Windows
Analysis Report
winmm.dll.dll
Overview
General Information
Detection
Score: | 72 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
loaddll64.exe (PID: 7344 cmdline:
loaddll64. exe "C:\Us ers\user\D esktop\win mm.dll.dll " MD5: 763455F9DCB24DFEECC2B9D9F8D46D52) conhost.exe (PID: 7352 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 7396 cmdline:
cmd.exe /C rundll32. exe "C:\Us ers\user\D esktop\win mm.dll.dll ",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) rundll32.exe (PID: 7420 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\winm m.dll.dll" ,#1 MD5: EF3179D498793BF4234F708D3BE28633) rundll32.exe (PID: 7404 cmdline:
rundll32.e xe C:\User s\user\Des ktop\winmm .dll.dll,C loseDriver MD5: EF3179D498793BF4234F708D3BE28633) rundll32.exe (PID: 7484 cmdline:
rundll32.e xe C:\User s\user\Des ktop\winmm .dll.dll,D efDriverPr oc MD5: EF3179D498793BF4234F708D3BE28633) rundll32.exe (PID: 7512 cmdline:
rundll32.e xe C:\User s\user\Des ktop\winmm .dll.dll,D riverCallb ack MD5: EF3179D498793BF4234F708D3BE28633)
- cleanup
- • AV Detection
- • Compliance
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Binary string: | ||
Source: | Binary string: |
System Summary |
---|
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Registry key queried: | Jump to behavior | ||
Source: | Registry key queried: | Jump to behavior | ||
Source: | Registry key queried: | Jump to behavior |
Source: | Last function: |
Source: | Binary or memory string: |
Anti Debugging |
---|
Source: | Thread information set: | Jump to behavior | ||
Source: | Thread information set: | Jump to behavior | ||
Source: | Thread information set: | Jump to behavior | ||
Source: | Thread information set: | Jump to behavior | ||
Source: | Thread information set: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | NtQueryInformationProcess: | Jump to behavior | ||
Source: | NtQueryInformationProcess: | Jump to behavior | ||
Source: | NtSetInformationThread: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 11 Process Injection | 1 Masquerading | OS Credential Dumping | 321 Security Software Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Abuse Elevation Control Mechanism | 22 Virtualization/Sandbox Evasion | LSASS Memory | 22 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 1 Rundll32 | Security Account Manager | 1 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 2 Software Packing | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 11 Process Injection | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Abuse Elevation Control Mechanism | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 DLL Side-Loading | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 Obfuscated Files or Information | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
46% | ReversingLabs | Win64.PUA.Vigua | ||
44% | Virustotal | Browse |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1541761 |
Start date and time: | 2024-10-25 05:41:07 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 26s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | winmm.dll.dll (renamed file extension from exe to dll) |
Original Sample Name: | winmm.dll.exe |
Detection: | MAL |
Classification: | mal72.evad.winDLL@12/1@0/0 |
EGA Information: | Failed |
HCA Information: | Failed |
Cookbook Comments: |
|
- Execution Graph export aborted
for target loaddll64.exe, PID 7344 because there are no exe cuted function - Execution Graph export aborted
for target rundll32.exe, PID 7404 because there are no exec uted function - Execution Graph export aborted
for target rundll32.exe, PID 7420 because there are no exec uted function - Not all processes where analyz
ed, report is missing behavior information - Report creation exceeded maxim
um time and may have missing d isassembly code information.
Process: | C:\Windows\System32\rundll32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 117 |
Entropy (8bit): | 5.166807135163305 |
Encrypted: | false |
SSDEEP: | 3:p0xexgOF8GWnzBgS36RZ0pnSdu9:pKgFYcKz |
MD5: | C295FEBB81A9D6DF33C3C884B7162A9F |
SHA1: | 1FF0C4CC98881A1360ED84162413EDC836860F78 |
SHA-256: | 27CCCC26780CB481031FB2D31166E0F1B19A9526081D71C478CC9CD1CF7709A8 |
SHA-512: | FA50EDA4345FE66D2A13DAD6B6914A2F937852445D4CED374611883691DD698ACD9D6CBBC872478B638466EE3E66E1392C9CDEA37F55FC4F7D5A02807337D4D0 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.964111045243251 |
TrID: |
|
File name: | winmm.dll.dll |
File size: | 3'716'608 bytes |
MD5: | 25fef25074dd0749c978bf01a36965f4 |
SHA1: | 67910025c3b84a8324d3ea5e1afd93fd1cd00b41 |
SHA256: | 31ceb9014f0e7ba8529c6dfa625abf48a0c39120bf976094b6c33363cdfb0a01 |
SHA512: | 29ea7d313597324fc32d9a0beea28f0fc7a1b0befdf8e5493637b411b6062f07b61568733ea2b1adf028b6eba830ab7de6aae0df89df05639f4bd5eb63a1305a |
SSDEEP: | 98304:VkdcixpTI1NMpnARKIJPKKz0m/uwPsMq943J5sCpP:Z2+1NMpARKuPVzpY943J5n |
TLSH: | B80633F244F6AD7AD51023B0FDE88FC8324E629A9D7EB75889991B1F1D113086B186D3 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................N.......N.......N........K.......K...............K......N.......N................J.......J.......J_......J..... |
Icon Hash: | 7ae282899bbab082 |
Entrypoint: | 0x18062c058 |
Entrypoint Section: | .boot |
Digitally signed: | false |
Imagebase: | 0x180000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE |
Time Stamp: | 0x670A312A [Sat Oct 12 08:19:54 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 59b55678fa1594b54b3939b607a2dcb0 |
Instruction |
---|
call 00007F89B47393C7h |
inc ecx |
push edx |
dec ecx |
mov edx, esp |
inc ecx |
push edx |
dec ecx |
mov esi, dword ptr [edx+10h] |
dec ecx |
mov edi, dword ptr [edx+20h] |
cld |
mov dl, 80h |
mov al, byte ptr [esi] |
dec eax |
inc esi |
mov byte ptr [edi], al |
dec eax |
inc edi |
mov ebx, 00000002h |
add dl, dl |
jne 00007F89B4739249h |
mov dl, byte ptr [esi] |
dec eax |
inc esi |
adc dl, dl |
jnc 00007F89B4739226h |
add dl, dl |
jne 00007F89B4739249h |
mov dl, byte ptr [esi] |
dec eax |
inc esi |
adc dl, dl |
jnc 00007F89B47392A0h |
xor eax, eax |
add dl, dl |
jne 00007F89B4739249h |
mov dl, byte ptr [esi] |
dec eax |
inc esi |
adc dl, dl |
jnc 00007F89B4739348h |
add dl, dl |
jne 00007F89B4739249h |
mov dl, byte ptr [esi] |
dec eax |
inc esi |
adc dl, dl |
adc eax, eax |
add dl, dl |
jne 00007F89B4739249h |
mov dl, byte ptr [esi] |
dec eax |
inc esi |
adc dl, dl |
adc eax, eax |
add dl, dl |
jne 00007F89B4739249h |
mov dl, byte ptr [esi] |
dec eax |
inc esi |
adc dl, dl |
adc eax, eax |
add dl, dl |
jne 00007F89B4739249h |
mov dl, byte ptr [esi] |
dec eax |
inc esi |
adc dl, dl |
adc eax, eax |
je 00007F89B473924Bh |
push edi |
mov eax, eax |
dec eax |
sub edi, eax |
mov al, byte ptr [edi] |
pop edi |
mov byte ptr [edi], al |
dec eax |
inc edi |
mov ebx, 00000002h |
jmp 00007F89B47391CAh |
mov eax, 00000001h |
add dl, dl |
jne 00007F89B4739249h |
mov dl, byte ptr [esi] |
dec eax |
inc esi |
adc dl, dl |
adc eax, eax |
add dl, dl |
jne 00007F89B4739249h |
mov dl, byte ptr [esi] |
dec eax |
inc esi |
adc dl, dl |
jc 00007F89B4739228h |
sub eax, ebx |
mov ebx, 00000001h |
jne 00007F89B4739270h |
mov ecx, 00000001h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x4c000 | 0x1455 | .edata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x4e05c | 0x88 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x4f000 | 0x1d8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x61f970 | 0x255c | .themida |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
0x1000 | 0x2c240 | 0x16e00 | 4007b8f47711eddb95246050e997f033 | False | 1.0000853825136613 | data | 7.981634718449392 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | |
0x2e000 | 0x2f17 | 0x1000 | 05a9ecec25a43055f58a9dc8c48f3dab | False | 0.947509765625 | data | 7.712416177556449 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | |
0x31000 | 0x128ba | 0x7600 | 66f4b7d127f4a61389e0e7a675711a05 | False | 0.985103283898305 | data | 7.928906236261539 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | |
0x44000 | 0x2ab8 | 0x400 | f44c495988cf7cdafd481de11068281f | False | 0.91015625 | data | 7.049437736197027 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
0x47000 | 0x2544 | 0x1600 | 13e2cf3fcadb3bde4865b6642ac4da52 | False | 0.9517045454545454 | data | 7.630760993826833 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | |
0x4a000 | 0x1e0 | 0x200 | 40667d94ca6f4a87260b802a1115fc65 | False | 0.798828125 | data | 6.044669778551108 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | |
0x4b000 | 0x960 | 0x600 | 5ffb6031326062539d9957cd71952780 | False | 0.8268229166666666 | data | 7.413929876408778 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | |
.edata | 0x4c000 | 0x1600 | 0x1600 | a4c527d8e319d2f6a51e61c5b117d68b | False | 0.3781960227272727 | data | 5.196842561195773 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.idata | 0x4e000 | 0x1000 | 0x200 | feea374249c57b6405e49847cf35c492 | False | 0.232421875 | data | 1.7412450910417339 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x4f000 | 0x1000 | 0x200 | 79b17b9dc2f482ebe4af8945ddf02bdd | False | 0.52734375 | data | 4.720822661998389 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.themida | 0x50000 | 0x5dc000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.boot | 0x62c000 | 0x368200 | 0x368200 | 6cc4148a2db5ea917d16e0f23c914a42 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0x4f058 | 0x17d | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5931758530183727 |
DLL | Import |
---|---|
kernel32.dll | GetModuleHandleA |
USER32.dll | MessageBoxW |
SHELL32.dll | SHGetKnownFolderPath |
Name | Ordinal | Address |
---|---|---|
CloseDriver | 1 | 0x180003ef0 |
DefDriverProc | 2 | 0x180003f10 |
DriverCallback | 3 | 0x180003f30 |
DrvGetModuleHandle | 4 | 0x180003f50 |
GetDriverModuleHandle | 5 | 0x180003f70 |
GetFileVersionInfoA | 6 | 0x180003cc0 |
GetFileVersionInfoByHandle | 7 | 0x180003cd0 |
GetFileVersionInfoExW | 8 | 0x180003cf0 |
GetFileVersionInfoSizeA | 9 | 0x180003d10 |
GetFileVersionInfoSizeExW | 10 | 0x180003d30 |
GetFileVersionInfoSizeW | 11 | 0x180003d50 |
GetFileVersionInfoW | 12 | 0x180003d70 |
OpenDriver | 13 | 0x180003f90 |
PlaySound | 14 | 0x180003fb0 |
PlaySoundA | 15 | 0x180003fd0 |
PlaySoundW | 16 | 0x180003ff0 |
SendDriverMessage | 17 | 0x180004010 |
VerFindFileA | 18 | 0x180003d90 |
VerFindFileW | 19 | 0x180003db0 |
VerInstallFileA | 20 | 0x180003dd0 |
VerInstallFileW | 21 | 0x180003df0 |
VerLanguageNameA | 22 | 0x180003e10 |
VerLanguageNameW | 23 | 0x180003e30 |
VerQueryValueA | 24 | 0x180003e50 |
VerQueryValueIndexA | 25 | 0x180003e90 |
VerQueryValueIndexW | 26 | 0x180003eb0 |
VerQueryValueW | 27 | 0x180003e70 |
WOWAppExit | 28 | 0x180004030 |
auxGetDevCapsA | 29 | 0x180004050 |
auxGetDevCapsW | 30 | 0x180004070 |
auxGetNumDevs | 31 | 0x180004090 |
auxGetVolume | 32 | 0x1800040b0 |
auxOutMessage | 33 | 0x1800040d0 |
auxSetVolume | 34 | 0x1800040f0 |
joyConfigChanged | 35 | 0x180004110 |
joyGetDevCapsA | 36 | 0x180004130 |
joyGetDevCapsW | 37 | 0x180004150 |
joyGetNumDevs | 38 | 0x180004170 |
joyGetPos | 39 | 0x180004190 |
joyGetPosEx | 40 | 0x1800041b0 |
joyGetThreshold | 41 | 0x1800041d0 |
joyReleaseCapture | 42 | 0x1800041f0 |
joySetCapture | 43 | 0x180004210 |
joySetThreshold | 44 | 0x180004230 |
mciDriverNotify | 45 | 0x180004250 |
mciDriverYield | 46 | 0x180004270 |
mciExecute | 47 | 0x180003ed0 |
mciFreeCommandResource | 48 | 0x180004290 |
mciGetCreatorTask | 49 | 0x1800042b0 |
mciGetDeviceIDA | 50 | 0x1800042d0 |
mciGetDeviceIDFromElementIDA | 51 | 0x1800042f0 |
mciGetDeviceIDFromElementIDW | 52 | 0x180004310 |
mciGetDeviceIDW | 53 | 0x180004330 |
mciGetDriverData | 54 | 0x180004350 |
mciGetErrorStringA | 55 | 0x180004370 |
mciGetErrorStringW | 56 | 0x180004390 |
mciGetYieldProc | 57 | 0x1800043b0 |
mciLoadCommandResource | 58 | 0x1800043d0 |
mciSendCommandA | 59 | 0x1800043f0 |
mciSendCommandW | 60 | 0x180004410 |
mciSendStringA | 61 | 0x180004430 |
mciSendStringW | 62 | 0x180004450 |
mciSetDriverData | 63 | 0x180004470 |
mciSetYieldProc | 64 | 0x180004490 |
midiConnect | 65 | 0x1800044b0 |
midiDisconnect | 66 | 0x1800044d0 |
midiInAddBuffer | 67 | 0x1800044f0 |
midiInClose | 68 | 0x180004510 |
midiInGetDevCapsA | 69 | 0x180004530 |
midiInGetDevCapsW | 70 | 0x180004550 |
midiInGetErrorTextA | 71 | 0x180004570 |
midiInGetErrorTextW | 72 | 0x180004590 |
midiInGetID | 73 | 0x1800045b0 |
midiInGetNumDevs | 74 | 0x1800045d0 |
midiInMessage | 75 | 0x1800045f0 |
midiInOpen | 76 | 0x180004610 |
midiInPrepareHeader | 77 | 0x180004630 |
midiInReset | 78 | 0x180004650 |
midiInStart | 79 | 0x180004670 |
midiInStop | 80 | 0x180004690 |
midiInUnprepareHeader | 81 | 0x1800046b0 |
midiOutCacheDrumPatches | 82 | 0x1800046d0 |
midiOutCachePatches | 83 | 0x1800046f0 |
midiOutClose | 84 | 0x180004710 |
midiOutGetDevCapsA | 85 | 0x180004730 |
midiOutGetDevCapsW | 86 | 0x180004750 |
midiOutGetErrorTextA | 87 | 0x180004770 |
midiOutGetErrorTextW | 88 | 0x180004790 |
midiOutGetID | 89 | 0x1800047b0 |
midiOutGetNumDevs | 90 | 0x1800047d0 |
midiOutGetVolume | 91 | 0x1800047f0 |
midiOutLongMsg | 92 | 0x180004810 |
midiOutMessage | 93 | 0x180004830 |
midiOutOpen | 94 | 0x180004850 |
midiOutPrepareHeader | 95 | 0x180004870 |
midiOutReset | 96 | 0x180004890 |
midiOutSetVolume | 97 | 0x1800048b0 |
midiOutShortMsg | 98 | 0x1800048d0 |
midiOutUnprepareHeader | 99 | 0x1800048f0 |
midiStreamClose | 100 | 0x180004910 |
midiStreamOpen | 101 | 0x180004930 |
midiStreamOut | 102 | 0x180004950 |
midiStreamPause | 103 | 0x180004970 |
midiStreamPosition | 104 | 0x180004990 |
midiStreamProperty | 105 | 0x1800049b0 |
midiStreamRestart | 106 | 0x1800049d0 |
midiStreamStop | 107 | 0x1800049f0 |
mixerClose | 108 | 0x180004a10 |
mixerGetControlDetailsA | 109 | 0x180004a30 |
mixerGetControlDetailsW | 110 | 0x180004a50 |
mixerGetDevCapsA | 111 | 0x180004a70 |
mixerGetDevCapsW | 112 | 0x180004a90 |
mixerGetID | 113 | 0x180004ab0 |
mixerGetLineControlsA | 114 | 0x180004ad0 |
mixerGetLineControlsW | 115 | 0x180004af0 |
mixerGetLineInfoA | 116 | 0x180004b10 |
mixerGetLineInfoW | 117 | 0x180004b30 |
mixerGetNumDevs | 118 | 0x180004b50 |
mixerMessage | 119 | 0x180004b70 |
mixerOpen | 120 | 0x180004b90 |
mixerSetControlDetails | 121 | 0x180004bb0 |
mmDrvInstall | 122 | 0x180004bd0 |
mmGetCurrentTask | 123 | 0x180004bf0 |
mmTaskBlock | 124 | 0x180004c10 |
mmTaskCreate | 125 | 0x180004c30 |
mmTaskSignal | 126 | 0x180004c50 |
mmTaskYield | 127 | 0x180004c70 |
mmioAdvance | 128 | 0x180004c90 |
mmioAscend | 129 | 0x180004cb0 |
mmioClose | 130 | 0x180004cd0 |
mmioCreateChunk | 131 | 0x180004cf0 |
mmioDescend | 132 | 0x180004d10 |
mmioFlush | 133 | 0x180004d30 |
mmioGetInfo | 134 | 0x180004d50 |
mmioInstallIOProcA | 135 | 0x180004d70 |
mmioInstallIOProcW | 136 | 0x180004d90 |
mmioOpenA | 137 | 0x180004db0 |
mmioOpenW | 138 | 0x180004dd0 |
mmioRead | 139 | 0x180004df0 |
mmioRenameA | 140 | 0x180004e10 |
mmioRenameW | 141 | 0x180004e30 |
mmioSeek | 142 | 0x180004e50 |
mmioSendMessage | 143 | 0x180004e70 |
mmioSetBuffer | 144 | 0x180004e90 |
mmioSetInfo | 145 | 0x180004eb0 |
mmioStringToFOURCCA | 146 | 0x180004ed0 |
mmioStringToFOURCCW | 147 | 0x180004ef0 |
mmioWrite | 148 | 0x180004f10 |
mmsystemGetVersion | 149 | 0x180004f30 |
sndPlaySoundA | 150 | 0x180004f50 |
sndPlaySoundW | 151 | 0x180004f70 |
timeBeginPeriod | 152 | 0x180004f90 |
timeEndPeriod | 153 | 0x180004fb0 |
timeGetDevCaps | 154 | 0x180004fd0 |
timeGetSystemTime | 155 | 0x180004ff0 |
timeGetTime | 156 | 0x180005010 |
timeKillEvent | 157 | 0x180005030 |
timeSetEvent | 158 | 0x180005050 |
waveInAddBuffer | 159 | 0x180005070 |
waveInClose | 160 | 0x180005090 |
waveInGetDevCapsA | 161 | 0x1800050b0 |
waveInGetDevCapsW | 162 | 0x1800050d0 |
waveInGetErrorTextA | 163 | 0x1800050f0 |
waveInGetErrorTextW | 164 | 0x180005110 |
waveInGetID | 165 | 0x180005130 |
waveInGetNumDevs | 166 | 0x180005150 |
waveInGetPosition | 167 | 0x180005170 |
waveInMessage | 168 | 0x180005190 |
waveInOpen | 169 | 0x1800051b0 |
waveInPrepareHeader | 170 | 0x1800051d0 |
waveInReset | 171 | 0x1800051f0 |
waveInStart | 172 | 0x180005210 |
waveInStop | 173 | 0x180005230 |
waveInUnprepareHeader | 174 | 0x180005250 |
waveOutBreakLoop | 175 | 0x180005270 |
waveOutClose | 176 | 0x180005290 |
waveOutGetDevCapsA | 177 | 0x1800052b0 |
waveOutGetDevCapsW | 178 | 0x1800052d0 |
waveOutGetErrorTextA | 179 | 0x1800052f0 |
waveOutGetErrorTextW | 180 | 0x180005310 |
waveOutGetID | 181 | 0x180005330 |
waveOutGetNumDevs | 182 | 0x180005350 |
waveOutGetPitch | 183 | 0x180005370 |
waveOutGetPlaybackRate | 184 | 0x180005390 |
waveOutGetPosition | 185 | 0x1800053b0 |
waveOutGetVolume | 186 | 0x1800053d0 |
waveOutMessage | 187 | 0x1800053f0 |
waveOutOpen | 188 | 0x180005410 |
waveOutPause | 189 | 0x180005430 |
waveOutPrepareHeader | 190 | 0x180005450 |
waveOutReset | 191 | 0x180005470 |
waveOutRestart | 192 | 0x180005490 |
waveOutSetPitch | 193 | 0x1800054b0 |
waveOutSetPlaybackRate | 194 | 0x1800054d0 |
waveOutSetVolume | 195 | 0x1800054f0 |
waveOutUnprepareHeader | 196 | 0x180005510 |
waveOutWrite | 197 | 0x180005530 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 23:42:04 |
Start date: | 24/10/2024 |
Path: | C:\Windows\System32\loaddll64.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6df120000 |
File size: | 165'888 bytes |
MD5 hash: | 763455F9DCB24DFEECC2B9D9F8D46D52 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 1 |
Start time: | 23:42:04 |
Start date: | 24/10/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 23:42:04 |
Start date: | 24/10/2024 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6b8330000 |
File size: | 289'792 bytes |
MD5 hash: | 8A2122E8162DBEF04694B9C3E0B6CDEE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 23:42:04 |
Start date: | 24/10/2024 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7f1fd0000 |
File size: | 71'680 bytes |
MD5 hash: | EF3179D498793BF4234F708D3BE28633 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 23:42:04 |
Start date: | 24/10/2024 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7f1fd0000 |
File size: | 71'680 bytes |
MD5 hash: | EF3179D498793BF4234F708D3BE28633 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 23:42:07 |
Start date: | 24/10/2024 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7f1fd0000 |
File size: | 71'680 bytes |
MD5 hash: | EF3179D498793BF4234F708D3BE28633 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 23:42:10 |
Start date: | 24/10/2024 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7f1fd0000 |
File size: | 71'680 bytes |
MD5 hash: | EF3179D498793BF4234F708D3BE28633 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |