Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.dll

Overview

General Information

Sample name:file.dll
(renamed file extension from exe to dll)
Original sample name:file.exe
Analysis ID:1524250
MD5:11c6dbe61f8144a8a66d8baaea40c4a3
SHA1:753b6723e7a8a2ca1000662093dc830e444d65ed
SHA256:396bae9eab9a773472e873a21cd471a17e3eca13cac264a22ef9adb735135c2d
Tags:dllexesignedx64user-jstrosch
Infos:

Detection

Score:5
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
One or more processes crash
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • loaddll64.exe (PID: 1644 cmdline: loaddll64.exe "C:\Users\user\Desktop\file.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 7120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5492 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 3836 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
        • WerFault.exe (PID: 3352 cmdline: C:\Windows\system32\WerFault.exe -u -p 3836 -s 448 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 5256 cmdline: rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_prism_d3d_D3DContext_nBlit MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 6032 cmdline: C:\Windows\system32\WerFault.exe -u -p 5256 -s 424 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 2976 cmdline: rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_prism_d3d_D3DContext_nBuildNativeGeometryInt MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2704 cmdline: rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_prism_d3d_D3DContext_nBuildNativeGeometryShort MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 6748 cmdline: C:\Windows\system32\WerFault.exe -u -p 2704 -s 420 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 7164 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DContext_nBlit MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 5084 cmdline: C:\Windows\system32\WerFault.exe -u -p 7164 -s 424 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 1112 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DContext_nBuildNativeGeometryInt MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 420 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DContext_nBuildNativeGeometryShort MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5756 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DSwapChain_nPresent MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5288 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_setConstantsI MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5296 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_setConstantsF MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6104 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_nGetRegister MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2564 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_init MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3504 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_enable MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4820 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_disable MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6548 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nUpdateTextureI MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6060 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nUpdateTextureF MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3688 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nUpdateTextureB MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5736 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nTestCooperativeLevel MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2360 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nResetDevice MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6164 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nReleaseResource MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5356 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nReadPixelsI MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6704 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nReadPixelsB MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: file.dllStatic PE information: certificate valid
Source: file.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: file.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: file.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: file.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: file.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: file.dllString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: file.dllString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: file.dllString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: file.dllString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: file.dllString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: file.dllString found in binary or memory: http://ocsp.digicert.com0
Source: file.dllString found in binary or memory: http://ocsp.digicert.com0A
Source: file.dllString found in binary or memory: http://ocsp.digicert.com0C
Source: file.dllString found in binary or memory: http://ocsp.digicert.com0X
Source: Amcache.hve.9.drString found in binary or memory: http://upx.sf.net
Source: file.dllString found in binary or memory: http://www.digicert.com/CPS0
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00007FFBBAF271D01_2_00007FFBBAF271D0
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00007FFBBAF22E401_2_00007FFBBAF22E40
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00007FFBBAF267101_2_00007FFBBAF26710
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00007FFBBAF21D601_2_00007FFBBAF21D60
Source: C:\Windows\System32\loaddll64.exeCode function: String function: 00007FFBBAF2A340 appears 61 times
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5256 -s 424
Source: file.dllBinary or memory string: OriginalFilenameprism_d3d.dllN vs file.dll
Source: classification engineClassification label: clean5.winDLL@93/17@0/0
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7164
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3836
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2704
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5256
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7120:120:WilError_03
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\eed4804f-0b39-4996-939e-13ab64227461Jump to behavior
Source: file.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_prism_d3d_D3DContext_nBlit
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\file.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_prism_d3d_D3DContext_nBlit
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",#1
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5256 -s 424
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3836 -s 448
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_prism_d3d_D3DContext_nBuildNativeGeometryInt
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_prism_d3d_D3DContext_nBuildNativeGeometryShort
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2704 -s 420
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DContext_nBlit
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DContext_nBuildNativeGeometryInt
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DContext_nBuildNativeGeometryShort
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DSwapChain_nPresent
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_setConstantsI
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_setConstantsF
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_nGetRegister
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_init
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_enable
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_disable
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nUpdateTextureI
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nUpdateTextureF
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nUpdateTextureB
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7164 -s 424
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nTestCooperativeLevel
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nResetDevice
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nReleaseResource
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nReadPixelsI
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nReadPixelsB
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_prism_d3d_D3DContext_nBlitJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_prism_d3d_D3DContext_nBuildNativeGeometryIntJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_prism_d3d_D3DContext_nBuildNativeGeometryShortJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DContext_nBlitJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DContext_nBuildNativeGeometryIntJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DContext_nBuildNativeGeometryShortJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DSwapChain_nPresentJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_setConstantsIJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_setConstantsFJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_nGetRegisterJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_initJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_enableJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_disableJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nUpdateTextureIJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nUpdateTextureFJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nUpdateTextureBJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nTestCooperativeLevelJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nResetDeviceJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nReleaseResourceJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nReadPixelsIJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nReadPixelsBJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5256 -s 424Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: wldp.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: file.dllStatic PE information: certificate valid
Source: file.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: file.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\loaddll64.exeAPI coverage: 9.6 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: Amcache.hve.9.drBinary or memory string: VMware
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.9.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
Source: Amcache.hve.9.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.9.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.9.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.9.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.9.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.9.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.9.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.9.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.9.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.9.drBinary or memory string: vmci.sys
Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.9.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.9.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.9.drBinary or memory string: VMware20,1
Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.9.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.9.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.9.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.9.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.9.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.9.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.9.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00007FFBBAF2B2D4 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FFBBAF2B2D4
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00007FFBBAF2B2D4 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FFBBAF2B2D4
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00007FFBBAF2AD34 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FFBBAF2AD34
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00007FFBBAF2AEB4 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,1_2_00007FFBBAF2AEB4
Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00007FFBBAF271D0 memset,GetVersionExW,1_2_00007FFBBAF271D0
Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Rundll32
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS3
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1524250 Sample: file.exe Startdate: 02/10/2024 Architecture: WINDOWS Score: 5 7 loaddll64.exe 1 2->7         started        process3 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        13 rundll32.exe 7->13         started        15 20 other processes 7->15 process4 17 rundll32.exe 9->17         started        19 WerFault.exe 20 18 11->19         started        21 WerFault.exe 13->21         started        23 WerFault.exe 16 15->23         started        process5 25 WerFault.exe 16 17->25         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.9.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1524250
Start date and time:2024-10-02 17:24:22 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 13s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:42
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.dll
(renamed file extension from exe to dll)
Original Sample Name:file.exe
Detection:CLEAN
Classification:clean5.winDLL@93/17@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 2
  • Number of non-executed functions: 21
  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.189.173.20, 104.208.16.94, 20.189.173.21
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.
  • VT rate limit hit for: file.dll
TimeTypeDescription
11:25:38API Interceptor4x Sleep call for process: WerFault.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8206295211669482
Encrypted:false
SSDEEP:192:yWEFijyKo0P0Ivp2jixEzuiFlZ24lO8V:jyiWKIIvp2jZzuiFlY4lO8V
MD5:21EE77D05877B280142DF67B9F75E14B
SHA1:3F861EB894D6117BB9E8AE1996CE984B8B299A3E
SHA-256:D56CA4C80A5BBDCF509A8ED4DDD583B390E2CE094761CF636229FA69D16B5FFB
SHA-512:240AD965BF2BEBDAA974EE3D6CFCD60EC3C04B51E8FB108F36736CF8896B7C6EEAEA2E1F46A29732FBCB1AB3605F52E5431AAA08E1B0241740E0B439902D1CCF
Malicious:false
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.3.5.6.3.4.1.2.4.2.2.0.8.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.3.5.6.3.4.2.3.5.1.4.3.1.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.2.4.3.2.5.5.0.-.b.f.a.0.-.4.d.6.b.-.a.8.f.0.-.1.4.e.0.9.f.e.4.b.0.c.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.8.1.e.a.1.9.e.-.2.2.4.1.-.4.b.e.0.-.8.7.b.8.-.f.a.f.1.3.3.9.5.5.0.d.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.f.i.l.e...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.f.c.-.0.0.0.1.-.0.0.1.4.-.c.5.0.3.-.4.4.5.6.d.f.1.4.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.r.u.n.
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8206902560767294
Encrypted:false
SSDEEP:192:1YHBqFidyeo0P0Ivp2jiB8zuiFlZ24lO8V:FioeIIvp2jhzuiFlY4lO8V
MD5:0693382EE4BB5AD7D9976FAEF6C1BC0A
SHA1:52E4F122C38052728A6FC9CA3C6D83E82062CF80
SHA-256:6FAEBC06B39ECD02F76BC4DBE9D7037D7C587D29677AC82CACBB14AE86B00F4D
SHA-512:FE462E167E3CF5618029E3859844694CE91F375C926AB9085375DCE4FC699650B2A6E4E632F71E5FF31163C327F83B074DF6D072929F2FBD9FA59E99123E59FC
Malicious:false
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.3.5.6.3.3.2.8.3.7.1.9.5.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.3.5.6.3.3.3.3.2.1.5.7.5.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.6.3.a.a.c.9.4.-.5.c.4.9.-.4.a.3.5.-.8.e.e.e.-.f.8.e.0.5.6.6.e.9.b.8.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.6.f.e.c.5.8.c.-.d.3.a.9.-.4.5.a.f.-.a.a.1.5.-.7.7.6.e.1.f.5.a.8.d.a.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.f.i.l.e...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.e.f.c.-.0.0.0.1.-.0.0.1.4.-.f.3.a.0.-.c.d.5.0.d.f.1.4.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.r.u.n.
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8212216328363725
Encrypted:false
SSDEEP:192:1EgmuFipyXo0P0Ivp2jixEzuiFlZ24lO8V:hi8XIIvp2jJzuiFlY4lO8V
MD5:EDC4ABA2A333233D392B2BE01FD242EF
SHA1:DCE586B17D4EA94FAF66AC85B379CE1B83B3DEFC
SHA-256:5249CC3500A8F936904437B4E10BC67BCC892BA1FCEB8F6975341320EDDB3C04
SHA-512:571603C72B975F9F46A7A8C1ABDA8D7CA2100BA0B0AD9948702CA7A45A2F35063D2033C6587963755DD5949E91504A6F117F2BB930EF4236F822E444571D3B63
Malicious:false
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.3.5.6.3.3.2.8.3.7.2.0.1.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.3.5.6.3.3.3.3.6.8.4.5.0.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.f.e.a.4.c.1.9.-.5.1.c.4.-.4.7.e.9.-.a.6.1.0.-.0.b.8.2.2.d.6.f.1.a.b.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.c.b.d.f.3.2.b.-.6.5.b.7.-.4.b.e.3.-.8.5.9.7.-.e.3.5.3.8.f.4.5.1.d.4.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.f.i.l.e...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.8.8.-.0.0.0.1.-.0.0.1.4.-.6.b.1.2.-.c.6.5.0.d.f.1.4.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.r.u.n.
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8179678961560085
Encrypted:false
SSDEEP:192:1+jN3lFicyoo0j0IvXrpjix8zuiFlZ24lO8VY:s5iRokIvXrpjBzuiFlY4lO8VY
MD5:157E8F652E381F9BBF79AEA50B9A2E1E
SHA1:029DECD3B6796B14F30F12B15A191547E208A400
SHA-256:48B7CC46F88D17B802DAFD8EE816E76A6AA3078B99A9419B1E84C9F35283F261
SHA-512:5D2271B9206094A59BBC48EFDA5DDA593E35F9F095A7B55CA5A1968EB33CCD1A6A5907C88A650315C750D36FA0B09A01AC554D20FAF21FDF54EC517C19E1B56A
Malicious:false
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.3.5.6.3.3.6.6.4.9.9.5.8.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.3.5.6.3.3.7.0.5.6.2.1.9.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.5.6.c.9.9.e.7.-.c.6.a.7.-.4.3.1.f.-.9.5.4.f.-.a.c.7.2.c.8.4.6.7.3.5.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.b.8.2.a.d.0.1.-.2.d.d.4.-.4.4.9.d.-.b.1.b.c.-.6.7.e.4.a.0.7.a.a.d.c.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.f.i.l.e...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.a.9.0.-.0.0.0.1.-.0.0.1.4.-.0.6.9.3.-.6.d.5.4.d.f.1.4.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.r.u.n.
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Wed Oct 2 15:25:32 2024, 0x1205a4 type
Category:dropped
Size (bytes):67928
Entropy (8bit):1.5956032358629273
Encrypted:false
SSDEEP:192:SVbl/W6OMxw6LIK4y3HtwCN+kWEDbjG2vHSXmb4mMYYVnn6:4h/wTSIK4y3HtwO+kDrrB4ma96
MD5:457748F33F292049FCBEE0C051CD42AC
SHA1:72F371B77CBF590A36BF2CA8C03FA4ACEF119DE4
SHA-256:0FC7250B80F6D5669A7FAEDB3E480F6A1E93E6FA48B3B9CACC726A5E43701B42
SHA-512:E47F1FCCE34C2BAB417AF9740C5C6536DC0ED874FD9BF88F21BCC7EB09171ED26425D06C30FF76AC213FFE0394E0EAD2E81DB7CEB94BBCB99BD8D37DC18280A5
Malicious:false
Preview:MDMP..a..... ........e.f....................................4...~2..........T.......8...........T...............@...........x...........d...............................................................................eJ..............Lw......................T............e.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Wed Oct 2 15:25:33 2024, 0x1205a4 type
Category:dropped
Size (bytes):59148
Entropy (8bit):1.6740085952012365
Encrypted:false
SSDEEP:192:vQG10OMx88QJQ7IHc0PT6kY/EZ+PgYSXqo4lnFqv:IG17D8QJQ7IHc0PWkY/EaFo4lng
MD5:B7C56472FD56F65551D11A757498EC93
SHA1:19E4EF9E6E5F2A26BB5F90EABDBC911FEBC363EB
SHA-256:9E90E037FE7B405FE9C5898FD3682579C86DD901A84683208A4992AA87CAACF1
SHA-512:22263ABC46367DFB5665C02C5359BEC96ABED61A0935BE5130CC7C4C01305208AB42383FF564B2F67D2261692DDBAC78A79147E71F4C11F2DD529BE3D31C2333
Malicious:false
Preview:MDMP..a..... ........e.f........................................~-..........T.......8...........T...............D...........H...........4...............................................................................eJ..............Lw......................T............e.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8760
Entropy (8bit):3.6973462787253304
Encrypted:false
SSDEEP:192:R6l7wVeJzFAE6YRr4fgmfiL0n/JprR889bWljfKym:R6lXJRAE6YN4gmfG8/tpWxfW
MD5:4B1F038FB84ECA89171B1C145B0A7900
SHA1:EFDB8DBAC5412D54DBCEBB793F9AAB5B1F9456F4
SHA-256:8EBEDA5243DCFC74F45DE545513EDA43BE279F9A6DC29E3417B03AC9EA8D43C1
SHA-512:6DF82224A7EE6EEBBC44C55602916BEDDFF646D06F2DBBD449A9BA63254E968FE88FEE906BE6D2C30F9A5D21C6BC79EFB506802256C0A825113322425A3C2DDA
Malicious:false
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.8.3.6.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8752
Entropy (8bit):3.6962885640906586
Encrypted:false
SSDEEP:192:R6l7wVeJpluy6YeduHHLgmfiL0n/JprT89bWGjfNym:R6lXJiy6Y8uLgmfG8/QWafp
MD5:C84F09EF7C728435B9EC435F36A3168A
SHA1:EDCA016773E3B54A0309773F6A57B61C5F3909E1
SHA-256:271905847D6E3887CBEF25FE9C68579FD0DCA0D9013BCFD8FCD16C99D0F46753
SHA-512:1F9F285FD2109BC6BDBC1226BD8494DBB228CB463D370FF8E583945938D7ED3511C2A911A57ED57D91F9BDAA1D55FBA1FBBAED948CED2F621F5DD0FC62533C48
Malicious:false
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.5.6.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4730
Entropy (8bit):4.463074255800385
Encrypted:false
SSDEEP:48:cvIwWl8zsrJg771I9Y/5WpW8VYNYm8M4JCFCtsNrF6yq85m4zeWptSTSRd:uIjfFI7F/I7VBJi0GhpoORd
MD5:BB279669C6E2686EBC7C000C0D34919B
SHA1:9BA111576D7CC7BD7F72E9F07AEE2EB02FF71C1D
SHA-256:0BD2E94E948D3C61C53B000504E61604E573F1B87D6D7151C8241BCDCB743FE1
SHA-512:3D6B28C2470F4264851E9B7F8F6B0D220BB2241CE33D40E2B7C3EFA1FC56453CF9002FD46E94E6CF7D00B5692FEC6C5D81FA5B5F9C57F0B96B6D2151C7932207
Malicious:false
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="525988" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4730
Entropy (8bit):4.467180713672316
Encrypted:false
SSDEEP:48:cvIwWl8zsrJg771I9Y/5WpW8VYpJPYm8M4JCFCtsNrFPyq85m4zeOptSTSsd:uIjfFI7F/I7VSSJiRGZpoOsd
MD5:2783E7B586BB692BF37610076278652B
SHA1:8C258474CDBC0FAA8D584913A615B57355509533
SHA-256:9EE08AF35C33D5BE95C8BA0B581E32A7C578C7C4FB8DC7A9D0C93F643FD2C37A
SHA-512:9E784A8E3B5E098B7EEAC7F101942D0EC0C18521AD35B634FA4FF462EF4516A79EC3DDAFC66837163848BCFE68CE695D3DE63E06C6C43B611A83E4056A772FB6
Malicious:false
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="525988" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Wed Oct 2 15:25:36 2024, 0x1205a4 type
Category:dropped
Size (bytes):57436
Entropy (8bit):1.7138147913521848
Encrypted:false
SSDEEP:192:2MFsOMxAepsEuTMGjEmnuu+2DSVDe4eXNdrgGmvTVypa:lFj/ep+MGjEmnuu+2DwkdF7mvTgk
MD5:31C087CF2661B9C84B75834C640B70A3
SHA1:C18E7A0520EB1491487883AF1B5ACA91AEADF639
SHA-256:024C46BFB9EC94F553E71149F6BA7B4C0CDAAE039DA7EB11D26CC1F51D839118
SHA-512:92EFC6FD0F8A8B7746424F85C439518D219941D593DDE95C2F9BFC955F0965551B35F1039AC23563B6BA2DC1D17B729252055EDE0FCF35268D0C28DE9FC13967
Malicious:false
Preview:MDMP..a..... ........e.f........................................~-..........T.......8...........T...........................H...........4...............................................................................eJ..............Lw......................T............e.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8492
Entropy (8bit):3.6938084661988846
Encrypted:false
SSDEEP:192:R6l7wVeJvMXZ6YemuHHLgmfiL0DBoJprG89b7z3f1pm:R6lXJ0Z6YHuLgmfGIBob7jfi
MD5:DFBA56AE55EA06524A72D596D6DDDFA6
SHA1:B2EB4516A946DE482276DF7DE883F84C946E0299
SHA-256:A83EE5E4B2004D52B204B46AD946C8B96124E9F45FF3132A30F3ECCDB73E2B77
SHA-512:E0F603D9B7648F9742ADCD8519AE0FFE720B2EA22827705F570614635DA61DE0DF0234867DBF1BDBDCCA1AC407FE0E3C4D1C74018E3DC6634D39C8D73DD5AC7F
Malicious:false
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.7.0.4.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4729
Entropy (8bit):4.462587773487211
Encrypted:false
SSDEEP:48:cvIwWl8zsrJg771I9Y/5WpW8VYfYm8M4JCFCtsNNFA/yq85m4zedNptSTSNd:uIjfFI7F/I7V3JiaGsNpoONd
MD5:9F433FA66F407DF394F1F172C4F4135C
SHA1:5C2F72C3DEB90B9F2959976F3EE9ACC0A0333721
SHA-256:F8BEC48E83764361289B9C7B627A3A749D9D0B331EF243E78BD82C5F5F78A360
SHA-512:DD4053038A8637D0528DF259E70D54A027093850E939A6E024EB5033B65BEE60FDDB8CFE29FB4B684CC126B6162D7D157600B3BBF793406C006AB5DC57893854
Malicious:false
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="525988" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Wed Oct 2 15:25:41 2024, 0x1205a4 type
Category:dropped
Size (bytes):68828
Entropy (8bit):1.564421803927063
Encrypted:false
SSDEEP:192:3RmxTOMx0503kA6QHnWyHHRAILT5q9GHhSXKTrxQHt:BmxKr503kA6QHWaeILT89AtTriN
MD5:9C5AE198F712FFAE0213B5A9D3EA8E0B
SHA1:C46097F8B4F93877C8B0155AE2C1C0CFCF112448
SHA-256:395AF3B27160839DD9E378FA3724D2A5AB7871E510C14922FA7C31FA070E1E2B
SHA-512:EB4D6A5513FA183977B6C10A6B59A0D2C8A1C9DF1D13DB220A0E6E5CB9436EC577CC75A4829E4FC6053330BFB490E62D76B75F2283770C012D9779205B2E6CCA
Malicious:false
Preview:MDMP..a..... ........e.f....................................4...~2..........T.......8...........T...........................x...........d...............................................................................eJ..............Lw......................T............e.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8760
Entropy (8bit):3.694902786437687
Encrypted:false
SSDEEP:192:R6l7wVeJhi86YeHLHsIgmfiL0n/JprQ89bj7jf9Bm:R6lXJ086YSHsIgmfG8/5jffS
MD5:856972DA2CD110F9610AE15B1A0322B5
SHA1:3410C377B68D8DAFAB84576543C4D1918438A856
SHA-256:6463233A4A4FA3D2DB9915402FCC42010D4BB4EB49BA26B93EEACCC514D9E304
SHA-512:D4213A2C2435BB1400E60386BA7ECFA9B8DDB1B57B6C9FC45332B5596E8E50D7C123E62D0B81D660002EB1510B091BF44D55D6EE2F2A81C802F3CA1C8D82E533
Malicious:false
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.6.4.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4730
Entropy (8bit):4.465649148745461
Encrypted:false
SSDEEP:48:cvIwWl8zsrJg771I9Y/5WpW8VY0Ym8M4JCFCtsNrFSyq85m4zemptSTSxd:uIjfFI7F/I7VcJiEGBpoOxd
MD5:75AD4F895016AFACBCA2AE1134903A26
SHA1:F88017586D3A95BA1E2891EA127E443E37EC8AAF
SHA-256:6A207C61158710CD1E28596B7106DFE9CAE17C5D6FAD9649C5667501815BA860
SHA-512:BF85414C168CA3011BF873E7F14D7EA59AFD5A3BF4F58C3DF72EF2B670D0A83004C587E7B7E241D61CA14350A513106AF2594505513A06C7245081651929F65F
Malicious:false
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="525988" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\System32\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.372995690518871
Encrypted:false
SSDEEP:6144:YFVfpi6ceLP/9skLmb08yWWSPtaJG8nAge35OlMMhA2AX4WABlguNViL:gV1qyWWI/glMM6kF7vq
MD5:6ABC6CE518154BFCE1A9FF6152BB6018
SHA1:65273BC171C2B773A91437F2104B8E6C7A479F8F
SHA-256:0276FF4265AF8EBE087371824082A5D3BD815F67205022BCD1AF43C3A83DC145
SHA-512:F07E69DA3CB54815944DB9690C430E72A1409A5DCEF4AD06EC0B70594012C4842F6ADDFBB56788CC2E20CFD520DD1A6062BE5363AFC2F8E902C9CCF6F810ECC2
Malicious:false
Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...Q...................................................................................................................................................................................................................................................................................................................................................e........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Entropy (8bit):5.772914279113951
TrID:
  • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
  • Win64 Executable (generic) (12005/4) 10.17%
  • Generic Win/DOS Executable (2004/3) 1.70%
  • DOS Executable Generic (2002/1) 1.70%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
File name:file.dll
File size:135'840 bytes
MD5:11c6dbe61f8144a8a66d8baaea40c4a3
SHA1:753b6723e7a8a2ca1000662093dc830e444d65ed
SHA256:396bae9eab9a773472e873a21cd471a17e3eca13cac264a22ef9adb735135c2d
SHA512:c8b01d4c6a2503b18e423e68924803e5a7a7eded276da9dea3447d95584ad573459096716e6a9d8a629e64ec7e98987c89e2955febea6d6c0adf307e8d478ee9
SSDEEP:3072:AdNu1ZBNfDXp5dJoXdTd7d74TwdRdtdg7j++1+V+vtW1+A+T+LfSoCxC1CEiJLCk:ZfCr+w69
TLSH:4AD3941AB2C4883AC4161775A887AB35A2B1FE5327064BDF76B0731C3FB23D4ADB5158
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........}.....................................................................h.......h.......h.......h.......Rich............PE..d..
Icon Hash:7ae282899bbab082
Entrypoint:0x18000ab54
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x180000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x63BBBFF6 [Mon Jan 9 07:19:18 2023 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:a5ec31ee477499f10294bd429015753f
Signature Valid:true
Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
Signature Validation Error:The operation completed successfully
Error Number:0
Not Before, Not After
  • 19/08/2021 02:00:00 20/08/2023 01:59:59
Subject Chain
  • CN="Oracle America, Inc.", OU=Software Engineering, O="Oracle America, Inc.", L=Redwood City, S=California, C=US
Version:3
Thumbprint MD5:2876C1BECB51837D0E3DE50903D025B6
Thumbprint SHA-1:940D69C0A34A1B4CFD8048488BA86F4CED60481A
Thumbprint SHA-256:EE46613A38B4F486164BCE7FB23178667715617F511B364594311A1548B08EB1
Serial:068BE2F53452C882F18ED41A5DD4E7A3
Instruction
dec eax
mov dword ptr [esp+08h], ebx
dec eax
mov dword ptr [esp+10h], esi
push edi
dec eax
sub esp, 20h
dec ecx
mov edi, eax
mov ebx, edx
dec eax
mov esi, ecx
cmp edx, 01h
jne 00007F38A54086D7h
call 00007F38A5408A14h
dec esp
mov eax, edi
mov edx, ebx
dec eax
mov ecx, esi
dec eax
mov ebx, dword ptr [esp+30h]
dec eax
mov esi, dword ptr [esp+38h]
dec eax
add esp, 20h
pop edi
jmp 00007F38A5408564h
int3
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
dec eax
mov eax, edx
dec eax
lea ecx, dword ptr [0000FC01h]
xorps xmm0, xmm0
dec eax
mov dword ptr [ebx], ecx
dec eax
lea edx, dword ptr [ebx+08h]
dec eax
lea ecx, dword ptr [eax+08h]
movups dqword ptr [edx], xmm0
call 00007F38A54091A8h
dec eax
lea eax, dword ptr [0000FC14h]
dec eax
mov dword ptr [ebx], eax
dec eax
mov eax, ebx
dec eax
add esp, 20h
pop ebx
ret
dec eax
and dword ptr [ecx+10h], 00000000h
dec eax
lea eax, dword ptr [0000FC0Ch]
dec eax
mov dword ptr [ecx+08h], eax
dec eax
lea eax, dword ptr [0000FBF1h]
dec eax
mov dword ptr [ecx], eax
dec eax
mov eax, ecx
ret
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
dec eax
mov eax, edx
dec eax
lea ecx, dword ptr [0000FBA5h]
xorps xmm0, xmm0
dec eax
mov dword ptr [ebx], ecx
dec eax
lea edx, dword ptr [ebx+08h]
dec eax
lea ecx, dword ptr [eax+08h]
movups dqword ptr [edx], xmm0
call 00007F38A540914Ch
dec eax
lea eax, dword ptr [00000000h]
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x1c6400x1044.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0x1d6840xdc.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x210000x3a8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x200000xd14.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x1ea000x28a0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x220000x118.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x1a9900x1c.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1a8500x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0xc0000x288.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xa9e50xaa00d607c2427113198d77f5664cbd0c33b7False0.5085477941176471data6.125260687153464IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0xc0000x1224e0x124003971ea6deb0cac45ad8f39ac4e67661cFalse0.17880458047945205data4.655226421934722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x1f0000x9f80x400bd93cfea89e84618ebcf550f41e6cf61False0.265625data3.0742552801167684IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x200000xd140xe00a109694a9d484eaf5254bf0ad995674cFalse0.45535714285714285data4.70318982159129IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x210000x3a80x400f26fe9c4c691a3ced445320f516ad8d8False0.4140625data3.11928289929837IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x220000x1180x200ac550551797bcdc73a1167b2808c0b10False0.458984375data3.374438955783244IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0x210600x348dataEnglishUnited States0.46190476190476193
DLLImport
USER32.dllIsWindow, GetDesktopWindow
MSVCP140.dll?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?uncaught_exception@std@@YA_NXZ
KERNEL32.dllLoadLibraryW, IsDebuggerPresent, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, IsProcessorFeaturePresent, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, GetSystemDirectoryW, GetVersionExW, FreeLibrary, GetProcAddress, OutputDebugStringA, GetVersion, RtlCaptureContext
VCRUNTIME140_1.dll__CxxFrameHandler4
VCRUNTIME140.dll__std_type_info_destroy_list, memset, __std_terminate, memcpy, _purecall, __C_specific_handler, __current_exception, __current_exception_context, __std_exception_copy, __std_exception_destroy, _CxxThrowException
api-ms-win-crt-runtime-l1-1-0.dll_configure_narrow_argv, _invalid_parameter_noinfo, _cexit, _execute_onexit_table, _initialize_onexit_table, _initialize_narrow_environment, _initterm, _initterm_e, _errno, _seh_filter_dll, terminate
api-ms-win-crt-string-l1-1-0.dllstrncmp, strncpy, wcscat_s
api-ms-win-crt-stdio-l1-1-0.dllfflush, __stdio_common_vsscanf, fopen, __stdio_common_vfprintf, __acrt_iob_func, __stdio_common_vsprintf
api-ms-win-crt-environment-l1-1-0.dllgetenv
api-ms-win-crt-heap-l1-1-0.dllmalloc, _callnewh, free
NameOrdinalAddress
Java_com_sun_prism_d3d_D3DContext_nBlit10x180002a30
Java_com_sun_prism_d3d_D3DContext_nBuildNativeGeometryInt20x180002ad0
Java_com_sun_prism_d3d_D3DContext_nBuildNativeGeometryShort30x180002c10
Java_com_sun_prism_d3d_D3DContext_nCreateD3DMesh40x180002d50
Java_com_sun_prism_d3d_D3DContext_nCreateD3DMeshView50x180002d90
Java_com_sun_prism_d3d_D3DContext_nCreateD3DPhongMaterial60x180002de0
Java_com_sun_prism_d3d_D3DContext_nDrawIndexedQuads70x1800038d0
Java_com_sun_prism_d3d_D3DContext_nGetFrameStats80x1800039b0
Java_com_sun_prism_d3d_D3DContext_nIsRTTVolatile90x180003b20
Java_com_sun_prism_d3d_D3DContext_nReleaseD3DMesh100x180002e20
Java_com_sun_prism_d3d_D3DContext_nReleaseD3DMeshView110x180002e20
Java_com_sun_prism_d3d_D3DContext_nReleaseD3DPhongMaterial120x180002e20
Java_com_sun_prism_d3d_D3DContext_nRenderMeshView130x180002e40
Java_com_sun_prism_d3d_D3DContext_nResetClipRect140x180003b40
Java_com_sun_prism_d3d_D3DContext_nResetTransform150x180003b60
Java_com_sun_prism_d3d_D3DContext_nSetAmbientLight160x180002e50
Java_com_sun_prism_d3d_D3DContext_nSetBlendEnabled170x180003b80
Java_com_sun_prism_d3d_D3DContext_nSetCameraPosition180x180003c80
Java_com_sun_prism_d3d_D3DContext_nSetClipRect190x180003cb0
Java_com_sun_prism_d3d_D3DContext_nSetCullingMode200x180002e70
Java_com_sun_prism_d3d_D3DContext_nSetDeviceParametersFor2D210x180002eb0
Java_com_sun_prism_d3d_D3DContext_nSetDeviceParametersFor3D220x180002fc0
Java_com_sun_prism_d3d_D3DContext_nSetDiffuseColor230x180002fe0
Java_com_sun_prism_d3d_D3DContext_nSetMap240x180003010
Java_com_sun_prism_d3d_D3DContext_nSetMaterial250x180003030
Java_com_sun_prism_d3d_D3DContext_nSetPointLight260x180003050
Java_com_sun_prism_d3d_D3DContext_nSetProjViewMatrix270x180003ce0
Java_com_sun_prism_d3d_D3DContext_nSetRenderTarget280x180003e00
Java_com_sun_prism_d3d_D3DContext_nSetSpecularColor290x1800030d0
Java_com_sun_prism_d3d_D3DContext_nSetTexture300x180003e60
Java_com_sun_prism_d3d_D3DContext_nSetTransform310x180003fa0
Java_com_sun_prism_d3d_D3DContext_nSetWireframe320x180003110
Java_com_sun_prism_d3d_D3DContext_nSetWorldTransform330x1800040b0
Java_com_sun_prism_d3d_D3DContext_nSetWorldTransformToIdentity340x1800041b0
Java_com_sun_prism_d3d_D3DGraphics_nClear350x1800041c0
Java_com_sun_prism_d3d_D3DPipeline_nDispose360x180006290
Java_com_sun_prism_d3d_D3DPipeline_nGetAdapterCount370x1800062a0
Java_com_sun_prism_d3d_D3DPipeline_nGetAdapterOrdinal380x1800062b0
Java_com_sun_prism_d3d_D3DPipeline_nGetDriverInformation390x1800062d0
Java_com_sun_prism_d3d_D3DPipeline_nGetErrorMessage400x1800065a0
Java_com_sun_prism_d3d_D3DPipeline_nGetMaxSampleSupport410x1800065d0
Java_com_sun_prism_d3d_D3DPipeline_nInit420x180006660
Java_com_sun_prism_d3d_D3DResourceFactory_nCreateSwapChain430x1800081f0
Java_com_sun_prism_d3d_D3DResourceFactory_nCreateTexture440x180008280
Java_com_sun_prism_d3d_D3DResourceFactory_nGetContext450x180008420
Java_com_sun_prism_d3d_D3DResourceFactory_nGetDevice460x180008480
Java_com_sun_prism_d3d_D3DResourceFactory_nGetMaximumTextureSize470x180008490
Java_com_sun_prism_d3d_D3DResourceFactory_nGetNativeTextureObject480x1800084c0
Java_com_sun_prism_d3d_D3DResourceFactory_nGetTextureHeight490x1800084d0
Java_com_sun_prism_d3d_D3DResourceFactory_nGetTextureWidth500x1800084e0
Java_com_sun_prism_d3d_D3DResourceFactory_nIsDefaultPool510x1800084f0
Java_com_sun_prism_d3d_D3DResourceFactory_nReadPixelsB520x180008520
Java_com_sun_prism_d3d_D3DResourceFactory_nReadPixelsI530x180008520
Java_com_sun_prism_d3d_D3DResourceFactory_nReleaseResource540x180008570
Java_com_sun_prism_d3d_D3DResourceFactory_nResetDevice550x1800085a0
Java_com_sun_prism_d3d_D3DResourceFactory_nTestCooperativeLevel560x1800085c0
Java_com_sun_prism_d3d_D3DResourceFactory_nUpdateTextureB570x1800085e0
Java_com_sun_prism_d3d_D3DResourceFactory_nUpdateTextureF580x180008740
Java_com_sun_prism_d3d_D3DResourceFactory_nUpdateTextureI590x1800089b0
Java_com_sun_prism_d3d_D3DShader_disable600x180009ae0
Java_com_sun_prism_d3d_D3DShader_enable610x180009b10
Java_com_sun_prism_d3d_D3DShader_init620x180009b70
Java_com_sun_prism_d3d_D3DShader_nGetRegister630x180009be0
Java_com_sun_prism_d3d_D3DShader_setConstantsF640x180009bf0
Java_com_sun_prism_d3d_D3DShader_setConstantsI650x180009cc0
Java_com_sun_prism_d3d_D3DSwapChain_nPresent660x180004220
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:1
Start time:11:25:29
Start date:02/10/2024
Path:C:\Windows\System32\loaddll64.exe
Wow64 process (32bit):false
Commandline:loaddll64.exe "C:\Users\user\Desktop\file.dll"
Imagebase:0x7ff6ce710000
File size:165'888 bytes
MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Target ID:2
Start time:11:25:30
Start date:02/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6ee680000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Target ID:3
Start time:11:25:30
Start date:02/10/2024
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1
Imagebase:0x7ff6c0920000
File size:289'792 bytes
MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:4
Start time:11:25:30
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_prism_d3d_D3DContext_nBlit
Imagebase:0x7ff6f9af0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:5
Start time:11:25:30
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",#1
Imagebase:0x7ff6f9af0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:9
Start time:11:25:32
Start date:02/10/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 5256 -s 424
Imagebase:0x7ff7035e0000
File size:570'736 bytes
MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:10
Start time:11:25:32
Start date:02/10/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 3836 -s 448
Imagebase:0x7ff7035e0000
File size:570'736 bytes
MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:11
Start time:11:25:33
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_prism_d3d_D3DContext_nBuildNativeGeometryInt
Imagebase:0x7ff6f9af0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:13
Start time:11:25:36
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_prism_d3d_D3DContext_nBuildNativeGeometryShort
Imagebase:0x7ff6f9af0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:15
Start time:11:25:36
Start date:02/10/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 2704 -s 420
Imagebase:0x7ff7035e0000
File size:570'736 bytes
MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:16
Start time:11:25:39
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DContext_nBlit
Imagebase:0x7ff6f9af0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:17
Start time:11:25:39
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DContext_nBuildNativeGeometryInt
Imagebase:0x7ff6f9af0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:18
Start time:11:25:39
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DContext_nBuildNativeGeometryShort
Imagebase:0x7ff6f9af0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:19
Start time:11:25:39
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DSwapChain_nPresent
Imagebase:0x7ff6f9af0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:21
Start time:11:25:39
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_setConstantsI
Imagebase:0x7ff6f9af0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:22
Start time:11:25:39
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_setConstantsF
Imagebase:0x7ff6f9af0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:23
Start time:11:25:39
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_nGetRegister
Imagebase:0x7ff6f9af0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:25
Start time:11:25:39
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_init
Imagebase:0x7ff6f9af0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:26
Start time:11:25:39
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_enable
Imagebase:0x7ff6f9af0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:27
Start time:11:25:39
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DShader_disable
Imagebase:0x7ff6f9af0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:28
Start time:11:25:39
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nUpdateTextureI
Imagebase:0x7ff6f9af0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:29
Start time:11:25:39
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nUpdateTextureF
Imagebase:0x7ff6f9af0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:30
Start time:11:25:39
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nUpdateTextureB
Imagebase:0x7ff6f9af0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:31
Start time:11:25:39
Start date:02/10/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 7164 -s 424
Imagebase:0x7ff7035e0000
File size:570'736 bytes
MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:34
Start time:11:25:39
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nTestCooperativeLevel
Imagebase:0x7ff6f9af0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:35
Start time:11:25:39
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nResetDevice
Imagebase:0x7ff6f9af0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:37
Start time:11:25:40
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nReleaseResource
Imagebase:0x7ff6f9af0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:39
Start time:11:25:40
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nReadPixelsI
Imagebase:0x7ff6f9af0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:40
Start time:11:25:40
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_prism_d3d_D3DResourceFactory_nReadPixelsB
Imagebase:0x7ff6f9af0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:1.5%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:14.7%
    Total number of Nodes:682
    Total number of Limit Nodes:0
    execution_graph 3225 7ffbbaf23fa0 3226 7ffbbaf23fbc 3225->3226 3227 7ffbbaf23faf 3225->3227 3230 7ffbbaf22100 3226->3230 3229 7ffbbaf2409f 3231 7ffbbaf2210a 3230->3231 3233 7ffbbaf22110 3230->3233 3231->3229 3233->3233 3235 7ffbbaf2a6a0 3233->3235 3236 7ffbbaf2a6a9 3235->3236 3237 7ffbbaf2ad68 IsProcessorFeaturePresent 3236->3237 3238 7ffbbaf22392 3236->3238 3239 7ffbbaf2ad80 3237->3239 3238->3229 3244 7ffbbaf2ae3c RtlCaptureContext 3239->3244 3245 7ffbbaf2ae56 RtlLookupFunctionEntry 3244->3245 3246 7ffbbaf2ae6c RtlVirtualUnwind 3245->3246 3247 7ffbbaf2ad93 3245->3247 3246->3245 3246->3247 3248 7ffbbaf2ad34 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 3247->3248 3549 7ffbbaf24220 3550 7ffbbaf2428d 3549->3550 3551 7ffbbaf2423d 3549->3551 3552 7ffbbaf2a6a0 8 API calls 3550->3552 3551->3550 3554 7ffbbaf24242 3551->3554 3553 7ffbbaf2429f 3552->3553 3555 7ffbbaf2a6a0 8 API calls 3554->3555 3556 7ffbbaf24287 3555->3556 3999 7ffbbaf28520 4002 7ffbbaf27e80 3999->4002 4001 7ffbbaf28564 4003 7ffbbaf27f7c 4002->4003 4004 7ffbbaf27e9b 4002->4004 4003->4001 4004->4003 4005 7ffbbaf27ec5 4004->4005 4008 7ffbbaf27eeb 4004->4008 4006 7ffbbaf2a340 10 API calls 4005->4006 4007 7ffbbaf27ed8 4006->4007 4007->4001 4010 7ffbbaf27f23 4008->4010 4011 7ffbbaf27bd0 4008->4011 4010->4001 4012 7ffbbaf27bf5 4011->4012 4013 7ffbbaf27e69 4011->4013 4012->4013 4014 7ffbbaf27c1c 4012->4014 4015 7ffbbaf27c45 4012->4015 4013->4010 4016 7ffbbaf2a340 10 API calls 4014->4016 4025 7ffbbaf297e0 4015->4025 4018 7ffbbaf27c2f 4016->4018 4018->4010 4019 7ffbbaf27c6e 4020 7ffbbaf27ce8 4019->4020 4021 7ffbbaf27cb7 4019->4021 4024 7ffbbaf27ccd 4019->4024 4023 7ffbbaf27e40 memcpy 4020->4023 4020->4024 4022 7ffbbaf2a340 10 API calls 4021->4022 4022->4024 4023->4023 4023->4024 4024->4010 4027 7ffbbaf29810 4025->4027 4028 7ffbbaf2981a 4025->4028 4027->4019 4028->4027 4029 7ffbbaf28db0 4028->4029 4030 7ffbbaf28ddf 4029->4030 4032 7ffbbaf28dd5 4029->4032 4031 7ffbbaf2a5c8 2 API calls 4030->4031 4030->4032 4031->4032 4032->4027 3249 7ffbbaf21bb0 3252 7ffbbaf21bee 3249->3252 3254 7ffbbaf21be4 3249->3254 3250 7ffbbaf2a6a0 8 API calls 3251 7ffbbaf21d44 3250->3251 3252->3254 3255 7ffbbaf2a340 3252->3255 3254->3250 3256 7ffbbaf2a368 getenv 3255->3256 3271 7ffbbaf2a41e 3255->3271 3257 7ffbbaf2a384 3256->3257 3258 7ffbbaf2a3ba getenv 3256->3258 3277 7ffbbaf2a570 3257->3277 3259 7ffbbaf2a3fd 3258->3259 3260 7ffbbaf2a3cf fopen 3258->3260 3264 7ffbbaf2a409 __acrt_iob_func 3259->3264 3259->3271 3263 7ffbbaf2a3ee 3260->3263 3260->3271 3261 7ffbbaf2a4f2 3261->3254 3280 7ffbbaf2a510 __acrt_iob_func 3263->3280 3264->3271 3265 7ffbbaf2a468 printf 3268 7ffbbaf2a4b1 __stdio_common_vfprintf 3265->3268 3266 7ffbbaf2a3a0 3266->3258 3269 7ffbbaf2a4d2 3268->3269 3270 7ffbbaf2a4e5 fflush 3268->3270 3273 7ffbbaf27b80 fprintf __stdio_common_vfprintf 3269->3273 3270->3261 3271->3261 3271->3265 3274 7ffbbaf2a459 3271->3274 3275 7ffbbaf2a46a 3271->3275 3272 7ffbbaf27b80 fprintf __stdio_common_vfprintf 3272->3265 3273->3270 3283 7ffbbaf27b80 3274->3283 3275->3265 3275->3272 3286 7ffbbaf2a500 3277->3286 3279 7ffbbaf2a596 __stdio_common_vsscanf 3279->3266 3287 7ffbbaf27b70 3280->3287 3282 7ffbbaf2a546 __stdio_common_vfprintf 3282->3259 3288 7ffbbaf27b70 3283->3288 3285 7ffbbaf27ba6 __stdio_common_vfprintf 3285->3265 3286->3279 3287->3282 3288->3285 3557 7ffbbaf22a30 3558 7ffbbaf22ac2 3557->3558 3559 7ffbbaf22a40 3557->3559 3559->3558 3561 7ffbbaf23810 3559->3561 3562 7ffbbaf2383a 3561->3562 3563 7ffbbaf2a6a0 8 API calls 3562->3563 3564 7ffbbaf238c1 3563->3564 3564->3558 3289 7ffbbaf281af 3290 7ffbbaf281b3 3289->3290 3291 7ffbbaf28258 3290->3291 3292 7ffbbaf28205 IsWindow 3290->3292 3292->3291 3293 7ffbbaf28212 3292->3293 3295 7ffbbaf292c0 3293->3295 3296 7ffbbaf292ef 3295->3296 3298 7ffbbaf292e5 3295->3298 3296->3298 3299 7ffbbaf2a5c8 3296->3299 3298->3291 3300 7ffbbaf2a5e2 malloc 3299->3300 3301 7ffbbaf2a5ec 3300->3301 3302 7ffbbaf2a5d3 3300->3302 3301->3298 3302->3300 3303 7ffbbaf2a5f2 3302->3303 3304 7ffbbaf2a5fd 3303->3304 3306 7ffbbaf2acd8 3303->3306 3309 7ffbbaf2abd0 3306->3309 3308 7ffbbaf2ace6 _CxxThrowException 3309->3308 3310 7ffbbaf289b0 3311 7ffbbaf289cd 3310->3311 3313 7ffbbaf28a44 3310->3313 3311->3313 3314 7ffbbaf27f90 3311->3314 3315 7ffbbaf27fd8 3314->3315 3316 7ffbbaf280ed 3315->3316 3317 7ffbbaf2816c 3315->3317 3318 7ffbbaf28176 3315->3318 3316->3313 3316->3316 3321 7ffbbaf29e10 3317->3321 3318->3316 3330 7ffbbaf29f70 3318->3330 3336 7ffbbaf22470 3321->3336 3323 7ffbbaf2a6a0 8 API calls 3325 7ffbbaf29f47 3323->3325 3325->3316 3326 7ffbbaf29f70 18 API calls 3327 7ffbbaf29ed3 3326->3327 3328 7ffbbaf29f30 3327->3328 3329 7ffbbaf2a340 10 API calls 3327->3329 3328->3323 3329->3328 3331 7ffbbaf29fc6 3330->3331 3332 7ffbbaf29ff5 3331->3332 3333 7ffbbaf2a340 10 API calls 3331->3333 3334 7ffbbaf2a6a0 8 API calls 3332->3334 3333->3332 3335 7ffbbaf2a315 3334->3335 3335->3316 3337 7ffbbaf22575 3336->3337 3340 7ffbbaf22487 3336->3340 3338 7ffbbaf224cc 3338->3326 3338->3328 3340->3338 3341 7ffbbaf223a0 3340->3341 3342 7ffbbaf223ee 3341->3342 3343 7ffbbaf22410 3342->3343 3344 7ffbbaf223f2 3342->3344 3346 7ffbbaf22460 3343->3346 3348 7ffbbaf2a340 10 API calls 3343->3348 3345 7ffbbaf2a340 10 API calls 3344->3345 3347 7ffbbaf22408 3345->3347 3346->3338 3347->3338 3349 7ffbbaf22445 3348->3349 3349->3338 4044 7ffbbaf2a337 4045 7ffbbaf2a368 getenv 4044->4045 4060 7ffbbaf2a41e 4044->4060 4046 7ffbbaf2a384 4045->4046 4047 7ffbbaf2a3ba getenv 4045->4047 4051 7ffbbaf2a570 __stdio_common_vsscanf 4046->4051 4048 7ffbbaf2a3fd 4047->4048 4049 7ffbbaf2a3cf fopen 4047->4049 4053 7ffbbaf2a409 __acrt_iob_func 4048->4053 4048->4060 4052 7ffbbaf2a3ee 4049->4052 4049->4060 4050 7ffbbaf2a4f2 4055 7ffbbaf2a3a0 4051->4055 4056 7ffbbaf2a510 printf 2 API calls 4052->4056 4053->4060 4054 7ffbbaf2a468 printf 4057 7ffbbaf2a4b1 __stdio_common_vfprintf 4054->4057 4055->4047 4056->4048 4058 7ffbbaf2a4d2 4057->4058 4059 7ffbbaf2a4e5 fflush 4057->4059 4062 7ffbbaf27b80 fprintf __stdio_common_vfprintf 4058->4062 4059->4050 4060->4050 4060->4054 4063 7ffbbaf2a459 4060->4063 4064 7ffbbaf2a46a 4060->4064 4061 7ffbbaf27b80 fprintf __stdio_common_vfprintf 4061->4054 4062->4059 4065 7ffbbaf27b80 fprintf __stdio_common_vfprintf 4063->4065 4064->4054 4064->4061 4065->4054 3565 7ffbbaf2a038 3566 7ffbbaf2a043 3565->3566 3569 7ffbbaf2a07e 3565->3569 3567 7ffbbaf2a051 3566->3567 3566->3569 3574 7ffbbaf29d90 3567->3574 3568 7ffbbaf2a079 3572 7ffbbaf2a6a0 8 API calls 3568->3572 3569->3568 3571 7ffbbaf2a340 10 API calls 3569->3571 3571->3568 3573 7ffbbaf2a315 3572->3573 3575 7ffbbaf29dea 3574->3575 3576 7ffbbaf29da5 3574->3576 3575->3568 3577 7ffbbaf29dd0 memcpy 3576->3577 3577->3575 3577->3577 3578 7ffbbaf21840 3579 7ffbbaf22250 3578->3579 3580 7ffbbaf2a6a0 8 API calls 3579->3580 3581 7ffbbaf22392 3580->3581 3582 7ffbbaf22e40 3583 7ffbbaf22e4d 3582->3583 3586 7ffbbaf22e45 3582->3586 3584 7ffbbaf2a6a0 8 API calls 3585 7ffbbaf251ef 3584->3585 3587 7ffbbaf24cc4 3586->3587 3590 7ffbbaf24cec 3586->3590 3596 7ffbbaf25078 3586->3596 3588 7ffbbaf24310 7 API calls 3587->3588 3589 7ffbbaf24cd7 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 3588->3589 3589->3596 3591 7ffbbaf24d23 3590->3591 3590->3596 3597 7ffbbaf24d4b 3590->3597 3592 7ffbbaf24310 7 API calls 3591->3592 3593 7ffbbaf24d36 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 3592->3593 3593->3596 3594 7ffbbaf24310 7 API calls 3595 7ffbbaf24ff2 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 3594->3595 3595->3596 3596->3584 3598 7ffbbaf24e0d 3597->3598 3599 7ffbbaf25007 3597->3599 3598->3594 3607 7ffbbaf25350 3599->3607 3601 7ffbbaf25015 3602 7ffbbaf25350 9 API calls 3601->3602 3603 7ffbbaf25034 3602->3603 3604 7ffbbaf25350 9 API calls 3603->3604 3605 7ffbbaf25056 3604->3605 3606 7ffbbaf25350 9 API calls 3605->3606 3606->3596 3608 7ffbbaf2535e 3607->3608 3609 7ffbbaf25369 3607->3609 3608->3601 3610 7ffbbaf24310 7 API calls 3609->3610 3611 7ffbbaf2537c ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 3610->3611 3611->3601 4066 7ffbbaf24540 ?uncaught_exception@std@ 4067 7ffbbaf24552 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 4066->4067 4068 7ffbbaf2455c 4066->4068 4067->4068 3350 7ffbbaf2b7c0 3353 7ffbbaf2a604 3350->3353 3352 7ffbbaf2b7d7 3353->3352 3354 7ffbbaf2ad2c free 3353->3354 4069 7ffbbaf28740 4070 7ffbbaf28768 4069->4070 4075 7ffbbaf287e6 4069->4075 4071 7ffbbaf28953 4070->4071 4072 7ffbbaf28949 4070->4072 4070->4075 4074 7ffbbaf29f70 18 API calls 4071->4074 4073 7ffbbaf29e10 18 API calls 4072->4073 4073->4075 4074->4075 4076 7ffbbaf2b740 4077 7ffbbaf2a604 Concurrency::details::SchedulerProxy::GetResourceForNewSubscription free 4076->4077 4078 7ffbbaf2b757 4077->4078 3356 7ffbbaf2a1c4 3357 7ffbbaf2a1cf 3356->3357 3359 7ffbbaf2a1d8 3356->3359 3358 7ffbbaf2a340 10 API calls 3357->3358 3357->3359 3358->3359 3360 7ffbbaf2a6a0 8 API calls 3359->3360 3361 7ffbbaf2a315 3360->3361 3615 7ffbbaf2a24e 3616 7ffbbaf2a259 3615->3616 3617 7ffbbaf29d90 memcpy 3616->3617 3618 7ffbbaf2a290 3616->3618 3617->3618 3619 7ffbbaf2a340 10 API calls 3618->3619 3620 7ffbbaf2a2dc 3618->3620 3619->3620 3621 7ffbbaf2a6a0 8 API calls 3620->3621 3622 7ffbbaf2a315 3621->3622 3871 7ffbbaf262d0 3874 7ffbbaf26300 3871->3874 3878 7ffbbaf26351 3871->3878 3872 7ffbbaf2a6a0 8 API calls 3873 7ffbbaf2658a 3872->3873 3874->3878 3879 7ffbbaf25b10 3874->3879 3878->3872 3880 7ffbbaf25b4c 3879->3880 3883 7ffbbaf26dc0 3880->3883 3882 7ffbbaf25ebf 3884 7ffbbaf26e00 3883->3884 3885 7ffbbaf271d0 20 API calls 3884->3885 3886 7ffbbaf26e73 3884->3886 3894 7ffbbaf26e54 3884->3894 3885->3884 3887 7ffbbaf2a340 10 API calls 3886->3887 3888 7ffbbaf26e8d 3887->3888 3889 7ffbbaf26ec0 strncpy 3888->3889 3890 7ffbbaf26e93 3888->3890 3892 7ffbbaf26ebe 3889->3892 3891 7ffbbaf27ae0 11 API calls 3890->3891 3891->3892 3893 7ffbbaf2a340 10 API calls 3892->3893 3893->3894 3894->3882 3895 7ffbbaf22ad0 3896 7ffbbaf22af8 3895->3896 3898 7ffbbaf22b80 3895->3898 3896->3898 3899 7ffbbaf24840 3896->3899 3900 7ffbbaf248a0 3899->3900 3901 7ffbbaf24952 _errno _invalid_parameter_noinfo 3900->3901 3902 7ffbbaf24964 3900->3902 3903 7ffbbaf2494b memset 3900->3903 3904 7ffbbaf24941 memcpy 3900->3904 3901->3902 3905 7ffbbaf24a52 3902->3905 3906 7ffbbaf24a40 _errno _invalid_parameter_noinfo 3902->3906 3907 7ffbbaf24a2f memcpy 3902->3907 3908 7ffbbaf24a39 memset 3902->3908 3903->3901 3904->3902 3905->3898 3906->3905 3907->3905 3908->3906 4079 7ffbbaf22d50 4080 7ffbbaf22d5e 4079->4080 4082 7ffbbaf22d68 4079->4082 4081 7ffbbaf2a5c8 2 API calls 4080->4081 4081->4082 4083 7ffbbaf2ab54 4084 7ffbbaf2ab70 4083->4084 4085 7ffbbaf2ab75 4083->4085 4087 7ffbbaf2aeb4 4084->4087 4088 7ffbbaf2af4b 4087->4088 4089 7ffbbaf2aed7 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 4087->4089 4088->4085 4089->4088 3624 7ffbbaf26660 3625 7ffbbaf26693 3624->3625 3626 7ffbbaf2667a 3624->3626 3642 7ffbbaf26f10 GetVersion 3625->3642 3639 7ffbbaf27a90 3626->3639 3629 7ffbbaf26686 3630 7ffbbaf26698 3631 7ffbbaf2669c 3630->3631 3632 7ffbbaf266b5 3630->3632 3634 7ffbbaf27a90 strncpy 3631->3634 3649 7ffbbaf26f70 3632->3649 3635 7ffbbaf266a8 3634->3635 3636 7ffbbaf266f3 3637 7ffbbaf266d5 3637->3636 3638 7ffbbaf27a90 strncpy 3637->3638 3638->3636 3640 7ffbbaf27ac5 3639->3640 3641 7ffbbaf27a99 strncpy 3639->3641 3640->3629 3641->3629 3643 7ffbbaf26f1e 3642->3643 3644 7ffbbaf26f58 3642->3644 3643->3644 3645 7ffbbaf2a340 10 API calls 3643->3645 3644->3630 3646 7ffbbaf26f3b 3645->3646 3647 7ffbbaf26f5f 3646->3647 3648 7ffbbaf2a340 10 API calls 3646->3648 3647->3630 3648->3644 3650 7ffbbaf2a5c8 2 API calls 3649->3650 3651 7ffbbaf26f92 3650->3651 3652 7ffbbaf270e6 3651->3652 3653 7ffbbaf26fd1 getenv 3651->3653 3675 7ffbbaf27760 3652->3675 3653->3652 3655 7ffbbaf26ff2 3653->3655 3658 7ffbbaf2a340 10 API calls 3655->3658 3657 7ffbbaf2711c 3657->3637 3659 7ffbbaf27003 strncmp 3658->3659 3661 7ffbbaf270bf 3659->3661 3662 7ffbbaf2701f strncmp 3659->3662 3660 7ffbbaf2a604 Concurrency::details::SchedulerProxy::GetResourceForNewSubscription free 3660->3657 3663 7ffbbaf2a340 10 API calls 3661->3663 3662->3661 3664 7ffbbaf2703b strncmp 3662->3664 3668 7ffbbaf27094 3663->3668 3665 7ffbbaf270ac 3664->3665 3666 7ffbbaf27053 strncmp 3664->3666 3667 7ffbbaf2a340 10 API calls 3665->3667 3666->3665 3669 7ffbbaf2706b strncmp 3666->3669 3667->3668 3670 7ffbbaf2a340 10 API calls 3668->3670 3671 7ffbbaf2709b 3669->3671 3672 7ffbbaf27088 3669->3672 3670->3652 3673 7ffbbaf2a340 10 API calls 3671->3673 3674 7ffbbaf2a340 10 API calls 3672->3674 3673->3668 3674->3668 3676 7ffbbaf27790 3675->3676 3677 7ffbbaf277b1 GetVersion 3676->3677 3678 7ffbbaf277bb 3676->3678 3677->3678 3679 7ffbbaf27842 3678->3679 3680 7ffbbaf277fe __acrt_iob_func 3678->3680 3681 7ffbbaf2780d __acrt_iob_func 3678->3681 3682 7ffbbaf2784b strncpy 3679->3682 3683 7ffbbaf27890 3679->3683 3684 7ffbbaf2781f 3680->3684 3681->3684 3685 7ffbbaf2a340 10 API calls 3682->3685 3688 7ffbbaf278ae 3683->3688 3689 7ffbbaf2a340 10 API calls 3683->3689 3686 7ffbbaf27b80 fprintf __stdio_common_vfprintf 3684->3686 3702 7ffbbaf270ff 3685->3702 3687 7ffbbaf2782e __acrt_iob_func fflush 3686->3687 3687->3679 3690 7ffbbaf2791b memset 3688->3690 3691 7ffbbaf278d7 strncpy 3688->3691 3689->3688 3703 7ffbbaf26710 3690->3703 3692 7ffbbaf2a340 10 API calls 3691->3692 3694 7ffbbaf27912 3692->3694 3697 7ffbbaf2a340 10 API calls 3694->3697 3695 7ffbbaf27937 3696 7ffbbaf27941 strncpy 3695->3696 3695->3702 3696->3694 3700 7ffbbaf2797c 3697->3700 3698 7ffbbaf279ae 3699 7ffbbaf2a604 Concurrency::details::SchedulerProxy::GetResourceForNewSubscription free 3698->3699 3699->3702 3700->3698 3700->3702 3723 7ffbbaf225a0 3700->3723 3702->3657 3702->3660 3704 7ffbbaf2a340 10 API calls 3703->3704 3705 7ffbbaf2675f 3704->3705 3706 7ffbbaf2a340 10 API calls 3705->3706 3722 7ffbbaf26771 3706->3722 3707 7ffbbaf26b4f 3708 7ffbbaf26bc3 3707->3708 3709 7ffbbaf26b93 3707->3709 3711 7ffbbaf2a6a0 8 API calls 3708->3711 3710 7ffbbaf2a340 10 API calls 3709->3710 3712 7ffbbaf26ba6 3710->3712 3713 7ffbbaf26bd5 3711->3713 3714 7ffbbaf2a6a0 8 API calls 3712->3714 3713->3695 3715 7ffbbaf26bbb 3714->3715 3715->3695 3716 7ffbbaf2a340 10 API calls 3716->3722 3718 7ffbbaf27140 18 API calls 3718->3722 3720 7ffbbaf26adc strncpy 3720->3722 3722->3707 3722->3716 3722->3718 3722->3720 3729 7ffbbaf271d0 3722->3729 3779 7ffbbaf26be0 3722->3779 3791 7ffbbaf27ae0 3722->3791 3724 7ffbbaf225c1 3723->3724 3725 7ffbbaf2a604 Concurrency::details::SchedulerProxy::GetResourceForNewSubscription free 3724->3725 3727 7ffbbaf22635 3724->3727 3725->3727 3726 7ffbbaf2a604 Concurrency::details::SchedulerProxy::GetResourceForNewSubscription free 3728 7ffbbaf226da 3726->3728 3727->3726 3728->3700 3730 7ffbbaf27202 memset GetVersionExW 3729->3730 3742 7ffbbaf2729e 3729->3742 3732 7ffbbaf2a340 10 API calls 3730->3732 3731 7ffbbaf2a6a0 8 API calls 3733 7ffbbaf27483 3731->3733 3734 7ffbbaf2723a 3732->3734 3733->3722 3735 7ffbbaf27242 3734->3735 3736 7ffbbaf27451 3734->3736 3738 7ffbbaf2743a 3735->3738 3739 7ffbbaf2725e 3735->3739 3737 7ffbbaf2a340 10 API calls 3736->3737 3737->3742 3740 7ffbbaf2a340 10 API calls 3738->3740 3741 7ffbbaf27405 3739->3741 3745 7ffbbaf27271 3739->3745 3746 7ffbbaf27346 3739->3746 3740->3742 3743 7ffbbaf27414 3741->3743 3744 7ffbbaf27427 3741->3744 3742->3731 3748 7ffbbaf2a340 10 API calls 3743->3748 3749 7ffbbaf2a340 10 API calls 3744->3749 3745->3741 3750 7ffbbaf2727a 3745->3750 3747 7ffbbaf273eb 3746->3747 3752 7ffbbaf27394 3746->3752 3753 7ffbbaf27354 3746->3753 3751 7ffbbaf2a340 10 API calls 3747->3751 3748->3742 3749->3742 3754 7ffbbaf272be 3750->3754 3755 7ffbbaf2727f 3750->3755 3751->3742 3752->3747 3760 7ffbbaf27399 3752->3760 3758 7ffbbaf2735e 3753->3758 3759 7ffbbaf27379 3753->3759 3756 7ffbbaf27300 3754->3756 3757 7ffbbaf272c3 3754->3757 3761 7ffbbaf272a3 3755->3761 3762 7ffbbaf27289 3755->3762 3756->3747 3768 7ffbbaf27308 3756->3768 3764 7ffbbaf272cc 3757->3764 3765 7ffbbaf272e5 3757->3765 3766 7ffbbaf2a340 10 API calls 3758->3766 3767 7ffbbaf2a340 10 API calls 3759->3767 3769 7ffbbaf2a340 10 API calls 3760->3769 3763 7ffbbaf2a340 10 API calls 3761->3763 3770 7ffbbaf2a340 10 API calls 3762->3770 3763->3742 3772 7ffbbaf2a340 10 API calls 3764->3772 3773 7ffbbaf2a340 10 API calls 3765->3773 3766->3742 3767->3742 3774 7ffbbaf2732b 3768->3774 3775 7ffbbaf27312 3768->3775 3771 7ffbbaf273aa 3769->3771 3770->3742 3776 7ffbbaf2a340 10 API calls 3771->3776 3772->3742 3773->3742 3777 7ffbbaf2a340 10 API calls 3774->3777 3778 7ffbbaf2a340 10 API calls 3775->3778 3776->3742 3777->3742 3778->3742 3780 7ffbbaf26c10 3779->3780 3784 7ffbbaf26c29 3780->3784 3785 7ffbbaf26d17 3780->3785 3790 7ffbbaf26d3a 3780->3790 3781 7ffbbaf2a6a0 8 API calls 3782 7ffbbaf26db5 3781->3782 3782->3722 3783 7ffbbaf2a340 10 API calls 3783->3790 3784->3783 3786 7ffbbaf26d3c 3785->3786 3787 7ffbbaf26d2c 3785->3787 3788 7ffbbaf2a340 10 API calls 3786->3788 3789 7ffbbaf2a340 10 API calls 3787->3789 3788->3790 3789->3790 3790->3781 3797 7ffbbaf27b70 3791->3797 3793 7ffbbaf27b07 __stdio_common_vsprintf 3794 7ffbbaf27b43 3793->3794 3795 7ffbbaf27b56 3793->3795 3796 7ffbbaf2a340 10 API calls 3794->3796 3795->3722 3796->3795 3797->3793 3909 7ffbbaf23ce0 3910 7ffbbaf23cec 3909->3910 3911 7ffbbaf23cf9 3909->3911 3914 7ffbbaf21920 3911->3914 3915 7ffbbaf21951 3914->3915 3916 7ffbbaf2a6a0 8 API calls 3915->3916 3917 7ffbbaf21b8f 3916->3917 3918 7ffbbaf242e0 3919 7ffbbaf24302 3918->3919 3920 7ffbbaf242f8 3918->3920 3921 7ffbbaf2a604 Concurrency::details::SchedulerProxy::GetResourceForNewSubscription free 3920->3921 3921->3919 3922 7ffbbaf24ae0 ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 3370 7ffbbaf285e0 3371 7ffbbaf285fd 3370->3371 3373 7ffbbaf28670 3370->3373 3372 7ffbbaf27f90 18 API calls 3371->3372 3371->3373 3372->3373 3798 7ffbbaf2b060 3800 7ffbbaf2b084 __scrt_acquire_startup_lock 3798->3800 3799 7ffbbaf2b6cc _seh_filter_dll 3800->3799 3377 7ffbbaf27fe5 3378 7ffbbaf28000 3377->3378 3379 7ffbbaf280ed 3378->3379 3380 7ffbbaf2816c 3378->3380 3381 7ffbbaf28176 3378->3381 3379->3379 3383 7ffbbaf29e10 18 API calls 3380->3383 3381->3379 3382 7ffbbaf29f70 18 API calls 3381->3382 3382->3379 3383->3379 3801 7ffbbaf2446f 3802 7ffbbaf2447d ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 3801->3802 3803 7ffbbaf2449c ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 3802->3803 3804 7ffbbaf244a6 3802->3804 3803->3804 3406 7ffbbaf2abf0 __std_exception_copy 4090 7ffbbaf29b70 4091 7ffbbaf29b7e 4090->4091 4092 7ffbbaf29ba2 4090->4092 4093 7ffbbaf29b8f 4091->4093 4094 7ffbbaf29baa 4091->4094 4095 7ffbbaf2a340 10 API calls 4093->4095 4094->4092 4097 7ffbbaf28f50 4094->4097 4095->4092 4098 7ffbbaf28f7c 4097->4098 4099 7ffbbaf28f91 4097->4099 4098->4092 4100 7ffbbaf29021 4099->4100 4101 7ffbbaf2a5c8 2 API calls 4099->4101 4100->4092 4102 7ffbbaf28fad 4101->4102 4102->4092 3923 7ffbbaf2b8f4 3924 7ffbbaf2b91d 3923->3924 3925 7ffbbaf2b929 __current_exception __current_exception_context terminate 3923->3925 3925->3924 3926 7ffbbaf282f7 3927 7ffbbaf2834f 3926->3927 3928 7ffbbaf2836e 3927->3928 3929 7ffbbaf28391 3927->3929 3930 7ffbbaf29040 2 API calls 3928->3930 3931 7ffbbaf29440 2 API calls 3929->3931 3932 7ffbbaf2838f 3930->3932 3931->3932 3414 7ffbbaf283fc 3415 7ffbbaf28433 3414->3415 3416 7ffbbaf2846a 3414->3416 3421 7ffbbaf27560 3415->3421 3418 7ffbbaf28448 3418->3416 3432 7ffbbaf21830 3418->3432 3420 7ffbbaf28460 3422 7ffbbaf27585 3421->3422 3423 7ffbbaf27649 3421->3423 3422->3423 3425 7ffbbaf275ac 3422->3425 3424 7ffbbaf2a340 10 API calls 3423->3424 3426 7ffbbaf275bf 3424->3426 3425->3426 3437 7ffbbaf27140 3425->3437 3426->3418 3430 7ffbbaf2a340 10 API calls 3430->3426 3431 7ffbbaf275f5 3431->3426 3431->3430 3433 7ffbbaf2183a 3432->3433 3435 7ffbbaf21840 3432->3435 3433->3420 3434 7ffbbaf2a6a0 8 API calls 3436 7ffbbaf22392 3434->3436 3435->3434 3435->3435 3436->3420 3441 7ffbbaf2716d 3437->3441 3438 7ffbbaf271af 3439 7ffbbaf2a6a0 8 API calls 3438->3439 3440 7ffbbaf271be 3439->3440 3440->3431 3443 7ffbbaf21210 3440->3443 3441->3438 3442 7ffbbaf2a340 10 API calls 3441->3442 3442->3438 3444 7ffbbaf2a5c8 2 API calls 3443->3444 3445 7ffbbaf21241 3444->3445 3446 7ffbbaf212ca 3445->3446 3448 7ffbbaf212b4 memset 3445->3448 3452 7ffbbaf23130 3446->3452 3448->3446 3450 7ffbbaf212fa 3450->3431 3451 7ffbbaf2a604 Concurrency::details::SchedulerProxy::GetResourceForNewSubscription free 3451->3450 3453 7ffbbaf2a340 10 API calls 3452->3453 3454 7ffbbaf23183 GetDesktopWindow 3453->3454 3455 7ffbbaf231e0 3454->3455 3456 7ffbbaf23348 3455->3456 3457 7ffbbaf2a340 10 API calls 3455->3457 3458 7ffbbaf2a6a0 8 API calls 3456->3458 3460 7ffbbaf2322d 3457->3460 3459 7ffbbaf212e2 3458->3459 3459->3450 3459->3451 3460->3456 3461 7ffbbaf2a340 10 API calls 3460->3461 3462 7ffbbaf232f0 3461->3462 3469 7ffbbaf213a0 3462->3469 3464 7ffbbaf23338 3465 7ffbbaf2334c 3464->3465 3466 7ffbbaf23341 3464->3466 3484 7ffbbaf21350 3465->3484 3480 7ffbbaf21710 3466->3480 3470 7ffbbaf213cf 3469->3470 3471 7ffbbaf213c4 3469->3471 3472 7ffbbaf2a340 10 API calls 3470->3472 3471->3464 3473 7ffbbaf21401 3472->3473 3479 7ffbbaf214d2 3473->3479 3490 7ffbbaf28d70 3473->3490 3475 7ffbbaf216f9 3475->3464 3476 7ffbbaf216d2 3476->3475 3478 7ffbbaf2a340 10 API calls 3476->3478 3478->3475 3479->3475 3479->3476 3493 7ffbbaf296c0 3479->3493 3481 7ffbbaf21719 3480->3481 3483 7ffbbaf21752 3480->3483 3482 7ffbbaf2a604 Concurrency::details::SchedulerProxy::GetResourceForNewSubscription free 3481->3482 3481->3483 3482->3483 3483->3456 3485 7ffbbaf21362 3484->3485 3487 7ffbbaf21376 3484->3487 3486 7ffbbaf2a340 10 API calls 3485->3486 3486->3487 3488 7ffbbaf21393 3487->3488 3489 7ffbbaf2a340 10 API calls 3487->3489 3488->3456 3489->3488 3491 7ffbbaf2a5c8 2 API calls 3490->3491 3492 7ffbbaf28d83 3491->3492 3492->3479 3494 7ffbbaf296f2 3493->3494 3495 7ffbbaf296e5 3493->3495 3496 7ffbbaf297c1 3494->3496 3497 7ffbbaf2a5c8 2 API calls 3494->3497 3495->3476 3496->3476 3498 7ffbbaf29745 3497->3498 3498->3476 3499 7ffbbaf21000 getenv 3500 7ffbbaf23e00 3501 7ffbbaf23e53 3500->3501 3502 7ffbbaf23e11 3500->3502 3502->3501 3505 7ffbbaf21d60 3502->3505 3506 7ffbbaf220f5 3505->3506 3509 7ffbbaf21d9e 3505->3509 3507 7ffbbaf2a6a0 8 API calls 3508 7ffbbaf21e52 3507->3508 3509->3506 3509->3507 3808 7ffbbaf21880 3809 7ffbbaf218bb 3808->3809 3810 7ffbbaf218a4 3808->3810 3812 7ffbbaf2a6a0 8 API calls 3809->3812 3811 7ffbbaf2a6a0 8 API calls 3810->3811 3813 7ffbbaf218b6 3811->3813 3814 7ffbbaf21919 3812->3814 3933 7ffbbaf22700 3934 7ffbbaf2271e 3933->3934 3935 7ffbbaf22713 3933->3935 3936 7ffbbaf2a5c8 2 API calls 3934->3936 3937 7ffbbaf22732 3934->3937 3936->3937 3942 7ffbbaf28101 3943 7ffbbaf28122 3942->3943 3944 7ffbbaf2816c 3943->3944 3945 7ffbbaf28176 3943->3945 3948 7ffbbaf29e10 18 API calls 3944->3948 3946 7ffbbaf28174 3945->3946 3947 7ffbbaf29f70 18 API calls 3945->3947 3947->3946 3948->3946 4103 7ffbbaf24580 4105 7ffbbaf245a9 4103->4105 4104 7ffbbaf245eb 4105->4104 4106 7ffbbaf2a604 Concurrency::details::SchedulerProxy::GetResourceForNewSubscription free 4105->4106 4106->4104 3815 7ffbbaf28280 3816 7ffbbaf28296 3815->3816 3825 7ffbbaf2838f 3815->3825 3817 7ffbbaf282cd 3816->3817 3818 7ffbbaf282c0 OutputDebugStringA 3816->3818 3816->3825 3819 7ffbbaf2a340 10 API calls 3817->3819 3818->3817 3820 7ffbbaf2834f 3819->3820 3821 7ffbbaf2836e 3820->3821 3822 7ffbbaf28391 3820->3822 3826 7ffbbaf29040 3821->3826 3830 7ffbbaf29440 3822->3830 3827 7ffbbaf2907e 3826->3827 3829 7ffbbaf29074 3826->3829 3828 7ffbbaf2a5c8 2 API calls 3827->3828 3827->3829 3828->3829 3829->3825 3831 7ffbbaf29473 3830->3831 3833 7ffbbaf29469 3830->3833 3832 7ffbbaf2a5c8 2 API calls 3831->3832 3831->3833 3832->3833 3833->3825 4107 7ffbbaf2b780 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 3514 7ffbbaf23010 3515 7ffbbaf23026 3514->3515 3516 7ffbbaf23015 3514->3516 3517 7ffbbaf2541e 3516->3517 3520 7ffbbaf24310 3516->3520 3521 7ffbbaf24340 3520->3521 3522 7ffbbaf243a0 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 3521->3522 3525 7ffbbaf2438d 3521->3525 3522->3525 3524 7ffbbaf2440c ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 3527 7ffbbaf243c4 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 3524->3527 3528 7ffbbaf24429 3524->3528 3525->3524 3526 7ffbbaf243e6 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3525->3526 3525->3527 3526->3525 3526->3527 3529 7ffbbaf2449c ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 3527->3529 3530 7ffbbaf244a6 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 3527->3530 3528->3527 3531 7ffbbaf24435 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3528->3531 3529->3530 3531->3527 3531->3528 3834 7ffbbaf26290 3835 7ffbbaf2629e 3834->3835 3836 7ffbbaf274a0 3834->3836 3841 7ffbbaf27a00 3836->3841 3839 7ffbbaf2a604 Concurrency::details::SchedulerProxy::GetResourceForNewSubscription free 3840 7ffbbaf274c1 3839->3840 3844 7ffbbaf27a12 3841->3844 3845 7ffbbaf274b0 3841->3845 3842 7ffbbaf27a3c 3843 7ffbbaf2a604 Concurrency::details::SchedulerProxy::GetResourceForNewSubscription free 3842->3843 3843->3845 3844->3842 3846 7ffbbaf225a0 free 3844->3846 3845->3839 3846->3844 4108 7ffbbaf22d90 4109 7ffbbaf22da5 4108->4109 4111 7ffbbaf22db4 4108->4111 4110 7ffbbaf2a5c8 2 API calls 4109->4110 4109->4111 4110->4111 4112 7ffbbaf23390 4113 7ffbbaf21710 free 4112->4113 4114 7ffbbaf233a7 4113->4114 4115 7ffbbaf233cc 4114->4115 4116 7ffbbaf233e8 4114->4116 4117 7ffbbaf2a340 10 API calls 4115->4117 4118 7ffbbaf2a340 10 API calls 4116->4118 4119 7ffbbaf233db 4117->4119 4120 7ffbbaf233fb 4118->4120 3847 7ffbbaf2a292 3848 7ffbbaf2a29b 3847->3848 3852 7ffbbaf2a2c9 3847->3852 3850 7ffbbaf29d90 memcpy 3848->3850 3849 7ffbbaf2a340 10 API calls 3851 7ffbbaf2a2dc 3849->3851 3850->3852 3853 7ffbbaf2a6a0 8 API calls 3851->3853 3852->3849 3852->3851 3854 7ffbbaf2a315 3853->3854 3981 7ffbbaf29b10 3982 7ffbbaf29b4a 3981->3982 3983 7ffbbaf29b19 3981->3983 3983->3982 3984 7ffbbaf2a340 10 API calls 3983->3984 3984->3982 3855 7ffbbaf2ac94 __std_exception_destroy 3856 7ffbbaf2acbb 3855->3856 3857 7ffbbaf2acc8 3855->3857 3858 7ffbbaf2a604 Concurrency::details::SchedulerProxy::GetResourceForNewSubscription free 3856->3858 3858->3857 4125 7ffbbaf2b997 __scrt_dllmain_exception_filter

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID: AddressLibraryProc$DirectoryFreeLoadSystemwcscat_s
    • String ID: Direct3DCreate9$Direct3DCreate9Ex$\d3d9.dll
    • API String ID: 632231914-4147465227
    • Opcode ID: d04707e5138d042c3967d50fc19bbdc52fffa3db967abf2e19a6c82f233c0313
    • Instruction ID: 3e08be0938841bb591466fdb82a21513411dcb2229d9c58a8a74520bb8c7641e
    • Opcode Fuzzy Hash: d04707e5138d042c3967d50fc19bbdc52fffa3db967abf2e19a6c82f233c0313
    • Instruction Fuzzy Hash: 342195B4E19F4281EB50EB79E8642F962A8BF48706F4081B5DE4DC66A4DF3CE5098308

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 13 7ffbbaf2a834-7ffbbaf2a83a 14 7ffbbaf2a83c-7ffbbaf2a83f 13->14 15 7ffbbaf2a875-7ffbbaf2a87f 13->15 17 7ffbbaf2a841-7ffbbaf2a844 14->17 18 7ffbbaf2a869-7ffbbaf2a8a8 call 7ffbbaf2b104 14->18 16 7ffbbaf2a99c-7ffbbaf2a9b1 15->16 22 7ffbbaf2a9c0-7ffbbaf2a9da call 7ffbbaf2af98 16->22 23 7ffbbaf2a9b3 16->23 20 7ffbbaf2a85c __scrt_dllmain_crt_thread_attach 17->20 21 7ffbbaf2a846-7ffbbaf2a849 17->21 35 7ffbbaf2a8ae-7ffbbaf2a8c3 call 7ffbbaf2af98 18->35 36 7ffbbaf2a976 18->36 24 7ffbbaf2a861-7ffbbaf2a868 20->24 26 7ffbbaf2a84b-7ffbbaf2a854 21->26 27 7ffbbaf2a855-7ffbbaf2a85a call 7ffbbaf2b048 21->27 33 7ffbbaf2a9dc-7ffbbaf2aa11 call 7ffbbaf2b0c0 call 7ffbbaf2af70 call 7ffbbaf2b45c call 7ffbbaf2b274 call 7ffbbaf2b298 call 7ffbbaf2b0f0 22->33 34 7ffbbaf2aa13-7ffbbaf2aa44 call 7ffbbaf2b2d4 22->34 28 7ffbbaf2a9b5-7ffbbaf2a9bf 23->28 27->24 33->28 45 7ffbbaf2aa55-7ffbbaf2aa5b 34->45 46 7ffbbaf2aa46-7ffbbaf2aa4c 34->46 48 7ffbbaf2a98e-7ffbbaf2a99b call 7ffbbaf2b2d4 35->48 49 7ffbbaf2a8c9-7ffbbaf2a8da call 7ffbbaf2b008 35->49 39 7ffbbaf2a978-7ffbbaf2a98d 36->39 51 7ffbbaf2aa5d-7ffbbaf2aa67 45->51 52 7ffbbaf2aaa2-7ffbbaf2aaaa call 7ffbbaf261a0 45->52 46->45 50 7ffbbaf2aa4e-7ffbbaf2aa50 46->50 48->16 65 7ffbbaf2a92b-7ffbbaf2a935 call 7ffbbaf2b274 49->65 66 7ffbbaf2a8dc-7ffbbaf2a900 call 7ffbbaf2b420 call 7ffbbaf2af60 call 7ffbbaf2af7c call 7ffbbaf2b6c0 49->66 56 7ffbbaf2ab43-7ffbbaf2ab50 50->56 57 7ffbbaf2aa73-7ffbbaf2aa81 51->57 58 7ffbbaf2aa69-7ffbbaf2aa71 51->58 67 7ffbbaf2aaaf-7ffbbaf2aab8 52->67 63 7ffbbaf2aa87-7ffbbaf2aa9c call 7ffbbaf2a834 57->63 77 7ffbbaf2ab39-7ffbbaf2ab41 57->77 58->63 63->52 63->77 65->36 87 7ffbbaf2a937-7ffbbaf2a943 call 7ffbbaf2b2c4 65->87 66->65 113 7ffbbaf2a902-7ffbbaf2a909 __scrt_dllmain_after_initialize_c 66->113 73 7ffbbaf2aaf0-7ffbbaf2aaf2 67->73 74 7ffbbaf2aaba-7ffbbaf2aabc 67->74 75 7ffbbaf2aaf4-7ffbbaf2aaf7 73->75 76 7ffbbaf2aaf9-7ffbbaf2ab0e call 7ffbbaf2a834 73->76 74->73 82 7ffbbaf2aabe-7ffbbaf2aae0 call 7ffbbaf261a0 call 7ffbbaf2a99c 74->82 75->76 75->77 76->77 96 7ffbbaf2ab10-7ffbbaf2ab1a 76->96 77->56 82->73 108 7ffbbaf2aae2-7ffbbaf2aae7 82->108 104 7ffbbaf2a945-7ffbbaf2a94f call 7ffbbaf2b1dc 87->104 105 7ffbbaf2a969-7ffbbaf2a974 87->105 101 7ffbbaf2ab1c-7ffbbaf2ab23 96->101 102 7ffbbaf2ab25-7ffbbaf2ab35 96->102 101->77 102->77 104->105 112 7ffbbaf2a951-7ffbbaf2a95f 104->112 105->39 108->73 112->105 113->65 114 7ffbbaf2a90b-7ffbbaf2a928 call 7ffbbaf2b6ba 113->114 114->65
    APIs
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_release_startup_lock
    • String ID:
    • API String ID: 349153199-0
    • Opcode ID: c6b574932d63565bc480fa72a51d04e861c9c29c6bedfa5b21a3a2c63453ff0d
    • Instruction ID: cb0c82e4cdbf9d101c011de496036fcdb87d994bc19f8e09fe0983c21a0fbe73
    • Opcode Fuzzy Hash: c6b574932d63565bc480fa72a51d04e861c9c29c6bedfa5b21a3a2c63453ff0d
    • Instruction Fuzzy Hash: 7F817FA1E08B4385FA54BB7ED8612F92298AF45782F5441B5FF0DC7296DE3CE8468708

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 179 7ffbbaf271d0-7ffbbaf271fc 180 7ffbbaf2746e-7ffbbaf27493 call 7ffbbaf2a6a0 179->180 181 7ffbbaf27202-7ffbbaf2723c memset GetVersionExW call 7ffbbaf2a340 179->181 186 7ffbbaf27242-7ffbbaf2724f 181->186 187 7ffbbaf27451-7ffbbaf2745d call 7ffbbaf2a340 181->187 189 7ffbbaf27255-7ffbbaf27258 186->189 190 7ffbbaf2743a-7ffbbaf2744f call 7ffbbaf2a340 186->190 191 7ffbbaf27462 187->191 189->190 192 7ffbbaf2725e-7ffbbaf27261 189->192 190->191 194 7ffbbaf27467 191->194 195 7ffbbaf27405-7ffbbaf27412 192->195 196 7ffbbaf27267-7ffbbaf2726b 192->196 194->180 198 7ffbbaf27414-7ffbbaf27425 call 7ffbbaf2a340 195->198 199 7ffbbaf27427-7ffbbaf27438 call 7ffbbaf2a340 195->199 200 7ffbbaf27271-7ffbbaf27274 196->200 201 7ffbbaf27346-7ffbbaf27349 196->201 198->194 199->194 200->195 206 7ffbbaf2727a-7ffbbaf2727d 200->206 202 7ffbbaf273eb-7ffbbaf27403 call 7ffbbaf2a340 201->202 203 7ffbbaf2734f-7ffbbaf27352 201->203 202->191 208 7ffbbaf27394-7ffbbaf27397 203->208 209 7ffbbaf27354-7ffbbaf2735c 203->209 212 7ffbbaf272be-7ffbbaf272c1 206->212 213 7ffbbaf2727f-7ffbbaf27287 206->213 208->202 219 7ffbbaf27399-7ffbbaf273e6 call 7ffbbaf2a340 * 2 208->219 217 7ffbbaf2735e-7ffbbaf27374 call 7ffbbaf2a340 209->217 218 7ffbbaf27379-7ffbbaf2738f call 7ffbbaf2a340 209->218 215 7ffbbaf27300-7ffbbaf27302 212->215 216 7ffbbaf272c3-7ffbbaf272ca 212->216 220 7ffbbaf272a3-7ffbbaf272b9 call 7ffbbaf2a340 213->220 221 7ffbbaf27289-7ffbbaf2729e call 7ffbbaf2a340 213->221 215->202 227 7ffbbaf27308-7ffbbaf27310 215->227 223 7ffbbaf272cc-7ffbbaf272e0 call 7ffbbaf2a340 216->223 224 7ffbbaf272e5-7ffbbaf272fb call 7ffbbaf2a340 216->224 217->194 218->194 219->180 220->194 221->194 223->194 224->194 237 7ffbbaf2732b-7ffbbaf27341 call 7ffbbaf2a340 227->237 238 7ffbbaf27312-7ffbbaf27326 call 7ffbbaf2a340 227->238 237->194 238->194
    APIs
    • memset.VCRUNTIME140 ref: 00007FFBBAF2720F
    • GetVersionExW.KERNEL32 ref: 00007FFBBAF27221
      • Part of subcall function 00007FFBBAF2A340: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(00000000,?,00000000,00007FFBBAF212E2), ref: 00007FFBBAF2A36F
      • Part of subcall function 00007FFBBAF2A340: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0 ref: 00007FFBBAF2A3C1
      • Part of subcall function 00007FFBBAF2A340: fopen.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FFBBAF2A3D9
      • Part of subcall function 00007FFBBAF2A340: printf.MSPDB140-MSVCRT ref: 00007FFBBAF2A3F8
      • Part of subcall function 00007FFBBAF2A340: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FFBBAF2A40C
      • Part of subcall function 00007FFBBAF2A340: fprintf.MSPDB140-MSVCRT ref: 00007FFBBAF2A463
      • Part of subcall function 00007FFBBAF2A340: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000000,00007FFBBAF212E2), ref: 00007FFBBAF2A4C7
      • Part of subcall function 00007FFBBAF2A340: fprintf.MSPDB140-MSVCRT ref: 00007FFBBAF2A4E0
      • Part of subcall function 00007FFBBAF2A340: fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FFBBAF2A4EC
      • Part of subcall function 00007FFBBAF2A340: fprintf.MSPDB140-MSVCRT ref: 00007FFBBAF2A498
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID: fprintf$getenv$Version__acrt_iob_func__stdio_common_vfprintffflushfopenmemsetprintf
    • String ID: Home$OS_UNKNOWN: GetVersionEx failed$OS_UNKNOWN: dwMajorVersion=%d dwMinorVersion=%d$OS_UNKNOWN: dwPlatformId=%d dwMajorVersion=%d$OS_VISTA$OS_WIN7$OS_WIN8$OS_WIN8.1 or newer$OS_WINSERV_2003$OS_WINSERV_2008$OS_WINSERV_2008_R2$OS_WINSERV_2012$OS_WINSERV_2012_R2 or newer$OS_WINXP $OS_WINXP_64$Pro$[I] OS Version =
    • API String ID: 3483071900-1252748077
    • Opcode ID: 893202d08ab13633ff7bcac80312153664b0057064e778c8984c9e5cb8cc51a6
    • Instruction ID: 37d5c4ede43c9a2fd2603fa9199d82d6757e588df59dc56c19d249db48a867e7
    • Opcode Fuzzy Hash: 893202d08ab13633ff7bcac80312153664b0057064e778c8984c9e5cb8cc51a6
    • Instruction Fuzzy Hash: D87153B1E0CB4382FB35EB78D4A06F96699EF44306F4440B6EF4DC2591DE3CA949CA09

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 322 7ffbbaf26710-7ffbbaf26757 323 7ffbbaf2675a call 7ffbbaf2a340 322->323 324 7ffbbaf2675f-7ffbbaf26769 323->324 325 7ffbbaf2676c call 7ffbbaf2a340 324->325 326 7ffbbaf26771-7ffbbaf26779 325->326 327 7ffbbaf26b6f-7ffbbaf26b91 326->327 328 7ffbbaf2677f-7ffbbaf2679f 326->328 330 7ffbbaf26bc3-7ffbbaf26bdc call 7ffbbaf2a6a0 327->330 331 7ffbbaf26b93-7ffbbaf26b9f 327->331 329 7ffbbaf267a0-7ffbbaf267b7 328->329 337 7ffbbaf267d4-7ffbbaf267f3 329->337 338 7ffbbaf267b9-7ffbbaf267cf 329->338 332 7ffbbaf26ba1 call 7ffbbaf2a340 331->332 335 7ffbbaf26ba6-7ffbbaf26bc2 call 7ffbbaf2a6a0 332->335 344 7ffbbaf267f6 call 7ffbbaf2a340 337->344 340 7ffbbaf26b40-7ffbbaf26b49 338->340 340->329 342 7ffbbaf26b4f-7ffbbaf26b67 340->342 342->327 345 7ffbbaf267fb-7ffbbaf2680a 344->345 346 7ffbbaf2680d call 7ffbbaf2a340 345->346 347 7ffbbaf26812-7ffbbaf26826 346->347 348 7ffbbaf26829 call 7ffbbaf2a340 347->348 349 7ffbbaf2682e-7ffbbaf2684c 348->349 350 7ffbbaf2684f call 7ffbbaf2a340 349->350 351 7ffbbaf26854-7ffbbaf26868 350->351 352 7ffbbaf2686b call 7ffbbaf2a340 351->352 353 7ffbbaf26870-7ffbbaf26884 352->353 354 7ffbbaf26887 call 7ffbbaf2a340 353->354 355 7ffbbaf2688c-7ffbbaf268a0 354->355 356 7ffbbaf268a3 call 7ffbbaf2a340 355->356 357 7ffbbaf268a8-7ffbbaf268e6 356->357 358 7ffbbaf268e9 call 7ffbbaf2a340 357->358 359 7ffbbaf268ee-7ffbbaf26917 358->359 360 7ffbbaf2691a call 7ffbbaf2a340 359->360 361 7ffbbaf2691f-7ffbbaf26955 360->361 362 7ffbbaf26958 call 7ffbbaf2a340 361->362 363 7ffbbaf2695d-7ffbbaf26993 362->363 364 7ffbbaf26996 call 7ffbbaf2a340 363->364 365 7ffbbaf2699b-7ffbbaf269ad 364->365 367 7ffbbaf269b3-7ffbbaf269e1 365->367 368 7ffbbaf26a47-7ffbbaf26a58 call 7ffbbaf26be0 365->368 370 7ffbbaf269e5-7ffbbaf269eb 367->370 373 7ffbbaf26a71-7ffbbaf26a8a 368->373 374 7ffbbaf26a5a-7ffbbaf26a6b call 7ffbbaf27140 368->374 370->368 372 7ffbbaf269ed-7ffbbaf269ef 370->372 375 7ffbbaf269f1-7ffbbaf269f4 372->375 376 7ffbbaf26a24-7ffbbaf26a45 372->376 378 7ffbbaf26b27-7ffbbaf26b33 373->378 374->373 385 7ffbbaf26b23 374->385 379 7ffbbaf269fb-7ffbbaf26a07 375->379 380 7ffbbaf269f6-7ffbbaf269f9 375->380 376->368 376->370 381 7ffbbaf26b36 call 7ffbbaf2a340 378->381 383 7ffbbaf26a0c call 7ffbbaf271d0 379->383 380->376 380->379 384 7ffbbaf26b3b 381->384 386 7ffbbaf26a11-7ffbbaf26a13 383->386 384->340 385->378 387 7ffbbaf26a20 386->387 388 7ffbbaf26a15-7ffbbaf26a19 386->388 387->376 389 7ffbbaf26a1b-7ffbbaf26a1e 388->389 390 7ffbbaf26a8f-7ffbbaf26aa1 388->390 389->387 389->390 391 7ffbbaf26aa4 call 7ffbbaf2a340 390->391 392 7ffbbaf26aa9-7ffbbaf26aad 391->392 393 7ffbbaf26adc-7ffbbaf26b00 strncpy 392->393 394 7ffbbaf26aaf-7ffbbaf26ada call 7ffbbaf27ae0 392->394 396 7ffbbaf26b07-7ffbbaf26b13 393->396 394->396 398 7ffbbaf26b15 call 7ffbbaf2a340 396->398 399 7ffbbaf26b1a-7ffbbaf26b1e 398->399 399->373
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID: fprintf$getenv$__acrt_iob_func__stdio_common_vfprintffflushfopenprintf
    • String ID: %02X%02X%02X%02X}$%02X%02X-%02X%02X$------------------$Adapter Handle : 0x%x$Adapter Ordinal : %d$CheckAdaptersInfo$D3DPPLM::CheckAdaptersInfo: no suitable adapters found$D3DPPLM::CheckForBadHardware: found matching hardware: VendorId=0x%04x DeviceId=0x%04x$Description : %s$Device Id : 0x%04x$Driver Version : %d.%d.%d.%d$GDI Name, Driver : %s, %s$SubSys Id : 0x%x$Vendor Id : 0x%04x$WARNING: Unsupported video adapter found, device disabled$WARNING: bad driver version detected, device disabled. Please update your driver to at least version %d.%d.%d.%d$[I] GUID : {%08X-%04X-%04X-$forceGPU
    • API String ID: 3079345343-2211495158
    • Opcode ID: a02da72c7345d911313d27be48f842a44bfa780e79725bc29cb040cae99f9283
    • Instruction ID: 232da4cb597f9eb6aef1eae4d3c14cc56113119abf1cce40f158adfbdcaebcbe
    • Opcode Fuzzy Hash: a02da72c7345d911313d27be48f842a44bfa780e79725bc29cb040cae99f9283
    • Instruction Fuzzy Hash: 69D191B2A08B8286D720DF28E4606EEB7A5FB84755F444176EF9D83694CF3CD444CB48

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 491 7ffbbaf22e40-7ffbbaf22e43 492 7ffbbaf22e4d 491->492 493 7ffbbaf22e45-7ffbbaf24c77 491->493 495 7ffbbaf24c7d-7ffbbaf24c82 493->495 496 7ffbbaf251df-7ffbbaf251f9 call 7ffbbaf2a6a0 493->496 495->496 498 7ffbbaf24c88-7ffbbaf24c8f 495->498 498->496 500 7ffbbaf24c95-7ffbbaf24c9f 498->500 500->496 501 7ffbbaf24ca5-7ffbbaf24cc2 call 7ffbbaf24ad0 500->501 505 7ffbbaf24cec-7ffbbaf24d02 501->505 506 7ffbbaf24cc4-7ffbbaf24ce7 call 7ffbbaf24310 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 501->506 508 7ffbbaf251cf 505->508 509 7ffbbaf24d08-7ffbbaf24d21 call 7ffbbaf24a90 505->509 512 7ffbbaf251d7 506->512 508->512 515 7ffbbaf24d4b-7ffbbaf24d5a 509->515 516 7ffbbaf24d23-7ffbbaf24d46 call 7ffbbaf24310 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 509->516 512->496 518 7ffbbaf24d5c-7ffbbaf24d6e 515->518 519 7ffbbaf24db2-7ffbbaf24db7 515->519 516->508 522 7ffbbaf24d70 518->522 523 7ffbbaf24d76 518->523 521 7ffbbaf24dc0-7ffbbaf24deb 519->521 531 7ffbbaf24ded-7ffbbaf24e0b 521->531 522->523 525 7ffbbaf24d72-7ffbbaf24d74 522->525 524 7ffbbaf24d7b-7ffbbaf24d83 523->524 526 7ffbbaf24d8b 524->526 527 7ffbbaf24d85 524->527 525->524 530 7ffbbaf24d90-7ffbbaf24d9d 526->530 527->526 529 7ffbbaf24d87-7ffbbaf24d89 527->529 529->530 532 7ffbbaf24d9f 530->532 533 7ffbbaf24da5 530->533 537 7ffbbaf24e0d-7ffbbaf24e14 531->537 538 7ffbbaf24e19-7ffbbaf24e39 call 7ffbbaf25340 531->538 532->533 535 7ffbbaf24da1-7ffbbaf24da3 532->535 536 7ffbbaf24daa-7ffbbaf24dac 533->536 535->536 536->519 539 7ffbbaf24fe6-7ffbbaf25002 call 7ffbbaf24310 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 537->539 546 7ffbbaf24e3b-7ffbbaf24e42 538->546 547 7ffbbaf24e47-7ffbbaf24e69 call 7ffbbaf253a0 538->547 544 7ffbbaf251c7 539->544 544->508 546->539 551 7ffbbaf24e6b-7ffbbaf24e72 547->551 552 7ffbbaf24e80-7ffbbaf24f6c 547->552 551->539 554 7ffbbaf24f6e-7ffbbaf24f75 552->554 555 7ffbbaf24f77-7ffbbaf24fdd call 7ffbbaf253b0 call 7ffbbaf256d0 call 7ffbbaf253d0 call 7ffbbaf253e0 call 7ffbbaf256e0 call 7ffbbaf253c0 call 7ffbbaf256f0 552->555 554->539 570 7ffbbaf24fdf 555->570 571 7ffbbaf25007-7ffbbaf25097 call 7ffbbaf25350 * 4 555->571 570->539 584 7ffbbaf250a0-7ffbbaf250c7 571->584 584->584 585 7ffbbaf250c9-7ffbbaf250f1 584->585 587 7ffbbaf2510e-7ffbbaf2511c 585->587 588 7ffbbaf250f3-7ffbbaf25101 585->588 589 7ffbbaf2511e-7ffbbaf25138 587->589 590 7ffbbaf25143-7ffbbaf251bd call 7ffbbaf24ac0 call 7ffbbaf24a90 call 7ffbbaf24aa0 call 7ffbbaf24ab0 587->590 588->587 589->590 590->544
    APIs
    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FFBBAF24CE1
    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FFBBAF24D40
      • Part of subcall function 00007FFBBAF24310: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,00000000,?,00007FFBBAF2537C), ref: 00007FFBBAF2448C
      • Part of subcall function 00007FFBBAF24310: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,00000000,?,00007FFBBAF2537C), ref: 00007FFBBAF24493
      • Part of subcall function 00007FFBBAF24310: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,00000000,?,00007FFBBAF2537C), ref: 00007FFBBAF2449F
    Strings
    • D3DMeshView.render() - SetPixelShaderConstantF (PSR_SPECULARCOLOR) failed !!!, xrefs: 00007FFBBAF24E6B
    • $, xrefs: 00007FFBBAF25152
    • D3DMeshView.render() - SetVertexShaderConstantF (VSR_AMBIENTCOLOR) failed !!!, xrefs: 00007FFBBAF24E0D
    • D3DMeshView.render() - SetVertexShader failed !!!, xrefs: 00007FFBBAF24D2A
    • D3DMeshView.render() - SetFVF failed !!!, xrefs: 00007FFBBAF24CCB
    • D3DMeshView.render() - setPixelShader failed !!!, xrefs: 00007FFBBAF24FDF
    • D3DMeshView.render() - SetPixelShaderConstantF (PSR_LIGHTCOLOR) failed !!!, xrefs: 00007FFBBAF24F6E
    • D3DMeshView.render() - SetPixelShaderConstantF (PSR_DIFFUSECOLOR) failed !!!, xrefs: 00007FFBBAF24E3B
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID: D@std@@@std@@U?$char_traits@V01@$??6?$basic_ostream@V01@@$?setstate@?$basic_ios@?uncaught_exception@std@@Osfx@?$basic_ostream@
    • String ID: $$D3DMeshView.render() - SetFVF failed !!!$D3DMeshView.render() - SetPixelShaderConstantF (PSR_DIFFUSECOLOR) failed !!!$D3DMeshView.render() - SetPixelShaderConstantF (PSR_LIGHTCOLOR) failed !!!$D3DMeshView.render() - SetPixelShaderConstantF (PSR_SPECULARCOLOR) failed !!!$D3DMeshView.render() - SetVertexShader failed !!!$D3DMeshView.render() - SetVertexShaderConstantF (VSR_AMBIENTCOLOR) failed !!!$D3DMeshView.render() - setPixelShader failed !!!
    • API String ID: 1408943881-3757511292
    • Opcode ID: bd4b6908961b625247124c0d0fe1db436064d5d9c3bbbee4f48cccf716154c01
    • Instruction ID: b21404c29ec43744832de0fd6a07fc6c10422f7b2fb46623c26748eb2fa7e4aa
    • Opcode Fuzzy Hash: bd4b6908961b625247124c0d0fe1db436064d5d9c3bbbee4f48cccf716154c01
    • Instruction Fuzzy Hash: 3FF170B2E08B8286E764DB36E4503EA6364FB88B86F448171EF4E97755DF7CE4448B04

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 313767242-0
    • Opcode ID: 97272919b4dacb44bf94145013f2822a922e633abf56f33983487a237d7fd979
    • Instruction ID: f39498bda93c1b2a738aa051c2568f0474a321da1024cba2c16c8711903c2007
    • Opcode Fuzzy Hash: 97272919b4dacb44bf94145013f2822a922e633abf56f33983487a237d7fd979
    • Instruction Fuzzy Hash: DB314BB2A09F8186EB609F64E8907ED6368FB84745F44447AEF4D87A98DF38D548C708
    APIs
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
    • String ID:
    • API String ID: 2933794660-0
    • Opcode ID: 99c6b58b56d686e220eeb29960b2c045fdf6fb2ad22775280c6b605770152632
    • Instruction ID: e1f31f572f5db286758870302d67fc471599ed2ee4103a34d777da0707b80555
    • Opcode Fuzzy Hash: 99c6b58b56d686e220eeb29960b2c045fdf6fb2ad22775280c6b605770152632
    • Instruction Fuzzy Hash: 10112562E04F018AEB10DF38E8542E833A8FB0C759F041A31EB5D867A4DF3CD5A98344
    APIs
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled$CurrentProcess
    • String ID:
    • API String ID: 1249254920-0
    • Opcode ID: e27496faf890620752add7c27e286e37c05d16a1145388737d00f04a7a210a1b
    • Instruction ID: 4e7ae48c5dc0d11459b4ab893d33738dac684388e8afb1c7d525ce5b14f32e62
    • Opcode Fuzzy Hash: e27496faf890620752add7c27e286e37c05d16a1145388737d00f04a7a210a1b
    • Instruction Fuzzy Hash: E1D09EB1E08E4687E7189779E8255F51214AF58B46B041474DF0EC53109D3C548B4248
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 1863f5ebe23096a4cad5d8d7ca414eb9ab8624279cf1ab1093dd95d7bf3b880c
    • Instruction ID: 89e62cb888b421bfff12ed684d5aa714938909ec00d1225128af4052f3a2d515
    • Opcode Fuzzy Hash: 1863f5ebe23096a4cad5d8d7ca414eb9ab8624279cf1ab1093dd95d7bf3b880c
    • Instruction Fuzzy Hash: D1B13576B04B418AE714CB7AC4607AD67B5FB88B89F008172EF0D97A54DF39E859C708

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 117 7ffbbaf27760-7ffbbaf277af 120 7ffbbaf277ce-7ffbbaf277d5 117->120 121 7ffbbaf277b1-7ffbbaf277b9 GetVersion 117->121 124 7ffbbaf277e2-7ffbbaf277e7 call 7ffbbaf25aa0 120->124 125 7ffbbaf277d7-7ffbbaf277e0 120->125 122 7ffbbaf277bb 121->122 123 7ffbbaf277c5-7ffbbaf277ca call 7ffbbaf25ac0 121->123 122->120 126 7ffbbaf277bd-7ffbbaf277c3 122->126 123->120 132 7ffbbaf277ea-7ffbbaf277f1 124->132 125->132 126->120 126->123 133 7ffbbaf27842-7ffbbaf27849 132->133 134 7ffbbaf277f3-7ffbbaf277fc 132->134 137 7ffbbaf2784b-7ffbbaf2788b strncpy call 7ffbbaf2a340 133->137 138 7ffbbaf27890-7ffbbaf2789a 133->138 135 7ffbbaf277fe-7ffbbaf2780b __acrt_iob_func 134->135 136 7ffbbaf2780d-7ffbbaf2781d __acrt_iob_func 134->136 139 7ffbbaf27826-7ffbbaf2783c call 7ffbbaf27b80 __acrt_iob_func fflush 135->139 136->139 140 7ffbbaf2781f 136->140 146 7ffbbaf279e2-7ffbbaf279fc 137->146 147 7ffbbaf2789c-7ffbbaf278a9 call 7ffbbaf2a340 138->147 148 7ffbbaf278ae-7ffbbaf278d5 call 7ffbbaf2a82c 138->148 139->133 140->139 147->148 152 7ffbbaf2791b-7ffbbaf2793b memset call 7ffbbaf26710 148->152 153 7ffbbaf278d7-7ffbbaf27919 strncpy call 7ffbbaf2a340 148->153 159 7ffbbaf279e0 152->159 160 7ffbbaf27941-7ffbbaf27962 strncpy 152->160 158 7ffbbaf27969-7ffbbaf27983 call 7ffbbaf2a340 153->158 163 7ffbbaf27985-7ffbbaf27989 158->163 164 7ffbbaf279ba-7ffbbaf279c1 158->164 159->146 160->158 167 7ffbbaf2798b 163->167 168 7ffbbaf279ae-7ffbbaf279b6 call 7ffbbaf2a604 163->168 165 7ffbbaf279cd-7ffbbaf279d4 164->165 166 7ffbbaf279c3-7ffbbaf279c9 164->166 165->159 170 7ffbbaf279d6-7ffbbaf279dc 165->170 166->165 171 7ffbbaf27990-7ffbbaf2799d 167->171 168->164 170->159 172 7ffbbaf2799f-7ffbbaf279a4 call 7ffbbaf225a0 171->172 173 7ffbbaf279a8-7ffbbaf279ac 171->173 172->173 173->168 173->171
    APIs
    • GetVersion.KERNEL32(?,?,?,00007FFBBAF270FF,?,?,?,00007FFBBAF266D5), ref: 00007FFBBAF277B1
    • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FFBBAF270FF,?,?,?,00007FFBBAF266D5), ref: 00007FFBBAF277FE
    • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FFBBAF270FF,?,?,?,00007FFBBAF266D5), ref: 00007FFBBAF2780D
    • fprintf.MSPDB140-MSVCRT ref: 00007FFBBAF27829
    • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FFBBAF270FF,?,?,?,00007FFBBAF266D5), ref: 00007FFBBAF27833
    • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FFBBAF270FF,?,?,?,00007FFBBAF266D5), ref: 00007FFBBAF2783C
    • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FFBBAF270FF,?,?,?,00007FFBBAF266D5), ref: 00007FFBBAF27866
    • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FFBBAF270FF,?,?,?,00007FFBBAF266D5), ref: 00007FFBBAF278F2
    • memset.VCRUNTIME140(?,?,?,00007FFBBAF270FF,?,?,?,00007FFBBAF266D5), ref: 00007FFBBAF27927
    • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FFBBAF270FF,?,?,?,00007FFBBAF266D5), ref: 00007FFBBAF2795C
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID: __acrt_iob_funcstrncpy$Versionfflushfprintfmemset
    • String ID: Adapter validation failed for all adapters$D3DPipelineManager: Created D3D9 device$D3DPipelineManager: Created D3D9Ex device$D3DPipelineManager: Unable to create D3D9 device$InitAdapters: out of memory$InitD3D: failed to init adapters$InitD3D: unable to create IDirect3D9 object$Zero adapters found$disableD3D9Ex$verbose
    • API String ID: 626451258-2301350666
    • Opcode ID: 6c96447d5c59d595813d45e78919aa593ab63d6999dddb40858c30737d5aa2ab
    • Instruction ID: 6fdc0f6a0f25cb9bc554cec03ef1634b79f5b3d9eb91bc6e15d6ffc59818fec0
    • Opcode Fuzzy Hash: 6c96447d5c59d595813d45e78919aa593ab63d6999dddb40858c30737d5aa2ab
    • Instruction Fuzzy Hash: 7E713AA5E09F0286EB14AB79D4A01F833A8FF44B82B5441B5EF5E87791DF3CE4158748

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID: fprintf$getenv$__acrt_iob_func__stdio_common_vfprintf__stdio_common_vsscanffflushfopenprintf
    • String ID: (%d) $(E) $(E): Error opening trace file %s$(I) $(V) $(W) $(X) $NWT_TRACE_FILE$NWT_TRACE_LEVEL
    • API String ID: 2778072158-2740212586
    • Opcode ID: 50e40f2db937b8b1366d800ad5e72cb9880236419f32a7ccaad76bb06a829812
    • Instruction ID: 69bba944b8140308dcc129eadca059780aa03221d0a8f4c82945f9fed9c373cc
    • Opcode Fuzzy Hash: 50e40f2db937b8b1366d800ad5e72cb9880236419f32a7ccaad76bb06a829812
    • Instruction Fuzzy Hash: 40510CF1D08F4285EA24BB3DE8641F422A9BF44782F4451B5EF4D862A4DF2DE905C748

    Control-flow Graph

    APIs
      • Part of subcall function 00007FFBBAF2A5C8: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FFBBAF21241), ref: 00007FFBBAF2A5E2
    • getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(?,?,?,00007FFBBAF266D5), ref: 00007FFBBAF26FDB
      • Part of subcall function 00007FFBBAF2A340: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(00000000,?,00000000,00007FFBBAF212E2), ref: 00007FFBBAF2A36F
      • Part of subcall function 00007FFBBAF2A340: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0 ref: 00007FFBBAF2A3C1
      • Part of subcall function 00007FFBBAF2A340: fopen.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FFBBAF2A3D9
      • Part of subcall function 00007FFBBAF2A340: printf.MSPDB140-MSVCRT ref: 00007FFBBAF2A3F8
      • Part of subcall function 00007FFBBAF2A340: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FFBBAF2A40C
      • Part of subcall function 00007FFBBAF2A340: fprintf.MSPDB140-MSVCRT ref: 00007FFBBAF2A463
      • Part of subcall function 00007FFBBAF2A340: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000000,00007FFBBAF212E2), ref: 00007FFBBAF2A4C7
      • Part of subcall function 00007FFBBAF2A340: fprintf.MSPDB140-MSVCRT ref: 00007FFBBAF2A4E0
      • Part of subcall function 00007FFBBAF2A340: fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FFBBAF2A4EC
    • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FFBBAF266D5), ref: 00007FFBBAF27011
    • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FFBBAF266D5), ref: 00007FFBBAF2702D
    • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FFBBAF266D5), ref: 00007FFBBAF27049
    • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FFBBAF266D5), ref: 00007FFBBAF27061
    • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FFBBAF266D5), ref: 00007FFBBAF27079
      • Part of subcall function 00007FFBBAF2A340: fprintf.MSPDB140-MSVCRT ref: 00007FFBBAF2A498
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID: strncmp$fprintfgetenv$__acrt_iob_func__stdio_common_vfprintffflushfopenmallocprintf
    • String ID: NEWT_D3D_RASTERIZER$[W] D3DPPLM::SelectDeviceType: $hal$hal rasterizer selected$isVsyncEnabled$nul$nullref rasterizer selected$ref$ref rasterizer selected$rgb$tnl$unknown rasterizer: %s, only (ref|hal|nul) supported, hal selected instead
    • API String ID: 1456602000-3491790485
    • Opcode ID: 8ae341b471262eefb95e50027a53267c9b1a3444c03fc959e2edf6d02134cc63
    • Instruction ID: a9cfdb447c7406cc98d5f87d972ea0f015f1a7afcdc50ef634c60635705c6109
    • Opcode Fuzzy Hash: 8ae341b471262eefb95e50027a53267c9b1a3444c03fc959e2edf6d02134cc63
    • Instruction Fuzzy Hash: 4D5121B1E08B4285EB14EB3AE8603E933A8AF44B45F4440B5EF0D86695DF3DE509C708

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID: fprintf$getenv$__acrt_iob_func__stdio_common_vfprintf__stdio_common_vsscanffflushfopenprintf
    • String ID: (%d) $(E): Error opening trace file %s$NWT_TRACE_FILE$NWT_TRACE_LEVEL
    • API String ID: 2778072158-549656437
    • Opcode ID: 885049814577bbff44a393ec9ccc0d62a2dcff472222d395173318e95484044a
    • Instruction ID: 4609ba56d70bad593964cc42bd5f2cb9803c56231250241603b6c672ad7f1d64
    • Opcode Fuzzy Hash: 885049814577bbff44a393ec9ccc0d62a2dcff472222d395173318e95484044a
    • Instruction Fuzzy Hash: 76411CB1E09B4285EB20AB3DE8641F423A8FF44786F4445B5EF5D866A4DF2DE805C748

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfomemcpymemset
    • String ID:
    • API String ID: 187659361-0
    • Opcode ID: 1e4c427ac561f24aceb66aeb32417f205ea1092f0eb2d1bb81de26ae57bce442
    • Instruction ID: b6d0fce94ae86a706018fd8d1d6e5646991e1d7bad8e4049fde2abd39490e04f
    • Opcode Fuzzy Hash: 1e4c427ac561f24aceb66aeb32417f205ea1092f0eb2d1bb81de26ae57bce442
    • Instruction Fuzzy Hash: AB615B76E14B5586EB209F2AE4607AA3BA4FB85F86F048075EF4D87B44CF7DE4058B04

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfomemcpymemset
    • String ID:
    • API String ID: 187659361-0
    • Opcode ID: d75b25198b8417601ca87ab23c7450e543a27b18e26c2ae570d73a3e5344d962
    • Instruction ID: 764ec6cc6ead369b7023d80bac45344805ac56e542d45659a435a977c8bf168a
    • Opcode Fuzzy Hash: d75b25198b8417601ca87ab23c7450e543a27b18e26c2ae570d73a3e5344d962
    • Instruction Fuzzy Hash: 76616CB6E04B5586EB209F2AD4607AA37A4FB84F86F048075EF5D87B54CF7DD4058B08

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 754 7ffbbaf24310-7ffbbaf24339 755 7ffbbaf24340-7ffbbaf24347 754->755 755->755 756 7ffbbaf24349-7ffbbaf24358 755->756 757 7ffbbaf24364 756->757 758 7ffbbaf2435a-7ffbbaf2435d 756->758 760 7ffbbaf24366-7ffbbaf24376 757->760 758->757 759 7ffbbaf2435f-7ffbbaf24362 758->759 759->760 761 7ffbbaf2437f-7ffbbaf2438b 760->761 762 7ffbbaf24378-7ffbbaf2437e 760->762 763 7ffbbaf2438d-7ffbbaf2438f 761->763 764 7ffbbaf24391-7ffbbaf24399 761->764 762->761 766 7ffbbaf243bc-7ffbbaf243c2 763->766 767 7ffbbaf2439b-7ffbbaf2439e 764->767 768 7ffbbaf243ba 764->768 769 7ffbbaf243ce-7ffbbaf243df 766->769 770 7ffbbaf243c4-7ffbbaf243c9 766->770 767->768 771 7ffbbaf243a0-7ffbbaf243b8 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ 767->771 768->766 773 7ffbbaf2440c-7ffbbaf24427 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 769->773 774 7ffbbaf243e1-7ffbbaf243e4 769->774 772 7ffbbaf2447d-7ffbbaf2449a ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 770->772 771->766 778 7ffbbaf2449c-7ffbbaf244a5 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ 772->778 779 7ffbbaf244a6-7ffbbaf244b5 772->779 776 7ffbbaf24456 773->776 777 7ffbbaf24429 773->777 774->773 775 7ffbbaf243e6-7ffbbaf24400 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 774->775 780 7ffbbaf24402-7ffbbaf24405 775->780 781 7ffbbaf24407-7ffbbaf2440a 775->781 783 7ffbbaf24459 776->783 782 7ffbbaf24430-7ffbbaf24433 777->782 778->779 784 7ffbbaf244be-7ffbbaf244d2 779->784 785 7ffbbaf244b7-7ffbbaf244bd 779->785 780->783 781->774 786 7ffbbaf2445d-7ffbbaf2446d 782->786 787 7ffbbaf24435-7ffbbaf2444f ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 782->787 783->786 785->784 786->772 787->776 788 7ffbbaf24451-7ffbbaf24454 787->788 788->782
    APIs
    • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,00000000,?,00007FFBBAF2537C), ref: 00007FFBBAF243A3
    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,00000000,?,00007FFBBAF2537C), ref: 00007FFBBAF243F7
    • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,?,00000000,?,00007FFBBAF2537C), ref: 00007FFBBAF2441E
    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,00000000,?,00007FFBBAF2537C), ref: 00007FFBBAF24446
    • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,00000000,?,00007FFBBAF2537C), ref: 00007FFBBAF2448C
    • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,00000000,?,00007FFBBAF2537C), ref: 00007FFBBAF24493
    • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,00000000,?,00007FFBBAF2537C), ref: 00007FFBBAF2449F
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
    • String ID:
    • API String ID: 1492985063-0
    • Opcode ID: 3e26db33542d38082c6f94190852e4ab1b19e1bbd64cbd6028c19a5828d2955a
    • Instruction ID: 8e2ee81d14237409b59742cdd3f3d147894e269e071c6ce60da7a533eb4a87e7
    • Opcode Fuzzy Hash: 3e26db33542d38082c6f94190852e4ab1b19e1bbd64cbd6028c19a5828d2955a
    • Instruction Fuzzy Hash: 53514272E18F4181EB208B2DD1A02B8A7A4FB85F97F158575DF5F837A0CF79D8469208
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID: Version
    • String ID: maxSamples$osBuildNumber$osMajorVersion$osMinorVersion
    • API String ID: 1889659487-98465600
    • Opcode ID: f3d306c855f22df1530f6ad98c868a49d275abd199ed2353e94b2a50aea15da9
    • Instruction ID: a5436450998c4198e27d8cbbe601719c81928a89a4454ecd75c7e37739581afa
    • Opcode Fuzzy Hash: f3d306c855f22df1530f6ad98c868a49d275abd199ed2353e94b2a50aea15da9
    • Instruction Fuzzy Hash: 8D711766B08B8682EA909F6AD4547FD67A4FB89FC5F488071DF0E87758DE3CE5098304
    APIs
      • Part of subcall function 00007FFBBAF2A340: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(00000000,?,00000000,00007FFBBAF212E2), ref: 00007FFBBAF2A36F
      • Part of subcall function 00007FFBBAF2A340: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0 ref: 00007FFBBAF2A3C1
      • Part of subcall function 00007FFBBAF2A340: fopen.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FFBBAF2A3D9
      • Part of subcall function 00007FFBBAF2A340: printf.MSPDB140-MSVCRT ref: 00007FFBBAF2A3F8
      • Part of subcall function 00007FFBBAF2A340: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FFBBAF2A40C
      • Part of subcall function 00007FFBBAF2A340: fprintf.MSPDB140-MSVCRT ref: 00007FFBBAF2A463
      • Part of subcall function 00007FFBBAF2A340: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000000,00007FFBBAF212E2), ref: 00007FFBBAF2A4C7
      • Part of subcall function 00007FFBBAF2A340: fprintf.MSPDB140-MSVCRT ref: 00007FFBBAF2A4E0
      • Part of subcall function 00007FFBBAF2A340: fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FFBBAF2A4EC
    • GetDesktopWindow.USER32 ref: 00007FFBBAF231A8
      • Part of subcall function 00007FFBBAF2A340: fprintf.MSPDB140-MSVCRT ref: 00007FFBBAF2A498
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID: fprintf$getenv$DesktopWindow__acrt_iob_func__stdio_common_vfprintffflushfopenprintf
    • String ID: HARDWARE_VERTEXPROCESSING$SOFTWARE_VERTEXPROCESSING$D3DContext::InitContext device %d$D3DContext::InitContext: successfully created device: %d
    • API String ID: 1238270013-482639655
    • Opcode ID: 827f2b091744698964e49d81cc6cb3083a082b17fa970bd89772ad2f081cc6c0
    • Instruction ID: 856801e741937eeecbfc1b61d2edb20a6aaf198818bc953eda7af55917b104d6
    • Opcode Fuzzy Hash: 827f2b091744698964e49d81cc6cb3083a082b17fa970bd89772ad2f081cc6c0
    • Instruction Fuzzy Hash: AD517E72B08B8582E724CF29E5507EAB3A4FB88B84F004125EF9D83665DF38E465CB44
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID: __current_exception__current_exception_contextterminate
    • String ID: csm
    • API String ID: 2542180945-1018135373
    • Opcode ID: 9e9710f0591a29c53884a94cb3729aa42d1403e6f923cbf35637d194a76df934
    • Instruction ID: 22c4e205c3ea95311799064348092817cd0122f3f71a9c66d29477043a4539eb
    • Opcode Fuzzy Hash: 9e9710f0591a29c53884a94cb3729aa42d1403e6f923cbf35637d194a76df934
    • Instruction Fuzzy Hash: 40F01F76A05B40CAC710AF26E8A00A83768E748B99B4A6164FF4D87B15CF38C8908340
    APIs
    • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,00007FFBBAF25EBF), ref: 00007FFBBAF26EDB
    Strings
    • WARNING: bad driver version detected, device disabled. Please update your driver to at least version %d.%d.%d.%d, xrefs: 00007FFBBAF26EAE
    • D3DPPLM::CheckForBadHardware: found matching hardware: VendorId=0x%04x DeviceId=0x%04x, xrefs: 00007FFBBAF26E7E
    • WARNING: Unsupported video adapter found, device disabled, xrefs: 00007FFBBAF26ECD
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID: strncpy
    • String ID: D3DPPLM::CheckForBadHardware: found matching hardware: VendorId=0x%04x DeviceId=0x%04x$WARNING: Unsupported video adapter found, device disabled$WARNING: bad driver version detected, device disabled. Please update your driver to at least version %d.%d.%d.%d
    • API String ID: 3301158039-2891762250
    • Opcode ID: 40cbf9719cb7f1d6758cfa2ac922f6985c72c44826cb81b1a54f8f8b33c95bd2
    • Instruction ID: be4f9460fbc14d815b68891b9085dc4adb6f79adfd1093dcb19e5ec4969d7010
    • Opcode Fuzzy Hash: 40cbf9719cb7f1d6758cfa2ac922f6985c72c44826cb81b1a54f8f8b33c95bd2
    • Instruction Fuzzy Hash: 2F31A0A1E08F0282EB609B6DE4601F9A294EB44761F1403B6FE6D836E0DF3CE4468648
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID: DebugOutputString
    • String ID: Texture.Usage.DYNAMIC$nCreateTexture: unknown format hint: %d
    • API String ID: 1166629820-2628201927
    • Opcode ID: 7727f6d33c6b3b027701db175bef16aba0b9ab9843f19c68cda378c17dcf3a2d
    • Instruction ID: 30baf7e7fa8aae28b76300bab8a1e735dd228f35a6346460c0024ed749131209
    • Opcode Fuzzy Hash: 7727f6d33c6b3b027701db175bef16aba0b9ab9843f19c68cda378c17dcf3a2d
    • Instruction Fuzzy Hash: 93311872A0CB818AE7709B28F0507EAB7A4FB84745F444175EB8983A59DF3CD445CB44
    APIs
    Strings
    • OS check overridden via NEWT_D3D_NO_HWCHECK, xrefs: 00007FFBBAF26F49
    • D3DPPLM::CheckOSVersion: Windows 2000 or earlier OS detected, failed, xrefs: 00007FFBBAF26F2D
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID: Version
    • String ID: OS check overridden via NEWT_D3D_NO_HWCHECK$D3DPPLM::CheckOSVersion: Windows 2000 or earlier OS detected, failed
    • API String ID: 1889659487-2189726416
    • Opcode ID: 74def4e7f39eb65c4dba3ca7bf262e55c71bcfc5a41d0f748d1dfc147e419f2f
    • Instruction ID: 86247e9b404b83fafdf349947d6cf38289d45bf2ac53afe2a35f20f3ef27d8d5
    • Opcode Fuzzy Hash: 74def4e7f39eb65c4dba3ca7bf262e55c71bcfc5a41d0f748d1dfc147e419f2f
    • Instruction Fuzzy Hash: C2F030E4E08A4382FB54B77CC8A13F8129AEB51302FC004B1EA4DC16D0DE7DA98AC70D
    APIs
    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z.MSVCP140 ref: 00007FFBBAF25381
    • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FFBBAF25391
    Strings
    • D3DPhongMaterial::getMap -- type is out of range - type = , xrefs: 00007FFBBAF25370
    Memory Dump Source
    • Source File: 00000001.00000002.2795831177.00007FFBBAF21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFBBAF20000, based on PE: true
    • Associated: 00000001.00000002.2795786977.00007FFBBAF20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795875234.00007FFBBAF2C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795921230.00007FFBBAF3F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000001.00000002.2795952946.00007FFBBAF40000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_7ffbbaf20000_loaddll64.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@D@std@@@std@@U?$char_traits@$V01@@
    • String ID: D3DPhongMaterial::getMap -- type is out of range - type =
    • API String ID: 3022475274-1789742052
    • Opcode ID: d25f46c8111b3a8002844401e421e151b27bd4071df0a9608d010cfbae37aed1
    • Instruction ID: 47fc2357c16f91382ccb74a6aaa6d7caa9538413ae472ed027105ac7f40285af
    • Opcode Fuzzy Hash: d25f46c8111b3a8002844401e421e151b27bd4071df0a9608d010cfbae37aed1
    • Instruction Fuzzy Hash: 5EE06DE0F19E0681EA149B79ECA00F92265AF44B87B1410B1DE0ECA220DE6C94D6870C