Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
VF.dll

Overview

General Information

Sample name:VF.dll
Analysis ID:1467983
MD5:4c9345b4819695c678d2ce9688d95ffb
SHA1:805fb11f46e71cd5ae00d489f3eb7385bd55df63
SHA256:6522c2a699b499b0e84e13d6d3a88d0c78a4ea59af2b0fd3f0fbc22644a73751
Tags:blackmoondll
Infos:

Detection

BlackMoon
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected BlackMoon Ransomware
AI detected suspicious sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
One or more processes crash
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6360 cmdline: loaddll32.exe "C:\Users\user\Desktop\VF.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6148 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\VF.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 5548 cmdline: rundll32.exe "C:\Users\user\Desktop\VF.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • WerFault.exe (PID: 1868 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5548 -s 600 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 5476 cmdline: rundll32.exe C:\Users\user\Desktop\VF.dll,VF_CopyFile MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 3232 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5476 -s 592 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 3272 cmdline: rundll32.exe C:\Users\user\Desktop\VF.dll,VF_GetFileMD5 MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 1272 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 596 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 4132 cmdline: rundll32.exe "C:\Users\user\Desktop\VF.dll",VF_CopyFile MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 3952 cmdline: rundll32.exe "C:\Users\user\Desktop\VF.dll",VF_GetFileMD5 MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 4464 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 600 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000002.1490901642.000000001000A000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_blackmoonYara detected BlackMoon RansomwareJoe Security
    0000000C.00000002.1490901014.000000001000A000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_blackmoonYara detected BlackMoon RansomwareJoe Security
      0000000F.00000002.1461552167.000000001000A000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_blackmoonYara detected BlackMoon RansomwareJoe Security
        00000005.00000002.1490893505.000000001000A000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_blackmoonYara detected BlackMoon RansomwareJoe Security
          00000010.00000002.1514288945.000000001000A000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_blackmoonYara detected BlackMoon RansomwareJoe Security
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            12.2.rundll32.exe.10000000.0.unpackJoeSecurity_blackmoonYara detected BlackMoon RansomwareJoe Security
              12.2.rundll32.exe.10000000.0.unpackMALWARE_Win_BlackMoonDetects executables using BlackMoon RunTimeditekSHen
              • 0xa500:$s1: blackmoon
              • 0x1dfce:$s1: blackmoon
              • 0xa540:$s2: BlackMoon RunTime Error:
              4.2.rundll32.exe.10000000.0.unpackJoeSecurity_blackmoonYara detected BlackMoon RansomwareJoe Security
                4.2.rundll32.exe.10000000.0.unpackMALWARE_Win_BlackMoonDetects executables using BlackMoon RunTimeditekSHen
                • 0xa500:$s1: blackmoon
                • 0x1dfce:$s1: blackmoon
                • 0xa540:$s2: BlackMoon RunTime Error:
                5.2.rundll32.exe.10000000.0.unpackJoeSecurity_blackmoonYara detected BlackMoon RansomwareJoe Security
                  Click to see the 5 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: VF.dllReversingLabs: Detection: 26%
                  Source: VF.dllVirustotal: Detection: 31%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 88.8% probability
                  Source: VF.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Jump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\Jump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_56181ede0d43edd16fd2f5c205ffd37b12c4b76_7522e4b5_08c1258f-65b5-469b-92ba-e8e4954194b9\Jump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\Jump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_d66a9d3f657c6446ca14a6fa8b15b6c6c8a244a9_7522e4b5_17378f54-db41-48b9-93aa-2ee9f3453ff8\Jump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueueJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then push esi4_2_10003EF2
                  Source: Amcache.hve.10.drString found in binary or memory: http://upx.sf.net

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: Yara matchFile source: 12.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.1490901642.000000001000A000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.1490901014.000000001000A000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.1461552167.000000001000A000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.1490893505.000000001000A000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.1514288945.000000001000A000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5476, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5548, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 3272, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4132, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 3952, type: MEMORYSTR

                  System Summary

                  barindex
                  Source: 12.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
                  Source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
                  Source: 5.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
                  Source: 16.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
                  Source: 15.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100055104_2_10005510
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100071304_2_10007130
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10006BB04_2_10006BB0
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100059B04_2_100059B0
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10005DE04_2_10005DE0
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100044F04_2_100044F0
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5548 -s 600
                  Source: VF.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                  Source: 12.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
                  Source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
                  Source: 5.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
                  Source: 16.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
                  Source: 15.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
                  Source: classification engineClassification label: mal68.rans.winDLL@18/17@0/0
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3272
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5476
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6080:120:WilError_03
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5548
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3952
                  Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\2db35911-9d9a-42a1-9880-6e8d81d53a79Jump to behavior
                  Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\VF.dll,VF_CopyFile
                  Source: VF.dllReversingLabs: Detection: 26%
                  Source: VF.dllVirustotal: Detection: 31%
                  Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\VF.dll"
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\VF.dll",#1
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\VF.dll,VF_CopyFile
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\VF.dll",#1
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5548 -s 600
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5476 -s 592
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\VF.dll,VF_GetFileMD5
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 596
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\VF.dll",VF_CopyFile
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\VF.dll",VF_GetFileMD5
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 600
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\VF.dll",#1Jump to behavior
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\VF.dll,VF_CopyFileJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\VF.dll,VF_GetFileMD5Jump to behavior
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\VF.dll",VF_CopyFileJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\VF.dll",VF_GetFileMD5Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\VF.dll",#1Jump to behavior
                  Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: VF.dllStatic PE information: section name: UPX2
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10007BD0 push eax; ret 4_2_10007BFE
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 0.0 %
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Jump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\Jump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_56181ede0d43edd16fd2f5c205ffd37b12c4b76_7522e4b5_08c1258f-65b5-469b-92ba-e8e4954194b9\Jump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\Jump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_d66a9d3f657c6446ca14a6fa8b15b6c6c8a244a9_7522e4b5_17378f54-db41-48b9-93aa-2ee9f3453ff8\Jump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueueJump to behavior
                  Source: Amcache.hve.10.drBinary or memory string: VMware
                  Source: Amcache.hve.10.drBinary or memory string: VMware Virtual USB Mouse
                  Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin
                  Source: Amcache.hve.10.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
                  Source: Amcache.hve.10.drBinary or memory string: VMware, Inc.
                  Source: Amcache.hve.10.drBinary or memory string: VMware20,1hbin@
                  Source: Amcache.hve.10.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                  Source: Amcache.hve.10.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Amcache.hve.10.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                  Source: Amcache.hve.10.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Amcache.hve.10.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                  Source: Amcache.hve.10.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                  Source: Amcache.hve.10.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Amcache.hve.10.drBinary or memory string: vmci.sys
                  Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin`
                  Source: Amcache.hve.10.drBinary or memory string: \driver\vmci,\driver\pci
                  Source: Amcache.hve.10.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Amcache.hve.10.drBinary or memory string: VMware20,1
                  Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Generation Counter
                  Source: Amcache.hve.10.drBinary or memory string: NECVMWar VMware SATA CD00
                  Source: Amcache.hve.10.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                  Source: Amcache.hve.10.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                  Source: Amcache.hve.10.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                  Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                  Source: Amcache.hve.10.drBinary or memory string: VMware PCI VMCI Bus Device
                  Source: Amcache.hve.10.drBinary or memory string: VMware VMCI Bus Device
                  Source: Amcache.hve.10.drBinary or memory string: VMware Virtual RAM
                  Source: Amcache.hve.10.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                  Source: Amcache.hve.10.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                  Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_4-2221
                  Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_4-2107
                  Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_4-2212
                  Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_4-2170
                  Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_4-2371
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10001B88 LdrResolveDelayLoadedAPI,4_2_10001B88
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10001D00 GetProcessHeap,4_2_10001D00
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\VF.dll",#1Jump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10003460 cpuid 4_2_10003460
                  Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                  Source: Amcache.hve.10.drBinary or memory string: msmpeng.exe
                  Source: Amcache.hve.10.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                  Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                  Source: Amcache.hve.10.drBinary or memory string: MsMpEng.exe
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                  DLL Side-Loading
                  11
                  Process Injection
                  1
                  Rundll32
                  OS Credential Dumping31
                  Security Software Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  DLL Side-Loading
                  11
                  Virtualization/Sandbox Evasion
                  LSASS Memory11
                  Virtualization/Sandbox Evasion
                  Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                  Software Packing
                  Security Account Manager1
                  File and Directory Discovery
                  SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                  Process Injection
                  NTDS11
                  System Information Discovery
                  Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  DLL Side-Loading
                  LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                  Obfuscated Files or Information
                  Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 1467983 Sample: VF.dll Startdate: 05/07/2024 Architecture: WINDOWS Score: 68 28 Malicious sample detected (through community Yara rule) 2->28 30 Multi AV Scanner detection for submitted file 2->30 32 Yara detected BlackMoon Ransomware 2->32 34 AI detected suspicious sample 2->34 8 loaddll32.exe 1 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 rundll32.exe 8->12         started        14 rundll32.exe 8->14         started        16 3 other processes 8->16 process5 18 rundll32.exe 10->18         started        20 WerFault.exe 20 16 12->20         started        22 WerFault.exe 16 14->22         started        24 WerFault.exe 16 16->24         started        process6 26 WerFault.exe 16 18->26         started       

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  VF.dll26%ReversingLabs
                  VF.dll31%VirustotalBrowse
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://upx.sf.net0%URL Reputationsafe
                  http://upx.sf.net0%URL Reputationsafe
                  No contacted domains info
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://upx.sf.netAmcache.hve.10.drfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  No contacted IP infos
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1467983
                  Start date and time:2024-07-05 07:59:09 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 4m 48s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:26
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:VF.dll
                  Detection:MAL
                  Classification:mal68.rans.winDLL@18/17@0/0
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:Failed
                  Cookbook Comments:
                  • Found application associated with file extension: .dll
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 20.42.65.92
                  • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  TimeTypeDescription
                  02:00:12API Interceptor1x Sleep call for process: loaddll32.exe modified
                  02:00:15API Interceptor4x Sleep call for process: WerFault.exe modified
                  No context
                  No context
                  No context
                  No context
                  No context
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):0.8271214654532402
                  Encrypted:false
                  SSDEEP:192:OtAsinOCmR0BU/wjeTVzuiFVZ24IO8dci:oAsiOCmSBU/wjehzuiFVY4IO8dci
                  MD5:B113C860E9EEDA0D7A3E5EE6FF227881
                  SHA1:35EEB85422E8CF515101B616566DC65DFAD13CFB
                  SHA-256:457CEA9429893A62A62011E10A6869C0FEDA87AA31ADE2CAC4A20CBE8C326E4D
                  SHA-512:11056E2D2939B72D77C9A1E156D1213BB13635A64C5C1A76AEF2A21B7200F7AE07FB6294643439A43BDDE977971B07AA70FDBFDEA4341B28AA7FEEE0C020BE86
                  Malicious:false
                  Reputation:low
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.4.6.3.2.8.0.9.5.8.3.4.7.1.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.4.6.3.2.8.0.9.9.2.7.2.0.6.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.8.c.1.2.5.8.f.-.6.5.b.5.-.4.6.9.b.-.9.2.b.a.-.e.8.e.4.9.5.4.1.9.4.b.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.d.8.9.9.a.0.0.-.5.f.3.a.-.4.5.d.4.-.a.3.8.1.-.3.a.c.e.c.f.b.e.9.d.0.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.c.c.8.-.0.0.0.1.-.0.0.1.4.-.d.1.4.7.-.8.7.9.7.a.0.c.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):0.827253312830611
                  Encrypted:false
                  SSDEEP:192:YCTziAObmR0BU/wjeTVzuiFVZ24IO8dci:9zixbmSBU/wjehzuiFVY4IO8dci
                  MD5:F2DA340EF1542A19B9D0703596CD910A
                  SHA1:23FA8B669A8884359E263F1C101F0D56F388A680
                  SHA-256:6647302BCB938BC2FB782CC060246BCA31ADABE022F2D5A72B1F735340196819
                  SHA-512:ACE5F26F633C9F7FE4F12C107DE44D6D92DBCD6737621D680E077DD11DED07B7EB45C3DCA5975F63E1D6C8BA976B2D4D6E1933ED7C641164262E53F988D882B1
                  Malicious:false
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.4.6.3.2.8.0.6.9.4.7.6.6.6.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.4.6.3.2.8.0.8.0.1.0.1.6.2.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.a.5.b.0.d.7.5.-.b.e.1.4.-.4.f.f.c.-.b.f.c.4.-.c.5.e.f.f.0.1.6.e.6.9.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.b.1.d.5.a.7.3.-.d.4.2.3.-.4.2.6.3.-.a.8.5.4.-.2.c.7.8.8.b.f.c.b.1.0.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.a.c.-.0.0.0.1.-.0.0.1.4.-.5.5.e.6.-.b.c.9.5.a.0.c.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):0.8270734829426102
                  Encrypted:false
                  SSDEEP:192:CzHiL5O2mR0BU/wjeTVzuiFVZ24IO8dci:uHiM2mSBU/wjehzuiFVY4IO8dci
                  MD5:B9603FED80C33484FC25F6C73C63020E
                  SHA1:8BB4772F5366A5D9FFD9EDE366EF478596F2D381
                  SHA-256:08097252505B0197A11C7C65B1283FAF7C2F8AC9888ED916CD22296B844AB4A1
                  SHA-512:E860481CB545839983F6CFE0423ACF64759866500D66B483A6694439B2D59C9623E7E754306FA4494A8725CF564E750016F63C036629B8352370B61A4807C109
                  Malicious:false
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.4.6.3.2.8.1.2.7.2.7.6.1.8.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.4.6.3.2.8.1.3.0.4.0.1.1.7.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.1.b.d.8.0.b.4.-.8.0.7.5.-.4.f.e.5.-.8.f.e.0.-.9.9.8.3.7.5.c.7.d.9.9.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.7.a.5.6.a.4.8.-.7.7.3.c.-.4.c.0.5.-.9.f.f.d.-.2.c.a.d.6.3.8.6.2.9.c.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.f.7.0.-.0.0.0.1.-.0.0.1.4.-.3.8.9.2.-.5.a.9.9.a.0.c.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):0.8271491213401128
                  Encrypted:false
                  SSDEEP:192:ZkviiOymL0BU/wjeTVzuiFVZ24IO8dci:uiDymYBU/wjehzuiFVY4IO8dci
                  MD5:8A3F7B3625E08D819C50992E45AC656A
                  SHA1:0F402187EAE2385DF0687160D9188B316C6D945D
                  SHA-256:04C0E2A6CEFE13A53E1105C117473266CBEFE6E492D22EE0718AC969E7E49F35
                  SHA-512:FCF65F1B66731EF8CC84216EFD361341DB310118E9BBEB554827726993CC1D831E52C57392BE048322C966F96AE51697877F2C81ACDE527077B1C56873282EF8
                  Malicious:false
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.4.6.3.2.8.0.6.9.0.0.2.9.6.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.4.6.3.2.8.0.8.0.2.5.3.0.1.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.7.3.7.8.f.5.4.-.d.b.4.1.-.4.8.b.9.-.9.3.a.a.-.2.e.e.9.f.3.4.5.3.f.f.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.1.a.1.3.e.8.b.-.3.7.d.7.-.4.2.9.a.-.a.2.b.6.-.d.f.2.5.5.7.4.d.5.4.b.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.6.4.-.0.0.0.1.-.0.0.1.4.-.a.d.9.7.-.b.a.9.5.a.0.c.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 14 streams, Fri Jul 5 06:00:07 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):41368
                  Entropy (8bit):1.9446097007693102
                  Encrypted:false
                  SSDEEP:192:FjRCSrnxlK+O5H4XXGw/nOIvXZVocsD6O3EvY:PC2xlq5H6XGwJvXZVTK
                  MD5:CA97D438E867A9BCDEB85924D580CF16
                  SHA1:A73AD97407CB258CC6AF313C7E4E151086ADC860
                  SHA-256:2838F5A641D86FC66F0035454A4A4B1D2845F42076252FF9DF22E5C4E6B12341
                  SHA-512:87A66859274D5872DFDDA6B68C5DA41E4A81A0F3AB4F21E3AC33951B450F8124748C873F70F32FD631C9BE8A686FD80997C330AAB7FE974840DFE63CBB9C478D
                  Malicious:false
                  Preview:MDMP..a..... ........f.........................................&..........T.......8...........T.......................................x...............................................................................eJ..............GenuineIntel............T.......d....f.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 14 streams, Fri Jul 5 06:00:07 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):42248
                  Entropy (8bit):1.923518320360052
                  Encrypted:false
                  SSDEEP:192:FaR0SHrtO5H40n7IYu5b4P2q9KLV8w+m:c0arg5HFEYu50P2n+m
                  MD5:FCE6211AC6A88A7BED402C40996517E7
                  SHA1:823FBEDE68489CF046EF9B1DF0CDB3AC5AB43633
                  SHA-256:90D2FA926B0B594D5C0D127E22FC409FFC3B4257052B45CAD2D3516EEDE8E49C
                  SHA-512:C49BAE880D08C19DC59CBA89D578F183C815D5DD6F3E50B5EB3F5FD2B34028AF536AA3F5497C55FA83881592114234284246B8D7209810E91B27F8383530BDDF
                  Malicious:false
                  Preview:MDMP..a..... ........f.........................................&..........T.......8...........T.......................................x...............................................................................eJ..............GenuineIntel............T............f.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8240
                  Entropy (8bit):3.6930294054293995
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJdz646YJC6mgmfToBypru89bZbUsfqzjm:R6lXJp646Yc6mgmfToBwZbHf+6
                  MD5:F5FF1BFE6E20DD07ACEEC747598F8B63
                  SHA1:BC423BBFE41A117B59569BC66C047DFE242F3159
                  SHA-256:5C6B3E79F3B9E36D1F7ACEEFAE0457FA6DF05BB7E40B5457E07AFD2A7149F00E
                  SHA-512:12FADE83025B3A9F33DCCF5DACD14E608889B88DB533DD21ECEAB2AF20B7C552C47A35125C76A62D2323E6E452E1A21511781ACC3545FF68C95AEDDA78048C25
                  Malicious:false
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.4.7.6.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8234
                  Entropy (8bit):3.691685617991036
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJZh60n6YAU6kugmfTWByprp89bZbhsfOzjm:R6lXJv6s6Y76kugmfTWBRZbafa6
                  MD5:E557D8970EABC81C91B0B9229A484CA7
                  SHA1:98F81C3F764D2F4CDBEF7A5A40C050F7C868AEF6
                  SHA-256:4374DF4D3538E06BE415D0C8378D2AC3D5228842D832CE49C1476DF3FCFCD55B
                  SHA-512:C306D3E08C4D2B8AD0F75DEB32726CB7FB68FCD5D2ED1721FB98D7FE2ED97AB08E74B40E7D609770A95C6EC6B71BD71C3F19DE331C8C58C7901454EC12BBD4D6
                  Malicious:false
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.5.4.8.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4634
                  Entropy (8bit):4.4535434577080215
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zslZJg77aI9+xWpW8VYRYm8M4JCdP3fzF8+q8/r/nIGScSzd:uIjfZI78g7VVJZlJ3zd
                  MD5:5C14426AA33CE407CBA1826A223B3EB8
                  SHA1:57CB42D6FB7D3ABC41D285C7E2BC7B4ABBEDB6E1
                  SHA-256:8D22A4B956E7EEE566065F377DA3E3857F5CBE33265D20F3CCBE83B0B9FA5C23
                  SHA-512:A91BF3ECE0D5F96CAB794A5B6A72F601B163DA252CB82277548879B43B35EA34D2BD1C2B74F4991DC9729F39D58D3BFCFD109CF04B6ACCCFBB0947F94C3E7179
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="397262" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4634
                  Entropy (8bit):4.453729521383179
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zslZJg77aI9+xWpW8VYNeYm8M4JCdP3fbFa2j+q8/r/n+XGScSh6d:uIjfZI78g7V6XJQNJ3h6d
                  MD5:7DA330E697280D699D61494C9E5475FA
                  SHA1:0CCD26A4CC924E114098B5E5D61FF7D1E64ADEB9
                  SHA-256:3803EE666FE883528A014D3708AE991C494172D658A6E68F587AE7ADFBED8EB6
                  SHA-512:7B809E082A803C572B8B67E2060CD795469CFAEB9933BFACE3418C220B39E474C67F0405E8FD8D06B106E2AAA1725991933C02AD93F53BC2DA16D04D46E5149E
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="397262" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 14 streams, Fri Jul 5 06:00:09 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):41376
                  Entropy (8bit):1.9728162966507188
                  Encrypted:false
                  SSDEEP:96:5K8NWrkL/UjhguYN0Rv/dSklj+CD3sCzkQoi75I4v4EvzP1FKocYR6Bv+4X0qoXd:TMlRdSskdO5H4kP4XwoD8WnqMIWhlCQ
                  MD5:F716F4C1E43ADBA40E2776C58D8FEFBB
                  SHA1:8B3FA27B1895EAC3F4905C83CEDEB9C7D56DBB1A
                  SHA-256:7F3871A4B7581D553AE38A603F077739F3F6B33C24B17E8A5FD0064CEEC0935D
                  SHA-512:9731F032E8A2E8BB8A01B52C3E6F35B452F287722EBE5BACFCD446811608E9C7AFC160EE09C90F6BBEDD8F962333020497F50AAE75669B01EB07EC810ED8872D
                  Malicious:false
                  Preview:MDMP..a..... ........f.........................................&..........T.......8...........T.......................................x...............................................................................eJ..............GenuineIntel............T............f.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8242
                  Entropy (8bit):3.6929634068200525
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJpH6T6YJn6VgmfTWBypra89bLusfcZm:R6lXJJ6T6Yp6VgmfTWB0Ltfv
                  MD5:FB1802E412B74B9E57088EAFF3012D6D
                  SHA1:42B2D80D27A201B60C3B22245C8AC7F0D7EA4895
                  SHA-256:EFE82360BCA5C8F10C5B1CE560D84C6E8E9BE2652721FFCE1AC7799C2322B304
                  SHA-512:0C7775518ADAE576B52C3E9EE676B3F25F8A23082675213180BD57A3532C99A6D3A535049AEAE092CA2CDB94C384DFC36C41D1F693FE05CDE8FFD1EF742B49CE
                  Malicious:false
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.2.7.2.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4634
                  Entropy (8bit):4.451689281537518
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zslZJg77aI9+xWpW8VY2Ym8M4JCdP3fbFq3TI+q8/r/n2qGScSLd:uIjfZI78g7VqJHDIdqJ3Ld
                  MD5:344433D8D61EAACC2E0EF48360F29372
                  SHA1:9D8A62232150D30DDD045090A98B03B6380DEE06
                  SHA-256:C1712DDBCCB8DEF26EC095FB723A3BC1DC92E7E7804151260934E984F355C7C5
                  SHA-512:944AA6C3A005A7E2681C026CB50C4A3471D12D944931CA4A12E64928BFBC1F39D8CF2349FCBBB7600E080B392F4E7AA34978433B0AD75E1532D64B012C4DC2E3
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="397262" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 14 streams, Fri Jul 5 06:00:12 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):41204
                  Entropy (8bit):1.9873052186072686
                  Encrypted:false
                  SSDEEP:192:uZFZRqSgNO5H4XnEa6K8daeyG3CIkjSCo5g0:mfqnA5HcE5JdaTG3dk+H
                  MD5:BE715B26E6455B769DE930A21BA92380
                  SHA1:BB3334086FED78DB3FE70F5B548CE00D6CA64F3A
                  SHA-256:A41D52E6F748764C38C41E271F659C4C73B4CE001E65266A75095F0521260261
                  SHA-512:645DEF6189E95B8EF2F8FB7B19B7459B529E97B8F499F901208BBC9A8162C60766FE046F1BA4AA58EDF61B223EDFBA53143CBA20252C3E652F4F8490F1956C64
                  Malicious:false
                  Preview:MDMP..a..... ........f.........................................&..........T.......8...........T...............L.......................x...............................................................................eJ..............GenuineIntel............T.......p....f.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8232
                  Entropy (8bit):3.691520125574412
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJ4h6pm6YBq6UAzFgmfTWByprt89b55sf00Tm:R6lXJm646Ys6VgmfTWBN5SfE
                  MD5:4D9CD3ECD8DBDDA78FFAFCB2B5D188A3
                  SHA1:4CA8B9F40BF0F1081E4796F359ABBD98C810329F
                  SHA-256:E17EC13956CEBC5FE597C5CF5A0133A628F2833BD7342AE996DD72F5B961A8FA
                  SHA-512:2047DF76D070E756251C78E0369ED2EDA3778784BE9A247BB60E0F6FC1115C8EE82E2309454E7B526C7421B91A843013E5390CE49FFB4E30C19A201B0DFECE2A
                  Malicious:false
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.9.5.2.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4634
                  Entropy (8bit):4.453569392982591
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zslZJg77aI9+xWpW8VY7Ym8M4JCdP3fbFk+q8/r/nBGScSDd:uIjfZI78g7VvJl0J3Dd
                  MD5:B90A357CDB374802D62ED1F21D67C4D1
                  SHA1:78F0E91C4B40F6C15D3CBB9B356602784330A7B7
                  SHA-256:676C9B02057B115ED35847CB9A0880BFDAF5F79334DE3487897F59B3E6D759FD
                  SHA-512:F38F5F6F8EEB502E56F576A6B19061EA292D26CBE9B8C0AAD1691DA5D7BBC77247CA9204654BBE9B0AE0D4694EC72E40B228FF039B86CE1A387EE52011995B14
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="397262" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:MS Windows registry file, NT/2000 or above
                  Category:dropped
                  Size (bytes):1835008
                  Entropy (8bit):4.372882984214932
                  Encrypted:false
                  SSDEEP:6144:CFVfpi6ceLP/9skLmb0ayWWSPtaJG8nAge35OlMMhA2AX4WABlguNEiL:KV1QyWWI/glMM6kF7Kq
                  MD5:EC00D1B6EB09D18988586B1F918D229F
                  SHA1:774E99B9BACC09D917B975481E3E351B26403FA9
                  SHA-256:2CE4C13E42457654F6C636D6140F86F5281D578065F007A8A792B613A07D3F6E
                  SHA-512:8CDF4AFC5557AA72CD214949535FE8DCBCC0C7E5B31761FF25D764D4B0E439C921292942A1F58507E2C78CD767B9CD7CE9324A304009AB1FCCAE1AD43E056DB6
                  Malicious:false
                  Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
                  Entropy (8bit):7.587194257344362
                  TrID:
                  • Win32 Dynamic Link Library (generic) (1002004/3) 96.66%
                  • UPX compressed Win32 Executable (30571/9) 2.95%
                  • Generic Win/DOS Executable (2004/3) 0.19%
                  • DOS Executable Generic (2002/1) 0.19%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:VF.dll
                  File size:23'040 bytes
                  MD5:4c9345b4819695c678d2ce9688d95ffb
                  SHA1:805fb11f46e71cd5ae00d489f3eb7385bd55df63
                  SHA256:6522c2a699b499b0e84e13d6d3a88d0c78a4ea59af2b0fd3f0fbc22644a73751
                  SHA512:6c115342ccfe01fe529ac8c4f448531fd6912b55e941c36a943c7bae484230beda11ee5deeea816e263bf1d54e989b9cfc0d90ae24e2d77b887e6af4de36f82d
                  SSDEEP:384:CO90QQ/D91ZSH+chn7N6VDLvqEot7czwGQZbxEu47VP5bBSg5pxeKg:C1QM5Czz6VaEY7czwouehlfjQKg
                  TLSH:1DA2BF74EA9A05E7D6833D31638945F7BBBC2D23F8D80B2FAF41141526619480C61BBC
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......e...!mw.!mw.!mw.Zq{. mw..qy.#mw.Nrs.#mw..r}.#mw..K}..mw..b*.(mw.!mv..mw..K|.?mw.!mw. mw..r|."mw..rs. mw.Rich!mw.........PE..L..
                  Icon Hash:7ae282899bbab082
                  Entrypoint:0x1001ec30
                  Entrypoint Section:UPX1
                  Digitally signed:false
                  Imagebase:0x10000000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                  DLL Characteristics:
                  Time Stamp:0x5FF4065A [Tue Jan 5 06:25:30 2021 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:e83f4ebaf2b8b52e97388ac9ae41624b
                  Instruction
                  cmp byte ptr [esp+08h], 00000001h
                  jne 00007F50E89369E5h
                  pushad
                  mov esi, 1001A000h
                  lea edi, dword ptr [esi-00019000h]
                  push edi
                  or ebp, FFFFFFFFh
                  jmp 00007F50E89367FFh
                  nop
                  nop
                  nop
                  mov al, byte ptr [esi]
                  inc esi
                  mov byte ptr [edi], al
                  inc edi
                  add ebx, ebx
                  jne 00007F50E89367F9h
                  mov ebx, dword ptr [esi]
                  sub esi, FFFFFFFCh
                  adc ebx, ebx
                  jc 00007F50E89367DFh
                  mov eax, 00000001h
                  add ebx, ebx
                  jne 00007F50E89367F9h
                  mov ebx, dword ptr [esi]
                  sub esi, FFFFFFFCh
                  adc ebx, ebx
                  adc eax, eax
                  add ebx, ebx
                  jnc 00007F50E89367FDh
                  jne 00007F50E893681Ah
                  mov ebx, dword ptr [esi]
                  sub esi, FFFFFFFCh
                  adc ebx, ebx
                  jc 00007F50E8936811h
                  dec eax
                  add ebx, ebx
                  jne 00007F50E89367F9h
                  mov ebx, dword ptr [esi]
                  sub esi, FFFFFFFCh
                  adc ebx, ebx
                  adc eax, eax
                  jmp 00007F50E89367C6h
                  add ebx, ebx
                  jne 00007F50E89367F9h
                  mov ebx, dword ptr [esi]
                  sub esi, FFFFFFFCh
                  adc ebx, ebx
                  adc ecx, ecx
                  jmp 00007F50E8936844h
                  xor ecx, ecx
                  sub eax, 03h
                  jc 00007F50E8936803h
                  shl eax, 08h
                  mov al, byte ptr [esi]
                  inc esi
                  xor eax, FFFFFFFFh
                  je 00007F50E8936867h
                  sar eax, 1
                  mov ebp, eax
                  jmp 00007F50E89367FDh
                  add ebx, ebx
                  jne 00007F50E89367F9h
                  mov ebx, dword ptr [esi]
                  sub esi, FFFFFFFCh
                  adc ebx, ebx
                  jc 00007F50E89367BEh
                  inc ecx
                  add ebx, ebx
                  jne 00007F50E89367F9h
                  mov ebx, dword ptr [esi]
                  sub esi, FFFFFFFCh
                  adc ebx, ebx
                  jc 00007F50E89367B0h
                  add ebx, ebx
                  jne 00007F50E89367F9h
                  mov ebx, dword ptr [esi]
                  sub esi, FFFFFFFCh
                  adc ebx, ebx
                  adc ecx, ecx
                  add ebx, ebx
                  jnc 00007F50E89367E1h
                  jne 00007F50E89367FBh
                  mov ebx, dword ptr [esi]
                  sub esi, FFFFFFFCh
                  adc ebx, ebx
                  jnc 00007F50E89367D6h
                  add ecx, 02h
                  cmp ebp, 00000000h
                  Programming Language:
                  • [ C ] VS98 (6.0) build 8168
                  • [ C ] VS98 (6.0) SP6 build 8804
                  • [C++] VS98 (6.0) SP6 build 8804
                  • [C++] VS98 (6.0) build 8168
                  • [LNK] VS98 (6.0) imp/exp build 8168
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x1f0d40x60UPX2
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1f0000xd4UPX2
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x200000x2a8.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1f1340xcUPX2
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  UPX00x10000x190000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  UPX10x1a0000x50000x50000c2df5fd8b06b009eb4844ced4fc61cfFalse0.95703125data7.8342356834224445IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  UPX20x1f0000x10000x2004000d770e0fff65c4bffbbb4fa70db94False0.427734375data2.965198167683816IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x200000x2a80x400b948c92300947416be85a320bbb8313dFalse0.3154296875data3.8077230178513473IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_VERSION0x200580x250dataChineseChina0.46114864864864863
                  DLLImport
                  KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect
                  MSVCRT.dllatoi
                  USER32.dllwsprintfA
                  NameOrdinalAddress
                  VF_CopyFile10x10001c12
                  VF_GetFileMD520x10001baf
                  Language of compilation systemCountry where language is spokenMap
                  ChineseChina
                  No network behavior found

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:02:00:06
                  Start date:05/07/2024
                  Path:C:\Windows\System32\loaddll32.exe
                  Wow64 process (32bit):true
                  Commandline:loaddll32.exe "C:\Users\user\Desktop\VF.dll"
                  Imagebase:0x1b0000
                  File size:126'464 bytes
                  MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:2
                  Start time:02:00:06
                  Start date:05/07/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff6ee680000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:3
                  Start time:02:00:06
                  Start date:05/07/2024
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\VF.dll",#1
                  Imagebase:0xa40000
                  File size:236'544 bytes
                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:4
                  Start time:02:00:06
                  Start date:05/07/2024
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe C:\Users\user\Desktop\VF.dll,VF_CopyFile
                  Imagebase:0x6b0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_blackmoon, Description: Yara detected BlackMoon Ransomware, Source: 00000004.00000002.1490901642.000000001000A000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                  Reputation:high
                  Has exited:true

                  Target ID:5
                  Start time:02:00:06
                  Start date:05/07/2024
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\VF.dll",#1
                  Imagebase:0x6b0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_blackmoon, Description: Yara detected BlackMoon Ransomware, Source: 00000005.00000002.1490893505.000000001000A000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                  Reputation:high
                  Has exited:true

                  Target ID:9
                  Start time:02:00:06
                  Start date:05/07/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5548 -s 600
                  Imagebase:0x2d0000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:10
                  Start time:02:00:06
                  Start date:05/07/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5476 -s 592
                  Imagebase:0x2d0000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:12
                  Start time:02:00:09
                  Start date:05/07/2024
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe C:\Users\user\Desktop\VF.dll,VF_GetFileMD5
                  Imagebase:0x6b0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_blackmoon, Description: Yara detected BlackMoon Ransomware, Source: 0000000C.00000002.1490901014.000000001000A000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                  Reputation:high
                  Has exited:true

                  Target ID:14
                  Start time:02:00:09
                  Start date:05/07/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 596
                  Imagebase:0x2d0000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:15
                  Start time:02:00:12
                  Start date:05/07/2024
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\VF.dll",VF_CopyFile
                  Imagebase:0x6b0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_blackmoon, Description: Yara detected BlackMoon Ransomware, Source: 0000000F.00000002.1461552167.000000001000A000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                  Reputation:high
                  Has exited:true

                  Target ID:16
                  Start time:02:00:12
                  Start date:05/07/2024
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\VF.dll",VF_GetFileMD5
                  Imagebase:0x6b0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_blackmoon, Description: Yara detected BlackMoon Ransomware, Source: 00000010.00000002.1514288945.000000001000A000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                  Reputation:high
                  Has exited:true

                  Target ID:19
                  Start time:02:00:12
                  Start date:05/07/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 600
                  Imagebase:0x2d0000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:0.2%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:1.8%
                    Total number of Nodes:394
                    Total number of Limit Nodes:0
                    execution_graph 1938 10001cc0 1939 10001cec 1938->1939 1940 10001cc9 1938->1940 1940->1939 1943 10001d00 GetProcessHeap 1940->1943 1942 10001cda 1944 10002050 1943->1944 1944->1942 1947 10004390 1950 10004440 1947->1950 1949 100043ab 1951 10004461 1950->1951 1954 10004fd0 1951->1954 1955 10004fe9 1954->1955 1956 10005073 wsprintfA 1955->1956 1957 1000448a 1955->1957 1956->1955 1957->1949 2149 10002d20 2150 10003112 2149->2150 2151 10002d39 2149->2151 2152 10003208 wsprintfA MessageBoxA 2150->2152 2155 10003164 2150->2155 2156 10003145 2150->2156 2157 100031d7 2150->2157 2158 10003128 2150->2158 2159 10003189 wsprintfA MessageBoxA 2150->2159 2182 10002de0 2150->2182 2153 1000305b 2151->2153 2154 10002d3f 2151->2154 2152->2182 2153->2152 2153->2155 2153->2156 2153->2157 2153->2158 2153->2159 2153->2182 2183 100030ac 2153->2183 2193 1000308d 2153->2193 2160 10002f54 2154->2160 2161 10002d4a 2154->2161 2213 10001f30 2155->2213 2168 10001fa0 3 API calls 2156->2168 2162 10001d70 ExitProcess 2157->2162 2207 10001e90 2158->2207 2170 10001d70 ExitProcess 2159->2170 2163 10002f62 2160->2163 2164 1000301d GetModuleFileNameA 2160->2164 2166 10002d50 2161->2166 2167 10002f14 GetCommandLineA 2161->2167 2171 100031e4 2162->2171 2173 10002fe3 GetModuleFileNameA 2163->2173 2174 10002f65 2163->2174 2180 10003037 strrchr 2164->2180 2164->2182 2176 10002eb5 2166->2176 2177 10002d5b 2166->2177 2167->2182 2178 10003152 2168->2178 2181 100031c5 2170->2181 2172 10001fa0 3 API calls 2184 10003100 2172->2184 2173->2182 2188 10002ffd strrchr 2173->2188 2174->2152 2185 10002f6e PeekMessageA 2174->2185 2176->2152 2189 10002ec0 2176->2189 2186 10002d92 GetModuleFileNameA 2177->2186 2187 10002d5d 2177->2187 2183->2172 2183->2182 2185->2182 2190 10002f8b 2185->2190 2186->2182 2192 10002da8 strrchr 2186->2192 2187->2152 2191 10002d6e 2187->2191 2189->2182 2194 10002f00 _ftol 2189->2194 2195 10002ee0 2189->2195 2190->2182 2198 10002fa8 GetMessageA TranslateMessage DispatchMessageA PeekMessageA 2190->2198 2192->2182 2201 10003cc0 2193->2201 2195->2182 2197 10002eec _ftol 2195->2197 2198->2190 2200 10002fd6 2198->2200 2203 10003cdb 2201->2203 2202 10003d0b 2204 10001fa0 3 API calls 2202->2204 2203->2202 2205 10001fa0 3 API calls 2203->2205 2206 1000309a 2204->2206 2205->2203 2208 10001ea4 RtlAllocateHeap 2207->2208 2209 10001e99 GetProcessHeap 2207->2209 2210 10001ed2 2208->2210 2211 10001eb9 MessageBoxA 2208->2211 2209->2208 2212 10001d70 ExitProcess 2211->2212 2212->2210 2214 10001f44 2213->2214 2215 10001f39 GetProcessHeap 2213->2215 2216 10001f4d RtlReAllocateHeap 2214->2216 2217 10001f5e RtlAllocateHeap 2214->2217 2215->2214 2218 10001f6c 2216->2218 2217->2218 2219 10001f72 MessageBoxA 2218->2219 2220 10001f8b 2218->2220 2221 10001d70 ExitProcess 2219->2221 2221->2220 2364 10001db0 2365 10001dc4 2364->2365 2366 10001e21 wsprintfA 2365->2366 2368 10001dfa wsprintfA 2365->2368 2367 10001e36 2366->2367 2369 10001e69 MessageBoxA 2367->2369 2370 10001e7d 2367->2370 2368->2367 2369->2370 2371 10001d70 ExitProcess 2370->2371 2372 10001e84 2371->2372 2373 100032f0 2374 100032a0 2 API calls 2373->2374 2380 100032f6 2374->2380 2375 100032d0 RtlLeaveCriticalSection 2377 10003368 2375->2377 2376 10003344 ??3@YAXPAX 2379 10003361 2376->2379 2376->2380 2378 10003341 CloseHandle 2378->2376 2379->2375 2380->2376 2380->2378 2380->2379 1958 10001c12 1959 10001c2a 1958->1959 1962 100014db 1959->1962 1961 10001c57 1963 10001508 1962->1963 1990 100020b0 1963->1990 1967 100015b7 1968 100020b0 4 API calls 1967->1968 1969 100015f4 1968->1969 1970 10001604 1969->1970 1971 10001648 1969->1971 2003 10002910 1970->2003 2007 100021a0 1971->2007 1975 100018e5 1976 10002910 5 API calls 1975->1976 1977 100018fe 1976->1977 1978 10002910 5 API calls 1977->1978 1980 10001564 1978->1980 1980->1961 1981 10001661 1981->1975 1983 10001721 1981->1983 1985 10002500 SetFilePointer 1981->1985 1988 10002550 GetFileSize 1981->1988 1989 100025a0 25 API calls 1981->1989 2012 10002210 1981->2012 2021 100023a0 1981->2021 2046 10002980 1981->2046 1984 10002910 5 API calls 1983->1984 1986 1000173a 1984->1986 1985->1981 1987 10002910 5 API calls 1986->1987 1987->1980 1988->1981 1989->1981 1992 100020b8 CreateFileA 1990->1992 1993 10002151 ??2@YAPAXI 1992->1993 1994 10001554 1992->1994 2063 10003400 1993->2063 1994->1980 1997 10001966 1994->1997 1998 10001979 1997->1998 2069 10002b90 1998->2069 2000 10001a76 2000->1967 2002 100019cf 2002->2000 2086 10002cf0 CreateDirectoryA 2002->2086 2004 10002918 2003->2004 2005 1000291e 2003->2005 2109 10003370 2004->2109 2005->1980 2008 100021a9 2007->2008 2009 100021ad 2007->2009 2008->1981 2010 100021e7 SetFilePointer 2009->2010 2011 100021ba 2009->2011 2010->2011 2011->1981 2013 1000221c 2012->2013 2014 10002226 2012->2014 2013->1981 2015 100022e1 GetFileSize SetFilePointer 2014->2015 2017 10002233 2014->2017 2016 10002309 2015->2016 2015->2017 2016->2017 2018 10002327 ReadFile SetFilePointer 2016->2018 2017->1981 2018->2017 2019 1000234d 2018->2019 2125 10003880 2019->2125 2022 100023ad 2021->2022 2023 100023b5 2021->2023 2022->1981 2024 100023c2 2023->2024 2025 10002431 2023->2025 2026 100023e1 ??2@YAPAXI ReadFile 2023->2026 2024->1981 2027 10002436 2025->2027 2028 1000247c 2025->2028 2029 10002402 ??3@YAXPAX 2026->2029 2030 10002413 2026->2030 2031 10001ee0 4 API calls 2027->2031 2032 10002481 ??2@YAPAXI SetFilePointer ReadFile 2028->2032 2033 100024f8 2028->2033 2029->1981 2131 10003b10 2030->2131 2035 10002442 2031->2035 2036 100024b4 ??3@YAXPAX 2032->2036 2037 100024c5 2032->2037 2033->1981 2042 10002471 2035->2042 2136 10001fa0 2035->2136 2036->1981 2039 10003880 2 API calls 2037->2039 2038 1000241e ??3@YAXPAX 2038->1981 2040 100024e6 2039->2040 2041 10003b10 4 API calls 2040->2041 2043 100024ed ??3@YAXPAX 2041->2043 2042->1981 2043->2033 2047 1000298c 2046->2047 2049 10002993 2046->2049 2047->1981 2048 100029a0 2048->1981 2049->2048 2051 100029bc 2049->2051 2055 10002a1f 2049->2055 2050 100029db WriteFile 2050->2051 2052 10002a0b 2050->2052 2051->2050 2054 100029ff 2051->2054 2052->1981 2053 10002b68 ??3@YAXPAX 2053->2054 2054->1981 2055->2054 2057 10002ab2 2055->2057 2058 10002aa0 ??2@YAPAXI 2055->2058 2056 10002ad3 SetFilePointer 2059 10003880 2 API calls 2056->2059 2057->2053 2057->2056 2060 10002b51 2057->2060 2058->2057 2061 10002b16 WriteFile 2059->2061 2060->2053 2061->2057 2062 10002b53 ??3@YAXPAX 2061->2062 2062->2053 2066 100032a0 2063->2066 2065 10003405 2067 100032a9 RtlInitializeCriticalSection 2066->2067 2068 100032be RtlEnterCriticalSection 2066->2068 2067->2068 2068->2065 2073 10002ba1 2069->2073 2070 10002cda 2102 10001ff0 2070->2102 2073->2070 2074 10002bf8 malloc 2073->2074 2074->2070 2076 10002c11 2074->2076 2075 10002c78 2091 10001ee0 2075->2091 2077 10002c56 2076->2077 2087 100035c0 2076->2087 2077->2075 2080 100035c0 realloc 2077->2080 2080->2075 2081 10002c8f 2082 10002cbf 2081->2082 2097 10003c80 2081->2097 2084 10002cd0 2082->2084 2085 10002cc7 ??3@YAXPAX 2082->2085 2084->2002 2085->2084 2086->2002 2088 100035e1 2087->2088 2089 100035f5 2087->2089 2088->2089 2090 100035e7 realloc 2088->2090 2089->2076 2090->2089 2092 10001ef4 RtlAllocateHeap 2091->2092 2093 10001ee9 GetProcessHeap 2091->2093 2094 10001f09 MessageBoxA 2092->2094 2096 10001f22 2092->2096 2093->2092 2105 10001d70 2094->2105 2096->2081 2098 10003c89 2097->2098 2099 10003c8d 2097->2099 2098->2081 2100 10001ee0 4 API calls 2099->2100 2101 10003c98 2100->2101 2101->2081 2103 10001ee0 4 API calls 2102->2103 2104 10001ff7 2103->2104 2104->2002 2106 10001d78 2105->2106 2107 10001d81 ExitProcess 2106->2107 2108 10001d8d 2106->2108 2108->2096 2110 100032a0 2 API calls 2109->2110 2113 1000337f 2110->2113 2111 100033f6 2112 100032d0 RtlLeaveCriticalSection 2111->2112 2114 100033fb 2112->2114 2113->2111 2115 10003394 2113->2115 2119 1000339c 2113->2119 2114->2005 2122 100032d0 2115->2122 2118 100033e2 ??3@YAXPAX 2118->2111 2119->2118 2120 100033db CloseHandle 2119->2120 2121 100033c9 2119->2121 2120->2118 2121->2118 2123 100032e4 2122->2123 2124 100032d9 RtlLeaveCriticalSection 2122->2124 2123->2005 2124->2123 2127 100038b2 2125->2127 2126 100038d6 2126->2017 2127->2126 2128 10003942 ??2@YAPAXI 2127->2128 2130 1000396a 2128->2130 2129 10003add ??3@YAXPAX 2129->2017 2130->2129 2132 10003b19 2131->2132 2133 10003b1d 2131->2133 2132->2038 2134 10001ee0 4 API calls 2133->2134 2135 10003b27 2134->2135 2135->2038 2137 10001fe6 2136->2137 2138 10001fad 2136->2138 2137->1981 2139 10001fbb 2138->2139 2143 10001d40 2138->2143 2139->2137 2141 10001fcb IsBadHugeReadPtr 2139->2141 2141->2137 2142 10001fd8 HeapFree 2141->2142 2142->2137 2144 10001d50 2143->2144 2145 10001d49 GetModuleHandleA 2143->2145 2144->2139 2145->2144 2381 10003ef2 2382 10004130 2 API calls 2381->2382 2383 10003f0e 2382->2383 2384 10003f15 ??3@YAXPAX 2383->2384 2385 10003f1e 2383->2385 2384->2385 2146 10004f15 2147 10004f31 ??3@YAXPAX 2146->2147 2148 10004f3a 2146->2148 2147->2148 1945 10007c08 1946 10007bb6 __CxxFrameHandler 1945->1946 1946->1945 2222 10007c28 2223 10007bb6 __CxxFrameHandler 2222->2223 2224 10007c08 2223->2224 2224->2223 2225 10001baf 2226 10001bc7 2225->2226 2229 10001113 2226->2229 2228 10001bda 2230 10001159 2229->2230 2231 100020b0 4 API calls 2230->2231 2232 1000116e 2231->2232 2233 100021a0 SetFilePointer 2232->2233 2234 1000117e 2232->2234 2248 100011a1 2233->2248 2234->2228 2235 10002210 6 API calls 2235->2248 2236 100013d6 2263 10002840 2236->2263 2238 100023a0 18 API calls 2238->2248 2239 100013f9 2276 10002550 2239->2276 2241 1000146e 2242 10002910 5 API calls 2241->2242 2243 1000148f 2242->2243 2281 10002920 2243->2281 2244 10002500 SetFilePointer 2244->2248 2247 10002550 GetFileSize 2247->2248 2248->2235 2248->2236 2248->2238 2248->2244 2248->2247 2249 100025a0 2248->2249 2250 1000263a 2249->2250 2256 100025b3 2249->2256 2251 10002641 2250->2251 2252 10002668 2250->2252 2253 1000265a _ftol 2251->2253 2254 1000261a 2251->2254 2252->2254 2255 1000266f _ftol 2252->2255 2253->2248 2254->2248 2255->2254 2256->2254 2286 10003b50 2256->2286 2258 100025f4 2259 10002613 2258->2259 2260 100025fd atoi 2258->2260 2259->2248 2261 10001fa0 3 API calls 2260->2261 2262 1000260b 2261->2262 2262->2248 2264 1000285f 2263->2264 2266 1000286b 2264->2266 2267 1000289e 2264->2267 2265 10002903 2265->2239 2270 10003b10 4 API calls 2266->2270 2267->2265 2268 100028b9 2267->2268 2269 100028db 2267->2269 2273 10003b10 4 API calls 2268->2273 2272 10003b10 4 API calls 2269->2272 2271 10002895 2270->2271 2271->2239 2274 100028fa 2272->2274 2275 100028d2 2273->2275 2274->2239 2275->2239 2277 10002559 2276->2277 2278 1000255e 2276->2278 2277->2241 2279 1000258e GetFileSize 2278->2279 2280 1000256b 2278->2280 2279->2280 2280->2241 2282 1000292d 2281->2282 2283 10002936 2282->2283 2284 10001ee0 4 API calls 2282->2284 2283->2234 2285 10002942 2284->2285 2285->2234 2287 10003b5d 2286->2287 2288 10003b64 2287->2288 2298 10003d20 2287->2298 2288->2258 2290 10003b84 2291 10003d20 11 API calls 2290->2291 2292 10003b9b malloc LCMapStringA 2291->2292 2294 10003bfb 2292->2294 2295 10003bee ??3@YAXPAX 2292->2295 2296 10003c80 4 API calls 2294->2296 2295->2294 2297 10003c09 ??3@YAXPAX 2296->2297 2297->2258 2302 10003d45 2298->2302 2299 10003d92 _strncoll 2299->2302 2300 10003df5 2317 10004130 2300->2317 2302->2299 2302->2300 2305 10003ded 2302->2305 2307 100041c0 8 API calls 2302->2307 2304 10004130 2 API calls 2306 10003e17 2304->2306 2305->2300 2311 10003e2c 2305->2311 2306->2290 2307->2302 2308 10003e4f malloc 2309 10004130 2 API calls 2308->2309 2310 10003e9a 2309->2310 2312 10003ea2 ??3@YAXPAX 2310->2312 2313 10003eae 2310->2313 2311->2308 2320 100041c0 2311->2320 2312->2313 2315 10004130 2 API calls 2313->2315 2316 10003eca 2315->2316 2316->2290 2327 10004150 2317->2327 2319 10003dfe 2319->2304 2321 100041ca 2320->2321 2324 100041da 2320->2324 2333 10004020 2321->2333 2323 100041d6 2323->2324 2350 10004220 2323->2350 2324->2308 2326 100041f1 2326->2308 2328 1000415a 2327->2328 2329 100041ae 2327->2329 2330 1000416e 2328->2330 2331 100041a4 HeapFree 2328->2331 2332 10004199 GetProcessHeap 2328->2332 2329->2319 2330->2319 2331->2329 2332->2331 2334 1000403a 2333->2334 2335 1000402d 2333->2335 2337 10004041 2334->2337 2340 1000404f 2334->2340 2336 10004130 2 API calls 2335->2336 2346 10004032 2336->2346 2355 10003f50 2337->2355 2339 10004049 2339->2323 2341 10004082 2340->2341 2342 10004094 GetProcessHeap 2340->2342 2343 1000409f 2340->2343 2341->2323 2342->2343 2344 10004102 RtlReAllocateHeap 2343->2344 2345 100040a4 RtlAllocateHeap 2343->2345 2344->2346 2345->2346 2347 100040c0 2345->2347 2346->2323 2348 10004150 2 API calls 2347->2348 2349 100040e8 2348->2349 2349->2323 2351 10004273 2350->2351 2352 10004228 2350->2352 2351->2326 2353 1000422d 2352->2353 2354 10004260 memmove 2352->2354 2353->2326 2354->2351 2356 10003f5c 2355->2356 2359 10003f6c 2355->2359 2357 10004020 5 API calls 2356->2357 2358 10003f66 2357->2358 2358->2339 2360 10003fea RtlAllocateHeap 2359->2360 2361 10003fdf GetProcessHeap 2359->2361 2362 10003f74 2359->2362 2363 10004001 2360->2363 2361->2360 2362->2339 2363->2339

                    Control-flow Graph

                    Memory Dump Source
                    • Source File: 00000004.00000002.1490901642.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000004.00000002.1490875337.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001000A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001001D000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490979013.000000001001E000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491011106.000000001001F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491037810.0000000010020000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7407d737f56514166f7da273d515ef1d285b92db4765a1ffa11225f76f1e7301
                    • Instruction ID: edc90fc72bed4a98fd546a8f6564dd8288f7c45729d5501c1300fff41df1ace2
                    • Opcode Fuzzy Hash: 7407d737f56514166f7da273d515ef1d285b92db4765a1ffa11225f76f1e7301
                    • Instruction Fuzzy Hash: 73D012566091592EBA00E17E3C89EDB06CDEBC90F53D10562F650C310AF959DC428160
                    APIs
                    Memory Dump Source
                    • Source File: 00000004.00000002.1490901642.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000004.00000002.1490875337.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001000A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001001D000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490979013.000000001001E000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491011106.000000001001F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491037810.0000000010020000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                    Yara matches
                    Similarity
                    • API ID: ??3@
                    • String ID:
                    • API String ID: 613200358-0
                    • Opcode ID: ba413ab6d4f8bc987ca0994f6b9819aff9e1b9b0c612e58f3684a9c582c3456a
                    • Instruction ID: 7ef47cc92b2b30ffd56e5f114f18e9c92f43da5cc89ed6a96ede97a2a0c19135
                    • Opcode Fuzzy Hash: ba413ab6d4f8bc987ca0994f6b9819aff9e1b9b0c612e58f3684a9c582c3456a
                    • Instruction Fuzzy Hash: BCD0A7F1C182D501E296CE142C017E6AEF99F172C4F055429F8D49720BCA65D598C39B
                    APIs
                    • GetProcessHeap.KERNEL32(10001CDA), ref: 10001D00
                    Memory Dump Source
                    • Source File: 00000004.00000002.1490901642.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000004.00000002.1490875337.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001000A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001001D000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490979013.000000001001E000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491011106.000000001001F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491037810.0000000010020000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                    Yara matches
                    Similarity
                    • API ID: HeapProcess
                    • String ID:
                    • API String ID: 54951025-0
                    • Opcode ID: 4f539b3326bd076799e99bc05768c580a9a82b5a34e481341541af8cc0fa585f
                    • Instruction ID: 77bc00a3f275fcdd50627efed700517611f170b2615d276c6fdd4d552512aa06
                    • Opcode Fuzzy Hash: 4f539b3326bd076799e99bc05768c580a9a82b5a34e481341541af8cc0fa585f
                    • Instruction Fuzzy Hash: DCE01731A40735AFF350CB58DD84F5632D4EB097C0F058124EE0AC72AEE266AC81CBA4
                    Memory Dump Source
                    • Source File: 00000004.00000002.1490901642.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000004.00000002.1490875337.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001000A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001001D000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490979013.000000001001E000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491011106.000000001001F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491037810.0000000010020000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7588268db9ad160e2392b48f534035be178d540a008719f74208fe9ed0531eb1
                    • Instruction ID: a70778d6e45509d0a44fe0bb72c364c31e3d9338d8579bf36051556b20a1267e
                    • Opcode Fuzzy Hash: 7588268db9ad160e2392b48f534035be178d540a008719f74208fe9ed0531eb1
                    • Instruction Fuzzy Hash: 9B52B8767447094BD308CE9ACC9159EF3E3ABC8304F498A3CE955C3346EEB8E90A8655
                    Memory Dump Source
                    • Source File: 00000004.00000002.1490901642.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000004.00000002.1490875337.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001000A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001001D000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490979013.000000001001E000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491011106.000000001001F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491037810.0000000010020000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d4bfdb248b3fb90f8076a3fe4a1e75f7bd1b50aa5aafde52d762773f77742459
                    • Instruction ID: 309606cb97307fb1fec2b874e7b44d24a3d766d530696baa6b42a1f75b967e98
                    • Opcode Fuzzy Hash: d4bfdb248b3fb90f8076a3fe4a1e75f7bd1b50aa5aafde52d762773f77742459
                    • Instruction Fuzzy Hash: 6AF1BD725082818FC309CF18D9989E27BE2FFA8754B1F42F9D4499B367D732A841CB91
                    Memory Dump Source
                    • Source File: 00000004.00000002.1490901642.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000004.00000002.1490875337.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001000A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001001D000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490979013.000000001001E000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491011106.000000001001F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491037810.0000000010020000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2f34ecc36813702e18b76f028753ff5ddf9d07756c03771e1f7bae05f136c8da
                    • Instruction ID: 6f2d2a86e5dd8db9a57a21b2df55b7bd15b626ebd932cdc5b6a27e34ebd3f064
                    • Opcode Fuzzy Hash: 2f34ecc36813702e18b76f028753ff5ddf9d07756c03771e1f7bae05f136c8da
                    • Instruction Fuzzy Hash: 6BD11479214B418FE324CF29C984AA7B7E6FF89345B14892ED8D687B55DB32F841CB40
                    Memory Dump Source
                    • Source File: 00000004.00000002.1490901642.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000004.00000002.1490875337.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001000A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001001D000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490979013.000000001001E000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491011106.000000001001F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491037810.0000000010020000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8ce80d1a53aa7a3a508110d3d59c207b4dc73eca99c8748728bab94de493762f
                    • Instruction ID: e5167f4d1db7e0d9de43b459b56816ad690c9698c81ca3800cca64c12913ffa3
                    • Opcode Fuzzy Hash: 8ce80d1a53aa7a3a508110d3d59c207b4dc73eca99c8748728bab94de493762f
                    • Instruction Fuzzy Hash: EFD189716082518FC319CF28E9D88E67BE1FFA8780B0E42F8C9898B327D7359941CB55
                    Memory Dump Source
                    • Source File: 00000004.00000002.1490901642.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000004.00000002.1490875337.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001000A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001001D000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490979013.000000001001E000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491011106.000000001001F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491037810.0000000010020000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d078c43817de848db57cfcdc3eee61c4f5998b4728861276352ebc94a7f9da52
                    • Instruction ID: 31b52a9dd9392a70a1407452b4c7d32055d8a66d6a715df99a10cea97bbb8ab3
                    • Opcode Fuzzy Hash: d078c43817de848db57cfcdc3eee61c4f5998b4728861276352ebc94a7f9da52
                    • Instruction Fuzzy Hash: 80B11575215B418FD328CF28D9909A7B7E6FF89345B18892DD8CAC7B55EA32F841CB40
                    Memory Dump Source
                    • Source File: 00000004.00000002.1490901642.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000004.00000002.1490875337.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001000A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001001D000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490979013.000000001001E000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491011106.000000001001F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491037810.0000000010020000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0b4f27dd10139f30faea009d98bf7d04ad43b169fe1efa635cf320682f8d45aa
                    • Instruction ID: bf977713c1aa96bb2c1f761dd9ee79ef989d43dc029455462c82b9c6e58d1ad9
                    • Opcode Fuzzy Hash: 0b4f27dd10139f30faea009d98bf7d04ad43b169fe1efa635cf320682f8d45aa
                    • Instruction Fuzzy Hash: 6E31403374558203F71DCA2F8CA12BAEBD34FC526872ED47E99C58B35AECFA45164144
                    Memory Dump Source
                    • Source File: 00000004.00000002.1490901642.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000004.00000002.1490875337.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001000A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001001D000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490979013.000000001001E000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491011106.000000001001F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491037810.0000000010020000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6565b83ea56570f90e29b813c4ba4bd4f1115fa2be481ef6f91c41094bd366b2
                    • Instruction ID: b40ed2133f6396ccbd0e58348be659f324c0b454b82a1182ccbe76e846c8f4b5
                    • Opcode Fuzzy Hash: 6565b83ea56570f90e29b813c4ba4bd4f1115fa2be481ef6f91c41094bd366b2
                    • Instruction Fuzzy Hash: 6DE04FB1A0570C9BF720CF49D980B55B7ECE708384F208199E80CD3354E777DD448680

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 7 10002d20-10002d33 8 10003112-1000311b 7->8 9 10002d39 7->9 10 10003121 8->10 11 10003208-1000322a wsprintfA MessageBoxA 8->11 12 1000305b-10003067 9->12 13 10002d3f-10002d44 9->13 10->11 14 10003230 10->14 15 10003164-10003186 call 10001f30 10->15 16 10003145-10003161 call 10001fa0 10->16 17 100031f6-10003205 10->17 18 100031d7-100031f3 call 10001d70 10->18 19 10003128-10003142 call 10001e90 10->19 20 10003189-100031d4 wsprintfA MessageBoxA call 10001d70 10->20 11->14 23 100030c2-100030c7 12->23 24 10003069 12->24 21 10002f54-10002f5c 13->21 22 10002d4a 13->22 31 10003232-1000323c 14->31 28 10002f62-10002f63 21->28 29 1000301d-10003031 GetModuleFileNameA 21->29 32 10002d50-10002d55 22->32 33 10002f14-10002f22 GetCommandLineA 22->33 35 100030e8-100030ed 23->35 36 100030c9 23->36 25 100030f3-1000310f call 10001fa0 24->25 26 1000306f-10003074 24->26 39 10003076 26->39 40 100030ac-100030b1 26->40 46 10002fe3-10002ff7 GetModuleFileNameA 28->46 47 10002f65-10002f68 28->47 29->14 53 10003037-10003058 strrchr 29->53 49 10002eb5-10002eba 32->49 50 10002d5b 32->50 43 10002f24 33->43 44 10002f26-10002f2b 33->44 35->14 35->25 36->25 42 100030cb-100030d0 36->42 39->25 55 10003078-10003080 39->55 40->25 57 100030b3-100030bf 40->57 42->25 58 100030d2-100030d7 42->58 43->44 59 10002f34-10002f37 44->59 60 10002f2d-10002f32 44->60 46->14 65 10002ffd-1000301a strrchr 46->65 47->11 62 10002f6e-10002f85 PeekMessageA 47->62 49->11 56 10002ec0-10002ed2 49->56 63 10002d92-10002da6 GetModuleFileNameA 50->63 64 10002d5d-10002d65 50->64 55->14 66 10003086 55->66 56->31 67 10002ed8-10002ede 56->67 58->25 68 100030d9-100030e5 58->68 59->31 69 10002f3d-10002f40 59->69 60->59 60->60 62->14 70 10002f8b-10002f97 62->70 73 10002de0-10002de7 63->73 74 10002da8-10002dde strrchr 63->74 71 10002d80-10002d8f 64->71 72 10002d67-10002d68 64->72 66->11 66->14 66->15 66->16 66->17 66->18 66->19 66->20 66->25 75 1000308d-100030a9 call 10003cc0 66->75 76 10002f00-10002f11 _ftol 67->76 77 10002ee0-10002ee6 67->77 69->31 78 10002f46-10002f51 69->78 79 10002f9d-10002fa2 70->79 72->11 80 10002d6e-10002d7d 72->80 81 10002dee-10002df6 73->81 74->81 77->31 85 10002eec-10002efd _ftol 77->85 79->14 86 10002fa8-10002fd4 GetMessageA TranslateMessage DispatchMessageA PeekMessageA 79->86 82 10002e7c-10002eb2 81->82 83 10002dfc-10002e01 81->83 87 10002e43-10002e79 83->87 88 10002e03-10002e04 83->88 86->79 90 10002fd6-10002fe0 86->90 88->14 91 10002e0a-10002e40 88->91
                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,1000C528,00000104), ref: 10002D9E
                    • strrchr.MSVCRT ref: 10002DAF
                    • _ftol.MSVCRT ref: 10002EEE
                    • GetCommandLineA.KERNEL32 ref: 10002F14
                    • PeekMessageA.USER32(00000000,00000000,00000000,00000000,00000000), ref: 10002F81
                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 10002FB3
                    • TranslateMessage.USER32(?), ref: 10002FBA
                    • DispatchMessageA.USER32(?), ref: 10002FC1
                    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 10002FD0
                    • wsprintfA.USER32 ref: 10003213
                    • MessageBoxA.USER32(00000000,?,blackmoon,00000010), ref: 1000322A
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1490901642.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000004.00000002.1490875337.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001000A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001001D000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490979013.000000001001E000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491011106.000000001001F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491037810.0000000010020000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                    Yara matches
                    Similarity
                    • API ID: Message$Peek$CommandDispatchFileLineModuleNameTranslate_ftolstrrchrwsprintf
                    • String ID: BlackMoon RunTime Error:%s$ERROR$blackmoon
                    • API String ID: 3335176381-532175377
                    • Opcode ID: 8088aa845cae719ded4129fcdaf6e409d5b142e6576664fdd162948d1be09158
                    • Instruction ID: 26939bec827efbcc702376da814159073543130077bb4bf3a5dbaa19e04b1987
                    • Opcode Fuzzy Hash: 8088aa845cae719ded4129fcdaf6e409d5b142e6576664fdd162948d1be09158
                    • Instruction Fuzzy Hash: 0EC11637B806445AF220D768BC41BFF77C4E7D13F2F50413AEA45C61D8D92BAA498A62

                    Control-flow Graph

                    Memory Dump Source
                    • Source File: 00000004.00000002.1490901642.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000004.00000002.1490875337.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001000A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001001D000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490979013.000000001001E000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491011106.000000001001F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491037810.0000000010020000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e7a21d19b59c350098c805f3af552dabc0777c66890c146e2eb02242b023d7e0
                    • Instruction ID: d0bef142230f262056ff0b3c39f5d772e11ed924ffe38e3f8a71b57cea3cd31f
                    • Opcode Fuzzy Hash: e7a21d19b59c350098c805f3af552dabc0777c66890c146e2eb02242b023d7e0
                    • Instruction Fuzzy Hash: 4241E6B77052152FF200DA65BC81EABF39CEB842F9B14453AF509C3506EB26F91582A2

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 124 10002980-1000298a 125 10002993-1000299e call 10003430 124->125 126 1000298c-10002992 124->126 129 100029a0-100029a4 125->129 130 100029a5-100029ba 125->130 131 100029bc-100029cb 130->131 132 10002a1f-10002a22 130->132 135 100029d1-100029d7 131->135 136 10002b75-10002b80 131->136 133 10002a62-10002a65 132->133 134 10002a24-10002a31 132->134 133->136 138 10002a6b-10002a7e 133->138 134->136 137 10002a37-10002a3b 134->137 139 100029db-100029f1 WriteFile 135->139 142 10002a3e-10002a54 137->142 143 10002a80-10002a84 138->143 144 10002ab2-10002ab8 138->144 140 100029f3-100029fd 139->140 141 10002a0b-10002a1e 139->141 140->139 145 100029ff-10002a0a 140->145 156 10002a56-10002a61 142->156 148 10002a87-10002a8e 143->148 146 10002b68-10002b72 ??3@YAXPAX@Z 144->146 147 10002abe-10002ac2 144->147 146->136 149 10002ac6-10002ad1 147->149 151 10002a90-10002a92 148->151 152 10002a96-10002a9a 148->152 154 10002ad3-10002b2f SetFilePointer call 10003880 WriteFile 149->154 155 10002b35-10002b4b 149->155 151->152 157 10002a94 151->157 152->148 153 10002a9c-10002a9e 152->153 153->144 158 10002aa0-10002aad ??2@YAPAXI@Z 153->158 162 10002b31 154->162 163 10002b53-10002b60 ??3@YAXPAX@Z 154->163 155->149 160 10002b51 155->160 157->152 158->144 160->146 162->155 163->146
                    Memory Dump Source
                    • Source File: 00000004.00000002.1490901642.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000004.00000002.1490875337.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001000A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001001D000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490979013.000000001001E000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491011106.000000001001F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491037810.0000000010020000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 07628b4ee72d7111cd7a9631a98afa0f9b0ffc9fe399dab86973989583107886
                    • Instruction ID: 857665823ffce5b063985f2e2028a7e58ed4ffc08ae4d3d95d3dbbf98ef7c23a
                    • Opcode Fuzzy Hash: 07628b4ee72d7111cd7a9631a98afa0f9b0ffc9fe399dab86973989583107886
                    • Instruction Fuzzy Hash: DF51AD756043069FE710DF18CC80A9AB3E9FBC8394F85892DF94997315E770EE098B92

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 164 10001db0-10001dc2 165 10001dd0-10001dde 164->165 166 10001dc4-10001dc7 164->166 167 10001de0-10001de5 165->167 168 10001e21-10001e33 wsprintfA 165->168 166->165 169 10001dc9 166->169 167->168 170 10001de7-10001df8 167->170 171 10001e36-10001e3d 168->171 169->165 170->168 172 10001dfa-10001e1f wsprintfA 170->172 173 10001e69-10001e77 MessageBoxA 171->173 174 10001e3f-10001e47 171->174 172->171 176 10001e7d 173->176 174->173 175 10001e49-10001e67 174->175 175->173 175->176 177 10001e7f call 10001d70 176->177 179 10001e84-10001e8e 177->179
                    APIs
                    • wsprintfA.USER32 ref: 10001E16
                    • wsprintfA.USER32 ref: 10001E2D
                    • MessageBoxA.USER32(00000000,?,error,00000010), ref: 10001E77
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1490901642.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000004.00000002.1490875337.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001000A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001001D000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490979013.000000001001E000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491011106.000000001001F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491037810.0000000010020000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                    Yara matches
                    Similarity
                    • API ID: wsprintf$Message
                    • String ID: error$program internal error number is %d. %s
                    • API String ID: 386942524-1911117719
                    • Opcode ID: 724e687f3b4407d52f95e225f60976656b636d89e579579481e7ec5a80fdd677
                    • Instruction ID: 166322ed2271cc4e75ba6a4df270849a14b0df3fe62211fb83060bc59e65a108
                    • Opcode Fuzzy Hash: 724e687f3b4407d52f95e225f60976656b636d89e579579481e7ec5a80fdd677
                    • Instruction Fuzzy Hash: A021D275604251AFF750CB64DC95FEB33E8EF853C0F058518FA8487289E7B4DA888B62

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 180 10001f30-10001f37 181 10001f44-10001f4b 180->181 182 10001f39-10001f3f GetProcessHeap 180->182 183 10001f4d-10001f5c RtlReAllocateHeap 181->183 184 10001f5e-10001f66 RtlAllocateHeap 181->184 182->181 185 10001f6c-10001f70 183->185 184->185 186 10001f72-10001f85 MessageBoxA 185->186 187 10001f8e-10001f91 185->187 188 10001f86 call 10001d70 186->188 189 10001f8b 188->189 189->187
                    APIs
                    • GetProcessHeap.KERNEL32 ref: 10001F39
                    • RtlReAllocateHeap.NTDLL(00570000,00000000,?,?), ref: 10001F56
                    • RtlAllocateHeap.NTDLL(00570000,00000008,?), ref: 10001F66
                    • MessageBoxA.USER32(00000000,1000A4F0,error,00000010), ref: 10001F7F
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1490901642.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000004.00000002.1490875337.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001000A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001001D000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490979013.000000001001E000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491011106.000000001001F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491037810.0000000010020000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$Allocate$MessageProcess
                    • String ID: error
                    • API String ID: 2868346564-1574812785
                    • Opcode ID: 4c64006d5438db1181aa1e0bfffb4f4df65995b3f104e5c75a667043da0b28e1
                    • Instruction ID: 64e84e69fbcbc59099e589629cfbd18fd6322677d63f43e3ccaf759687877819
                    • Opcode Fuzzy Hash: 4c64006d5438db1181aa1e0bfffb4f4df65995b3f104e5c75a667043da0b28e1
                    • Instruction Fuzzy Hash: 46F0B475640622BFF250C7608C89FAB3358FB847C0F008128FA859224CDB70AD448B55

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 190 10001e90-10001e97 191 10001ea4-10001eb7 RtlAllocateHeap 190->191 192 10001e99-10001e9f GetProcessHeap 190->192 193 10001ed5-10001ed8 191->193 194 10001eb9-10001ecc MessageBoxA 191->194 192->191 195 10001ecd call 10001d70 194->195 196 10001ed2 195->196 196->193
                    APIs
                    • GetProcessHeap.KERNEL32 ref: 10001E99
                    • RtlAllocateHeap.NTDLL(00570000,00000008,?), ref: 10001EAD
                    • MessageBoxA.USER32(00000000,1000A4F0,error,00000010), ref: 10001EC6
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1490901642.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000004.00000002.1490875337.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001000A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001001D000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490979013.000000001001E000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491011106.000000001001F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491037810.0000000010020000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocateMessageProcess
                    • String ID: error
                    • API String ID: 2992861138-1574812785
                    • Opcode ID: f1358109da77e21d6e94303b040e8f9a08a836b558b7be48026413da71c19e42
                    • Instruction ID: b2607e65acb529ffb868ed3d72e53af95a2fabe33535cbd14c3b7701de61cb69
                    • Opcode Fuzzy Hash: f1358109da77e21d6e94303b040e8f9a08a836b558b7be48026413da71c19e42
                    • Instruction Fuzzy Hash: D0E0D875A406316BF250C7709C8CFCA3654FF456C0F008120FE85D2248EB70AD488B91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 197 10001ee0-10001ee7 198 10001ef4-10001f07 RtlAllocateHeap 197->198 199 10001ee9-10001eef GetProcessHeap 197->199 200 10001f25-10001f28 198->200 201 10001f09-10001f1c MessageBoxA 198->201 199->198 202 10001f1d call 10001d70 201->202 203 10001f22 202->203 203->200
                    APIs
                    • GetProcessHeap.KERNEL32(10003B27,10002902,00000000,00000001,100028FA,00000000,?,?,?,?,?,00000000,80000004), ref: 10001EE9
                    • RtlAllocateHeap.NTDLL(00570000,00000000,?), ref: 10001EFD
                    • MessageBoxA.USER32(00000000,1000A4F0,error,00000010), ref: 10001F16
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1490901642.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000004.00000002.1490875337.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001000A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001001D000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490979013.000000001001E000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491011106.000000001001F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491037810.0000000010020000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocateMessageProcess
                    • String ID: error
                    • API String ID: 2992861138-1574812785
                    • Opcode ID: c760f02dc7f1dcd9c24370a1ab235705deecc3d0a59bc2cbd99428b038e24608
                    • Instruction ID: 905b796b1006c3dc7f6810519533650a6fc6a7700f97f0b6cd97c5451d405672
                    • Opcode Fuzzy Hash: c760f02dc7f1dcd9c24370a1ab235705deecc3d0a59bc2cbd99428b038e24608
                    • Instruction Fuzzy Hash: E4E0D8756402316BF210C7709C8CFCA3654FB456C0F008134FE84D2298E770AD848B90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 204 10002210-1000221a 205 10002226-10002231 call 10003430 204->205 206 1000221c-10002225 204->206 209 10002233-1000223c 205->209 210 1000223d-1000224d 205->210 211 100022e1-10002307 GetFileSize SetFilePointer 210->211 212 10002253-10002256 210->212 214 10002388-10002393 211->214 215 10002309-1000230d 211->215 212->211 213 1000225c-1000225f 212->213 213->214 216 10002265-1000227c call 10003b00 213->216 215->214 217 1000230f-1000231d 215->217 216->214 229 10002282-10002290 216->229 217->214 219 1000231f-10002325 217->219 219->214 221 10002327-1000234b ReadFile SetFilePointer 219->221 222 1000236c-10002372 221->222 223 1000234d-10002369 call 10003880 221->223 222->214 224 10002374-1000237a 222->224 223->222 227 10002380 224->227 228 1000237c-1000237e 224->228 227->214 228->214 228->227 229->214 231 10002296-1000229c 229->231 231->214 232 100022a2-100022bd 231->232 232->214 235 100022c3-100022c9 232->235 236 100022d3-100022e0 235->236 237 100022cb-100022cd 235->237 237->214 237->236
                    Memory Dump Source
                    • Source File: 00000004.00000002.1490901642.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000004.00000002.1490875337.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001000A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001001D000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490979013.000000001001E000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491011106.000000001001F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491037810.0000000010020000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b1a985c0ef3129679f2a64f940742c7bbddd5e8f338715cc39ed2ab0989606ef
                    • Instruction ID: bc9f3f8a8f7291b2387f293409c9189d340f2a3c5cab7d3895da7c8d9044da7b
                    • Opcode Fuzzy Hash: b1a985c0ef3129679f2a64f940742c7bbddd5e8f338715cc39ed2ab0989606ef
                    • Instruction Fuzzy Hash: D1419F713003066BF710DF68CC80BAEB3E8EF85794F810959F5949B245DB75EE468B92

                    Control-flow Graph

                    APIs
                    • malloc.MSVCRT ref: 10003BB0
                    • LCMapStringA.KERNEL32(00000804,00400000,?,?,00000000,00000001), ref: 10003BE4
                    • ??3@YAXPAX@Z.MSVCRT ref: 10003BF3
                    • ??3@YAXPAX@Z.MSVCRT ref: 10003C0C
                    Memory Dump Source
                    • Source File: 00000004.00000002.1490901642.0000000010001000.00000040.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000004.00000002.1490875337.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001000A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490901642.000000001001D000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1490979013.000000001001E000.00000080.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491011106.000000001001F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000004.00000002.1491037810.0000000010020000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                    Yara matches
                    Similarity
                    • API ID: ??3@$Stringmalloc
                    • String ID:
                    • API String ID: 1006641717-0
                    • Opcode ID: e0a1510b140cb79b9dfec76fb83280e5c08aa66f994ef1d46e45e6e3958bf3e6
                    • Instruction ID: 04d1d543f12b8c492832f5ed44df4c6af09087946df147ee179aa0220df44e69
                    • Opcode Fuzzy Hash: e0a1510b140cb79b9dfec76fb83280e5c08aa66f994ef1d46e45e6e3958bf3e6
                    • Instruction Fuzzy Hash: 3F11D3B26086146FF204DB64DC85F6B73EDEB89585F00C62DF74A93205EB34EA0587A2