Loading ...

Play interactive tourEdit tour

Windows Analysis Report widevinecdm.dll

Overview

General Information

Sample Name:widevinecdm.dll
Analysis ID:440120
MD5:7a59d939f28964955ac301db8518861c
SHA1:e00c28f3490484cff2f27c0acea36791173e0a0f
SHA256:787294fd7fe47f7fa7f735403928eaf96e04724207891fd6db727b2a5b58d340
Infos:

Most interesting Screenshot:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade analysis by execution special instruction which cause usermode exception
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
One or more processes crash
PE file contains sections with non-standard names
Uses 32bit PE files

Classification

Process Tree

  • System is w10x64
  • loaddll32.exe (PID: 7104 cmdline: loaddll32.exe 'C:\Users\user\Desktop\widevinecdm.dll' MD5: 542795ADF7CC08EFCF675D65310596E8)
    • cmd.exe (PID: 7144 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 6164 cmdline: rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6316 cmdline: rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,CreateCdmInstance MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6212 cmdline: rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,DeinitializeCdmModule MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 1320 cmdline: rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,GetCdmVersion MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6560 cmdline: rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,GetHandleVerifier MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 7024 cmdline: rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,InitializeCdmModule_4 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 660 cmdline: rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,VerifyCdmHost_0 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 6760 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 660 -s 712 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 6596 cmdline: rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',CreateCdmInstance MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6616 cmdline: rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',DeinitializeCdmModule MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 7096 cmdline: rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',GetCdmVersion MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6736 cmdline: rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',GetHandleVerifier MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6732 cmdline: rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',InitializeCdmModule_4 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results
Source: widevinecdm.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
Source: widevinecdm.dllStatic PE information: certificate valid
Source: widevinecdm.dllStatic PE information: certificate valid
Source: widevinecdm.dllStatic PE information: GUARD_CF, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000013.00000003.685123755.000000000549C000.00000004.00000001.sdmp
Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: sfc_os.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000013.00000003.690605732.0000000005751000.00000004.00000001.sdmp
Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdb source: WerFault.exe, 00000013.00000003.686000163.0000000003521000.00000004.00000001.sdmp
Source: Binary string: combase.pdbK source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: WINMMBASE.pdbG source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: shcore.pdb source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000013.00000003.690605732.0000000005751000.00000004.00000001.sdmp
Source: Binary string: advapi32.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: fltLib.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: shell32.pdb source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000013.00000003.690605732.0000000005751000.00000004.00000001.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000013.00000003.685476102.000000000352D000.00000004.00000001.sdmp
Source: Binary string: wimm32.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: mpr.pdb source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000013.00000003.690605732.0000000005751000.00000004.00000001.sdmp
Source: Binary string: setupapi.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: wsspicli.pdbA source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: imagehlp.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: oleaut32.pdbU source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: shcore.pdbk source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: WINMMBASE.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: profapi.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: widevinecdm.dll.pdbp? source: widevinecdm.dll
Source: Binary string: winspool.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000013.00000003.690605732.0000000005751000.00000004.00000001.sdmp
Source: Binary string: shell32.pdbk source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: sechost.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: propsys.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: cfgmgr32.pdbk source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdbk source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: winmm.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: powrprof.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: ole32.pdbS source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: msctf.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: winmm.pdbi source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: msctf.pdb1 source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: ole32.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: AcLayers.pdb source: WerFault.exe, 00000013.00000003.690605732.0000000005751000.00000004.00000001.sdmp
Source: Binary string: profapi.pdb(9 source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: shlwapi.pdbM source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000013.00000003.685476102.000000000352D000.00000004.00000001.sdmp
Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: combase.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: widevinecdm.dll.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp, widevinecdm.dll
Source: Binary string: wimm32.pdb_ source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: rundll32.pdb source: WerFault.exe, 00000013.00000003.690605732.0000000005751000.00000004.00000001.sdmp
Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: sfc.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 00000013.00000003.690605732.0000000005751000.00000004.00000001.sdmp
Source: Binary string: wuser32.pdb source: WerFault.exe, 00000013.00000003.690605732.0000000005751000.00000004.00000001.sdmp
Source: widevinecdm.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: widevinecdm.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
Source: widevinecdm.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: WerFault.exe, 00000013.00000003.700533403.0000000005410000.00000004.00000001.sdmpString found in binary or memory: http://crl.micro
Source: widevinecdm.dllString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
Source: widevinecdm.dllString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: widevinecdm.dllString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
Source: widevinecdm.dllString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: widevinecdm.dllString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: widevinecdm.dllString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
Source: widevinecdm.dllString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: widevinecdm.dllString found in binary or memory: http://ocsp.digicert.com0C
Source: widevinecdm.dllString found in binary or memory: http://ocsp.digicert.com0N
Source: widevinecdm.dllString found in binary or memory: http://ocsp.digicert.com0O
Source: widevinecdm.dllString found in binary or memory: http://www.digicert.com/CPS0
Source: widevinecdm.dllString found in binary or memory: https://www.digicert.com/CPS0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_6C376B6011_2_6C376B60
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 660 -s 712
Source: widevinecdm.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
Source: classification engineClassification label: mal48.evad.winDLL@28/4@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess660
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERB351.tmpJump to behavior
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,CreateCdmInstance
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\widevinecdm.dll'
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,CreateCdmInstance
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,DeinitializeCdmModule
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,GetCdmVersion
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,GetHandleVerifier
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,InitializeCdmModule_4
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,VerifyCdmHost_0
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',CreateCdmInstance
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',DeinitializeCdmModule
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',GetCdmVersion
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',GetHandleVerifier
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',InitializeCdmModule_4
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 660 -s 712
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,CreateCdmInstanceJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,DeinitializeCdmModuleJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,GetCdmVersionJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,GetHandleVerifierJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,InitializeCdmModule_4Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,VerifyCdmHost_0Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',CreateCdmInstanceJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',DeinitializeCdmModuleJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',GetCdmVersionJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',GetHandleVerifierJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',InitializeCdmModule_4Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',#1Jump to behavior
Source: widevinecdm.dllStatic PE information: certificate valid
Source: widevinecdm.dllStatic PE information: certificate valid
Source: widevinecdm.dllStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: widevinecdm.dllStatic file information: File size 9756272 > 1048576
Source: widevinecdm.dllStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x48e600
Source: widevinecdm.dllStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x494600
Source: widevinecdm.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: widevinecdm.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: widevinecdm.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: widevinecdm.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: widevinecdm.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: widevinecdm.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: widevinecdm.dllStatic PE information: GUARD_CF, DYNAMIC_BASE, NX_COMPAT
Source: widevinecdm.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000013.00000003.685123755.000000000549C000.00000004.00000001.sdmp
Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: sfc_os.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000013.00000003.690605732.0000000005751000.00000004.00000001.sdmp
Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdb source: WerFault.exe, 00000013.00000003.686000163.0000000003521000.00000004.00000001.sdmp
Source: Binary string: combase.pdbK source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: WINMMBASE.pdbG source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: shcore.pdb source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000013.00000003.690605732.0000000005751000.00000004.00000001.sdmp
Source: Binary string: advapi32.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: fltLib.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: shell32.pdb source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000013.00000003.690605732.0000000005751000.00000004.00000001.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000013.00000003.685476102.000000000352D000.00000004.00000001.sdmp
Source: Binary string: wimm32.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: mpr.pdb source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000013.00000003.690605732.0000000005751000.00000004.00000001.sdmp
Source: Binary string: setupapi.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: wsspicli.pdbA source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: imagehlp.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: oleaut32.pdbU source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: shcore.pdbk source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: WINMMBASE.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: profapi.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: widevinecdm.dll.pdbp? source: widevinecdm.dll
Source: Binary string: winspool.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000013.00000003.690605732.0000000005751000.00000004.00000001.sdmp
Source: Binary string: shell32.pdbk source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: sechost.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: propsys.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: cfgmgr32.pdbk source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdbk source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: winmm.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: powrprof.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: ole32.pdbS source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: msctf.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: winmm.pdbi source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: msctf.pdb1 source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: ole32.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: AcLayers.pdb source: WerFault.exe, 00000013.00000003.690605732.0000000005751000.00000004.00000001.sdmp
Source: Binary string: profapi.pdb(9 source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: shlwapi.pdbM source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000013.00000003.685476102.000000000352D000.00000004.00000001.sdmp
Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000013.00000003.690618666.00000000058C0000.00000004.00000040.sdmp
Source: Binary string: combase.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: widevinecdm.dll.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp, widevinecdm.dll
Source: Binary string: wimm32.pdb_ source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: rundll32.pdb source: WerFault.exe, 00000013.00000003.690605732.0000000005751000.00000004.00000001.sdmp
Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: sfc.pdb source: WerFault.exe, 00000013.00000003.690625280.00000000058C6000.00000004.00000040.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 00000013.00000003.690605732.0000000005751000.00000004.00000001.sdmp
Source: Binary string: wuser32.pdb source: WerFault.exe, 00000013.00000003.690605732.0000000005751000.00000004.00000001.sdmp
Source: widevinecdm.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: widevinecdm.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: widevinecdm.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: widevinecdm.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: widevinecdm.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: widevinecdm.dllStatic PE information: section name: .00cfg
Source: widevinecdm.dllStatic PE information: section name: .rodata
Source: widevinecdm.dllStatic PE information: section name: .voltbl
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion:

barindex
Tries to evade analysis by execution special instruction which cause usermode exceptionShow sources
Source: C:\Windows\SysWOW64\WerFault.exeSpecial instruction interceptor: First address: 000000006BB011EF instructions 0FC7C8 caused by: Known instruction #UD exception
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 1.4 %
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: WerFault.exe, 00000013.00000002.704377959.00000000058E0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: WerFault.exe, 00000013.00000002.703987662.00000000053EC000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
Source: WerFault.exe, 00000013.00000002.704377959.00000000058E0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: WerFault.exe, 00000013.00000002.704377959.00000000058E0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: WerFault.exe, 00000013.00000002.704377959.00000000058E0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.

Anti Debugging:

barindex
Tries to detect sandboxes and other dynamic analysis tools (window names)Show sources
Source: C:\Windows\SysWOW64\rundll32.exeOpen window title or class name: ollydbg
Source: C:\Windows\SysWOW64\rundll32.exeOpen window title or class name: windbgframeclass
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_6C4B82B6 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_6C4B82B6
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_6C4B4CF1 mov eax, dword ptr fs:[00000030h]11_2_6C4B4CF1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_6C4C2B7F mov eax, dword ptr fs:[00000030h]11_2_6C4C2B7F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_6C4B82B6 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_6C4B82B6
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_6C4A9178 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_6C4A9178
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',#1Jump to behavior
Source: rundll32.exe, 0000000B.00000000.677885446.00000000030E0000.00000002.00000001.sdmpBinary or memory string: Program Manager
Source: rundll32.exe, 0000000B.00000000.677885446.00000000030E0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
Source: rundll32.exe, 0000000B.00000000.677885446.00000000030E0000.00000002.00000001.sdmpBinary or memory string: Progman
Source: rundll32.exe, 0000000B.00000000.677885446.00000000030E0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_6C4C6ECD GetTimeZoneInformation,11_2_6C4C6ECD

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection12Rundll321OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion111LSASS MemorySecurity Software Discovery221Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection12Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSVirtualization/Sandbox Evasion111Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsSystem Information Discovery11SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 440120 Sample: widevinecdm.dll Startdate: 24/06/2021 Architecture: WINDOWS Score: 48 6 loaddll32.exe 1 2->6         started        process3 8 rundll32.exe 6->8         started        10 rundll32.exe 6->10         started        13 cmd.exe 1 6->13         started        15 9 other processes 6->15 signatures4 17 WerFault.exe 23 9 8->17         started        24 Tries to detect sandboxes and other dynamic analysis tools (window names) 10->24 20 rundll32.exe 13->20         started        process5 signatures6 22 Tries to evade analysis by execution special instruction which cause usermode exception 17->22

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
widevinecdm.dll0%VirustotalBrowse
widevinecdm.dll0%MetadefenderBrowse
widevinecdm.dll0%ReversingLabs

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://crl.micro0%URL Reputationsafe
http://crl.micro0%URL Reputationsafe
http://crl.micro0%URL Reputationsafe
http://crl.micro0%URL Reputationsafe

Domains and IPs

Contacted Domains

No contacted domains info

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://crl.microWerFault.exe, 00000013.00000003.700533403.0000000005410000.00000004.00000001.sdmpfalse
  • URL Reputation: safe
  • URL Reputation: safe
  • URL Reputation: safe
  • URL Reputation: safe
unknown

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:32.0.0 Black Diamond
Analysis ID:440120
Start date:24.06.2021
Start time:21:06:27
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 8m 26s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:widevinecdm.dll
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:33
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal48.evad.winDLL@28/4@0/0
EGA Information:
  • Successful, ratio: 33.3%
HDC Information:Failed
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Sleeps bigger than 120000ms are automatically reduced to 1000ms
  • Found application associated with file extension: .dll
  • Stop behavior analysis, all processes terminated
Warnings:
Show All
  • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, WerFault.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
  • Excluded IPs from analysis (whitelisted): 104.43.193.48, 52.147.198.201, 92.122.145.220, 20.50.102.62, 20.54.7.98, 40.112.88.60, 173.222.108.210, 173.222.108.226, 20.82.209.183, 80.67.82.211, 80.67.82.235
  • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, a767.dscg3.akamai.net, consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, neu-consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net
  • Not all processes where analyzed, report is missing behavior information

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_efc06b9b572afcfde3440b06ab753df1d6f59e6_82810a17_1a31cc57\Report.wer
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
Category:dropped
Size (bytes):12046
Entropy (8bit):3.767562030960362
Encrypted:false
SSDEEP:192:2pYi80oXpuHBUZMX4jed++/u7s0S274ItWcH:ziaXIBUZMX4jer/u7s0X4ItWcH
MD5:F6AB0432BAF256EB7894FD7D04EB6155
SHA1:2D7E1B3A3FDC38D26BBF967ED6BFF64314FFB4A6
SHA-256:15CD93BAEC2F78CF3993A02D42816064F5B280D6616F19B9379D5E22920D1BDB
SHA-512:93F109A3556B528B0C988A90EA588B6823C2D491856BB763599C401AA838053B4FDA138D4EA96F2F6569EA0CA3F6357280D938626A0B2BC61A044AEF6E037C94
Malicious:false
Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.6.9.0.3.5.2.5.3.9.9.4.7.3.5.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.6.9.0.3.5.2.5.8.6.9.7.8.4.7.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.4.7.9.6.3.3.8.-.5.3.3.6.-.4.2.7.1.-.9.c.7.c.-.7.5.a.b.5.b.5.a.b.d.4.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.6.4.7.1.2.b.9.-.e.2.6.8.-.4.0.a.5.-.8.b.3.4.-.f.9.e.5.2.8.7.6.0.8.0.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.2.9.4.-.0.0.0.1.-.0.0.1.b.-.e.7.3.8.-.1.3.2.c.2.c.6.9.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB351.tmp.dmp
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Thu Jun 24 19:07:35 2021, 0x1205a4 type
Category:dropped
Size (bytes):47044
Entropy (8bit):2.067694712004582
Encrypted:false
SSDEEP:192:u89I/0auKuY7cFdav1mLktv+XWNjJ/ro5C6ed7DOdj9MnjyZJEBSMOEOPnwa:GZuY3dmLkt6oNDo5CtVI9VESMO3wa
MD5:8569DE8DC6DBC633F0A3C6D095A449AF
SHA1:FD8815AF2337EA5C5DF9975BAD7F8CEEE67CCC19
SHA-256:DCA574F672A954913E99AA0CEC6CCC9167C515F01C594BAF4397E7ADA698C6FF
SHA-512:CE823AF26C771F712A833F4B38E207916AFF79A4A5F2243A051A9CA1A5669D79D04C64DB7797F2508CF2EFB89AE6E8C530DD071173FAD9CCD06DC8609C0FA1F8
Malicious:false
Preview: MDMP....... ..........`...................U...........B..............GenuineIntelW...........T..............`.............................0..=...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBA66.tmp.WERInternalMetadata.xml
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
Category:dropped
Size (bytes):8288
Entropy (8bit):3.692938023600922
Encrypted:false
SSDEEP:192:Rrl7r3GLNiFc6aT6Y8re6fgmfTnSp+prs89bw3nsfIGXm:RrlsNi+6+6Yx6fgmfTnSUw3sfV2
MD5:DA4930CF5910D1F883B7CCB6CF37A88D
SHA1:C96148E96E86EA599F6525B9EEB5BC10CAE18AAE
SHA-256:0E56376879BEE0433544AF301C72B5C29BEE8ABF2F6F1F9D0F670EE110679643
SHA-512:6098FC3ADC2C0246F250B9F9E2D36C6D515FBE659926DF2FF629F8FB4C8C78A66D2E3A3BEA318B933157487160F2C3E1BE5C0EE8E4CCB797708790E0F66E6A6A
Malicious:false
Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.6.0.<./.P.i.d.>.........
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBC5B.tmp.xml
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4640
Entropy (8bit):4.458756920107761
Encrypted:false
SSDEEP:48:cvIwSD8zs3tJgtWI9MqakWSC8BIn8fm8M4JCdsQzaFdwq+q8/PKSYW4SrSUd:uITf3Hnt9SNGsJ/wqcDWUd
MD5:2FDB109BB6E60D62155EDCD5205C4E6C
SHA1:F7B21CA1399C6654124838CD9F065E7BEF5428CF
SHA-256:0ECB580ABCD16F3496719208B63516D4CB5F04BBC448571D62DF8B7630441FE0
SHA-512:A286E5B4B6AD485F7F9BCB655A42C1A04918C864791C7230E54A6A49A948B510E9567DB02E821DCC07AF0AE761536F191EA6D0D7ECD7657A2E65B76685860E6A
Malicious:false
Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1048578" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..

Static File Info

General

File type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
Entropy (8bit):7.569873385904768
TrID:
  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
  • Generic Win/DOS Executable (2004/3) 0.20%
  • DOS Executable Generic (2002/1) 0.20%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:widevinecdm.dll
File size:9756272
MD5:7a59d939f28964955ac301db8518861c
SHA1:e00c28f3490484cff2f27c0acea36791173e0a0f
SHA256:787294fd7fe47f7fa7f735403928eaf96e04724207891fd6db727b2a5b58d340
SHA512:4b44027d08b0990052cd9942e6b0d85a9be1b603fc36e65fad07a1df56e719efdefe16e70eda44d23e39ebf0e46a436d31139716895a3e5ceaa190286f193e0b
SSDEEP:196608:SvzfCpdfdOiwEV525gxykVP5twd+FmYpcumk2s2s1M6vQ7QJxWuveJMjJ:SYxNBtwiJtmk2sH2oQ7QJxpeY
File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...S~.`.........."!......H...K.......F.......................................@.....t.....@A....................................x..

File Icon

Icon Hash:74f0e4ecccdce0e4

Static PE Info

General

Entrypoint:0x1046a1d0
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x10000000
Subsystem:windows cui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
DLL Characteristics:GUARD_CF, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x60107E53 [Tue Jan 26 20:40:51 2021 UTC]
TLS Callbacks:0x1039ff30, 0x102c33f0, 0x10468700
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:0b5d0e0a9e6cf85570f75da0455465ed

Authenticode Signature

Signature Valid:true
Signature Issuer:CN=DigiCert SHA2 Assured ID Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US
Signature Validation Error:The operation completed successfully
Error Number:0
Not Before, Not After
  • 11/7/2018 1:00:00 AM 11/17/2021 1:00:00 PM
Subject Chain
  • CN=Google LLC, O=Google LLC, L=Mountain View, S=ca, C=US
Version:3
Thumbprint MD5:388E38D27B96846D61081CFBF5FF7DC2
Thumbprint SHA-1:CB7E84887F3C6015FE7EDFB4F8F36DF7DC10590E
Thumbprint SHA-256:3CA4FC0489E3E25B1A6A8514A9486B257FD8B80B9F3181AF20A34FA9EF5AB282
Serial:0C15BE4A15BB0903C901B1D6C265302F

Entrypoint Preview

Instruction
push ebp
mov ebp, esp
cmp dword ptr [ebp+0Ch], 01h
jne 00007F15D0CF1C17h
call 00007F15D0CF1C2Ah
push dword ptr [ebp+10h]
push dword ptr [ebp+0Ch]
push dword ptr [ebp+08h]
call 00007F15D0CF1AE7h
add esp, 0Ch
pop ebp
retn 000Ch
mov ecx, dword ptr [109263E8h]
push esi
push edi
mov edi, BB40E64Eh
mov esi, FFFF0000h
cmp ecx, edi
je 00007F15D0CF1C16h
test esi, ecx
jne 00007F15D0CF1C38h
call 00007F15D0CF1C41h
mov ecx, eax
cmp ecx, edi
jne 00007F15D0CF1C19h
mov ecx, BB40E64Fh
jmp 00007F15D0CF1C20h
test esi, ecx
jne 00007F15D0CF1C1Ch
or eax, 00004711h
shl eax, 10h
or ecx, eax
mov dword ptr [109263E8h], ecx
not ecx
pop edi
mov dword ptr [109263E4h], ecx
pop esi
ret
push ebp
mov ebp, esp
sub esp, 14h
and dword ptr [ebp-0Ch], 00000000h
lea eax, dword ptr [ebp-0Ch]
and dword ptr [ebp-08h], 00000000h
push eax
call dword ptr [109213DCh]
mov eax, dword ptr [ebp-08h]
xor eax, dword ptr [ebp-0Ch]
mov dword ptr [ebp-04h], eax
call dword ptr [10921378h]
xor dword ptr [ebp-04h], eax
call dword ptr [10921370h]
xor dword ptr [ebp-04h], eax
lea eax, dword ptr [ebp-14h]
push eax
call dword ptr [1092146Ch]
mov eax, dword ptr [ebp-10h]
lea ecx, dword ptr [ebp-04h]
xor eax, dword ptr [ebp-14h]
xor eax, dword ptr [ebp-04h]
xor eax, ecx
leave
ret
xor eax, eax
inc eax
retn 000Ch
push 113E3B58h
call dword ptr [00000000h]

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x920f140xe6.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0x920ffa0x78.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x13e90000x488.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x94c4000x1a70.data
IMAGE_DIRECTORY_ENTRY_BASERELOC0x13ea0000x24bc4.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x91d57c0x1c.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x91d4800x18.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x90dc300xb8.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x9212ec0x278.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x48e49c0x48e600unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rdata0x4900000x4945bc0x494600unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x9250000xabf3b40x3400unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.00cfg0x13e50000x40x200False0.033203125data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rodata0x13e60000x7400x800False0.15673828125DOS executable (COM, 0x8C-variant)4.22321300602IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.tls0x13e70000xa90x200False0.04296875data0.136463791656IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.voltbl0x13e80000xf00x200False0.498046875data3.73745911162
.rsrc0x13e90000x4880x600False0.313802083333data2.69675329032IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x13ea0000x24bc40x24c00False0.405379730017data6.50319371904IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_VERSION0x13e90600x428dataEnglishUnited States

Imports

DLLImport
KERNEL32.dllAcquireSRWLockExclusive, AcquireSRWLockShared, AddVectoredExceptionHandler, CloseHandle, CompareStringW, CreateEventW, CreateFileW, CreateSemaphoreW, CreateThread, DecodePointer, DeleteCriticalSection, DuplicateHandle, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, ExitThread, ExpandEnvironmentStringsW, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentDirectoryW, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetDateFormatW, GetEnvironmentStringsW, GetExitCodeThread, GetFileSizeEx, GetFileType, GetFinalPathNameByHandleW, GetLastError, GetLocalTime, GetLocaleInfoW, GetLogicalDriveStringsW, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetNativeSystemInfo, GetOEMCP, GetProcAddress, GetProcessHeap, GetProcessTimes, GetProductInfo, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemInfo, GetSystemTimeAsFileTime, GetThreadId, GetThreadPriority, GetTickCount, GetTimeFormatW, GetTimeZoneInformation, GetUserDefaultLCID, GetVersionExW, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitOnceBeginInitialize, InitOnceComplete, InitOnceExecuteOnce, InitializeConditionVariable, InitializeCriticalSection, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, InitializeSRWLock, InterlockedFlushSList, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, IsWow64Process, LCMapStringW, LeaveCriticalSection, LoadLibraryExA, LoadLibraryExW, LoadLibraryW, MultiByteToWideChar, OutputDebugStringA, OutputDebugStringW, QueryDosDeviceW, QueryPerformanceCounter, QueryPerformanceFrequency, QueryThreadCycleTime, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, ReleaseSRWLockShared, ReleaseSemaphore, RemoveVectoredExceptionHandler, ResetEvent, RtlCaptureStackBackTrace, RtlUnwind, SetCurrentDirectoryW, SetEnvironmentVariableW, SetEvent, SetFilePointerEx, SetLastError, SetStdHandle, SetThreadPriority, SetUnhandledExceptionFilter, Sleep, SleepConditionVariableCS, SleepConditionVariableSRW, TerminateProcess, TerminateThread, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryAcquireSRWLockExclusive, TryEnterCriticalSection, UnhandledExceptionFilter, VirtualProtect, VirtualQuery, WaitForSingleObject, WaitForSingleObjectEx, WakeAllConditionVariable, WakeConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile
ADVAPI32.dllEventRegister, EventUnregister, EventWrite, RegCloseKey, RegOpenKeyExW, RegQueryValueExW, SystemFunction036
WINMM.dlltimeBeginPeriod, timeEndPeriod, timeGetTime
USER32.dllCharUpperW, EnumDisplayMonitors, FindWindowA, GetMonitorInfoW
ole32.dllCoTaskMemFree

Exports

NameOrdinalAddress
CreateCdmInstance10x10001080
DeinitializeCdmModule20x10001060
GetCdmVersion30x10001200
GetHandleVerifier40x10333800
InitializeCdmModule_450x10001030
VerifyCdmHost_060x10001210

Version Infos

DescriptionData
LegalCopyrightCopyright 2012 Google LLC. All rights reserved.
InternalNamewidevinecdm
CompanyShortNameGoogle
FileVersion4.10.2209.0
CompanyNameGoogle LLC
ProductShortNameWidevine CDM
ProductNameWidevine Content Decryption Module
LastChange0
ProductVersion4.10.2209.0
FileDescriptionWidevine Content Decryption Module
OriginalFilenamewidevinecdm.dll
Official Build0
Translation0x0409 0x04b0

Possible Origin

Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

Network Port Distribution

UDP Packets

TimestampSource PortDest PortSource IPDest IP
Jun 24, 2021 21:07:03.837800980 CEST4925753192.168.2.48.8.8.8
Jun 24, 2021 21:07:03.901772022 CEST53492578.8.8.8192.168.2.4
Jun 24, 2021 21:07:04.747138023 CEST6238953192.168.2.48.8.8.8
Jun 24, 2021 21:07:04.801808119 CEST53623898.8.8.8192.168.2.4
Jun 24, 2021 21:07:05.588140011 CEST4991053192.168.2.48.8.8.8
Jun 24, 2021 21:07:05.652739048 CEST53499108.8.8.8192.168.2.4
Jun 24, 2021 21:07:05.740221024 CEST5585453192.168.2.48.8.8.8
Jun 24, 2021 21:07:05.797275066 CEST53558548.8.8.8192.168.2.4
Jun 24, 2021 21:07:06.483484983 CEST6454953192.168.2.48.8.8.8
Jun 24, 2021 21:07:06.538487911 CEST53645498.8.8.8192.168.2.4
Jun 24, 2021 21:07:07.280432940 CEST6315353192.168.2.48.8.8.8
Jun 24, 2021 21:07:07.332520008 CEST53631538.8.8.8192.168.2.4
Jun 24, 2021 21:07:08.372864008 CEST5299153192.168.2.48.8.8.8
Jun 24, 2021 21:07:08.423280954 CEST53529918.8.8.8192.168.2.4
Jun 24, 2021 21:07:09.512891054 CEST5370053192.168.2.48.8.8.8
Jun 24, 2021 21:07:09.567929029 CEST53537008.8.8.8192.168.2.4
Jun 24, 2021 21:07:10.328118086 CEST5172653192.168.2.48.8.8.8
Jun 24, 2021 21:07:10.374236107 CEST53517268.8.8.8192.168.2.4
Jun 24, 2021 21:07:11.213555098 CEST5679453192.168.2.48.8.8.8
Jun 24, 2021 21:07:11.262924910 CEST53567948.8.8.8192.168.2.4
Jun 24, 2021 21:07:12.071068048 CEST5653453192.168.2.48.8.8.8
Jun 24, 2021 21:07:12.129436970 CEST53565348.8.8.8192.168.2.4
Jun 24, 2021 21:07:12.870992899 CEST5662753192.168.2.48.8.8.8
Jun 24, 2021 21:07:12.918900013 CEST53566278.8.8.8192.168.2.4
Jun 24, 2021 21:07:13.771217108 CEST5662153192.168.2.48.8.8.8
Jun 24, 2021 21:07:13.817639112 CEST53566218.8.8.8192.168.2.4
Jun 24, 2021 21:07:14.664376020 CEST6311653192.168.2.48.8.8.8
Jun 24, 2021 21:07:14.719182968 CEST53631168.8.8.8192.168.2.4
Jun 24, 2021 21:07:15.565291882 CEST6407853192.168.2.48.8.8.8
Jun 24, 2021 21:07:15.621052027 CEST53640788.8.8.8192.168.2.4
Jun 24, 2021 21:07:16.386956930 CEST6480153192.168.2.48.8.8.8
Jun 24, 2021 21:07:16.447460890 CEST53648018.8.8.8192.168.2.4
Jun 24, 2021 21:07:17.304117918 CEST6172153192.168.2.48.8.8.8
Jun 24, 2021 21:07:17.363568068 CEST53617218.8.8.8192.168.2.4
Jun 24, 2021 21:07:18.124691963 CEST5125553192.168.2.48.8.8.8
Jun 24, 2021 21:07:18.173938036 CEST53512558.8.8.8192.168.2.4
Jun 24, 2021 21:07:18.909158945 CEST6152253192.168.2.48.8.8.8
Jun 24, 2021 21:07:18.961997986 CEST53615228.8.8.8192.168.2.4
Jun 24, 2021 21:07:19.827653885 CEST5233753192.168.2.48.8.8.8
Jun 24, 2021 21:07:19.877238989 CEST53523378.8.8.8192.168.2.4
Jun 24, 2021 21:07:34.551573038 CEST5504653192.168.2.48.8.8.8
Jun 24, 2021 21:07:34.606359959 CEST53550468.8.8.8192.168.2.4
Jun 24, 2021 21:07:39.932852030 CEST4961253192.168.2.48.8.8.8
Jun 24, 2021 21:07:39.990175962 CEST53496128.8.8.8192.168.2.4
Jun 24, 2021 21:07:52.792403936 CEST4928553192.168.2.48.8.8.8
Jun 24, 2021 21:07:52.942918062 CEST53492858.8.8.8192.168.2.4
Jun 24, 2021 21:07:53.603702068 CEST5060153192.168.2.48.8.8.8
Jun 24, 2021 21:07:53.672935963 CEST53506018.8.8.8192.168.2.4
Jun 24, 2021 21:07:54.152818918 CEST6087553192.168.2.48.8.8.8
Jun 24, 2021 21:07:54.311340094 CEST53608758.8.8.8192.168.2.4
Jun 24, 2021 21:07:54.969229937 CEST5644853192.168.2.48.8.8.8
Jun 24, 2021 21:07:55.023768902 CEST53564488.8.8.8192.168.2.4
Jun 24, 2021 21:07:55.493412971 CEST5917253192.168.2.48.8.8.8
Jun 24, 2021 21:07:55.563376904 CEST53591728.8.8.8192.168.2.4
Jun 24, 2021 21:07:56.504024029 CEST6242053192.168.2.48.8.8.8
Jun 24, 2021 21:07:56.560173988 CEST53624208.8.8.8192.168.2.4
Jun 24, 2021 21:07:57.302853107 CEST6057953192.168.2.48.8.8.8
Jun 24, 2021 21:07:57.357652903 CEST53605798.8.8.8192.168.2.4
Jun 24, 2021 21:07:58.003144026 CEST5018353192.168.2.48.8.8.8
Jun 24, 2021 21:07:58.058485985 CEST53501838.8.8.8192.168.2.4
Jun 24, 2021 21:07:59.211174011 CEST6153153192.168.2.48.8.8.8
Jun 24, 2021 21:07:59.261657000 CEST53615318.8.8.8192.168.2.4
Jun 24, 2021 21:08:00.131247997 CEST4922853192.168.2.48.8.8.8
Jun 24, 2021 21:08:00.190673113 CEST53492288.8.8.8192.168.2.4
Jun 24, 2021 21:08:00.746334076 CEST5979453192.168.2.48.8.8.8
Jun 24, 2021 21:08:00.803313971 CEST53597948.8.8.8192.168.2.4
Jun 24, 2021 21:08:01.504477024 CEST5591653192.168.2.48.8.8.8
Jun 24, 2021 21:08:01.563810110 CEST53559168.8.8.8192.168.2.4
Jun 24, 2021 21:08:09.098278999 CEST5275253192.168.2.48.8.8.8
Jun 24, 2021 21:08:09.147910118 CEST53527528.8.8.8192.168.2.4
Jun 24, 2021 21:08:09.300215960 CEST6054253192.168.2.48.8.8.8
Jun 24, 2021 21:08:09.365307093 CEST53605428.8.8.8192.168.2.4
Jun 24, 2021 21:08:13.004371881 CEST6068953192.168.2.48.8.8.8
Jun 24, 2021 21:08:13.066945076 CEST53606898.8.8.8192.168.2.4
Jun 24, 2021 21:08:43.222981930 CEST6420653192.168.2.48.8.8.8
Jun 24, 2021 21:08:43.269803047 CEST53642068.8.8.8192.168.2.4
Jun 24, 2021 21:08:44.854011059 CEST5090453192.168.2.48.8.8.8
Jun 24, 2021 21:08:44.908883095 CEST53509048.8.8.8192.168.2.4

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

High Level Behavior Distribution

Click to dive into process behavior distribution

Behavior

Click to jump to process

System Behavior

General

Start time:21:07:09
Start date:24/06/2021
Path:C:\Windows\System32\loaddll32.exe
Wow64 process (32bit):true
Commandline:loaddll32.exe 'C:\Users\user\Desktop\widevinecdm.dll'
Imagebase:0xf80000
File size:116736 bytes
MD5 hash:542795ADF7CC08EFCF675D65310596E8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:21:07:09
Start date:24/06/2021
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',#1
Imagebase:0x11d0000
File size:232960 bytes
MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:21:07:10
Start date:24/06/2021
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,CreateCdmInstance
Imagebase:0xb30000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:21:07:10
Start date:24/06/2021
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',#1
Imagebase:0xb30000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:21:07:13
Start date:24/06/2021
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,DeinitializeCdmModule
Imagebase:0xb30000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:21:07:17
Start date:24/06/2021
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,GetCdmVersion
Imagebase:0xb30000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:21:07:20
Start date:24/06/2021
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,GetHandleVerifier
Imagebase:0xb30000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:21:07:23
Start date:24/06/2021
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,InitializeCdmModule_4
Imagebase:0xb30000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:21:07:27
Start date:24/06/2021
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\widevinecdm.dll,VerifyCdmHost_0
Imagebase:0xb30000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:21:07:30
Start date:24/06/2021
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',CreateCdmInstance
Imagebase:0xb30000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:21:07:30
Start date:24/06/2021
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',DeinitializeCdmModule
Imagebase:0xb30000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:21:07:30
Start date:24/06/2021
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',GetCdmVersion
Imagebase:0xb30000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:21:07:31
Start date:24/06/2021
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',GetHandleVerifier
Imagebase:0xb30000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:21:07:31
Start date:24/06/2021
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe 'C:\Users\user\Desktop\widevinecdm.dll',InitializeCdmModule_4
Imagebase:0xb30000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:21:07:31
Start date:24/06/2021
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 660 -s 712
Imagebase:0xc90000
File size:434592 bytes
MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

Disassembly

Code Analysis

Reset < >

    Execution Graph

    Execution Coverage:0.6%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:7.2%
    Total number of Nodes:880
    Total number of Limit Nodes:3

    Graph

    execution_graph 3678 6c2004a0 3683 6c2004ea 3678->3683 3682 6c2004e3 3684 6c200525 3683->3684 3685 6c4a84d1 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 3684->3685 3686 6c2004d6 3685->3686 3687 6c4a84d1 3686->3687 3688 6c4a84da 3687->3688 3689 6c4a84dc IsProcessorFeaturePresent 3687->3689 3688->3682 3691 6c4a9093 3689->3691 3694 6c4a9178 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 3691->3694 3693 6c4a9176 3693->3682 3694->3693 3695 6c041080 3696 6c041185 3695->3696 3697 6c0410a2 3695->3697 3698 6c4a84d1 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 3696->3698 3697->3696 3709 6c4a8416 3697->3709 3699 6c04118f 3698->3699 3701 6c0410c0 3719 6c1fc4f8 3701->3719 3704 6c4a8416 3 API calls 3705 6c0410dc 3704->3705 3726 6c041199 3705->3726 3707 6c04110b 3731 6c1fd190 3707->3731 3711 6c4a841b 3709->3711 3712 6c4a8435 3711->3712 3714 6c4a8437 3711->3714 3738 6c4b4b88 3711->3738 3741 6c2775a0 3711->3741 3712->3701 3715 6c4a8f79 3714->3715 3745 6c4aa324 3714->3745 3716 6c4aa324 RaiseException 3715->3716 3718 6c4a8f96 3716->3718 3718->3701 3720 6c4a8416 3 API calls 3719->3720 3721 6c1fc531 3720->3721 3748 6c2ea45c 3721->3748 3723 6c1fc54a 3724 6c4a84d1 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 3723->3724 3725 6c0410cd 3724->3725 3725->3704 3727 6c4a8416 3 API calls 3726->3727 3728 6c0411b7 3727->3728 3729 6c4a84d1 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 3728->3729 3730 6c0411dc 3729->3730 3730->3707 3732 6c4a8416 3 API calls 3731->3732 3733 6c1fd1b1 3732->3733 3734 6c4a8416 3 API calls 3733->3734 3735 6c1fd1da 3734->3735 3736 6c4a8416 3 API calls 3735->3736 3737 6c1fd206 3736->3737 3739 6c4b4bc4 __dosmaperr 2 API calls 3738->3739 3740 6c4b4b93 3739->3740 3740->3711 3743 6c2775b0 3741->3743 3742 6c2775d5 3742->3711 3743->3742 3744 6c301880 __dosmaperr 2 API calls 3743->3744 3744->3743 3746 6c4aa36b RaiseException 3745->3746 3747 6c4aa33e 3745->3747 3746->3715 3747->3746 3749 6c2ea47c 3748->3749 3752 6c276610 3749->3752 3751 6c2ea488 3751->3723 3754 6c276640 3752->3754 3753 6c4a84d1 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 3755 6c27675b 3753->3755 3754->3753 3755->3751 4619 6c041060 4620 6c041068 4619->4620 4623 6c21566a 4620->4623 4622 6c041000 4624 6c215678 4623->4624 4626 6c215682 4623->4626 4627 6c215776 4624->4627 4626->4622 4628 6c215782 4627->4628 4634 6c2157a0 4627->4634 4629 6c215776 FreeLibrary 4628->4629 4630 6c21578b 4629->4630 4631 6c215776 FreeLibrary 4630->4631 4632 6c215795 4631->4632 4635 6c2f33b0 4632->4635 4634->4626 4636 6c2f33dc 4635->4636 4637 6c2f33c0 4635->4637 4636->4634 4638 6c2f33cf 4637->4638 4640 6c370e90 FreeLibrary 4637->4640 4638->4634 4640->4638 4641 6c4c7069 4642 6c4c3ade 42 API calls 4641->4642 4643 6c4c707e 4642->4643 4644 6c4b8282 11 API calls 4643->4644 4645 6c4c70af 4644->4645 4646 6c4bf960 4647 6c4bf972 4646->4647 4649 6c4bf980 @_EH4_CallFilterFunc@8 4646->4649 4648 6c4a84d1 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 4647->4648 4648->4649 3756 6c3d3eb0 3759 6c43adf0 RtlCaptureStackBackTrace 3756->3759 3758 6c3d3ec1 3759->3758 3760 6c4b7645 3765 6c4ad76b 3760->3765 3763 6c4b7669 3766 6c4ad78b 3765->3766 3767 6c4ad782 3765->3767 3766->3767 3776 6c4c012a GetLastError 3766->3776 3767->3763 3773 6c4c0776 3767->3773 3769 6c4ad7ab 3818 6c4c06ae 3769->3818 4192 6c4c0e21 3773->4192 3777 6c4c0147 3776->3777 3778 6c4c0141 3776->3778 3782 6c4c014d __freea 3777->3782 3831 6c4c0903 3777->3831 3826 6c4c08c4 3778->3826 3784 6c4c01cc SetLastError 3782->3784 3786 6c4c01db 3784->3786 3787 6c4c01e1 3784->3787 3786->3769 3845 6c4b91e7 3787->3845 3788 6c4c017d 3792 6c4c0903 __dosmaperr 6 API calls 3788->3792 3789 6c4c0194 3791 6c4c0903 __dosmaperr 6 API calls 3789->3791 3793 6c4c01a0 3791->3793 3792->3782 3796 6c4c01a4 3793->3796 3797 6c4c01b5 3793->3797 3794 6c4c01f8 3801 6c4c0903 __dosmaperr 6 API calls 3794->3801 3803 6c4c01fe __freea 3794->3803 3799 6c4c0903 __dosmaperr 6 API calls 3796->3799 3840 6c4c03dc 3797->3840 3798 6c4c08c4 __dosmaperr 6 API calls 3798->3794 3799->3782 3802 6c4c0212 3801->3802 3802->3803 3805 6c277650 __dosmaperr 2 API calls 3802->3805 3804 6c4b91e7 40 API calls 3803->3804 3810 6c4c0277 3803->3810 3806 6c4c0280 3804->3806 3807 6c4c0222 3805->3807 3808 6c4c023f 3807->3808 3809 6c4c022a 3807->3809 3812 6c4c0903 __dosmaperr 6 API calls 3808->3812 3811 6c4c0903 __dosmaperr 6 API calls 3809->3811 3810->3769 3811->3803 3813 6c4c024b 3812->3813 3814 6c4c025e 3813->3814 3815 6c4c024f 3813->3815 3817 6c4c03dc __dosmaperr 2 API calls 3814->3817 3816 6c4c0903 __dosmaperr 6 API calls 3815->3816 3816->3803 3817->3803 3819 6c4ad7c1 3818->3819 3820 6c4c06c1 3818->3820 3822 6c4c06db 3819->3822 3820->3819 4041 6c4c3fda 3820->4041 3823 6c4c0703 3822->3823 3824 6c4c06ee 3822->3824 3823->3767 3824->3823 4057 6c4c12c9 3824->4057 3854 6c4c0d9e 3826->3854 3828 6c4c08e0 3829 6c4c08e9 3828->3829 3830 6c4c08fb TlsGetValue 3828->3830 3829->3777 3832 6c4c0d9e __dosmaperr 5 API calls 3831->3832 3833 6c4c091f 3832->3833 3834 6c4c093d TlsSetValue 3833->3834 3835 6c4c0165 3833->3835 3835->3782 3836 6c277650 3835->3836 3837 6c277660 3836->3837 3838 6c277689 3837->3838 3839 6c301880 __dosmaperr 2 API calls 3837->3839 3838->3788 3838->3789 3839->3837 3867 6c4c0542 3840->3867 3889 6c4bcf0c 3845->3889 3850 6c4b926c 3850->3794 3850->3798 3851 6c2775a0 2 API calls 3852 6c4b9250 3851->3852 3852->3850 3895 6c4bf0c9 3852->3895 3855 6c4c0dcc 3854->3855 3859 6c4c0dc8 __dosmaperr 3854->3859 3855->3859 3860 6c4c0cd7 3855->3860 3858 6c4c0de6 GetProcAddress 3858->3859 3859->3828 3865 6c4c0ce8 __dosmaperr 3860->3865 3861 6c4c0d06 LoadLibraryExW 3862 6c4c0d21 GetLastError 3861->3862 3861->3865 3862->3865 3863 6c4c0d7c FreeLibrary 3863->3865 3864 6c4c0d93 3864->3858 3864->3859 3865->3861 3865->3863 3865->3864 3866 6c4c0d54 LoadLibraryExW 3865->3866 3866->3865 3868 6c4c054e __dosmaperr 3867->3868 3879 6c4c1081 EnterCriticalSection 3868->3879 3870 6c4c0558 3880 6c4c0588 3870->3880 3873 6c4c0594 3874 6c4c05a0 __dosmaperr 3873->3874 3884 6c4c1081 EnterCriticalSection 3874->3884 3876 6c4c05aa __dosmaperr 3885 6c4c05e2 3876->3885 3879->3870 3883 6c4c1098 LeaveCriticalSection 3880->3883 3882 6c4c044a 3882->3873 3883->3882 3884->3876 3888 6c4c1098 LeaveCriticalSection 3885->3888 3887 6c4c0473 3887->3782 3888->3887 3904 6c4bd190 3889->3904 3892 6c4b4c27 3915 6c4b4d46 3892->3915 3896 6c4bf0e4 3895->3896 3897 6c4bf0d6 3895->3897 3978 6c4b7573 3896->3978 3897->3896 3902 6c4bf0fb 3897->3902 3899 6c4bf0ec 3981 6c4b8272 3899->3981 3901 6c4bf0f6 3901->3850 3902->3901 3903 6c4b7573 __dosmaperr 11 API calls 3902->3903 3903->3899 3905 6c4bd19c __dosmaperr 3904->3905 3910 6c4c1081 EnterCriticalSection 3905->3910 3907 6c4bd1aa 3911 6c4bd1e8 3907->3911 3910->3907 3914 6c4c1098 LeaveCriticalSection 3911->3914 3913 6c4b91ec 3913->3892 3914->3913 3916 6c4b4d54 3915->3916 3925 6c4b4d65 3915->3925 3926 6c4b4c5b GetModuleHandleW 3916->3926 3921 6c4b4c38 3921->3850 3921->3851 3933 6c4b4e84 3925->3933 3927 6c4b4c67 3926->3927 3927->3925 3928 6c4b4c9e GetModuleHandleExW 3927->3928 3929 6c4b4cbd GetProcAddress 3928->3929 3930 6c4b4cd2 3928->3930 3929->3930 3931 6c4b4cef 3930->3931 3932 6c4b4ce6 FreeLibrary 3930->3932 3931->3925 3932->3931 3934 6c4b4e90 __dosmaperr 3933->3934 3949 6c4c1081 EnterCriticalSection 3934->3949 3936 6c4b4e9a 3950 6c4b4daa 3936->3950 3938 6c4b4ea7 3954 6c4b4ec5 3938->3954 3941 6c4b4cf1 3971 6c4c2b7f GetPEB 3941->3971 3944 6c4b4d20 3947 6c4b4c9e 3 API calls 3944->3947 3945 6c4b4d00 GetPEB 3945->3944 3946 6c4b4d10 GetCurrentProcess TerminateProcess 3945->3946 3946->3944 3948 6c4b4d28 ExitProcess 3947->3948 3949->3936 3951 6c4b4db6 __dosmaperr 3950->3951 3953 6c4b4e17 3951->3953 3957 6c4b6e71 3951->3957 3953->3938 3970 6c4c1098 LeaveCriticalSection 3954->3970 3956 6c4b4d99 3956->3921 3956->3941 3960 6c4b7112 3957->3960 3961 6c4b711e __dosmaperr 3960->3961 3966 6c4c1081 EnterCriticalSection 3961->3966 3963 6c4b712c 3967 6c4b7161 3963->3967 3966->3963 3968 6c4c1098 __dosmaperr LeaveCriticalSection 3967->3968 3969 6c4b6e9c 3968->3969 3969->3953 3970->3956 3972 6c4b4cfb 3971->3972 3973 6c4c2b99 3971->3973 3972->3944 3972->3945 3975 6c4c0c15 3973->3975 3976 6c4c0d9e __dosmaperr 5 API calls 3975->3976 3977 6c4c0c31 3976->3977 3977->3972 3984 6c4c0281 GetLastError 3978->3984 3980 6c4b7578 3980->3899 4003 6c4b83fe 3981->4003 3983 6c4b827e 3983->3901 3985 6c4c0298 3984->3985 3986 6c4c029e 3984->3986 3987 6c4c08c4 __dosmaperr 6 API calls 3985->3987 3988 6c4c0903 __dosmaperr 6 API calls 3986->3988 3998 6c4c02a4 __freea 3986->3998 3987->3986 3989 6c4c02bc 3988->3989 3990 6c277650 __dosmaperr 2 API calls 3989->3990 3989->3998 3992 6c4c02cc 3990->3992 3991 6c4c0323 SetLastError 3991->3980 3993 6c4c02eb 3992->3993 3994 6c4c02d4 3992->3994 3995 6c4c0903 __dosmaperr 6 API calls 3993->3995 3996 6c4c0903 __dosmaperr 6 API calls 3994->3996 3997 6c4c02f7 3995->3997 3996->3998 3999 6c4c030c 3997->3999 4000 6c4c02fb 3997->4000 3998->3991 4002 6c4c03dc __dosmaperr 2 API calls 3999->4002 4001 6c4c0903 __dosmaperr 6 API calls 4000->4001 4001->3998 4002->3998 4004 6c4c0281 __dosmaperr 11 API calls 4003->4004 4005 6c4b8409 4004->4005 4006 6c4b8417 4005->4006 4015 6c4b8282 IsProcessorFeaturePresent 4005->4015 4006->3983 4008 6c4b8461 4009 6c4ad76b 42 API calls 4008->4009 4010 6c4b847f 4009->4010 4013 6c4b848f 4010->4013 4019 6c4bfda0 4010->4019 4012 6c4a84d1 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 4014 6c4b852b 4012->4014 4013->4012 4014->3983 4016 6c4b828e 4015->4016 4032 6c4b82b6 4016->4032 4020 6c4ad76b 41 API calls 4019->4020 4021 6c4bfdc0 4020->4021 4038 6c4c3c95 4021->4038 4023 6c4bfe78 __freea 4025 6c4a84d1 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 4023->4025 4024 6c4bfded 4024->4023 4026 6c2775a0 2 API calls 4024->4026 4028 6c4bfe13 4024->4028 4027 6c4bfea1 4025->4027 4026->4028 4027->4013 4028->4023 4029 6c4c3c95 MultiByteToWideChar 4028->4029 4030 6c4bfe61 4029->4030 4030->4023 4031 6c4bfe68 GetStringTypeW 4030->4031 4031->4023 4033 6c4b82d2 4032->4033 4034 6c4b82fe IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 4033->4034 4036 6c4b83cf 4034->4036 4035 6c4a84d1 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 4037 6c4b82a3 GetCurrentProcess TerminateProcess 4035->4037 4036->4035 4037->4008 4039 6c4c3ca6 MultiByteToWideChar 4038->4039 4039->4024 4042 6c4c3fe6 __dosmaperr 4041->4042 4043 6c4c012a 42 API calls 4042->4043 4044 6c4c3fef 4043->4044 4049 6c4c4035 4044->4049 4052 6c4c1081 EnterCriticalSection 4044->4052 4046 6c4c400d 4053 6c4c403a 4046->4053 4049->3819 4050 6c4b91e7 42 API calls 4051 6c4c405a 4050->4051 4052->4046 4056 6c4c1098 LeaveCriticalSection 4053->4056 4055 6c4c4031 4055->4049 4055->4050 4056->4055 4058 6c4c012a 42 API calls 4057->4058 4059 6c4c12d3 4058->4059 4062 6c4c15f1 4059->4062 4061 6c4c12d9 4061->3823 4063 6c4c15fd __dosmaperr 4062->4063 4066 6c4c1617 4063->4066 4085 6c4c1081 EnterCriticalSection 4063->4085 4065 6c4c161e 4065->4061 4066->4065 4068 6c4b91e7 42 API calls 4066->4068 4069 6c4c1690 4068->4069 4071 6c4c15f1 42 API calls 4069->4071 4070 6c4c1627 __freea 4086 6c4c1670 4070->4086 4072 6c4c16a4 4071->4072 4089 6c4c151b 4072->4089 4075 6c4c16bd 4075->4061 4076 6c2775a0 2 API calls 4077 6c4c16ce 4076->4077 4081 6c4c1700 __freea 4077->4081 4096 6c4c1328 4077->4096 4080 6c4c16fb 4082 6c4b7573 __dosmaperr 11 API calls 4080->4082 4081->4061 4082->4081 4084 6c4c1716 __freea 4084->4081 4107 6c4c19e6 4084->4107 4085->4070 4115 6c4c1098 LeaveCriticalSection 4086->4115 4088 6c4c1677 4088->4066 4090 6c4ad76b 40 API calls 4089->4090 4091 6c4c152d 4090->4091 4092 6c4c153c GetOEMCP 4091->4092 4093 6c4c154e 4091->4093 4094 6c4c1565 4092->4094 4093->4094 4095 6c4c1553 GetACP 4093->4095 4094->4075 4094->4076 4095->4094 4097 6c4c151b 40 API calls 4096->4097 4098 6c4c1348 4097->4098 4099 6c4c1382 IsValidCodePage 4098->4099 4105 6c4c13be 4098->4105 4101 6c4c1394 4099->4101 4099->4105 4100 6c4a84d1 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 4102 6c4c1519 4100->4102 4103 6c4c13c3 GetCPInfo 4101->4103 4106 6c4c139d 4101->4106 4102->4080 4102->4084 4103->4105 4103->4106 4105->4100 4116 6c4c1866 4106->4116 4108 6c4c19f2 __dosmaperr 4107->4108 4168 6c4c1081 EnterCriticalSection 4108->4168 4110 6c4c19fc 4169 6c4c17a5 4110->4169 4112 6c4c1a09 4174 6c4c1a27 4112->4174 4115->4088 4117 6c4c188e GetCPInfo 4116->4117 4118 6c4c1957 4116->4118 4117->4118 4119 6c4c18a6 4117->4119 4120 6c4a84d1 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 4118->4120 4121 6c4bfda0 41 API calls 4119->4121 4122 6c4c19e4 4120->4122 4123 6c4c190e 4121->4123 4122->4105 4127 6c4bfea3 4123->4127 4126 6c4bfea3 41 API calls 4126->4118 4128 6c4ad76b 42 API calls 4127->4128 4129 6c4bfeb6 4128->4129 4132 6c4bfeec 4129->4132 4133 6c4bff07 4132->4133 4134 6c4c3c95 MultiByteToWideChar 4133->4134 4137 6c4bff4b 4134->4137 4135 6c4a84d1 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 4136 6c4bfed7 4135->4136 4136->4126 4138 6c2775a0 2 API calls 4137->4138 4140 6c4bff70 4137->4140 4146 6c4c0015 __freea 4137->4146 4138->4140 4139 6c4c3c95 MultiByteToWideChar 4141 6c4bffb6 4139->4141 4140->4139 4140->4146 4141->4146 4153 6c4c0adf 4141->4153 4144 6c4bffec 4144->4146 4147 6c4c0adf 6 API calls 4144->4147 4145 6c4c0024 4148 6c2775a0 2 API calls 4145->4148 4150 6c4c0036 4145->4150 4146->4135 4147->4146 4148->4150 4149 6c4c0adf 6 API calls 4151 6c4c007e 4149->4151 4150->4146 4150->4149 4151->4146 4159 6c4c65b8 4151->4159 4162 6c4c0ef1 4153->4162 4157 6c4c0b30 LCMapStringW 4158 6c4bffd8 4157->4158 4158->4144 4158->4145 4158->4146 4160 6c4c65cf WideCharToMultiByte 4159->4160 4160->4146 4163 6c4c0d9e __dosmaperr 5 API calls 4162->4163 4164 6c4c0aea 4163->4164 4164->4158 4165 6c4c0b7b 4164->4165 4166 6c4c0f25 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 4165->4166 4167 6c4c0b86 4166->4167 4167->4157 4168->4110 4177 6c4b0009 4169->4177 4171 6c4c17c7 4172 6c4b0009 42 API calls 4171->4172 4173 6c4c17e6 __freea 4172->4173 4173->4112 4191 6c4c1098 LeaveCriticalSection 4174->4191 4176 6c4c1a15 4176->4081 4178 6c4b001a 4177->4178 4186 6c4b0016 4177->4186 4179 6c4b0021 4178->4179 4183 6c4b0034 4178->4183 4180 6c4b7573 __dosmaperr 11 API calls 4179->4180 4181 6c4b0026 4180->4181 4182 6c4b8272 42 API calls 4181->4182 4182->4186 4184 6c4b006b 4183->4184 4185 6c4b0062 4183->4185 4183->4186 4184->4186 4189 6c4b7573 __dosmaperr 11 API calls 4184->4189 4187 6c4b7573 __dosmaperr 11 API calls 4185->4187 4186->4171 4188 6c4b0067 4187->4188 4190 6c4b8272 42 API calls 4188->4190 4189->4188 4190->4186 4191->4176 4193 6c4c0d9e __dosmaperr 5 API calls 4192->4193 4194 6c4c077e 4193->4194 4194->3763 3655 6c041210 3658 6c126fc0 3655->3658 3657 6c041220 KiUserExceptionDispatcher 3659 6c12700e 3658->3659 3659->3659 4195 6c4b929f 4196 6c4ad76b 42 API calls 4195->4196 4197 6c4b92b4 4196->4197 4198 6c4b92d9 4197->4198 4201 6c4b92ee 4197->4201 4199 6c4b7573 __dosmaperr 11 API calls 4198->4199 4200 6c4b92de 4199->4200 4202 6c4b8272 42 API calls 4200->4202 4211 6c4b76dd 4201->4211 4207 6c4b92e9 __freea 4202->4207 4205 6c2775a0 2 API calls 4206 6c4b931e 4205->4206 4206->4207 4214 6c4c7777 4206->4214 4240 6c4b76fa 4211->4240 4213 6c4b76f5 4213->4205 4213->4207 4215 6c4c779e 4214->4215 4216 6c4c7787 4214->4216 4215->4216 4218 6c4c77a4 4215->4218 4217 6c4b7573 __dosmaperr 11 API calls 4216->4217 4219 6c4c778c 4217->4219 4220 6c4c77c8 4218->4220 4221 6c4c77b1 4218->4221 4222 6c4b8272 42 API calls 4219->4222 4224 6c4ad76b 42 API calls 4220->4224 4223 6c4b7573 __dosmaperr 11 API calls 4221->4223 4228 6c4b9338 4222->4228 4225 6c4c77b6 4223->4225 4235 6c4c77d3 4224->4235 4226 6c4b8272 42 API calls 4225->4226 4226->4228 4227 6c4c788c 4227->4228 4229 6c4c78c1 4227->4229 4230 6c4c78b4 4227->4230 4228->4207 4237 6c4b93d7 4228->4237 4231 6c4b7573 __dosmaperr 11 API calls 4229->4231 4232 6c4b7573 __dosmaperr 11 API calls 4230->4232 4233 6c4c78c6 4231->4233 4232->4228 4234 6c4b8272 42 API calls 4233->4234 4234->4228 4235->4227 4235->4229 4271 6c4c7b22 4235->4271 4570 6c4b93f4 4237->4570 4239 6c4b93ef 4239->4207 4241 6c4b7708 4240->4241 4242 6c4b7722 4240->4242 4241->4213 4243 6c4b7729 4242->4243 4244 6c4b7748 4242->4244 4243->4241 4256 6c4b7684 4243->4256 4245 6c4c3c95 MultiByteToWideChar 4244->4245 4247 6c4b7757 4245->4247 4248 6c4b775e GetLastError 4247->4248 4250 6c4b7784 4247->4250 4253 6c4b7684 2 API calls 4247->4253 4260 6c4b7599 4248->4260 4250->4241 4251 6c4c3c95 MultiByteToWideChar 4250->4251 4254 6c4b779b 4251->4254 4253->4250 4254->4241 4254->4248 4255 6c4b7573 __dosmaperr 11 API calls 4255->4241 4257 6c4b7692 4256->4257 4265 6c4b7626 4257->4265 4268 6c4b7586 4260->4268 4262 6c4b75a4 __dosmaperr 4263 6c4b7573 __dosmaperr 11 API calls 4262->4263 4264 6c4b75b7 4263->4264 4264->4255 4266 6c2775a0 2 API calls 4265->4266 4267 6c4b7633 4266->4267 4267->4241 4269 6c4c0281 __dosmaperr 11 API calls 4268->4269 4270 6c4b758b 4269->4270 4270->4262 4280 6c4c7b3b 4271->4280 4287 6c4c8090 4271->4287 4272 6c4c7e30 4275 6c4c7f8c 4272->4275 4276 6c4c7e39 4272->4276 4273 6c4c809e 4278 6c4c82ea 4273->4278 4279 6c4c80a7 4273->4279 4274 6c4c8495 4277 6c4c6e70 45 API calls 4274->4277 4281 6c4c8044 4275->4281 4290 6c4c7f9e 4275->4290 4299 6c4c7b22 47 API calls 4276->4299 4320 6c4c7b64 4276->4320 4328 6c4c7f24 4276->4328 4318 6c4c7b82 4277->4318 4282 6c4c82ff 4278->4282 4283 6c4c8356 4278->4283 4278->4318 4278->4320 4291 6c4c7b22 47 API calls 4279->4291 4315 6c4c81b1 4279->4315 4279->4320 4280->4272 4288 6c4c7c13 4280->4288 4280->4318 4280->4320 4284 6c4c84e6 47 API calls 4281->4284 4281->4320 4286 6c4c7b22 47 API calls 4282->4286 4289 6c4c7b22 47 API calls 4283->4289 4284->4287 4285 6c4b7573 __dosmaperr 11 API calls 4294 6c4c7dd1 4285->4294 4324 6c4c7ca2 4286->4324 4287->4273 4287->4274 4298 6c4c7c68 4288->4298 4288->4320 4305 6c4c8371 4289->4305 4290->4318 4357 6c4c6e70 4290->4357 4307 6c4c8184 4291->4307 4293 6c4c7b22 47 API calls 4308 6c4c828a 4293->4308 4297 6c4b8272 42 API calls 4294->4297 4295 6c4c7b22 47 API calls 4295->4320 4297->4318 4302 6c4c7d57 4298->4302 4306 6c4c7c82 4298->4306 4311 6c4c7ec5 4299->4311 4300 6c4b7573 __dosmaperr 11 API calls 4300->4318 4335 6c4c84e6 4302->4335 4304 6c4c7fba 4304->4318 4304->4320 4372 6c4ad690 4304->4372 4309 6c4c7b22 47 API calls 4305->4309 4305->4324 4310 6c4c7b22 47 API calls 4306->4310 4312 6c4c7b22 47 API calls 4307->4312 4307->4324 4313 6c4c7b22 47 API calls 4308->4313 4308->4324 4309->4324 4321 6c4c7c9b 4310->4321 4314 6c4c7b22 47 API calls 4311->4314 4311->4324 4312->4315 4317 6c4c82b7 4313->4317 4325 6c4c7eef 4314->4325 4315->4293 4315->4320 4315->4324 4317->4320 4317->4324 4318->4235 4319 6c4c7d6d 4322 6c4c84e6 47 API calls 4319->4322 4319->4324 4320->4285 4320->4318 4323 6c4c7b22 47 API calls 4321->4323 4321->4324 4322->4324 4329 6c4c7cd1 4323->4329 4324->4300 4324->4318 4325->4324 4326 6c4c7b22 47 API calls 4325->4326 4327 6c4c7f19 4326->4327 4327->4324 4327->4328 4328->4295 4329->4324 4330 6c4c7b22 47 API calls 4329->4330 4331 6c4c7cf7 4330->4331 4331->4324 4332 6c4c7b22 47 API calls 4331->4332 4333 6c4c7d1d 4332->4333 4333->4324 4334 6c4c7b22 47 API calls 4333->4334 4334->4324 4336 6c4c8521 4335->4336 4337 6c4c8598 4336->4337 4338 6c4c85a3 4336->4338 4346 6c4c8686 __freea 4336->4346 4379 6c4c09db 4337->4379 4385 6c4c0945 4338->4385 4341 6c4a84d1 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 4342 6c4c8684 4341->4342 4342->4319 4343 6c4c85a1 4344 6c2775a0 2 API calls 4343->4344 4343->4346 4350 6c4c85cc 4343->4350 4344->4350 4345 6c4c860e 4347 6c4c862e 4345->4347 4348 6c4c8620 4345->4348 4352 6c4c7b22 47 API calls 4346->4352 4353 6c4c891a 4346->4353 4354 6c4c6474 42 API calls 4346->4354 4355 6c4c862c __freea 4346->4355 4349 6c4c0945 6 API calls 4347->4349 4351 6c4c09db 6 API calls 4348->4351 4349->4355 4350->4345 4350->4346 4351->4355 4352->4346 4356 6c4b7573 __dosmaperr 11 API calls 4353->4356 4354->4346 4355->4341 4356->4355 4358 6c4c6e7c __dosmaperr 4357->4358 4359 6c4c6eb4 4358->4359 4397 6c4c1081 EnterCriticalSection 4358->4397 4365 6c4ad6bc 4359->4365 4361 6c4c6e8d 4364 6c4c6ea1 4361->4364 4398 6c4c7351 4361->4398 4412 6c4c6ec4 4364->4412 4366 6c4ad6c8 4365->4366 4367 6c4ad6dd 4365->4367 4368 6c4b7573 __dosmaperr 11 API calls 4366->4368 4367->4304 4369 6c4ad6cd 4368->4369 4370 6c4b8272 42 API calls 4369->4370 4371 6c4ad6d8 4370->4371 4371->4304 4373 6c4ad69c 4372->4373 4374 6c4ad6b1 4372->4374 4375 6c4b7573 __dosmaperr 11 API calls 4373->4375 4374->4320 4376 6c4ad6a1 4375->4376 4377 6c4b8272 42 API calls 4376->4377 4378 6c4ad6ac 4377->4378 4378->4320 4391 6c4c0ea3 4379->4391 4382 6c4c0b7b 5 API calls 4383 6c4c0a14 GetTimeFormatW 4382->4383 4384 6c4c09fb 4383->4384 4384->4343 4394 6c4c0e6f 4385->4394 4388 6c4c0b7b 5 API calls 4389 6c4c0990 GetDateFormatW 4388->4389 4390 6c4c0956 4389->4390 4390->4343 4392 6c4c0d9e __dosmaperr 5 API calls 4391->4392 4393 6c4c09e6 4392->4393 4393->4382 4393->4384 4395 6c4c0d9e __dosmaperr 5 API calls 4394->4395 4396 6c4c0950 4395->4396 4396->4388 4396->4390 4397->4361 4415 6c4b72d7 4398->4415 4401 6c4c741b 4429 6c4c6f0f 4401->4429 4402 6c2775a0 2 API calls 4404 6c4c73c3 4402->4404 4403 6c4c7412 4423 6c4c70b0 4403->4423 4408 6c4b72d7 43 API calls 4404->4408 4409 6c4c73a4 __freea 4404->4409 4407 6c4c7418 __freea 4410 6c4a84d1 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 4407->4410 4408->4409 4409->4401 4409->4403 4411 6c4c7434 4410->4411 4411->4364 4569 6c4c1098 LeaveCriticalSection 4412->4569 4414 6c4c6ecb 4414->4359 4416 6c4b736c __dosmaperr 4415->4416 4449 6c4c1081 EnterCriticalSection 4416->4449 4418 6c4b7383 4450 6c4b74bc 4418->4450 4424 6c4c70c0 4423->4424 4425 6c4ad6bc 42 API calls 4424->4425 4426 6c4c70df 4425->4426 4427 6c4b8282 11 API calls 4426->4427 4428 6c4c7350 4427->4428 4430 6c4c6f1f 4429->4430 4431 6c4ad6bc 42 API calls 4430->4431 4432 6c4c6f3c 4431->4432 4433 6c4c705e 4432->4433 4521 6c4ad664 4432->4521 4435 6c4b8282 11 API calls 4433->4435 4436 6c4c7068 4435->4436 4437 6c4c6f4e 4437->4433 4438 6c4ad690 42 API calls 4437->4438 4439 6c4c6f60 4438->4439 4439->4433 4440 6c4c6f69 __freea 4439->4440 4441 6c4c6f74 GetTimeZoneInformation 4440->4441 4442 6c4c7038 4441->4442 4443 6c4c6f90 4441->4443 4442->4407 4528 6c4ad30e 4443->4528 4447 6c4c7024 4448 6c4c6ecd 43 API calls 4447->4448 4448->4442 4449->4418 4451 6c4b74cc 4450->4451 4452 6c4b74e2 4450->4452 4453 6c4b7573 __dosmaperr 11 API calls 4451->4453 4455 6c4b74f8 4452->4455 4456 6c4b753d 4452->4456 4454 6c4b74d1 4453->4454 4457 6c4b8272 42 API calls 4454->4457 4471 6c4b7438 4455->4471 4458 6c4b7573 __dosmaperr 11 API calls 4456->4458 4462 6c4b7399 4457->4462 4460 6c4b7542 4458->4460 4461 6c4b8272 42 API calls 4460->4461 4461->4462 4468 6c4b73c2 4462->4468 4466 6c4b8282 11 API calls 4467 6c4b7572 4466->4467 4520 6c4c1098 LeaveCriticalSection 4468->4520 4470 6c4b73ad 4470->4402 4470->4409 4472 6c4b7446 4471->4472 4474 6c4b74ac 4472->4474 4484 6c4c606e 4472->4484 4474->4462 4475 6c4c3988 4474->4475 4476 6c4c39a3 4475->4476 4477 6c4c3995 4475->4477 4478 6c4b7573 __dosmaperr 11 API calls 4476->4478 4477->4476 4480 6c4c39bc 4477->4480 4479 6c4c39ad 4478->4479 4481 6c4b8272 42 API calls 4479->4481 4482 6c4b7558 4480->4482 4483 6c4b7573 __dosmaperr 11 API calls 4480->4483 4481->4482 4482->4462 4482->4466 4483->4479 4485 6c4c607d 4484->4485 4486 6c4c60be 4484->4486 4488 6c4c6083 4485->4488 4489 6c4c60a0 4485->4489 4498 6c4c60db 4486->4498 4491 6c4b7573 __dosmaperr 11 API calls 4488->4491 4489->4486 4492 6c4c60aa 4489->4492 4490 6c4c6093 4490->4472 4493 6c4c6088 4491->4493 4495 6c4b7573 __dosmaperr 11 API calls 4492->4495 4494 6c4b8272 42 API calls 4493->4494 4494->4490 4496 6c4c60af 4495->4496 4497 6c4b8272 42 API calls 4496->4497 4497->4490 4499 6c4c60f2 4498->4499 4512 6c4c60eb 4498->4512 4500 6c4c60f8 4499->4500 4502 6c4c6118 4499->4502 4501 6c4b7573 __dosmaperr 11 API calls 4500->4501 4503 6c4c60fd 4501->4503 4504 6c4c6134 4502->4504 4505 6c4c6122 4502->4505 4507 6c4b8272 42 API calls 4503->4507 4506 6c4ad76b 42 API calls 4504->4506 4508 6c4b7573 __dosmaperr 11 API calls 4505->4508 4510 6c4c613f 4506->4510 4507->4512 4509 6c4c6127 4508->4509 4511 6c4b8272 42 API calls 4509->4511 4510->4512 4516 6c4c8b52 4510->4516 4511->4512 4512->4490 4515 6c4b7573 __dosmaperr 11 API calls 4515->4512 4517 6c4c8b5f 4516->4517 4518 6c4c0795 6 API calls 4517->4518 4519 6c4c616e 4517->4519 4518->4519 4519->4512 4519->4515 4520->4470 4522 6c4ad670 4521->4522 4523 6c4ad685 4521->4523 4524 6c4b7573 __dosmaperr 11 API calls 4522->4524 4523->4437 4525 6c4ad675 4524->4525 4526 6c4b8272 42 API calls 4525->4526 4527 6c4ad680 4526->4527 4527->4437 4529 6c4c012a 42 API calls 4528->4529 4530 6c4ad319 4529->4530 4531 6c4c06ae 42 API calls 4530->4531 4532 6c4ad329 4531->4532 4533 6c4c6ecd 4532->4533 4560 6c4c3ade 4533->4560 4536 6c4c6ee8 4539 6c4c65b8 WideCharToMultiByte 4536->4539 4537 6c4c6f02 4538 6c4b8282 11 API calls 4537->4538 4541 6c4c6f0e 4538->4541 4540 6c4c6efd 4539->4540 4540->4447 4542 6c4ad6bc 42 API calls 4541->4542 4543 6c4c6f3c 4542->4543 4544 6c4c705e 4543->4544 4545 6c4ad664 42 API calls 4543->4545 4546 6c4b8282 11 API calls 4544->4546 4548 6c4c6f4e 4545->4548 4547 6c4c7068 4546->4547 4548->4544 4549 6c4ad690 42 API calls 4548->4549 4550 6c4c6f60 4549->4550 4550->4544 4551 6c4c6f69 __freea 4550->4551 4552 6c4c6f74 GetTimeZoneInformation 4551->4552 4553 6c4c7038 4552->4553 4554 6c4c6f90 4552->4554 4553->4447 4555 6c4ad30e 42 API calls 4554->4555 4556 6c4c7013 4555->4556 4557 6c4c6ecd 42 API calls 4556->4557 4558 6c4c7024 4557->4558 4559 6c4c6ecd 42 API calls 4558->4559 4559->4553 4564 6c4c3ae9 4560->4564 4561 6c4c3b01 4562 6c4c3b15 4561->4562 4563 6c4b7573 __dosmaperr 11 API calls 4561->4563 4562->4536 4562->4537 4565 6c4c3b0b 4563->4565 4564->4561 4564->4562 4567 6c4c3b3e 4564->4567 4566 6c4b8272 42 API calls 4565->4566 4566->4562 4567->4562 4568 6c4b7573 __dosmaperr 11 API calls 4567->4568 4568->4565 4569->4414 4571 6c4b9401 4570->4571 4572 6c4b9410 4570->4572 4571->4239 4573 6c4b9418 4572->4573 4574 6c4b943d 4572->4574 4573->4571 4591 6c4b939c 4573->4591 4575 6c4c65b8 WideCharToMultiByte 4574->4575 4576 6c4b944d 4575->4576 4578 6c4b9454 GetLastError 4576->4578 4581 6c4b946a 4576->4581 4579 6c4b7599 __dosmaperr 11 API calls 4578->4579 4582 6c4b9460 4579->4582 4580 6c4b947b 4580->4571 4584 6c4c65b8 WideCharToMultiByte 4580->4584 4581->4580 4583 6c4b939c 11 API calls 4581->4583 4585 6c4b7573 __dosmaperr 11 API calls 4582->4585 4583->4580 4586 6c4b9493 4584->4586 4585->4571 4586->4571 4587 6c4b949a GetLastError 4586->4587 4588 6c4b7599 __dosmaperr 11 API calls 4587->4588 4589 6c4b94a6 4588->4589 4590 6c4b7573 __dosmaperr 11 API calls 4589->4590 4590->4571 4592 6c4b93a7 4591->4592 4593 6c4b7573 __dosmaperr 11 API calls 4592->4593 4594 6c4b93b0 4593->4594 4594->4571 4650 6c041030 4651 6c4a8416 3 API calls 4650->4651 4652 6c04103b 4651->4652 3660 6c277650 3661 6c277660 3660->3661 3662 6c277689 3661->3662 3664 6c301880 3661->3664 3667 6c4b4bc4 3664->3667 3668 6c4b4bd0 __dosmaperr 3667->3668 3673 6c4c1081 EnterCriticalSection 3668->3673 3670 6c4b4bdb 3674 6c4b4c17 3670->3674 3673->3670 3677 6c4c1098 LeaveCriticalSection 3674->3677 3676 6c301888 3676->3661 3677->3676 4653 6c373800 4654 6c37380c GetModuleHandleW GetProcAddress 4653->4654 4655 6c373834 4653->4655 4654->4655 4656 6c4bcf33 4657 6c4bcf3f __dosmaperr 4656->4657 4658 6c4c0281 __dosmaperr 11 API calls 4657->4658 4663 6c4bcf6c 4657->4663 4664 6c4bcf66 4657->4664 4658->4664 4659 6c4bcfb3 4660 6c4b7573 __dosmaperr 11 API calls 4659->4660 4662 6c4bcfb8 4660->4662 4661 6c4bcf9d 4665 6c4b8272 42 API calls 4662->4665 4666 6c4bcfdf 4663->4666 4683 6c4c1081 EnterCriticalSection 4663->4683 4664->4659 4664->4661 4664->4663 4665->4661 4669 6c4bd112 4666->4669 4670 6c4bd021 4666->4670 4680 6c4bd050 4666->4680 4675 6c4bd11d 4669->4675 4688 6c4c1098 LeaveCriticalSection 4669->4688 4674 6c4c012a 42 API calls 4670->4674 4670->4680 4673 6c4b4c27 16 API calls 4676 6c4bd125 4673->4676 4678 6c4bd045 4674->4678 4675->4673 4677 6c4c012a 42 API calls 4681 6c4bd0a5 4677->4681 4679 6c4c012a 42 API calls 4678->4679 4679->4680 4684 6c4bd0bf 4680->4684 4681->4661 4682 6c4c012a 42 API calls 4681->4682 4682->4661 4683->4666 4685 6c4bd096 4684->4685 4686 6c4bd0c5 4684->4686 4685->4661 4685->4677 4685->4681 4689 6c4c1098 LeaveCriticalSection 4686->4689 4688->4675 4689->4685 4690 6c4b9eb1 4691 6c4b9ecc 4690->4691 4694 6c4ba478 4691->4694 4712 6c4aebbd 4694->4712 4696 6c4ba4c6 4697 6c4ad76b 42 API calls 4696->4697 4704 6c4ba4d5 4697->4704 4698 6c4ba48d 4698->4696 4699 6c4ba4a2 4698->4699 4711 6c4b9ed6 4698->4711 4700 6c4b7573 __dosmaperr 11 API calls 4699->4700 4701 6c4ba4a7 4700->4701 4703 6c4b8272 42 API calls 4701->4703 4703->4711 4705 6c4ba4ff 4704->4705 4719 6c4c2a85 4704->4719 4707 6c4ba7d7 4705->4707 4723 6c4b984b 4705->4723 4706 6c4b984b 42 API calls 4709 6c4baa0d 4706->4709 4707->4706 4710 6c4b7573 __dosmaperr 11 API calls 4709->4710 4709->4711 4710->4711 4713 6c4aebc2 4712->4713 4714 6c4aebd5 4712->4714 4715 6c4b7573 __dosmaperr 11 API calls 4713->4715 4714->4698 4716 6c4aebc7 4715->4716 4717 6c4b8272 42 API calls 4716->4717 4718 6c4aebd2 4717->4718 4718->4698 4720 6c4c2aac 4719->4720 4721 6c4c2aa2 4719->4721 4720->4704 4721->4720 4729 6c4cdbf5 GetStringTypeW 4721->4729 4724 6c4b9860 4723->4724 4725 6c4b9875 4723->4725 4724->4725 4726 6c4b7573 __dosmaperr 11 API calls 4724->4726 4725->4707 4727 6c4b986a 4726->4727 4728 6c4b8272 42 API calls 4727->4728 4728->4725 4729->4720 4730 6c4aabb0 4731 6c4aabce 4730->4731 4748 6c4aab70 4731->4748 4749 6c4aab8f 4748->4749 4750 6c4aab82 4748->4750 4751 6c4a84d1 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 4750->4751 4751->4749 4752 6c1f9264 4755 6c1f7c1e 4752->4755 4754 6c1f9271 4756 6c1f7c32 4755->4756 4757 6c4aa324 RaiseException 4756->4757 4758 6c1f7c3d 4757->4758 4758->4754 4595 6c4a8517 EnterCriticalSection 4596 6c4a852b 4595->4596 4597 6c4a8530 LeaveCriticalSection 4596->4597 4600 6c4a85d7 4596->4600 4601 6c4a85fe LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 4600->4601 4602 6c4a85e5 4600->4602 4601->4602 4602->4596 4603 6c4cf3d2 4604 6c4a84d1 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 4603->4604 4605 6c4cf3e3 4604->4605 4606 6c2fe9f0 QueryPerformanceFrequency 4607 6c2fea24 4606->4607 4612 6c376b20 4607->4612 4609 6c2fea5e 4610 6c4a84d1 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 4609->4610 4611 6c2feac9 4610->4611 4615 6c376b60 4612->4615 4616 6c376bbc 4615->4616 4617 6c4a84d1 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 4616->4617 4618 6c376b53 4617->4618 4618->4609

    Executed Functions

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 6c041210-6c04122e call 6c126fc0 KiUserExceptionDispatcher
    APIs
    • KiUserExceptionDispatcher.NTDLL(?,?), ref: 6C041226
    Memory Dump Source
    • Source File: 0000000B.00000002.707784985.000000006C041000.00000020.00020000.sdmp, Offset: 6C040000, based on PE: true
    • Associated: 0000000B.00000002.707765537.000000006C040000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708258845.000000006C4D0000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708814446.000000006C965000.00000008.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708832834.000000006C966000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708918517.000000006D3DF000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708953976.000000006D423000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708980202.000000006D426000.00000020.00020000.sdmp Download File
    • Associated: 0000000B.00000002.709009923.000000006D429000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_6c040000_rundll32.jbxd
    Similarity
    • API ID: DispatcherExceptionUser
    • String ID:
    • API String ID: 6842923-0
    • Opcode ID: ddbfff9273990e24690d879215bcb72f3e88f7ba5bcd1fd2e4ac8403229365af
    • Instruction ID: 6388aac8878ab3f564ae8065f177cecea51b476d25456c69bae4cd3a39f6a629
    • Opcode Fuzzy Hash: ddbfff9273990e24690d879215bcb72f3e88f7ba5bcd1fd2e4ac8403229365af
    • Instruction Fuzzy Hash: 77D0A93A2001186B8B009A06E804CDBBB6CEECA23030081A1F9088B700C631BC428BE0
    Uniqueness

    Uniqueness Score: -1.00%

    Non-executed Functions

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 360 6c376b60-6c376bbe call 6c1f9902 363 6c376bc4-6c376be0 360->363 364 6c376d58-6c376d66 360->364 365 6c376be2-6c376bfa 363->365 366 6c376bfe-6c376c28 363->366 367 6c376dde-6c376de2 364->367 368 6c376d68-6c376dcd call 6c1f9902 364->368 365->366 371 6c376c7b-6c376c8e 366->371 372 6c376c2a-6c376c2d 366->372 369 6c376df7-6c376dfb 367->369 370 6c376de4-6c376df6 call 6c4a84d1 367->370 368->367 386 6c376dcf-6c376ddb 368->386 369->370 376 6c376dfd-6c376e0c 369->376 375 6c376c98-6c376c9d 371->375 377 6c376c90 372->377 378 6c376c2f-6c376c35 372->378 381 6c376c9f-6c376ca9 375->381 382 6c376cac 375->382 376->370 383 6c376e0e-6c376e14 376->383 377->375 384 6c376c37 378->384 385 6c376c3a-6c376c45 378->385 381->382 387 6c376cb0-6c376d24 382->387 383->370 388 6c376e16-6c376e1c 383->388 384->385 389 6c376c47-6c376c6d call 6c1f9a88 385->389 390 6c376c6f-6c376c79 385->390 386->367 391 6c376d26-6c376d36 387->391 392 6c376d38 387->392 388->370 393 6c376e1e-6c376e22 388->393 389->371 389->390 390->387 395 6c376d3a-6c376d55 391->395 392->395 393->370 395->364
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.707784985.000000006C041000.00000020.00020000.sdmp, Offset: 6C040000, based on PE: true
    • Associated: 0000000B.00000002.707765537.000000006C040000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708258845.000000006C4D0000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708814446.000000006C965000.00000008.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708832834.000000006C966000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708918517.000000006D3DF000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708953976.000000006D423000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708980202.000000006D426000.00000020.00020000.sdmp Download File
    • Associated: 0000000B.00000002.709009923.000000006D429000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_6c040000_rundll32.jbxd
    Similarity
    • API ID: _strlen
    • String ID: GenuineIntel$Micr$osof$t Hv
    • API String ID: 4218353326-1419972731
    • Opcode ID: 56c462993b612c7e631256e93f404fd15cf9f610628d779b7ce9edccc1f8ce41
    • Instruction ID: 034edf133df0fdfcc8e7d912bb238d80fce1e1ec5c8dbd77f159e20a5591a556
    • Opcode Fuzzy Hash: 56c462993b612c7e631256e93f404fd15cf9f610628d779b7ce9edccc1f8ce41
    • Instruction Fuzzy Hash: E381C171A1C3818FD328CF29849134ABBF0EB99318F148A2EE4D9D7B41C739E549CB56
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 6C4B83AE
    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 6C4B83B8
    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 6C4B83C5
    Memory Dump Source
    • Source File: 0000000B.00000002.707784985.000000006C041000.00000020.00020000.sdmp, Offset: 6C040000, based on PE: true
    • Associated: 0000000B.00000002.707765537.000000006C040000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708258845.000000006C4D0000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708814446.000000006C965000.00000008.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708832834.000000006C966000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708918517.000000006D3DF000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708953976.000000006D423000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708980202.000000006D426000.00000020.00020000.sdmp Download File
    • Associated: 0000000B.00000002.709009923.000000006D429000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_6c040000_rundll32.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled$DebuggerPresent
    • String ID:
    • API String ID: 3906539128-0
    • Opcode ID: 07661ca3ef64fa5cc05c6dc078f4ff095d77c6fcdbb4d5a8de63268ec6faa3bd
    • Instruction ID: 7774f140865b63fce2138cc8b5a98459ef518c12512e7037f376674595813646
    • Opcode Fuzzy Hash: 07661ca3ef64fa5cc05c6dc078f4ff095d77c6fcdbb4d5a8de63268ec6faa3bd
    • Instruction Fuzzy Hash: 6131E8749012199BDB21DF65C888BCDBBB8BF18315F6041DAE41CA7290E7319F858F54
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetCurrentProcess.KERNEL32(00000000,?,6C4B4DA9,6C4AAD14,00000003,00000000,6C4AAD14,00000000), ref: 6C4B4D13
    • TerminateProcess.KERNEL32(00000000,?,6C4B4DA9,6C4AAD14,00000003,00000000,6C4AAD14,00000000), ref: 6C4B4D1A
    • ExitProcess.KERNEL32 ref: 6C4B4D2C
    Memory Dump Source
    • Source File: 0000000B.00000002.707784985.000000006C041000.00000020.00020000.sdmp, Offset: 6C040000, based on PE: true
    • Associated: 0000000B.00000002.707765537.000000006C040000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708258845.000000006C4D0000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708814446.000000006C965000.00000008.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708832834.000000006C966000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708918517.000000006D3DF000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708953976.000000006D423000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708980202.000000006D426000.00000020.00020000.sdmp Download File
    • Associated: 0000000B.00000002.709009923.000000006D429000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_6c040000_rundll32.jbxd
    Similarity
    • API ID: Process$CurrentExitTerminate
    • String ID:
    • API String ID: 1703294689-0
    • Opcode ID: 3b14aa36512f7419beec02f5638b03ef899c17a51baea962fb8b182389c82d73
    • Instruction ID: 24c32790174afa6bab94bed95a99b8de29175edf7208da2442fd6a2504afaf5c
    • Opcode Fuzzy Hash: 3b14aa36512f7419beec02f5638b03ef899c17a51baea962fb8b182389c82d73
    • Instruction Fuzzy Hash: 2EE08C31104208AFDF02AF51C908E5C3FB8FB16686B205418F90697E60CB35E881DBA0
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetTimeZoneInformation.KERNEL32(00000000,00000000,00000000,?,?,6C4C7420,?,?,?,?,?,?,-00000004,00000000), ref: 6C4C6F81
      • Part of subcall function 6C4C65B8: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,00000000,00000000,?,6C4C0098,?,00000000,00000000), ref: 6C4C6664
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.707784985.000000006C041000.00000020.00020000.sdmp, Offset: 6C040000, based on PE: true
    • Associated: 0000000B.00000002.707765537.000000006C040000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708258845.000000006C4D0000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708814446.000000006C965000.00000008.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708832834.000000006C966000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708918517.000000006D3DF000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708953976.000000006D423000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708980202.000000006D426000.00000020.00020000.sdmp Download File
    • Associated: 0000000B.00000002.709009923.000000006D429000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_6c040000_rundll32.jbxd
    Similarity
    • API ID: ByteCharInformationMultiTimeWideZone
    • String ID: tLl
    • API String ID: 1123094072-3393625556
    • Opcode ID: 33c0392f0fd01aa99da461e9f6e856f71ed830fd099c9d5393a7a6781c54b9d9
    • Instruction ID: 14a7ba64d7d2e56cd0c4df1a9855e9a2c7c261700d7ec10b287c0eb7d3cb2efd
    • Opcode Fuzzy Hash: 33c0392f0fd01aa99da461e9f6e856f71ed830fd099c9d5393a7a6781c54b9d9
    • Instruction Fuzzy Hash: 5641C375A00115ABDB00EFA5CC00EEE7B78EF15354F148169E918E77A4E7319E04CBD5
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 0000000B.00000002.707784985.000000006C041000.00000020.00020000.sdmp, Offset: 6C040000, based on PE: true
    • Associated: 0000000B.00000002.707765537.000000006C040000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708258845.000000006C4D0000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708814446.000000006C965000.00000008.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708832834.000000006C966000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708918517.000000006D3DF000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708953976.000000006D423000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708980202.000000006D426000.00000020.00020000.sdmp Download File
    • Associated: 0000000B.00000002.709009923.000000006D429000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_6c040000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: edbddc2eb31399773057d65153992727c8735c7af67086445bf3d4c43e6de264
    • Instruction ID: 907572939a0fd338470654d54c5a868fa0701a6028efd552a9bcd4bf3d876ae3
    • Opcode Fuzzy Hash: edbddc2eb31399773057d65153992727c8735c7af67086445bf3d4c43e6de264
    • Instruction Fuzzy Hash: DFE08C76A12228EBCB24CF88C944D8AF7FCEB48A04B1114AAB511D3620D6B0DE41C7D1
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    • _ValidateLocalCookies.LIBCMT ref: 6C4AABE7
    • ___except_validate_context_record.LIBVCRUNTIME ref: 6C4AABEF
    • _ValidateLocalCookies.LIBCMT ref: 6C4AAC78
    • __IsNonwritableInCurrentImage.LIBCMT ref: 6C4AACA3
    • _ValidateLocalCookies.LIBCMT ref: 6C4AACF8
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.707784985.000000006C041000.00000020.00020000.sdmp, Offset: 6C040000, based on PE: true
    • Associated: 0000000B.00000002.707765537.000000006C040000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708258845.000000006C4D0000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708814446.000000006C965000.00000008.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708832834.000000006C966000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708918517.000000006D3DF000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708953976.000000006D423000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708980202.000000006D426000.00000020.00020000.sdmp Download File
    • Associated: 0000000B.00000002.709009923.000000006D429000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_6c040000_rundll32.jbxd
    Similarity
    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
    • String ID: csm
    • API String ID: 1170836740-1018135373
    • Opcode ID: 217450383a26bd1f0ff9327f20cad46883906c42df2b11b2977572e9eb8bd198
    • Instruction ID: 79c51ec11326c4389e5ef9bfba3ab6f4b3f75e6369835111c2a6555d43586dc5
    • Opcode Fuzzy Hash: 217450383a26bd1f0ff9327f20cad46883906c42df2b11b2977572e9eb8bd198
    • Instruction Fuzzy Hash: 4A510734A01118ABEF00DFA8C884EDE7BB1BF15719F108159E8196BB59C731DA06CFD1
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.707784985.000000006C041000.00000020.00020000.sdmp, Offset: 6C040000, based on PE: true
    • Associated: 0000000B.00000002.707765537.000000006C040000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708258845.000000006C4D0000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708814446.000000006C965000.00000008.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708832834.000000006C966000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708918517.000000006D3DF000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708953976.000000006D423000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708980202.000000006D426000.00000020.00020000.sdmp Download File
    • Associated: 0000000B.00000002.709009923.000000006D429000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_6c040000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: api-ms-$ext-ms-
    • API String ID: 0-537541572
    • Opcode ID: f625b67e388fc4dc0be6e94b54f8c167a9be6a6e56acd1077a0c7f86ac314b1d
    • Instruction ID: 6c1b3fff975f8da6a2be9bb4650d175d0fe4b26f898b81a75502742184af95b8
    • Opcode Fuzzy Hash: f625b67e388fc4dc0be6e94b54f8c167a9be6a6e56acd1077a0c7f86ac314b1d
    • Instruction Fuzzy Hash: 5D21EBBDB496A0ABDB21C6698C84F5A37689B02B65F250614EC16ABBA0D730FD0185D2
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 98 6c4c84e6-6c4c851f 99 6c4c8536 98->99 100 6c4c8521-6c4c8524 98->100 103 6c4c853c-6c4c8543 99->103 101 6c4c852e-6c4c8534 100->101 102 6c4c8526-6c4c852c 100->102 101->103 102->103 104 6c4c8909-6c4c890f 103->104 105 6c4c8549-6c4c8596 103->105 106 6c4c8915 104->106 107 6c4c8696-6c4c869a 104->107 108 6c4c8598-6c4c85a1 call 6c4c09db 105->108 109 6c4c85a3-6c4c85a8 call 6c4c0945 105->109 111 6c4c8672 106->111 110 6c4c869c-6c4c86a7 107->110 107->111 117 6c4c85ad-6c4c85b1 108->117 109->117 114 6c4c86aa-6c4c86b1 110->114 115 6c4c8674-6c4c8685 call 6c4a84d1 111->115 114->114 118 6c4c86b3-6c4c86bf 114->118 120 6c4c868e-6c4c8691 117->120 121 6c4c85b7-6c4c85c3 117->121 122 6c4c87e9-6c4c87ec 118->122 123 6c4c86c5 118->123 120->104 125 6c4c8605 121->125 126 6c4c85c5-6c4c85ca 121->126 129 6c4c88c6-6c4c88c9 122->129 130 6c4c87f2-6c4c87f5 122->130 131 6c4c87b8-6c4c87bb 123->131 132 6c4c86cb-6c4c86ce 123->132 133 6c4c8607-6c4c860c 125->133 127 6c4c85cc-6c4c85d8 call 6c4a9520 126->127 128 6c4c85e9-6c4c85f7 call 6c2775a0 126->128 143 6c4c8686-6c4c868d call 6c4bfaf1 127->143 167 6c4c85de 127->167 128->143 171 6c4c85fd-6c4c8603 128->171 144 6c4c88cb-6c4c88ce 129->144 145 6c4c88e2 129->145 135 6c4c87fb-6c4c87fe 130->135 136 6c4c88b2-6c4c88b5 130->136 140 6c4c87bd-6c4c87c0 131->140 141 6c4c87de 131->141 138 6c4c876e-6c4c8773 132->138 139 6c4c86d4-6c4c86d7 132->139 142 6c4c860e-6c4c861e 133->142 133->143 150 6c4c889e-6c4c88a1 135->150 151 6c4c8804-6c4c8807 135->151 155 6c4c88be 136->155 156 6c4c88b7-6c4c88ba 136->156 138->104 149 6c4c8779-6c4c877f 138->149 153 6c4c86ec-6c4c86fb call 6c4c6474 139->153 154 6c4c86d9-6c4c86dc 139->154 157 6c4c87e2-6c4c87e4 140->157 158 6c4c87c2-6c4c87c5 140->158 141->157 159 6c4c862e-6c4c8637 call 6c4c0945 142->159 160 6c4c8620-6c4c862c call 6c4c09db 142->160 143->120 146 6c4c88e6 144->146 147 6c4c88d0-6c4c88e0 144->147 145->146 162 6c4c88e8-6c4c8904 call 6c4c7b22 146->162 147->104 149->111 168 6c4c8785 149->168 169 6c4c88aa 150->169 170 6c4c88a3-6c4c88a6 150->170 164 6c4c8809-6c4c880c 151->164 165 6c4c8830-6c4c883a 151->165 207 6c4c86fd-6c4c8703 153->207 208 6c4c8750-6c4c875f call 6c4c6474 153->208 172 6c4c86de-6c4c86e1 154->172 173 6c4c8736-6c4c8739 154->173 175 6c4c88c2-6c4c88c4 155->175 174 6c4c88bc 156->174 156->175 157->162 176 6c4c87d7-6c4c87d9 158->176 177 6c4c87c7-6c4c87ca 158->177 180 6c4c863c-6c4c8643 159->180 160->180 212 6c4c891a-6c4c8927 call 6c4b7573 162->212 213 6c4c8906 162->213 164->147 182 6c4c8812-6c4c8816 164->182 185 6c4c883c-6c4c8842 165->185 186 6c4c8844 165->186 187 6c4c85e4-6c4c85e7 167->187 188 6c4c8788-6c4c878a 168->188 189 6c4c88ae-6c4c88b0 169->189 170->189 190 6c4c88a8 170->190 171->187 191 6c4c8705-6c4c8708 172->191 192 6c4c86e3-6c4c86e6 172->192 183 6c4c873b-6c4c873e 173->183 184 6c4c8745 173->184 174->147 175->162 176->162 177->147 193 6c4c87d0-6c4c87d2 177->193 198 6c4c866b-6c4c8671 call 6c4bfaf1 180->198 199 6c4c8645-6c4c864b 180->199 201 6c4c8818-6c4c881c 182->201 202 6c4c8829-6c4c882b 182->202 203 6c4c8749-6c4c874b 183->203 204 6c4c8740 183->204 184->203 205 6c4c884a-6c4c884d 185->205 186->205 187->133 188->104 206 6c4c8790-6c4c8799 188->206 189->162 190->147 196 6c4c870a-6c4c870d 191->196 197 6c4c872b 191->197 192->147 192->153 193->162 209 6c4c872f-6c4c8731 196->209 210 6c4c870f-6c4c8712 196->210 197->209 198->111 211 6c4c864d-6c4c864f 199->211 201->147 215 6c4c8822-6c4c8824 201->215 202->162 203->162 204->147 216 6c4c884f-6c4c8851 205->216 217 6c4c886b-6c4c8871 205->217 206->104 219 6c4c879f-6c4c87b1 206->219 220 6c4c8767-6c4c8769 207->220 208->220 233 6c4c8761-6c4c8764 208->233 209->162 221 6c4c8724-6c4c8726 210->221 222 6c4c8714-6c4c8717 210->222 223 6c4c8668 211->223 224 6c4c8651-6c4c8666 211->224 212->115 213->104 215->162 216->217 227 6c4c8853-6c4c8866 216->227 217->213 229 6c4c8877 217->229 219->188 230 6c4c87b3 219->230 220->162 221->162 222->147 231 6c4c871d-6c4c871f 222->231 223->198 224->211 224->223 227->213 234 6c4c887a-6c4c887c 229->234 230->104 231->162 233->220 234->213 235 6c4c8882-6c4c889a 234->235 235->234 236 6c4c889c 235->236 236->213
    APIs
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.707784985.000000006C041000.00000020.00020000.sdmp, Offset: 6C040000, based on PE: true
    • Associated: 0000000B.00000002.707765537.000000006C040000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708258845.000000006C4D0000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708814446.000000006C965000.00000008.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708832834.000000006C966000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708918517.000000006D3DF000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708953976.000000006D423000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708980202.000000006D426000.00000020.00020000.sdmp Download File
    • Associated: 0000000B.00000002.709009923.000000006D429000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_6c040000_rundll32.jbxd
    Similarity
    • API ID: __freea
    • String ID: a/p$am/pm$txLl
    • API String ID: 240046367-1057221516
    • Opcode ID: 552080632c906660c3d388012e0f5d36228d0fbfa935e27a207c6a88c357c37c
    • Instruction ID: fb19a0fd4d9c78f36928e035a59cb4c29660827884bc64f9d9d9e3080f74b82e
    • Opcode Fuzzy Hash: 552080632c906660c3d388012e0f5d36228d0fbfa935e27a207c6a88c357c37c
    • Instruction Fuzzy Hash: AEC19E39B45216DADB00CF68C894FAA77B0FF06719F20415BE514ABF60E3359942CBA7
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    • GetLastError.KERNEL32(?,00000001,6C4BE20A,6C4AAD14,00000011), ref: 6C4BE221
    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6C4BE22F
    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6C4BE248
    • SetLastError.KERNEL32(00000000), ref: 6C4BE29A
    Memory Dump Source
    • Source File: 0000000B.00000002.707784985.000000006C041000.00000020.00020000.sdmp, Offset: 6C040000, based on PE: true
    • Associated: 0000000B.00000002.707765537.000000006C040000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708258845.000000006C4D0000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708814446.000000006C965000.00000008.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708832834.000000006C966000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708918517.000000006D3DF000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708953976.000000006D423000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708980202.000000006D426000.00000020.00020000.sdmp Download File
    • Associated: 0000000B.00000002.709009923.000000006D429000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_6c040000_rundll32.jbxd
    Similarity
    • API ID: ErrorLastValue___vcrt_
    • String ID:
    • API String ID: 3852720340-0
    • Opcode ID: c01e271cbc5e3221bf0fd762b021714780787e4d82d1730420b2bdee2a4dfc4d
    • Instruction ID: ca3cbfa0ef8842bc911e0410b557147d963b9093b35f432559a026c4a6c77994
    • Opcode Fuzzy Hash: c01e271cbc5e3221bf0fd762b021714780787e4d82d1730420b2bdee2a4dfc4d
    • Instruction Fuzzy Hash: 5301283A32DB116EB70859B76CC1C662B64EB4277D330032EE52466FD0EF26484692F0
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 261 6c4b4c9e-6c4b4cbb GetModuleHandleExW 262 6c4b4cbd-6c4b4cd0 GetProcAddress 261->262 263 6c4b4ce0-6c4b4ce4 261->263 264 6c4b4cdf 262->264 265 6c4b4cd2-6c4b4cdd 262->265 266 6c4b4cef-6c4b4cf0 263->266 267 6c4b4ce6-6c4b4ce9 FreeLibrary 263->267 264->263 265->264 267->266
    APIs
    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,6C4B4D28,00000000,?,6C4B4DA9,6C4AAD14,00000003,00000000), ref: 6C4B4CB3
    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6C4B4CC6
    • FreeLibrary.KERNEL32(00000000,?,?,6C4B4D28,00000000,?,6C4B4DA9,6C4AAD14,00000003,00000000), ref: 6C4B4CE9
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.707784985.000000006C041000.00000020.00020000.sdmp, Offset: 6C040000, based on PE: true
    • Associated: 0000000B.00000002.707765537.000000006C040000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708258845.000000006C4D0000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708814446.000000006C965000.00000008.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708832834.000000006C966000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708918517.000000006D3DF000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708953976.000000006D423000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708980202.000000006D426000.00000020.00020000.sdmp Download File
    • Associated: 0000000B.00000002.709009923.000000006D429000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_6c040000_rundll32.jbxd
    Similarity
    • API ID: AddressFreeHandleLibraryModuleProc
    • String ID: CorExitProcess$mscoree.dll
    • API String ID: 4061214504-1276376045
    • Opcode ID: d544dcb69a852d3cd2fc62f6821e708e2c60074e4dc29bb10fa320e1d26fbd41
    • Instruction ID: 6d2e5921ad4e76f9f0be894a6261007a3fa98a04affac28a447ccdc577f6c4da
    • Opcode Fuzzy Hash: d544dcb69a852d3cd2fc62f6821e708e2c60074e4dc29bb10fa320e1d26fbd41
    • Instruction Fuzzy Hash: 67F01235502118FBDF01DB61CD09FAD7B74FB41797F610058B401B2A94CB71DE10EA94
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 269 6c4b7a79-6c4b7a8f call 6c4a94c0 call 6c4c012a 274 6c4b7aaf-6c4b7c03 call 6c4b91e7 269->274 275 6c4b7a91-6c4b7aa8 269->275 281 6c4b7c1b-6c4b7c2b 274->281 282 6c4b7c05-6c4b7c16 call 6c4b7573 call 6c4b8272 274->282 275->274 285 6c4b7c3e-6c4b7c4c 281->285 286 6c4b7c2d-6c4b7c3c call 6c4b7573 call 6c4b8272 281->286 304 6c4b7d3c-6c4b7d3e 282->304 287 6c4b7c4e 285->287 288 6c4b7c57-6c4b7c5c 285->288 306 6c4b7c71-6c4b7c73 286->306 291 6c4b7c50-6c4b7c55 287->291 292 6c4b7c67-6c4b7c6f call 6c4b7573 287->292 293 6c4b7c78-6c4b7cc2 call 6c4b7b02 call 6c4a8780 288->293 294 6c4b7c5e 288->294 291->288 291->292 292->306 310 6c4b7cc9-6c4b7ccf 293->310 311 6c4b7cc4 293->311 294->292 297 6c4b7c60-6c4b7c65 294->297 297->292 297->293 308 6c4b7d3b 306->308 308->304 312 6c4b7cd1-6c4b7cd5 310->312 313 6c4b7cd7-6c4b7d3a call 6c4a8780 * 3 310->313 311->310 312->312 312->313 313->308
    Memory Dump Source
    • Source File: 0000000B.00000002.707784985.000000006C041000.00000020.00020000.sdmp, Offset: 6C040000, based on PE: true
    • Associated: 0000000B.00000002.707765537.000000006C040000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708258845.000000006C4D0000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708814446.000000006C965000.00000008.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708832834.000000006C966000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708918517.000000006D3DF000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708953976.000000006D423000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708980202.000000006D426000.00000020.00020000.sdmp Download File
    • Associated: 0000000B.00000002.709009923.000000006D429000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_6c040000_rundll32.jbxd
    Similarity
    • API ID: ErrorLast
    • String ID:
    • API String ID: 1452528299-0
    • Opcode ID: a0d9db27308b92b73bcaaada536c00fed4215f7d3dbacf7dc5fbf76636d461ea
    • Instruction ID: 606707ea989ebdebfd76cadb2232a7f2f62facf8937883b644ff43f795f89292
    • Opcode Fuzzy Hash: a0d9db27308b92b73bcaaada536c00fed4215f7d3dbacf7dc5fbf76636d461ea
    • Instruction Fuzzy Hash: BC41E372A04644AFD714DF78C844F9ABBB8EB85724F11862EE051ABB80D771AA4587F0
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 320 6c4b93f4-6c4b93ff 321 6c4b9401-6c4b940b call 6c4b93c3 320->321 322 6c4b9410-6c4b9416 320->322 332 6c4b94b8-6c4b94ba 321->332 324 6c4b9418-6c4b941e 322->324 325 6c4b943d-6c4b9452 call 6c4c65b8 322->325 328 6c4b9431-6c4b943b 324->328 329 6c4b9420-6c4b942b call 6c4b939c 324->329 334 6c4b946a-6c4b9471 325->334 335 6c4b9454-6c4b9468 GetLastError call 6c4b7599 call 6c4b7573 325->335 330 6c4b94b7 328->330 329->328 329->330 330->332 338 6c4b947f-6c4b9498 call 6c4c65b8 334->338 339 6c4b9473-6c4b947d call 6c4b939c 334->339 335->330 348 6c4b949a-6c4b94ae GetLastError call 6c4b7599 call 6c4b7573 338->348 349 6c4b94b0-6c4b94b4 338->349 339->338 347 6c4b94b6 339->347 347->330 348->347 349->347
    Memory Dump Source
    • Source File: 0000000B.00000002.707784985.000000006C041000.00000020.00020000.sdmp, Offset: 6C040000, based on PE: true
    • Associated: 0000000B.00000002.707765537.000000006C040000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708258845.000000006C4D0000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708814446.000000006C965000.00000008.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708832834.000000006C966000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708918517.000000006D3DF000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708953976.000000006D423000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708980202.000000006D426000.00000020.00020000.sdmp Download File
    • Associated: 0000000B.00000002.709009923.000000006D429000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_6c040000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: eaf207e6cfc0e9730314ae0308d78c906b2f04d902cb3ea721d434a00174cbd6
    • Instruction ID: 4cf5f03a3f5227a36c0885f0206518bcd86362b52b5b44f9ec0e613f68a79b54
    • Opcode Fuzzy Hash: eaf207e6cfc0e9730314ae0308d78c906b2f04d902cb3ea721d434a00174cbd6
    • Instruction Fuzzy Hash: 56217F7160C615AFDB10DF668C80D9AB77DAF7537D7148618E828A7E90E732DC0087B0
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 354 6c373800-6c37380a 355 6c373844-6c37384a 354->355 356 6c37380c-6c37383c GetModuleHandleW GetProcAddress call 6c373900 354->356 356->355
    APIs
    • GetModuleHandleW.KERNEL32(00000000), ref: 6C37380E
    • GetProcAddress.KERNEL32(00000000,GetHandleVerifier), ref: 6C37381A
    Strings
    Memory Dump Source
    • Source File: 0000000B.00000002.707784985.000000006C041000.00000020.00020000.sdmp, Offset: 6C040000, based on PE: true
    • Associated: 0000000B.00000002.707765537.000000006C040000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708258845.000000006C4D0000.00000002.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708814446.000000006C965000.00000008.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708832834.000000006C966000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708918517.000000006D3DF000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708953976.000000006D423000.00000004.00020000.sdmp Download File
    • Associated: 0000000B.00000002.708980202.000000006D426000.00000020.00020000.sdmp Download File
    • Associated: 0000000B.00000002.709009923.000000006D429000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_11_2_6c040000_rundll32.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: GetHandleVerifier
    • API String ID: 1646373207-1090674830
    • Opcode ID: b515f917a85de24645e08242a614a5f65668caf0269f9b2cbf601923f1cbe122
    • Instruction ID: ef5557dae0ad6fdb20b035ad9cd6dcb0682bdb8bec4776b5c24c73e39900c656
    • Opcode Fuzzy Hash: b515f917a85de24645e08242a614a5f65668caf0269f9b2cbf601923f1cbe122
    • Instruction Fuzzy Hash: 9ED05B30248204BAEBA027554805F1932B8771A70EF440124F14DD7EC0DF78C444CD36
    Uniqueness

    Uniqueness Score: -1.00%