,0130CD30,00000000), ref: 01301088
      • Part of subcall function 01301000: GetProcAddress.KERNEL32(00000000,?,00000000,?,01302D60,00000001,00000000,?,0130CD30,00000000), ref: 0130108B
      • Part of subcall function 01301000: LocalFree.KERNEL32(0130CD68,?,00000000,?,01302D60,00000001,00000000), ref: 013010BE
    • GetCurrentProcess.KERNEL32(?,?,0130CD30,00000000), ref: 01302DDF
    • IsWow64Process.KERNELBASE(00000000,?,0130CD30,00000000), ref: 01302DE6
      • Part of subcall function 01301961: RtlInitUnicodeString.NTDLL(?,00000000), ref: 01301A39
      • Part of subcall function 01301961: LocalFree.KERNEL32(00000000), ref: 01301A51
      • Part of subcall function 01301961: _wcsrchr.LIBCMT ref: 01301AC1
      • Part of subcall function 01301961: RtlInitUnicodeString.NTDLL(?,-00000002), ref: 01301AD0
      • Part of subcall function 01301961: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,?), ref: 01301BAC
      • Part of subcall function 01301961: GetProcAddress.KERNEL32(00000000), ref: 01301BB3
      • Part of subcall function 01301961: LocalFree.KERNEL32(?), ref: 01301BFB
      • Part of subcall function 013010CD: LocalFree.KERNEL32(?,?,01302ED2,?,0130CD30,00000000), ref: 013010EB
      • Part of subcall function 013010CD: LocalFree.KERNEL32(00458328,?,01302ED2,?,0130CD30,00000000), ref: 013010EE
    • CloseHandle.KERNEL32(?), ref: 01302EDA
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
      • Part of subcall function 013061A7: __amsg_exit.LIBCMT ref: 013061C9
      • Part of subcall function 013061A7: EnterCriticalSection.KERNEL32(?,?,?,013046E1,0000000D), ref: 013061D1
    • DecodePointer.KERNEL32(01309DF8,00000020,01305011,?,00000001,00000000,?,01305051,000000FF,?,013061CE,00000011,?,?,013046E1,0000000D), ref: 01304EF4
    • DecodePointer.KERNEL32(?,01305051,000000FF,?,013061CE,00000011,?,?,013046E1,0000000D), ref: 01304F05
      • Part of subcall function 01304614: EncodePointer.KERNEL32(00000000,01307302,0130C038,00000314,00000000,?,?,?,?,?,013051B5,0130C038,Microsoft Visual C++ Runtime Library,00012010), ref: 01304616
    • DecodePointer.KERNEL32(-00000004,?,01305051,000000FF,?,013061CE,00000011,?,?,013046E1,0000000D), ref: 01304F2B
    • DecodePointer.KERNEL32(?,01305051,000000FF,?,013061CE,00000011,?,?,013046E1,0000000D), ref: 01304F3E
    • DecodePointer.KERNEL32(?,01305051,000000FF,?,013061CE,00000011,?,?,013046E1,0000000D), ref: 01304F48
      • Part of subcall function 013060CE: LeaveCriticalSection.KERNEL32(?,013061A5,0000000A,01306195,01309E18,0000000C,013061C2,?,?,?,013046E1,0000000D), ref: 013060DD
      • Part of subcall function 01304D92: ExitProcess.KERNEL32 ref: 01304DA3
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • DecodePointer.KERNEL32(?,?,?,?,?,01307128,?,01309E78,0000000C,01307154,?,?,01304E60,0130594D), ref: 01307039
    • DecodePointer.KERNEL32(?,?,?,?,?,01307128,?,01309E78,0000000C,01307154,?,?,01304E60,0130594D), ref: 01307046
      • Part of subcall function 01307CB7: HeapSize.KERNEL32(00000000,00000000,?,00000003,01306DB3,01309E38,00000008,01304D53), ref: 01307CE2
      • Part of subcall function 013062A5: Sleep.KERNEL32(00000000,00000000,00000000,?,0130709E,00000000,00000010,?,?,?,?,?,01307128,?,01309E78,0000000C), ref: 013062CF
    • EncodePointer.KERNEL32(00000000,?,?,?,?,?,01307128,?,01309E78,0000000C,01307154,?,?,01304E60,0130594D), ref: 013070AB
    • EncodePointer.KERNEL32(?,?,?,?,?,?,01307128,?,01309E78,0000000C,01307154,?,?,01304E60,0130594D), ref: 013070BF
    • EncodePointer.KERNEL32(-00000004,?,?,?,?,?,01307128,?,01309E78,0000000C,01307154,?,?,01304E60,0130594D), ref: 013070C7
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,?), ref: 01301F25
    • GetProcAddress.KERNEL32(00000000), ref: 01301F2C
      • Part of subcall function 01301108: SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 0130115E
      • Part of subcall function 01301108: GetModuleHandleW.KERNEL32(kernel32,ReadFile,?,?,?,0130CD30,00000000), ref: 01301189
      • Part of subcall function 01301108: GetProcAddress.KERNEL32(00000000), ref: 01301190
      • Part of subcall function 01301108: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 013011BC
      • Part of subcall function 01301108: SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 013011E8
      • Part of subcall function 01301108: ReadProcessMemory.KERNELBASE(?,?,?,?,00000000), ref: 0130123A
      • Part of subcall function 01301108: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,?), ref: 0130126D
      • Part of subcall function 01301108: GetProcAddress.KERNEL32(00000000), ref: 01301274
      • Part of subcall function 01301108: LocalFree.KERNEL32(?), ref: 013012B2
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • RtlGetNtVersionNumbers.NTDLL(0130CFD0,0130CFCC,0130CFD4), ref: 013020CD
    • RtlAdjustPrivilege.NTDLL(00000014,00000001,00000000,00000001), ref: 013020E7
    • CloseHandle.KERNEL32(0000004C), ref: 01302126
      • Part of subcall function 01301FD9: GetProcessHeap.KERNEL32 ref: 01302000
      • Part of subcall function 01301FD9: HeapAlloc.KERNEL32(00000000), ref: 01302007
      • Part of subcall function 01301FD9: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 0130201C
      • Part of subcall function 01301FD9: SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,00000000,00000000), ref: 0130202E
      • Part of subcall function 01301FD9: CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,00000000,00000000), ref: 01302052
      • Part of subcall function 01301FD9: GetModuleHandleW.KERNEL32(kernel32,GetLastError), ref: 01302069
      • Part of subcall function 01301FD9: GetProcAddress.KERNEL32(00000000), ref: 01302070
      • Part of subcall function 01301FD9: Sleep.KERNEL32(00000BB8), ref: 01302080
      • Part of subcall function 01301FD9: WaitNamedPipeW.KERNEL32(?,00000BB8), ref: 0130208C
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • _wcslen.LIBCMT ref: 013053CA
      • Part of subcall function 01306259: Sleep.KERNEL32(00000000,01303889,?,?,?), ref: 01306281
    • _wcslen.LIBCMT ref: 01305402
      • Part of subcall function 013061DA: HeapFree.KERNEL32(00000000,00000000), ref: 013061F0
      • Part of subcall function 013061DA: GetLastError.KERNEL32(00000000,?,013047B5,00000000,?,?,013047CC,?,01303806,?,?,01303889), ref: 01306202
      • Part of subcall function 01304C60: GetCurrentProcess.KERNEL32(C0000417,01303889,?,?,?), ref: 01304C76
      • Part of subcall function 01304C60: TerminateProcess.KERNEL32(00000000), ref: 01304C7D
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
      • Part of subcall function 0130715E: EncodePointer.KERNEL32(F4A3BED3,?,?,01304E3F), ref: 0130716A
    • __initterm_e.LIBCMT ref: 01304E49
      • Part of subcall function 01307220: __FindPESection.LIBCMT ref: 0130727B
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • RtlAllocateHeap.NTDLL(00000008,01303889,00000000,?,0130626F,?,01303889,00000000,00000000,00000000,?,01304776,00000001,00000214,?,?), ref: 01307A75
      • Part of subcall function 01306FFC: DecodePointer.KERNEL32(?,01307A8E,01303889,00000000,?,0130626F,?,01303889,00000000,00000000,00000000,?,01304776,00000001,00000214), ref: 01307007
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
      • Part of subcall function 01306259: Sleep.KERNEL32(00000000,01303889,?,?,?), ref: 01306281
    • EncodePointer.KERNEL32(00000000), ref: 013070EB
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • EncodePointer.KERNEL32(F4A3BED3,?,?,01304E3F), ref: 0130716A
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • HeapCreate.KERNELBASE(00000000,00001000,00000000,01303AFB,01309D28,00000014), ref: 0130597C
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
      • Part of subcall function 01304D67: GetModuleHandleW.KERNEL32(mscoree.dll,?,01304D9F,?,?,0130789B,000000FF,0000001E,00000001,00000000,00000000,?,01306225,?,00000001,?), ref: 01304D71
      • Part of subcall function 01304D67: GetProcAddress.KERNEL32(00000000,CorExitProcess,?,01304D9F,?,?,0130789B,000000FF,0000001E,00000001,00000000,00000000,?,01306225,?,00000001), ref: 01304D81
    • ExitProcess.KERNEL32 ref: 01304DA3
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • EncodePointer.KERNEL32(Function_00006D80,01304DEA,00000000,00000000,00000000,00000000,00000000,00000000,757DF933,013049D8,?,01303B0C,01309D28,00000014), ref: 01306DBE
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • EncodePointer.KERNEL32(00000000,01307302,0130C038,00000314,00000000,?,?,?,?,?,013051B5,0130C038,Microsoft Visual C++ Runtime Library,00012010), ref: 01304616
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
      • Part of subcall function 01307A32: RtlAllocateHeap.NTDLL(00000008,01303889,00000000,?,0130626F,?,01303889,00000000,00000000,00000000,?,01304776,00000001,00000214,?,?), ref: 01307A75
    • Sleep.KERNEL32(00000000,01303889,?,?,?), ref: 01306281
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
      • Part of subcall function 01301DE0: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,00000018,?,?,00000000), ref: 01301E50
      • Part of subcall function 01301DE0: GetProcAddress.KERNEL32(00000000), ref: 01301E59
      • Part of subcall function 01301DE0: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,-00000109), ref: 01301E9D
      • Part of subcall function 01301DE0: GetProcAddress.KERNEL32(00000000), ref: 01301EA0
      • Part of subcall function 01301DE0: LocalFree.KERNEL32(?), ref: 01301ED8
      • Part of subcall function 01301DE0: LocalFree.KERNEL32(?), ref: 01301EDD
    • LocalFree.KERNEL32(?,?,?,?,01301C46), ref: 01301C8C
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd

    Non-executed Functions

    APIs
      • Part of subcall function 01304614: EncodePointer.KERNEL32(00000000,01307302,0130C038,00000314,00000000,?,?,?,?,?,013051B5,0130C038,Microsoft Visual C++ Runtime Library,00012010), ref: 01304616
    • LoadLibraryW.KERNEL32(USER32.DLL), ref: 01307317
    • GetProcAddress.KERNEL32(00000000,MessageBoxW), ref: 01307333
    • EncodePointer.KERNEL32(00000000), ref: 01307344
    • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 01307351
    • EncodePointer.KERNEL32(00000000), ref: 01307354
    • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 01307361
    • EncodePointer.KERNEL32(00000000), ref: 01307364
    • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationW), ref: 01307371
    • EncodePointer.KERNEL32(00000000), ref: 01307374
    • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 01307385
    • EncodePointer.KERNEL32(00000000), ref: 01307388
    • DecodePointer.KERNEL32(00000000,0130C038,00000314,00000000), ref: 013073AA
    • DecodePointer.KERNEL32 ref: 013073B4
    • DecodePointer.KERNEL32(?,0130C038,00000314,00000000), ref: 013073F3
    • DecodePointer.KERNEL32(?), ref: 0130740D
    • DecodePointer.KERNEL32(0130C038,00000314,00000000), ref: 01307421
      • Part of subcall function 0130601E: IsDebuggerPresent.KERNEL32 ref: 013079E7
      • Part of subcall function 0130601E: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 013079FC
      • Part of subcall function 0130601E: UnhandledExceptionFilter.KERNEL32(013098DC), ref: 01307A07
      • Part of subcall function 0130601E: GetCurrentProcess.KERNEL32(C0000409), ref: 01307A23
      • Part of subcall function 0130601E: TerminateProcess.KERNEL32(00000000), ref: 01307A2A
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(kernel32,LoadLibraryW,lsasrv), ref: 0130217F
    • GetProcAddress.KERNEL32(00000000), ref: 01302186
      • Part of subcall function 01301CE8: RtlInitUnicodeString.NTDLL(?,?), ref: 01301D08
    • GetProcAddress.KERNEL32 ref: 01302282
    • GetProcAddress.KERNEL32(LsaIRegisterNotification), ref: 01302297
      • Part of subcall function 013012C3: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,?), ref: 01301370
      • Part of subcall function 013012C3: GetProcAddress.KERNEL32(00000000), ref: 01301377
      • Part of subcall function 013012C3: LocalAlloc.KERNELBASE ref: 0130137D
      • Part of subcall function 013012C3: LocalFree.KERNEL32(?), ref: 013013C4
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,00000100), ref: 013023A5
    • GetProcAddress.KERNEL32(00000000), ref: 013023A8
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,00000090), ref: 013023C1
    • GetProcAddress.KERNEL32(00000000), ref: 013023C4
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • GetProcessHeap.KERNEL32 ref: 01302000
    • HeapAlloc.KERNEL32(00000000), ref: 01302007
    • InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 0130201C
    • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,00000000,00000000), ref: 0130202E
    • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,00000000,00000000), ref: 01302052
    • GetModuleHandleW.KERNEL32(kernel32,GetLastError), ref: 01302069
    • GetProcAddress.KERNEL32(00000000), ref: 01302070
    • Sleep.KERNEL32(00000BB8), ref: 01302080
    • WaitNamedPipeW.KERNEL32(?,00000BB8), ref: 0130208C
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • GetModuleFileNameW.KERNEL32(00000000,0130C06A,00000104,00000001,00000000,?), ref: 01305114
      • Part of subcall function 01304C60: GetCurrentProcess.KERNEL32(C0000417,01303889,?,?,?), ref: 01304C76
      • Part of subcall function 01304C60: TerminateProcess.KERNEL32(00000000), ref: 01304C7D
    • _wcslen.LIBCMT ref: 01305143
    • _wcslen.LIBCMT ref: 01305150
      • Part of subcall function 013072DC: LoadLibraryW.KERNEL32(USER32.DLL), ref: 01307317
      • Part of subcall function 013072DC: GetProcAddress.KERNEL32(00000000,MessageBoxW), ref: 01307333
      • Part of subcall function 013072DC: EncodePointer.KERNEL32(00000000), ref: 01307344
      • Part of subcall function 013072DC: GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 01307351
      • Part of subcall function 013072DC: EncodePointer.KERNEL32(00000000), ref: 01307354
      • Part of subcall function 013072DC: GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 01307361
      • Part of subcall function 013072DC: EncodePointer.KERNEL32(00000000), ref: 01307364
      • Part of subcall function 013072DC: GetProcAddress.KERNEL32(00000000,GetUserObjectInformationW), ref: 01307371
      • Part of subcall function 013072DC: EncodePointer.KERNEL32(00000000), ref: 01307374
      • Part of subcall function 013072DC: GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 01307385
      • Part of subcall function 013072DC: EncodePointer.KERNEL32(00000000), ref: 01307388
      • Part of subcall function 013072DC: DecodePointer.KERNEL32(00000000,0130C038,00000314,00000000), ref: 013073AA
      • Part of subcall function 013072DC: DecodePointer.KERNEL32 ref: 013073B4
      • Part of subcall function 013072DC: DecodePointer.KERNEL32(?,0130C038,00000314,00000000), ref: 013073F3
      • Part of subcall function 013072DC: DecodePointer.KERNEL32(?), ref: 0130740D
      • Part of subcall function 013072DC: DecodePointer.KERNEL32(0130C038,00000314,00000000), ref: 01307421
    • GetStdHandle.KERNEL32(000000F4,00000001,00000000,?), ref: 013051C6
    • _strlen.LIBCMT ref: 01305203
    • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 01305212
      • Part of subcall function 0130601E: IsDebuggerPresent.KERNEL32 ref: 013079E7
      • Part of subcall function 0130601E: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 013079FC
      • Part of subcall function 0130601E: UnhandledExceptionFilter.KERNEL32(013098DC), ref: 01307A07
      • Part of subcall function 0130601E: GetCurrentProcess.KERNEL32(C0000409), ref: 01307A23
      • Part of subcall function 0130601E: TerminateProcess.KERNEL32(00000000), ref: 01307A2A
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,00000008,00000001,?,00000000,?,01302D60,00000001,00000000,?,0130CD30,00000000), ref: 0130101D
    • GetProcAddress.KERNEL32(00000000,?,00000000,?,01302D60,00000001,00000000,?,0130CD30,00000000), ref: 01301026
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,00000004,?,00000000,?,01302D60,00000001,00000000,?,0130CD30,00000000), ref: 01301059
    • GetProcAddress.KERNEL32(00000000,?,00000000,?,01302D60,00000001,00000000,?,0130CD30,00000000), ref: 0130105C
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,00000004,?,00000000,?,01302D60,00000001,00000000,?,0130CD30,00000000), ref: 01301088
    • GetProcAddress.KERNEL32(00000000,?,00000000,?,01302D60,00000001,00000000,?,0130CD30,00000000), ref: 0130108B
      • Part of subcall function 013013FC: GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,00000008,0130CD68,013010A6,01302D60,?,00000000,?,01302D60,00000001,00000000,?,0130CD30,00000000), ref: 0130140D
      • Part of subcall function 013013FC: GetProcAddress.KERNEL32(00000000,?,00000000,?,01302D60,00000001,00000000,?,0130CD30,00000000), ref: 01301414
      • Part of subcall function 013013FC: CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000,?,00000000,?,01302D60,00000001,00000000,?,0130CD30,00000000), ref: 0130142C
      • Part of subcall function 013013FC: MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,?,00000000,?,01302D60,00000001,00000000,?,0130CD30,00000000), ref: 01301443
    • LocalFree.KERNEL32(0130CD68,?,00000000,?,01302D60,00000001,00000000), ref: 013010BE
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000100,?,00000000,?,?,?,?,?,00000000), ref: 01305D3B
    • __alloca_probe_16.NTDLLP ref: 01305D66
    • MultiByteToWideChar.KERNEL32(?,00000001,00000000,?,?,00000000,?,00000000,?,?,?,?,?,00000000), ref: 01305DA9
    • LCMapStringW.KERNEL32(?,?,?,00000000,00000000,00000000,?,00000000,?,?,?,?,?,00000000), ref: 01305DC5
    • LCMapStringW.KERNEL32(?,?,?,00000000,?,?,?,00000000,?,?,?,?,?,00000000), ref: 01305DFE
    • __alloca_probe_16.NTDLLP ref: 01305E20
      • Part of subcall function 0130786C: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,01306225,?,00000001,?,?,01306132,00000018,01309E18,0000000C,013061C2), ref: 013078B1
    • LCMapStringW.KERNEL32(?,?,?,?,00000000,?,?,00000000,?,?,?,?,?,00000000), ref: 01305E64
    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,?,00000000), ref: 01305E83
    • __freea.LIBCMT ref: 01305E8D
    • __freea.LIBCMT ref: 01305E96
      • Part of subcall function 0130601E: IsDebuggerPresent.KERNEL32 ref: 013079E7
      • Part of subcall function 0130601E: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 013079FC
      • Part of subcall function 0130601E: UnhandledExceptionFilter.KERNEL32(013098DC), ref: 01307A07
      • Part of subcall function 0130601E: GetCurrentProcess.KERNEL32(C0000409), ref: 01307A23
      • Part of subcall function 0130601E: TerminateProcess.KERNEL32(00000000), ref: 01307A2A
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,00000008,0130CD68,013010A6,01302D60,?,00000000,?,01302D60,00000001,00000000,?,0130CD30,00000000), ref: 0130140D
    • GetProcAddress.KERNEL32(00000000,?,00000000,?,01302D60,00000001,00000000,?,0130CD30,00000000), ref: 01301414
    • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000,?,00000000,?,01302D60,00000001,00000000,?,0130CD30,00000000), ref: 0130142C
    • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,?,00000000,?,01302D60,00000001,00000000,?,0130CD30,00000000), ref: 01301443
      • Part of subcall function 01301478: UnmapViewOfFile.KERNEL32(00000002,00458328,01301100,?,01302ED2,?,0130CD30,00000000), ref: 01301483
      • Part of subcall function 01301478: CloseHandle.KERNEL32(?), ref: 01301490
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • InterlockedDecrement.KERNEL32(?), ref: 01304384
    • InterlockedDecrement.KERNEL32(?), ref: 01304391
    • InterlockedDecrement.KERNEL32(?), ref: 0130439E
    • InterlockedDecrement.KERNEL32(?), ref: 013043AB
    • InterlockedDecrement.KERNEL32(?), ref: 013043B8
    • InterlockedDecrement.KERNEL32(?), ref: 013043D4
    • InterlockedDecrement.KERNEL32(FC45C7E4), ref: 013043E4
    • InterlockedDecrement.KERNEL32(?), ref: 013043FA
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • InterlockedIncrement.KERNEL32(?), ref: 013042ED
    • InterlockedIncrement.KERNEL32(?), ref: 013042FA
    • InterlockedIncrement.KERNEL32(?), ref: 01304307
    • InterlockedIncrement.KERNEL32(?), ref: 01304314
    • InterlockedIncrement.KERNEL32(?), ref: 01304321
    • InterlockedIncrement.KERNEL32(?), ref: 0130433D
    • InterlockedIncrement.KERNEL32(00000000), ref: 0130434D
    • InterlockedIncrement.KERNEL32(?), ref: 01304363
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • __getptd.LIBCMT ref: 01304133
      • Part of subcall function 013047C4: __amsg_exit.LIBCMT ref: 013047D4
      • Part of subcall function 01303E1A: __getptd.LIBCMT ref: 01303E26
      • Part of subcall function 01303E1A: __amsg_exit.LIBCMT ref: 01303E46
      • Part of subcall function 01303E1A: InterlockedDecrement.KERNEL32(?), ref: 01303E73
      • Part of subcall function 01303E1A: InterlockedIncrement.KERNEL32(001E11F8), ref: 01303E9E
      • Part of subcall function 01303EBE: GetOEMCP.KERNEL32(00000000), ref: 01303EE7
      • Part of subcall function 01303EBE: GetACP.KERNEL32(00000000), ref: 01303F0A
      • Part of subcall function 01306214: Sleep.KERNEL32(00000000,00000001,?,?,01306132,00000018,01309E18,0000000C,013061C2,?,?,?,013046E1,0000000D), ref: 01306235
      • Part of subcall function 01303F3A: setSBCS.LIBCMT ref: 01303F67
      • Part of subcall function 01303F3A: IsValidCodePage.KERNEL32(-00000030), ref: 01303FAD
      • Part of subcall function 01303F3A: GetCPInfo.KERNEL32(00000000,?), ref: 01303FC0
      • Part of subcall function 01303F3A: setSBUpLow.LIBCMT ref: 013040AE
    • InterlockedDecrement.KERNEL32(?), ref: 01304199
    • InterlockedIncrement.KERNEL32(00000000), ref: 013041BE
      • Part of subcall function 013061A7: __amsg_exit.LIBCMT ref: 013061C9
      • Part of subcall function 013061A7: EnterCriticalSection.KERNEL32(?,?,?,013046E1,0000000D), ref: 013061D1
    • InterlockedDecrement.KERNEL32 ref: 01304250
    • InterlockedIncrement.KERNEL32(00000000), ref: 01304274
      • Part of subcall function 013061DA: HeapFree.KERNEL32(00000000,00000000), ref: 013061F0
      • Part of subcall function 013061DA: GetLastError.KERNEL32(00000000,?,013047B5,00000000,?,?,013047CC,?,01303806,?,?,01303889), ref: 01306202
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000100,?,?,?,?,?,0130600C,?,00000000,?), ref: 01305F41
    • __alloca_probe_16.NTDLLP ref: 01305F62
      • Part of subcall function 0130786C: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,01306225,?,00000001,?,?,01306132,00000018,01309E18,0000000C,013061C2), ref: 013078B1
    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,?,?,?,00000000), ref: 01305FAB
    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 01305FB9
    • __freea.LIBCMT ref: 01305FC3
      • Part of subcall function 0130601E: IsDebuggerPresent.KERNEL32 ref: 013079E7
      • Part of subcall function 0130601E: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 013079FC
      • Part of subcall function 0130601E: UnhandledExceptionFilter.KERNEL32(013098DC), ref: 01307A07
      • Part of subcall function 0130601E: GetCurrentProcess.KERNEL32(C0000409), ref: 01307A23
      • Part of subcall function 0130601E: TerminateProcess.KERNEL32(00000000), ref: 01307A2A
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 01305BC6
    • GetCurrentProcessId.KERNEL32 ref: 01305BD2
    • GetCurrentThreadId.KERNEL32 ref: 01305BDA
    • GetTickCount.KERNEL32 ref: 01305BE2
    • QueryPerformanceCounter.KERNEL32(?), ref: 01305BEE
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\9706.tmp,00000104), ref: 013055FC
    • _wparse_cmdline.LIBCMT ref: 01305626
      • Part of subcall function 01306214: Sleep.KERNEL32(00000000,00000001,?,?,01306132,00000018,01309E18,0000000C,013061C2,?,?,?,013046E1,0000000D), ref: 01306235
    • _wparse_cmdline.LIBCMT ref: 01305668
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,-00000002,?,0130345D), ref: 01303310
    • GetProcAddress.KERNEL32(00000000,?,0130345D), ref: 01303317
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(kernel32,LocalAlloc,00000040,0000000100000013,01301A2E), ref: 01301FB1
    • GetProcAddress.KERNEL32(00000000), ref: 01301FB8
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(mscoree.dll,?,01304D9F,?,?,0130789B,000000FF,0000001E,00000001,00000000,00000000,?,01306225,?,00000001,?), ref: 01304D71
    • GetProcAddress.KERNEL32(00000000,CorExitProcess,?,01304D9F,?,?,0130789B,000000FF,0000001E,00000001,00000000,00000000,?,01306225,?,00000001), ref: 01304D81
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
      • Part of subcall function 01303EBE: GetOEMCP.KERNEL32(00000000), ref: 01303EE7
      • Part of subcall function 01303EBE: GetACP.KERNEL32(00000000), ref: 01303F0A
    • IsValidCodePage.KERNEL32(-00000030), ref: 01303FAD
    • GetCPInfo.KERNEL32(00000000,?), ref: 01303FC0
    • setSBUpLow.LIBCMT ref: 013040AE
      • Part of subcall function 01303C8A: GetCPInfo.KERNEL32(?,?), ref: 01303CAB
      • Part of subcall function 01303C8A: ___crtGetStringTypeA.LIBCMT ref: 01303D28
      • Part of subcall function 01303C8A: ___crtLCMapStringA.LIBCMT ref: 01303D48
      • Part of subcall function 01303C8A: ___crtLCMapStringA.LIBCMT ref: 01303D6D
    • setSBCS.LIBCMT ref: 01303F67
      • Part of subcall function 0130601E: IsDebuggerPresent.KERNEL32 ref: 013079E7
      • Part of subcall function 0130601E: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 013079FC
      • Part of subcall function 0130601E: UnhandledExceptionFilter.KERNEL32(013098DC), ref: 01307A07
      • Part of subcall function 0130601E: GetCurrentProcess.KERNEL32(C0000409), ref: 01307A23
      • Part of subcall function 0130601E: TerminateProcess.KERNEL32(00000000), ref: 01307A2A
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • DecodePointer.KERNEL32(00000003,01304A83,?,01303B0C,01309D28,00000014), ref: 0130466B
    • TlsFree.KERNEL32(00000007,01304A83,?,01303B0C,01309D28,00000014), ref: 01304685
    • DeleteCriticalSection.KERNEL32(00000000,00000000,773EA0FD,?,01304A83,?,01303B0C,01309D28,00000014), ref: 01306094
      • Part of subcall function 013061DA: HeapFree.KERNEL32(00000000,00000000), ref: 013061F0
      • Part of subcall function 013061DA: GetLastError.KERNEL32(00000000,?,013047B5,00000000,?,?,013047CC,?,01303806,?,?,01303889), ref: 01306202
    • DeleteCriticalSection.KERNEL32(00000007,773EA0FD,?,01304A83,?,01303B0C,01309D28,00000014), ref: 013060BE
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • __getptd.LIBCMT ref: 01303E26
      • Part of subcall function 013047C4: __amsg_exit.LIBCMT ref: 013047D4
    • __amsg_exit.LIBCMT ref: 01303E46
      • Part of subcall function 013061A7: __amsg_exit.LIBCMT ref: 013061C9
      • Part of subcall function 013061A7: EnterCriticalSection.KERNEL32(?,?,?,013046E1,0000000D), ref: 013061D1
    • InterlockedDecrement.KERNEL32(?), ref: 01303E73
      • Part of subcall function 013061DA: HeapFree.KERNEL32(00000000,00000000), ref: 013061F0
      • Part of subcall function 013061DA: GetLastError.KERNEL32(00000000,?,013047B5,00000000,?,?,013047CC,?,01303806,?,?,01303889), ref: 01306202
    • InterlockedIncrement.KERNEL32(001E11F8), ref: 01303E9E
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • GetLastError.KERNEL32(?,?,013047CC,?,01303806,?,?,01303889,?,?,?), ref: 0130474F
      • Part of subcall function 01304626: TlsGetValue.KERNEL32(?,01304762,?,?,013047CC,?,01303806,?,?,01303889,?,?,?), ref: 0130462F
      • Part of subcall function 01304626: DecodePointer.KERNEL32(?,?,013047CC,?,01303806,?,?,01303889,?,?,?), ref: 01304641
      • Part of subcall function 01304626: TlsSetValue.KERNEL32(00000000,?,?,013047CC,?,01303806,?,?,01303889,?,?,?), ref: 01304650
    • SetLastError.KERNEL32(00000000,?,?,013047CC,?,01303806,?,?,01303889,?,?,?), ref: 013047B9
      • Part of subcall function 01306259: Sleep.KERNEL32(00000000,01303889,?,?,?), ref: 01306281
    • DecodePointer.KERNEL32(00000000,?,?,013047CC,?,01303806,?,?,01303889,?,?,?), ref: 0130478B
    • GetCurrentThreadId.KERNEL32(?,?,013047CC,?,01303806,?,?,01303889,?,?,?), ref: 013047A1
      • Part of subcall function 013061DA: HeapFree.KERNEL32(00000000,00000000), ref: 013061F0
      • Part of subcall function 013061DA: GetLastError.KERNEL32(00000000,?,013047B5,00000000,?,?,013047CC,?,01303806,?,?,01303889), ref: 01306202
      • Part of subcall function 01304697: GetModuleHandleW.KERNEL32(KERNEL32.DLL,01309DA8,00000008,0130479F,00000000,00000000,?,?,013047CC,?,01303806,?,?,01303889,?,?), ref: 013046A8
      • Part of subcall function 01304697: InterlockedIncrement.KERNEL32(0130B008), ref: 013046E9
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,01309DA8,00000008,0130479F,00000000,00000000,?,?,013047CC,?,01303806,?,?,01303889,?,?), ref: 013046A8
      • Part of subcall function 013061A7: __amsg_exit.LIBCMT ref: 013061C9
      • Part of subcall function 013061A7: EnterCriticalSection.KERNEL32(?,?,?,013046E1,0000000D), ref: 013061D1
    • InterlockedIncrement.KERNEL32(0130B008), ref: 013046E9
      • Part of subcall function 013042DB: InterlockedIncrement.KERNEL32(?), ref: 013042ED
      • Part of subcall function 013042DB: InterlockedIncrement.KERNEL32(?), ref: 013042FA
      • Part of subcall function 013042DB: InterlockedIncrement.KERNEL32(?), ref: 01304307
      • Part of subcall function 013042DB: InterlockedIncrement.KERNEL32(?), ref: 01304314
      • Part of subcall function 013042DB: InterlockedIncrement.KERNEL32(?), ref: 01304321
      • Part of subcall function 013042DB: InterlockedIncrement.KERNEL32(?), ref: 0130433D
      • Part of subcall function 013042DB: InterlockedIncrement.KERNEL32(00000000), ref: 0130434D
      • Part of subcall function 013042DB: InterlockedIncrement.KERNEL32(?), ref: 01304363
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.400069399.01301000.00000020.sdmp, Offset: 01300000, based on PE: true
    • Associated: 0000000A.00000002.400063479.01300000.00000002.sdmp
    • Associated: 0000000A.00000002.400075050.01308000.00000002.sdmp
    • Associated: 0000000A.00000002.400081495.0130B000.00000004.sdmp
    • Associated: 0000000A.00000002.400088639.0130D000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_1300000_9706.jbxd