Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.dll

Overview

General Information

Sample name:file.dll
(renamed file extension from exe to dll)
Original sample name:file.exe
Analysis ID:1524398
MD5:3221211c319e55e42e398e062c1e155e
SHA1:b1378446aa1cbe0858eed3c7083235a3856a82ba
SHA256:cae7512666ae3f18702df3bffaf297739a30aa05ea73a7d1ee4c50ba2d874b93
Tags:dllexesignedx64user-jstrosch
Infos:

Detection

Score:6
Range:0 - 100
Whitelisted:false
Confidence:0%

Signatures

AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 6532 cmdline: loaddll64.exe "C:\Users\user\Desktop\file.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 6556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6704 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 6768 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
        • WerFault.exe (PID: 7092 cmdline: C:\Windows\system32\WerFault.exe -u -p 6768 -s 356 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 6728 cmdline: rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_media_sound_MidiInDeviceProvider_nGetDescription MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 2124 cmdline: C:\Windows\system32\WerFault.exe -u -p 6728 -s 356 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 6036 cmdline: rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_media_sound_MidiInDeviceProvider_nGetName MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 7088 cmdline: C:\Windows\system32\WerFault.exe -u -p 6036 -s 528 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 6292 cmdline: rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_media_sound_MidiInDeviceProvider_nGetNumDevices MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7072 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiInDeviceProvider_nGetDescription MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7000 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiInDeviceProvider_nGetName MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2708 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiInDeviceProvider_nGetNumDevices MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5180 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nOpen MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6220 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nGetPortType MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4408 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nGetPortName MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7176 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nGetPortCount MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7184 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nGetControls MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7192 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nControlSetIntValue MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7208 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nControlSetFloatValue MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7216 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nControlGetIntValue MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7224 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nControlGetFloatValue MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7236 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nClose MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7292 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixerProvider_nNewPortMixerInfo MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7304 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixerProvider_nGetNumDevices MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7316 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_Platform_nIsSigned8 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7336 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_Platform_nIsBigEndian MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7356 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_Platform_nGetLibraryForFeature MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7368 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_Platform_nGetExtraLibraries MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7384 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nSendShortMessage MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7400 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nSendLongMessage MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7408 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nOpen MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7424 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nGetTimeStamp MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7468 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nClose MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7484 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDeviceProvider_nGetVersion MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7500 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDeviceProvider_nGetVendor MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: file.dllStatic PE information: certificate valid
Source: file.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: c:\jenkins\workspace\8-2-build-windows-x64-cygwin\jdk8u361\3183\build\windows-x64\jdk\objs\libjsound\jsound.pdb source: rundll32.exe, 00000003.00000002.1830544768.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1858789941.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000A.00000002.1876625033.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000002.1845055529.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.1775538392.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.1774962600.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.1775772661.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.1779009700.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000019.00000002.1778970705.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.1776288921.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001B.00000002.1779014099.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001C.00000002.1779041307.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.1779110136.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000023.00000002.1779057663.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000024.00000002.1780573721.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000027.00000002.2924216865.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000028.00000002.1780499954.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, file.dll
Source: Binary string: c:\jenkins\workspace\8-2-build-windows-x64-cygwin\jdk8u361\3183\build\windows-x64\jdk\objs\libjsound\jsound.pdb!! source: rundll32.exe, 00000003.00000002.1830544768.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1858789941.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000A.00000002.1876625033.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000002.1845055529.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.1775538392.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.1774962600.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.1775772661.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.1779009700.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000019.00000002.1778970705.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.1776288921.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001B.00000002.1779014099.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001C.00000002.1779041307.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.1779110136.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000023.00000002.1779057663.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000024.00000002.1780573721.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000027.00000002.2924216865.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000028.00000002.1780499954.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, file.dll
Source: unknownDNS traffic detected: query: 171.39.242.20.in-addr.arpa replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa
Source: file.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: file.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: file.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: file.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: file.dllString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: file.dllString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: file.dllString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: file.dllString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: file.dllString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: file.dllString found in binary or memory: http://ocsp.digicert.com0
Source: file.dllString found in binary or memory: http://ocsp.digicert.com0A
Source: file.dllString found in binary or memory: http://ocsp.digicert.com0C
Source: file.dllString found in binary or memory: http://ocsp.digicert.com0X
Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
Source: file.dllString found in binary or memory: http://www.digicert.com/CPS0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE148E176C3_2_00007FFE148E176C
Source: C:\Windows\System32\rundll32.exeCode function: 41_2_00007FFE148E176C41_2_00007FFE148E176C
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6768 -s 356
Source: file.dllBinary or memory string: OriginalFilenamejsound.dllN vs file.dll
Source: classification engineClassification label: clean6.winDLL@78/13@1/0
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6728
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6556:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6036
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6768
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\e58b05d4-f5ae-4b8d-bfbd-c699532ae4aaJump to behavior
Source: file.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_media_sound_MidiInDeviceProvider_nGetDescription
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\file.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_media_sound_MidiInDeviceProvider_nGetDescription
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",#1
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6768 -s 356
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6728 -s 356
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_media_sound_MidiInDeviceProvider_nGetName
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6036 -s 528
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_media_sound_MidiInDeviceProvider_nGetNumDevices
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiInDeviceProvider_nGetDescription
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiInDeviceProvider_nGetName
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiInDeviceProvider_nGetNumDevices
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nOpen
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nGetPortType
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nGetPortName
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nGetPortCount
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nGetControls
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nControlSetIntValue
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nControlSetFloatValue
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nControlGetIntValue
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nControlGetFloatValue
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nClose
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixerProvider_nNewPortMixerInfo
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixerProvider_nGetNumDevices
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_Platform_nIsSigned8
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_Platform_nIsBigEndian
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_Platform_nGetLibraryForFeature
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_Platform_nGetExtraLibraries
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nSendShortMessage
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nSendLongMessage
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nOpen
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nGetTimeStamp
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nClose
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDeviceProvider_nGetVersion
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDeviceProvider_nGetVendor
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_media_sound_MidiInDeviceProvider_nGetDescriptionJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_media_sound_MidiInDeviceProvider_nGetNameJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_media_sound_MidiInDeviceProvider_nGetNumDevicesJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiInDeviceProvider_nGetDescriptionJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiInDeviceProvider_nGetNameJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiInDeviceProvider_nGetNumDevicesJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nOpenJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nGetPortTypeJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nGetPortNameJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nGetPortCountJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nGetControlsJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nControlSetIntValueJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nControlSetFloatValueJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nControlGetIntValueJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nControlGetFloatValueJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nCloseJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixerProvider_nNewPortMixerInfoJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixerProvider_nGetNumDevicesJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_Platform_nIsSigned8Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_Platform_nIsBigEndianJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_Platform_nGetLibraryForFeatureJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_Platform_nGetExtraLibrariesJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nSendShortMessageJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nSendLongMessageJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nOpenJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nGetTimeStampJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nCloseJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDeviceProvider_nGetVersionJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDeviceProvider_nGetVendorJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: vcruntime140.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: file.dllStatic PE information: certificate valid
Source: file.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: file.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: c:\jenkins\workspace\8-2-build-windows-x64-cygwin\jdk8u361\3183\build\windows-x64\jdk\objs\libjsound\jsound.pdb source: rundll32.exe, 00000003.00000002.1830544768.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1858789941.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000A.00000002.1876625033.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000002.1845055529.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.1775538392.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.1774962600.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.1775772661.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.1779009700.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000019.00000002.1778970705.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.1776288921.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001B.00000002.1779014099.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001C.00000002.1779041307.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.1779110136.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000023.00000002.1779057663.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000024.00000002.1780573721.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000027.00000002.2924216865.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000028.00000002.1780499954.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, file.dll
Source: Binary string: c:\jenkins\workspace\8-2-build-windows-x64-cygwin\jdk8u361\3183\build\windows-x64\jdk\objs\libjsound\jsound.pdb!! source: rundll32.exe, 00000003.00000002.1830544768.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1858789941.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000A.00000002.1876625033.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000002.1845055529.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.1775538392.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.1774962600.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.1775772661.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.1779009700.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000019.00000002.1778970705.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.1776288921.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001B.00000002.1779014099.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001C.00000002.1779041307.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.1779110136.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000023.00000002.1779057663.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000024.00000002.1780573721.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000027.00000002.2924216865.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000028.00000002.1780499954.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmp, file.dll
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 4716
Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 5284
Source: C:\Windows\System32\rundll32.exeAPI coverage: 8.9 %
Source: C:\Windows\System32\rundll32.exeAPI coverage: 9.5 %
Source: C:\Windows\System32\loaddll64.exe TID: 6560Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Windows\System32\rundll32.exe TID: 7472Thread sleep count: 4716 > 30
Source: C:\Windows\System32\rundll32.exe TID: 7472Thread sleep count: 5284 > 30
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
Source: Amcache.hve.8.drBinary or memory string: VMware
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.8.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.8.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.8.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.8.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.8.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.8.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.8.drBinary or memory string: vmci.sys
Source: Amcache.hve.8.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.8.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.8.drBinary or memory string: VMware20,1
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.8.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.8.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.8.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE148E538C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00007FFE148E538C
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE148E5078 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00007FFE148E5078
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE148E538C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00007FFE148E538C
Source: C:\Windows\System32\rundll32.exeCode function: 41_2_00007FFE148E5078 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,41_2_00007FFE148E5078
Source: C:\Windows\System32\rundll32.exeCode function: 41_2_00007FFE148E538C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,41_2_00007FFE148E538C
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",#1Jump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE148E54DC GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,3_2_00007FFE148E54DC
Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Rundll32
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
22
Virtualization/Sandbox Evasion
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager22
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets2
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1524398 Sample: file.exe Startdate: 02/10/2024 Architecture: WINDOWS Score: 6 26 171.39.242.20.in-addr.arpa 2->26 8 loaddll64.exe 1 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 rundll32.exe 8->12         started        14 rundll32.exe 8->14         started        16 28 other processes 8->16 process5 18 rundll32.exe 10->18         started        20 WerFault.exe 16 12->20         started        22 WerFault.exe 16 14->22         started        process6 24 WerFault.exe 20 18 18->24         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
171.39.242.20.in-addr.arpa
unknown
unknownfalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netAmcache.hve.8.drfalse
    • URL Reputation: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1524398
    Start date and time:2024-10-02 18:45:26 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 50s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:42
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:file.dll
    (renamed file extension from exe to dll)
    Original Sample Name:file.exe
    Detection:CLEAN
    Classification:clean6.winDLL@78/13@1/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 5
    • Number of non-executed functions: 32
    • Exclude process from analysis (whitelisted): WerFault.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 13.89.179.12, 20.189.173.21
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size exceeded maximum capacity and may have missing behavior information.
    • VT rate limit hit for: file.dll
    TimeTypeDescription
    12:46:34API Interceptor3x Sleep call for process: WerFault.exe modified
    12:48:23API Interceptor1x Sleep call for process: loaddll64.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\System32\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.7660426019734736
    Encrypted:false
    SSDEEP:192:dN9jFi/y7o0S0IvTdjlwCzuiFWZ24lO8V:lhia7NIvTdjfzuiFWY4lO8V
    MD5:C3B3919C625BA6FC029A2C9024A23AB8
    SHA1:61BCD4B2E7C2DF2421839FD0F033E8CD9A9AC217
    SHA-256:195027EE29D4176EEB7D7C3CDE90A5F989BE8C34B56307CDD012C564FE0A6CF8
    SHA-512:BF658681AD4C6B68BEFBC8B0B323EA24B7AA962F885A222C149FE68C52A99A896C93074C1A313054D318CCF04E66BF7164D66A16F1FFEB013BB612FDD1BD1C21
    Malicious:false
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.3.6.1.1.7.9.2.4.1.9.8.2.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.3.6.1.1.7.9.6.4.8.2.3.1.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.0.8.9.3.c.8.1.-.2.6.e.0.-.4.9.b.f.-.b.0.7.2.-.f.5.6.d.5.5.9.6.f.f.6.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.f.a.0.0.1.d.2.-.a.1.3.9.-.4.7.f.8.-.8.5.9.7.-.9.d.1.8.d.a.8.b.b.a.0.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.f.i.l.e...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.4.8.-.0.0.0.1.-.0.0.1.4.-.9.3.8.9.-.c.6.9.a.e.a.1.4.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.r.u.n.
    Process:C:\Windows\System32\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.7660272063289806
    Encrypted:false
    SSDEEP:192:hJxWFihyKo0S0IvTdjlwCzuiFWZ24lO8V:/x4iEKNIvTdjfzuiFWY4lO8V
    MD5:513B6373C9260FE2FD5EB5DDD09A6D77
    SHA1:E5C0B2F3927546C381D08960762D5F3DB48864CC
    SHA-256:5DF9387BC06D3A2FE1B84C809D8E577D438A16A9ECEA2FAB41C22E3AAEA08345
    SHA-512:2607B98CE618E63059406F3A843CBD4CA9E352EA70C050F422CC14A7C5717EA4637F32A51D9E9531A4F2F86BF9E218F53704239371B03F3AC4618DE5054542C0
    Malicious:false
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.3.6.1.1.7.9.2.0.6.7.1.4.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.3.6.1.1.7.9.7.0.6.7.0.9.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.a.9.2.9.7.c.9.-.4.b.b.3.-.4.d.d.6.-.9.0.b.8.-.f.5.b.8.a.d.0.5.b.9.a.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.7.9.d.a.7.8.b.-.4.1.e.5.-.4.1.f.b.-.9.1.6.e.-.e.d.0.d.6.d.f.6.9.8.a.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.f.i.l.e...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.7.0.-.0.0.0.1.-.0.0.1.4.-.2.c.c.5.-.c.7.9.a.e.a.1.4.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.r.u.n.
    Process:C:\Windows\System32\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.8784576174167049
    Encrypted:false
    SSDEEP:96:siF+dFi8yKynsjds4RvSmmTfTQXIDcQ2c63bcEEcw3EXaXz+HbHgSQgJjt7FwXqb:PGFi8yno0Q0IvOejlQ/zuiFWZ24lO8V
    MD5:141075855E85688ED779727DF71986B8
    SHA1:2FD25A05DC75811DEC670F24BEBA17213B9839D1
    SHA-256:D0B62B9202BBBB16601C008AB5CD87768E3C7AEE37663B125393C0269DA0AF81
    SHA-512:B2E163D59E335665D5E04792269CEE8FCC5606522DE8270392D9CE90BEC63FD81400FFBD18D87922782C1EB158B40F6AB8703BBE3DACA9F3050C447A59DAF814
    Malicious:false
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.3.6.1.1.8.2.1.0.4.6.2.1.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.3.6.1.1.8.2.5.2.6.5.0.7.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.4.b.3.b.b.7.f.-.f.7.d.e.-.4.d.d.9.-.a.a.1.4.-.3.6.9.8.3.4.d.3.3.a.e.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.e.f.b.9.f.3.4.-.1.f.4.7.-.4.1.8.1.-.b.9.3.2.-.3.1.c.5.5.e.2.3.9.4.c.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.f.i.l.e...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.9.4.-.0.0.0.1.-.0.0.1.4.-.8.8.6.5.-.9.2.9.c.e.a.1.4.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.r.u.n.
    Process:C:\Windows\System32\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Wed Oct 2 16:46:19 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):67448
    Entropy (8bit):1.552733074913142
    Encrypted:false
    SSDEEP:192:aN1t5oFgOMxE+tScRomg63XSXTXdvljI50ynAaT:/JH6JomjyN+n
    MD5:2EBECE16D4721EDD9CFE0AD6E6170773
    SHA1:A24A98762F3DEA59B2D433D5C54F391CD6D045AB
    SHA-256:DD87361A7705776D55945ED8E56C32C78C4213B6457E59933002F27B4F9EC8D4
    SHA-512:E261961D0BC6F935EA5E96F421D4570CB0722F7504BF0AD081CD63AA760FA1BB8AE6D98E072B7170AF298ACB8B4B8E2182C6BCAD7AA04D904558981B43DD6FE7
    Malicious:false
    Preview:MDMP..a..... ........x.f....................................................T.......8...........T...........p...........................p...............................................................................eJ..............Lw......................T.......p....x.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Wed Oct 2 16:46:19 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):69580
    Entropy (8bit):1.5083032608148348
    Encrypted:false
    SSDEEP:192:aQT5oFYrIOMx4T3RXT9OQwRXdel/IcDoyJqWc:0ib7ThZWKiyO
    MD5:13AB54C2CCB3536FE25B33B19889EB9D
    SHA1:4089FAA6F40C561840BFF8F8D66F0957FC0901FA
    SHA-256:57EA17E832C33B4416826875BE1ECF18CB2E0B42F3389ED894D06FA259CB6A23
    SHA-512:C55669F6D5A0721214F41731642CE9A15AF277BAEA2AEBFB08110F891E7113D3A424552DAE877DD72EC7DBE3B9C6537C6E27B4B353EB1156F8ED9786690A9F81
    Malicious:false
    Preview:MDMP..a..... ........x.f....................................................T.......8...........T........... ...........................p...............................................................................eJ..............Lw......................T.......H....x.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8490
    Entropy (8bit):3.694342102704871
    Encrypted:false
    SSDEEP:192:R6l7wVeJupybJ46Y7eqgmfiL0Q9pr+89bwiVftQm:R6lXJwyb26YiqgmfG7XwIfP
    MD5:AC265D9444A97103120CBD947A3CC017
    SHA1:DFDE6B38EC385163D493A7300DD737306A765C7A
    SHA-256:CA8B6F4F40496569871697767BF018281BAC5E5EE72B0A5F2C56FB0635A5B51B
    SHA-512:FDDAFA28E4DCED38191E7FFE7151EFCCDBC0E1C9558D133431BFA8C0A5B36E4FD14C1D516B32B6C2620637FE745555D20049E264266DE5B75AC6945B976C8227
    Malicious:false
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.2.8.<./.P.i.
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4729
    Entropy (8bit):4.463109458847425
    Encrypted:false
    SSDEEP:48:cvIwWl8zsiJg771I9RuWpW8VYIYm8M4JCFCtsNeFknyq85m4zVncptSTSMd:uIjfwI7uP7VYJilnGOpoOMd
    MD5:7A5F1B544482D5869D74777E8819B523
    SHA1:F82C62CA4398D65E32B62377D46CAE934BBA106C
    SHA-256:F6B44FEA7A28DDF30A2B19931EBF4422896090CEC7D3664B1B1A9C68E74596A7
    SHA-512:1EBC7C31C492D47D89EC9118743C08FD241B7D5040DDF81D98BADD99DC3BB9FFF45E25CB43EECCB277AEC82159BF03C017506A987D2A9E353B20472566D0E9B3
    Malicious:false
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="526069" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8498
    Entropy (8bit):3.696500935646734
    Encrypted:false
    SSDEEP:192:R6l7wVeJqUxbr6Yza8O0gmfiL0Q9prT89bw/Vf0rkQm:R6lXJJxbr6YlVgmfG7Ewdfgi
    MD5:B9212D90F4D6E7516F46601735420468
    SHA1:F7AAC4802479D557C74415E966BF76A941AD66A4
    SHA-256:3A25C967B6A64E635B7F726B6F3A21ED6C444EA2531936B1D18E209E8253834E
    SHA-512:C8C811A98F451914867976C94C5B228F9274A3D3E50BFB94F675E55DE3F890AC63E29CD39BD4AF74942E498B65147C3763AF301A56DBDE2A8D7FA8128898AC69
    Malicious:false
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.6.8.<./.P.i.
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4729
    Entropy (8bit):4.464117418127518
    Encrypted:false
    SSDEEP:48:cvIwWl8zsiJg771I9RuWpW8VYhYm8M4JCFCtsNeFNyq85m4zVY3ptSTSnd:uIjfwI7uP7VVJiWG+3poOnd
    MD5:94F1108AB1BDC4A8026BF32EBD10A10F
    SHA1:7FEB5633142FFA21C206ED3CA84F2F982F1EE4BB
    SHA-256:25AAF850869D825CC8EE7716B4EC313444D4EACC2652B0B5EB617632B331864D
    SHA-512:AB3B9A5D74146F51D6DB57B9D6FDF67221BF2D1DB209B2865BADB6A4B6661E1B23FEDE68B48C2D9B9B6252CC9C276C752B2F8E271E25778EAC0904969D487CF2
    Malicious:false
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="526069" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\System32\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Wed Oct 2 16:46:22 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):74260
    Entropy (8bit):1.6198720305363832
    Encrypted:false
    SSDEEP:192:nEMPVWCNWkX95OMxRAMUIdMnjDCrdRrP8I2ianeSujwG5:rBNr6KAXIdMnjDCnEI2iyH8
    MD5:0BF095AB333E4DE5106D04FE7D6AA0C0
    SHA1:52A4DB7CD813175904D1AB3F77EE16E7974BE8C5
    SHA-256:58C61CFA820CA63DA8B6145901701C40933E5873093A268BE63C90E013A1DCBB
    SHA-512:41472B5D830C12C7CF72136F4432E9E548394C58BFA0DE5A7AE751AA794771A9B4FE8E912F3B9D6ACB6276258383983B2E9A75ED369B9841870DEB939D7EF278
    Malicious:false
    Preview:MDMP..a..... ........x.f........................x...........D...>7..........T.......8...........T...........(...............D...........0...............................................................................eJ..............Lw......................T............x.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8492
    Entropy (8bit):3.691245110880909
    Encrypted:false
    SSDEEP:192:R6l7wVeJeuO6Y7HMqgmfiL0GFprRC89bwuVfuwm:R6lXJHO6YwqgmfGxZ7wkfA
    MD5:F8CD689E4FB3AAE5013BC41FD936F2D9
    SHA1:8069982DCA3ED5A66E37E3F4F48C98AAD88E7AA8
    SHA-256:3F7DAB23570ECD4D7FF7DD65743A21A2AACA2FBB15165379AAD7E38446CA42E0
    SHA-512:40A0E28216E88666A7E18FFE40F638E1C0C2C49754B23A1EBBB06066EEB010A7B034216F98613C360219432FE8E3C26B0FE684EC45BD258BA993BABC0489E9C5
    Malicious:false
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.0.3.6.<./.P.i.
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4729
    Entropy (8bit):4.466169803148608
    Encrypted:false
    SSDEEP:48:cvIwWl8zsiJg771I9RuWpW8VYBYm8M4JCFCtsNRcFKyq85m4zVvpptSTSud:uIjfwI7uP7VRJi5GjpoOud
    MD5:06F4AEA506E15E8C7774E33A3D7CE221
    SHA1:F7D0D2140C4EB8A7461F02B5E7F7B44424DA3F79
    SHA-256:24A4D8257B777F54EEAFEE4999DEE9DEE2FBCA87B3BE1FFCAD31DFCBBE5935F9
    SHA-512:F3C98851E995AB35DE6A43646BD1373DF0A42AF461A602DF1C83306C24E956DD9F0F004A40E3FDB34D41CAAAD97E4C083BFA3B8AB334A11A2288D4F517F43839
    Malicious:false
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="526069" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\System32\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.466394506296931
    Encrypted:false
    SSDEEP:6144:iIXfpi67eLPU9skLmb0b4zWSPKaJG8nAgejZMMhA2gX4WABl0uNcdwBCswSb9:HXD94zWlLZMM6YFHa+9
    MD5:70C094BAB49B4AA6306E611BD10087A0
    SHA1:53C8ECE1140B181B516E2F001BCCB7EF7B4FF4F2
    SHA-256:0F5D8F4BD3589471013A309443DA718F2CECC787F8ED51513877948FC2F82623
    SHA-512:0465C005F4AA4019643AEB81117BE9FD787A62E5464CFCCBEE1334C6D693DBD2A27CA6895CA288E3B5154D71F9C09F122C32C5371F5849309C5C720F03233B95
    Malicious:false
    Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
    Entropy (8bit):6.483035224848994
    TrID:
    • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
    • Win64 Executable (generic) (12005/4) 10.17%
    • Generic Win/DOS Executable (2004/3) 1.70%
    • DOS Executable Generic (2002/1) 1.70%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
    File name:file.dll
    File size:43'168 bytes
    MD5:3221211c319e55e42e398e062c1e155e
    SHA1:b1378446aa1cbe0858eed3c7083235a3856a82ba
    SHA256:cae7512666ae3f18702df3bffaf297739a30aa05ea73a7d1ee4c50ba2d874b93
    SHA512:51c9891055cbaa919a6094ab3cff1082423d6fb64496651d8d07afd2d8cebff3ed9f48213dc4a20c314a74072dbf720c9279412b1ecddaba6d754edb0bf5067e
    SSDEEP:768:79cuau+2V72zJ3R5O/PzZ6xez66BmxSoYiUFVPxWEexj:79cLz5yzZ60z66IxSo7UDPxY
    TLSH:C3137C67A761489EF46FA1F7F852823BE472781107A0D7CE07A543360FA7351792E3A8
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........;..;Z..;Z..;Z..2"..3Z..i2..9Z..i2..7Z..i2..3Z..i2..9Z..`2..>Z..;Z..kZ...3..:Z...3..7Z...3..:Z...3a.:Z...3..:Z..Rich;Z.........
    Icon Hash:7ae282899bbab082
    Entrypoint:0x180005038
    Entrypoint Section:.text
    Digitally signed:true
    Imagebase:0x180000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
    Time Stamp:0x63BBD4C4 [Mon Jan 9 08:48:04 2023 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:3164d0dcdc57c2cea278225ece4bbbd5
    Signature Valid:true
    Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
    Signature Validation Error:The operation completed successfully
    Error Number:0
    Not Before, Not After
    • 19/08/2021 01:00:00 20/08/2023 00:59:59
    Subject Chain
    • CN="Oracle America, Inc.", OU=Software Engineering, O="Oracle America, Inc.", L=Redwood City, S=California, C=US
    Version:3
    Thumbprint MD5:2876C1BECB51837D0E3DE50903D025B6
    Thumbprint SHA-1:940D69C0A34A1B4CFD8048488BA86F4CED60481A
    Thumbprint SHA-256:EE46613A38B4F486164BCE7FB23178667715617F511B364594311A1548B08EB1
    Serial:068BE2F53452C882F18ED41A5DD4E7A3
    Instruction
    dec eax
    mov dword ptr [esp+08h], ebx
    dec eax
    mov dword ptr [esp+10h], esi
    push edi
    dec eax
    sub esp, 20h
    dec ecx
    mov edi, eax
    mov ebx, edx
    dec eax
    mov esi, ecx
    cmp edx, 01h
    jne 00007FED9D4D4917h
    call 00007FED9D4D4D98h
    dec esp
    mov eax, edi
    mov edx, ebx
    dec eax
    mov ecx, esi
    dec eax
    mov ebx, dword ptr [esp+30h]
    dec eax
    mov esi, dword ptr [esp+38h]
    dec eax
    add esp, 20h
    pop edi
    jmp 00007FED9D4D47A4h
    int3
    int3
    int3
    inc eax
    push ebx
    dec eax
    sub esp, 20h
    dec eax
    mov ebx, ecx
    xor ecx, ecx
    call dword ptr [00000FEFh]
    dec eax
    mov ecx, ebx
    call dword ptr [00000FEEh]
    call dword ptr [00000FD8h]
    dec eax
    mov ecx, eax
    mov edx, C0000409h
    dec eax
    add esp, 20h
    pop ebx
    dec eax
    jmp dword ptr [00000FBCh]
    dec eax
    mov dword ptr [esp+08h], ecx
    dec eax
    sub esp, 38h
    mov ecx, 00000017h
    call 00007FED9D4D4EC6h
    test eax, eax
    je 00007FED9D4D4919h
    mov ecx, 00000002h
    int 29h
    dec eax
    lea ecx, dword ptr [0000425Fh]
    call 00007FED9D4D49BFh
    dec eax
    mov eax, dword ptr [esp+38h]
    dec eax
    mov dword ptr [00004346h], eax
    dec eax
    lea eax, dword ptr [esp+38h]
    dec eax
    add eax, 08h
    dec eax
    mov dword ptr [000042D6h], eax
    dec eax
    mov eax, dword ptr [0000432Fh]
    dec eax
    mov dword ptr [000041A0h], eax
    Programming Language:
    • [IMP] VS2008 SP1 build 30729
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x6fa00x944.rdata
    IMAGE_DIRECTORY_ENTRY_IMPORT0x78e40xa0.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0xb0000x3a0.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0xa0000x66c.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x80000x28a0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0xc0000x18.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x67400x54.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x67a00x100.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x60000x298.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x47800x48003ef4b245e8be83c024d2ef01753bfbaeFalse0.56689453125data6.2051827024136115IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x60000x22a60x24000043139e7dbe6ce9e543722d03b4c6cbFalse0.3543836805555556data4.9389637349025834IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x90000x8300x200d96918b565dad030e59cc5b97626602fFalse0.09375data0.4700436669171336IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0xa0000x66c0x800337bfd92a7453269435e572cce6e517eFalse0.39111328125data3.5976681162117394IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0xb0000x3a00x400738b9352a1dec6e8f3817478c2957724False0.40625data3.0574189285914155IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0xc0000x180x200432df58a52e37464023b56c7eba3dd8dFalse0.07421875data0.3398375245953951IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_VERSION0xb0600x33cdata0.463768115942029
    DLLImport
    WINMM.dllmixerSetControlDetails, mixerGetControlDetailsA, mixerGetLineControlsA, mixerGetLineInfoA, mixerClose, mixerOpen, mixerGetDevCapsA, mixerGetNumDevs, timeEndPeriod, timeBeginPeriod, midiInGetNumDevs, midiOutReset, midiOutLongMsg, midiOutShortMsg, midiOutUnprepareHeader, midiOutPrepareHeader, midiOutClose, midiOutOpen, midiOutGetErrorTextA, midiOutGetDevCapsA, midiOutGetNumDevs, midiInReset, midiInStop, midiInStart, midiInAddBuffer, midiInUnprepareHeader, midiInPrepareHeader, midiInClose, midiInOpen, midiInGetErrorTextA, midiInGetDevCapsA, timeGetTime
    KERNEL32.dllRtlCaptureContext, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, SetEvent, InitializeSListHead, DisableThreadLibraryCalls, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, IsDebuggerPresent, IsProcessorFeaturePresent, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, DeleteCriticalSection, CreateThread, Sleep, CreateEventA, WaitForSingleObject, CloseHandle
    VCRUNTIME140.dll__C_specific_handler, memset, memcpy, __std_type_info_destroy_list
    api-ms-win-crt-string-l1-1-0.dllstrcpy, strncpy
    api-ms-win-crt-heap-l1-1-0.dllmalloc, free
    api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vsprintf
    api-ms-win-crt-runtime-l1-1-0.dll_initterm_e, _seh_filter_dll, _configure_narrow_argv, _initialize_narrow_environment, _initialize_onexit_table, _register_onexit_function, _execute_onexit_table, _crt_atexit, _cexit, _initterm
    NameOrdinalAddress
    Java_com_sun_media_sound_MidiInDeviceProvider_nGetDescription10x18000130c
    Java_com_sun_media_sound_MidiInDeviceProvider_nGetName20x180001388
    Java_com_sun_media_sound_MidiInDeviceProvider_nGetNumDevices30x180001404
    Java_com_sun_media_sound_MidiInDeviceProvider_nGetVendor40x18000140c
    Java_com_sun_media_sound_MidiInDeviceProvider_nGetVersion50x180001488
    Java_com_sun_media_sound_MidiInDevice_nClose60x180001020
    Java_com_sun_media_sound_MidiInDevice_nGetMessages70x180001028
    Java_com_sun_media_sound_MidiInDevice_nGetTimeStamp80x180001260
    Java_com_sun_media_sound_MidiInDevice_nOpen90x18000127c
    Java_com_sun_media_sound_MidiInDevice_nStart100x1800012d0
    Java_com_sun_media_sound_MidiInDevice_nStop110x180001304
    Java_com_sun_media_sound_MidiOutDeviceProvider_nGetDescription120x1800015f0
    Java_com_sun_media_sound_MidiOutDeviceProvider_nGetName130x18000166c
    Java_com_sun_media_sound_MidiOutDeviceProvider_nGetNumDevices140x1800016e8
    Java_com_sun_media_sound_MidiOutDeviceProvider_nGetVendor150x18000140c
    Java_com_sun_media_sound_MidiOutDeviceProvider_nGetVersion160x1800016f0
    Java_com_sun_media_sound_MidiOutDevice_nClose170x180001504
    Java_com_sun_media_sound_MidiOutDevice_nGetTimeStamp180x180001260
    Java_com_sun_media_sound_MidiOutDevice_nOpen190x18000150c
    Java_com_sun_media_sound_MidiOutDevice_nSendLongMessage200x180001558
    Java_com_sun_media_sound_MidiOutDevice_nSendShortMessage210x1800015e0
    Java_com_sun_media_sound_Platform_nGetExtraLibraries220x180003c48
    Java_com_sun_media_sound_Platform_nGetLibraryForFeature230x180003c5c
    Java_com_sun_media_sound_Platform_nIsBigEndian240x180003c80
    Java_com_sun_media_sound_Platform_nIsSigned8250x180003c88
    Java_com_sun_media_sound_PortMixerProvider_nGetNumDevices260x180004658
    Java_com_sun_media_sound_PortMixerProvider_nNewPortMixerInfo270x180004660
    Java_com_sun_media_sound_PortMixer_nClose280x18000405c
    Java_com_sun_media_sound_PortMixer_nControlGetFloatValue290x180004074
    Java_com_sun_media_sound_PortMixer_nControlGetIntValue300x180004090
    Java_com_sun_media_sound_PortMixer_nControlSetFloatValue310x1800040a8
    Java_com_sun_media_sound_PortMixer_nControlSetIntValue320x1800040c4
    Java_com_sun_media_sound_PortMixer_nGetControls330x1800040e0
    Java_com_sun_media_sound_PortMixer_nGetPortCount340x1800041c0
    Java_com_sun_media_sound_PortMixer_nGetPortName350x1800041d8
    Java_com_sun_media_sound_PortMixer_nGetPortType360x180004248
    Java_com_sun_media_sound_PortMixer_nOpen370x180004264
    TimestampSource PortDest PortSource IPDest IP
    Oct 2, 2024 18:46:51.670253992 CEST5359778162.159.36.2192.168.2.4
    Oct 2, 2024 18:46:52.363692045 CEST5166353192.168.2.41.1.1.1
    Oct 2, 2024 18:46:52.371179104 CEST53516631.1.1.1192.168.2.4
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Oct 2, 2024 18:46:52.363692045 CEST192.168.2.41.1.1.10x2f2eStandard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Oct 2, 2024 18:46:52.371179104 CEST1.1.1.1192.168.2.40x2f2eName error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:12:46:18
    Start date:02/10/2024
    Path:C:\Windows\System32\loaddll64.exe
    Wow64 process (32bit):false
    Commandline:loaddll64.exe "C:\Users\user\Desktop\file.dll"
    Imagebase:0x7ff725a60000
    File size:165'888 bytes
    MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:1
    Start time:12:46:18
    Start date:02/10/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:2
    Start time:12:46:18
    Start date:02/10/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1
    Imagebase:0x7ff6ce760000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:3
    Start time:12:46:18
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_media_sound_MidiInDeviceProvider_nGetDescription
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:4
    Start time:12:46:18
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",#1
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:8
    Start time:12:46:19
    Start date:02/10/2024
    Path:C:\Windows\System32\WerFault.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\WerFault.exe -u -p 6768 -s 356
    Imagebase:0x7ff79df30000
    File size:570'736 bytes
    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:9
    Start time:12:46:19
    Start date:02/10/2024
    Path:C:\Windows\System32\WerFault.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\WerFault.exe -u -p 6728 -s 356
    Imagebase:0x7ff79df30000
    File size:570'736 bytes
    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:10
    Start time:12:46:21
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_media_sound_MidiInDeviceProvider_nGetName
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:12
    Start time:12:46:22
    Start date:02/10/2024
    Path:C:\Windows\System32\WerFault.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\WerFault.exe -u -p 6036 -s 528
    Imagebase:0x7ff79df30000
    File size:570'736 bytes
    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:13
    Start time:12:46:24
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe C:\Users\user\Desktop\file.dll,Java_com_sun_media_sound_MidiInDeviceProvider_nGetNumDevices
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:14
    Start time:12:46:27
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiInDeviceProvider_nGetDescription
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:15
    Start time:12:46:27
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiInDeviceProvider_nGetName
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:16
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiInDeviceProvider_nGetNumDevices
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:17
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nOpen
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:18
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nGetPortType
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:20
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nGetPortName
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:21
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nGetPortCount
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:22
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nGetControls
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:23
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nControlSetIntValue
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:24
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nControlSetFloatValue
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:25
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nControlGetIntValue
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:26
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nControlGetFloatValue
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:27
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixer_nClose
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:28
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixerProvider_nNewPortMixerInfo
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:29
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_PortMixerProvider_nGetNumDevices
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:30
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_Platform_nIsSigned8
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:31
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_Platform_nIsBigEndian
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:32
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_Platform_nGetLibraryForFeature
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:33
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_Platform_nGetExtraLibraries
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:34
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nSendShortMessage
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:35
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nSendLongMessage
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:36
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nOpen
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:37
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nGetTimeStamp
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:39
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDevice_nClose
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:false

    Target ID:40
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDeviceProvider_nGetVersion
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:41
    Start time:12:46:28
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_com_sun_media_sound_MidiOutDeviceProvider_nGetVendor
    Imagebase:0x7ff620b60000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:7.5%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:1.7%
      Total number of Nodes:460
      Total number of Limit Nodes:2
      execution_graph 1473 7ffe148e405c 1474 7ffe148e406d 1473->1474 1475 7ffe148e4065 1473->1475 1477 7ffe148e263c 1475->1477 1478 7ffe148e2645 1477->1478 1479 7ffe148e26d1 1477->1479 1480 7ffe148e2655 mixerClose 1478->1480 1481 7ffe148e265f 1478->1481 1479->1474 1480->1481 1482 7ffe148e2668 free 1481->1482 1483 7ffe148e2673 1481->1483 1482->1483 1484 7ffe148e267c free 1483->1484 1485 7ffe148e2687 1483->1485 1484->1485 1486 7ffe148e269b 1485->1486 1487 7ffe148e2690 free 1485->1487 1488 7ffe148e26a4 free 1486->1488 1489 7ffe148e26af 1486->1489 1487->1486 1488->1489 1490 7ffe148e26b8 free 1489->1490 1491 7ffe148e26c3 free 1489->1491 1490->1491 1491->1479 1492 7ffe148e41d8 1493 7ffe148e421c 1492->1493 1494 7ffe148e4206 1492->1494 1496 7ffe148e4900 8 API calls 1493->1496 1498 7ffe148e2ad4 1494->1498 1497 7ffe148e423d 1496->1497 1499 7ffe148e2b2b 1498->1499 1500 7ffe148e2aeb 1498->1500 1499->1493 1500->1499 1501 7ffe148e2b0c strncpy 1500->1501 1501->1499 1502 7ffe148e1558 1503 7ffe148e1584 1502->1503 1504 7ffe148e15b3 1503->1504 1506 7ffe148e231c 1503->1506 1507 7ffe148e2367 1506->1507 1509 7ffe148e234c 1506->1509 1507->1504 1509->1507 1510 7ffe148e23c0 WaitForSingleObject 1509->1510 1511 7ffe148e23fd malloc 1509->1511 1512 7ffe148e240f memcpy midiOutPrepareHeader 1509->1512 1516 7ffe148e24a8 1509->1516 1510->1507 1510->1509 1511->1512 1513 7ffe148e2436 midiOutLongMsg 1512->1513 1514 7ffe148e2459 1512->1514 1513->1509 1513->1514 1515 7ffe148e24a8 2 API calls 1514->1515 1515->1507 1517 7ffe148e24c7 1516->1517 1518 7ffe148e24ce 1516->1518 1517->1509 1519 7ffe148e24ec 1518->1519 1520 7ffe148e24d8 midiOutUnprepareHeader 1518->1520 1519->1517 1521 7ffe148e24fd free 1519->1521 1520->1519 1521->1517 1522 7ffe148e12d0 1527 7ffe148e1e20 1522->1527 1525 7ffe148e12ec 1528 7ffe148e12e1 1527->1528 1529 7ffe148e1e32 1527->1529 1528->1525 1534 7ffe148e3d70 1528->1534 1529->1528 1538 7ffe148e3f74 1529->1538 1532 7ffe148e1e66 midiInStart 1544 7ffe148e3af0 1532->1544 1535 7ffe148e3d7d 1534->1535 1537 7ffe148e3d8c 1535->1537 1553 7ffe148e1c4c midiInGetErrorTextA 1535->1553 1537->1525 1539 7ffe148e3f79 1538->1539 1540 7ffe148e1e46 CreateEventA 1538->1540 1547 7ffe148e3adc 1539->1547 1540->1528 1540->1532 1545 7ffe148e3af5 timeGetTime 1544->1545 1546 7ffe148e3b0e 1544->1546 1545->1546 1546->1528 1548 7ffe148e3aeb 1547->1548 1549 7ffe148e3ae5 EnterCriticalSection 1547->1549 1550 7ffe148e3b10 1548->1550 1549->1548 1551 7ffe148e3b19 LeaveCriticalSection 1550->1551 1552 7ffe148e3b1f 1550->1552 1551->1552 1552->1540 1553->1537 1448 7ffe148e130c 1449 7ffe148e1344 1448->1449 1452 7ffe148e4900 1449->1452 1453 7ffe148e490a 1452->1453 1454 7ffe148e137d 1453->1454 1455 7ffe148e50ac IsProcessorFeaturePresent 1453->1455 1456 7ffe148e50c3 1455->1456 1461 7ffe148e5180 RtlCaptureContext 1456->1461 1462 7ffe148e519a RtlLookupFunctionEntry 1461->1462 1463 7ffe148e50d6 1462->1463 1464 7ffe148e51b0 RtlVirtualUnwind 1462->1464 1465 7ffe148e5078 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 1463->1465 1464->1462 1464->1463 1823 7ffe148e140c 1824 7ffe148e1444 1823->1824 1825 7ffe148e144b strcpy 1824->1825 1826 7ffe148e145c 1824->1826 1825->1826 1827 7ffe148e4900 8 API calls 1826->1827 1828 7ffe148e147d 1827->1828 1829 7ffe148e150c 1834 7ffe148e220c malloc 1829->1834 1833 7ffe148e1539 1835 7ffe148e2241 memset 1834->1835 1836 7ffe148e1528 1834->1836 1837 7ffe148e225c 1835->1837 1836->1833 1851 7ffe148e3da4 1836->1851 1838 7ffe148e226f CreateEventA 1837->1838 1839 7ffe148e2260 free 1837->1839 1840 7ffe148e2292 1838->1840 1841 7ffe148e229e midiOutOpen 1838->1841 1839->1836 1842 7ffe148e3c10 2 API calls 1840->1842 1843 7ffe148e22b7 1841->1843 1844 7ffe148e22c0 midiOutShortMsg 1841->1844 1845 7ffe148e2297 1842->1845 1843->1844 1846 7ffe148e22f9 timeBeginPeriod 1843->1846 1844->1846 1847 7ffe148e22d3 CloseHandle 1844->1847 1848 7ffe148e22e8 free 1845->1848 1850 7ffe148e3af0 timeGetTime 1846->1850 1849 7ffe148e3c10 2 API calls 1847->1849 1848->1836 1849->1848 1850->1836 1852 7ffe148e3db1 1851->1852 1853 7ffe148e3dc0 1852->1853 1855 7ffe148e21cc midiOutGetErrorTextA 1852->1855 1853->1833 1855->1853 1856 7ffe148e1388 1863 7ffe148e1b5c 1856->1863 1859 7ffe148e13c7 strcpy 1860 7ffe148e13d8 1859->1860 1861 7ffe148e4900 8 API calls 1860->1861 1862 7ffe148e13f9 1861->1862 1870 7ffe148e1954 midiInGetDevCapsA 1863->1870 1865 7ffe148e1b8a 1866 7ffe148e1bac 1865->1866 1867 7ffe148e1b8e strncpy 1865->1867 1868 7ffe148e4900 8 API calls 1866->1868 1867->1866 1869 7ffe148e13c0 1868->1869 1869->1859 1869->1860 1870->1865 1871 7ffe148e1488 1878 7ffe148e1bcc 1871->1878 1874 7ffe148e14c7 strcpy 1875 7ffe148e14d8 1874->1875 1876 7ffe148e4900 8 API calls 1875->1876 1877 7ffe148e14f9 1876->1877 1885 7ffe148e1954 midiInGetDevCapsA 1878->1885 1880 7ffe148e1c02 1881 7ffe148e1c29 1880->1881 1882 7ffe148e1f04 __stdio_common_vsprintf 1880->1882 1883 7ffe148e4900 8 API calls 1881->1883 1882->1881 1884 7ffe148e14c0 1883->1884 1884->1874 1884->1875 1885->1880 1554 7ffe148e40c4 1555 7ffe148e40cd 1554->1555 1556 7ffe148e40d8 1554->1556 1558 7ffe148e2f20 1555->1558 1559 7ffe148e2f3c 1558->1559 1566 7ffe148e2f4e 1558->1566 1560 7ffe148e2f66 1559->1560 1561 7ffe148e2f41 1559->1561 1562 7ffe148e2fac 1560->1562 1568 7ffe148e37d8 mixerGetControlDetailsA 1560->1568 1561->1562 1567 7ffe148e37d8 mixerGetControlDetailsA 1561->1567 1562->1556 1566->1562 1569 7ffe148e39b4 mixerSetControlDetails 1566->1569 1567->1566 1568->1566 1569->1562 1886 7ffe148e1504 1887 7ffe148e1f5c 1886->1887 1888 7ffe148e1f75 1887->1888 1889 7ffe148e1f8c SetEvent 1887->1889 1890 7ffe148e1f95 1887->1890 1889->1890 1891 7ffe148e1f9a timeEndPeriod midiOutReset 1890->1891 1892 7ffe148e1fb0 1890->1892 1891->1892 1893 7ffe148e1fc5 1892->1893 1895 7ffe148e1fb7 Sleep 1892->1895 1905 7ffe148e25c8 1893->1905 1895->1892 1897 7ffe148e1fd5 midiOutClose 1898 7ffe148e1fe1 1897->1898 1909 7ffe148e2528 1898->1909 1901 7ffe148e1ff7 1903 7ffe148e3c10 2 API calls 1901->1903 1902 7ffe148e1fee CloseHandle 1902->1901 1904 7ffe148e1fff free 1903->1904 1904->1888 1906 7ffe148e25e6 1905->1906 1908 7ffe148e1fcd 1905->1908 1907 7ffe148e2604 midiOutUnprepareHeader 1906->1907 1906->1908 1907->1906 1908->1897 1908->1898 1910 7ffe148e1fe9 1909->1910 1911 7ffe148e2541 1909->1911 1910->1901 1910->1902 1911->1910 1912 7ffe148e24a8 2 API calls 1911->1912 1912->1911 1913 7ffe148e1404 1914 7ffe148e1cd4 midiInGetNumDevs 1913->1914 1915 7ffe148e1304 1916 7ffe148e1e90 1915->1916 1917 7ffe148e1ee6 1916->1917 1918 7ffe148e1eb0 SetEvent midiInStop 1916->1918 1919 7ffe148e1ed3 1918->1919 1920 7ffe148e1ecb Sleep 1919->1920 1921 7ffe148e1ed9 CloseHandle 1919->1921 1920->1919 1921->1917 1466 7ffe148e1000 1469 7ffe148e176c InitializeCriticalSection CreateEventA CreateEventA 1466->1469 1468 7ffe148e1010 _onexit 1470 7ffe148e17b4 1469->1470 1471 7ffe148e17e0 1469->1471 1470->1471 1472 7ffe148e17bd CreateThread 1470->1472 1471->1468 1472->1471 1922 7ffe148e573d __scrt_dllmain_exception_filter 1570 7ffe148e127c 1575 7ffe148e1ce4 malloc 1570->1575 1573 7ffe148e12b3 1574 7ffe148e3d70 midiInGetErrorTextA 1574->1573 1576 7ffe148e1d10 1575->1576 1597 7ffe148e1298 1575->1597 1598 7ffe148e3cdc malloc 1576->1598 1579 7ffe148e1d39 free 1579->1597 1582 7ffe148e1d6d 1616 7ffe148e1980 EnterCriticalSection 1582->1616 1583 7ffe148e1d5f 1608 7ffe148e3d2c 1583->1608 1587 7ffe148e1d74 1588 7ffe148e1d94 1587->1588 1589 7ffe148e1d83 1587->1589 1624 7ffe148e3c10 1588->1624 1620 7ffe148e19f8 1589->1620 1594 7ffe148e3d2c 5 API calls 1596 7ffe148e1da8 free 1594->1596 1595 7ffe148e3af0 timeGetTime 1595->1597 1596->1597 1597->1573 1597->1574 1599 7ffe148e3d07 1598->1599 1600 7ffe148e1d28 1598->1600 1629 7ffe148e3a50 malloc InitializeCriticalSection 1599->1629 1600->1579 1602 7ffe148e3b30 malloc 1600->1602 1603 7ffe148e3b77 memset 1602->1603 1605 7ffe148e1d58 1602->1605 1604 7ffe148e3b96 1603->1604 1603->1605 1604->1605 1606 7ffe148e3b9a malloc 1604->1606 1605->1582 1605->1583 1606->1605 1607 7ffe148e3bb1 free 1606->1607 1607->1605 1609 7ffe148e3d31 1608->1609 1615 7ffe148e1d68 1608->1615 1610 7ffe148e3adc EnterCriticalSection 1609->1610 1611 7ffe148e3d49 free 1610->1611 1612 7ffe148e3b10 LeaveCriticalSection 1611->1612 1613 7ffe148e3d5a 1612->1613 1630 7ffe148e3a78 1613->1630 1615->1579 1617 7ffe148e19ad SetEvent WaitForSingleObject 1616->1617 1618 7ffe148e19a8 1616->1618 1619 7ffe148e19dd LeaveCriticalSection 1617->1619 1618->1619 1619->1587 1621 7ffe148e1a16 1620->1621 1622 7ffe148e1a63 1620->1622 1621->1622 1623 7ffe148e1a2a midiInPrepareHeader midiInAddBuffer 1621->1623 1622->1595 1623->1622 1623->1623 1625 7ffe148e1d9c 1624->1625 1626 7ffe148e3c1f 1624->1626 1625->1594 1627 7ffe148e3c39 free 1626->1627 1628 7ffe148e3c33 free 1626->1628 1627->1625 1628->1627 1629->1600 1631 7ffe148e3a7d DeleteCriticalSection free 1630->1631 1632 7ffe148e3a99 1630->1632 1631->1632 1632->1615 1923 7ffe148e5038 1924 7ffe148e5059 1923->1924 1925 7ffe148e5054 1923->1925 1927 7ffe148e54dc 1925->1927 1928 7ffe148e5573 1927->1928 1929 7ffe148e54ff GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 1927->1929 1928->1924 1929->1928 1633 7ffe148e18f4 1634 7ffe148e1932 WaitForSingleObject 1633->1634 1635 7ffe148e18fa midiInOpen SetEvent 1634->1635 1636 7ffe148e194e 1634->1636 1635->1634 1637 7ffe148e4074 1638 7ffe148e4088 1637->1638 1639 7ffe148e4080 1637->1639 1641 7ffe148e2924 1639->1641 1644 7ffe148e37d8 mixerGetControlDetailsA 1641->1644 1643 7ffe148e294c 1643->1638 1644->1643 1930 7ffe148e1834 1931 7ffe148e1848 1930->1931 1933 7ffe148e1852 1930->1933 1931->1933 1934 7ffe148e1893 1931->1934 1937 7ffe148e18b5 1931->1937 1932 7ffe148e188d 1933->1932 1941 7ffe148e3ebc 1933->1941 1934->1932 1935 7ffe148e1898 midiInAddBuffer 1934->1935 1935->1937 1937->1932 1947 7ffe148e3dd8 1937->1947 1939 7ffe148e1883 SetEvent 1939->1932 1942 7ffe148e3ee0 1941->1942 1946 7ffe148e3f55 1941->1946 1943 7ffe148e3adc EnterCriticalSection 1942->1943 1944 7ffe148e3ee8 1943->1944 1945 7ffe148e3b10 LeaveCriticalSection 1944->1945 1944->1946 1945->1946 1946->1939 1948 7ffe148e3e01 1947->1948 1950 7ffe148e18f0 1947->1950 1949 7ffe148e3adc EnterCriticalSection 1948->1949 1951 7ffe148e3e09 1949->1951 1950->1939 1951->1950 1952 7ffe148e3b10 LeaveCriticalSection 1951->1952 1952->1950 1645 7ffe148e15f0 1652 7ffe148e201c 1645->1652 1648 7ffe148e162f strcpy 1649 7ffe148e1640 1648->1649 1650 7ffe148e4900 8 API calls 1649->1650 1651 7ffe148e1661 1650->1651 1659 7ffe148e2588 midiOutGetDevCapsA 1652->1659 1654 7ffe148e4900 8 API calls 1657 7ffe148e1628 1654->1657 1655 7ffe148e204a 1656 7ffe148e20ac strncpy 1655->1656 1658 7ffe148e2071 1655->1658 1656->1658 1657->1648 1657->1649 1658->1654 1659->1655 1660 7ffe148e16f0 1667 7ffe148e2154 1660->1667 1663 7ffe148e172f strcpy 1664 7ffe148e1740 1663->1664 1665 7ffe148e4900 8 API calls 1664->1665 1666 7ffe148e1761 1665->1666 1674 7ffe148e2588 midiOutGetDevCapsA 1667->1674 1669 7ffe148e2182 1672 7ffe148e21a9 1669->1672 1675 7ffe148e1f04 1669->1675 1670 7ffe148e4900 8 API calls 1673 7ffe148e1728 1670->1673 1672->1670 1673->1663 1673->1664 1674->1669 1678 7ffe148e1efc 1675->1678 1677 7ffe148e1f29 __stdio_common_vsprintf 1677->1672 1678->1677 1679 7ffe148e17ec EnterCriticalSection 1680 7ffe148e1825 LeaveCriticalSection 1679->1680 1681 7ffe148e1804 SetEvent CloseHandle 1679->1681 1681->1680 1682 7ffe148e49ec 1683 7ffe148e4a10 __scrt_release_startup_lock 1682->1683 1684 7ffe148e5694 _seh_filter_dll 1683->1684 1685 7ffe148e166c 1692 7ffe148e20e4 1685->1692 1688 7ffe148e16ab strcpy 1689 7ffe148e16bc 1688->1689 1690 7ffe148e4900 8 API calls 1689->1690 1691 7ffe148e16dd 1690->1691 1699 7ffe148e2588 midiOutGetDevCapsA 1692->1699 1694 7ffe148e2112 1695 7ffe148e2116 strncpy 1694->1695 1696 7ffe148e2134 1694->1696 1695->1696 1697 7ffe148e4900 8 API calls 1696->1697 1698 7ffe148e16a4 1697->1698 1698->1688 1698->1689 1699->1694 1700 7ffe148e2b6c mixerOpen 1701 7ffe148e2ba6 malloc 1700->1701 1717 7ffe148e2b9f 1700->1717 1702 7ffe148e2d75 1701->1702 1703 7ffe148e2bc1 memset 1701->1703 1705 7ffe148e2e1d 1702->1705 1706 7ffe148e2e17 mixerClose 1702->1706 1702->1717 1720 7ffe148e3800 mixerGetDevCapsA 1703->1720 1708 7ffe148e263c 7 API calls 1705->1708 1706->1705 1708->1717 1709 7ffe148e2bff malloc 1710 7ffe148e2cbf 1709->1710 1719 7ffe148e2c21 1709->1719 1711 7ffe148e2cc4 malloc 1710->1711 1718 7ffe148e2ce2 1710->1718 1711->1718 1712 7ffe148e2d51 1712->1702 1714 7ffe148e2d5b malloc 1712->1714 1714->1702 1718->1712 1730 7ffe148e38e4 mixerGetLineInfoA 1718->1730 1719->1710 1723 7ffe148e38a4 mixerGetLineInfoA 1719->1723 1725 7ffe148e3928 1719->1725 1721 7ffe148e4900 8 API calls 1720->1721 1722 7ffe148e2bf4 1721->1722 1722->1709 1722->1719 1724 7ffe148e38cb 1723->1724 1724->1719 1732 7ffe148e3740 1725->1732 1727 7ffe148e39a5 1727->1719 1728 7ffe148e399f free 1728->1727 1731 7ffe148e390f 1730->1731 1731->1718 1733 7ffe148e37b2 1732->1733 1734 7ffe148e3760 malloc 1732->1734 1735 7ffe148e37bb free 1733->1735 1736 7ffe148e37c6 1733->1736 1734->1733 1737 7ffe148e3796 mixerGetLineControlsA 1734->1737 1735->1736 1736->1727 1736->1728 1737->1733 1737->1736 1738 7ffe148e16e8 1739 7ffe148e21f8 midiOutGetNumDevs 1738->1739 1953 7ffe148e1028 1959 7ffe148e1061 1953->1959 1955 7ffe148e1246 1956 7ffe148e1dc4 midiInAddBuffer EnterCriticalSection LeaveCriticalSection 1956->1959 1957 7ffe148e1177 memcpy 1960 7ffe148e1dc4 1957->1960 1959->1955 1959->1956 1959->1957 1966 7ffe148e1c78 1959->1966 1961 7ffe148e1dc9 1960->1961 1962 7ffe148e1e19 1960->1962 1961->1962 1963 7ffe148e1e0f 1961->1963 1964 7ffe148e1de9 midiInAddBuffer 1961->1964 1962->1959 1971 7ffe148e3ff8 1963->1971 1964->1963 1967 7ffe148e1cca 1966->1967 1968 7ffe148e1c86 1966->1968 1967->1959 1968->1967 1970 7ffe148e1ca0 WaitForSingleObject 1968->1970 1977 7ffe148e3fa4 1968->1977 1970->1967 1970->1968 1972 7ffe148e3ffd 1971->1972 1976 7ffe148e404e 1971->1976 1973 7ffe148e3adc EnterCriticalSection 1972->1973 1974 7ffe148e4014 1973->1974 1975 7ffe148e3b10 LeaveCriticalSection 1974->1975 1975->1976 1976->1962 1978 7ffe148e3fe7 1977->1978 1979 7ffe148e3fb8 1977->1979 1978->1968 1980 7ffe148e3adc EnterCriticalSection 1979->1980 1981 7ffe148e3fc0 1980->1981 1982 7ffe148e3b10 LeaveCriticalSection 1981->1982 1982->1978 1983 7ffe148e40a8 1984 7ffe148e40bc 1983->1984 1985 7ffe148e40b1 1983->1985 1987 7ffe148e2e40 1985->1987 1988 7ffe148e2e7b 1987->1988 1989 7ffe148e2e60 1987->1989 1992 7ffe148e2f13 1988->1992 1998 7ffe148e39b4 mixerSetControlDetails 1988->1998 1989->1988 1990 7ffe148e2e6a 1989->1990 1991 7ffe148e2eae 1989->1991 1990->1992 1996 7ffe148e37d8 mixerGetControlDetailsA 1990->1996 1997 7ffe148e37d8 mixerGetControlDetailsA 1991->1997 1992->1984 1996->1988 1997->1988 1998->1992 1740 7ffe148e15e0 1741 7ffe148e2490 1740->1741 1742 7ffe148e249b midiOutShortMsg 1741->1742 1743 7ffe148e2495 1741->1743 1744 7ffe148e40e0 1745 7ffe148e40e9 memset 1744->1745 1746 7ffe148e41a6 1744->1746 1747 7ffe148e4165 1745->1747 1747->1746 1749 7ffe148e26d4 1747->1749 1758 7ffe148e2702 1749->1758 1750 7ffe148e2905 1750->1746 1751 7ffe148e27d3 1751->1750 1752 7ffe148e27f4 malloc 1751->1752 1752->1750 1754 7ffe148e280e 1752->1754 1753 7ffe148e276c 1756 7ffe148e279d 1753->1756 1759 7ffe148e3684 4 API calls 1753->1759 1757 7ffe148e287f 1754->1757 1764 7ffe148e281a 1754->1764 1756->1750 1760 7ffe148e27ad malloc 1756->1760 1762 7ffe148e30c0 4 API calls 1757->1762 1758->1750 1758->1751 1758->1753 1771 7ffe148e3684 1758->1771 1759->1753 1760->1751 1761 7ffe148e27c2 malloc 1760->1761 1761->1751 1768 7ffe148e2896 1762->1768 1763 7ffe148e2848 1787 7ffe148e30c0 1763->1787 1764->1763 1776 7ffe148e3210 1764->1776 1767 7ffe148e28fc free 1767->1750 1768->1767 1770 7ffe148e30c0 4 API calls 1768->1770 1769 7ffe148e2862 1769->1767 1770->1768 1772 7ffe148e3740 3 API calls 1771->1772 1775 7ffe148e36a9 1772->1775 1773 7ffe148e3725 free 1774 7ffe148e372e 1773->1774 1774->1758 1775->1773 1775->1774 1777 7ffe148e3740 3 API calls 1776->1777 1786 7ffe148e3251 1777->1786 1778 7ffe148e3434 1779 7ffe148e3444 1778->1779 1780 7ffe148e343e free 1778->1780 1779->1763 1780->1779 1781 7ffe148e3426 1781->1778 1782 7ffe148e342b free 1781->1782 1782->1778 1783 7ffe148e3345 mixerGetControlDetailsA 1783->1786 1784 7ffe148e3327 malloc 1784->1778 1784->1783 1785 7ffe148e3316 free 1785->1784 1786->1778 1786->1781 1786->1783 1786->1784 1786->1785 1788 7ffe148e3740 3 API calls 1787->1788 1789 7ffe148e30fc 1788->1789 1790 7ffe148e31ea free 1789->1790 1791 7ffe148e31f0 1789->1791 1790->1791 1791->1769 1792 7ffe148e1260 1795 7ffe148e1cdc 1792->1795 1796 7ffe148e3a9c 1795->1796 1797 7ffe148e3ab0 timeGetTime 1796->1797 1798 7ffe148e126c 1796->1798 1797->1798 1799 7ffe148e4660 1802 7ffe148e469e 1799->1802 1800 7ffe148e4900 8 API calls 1801 7ffe148e479c 1800->1801 1804 7ffe148e46e0 1802->1804 1805 7ffe148e47b8 strcpy strcpy strcpy strcpy 1802->1805 1804->1800 1808 7ffe148e2a30 mixerGetDevCapsA 1805->1808 1809 7ffe148e2a60 strncpy 1808->1809 1811 7ffe148e2abe 1808->1811 1810 7ffe148e1f04 __stdio_common_vsprintf 1809->1810 1812 7ffe148e2a9d strncpy 1810->1812 1813 7ffe148e4900 8 API calls 1811->1813 1812->1811 1814 7ffe148e2acd 1813->1814 1814->1804 1999 7ffe148e1020 2000 7ffe148e1ae8 1999->2000 2001 7ffe148e1afa 2000->2001 2002 7ffe148e1b01 midiInReset 2000->2002 2009 7ffe148e1a80 2002->2009 2005 7ffe148e3c10 2 API calls 2007 7ffe148e1b29 2005->2007 2006 7ffe148e1b3c free 2006->2001 2007->2006 2008 7ffe148e3d2c 5 API calls 2007->2008 2008->2006 2010 7ffe148e1a99 2009->2010 2011 7ffe148e1ad0 midiInClose 2009->2011 2010->2011 2012 7ffe148e1aad midiInUnprepareHeader 2010->2012 2011->2005 2012->2011 2012->2012

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.1830523441.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000003.00000002.1830501865.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830544768.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830562821.00007FFE148E9000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830581694.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: Create$Event$CriticalInitializeSectionThread
      • String ID:
      • API String ID: 3438895259-0
      • Opcode ID: 2d6e4faee9e6a59898c1b5fa070b56048772e074198fbf9ad4f01bf78210a03c
      • Instruction ID: 8c296b29048ca6cdb685666cc3b024383b8a3462734b3a8635485046815cfc90
      • Opcode Fuzzy Hash: 2d6e4faee9e6a59898c1b5fa070b56048772e074198fbf9ad4f01bf78210a03c
      • Instruction Fuzzy Hash: 2501D632B14F2182FB648F72A485B2A73A1FB49B68F485038DE0E26764CF3CD059C700

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 7ffe148e4d08-7ffe148e4d0e 1 7ffe148e4d49-7ffe148e4d53 0->1 2 7ffe148e4d10-7ffe148e4d13 0->2 3 7ffe148e4e74-7ffe148e4e90 1->3 4 7ffe148e4d3d-7ffe148e4d7c call 7ffe148e4a90 2->4 5 7ffe148e4d15-7ffe148e4d18 2->5 8 7ffe148e4e92 3->8 9 7ffe148e4ea4-7ffe148e4ebf call 7ffe148e4924 3->9 23 7ffe148e4d96-7ffe148e4dab call 7ffe148e4924 4->23 24 7ffe148e4d7e 4->24 6 7ffe148e4d1a-7ffe148e4d1d 5->6 7 7ffe148e4d30 __scrt_dllmain_crt_thread_attach 5->7 11 7ffe148e4d29-7ffe148e4d2e call 7ffe148e49d4 6->11 12 7ffe148e4d1f-7ffe148e4d28 6->12 15 7ffe148e4d35-7ffe148e4d3c 7->15 13 7ffe148e4e94-7ffe148e4ea3 8->13 21 7ffe148e4ef6-7ffe148e4f28 call 7ffe148e538c 9->21 22 7ffe148e4ec1-7ffe148e4ef4 call 7ffe148e4a4c call 7ffe148e55bc call 7ffe148e5630 call 7ffe148e4a7c call 7ffe148e4c50 call 7ffe148e4c74 9->22 11->15 34 7ffe148e4f2a-7ffe148e4f30 21->34 35 7ffe148e4f39-7ffe148e4f3f 21->35 22->13 32 7ffe148e4e65-7ffe148e4e73 call 7ffe148e538c 23->32 33 7ffe148e4db1-7ffe148e4dc2 call 7ffe148e4994 23->33 27 7ffe148e4d80-7ffe148e4d95 24->27 32->3 51 7ffe148e4e13-7ffe148e4e1d call 7ffe148e4c50 33->51 52 7ffe148e4dc4-7ffe148e4de8 call 7ffe148e55f4 call 7ffe148e55ac call 7ffe148e55d0 call 7ffe148e56ca 33->52 34->35 38 7ffe148e4f32-7ffe148e4f34 34->38 39 7ffe148e4f86-7ffe148e4f9c call 7ffe148e5588 35->39 40 7ffe148e4f41-7ffe148e4f4b 35->40 45 7ffe148e5029-7ffe148e5036 38->45 56 7ffe148e4fd6-7ffe148e4fd8 39->56 57 7ffe148e4f9e-7ffe148e4fa0 39->57 46 7ffe148e4f4d-7ffe148e4f55 40->46 47 7ffe148e4f57-7ffe148e4f65 40->47 53 7ffe148e4f6b-7ffe148e4f73 call 7ffe148e4d08 46->53 47->53 68 7ffe148e501f-7ffe148e5027 47->68 51->24 70 7ffe148e4e23-7ffe148e4e2f call 7ffe148e55ec 51->70 52->51 100 7ffe148e4dea-7ffe148e4df1 __scrt_dllmain_after_initialize_c 52->100 62 7ffe148e4f78-7ffe148e4f80 53->62 66 7ffe148e4fda-7ffe148e4fdd 56->66 67 7ffe148e4fdf-7ffe148e4ff4 call 7ffe148e4d08 56->67 57->56 64 7ffe148e4fa2-7ffe148e4fc6 call 7ffe148e5588 call 7ffe148e4d08 57->64 62->39 62->68 64->56 94 7ffe148e4fc8-7ffe148e4fcd 64->94 66->67 66->68 67->68 81 7ffe148e4ff6-7ffe148e5000 67->81 68->45 89 7ffe148e4e55-7ffe148e4e60 70->89 90 7ffe148e4e31-7ffe148e4e3b call 7ffe148e4bb4 70->90 86 7ffe148e500b-7ffe148e501b 81->86 87 7ffe148e5002-7ffe148e5009 81->87 86->68 87->68 89->27 90->89 99 7ffe148e4e3d-7ffe148e4e4b 90->99 94->56 99->89 100->51 101 7ffe148e4df3-7ffe148e4e01 call 7ffe148e56c4 100->101 103 7ffe148e4e06-7ffe148e4e10 101->103 103->51
      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.1830523441.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000003.00000002.1830501865.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830544768.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830562821.00007FFE148E9000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830581694.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: Initialize__scrt_acquire_startup_lock__scrt_fastfail__scrt_release_startup_lock$__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_initialize_default_local_stdio_options__scrt_is_nonwritable_in_current_image__scrt_uninitialize_crt
      • String ID:
      • API String ID: 627783611-0
      • Opcode ID: 056d6750fde198f91544434d7cbc5cf67e40d8c08eda44e0ed4b27dfc17de77d
      • Instruction ID: 98acc305b200f7342822163641d9e01b323c3395413f09cbf90a2e9a9a72914c
      • Opcode Fuzzy Hash: 056d6750fde198f91544434d7cbc5cf67e40d8c08eda44e0ed4b27dfc17de77d
      • Instruction Fuzzy Hash: A7919421E08E4385FA50AB5B94C0279E691AF87BA0F5440B5FA0D777B7EE3CE44D8710
      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.1830523441.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000003.00000002.1830501865.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830544768.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830562821.00007FFE148E9000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830581694.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
      • String ID:
      • API String ID: 2933794660-0
      • Opcode ID: ec2b26dfd0f8d2385e38df15ba1bbdf8fa87fe85032632b51f52bfdc86b47aa3
      • Instruction ID: 7d34cce8dd01dc251d4bcce7b131e6edec79d3b1f0210638d06e1747a8dfd1a4
      • Opcode Fuzzy Hash: ec2b26dfd0f8d2385e38df15ba1bbdf8fa87fe85032632b51f52bfdc86b47aa3
      • Instruction Fuzzy Hash: 9E113C32A04F418AEB10DF62E8942A833A4FB1E76CF441A71FA5D567A4DF7CD1A88340

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.1830523441.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000003.00000002.1830501865.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830544768.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830562821.00007FFE148E9000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830581694.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: free$miditime$BeginCloseCreateEventHandleOpenPeriodShortTimemallocmemset
      • String ID:
      • API String ID: 2590383263-0
      • Opcode ID: 945e9617297c58ca91df0ca5ef4782bbb3c99100ad36cadd2da840e40240026d
      • Instruction ID: 9041818797d37102293e03e151b2338ebeadaebe99cda0fdd3da1073daa89bc3
      • Opcode Fuzzy Hash: 945e9617297c58ca91df0ca5ef4782bbb3c99100ad36cadd2da840e40240026d
      • Instruction Fuzzy Hash: ED312332B08D0186EB559B77D89037DA3A1BF86F68F504571EA0EA73B5DF3DD4498201

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 143 7ffe148e47b8-7ffe148e4828 strcpy * 4 call 7ffe148e2a30
      APIs
      • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,00007FFE148E46E0), ref: 00007FFE148E47D1
      • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,00007FFE148E46E0), ref: 00007FFE148E47E4
      • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,00007FFE148E46E0), ref: 00007FFE148E47F7
      • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,00007FFE148E46E0), ref: 00007FFE148E480A
        • Part of subcall function 00007FFE148E2A30: mixerGetDevCapsA.WINMM ref: 00007FFE148E2A56
        • Part of subcall function 00007FFE148E2A30: strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FFE148E2A6E
        • Part of subcall function 00007FFE148E2A30: strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FFE148E2AB1
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.1830523441.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000003.00000002.1830501865.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830544768.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830562821.00007FFE148E9000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830581694.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: strcpy$strncpy$Capsmixer
      • String ID: Port Mixer$Unknown Name$Unknown Vendor$Unknown Version
      • API String ID: 2021610734-787855941
      • Opcode ID: 3dc9912c8470f02887c426715371765667be574435991b21258d3838a1e6efa1
      • Instruction ID: 0bb33674494456fb916e43b8715ec21b7f21e347daa6d2ff19bd4f89c3fda262
      • Opcode Fuzzy Hash: 3dc9912c8470f02887c426715371765667be574435991b21258d3838a1e6efa1
      • Instruction Fuzzy Hash: DAF01DA1A18D42D5EB00AB26E8D11F8A321AB457E8FC55071F90D6A37AFE6CD98D8310

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 146 7ffe148e2b6c-7ffe148e2b9d mixerOpen 147 7ffe148e2ba6-7ffe148e2bbb malloc 146->147 148 7ffe148e2b9f-7ffe148e2ba1 146->148 150 7ffe148e2e0a-7ffe148e2e15 147->150 151 7ffe148e2bc1-7ffe148e2bfd memset call 7ffe148e3800 147->151 149 7ffe148e2e2b-7ffe148e2e3f 148->149 153 7ffe148e2e1d-7ffe148e2e25 call 7ffe148e263c 150->153 154 7ffe148e2e17 mixerClose 150->154 157 7ffe148e2bff-7ffe148e2c1b malloc 151->157 158 7ffe148e2c21-7ffe148e2c24 151->158 161 7ffe148e2e28 153->161 154->153 157->158 160 7ffe148e2cbf-7ffe148e2cc2 157->160 158->160 162 7ffe148e2c2a-7ffe148e2c30 158->162 163 7ffe148e2ce2-7ffe148e2ce4 160->163 164 7ffe148e2cc4-7ffe148e2cde malloc 160->164 161->149 162->160 165 7ffe148e2c36-7ffe148e2c56 call 7ffe148e38a4 162->165 166 7ffe148e2ce6-7ffe148e2cea 163->166 167 7ffe148e2d51-7ffe148e2d59 163->167 164->163 175 7ffe148e2c58-7ffe148e2c72 165->175 176 7ffe148e2cb3-7ffe148e2cb9 165->176 166->167 169 7ffe148e2cec-7ffe148e2cf5 166->169 171 7ffe148e2d5b-7ffe148e2d71 malloc 167->171 172 7ffe148e2d75-7ffe148e2d77 167->172 169->167 174 7ffe148e2cf7 169->174 171->172 172->150 173 7ffe148e2d7d-7ffe148e2d81 172->173 173->161 177 7ffe148e2d87-7ffe148e2d8f 173->177 178 7ffe148e2cfa-7ffe148e2d0d 174->178 179 7ffe148e2caa 175->179 180 7ffe148e2c74-7ffe148e2c77 175->180 176->160 176->165 182 7ffe148e2dbd-7ffe148e2dc0 177->182 183 7ffe148e2d91 177->183 184 7ffe148e2d0f-7ffe148e2d3d call 7ffe148e38e4 178->184 185 7ffe148e2d41-7ffe148e2d4f 178->185 181 7ffe148e2cad-7ffe148e2cb0 179->181 180->179 186 7ffe148e2c79-7ffe148e2c98 call 7ffe148e3928 180->186 181->176 182->161 188 7ffe148e2dc2-7ffe148e2dc6 182->188 187 7ffe148e2d94-7ffe148e2da4 183->187 198 7ffe148e2d3f 184->198 185->167 185->178 199 7ffe148e2c9a-7ffe148e2c9d 186->199 200 7ffe148e2ca5-7ffe148e2ca8 186->200 191 7ffe148e2da6-7ffe148e2db0 187->191 192 7ffe148e2db4-7ffe148e2dbb 187->192 193 7ffe148e2dc8-7ffe148e2dd1 188->193 194 7ffe148e2dd5-7ffe148e2dd9 188->194 191->192 192->182 192->187 193->194 194->161 197 7ffe148e2ddb-7ffe148e2dde 194->197 201 7ffe148e2de2-7ffe148e2e06 197->201 198->185 199->200 200->181 201->201 202 7ffe148e2e08 201->202 202->161
      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.1830523441.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000003.00000002.1830501865.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830544768.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830562821.00007FFE148E9000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830581694.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: malloc$Openmemsetmixer
      • String ID:
      • API String ID: 1988068089-0
      • Opcode ID: cc1c8c35fa98a414bdaa0c1274cb246fb05c3c6c73e8c2b23607ebc6ae49bf57
      • Instruction ID: f35c637707dfed6c6b7bda82ceeb2e4ff7991988c1d2b316cb13bf7e40a2f4bb
      • Opcode Fuzzy Hash: cc1c8c35fa98a414bdaa0c1274cb246fb05c3c6c73e8c2b23607ebc6ae49bf57
      • Instruction Fuzzy Hash: A881C332B09A568BEB648F17D5C0639B3A4FB4A7A0F058079EF4D577A1DF38E4698700

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.1830523441.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000003.00000002.1830501865.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830544768.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830562821.00007FFE148E9000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830581694.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: Closemidi$EventHandlePeriodResetfreetime
      • String ID:
      • API String ID: 4260093607-0
      • Opcode ID: a64e8874b6a4a95fdd145370a625b989496fed7616c63c101e1f462bd18a23de
      • Instruction ID: fe167d320902941e47bab336724c98e33e7847ab30f334a7d50467c2f8fe9377
      • Opcode Fuzzy Hash: a64e8874b6a4a95fdd145370a625b989496fed7616c63c101e1f462bd18a23de
      • Instruction Fuzzy Hash: 0B216021A09E1282EB55AB67959437CE261AF46FB4F5401B0FD0F777B5CF2CE8498380

      Control-flow Graph

      APIs
        • Part of subcall function 00007FFE148E2588: midiOutGetDevCapsA.WINMM(?,?,00000000,00007FFE148E204A), ref: 00007FFE148E25AB
      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FFE148E20B7
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.1830523441.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000003.00000002.1830501865.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830544768.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830562821.00007FFE148E9000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830581694.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: Capsmidistrncpy
      • String ID: External MIDI Port$Internal FM synthesizer$Internal software synthesizer$Internal square wave synthesizer$Internal synthesizer (generic)$Windows MIDI_MAPPER
      • API String ID: 3583098728-2504388736
      • Opcode ID: 221c7e629a388342e26d320d1552fcd47e950c4bc25ef6db77434b5fe321584b
      • Instruction ID: bdc1fbbb9a983869310127fb1c89b7acbf5a5a19379209a49830aceb430a8193
      • Opcode Fuzzy Hash: 221c7e629a388342e26d320d1552fcd47e950c4bc25ef6db77434b5fe321584b
      • Instruction Fuzzy Hash: 38218371A0CD4689E668AB2BA4D4179E290FF07764F8401B1F54D267F8DE6CE50DC700

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.1830523441.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000003.00000002.1830501865.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830544768.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830562821.00007FFE148E9000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830581694.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: free$Closemixer
      • String ID:
      • API String ID: 2973367850-0
      • Opcode ID: 692f0a99281a7137dfa7e55764cd08bd225a13e8381d8c5b2433a07698cb640d
      • Instruction ID: e21322c6dd39574275cda3c3c3bf4dc21f45cc5f5ed1dac742be0876c1e3c277
      • Opcode Fuzzy Hash: 692f0a99281a7137dfa7e55764cd08bd225a13e8381d8c5b2433a07698cb640d
      • Instruction Fuzzy Hash: AD110C22616E02CBFF999F62D4A53396360FF46F68F0407B4DD1E2A279CF6D90588344

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.1830523441.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000003.00000002.1830501865.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830544768.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830562821.00007FFE148E9000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830581694.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: strncpy$Caps__stdio_common_vsprintfmixer
      • String ID: %d.%d$Port Mixer
      • API String ID: 1905600244-759074455
      • Opcode ID: 638478c3bb0501f0c30af9271e43d8f77b2d48eee092dee1e959d37d8bf64e07
      • Instruction ID: 382479b42c4fd846e45bab62c5c47f1524578fc8e7f1b6b840a803b46ca6baa5
      • Opcode Fuzzy Hash: 638478c3bb0501f0c30af9271e43d8f77b2d48eee092dee1e959d37d8bf64e07
      • Instruction Fuzzy Hash: DA01F120718E4185FB60DB26E8807A9A350EB4ABB8F800175E94D67775EF6CD28CCB00

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 270 7ffe148e3210-7ffe148e3253 call 7ffe148e3740 273 7ffe148e3259-7ffe148e325f 270->273 274 7ffe148e3434-7ffe148e343c 270->274 273->274 277 7ffe148e3265 273->277 275 7ffe148e3444-7ffe148e3461 274->275 276 7ffe148e343e free 274->276 276->275 278 7ffe148e326d-7ffe148e3289 277->278 279 7ffe148e341a-7ffe148e3420 278->279 280 7ffe148e328f-7ffe148e3294 278->280 279->278 282 7ffe148e3426-7ffe148e3429 279->282 280->279 281 7ffe148e329a-7ffe148e32a1 280->281 281->282 283 7ffe148e32a7-7ffe148e3304 281->283 282->274 284 7ffe148e342b-7ffe148e342e free 282->284 285 7ffe148e330b-7ffe148e3314 283->285 286 7ffe148e3306-7ffe148e3309 283->286 284->274 288 7ffe148e3327-7ffe148e333f malloc 285->288 289 7ffe148e3316-7ffe148e3323 free 285->289 286->285 287 7ffe148e3345-7ffe148e335e mixerGetControlDetailsA 286->287 287->279 290 7ffe148e3364-7ffe148e336f 287->290 288->274 288->287 289->288 290->279 291 7ffe148e3375-7ffe148e3383 290->291 292 7ffe148e3392-7ffe148e33a5 291->292 293 7ffe148e3385-7ffe148e338b 291->293 295 7ffe148e33a7-7ffe148e33af 292->295 296 7ffe148e33d5-7ffe148e33da 292->296 293->291 294 7ffe148e338d 293->294 294->279 297 7ffe148e33b3-7ffe148e33b6 295->297 298 7ffe148e33dc-7ffe148e33f0 296->298 299 7ffe148e33f3-7ffe148e3417 296->299 300 7ffe148e33c8-7ffe148e33d1 297->300 301 7ffe148e33b8-7ffe148e33c4 297->301 298->299 299->279 300->296 301->297 302 7ffe148e33c6 301->302 302->296
      APIs
        • Part of subcall function 00007FFE148E3740: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FFE148E30FC,?,?,?,?,?,00000000,?,?,00000000,00007FFE148E2896), ref: 00007FFE148E3787
        • Part of subcall function 00007FFE148E3740: mixerGetLineControlsA.WINMM(?,?,00000000,00007FFE148E30FC,?,?,?,?,?,00000000,?,?,00000000,00007FFE148E2896), ref: 00007FFE148E37A2
        • Part of subcall function 00007FFE148E3740: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FFE148E30FC,?,?,?,?,?,00000000,?,?,00000000,00007FFE148E2896), ref: 00007FFE148E37BB
      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,?,00000000,00007FFE148E2848), ref: 00007FFE148E3319
      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,?,00000000,00007FFE148E2848), ref: 00007FFE148E3333
      • mixerGetControlDetailsA.WINMM(?,?,?,00000000,?,?,00000000,00007FFE148E2848), ref: 00007FFE148E3356
      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,?,00000000,00007FFE148E2848), ref: 00007FFE148E342E
      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,?,00000000,00007FFE148E2848), ref: 00007FFE148E343E
      Memory Dump Source
      • Source File: 00000003.00000002.1830523441.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000003.00000002.1830501865.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830544768.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830562821.00007FFE148E9000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830581694.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: free$mallocmixer$ControlControlsDetailsLine
      • String ID:
      • API String ID: 3737986393-0
      • Opcode ID: d8efb86b7dd2b432c8e2cfd059ba62d7b5b365b5530eefed140476b1a40f7b3c
      • Instruction ID: 36c3a5a9e9c726af4e06a01bda888584b126e2c0b40cbe23c795752b63c64aa2
      • Opcode Fuzzy Hash: d8efb86b7dd2b432c8e2cfd059ba62d7b5b365b5530eefed140476b1a40f7b3c
      • Instruction Fuzzy Hash: 0F61C132A15E05C7EB54CF16E188A6CB3A5F745BA4F028275EE6E53750CF38D85ACB00

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 304 7ffe148e1028-7ffe148e105c 305 7ffe148e1235-7ffe148e1240 call 7ffe148e1c78 304->305 308 7ffe148e1246-7ffe148e125d 305->308 309 7ffe148e1061-7ffe148e1064 305->309 310 7ffe148e1066-7ffe148e1069 309->310 311 7ffe148e106f-7ffe148e1072 309->311 310->311 313 7ffe148e10fe-7ffe148e1103 310->313 311->308 312 7ffe148e1078-7ffe148e107b 311->312 314 7ffe148e107d-7ffe148e1092 312->314 315 7ffe148e1098-7ffe148e109b 312->315 316 7ffe148e11ed-7ffe148e1220 call 7ffe148e1dc4 313->316 317 7ffe148e1109-7ffe148e110c 313->317 314->308 314->315 318 7ffe148e109d-7ffe148e10c1 315->318 319 7ffe148e10c7-7ffe148e10ca 315->319 331 7ffe148e1232 316->331 321 7ffe148e111e-7ffe148e112f 317->321 322 7ffe148e110e-7ffe148e1119 call 7ffe148e1dc4 317->322 318->308 318->319 319->313 327 7ffe148e10cc-7ffe148e10f8 319->327 323 7ffe148e113a-7ffe148e1152 321->323 324 7ffe148e1131-7ffe148e1137 321->324 322->331 335 7ffe148e1158-7ffe148e1171 323->335 336 7ffe148e1222 323->336 324->323 327->308 327->313 331->305 335->336 339 7ffe148e1177-7ffe148e1196 memcpy call 7ffe148e1dc4 335->339 337 7ffe148e122a 336->337 337->331 342 7ffe148e119b-7ffe148e11eb 339->342 343 7ffe148e1198 339->343 342->337 343->342
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.1830523441.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000003.00000002.1830501865.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830544768.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830562821.00007FFE148E9000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830581694.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: (IJ)V$([BJ)V$callbackLongMessage$callbackShortMessage
      • API String ID: 0-1382956355
      • Opcode ID: 9740e262f438b8789765806ab3d1a4793e7526eec3d699e3b6ff1aa7cec5647e
      • Instruction ID: 9b6f00b0be06e78112aeaea999b8708d75464bd647045612dd5994d6f6d32d34
      • Opcode Fuzzy Hash: 9740e262f438b8789765806ab3d1a4793e7526eec3d699e3b6ff1aa7cec5647e
      • Instruction Fuzzy Hash: 0551A222709B8281DE65CF57A8842EAA3A0BB4AFE4F488475EE4D57795DF3CD449C300

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.1830523441.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000003.00000002.1830501865.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830544768.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830562821.00007FFE148E9000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830581694.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: ObjectSingleWait
      • String ID:
      • API String ID: 24740636-0
      • Opcode ID: c9d313e7c698d3566f5dc1283f0417070d3359aebace9fa7ce44f85a5276fa02
      • Instruction ID: e6b9a69f4540aa5f3ff2d72ab3dd4f2c8cc1bc5cb5351eb890183c050184357d
      • Opcode Fuzzy Hash: c9d313e7c698d3566f5dc1283f0417070d3359aebace9fa7ce44f85a5276fa02
      • Instruction Fuzzy Hash: 23419361B08F4289EA559F1BD480639F390AF42BA8F444075EE1D677B5DF3CE4498741

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.1830523441.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000003.00000002.1830501865.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830544768.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830562821.00007FFE148E9000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830581694.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: EventObjectOpenSingleWaitmidi
      • String ID:
      • API String ID: 138987089-3916222277
      • Opcode ID: 7b7b3c597a58e9689a5a5c5c2162efbfd450136cc459206a8b635f7251b97114
      • Instruction ID: 95331268c4a4bce3a737ffec349897d8f627a319b686aaadfd9f2197ad7370ba
      • Opcode Fuzzy Hash: 7b7b3c597a58e9689a5a5c5c2162efbfd450136cc459206a8b635f7251b97114
      • Instruction Fuzzy Hash: 4EF07464E09E5686E650EB23E8C52B4A7A0BF8A774F8402B1E85D72374DF7CA14D8600
      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.1830523441.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000003.00000002.1830501865.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830544768.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830562821.00007FFE148E9000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830581694.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: CloseEventHandleSleepStopmidi
      • String ID:
      • API String ID: 1174883558-0
      • Opcode ID: f3e5014b63227229b6ed0e3c007381763114db1586378116d4d25922b4a24012
      • Instruction ID: 9ac25670dcc7437686dd20d01834f24c726c9947a3a7ccafa57e9489118b984c
      • Opcode Fuzzy Hash: f3e5014b63227229b6ed0e3c007381763114db1586378116d4d25922b4a24012
      • Instruction Fuzzy Hash: 51016D21E0CE4282EA148B67A58037DA260AF49BE8F5405B4F91F27764CF2DD4498340
      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.1830523441.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000003.00000002.1830501865.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830544768.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830562821.00007FFE148E9000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830581694.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: CriticalSection$EnterEventLeaveObjectSingleWait
      • String ID:
      • API String ID: 4060455350-0
      • Opcode ID: 1019184f23986758b620619342492000e281c04926bf23f0575fc198d43bd14f
      • Instruction ID: 9d53c97f4a0ef3084ff76ee13dfd2e666a16f67c62a00c7d7a70a69127d6b1ec
      • Opcode Fuzzy Hash: 1019184f23986758b620619342492000e281c04926bf23f0575fc198d43bd14f
      • Instruction Fuzzy Hash: 7601A461A08E4682EB10EB17F8C01A4B3A0BF8A774B9840B5E95E62370DE7CA54DC600
      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.1830523441.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000003.00000002.1830501865.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830544768.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830562821.00007FFE148E9000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830581694.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: malloc$free
      • String ID:
      • API String ID: 1480856625-0
      • Opcode ID: e8cfbd72491b04978ba1fcbb6a8aa8cf000ff66440e5cc8b578189279fa2b450
      • Instruction ID: 7160d4dd585b44e7ee227d0c83bfc17415daee82d440928d636eb2dd0512aa8f
      • Opcode Fuzzy Hash: e8cfbd72491b04978ba1fcbb6a8aa8cf000ff66440e5cc8b578189279fa2b450
      • Instruction Fuzzy Hash: 4F619132A05F118AEA60DF13A480969F7A4FB46BA8B011075FF9E27B65DF3CE1458700
      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.1830523441.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000003.00000002.1830501865.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830544768.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830562821.00007FFE148E9000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.1830581694.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: malloc$freememset
      • String ID:
      • API String ID: 2835137314-0
      • Opcode ID: e7459d6239be163082843d5e81bef50b6c3d63922d926c81a6253c073435e8d7
      • Instruction ID: 687c21e336cc3587714ec795705a36d7f3553b60db3c393cafd4730cc8b9c8c3
      • Opcode Fuzzy Hash: e7459d6239be163082843d5e81bef50b6c3d63922d926c81a6253c073435e8d7
      • Instruction Fuzzy Hash: DB218332B04B4681E7148F17E880169B6E5FF85F94B4984B5EE4E67774DF38E8558340

      Execution Graph

      Execution Coverage:7.5%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:0%
      Total number of Nodes:460
      Total number of Limit Nodes:2
      execution_graph 1475 7ffe148e405c 1476 7ffe148e406d 1475->1476 1477 7ffe148e4065 1475->1477 1479 7ffe148e263c 1477->1479 1480 7ffe148e2645 1479->1480 1481 7ffe148e26d1 1479->1481 1482 7ffe148e2655 mixerClose 1480->1482 1483 7ffe148e265f 1480->1483 1481->1476 1482->1483 1484 7ffe148e2668 free 1483->1484 1485 7ffe148e2673 1483->1485 1484->1485 1486 7ffe148e267c free 1485->1486 1487 7ffe148e2687 1485->1487 1486->1487 1488 7ffe148e269b 1487->1488 1489 7ffe148e2690 free 1487->1489 1490 7ffe148e26a4 free 1488->1490 1491 7ffe148e26af 1488->1491 1489->1488 1490->1491 1492 7ffe148e26b8 free 1491->1492 1493 7ffe148e26c3 free 1491->1493 1492->1493 1493->1481 1494 7ffe148e41d8 1495 7ffe148e421c 1494->1495 1496 7ffe148e4206 1494->1496 1498 7ffe148e4900 8 API calls 1495->1498 1500 7ffe148e2ad4 1496->1500 1499 7ffe148e423d 1498->1499 1501 7ffe148e2b2b 1500->1501 1502 7ffe148e2aeb 1500->1502 1501->1495 1502->1501 1503 7ffe148e2b0c strncpy 1502->1503 1503->1501 1504 7ffe148e1558 1505 7ffe148e1584 1504->1505 1506 7ffe148e15b3 1505->1506 1508 7ffe148e231c 1505->1508 1509 7ffe148e2367 1508->1509 1511 7ffe148e234c 1508->1511 1509->1506 1511->1509 1512 7ffe148e23c0 WaitForSingleObject 1511->1512 1513 7ffe148e23fd malloc 1511->1513 1514 7ffe148e240f memcpy midiOutPrepareHeader 1511->1514 1518 7ffe148e24a8 1511->1518 1512->1509 1512->1511 1513->1514 1515 7ffe148e2436 midiOutLongMsg 1514->1515 1516 7ffe148e2459 1514->1516 1515->1511 1515->1516 1517 7ffe148e24a8 2 API calls 1516->1517 1517->1509 1519 7ffe148e24c7 1518->1519 1520 7ffe148e24ce 1518->1520 1519->1511 1521 7ffe148e24ec 1520->1521 1522 7ffe148e24d8 midiOutUnprepareHeader 1520->1522 1521->1519 1523 7ffe148e24fd free 1521->1523 1522->1521 1523->1519 1524 7ffe148e12d0 1529 7ffe148e1e20 1524->1529 1527 7ffe148e12ec 1530 7ffe148e12e1 1529->1530 1531 7ffe148e1e32 1529->1531 1530->1527 1536 7ffe148e3d70 1530->1536 1531->1530 1540 7ffe148e3f74 1531->1540 1534 7ffe148e1e66 midiInStart 1546 7ffe148e3af0 1534->1546 1537 7ffe148e3d7d 1536->1537 1539 7ffe148e3d8c 1537->1539 1555 7ffe148e1c4c midiInGetErrorTextA 1537->1555 1539->1527 1541 7ffe148e3f79 1540->1541 1542 7ffe148e1e46 CreateEventA 1540->1542 1549 7ffe148e3adc 1541->1549 1542->1530 1542->1534 1547 7ffe148e3af5 timeGetTime 1546->1547 1548 7ffe148e3b0e 1546->1548 1547->1548 1548->1530 1550 7ffe148e3aeb 1549->1550 1551 7ffe148e3ae5 EnterCriticalSection 1549->1551 1552 7ffe148e3b10 1550->1552 1551->1550 1553 7ffe148e3b19 LeaveCriticalSection 1552->1553 1554 7ffe148e3b1f 1552->1554 1553->1554 1554->1542 1555->1539 1448 7ffe148e140c 1449 7ffe148e1444 1448->1449 1450 7ffe148e144b strcpy 1449->1450 1451 7ffe148e145c 1449->1451 1450->1451 1454 7ffe148e4900 1451->1454 1455 7ffe148e490a 1454->1455 1456 7ffe148e147d 1455->1456 1457 7ffe148e50ac IsProcessorFeaturePresent 1455->1457 1458 7ffe148e50c3 1457->1458 1463 7ffe148e5180 RtlCaptureContext 1458->1463 1464 7ffe148e519a RtlLookupFunctionEntry 1463->1464 1465 7ffe148e50d6 1464->1465 1466 7ffe148e51b0 RtlVirtualUnwind 1464->1466 1467 7ffe148e5078 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 1465->1467 1466->1464 1466->1465 1825 7ffe148e130c 1826 7ffe148e1344 1825->1826 1827 7ffe148e4900 8 API calls 1826->1827 1828 7ffe148e137d 1827->1828 1829 7ffe148e150c 1834 7ffe148e220c malloc 1829->1834 1833 7ffe148e1539 1835 7ffe148e2241 memset 1834->1835 1836 7ffe148e1528 1834->1836 1837 7ffe148e225c 1835->1837 1836->1833 1851 7ffe148e3da4 1836->1851 1838 7ffe148e226f CreateEventA 1837->1838 1839 7ffe148e2260 free 1837->1839 1840 7ffe148e2292 1838->1840 1841 7ffe148e229e midiOutOpen 1838->1841 1839->1836 1842 7ffe148e3c10 2 API calls 1840->1842 1843 7ffe148e22b7 1841->1843 1844 7ffe148e22c0 midiOutShortMsg 1841->1844 1845 7ffe148e2297 1842->1845 1843->1844 1846 7ffe148e22f9 timeBeginPeriod 1843->1846 1844->1846 1847 7ffe148e22d3 CloseHandle 1844->1847 1848 7ffe148e22e8 free 1845->1848 1850 7ffe148e3af0 timeGetTime 1846->1850 1849 7ffe148e3c10 2 API calls 1847->1849 1848->1836 1849->1848 1850->1836 1852 7ffe148e3db1 1851->1852 1853 7ffe148e3dc0 1852->1853 1855 7ffe148e21cc midiOutGetErrorTextA 1852->1855 1853->1833 1855->1853 1856 7ffe148e1388 1863 7ffe148e1b5c 1856->1863 1859 7ffe148e13c7 strcpy 1860 7ffe148e13d8 1859->1860 1861 7ffe148e4900 8 API calls 1860->1861 1862 7ffe148e13f9 1861->1862 1870 7ffe148e1954 midiInGetDevCapsA 1863->1870 1865 7ffe148e1b8a 1866 7ffe148e1bac 1865->1866 1867 7ffe148e1b8e strncpy 1865->1867 1868 7ffe148e4900 8 API calls 1866->1868 1867->1866 1869 7ffe148e13c0 1868->1869 1869->1859 1869->1860 1870->1865 1871 7ffe148e1488 1878 7ffe148e1bcc 1871->1878 1874 7ffe148e14c7 strcpy 1875 7ffe148e14d8 1874->1875 1876 7ffe148e4900 8 API calls 1875->1876 1877 7ffe148e14f9 1876->1877 1885 7ffe148e1954 midiInGetDevCapsA 1878->1885 1880 7ffe148e1c02 1881 7ffe148e1c29 1880->1881 1882 7ffe148e1f04 __stdio_common_vsprintf 1880->1882 1883 7ffe148e4900 8 API calls 1881->1883 1882->1881 1884 7ffe148e14c0 1883->1884 1884->1874 1884->1875 1885->1880 1556 7ffe148e40c4 1557 7ffe148e40cd 1556->1557 1558 7ffe148e40d8 1556->1558 1560 7ffe148e2f20 1557->1560 1561 7ffe148e2f3c 1560->1561 1568 7ffe148e2f4e 1560->1568 1562 7ffe148e2f66 1561->1562 1563 7ffe148e2f41 1561->1563 1564 7ffe148e2fac 1562->1564 1570 7ffe148e37d8 mixerGetControlDetailsA 1562->1570 1563->1564 1569 7ffe148e37d8 mixerGetControlDetailsA 1563->1569 1564->1558 1568->1564 1571 7ffe148e39b4 mixerSetControlDetails 1568->1571 1569->1568 1570->1568 1571->1564 1886 7ffe148e1504 1887 7ffe148e1f5c 1886->1887 1888 7ffe148e1f75 1887->1888 1889 7ffe148e1f8c SetEvent 1887->1889 1890 7ffe148e1f95 1887->1890 1889->1890 1891 7ffe148e1f9a timeEndPeriod midiOutReset 1890->1891 1892 7ffe148e1fb0 1890->1892 1891->1892 1893 7ffe148e1fc5 1892->1893 1895 7ffe148e1fb7 Sleep 1892->1895 1905 7ffe148e25c8 1893->1905 1895->1892 1897 7ffe148e1fd5 midiOutClose 1898 7ffe148e1fe1 1897->1898 1909 7ffe148e2528 1898->1909 1901 7ffe148e1ff7 1903 7ffe148e3c10 2 API calls 1901->1903 1902 7ffe148e1fee CloseHandle 1902->1901 1904 7ffe148e1fff free 1903->1904 1904->1888 1906 7ffe148e25e6 1905->1906 1908 7ffe148e1fcd 1905->1908 1907 7ffe148e2604 midiOutUnprepareHeader 1906->1907 1906->1908 1907->1906 1908->1897 1908->1898 1910 7ffe148e1fe9 1909->1910 1911 7ffe148e2541 1909->1911 1910->1901 1910->1902 1911->1910 1912 7ffe148e24a8 2 API calls 1911->1912 1912->1911 1913 7ffe148e1404 1914 7ffe148e1cd4 midiInGetNumDevs 1913->1914 1915 7ffe148e1304 1916 7ffe148e1e90 1915->1916 1917 7ffe148e1ee6 1916->1917 1918 7ffe148e1eb0 SetEvent midiInStop 1916->1918 1919 7ffe148e1ed3 1918->1919 1920 7ffe148e1ecb Sleep 1919->1920 1921 7ffe148e1ed9 CloseHandle 1919->1921 1920->1919 1921->1917 1468 7ffe148e1000 1471 7ffe148e176c InitializeCriticalSection CreateEventA CreateEventA 1468->1471 1470 7ffe148e1010 _onexit 1472 7ffe148e17b4 1471->1472 1473 7ffe148e17e0 1471->1473 1472->1473 1474 7ffe148e17bd CreateThread 1472->1474 1473->1470 1474->1473 1922 7ffe148e573d __scrt_dllmain_exception_filter 1572 7ffe148e127c 1577 7ffe148e1ce4 malloc 1572->1577 1575 7ffe148e12b3 1576 7ffe148e3d70 midiInGetErrorTextA 1576->1575 1578 7ffe148e1d10 1577->1578 1599 7ffe148e1298 1577->1599 1600 7ffe148e3cdc malloc 1578->1600 1581 7ffe148e1d39 free 1581->1599 1584 7ffe148e1d6d 1618 7ffe148e1980 EnterCriticalSection 1584->1618 1585 7ffe148e1d5f 1610 7ffe148e3d2c 1585->1610 1589 7ffe148e1d74 1590 7ffe148e1d94 1589->1590 1591 7ffe148e1d83 1589->1591 1626 7ffe148e3c10 1590->1626 1622 7ffe148e19f8 1591->1622 1596 7ffe148e3d2c 5 API calls 1598 7ffe148e1da8 free 1596->1598 1597 7ffe148e3af0 timeGetTime 1597->1599 1598->1599 1599->1575 1599->1576 1601 7ffe148e3d07 1600->1601 1602 7ffe148e1d28 1600->1602 1631 7ffe148e3a50 malloc InitializeCriticalSection 1601->1631 1602->1581 1604 7ffe148e3b30 malloc 1602->1604 1605 7ffe148e3b77 memset 1604->1605 1607 7ffe148e1d58 1604->1607 1606 7ffe148e3b96 1605->1606 1605->1607 1606->1607 1608 7ffe148e3b9a malloc 1606->1608 1607->1584 1607->1585 1608->1607 1609 7ffe148e3bb1 free 1608->1609 1609->1607 1611 7ffe148e3d31 1610->1611 1617 7ffe148e1d68 1610->1617 1612 7ffe148e3adc EnterCriticalSection 1611->1612 1613 7ffe148e3d49 free 1612->1613 1614 7ffe148e3b10 LeaveCriticalSection 1613->1614 1615 7ffe148e3d5a 1614->1615 1632 7ffe148e3a78 1615->1632 1617->1581 1619 7ffe148e19ad SetEvent WaitForSingleObject 1618->1619 1620 7ffe148e19a8 1618->1620 1621 7ffe148e19dd LeaveCriticalSection 1619->1621 1620->1621 1621->1589 1623 7ffe148e1a16 1622->1623 1624 7ffe148e1a63 1622->1624 1623->1624 1625 7ffe148e1a2a midiInPrepareHeader midiInAddBuffer 1623->1625 1624->1597 1625->1624 1625->1625 1627 7ffe148e1d9c 1626->1627 1628 7ffe148e3c1f 1626->1628 1627->1596 1629 7ffe148e3c39 free 1628->1629 1630 7ffe148e3c33 free 1628->1630 1629->1627 1630->1629 1631->1602 1633 7ffe148e3a7d DeleteCriticalSection free 1632->1633 1634 7ffe148e3a99 1632->1634 1633->1634 1634->1617 1923 7ffe148e5038 1924 7ffe148e5059 1923->1924 1925 7ffe148e5054 1923->1925 1927 7ffe148e54dc 1925->1927 1928 7ffe148e5573 1927->1928 1929 7ffe148e54ff GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 1927->1929 1928->1924 1929->1928 1635 7ffe148e18f4 1636 7ffe148e1932 WaitForSingleObject 1635->1636 1637 7ffe148e18fa midiInOpen SetEvent 1636->1637 1638 7ffe148e194e 1636->1638 1637->1636 1639 7ffe148e4074 1640 7ffe148e4088 1639->1640 1641 7ffe148e4080 1639->1641 1643 7ffe148e2924 1641->1643 1646 7ffe148e37d8 mixerGetControlDetailsA 1643->1646 1645 7ffe148e294c 1645->1640 1646->1645 1930 7ffe148e1834 1931 7ffe148e1848 1930->1931 1933 7ffe148e1852 1930->1933 1931->1933 1934 7ffe148e1893 1931->1934 1937 7ffe148e18b5 1931->1937 1932 7ffe148e188d 1933->1932 1941 7ffe148e3ebc 1933->1941 1934->1932 1935 7ffe148e1898 midiInAddBuffer 1934->1935 1935->1937 1937->1932 1947 7ffe148e3dd8 1937->1947 1939 7ffe148e1883 SetEvent 1939->1932 1942 7ffe148e3ee0 1941->1942 1946 7ffe148e3f55 1941->1946 1943 7ffe148e3adc EnterCriticalSection 1942->1943 1944 7ffe148e3ee8 1943->1944 1945 7ffe148e3b10 LeaveCriticalSection 1944->1945 1944->1946 1945->1946 1946->1939 1948 7ffe148e3e01 1947->1948 1950 7ffe148e18f0 1947->1950 1949 7ffe148e3adc EnterCriticalSection 1948->1949 1951 7ffe148e3e09 1949->1951 1950->1939 1951->1950 1952 7ffe148e3b10 LeaveCriticalSection 1951->1952 1952->1950 1647 7ffe148e15f0 1654 7ffe148e201c 1647->1654 1650 7ffe148e162f strcpy 1651 7ffe148e1640 1650->1651 1652 7ffe148e4900 8 API calls 1651->1652 1653 7ffe148e1661 1652->1653 1661 7ffe148e2588 midiOutGetDevCapsA 1654->1661 1656 7ffe148e4900 8 API calls 1659 7ffe148e1628 1656->1659 1657 7ffe148e204a 1658 7ffe148e20ac strncpy 1657->1658 1660 7ffe148e2071 1657->1660 1658->1660 1659->1650 1659->1651 1660->1656 1661->1657 1662 7ffe148e16f0 1669 7ffe148e2154 1662->1669 1665 7ffe148e172f strcpy 1666 7ffe148e1740 1665->1666 1667 7ffe148e4900 8 API calls 1666->1667 1668 7ffe148e1761 1667->1668 1676 7ffe148e2588 midiOutGetDevCapsA 1669->1676 1671 7ffe148e2182 1674 7ffe148e21a9 1671->1674 1677 7ffe148e1f04 1671->1677 1672 7ffe148e4900 8 API calls 1675 7ffe148e1728 1672->1675 1674->1672 1675->1665 1675->1666 1676->1671 1680 7ffe148e1efc 1677->1680 1679 7ffe148e1f29 __stdio_common_vsprintf 1679->1674 1680->1679 1681 7ffe148e17ec EnterCriticalSection 1682 7ffe148e1825 LeaveCriticalSection 1681->1682 1683 7ffe148e1804 SetEvent CloseHandle 1681->1683 1683->1682 1684 7ffe148e49ec 1685 7ffe148e4a10 __scrt_initialize_onexit_tables 1684->1685 1686 7ffe148e5694 _seh_filter_dll 1685->1686 1687 7ffe148e166c 1694 7ffe148e20e4 1687->1694 1690 7ffe148e16ab strcpy 1691 7ffe148e16bc 1690->1691 1692 7ffe148e4900 8 API calls 1691->1692 1693 7ffe148e16dd 1692->1693 1701 7ffe148e2588 midiOutGetDevCapsA 1694->1701 1696 7ffe148e2112 1697 7ffe148e2116 strncpy 1696->1697 1698 7ffe148e2134 1696->1698 1697->1698 1699 7ffe148e4900 8 API calls 1698->1699 1700 7ffe148e16a4 1699->1700 1700->1690 1700->1691 1701->1696 1702 7ffe148e2b6c mixerOpen 1703 7ffe148e2ba6 malloc 1702->1703 1719 7ffe148e2b9f 1702->1719 1704 7ffe148e2d75 1703->1704 1705 7ffe148e2bc1 memset 1703->1705 1707 7ffe148e2e1d 1704->1707 1708 7ffe148e2e17 mixerClose 1704->1708 1704->1719 1722 7ffe148e3800 mixerGetDevCapsA 1705->1722 1710 7ffe148e263c 7 API calls 1707->1710 1708->1707 1710->1719 1711 7ffe148e2bff malloc 1712 7ffe148e2cbf 1711->1712 1721 7ffe148e2c21 1711->1721 1713 7ffe148e2cc4 malloc 1712->1713 1720 7ffe148e2ce2 1712->1720 1713->1720 1714 7ffe148e2d51 1714->1704 1716 7ffe148e2d5b malloc 1714->1716 1716->1704 1720->1714 1732 7ffe148e38e4 mixerGetLineInfoA 1720->1732 1721->1712 1725 7ffe148e38a4 mixerGetLineInfoA 1721->1725 1727 7ffe148e3928 1721->1727 1723 7ffe148e4900 8 API calls 1722->1723 1724 7ffe148e2bf4 1723->1724 1724->1711 1724->1721 1726 7ffe148e38cb 1725->1726 1726->1721 1734 7ffe148e3740 1727->1734 1729 7ffe148e39a5 1729->1721 1730 7ffe148e399f free 1730->1729 1733 7ffe148e390f 1732->1733 1733->1720 1735 7ffe148e37b2 1734->1735 1736 7ffe148e3760 malloc 1734->1736 1737 7ffe148e37bb free 1735->1737 1738 7ffe148e37c6 1735->1738 1736->1735 1739 7ffe148e3796 mixerGetLineControlsA 1736->1739 1737->1738 1738->1729 1738->1730 1739->1735 1739->1738 1740 7ffe148e16e8 1741 7ffe148e21f8 midiOutGetNumDevs 1740->1741 1953 7ffe148e1028 1959 7ffe148e1061 1953->1959 1955 7ffe148e1246 1956 7ffe148e1dc4 midiInAddBuffer EnterCriticalSection LeaveCriticalSection 1956->1959 1957 7ffe148e1177 memcpy 1960 7ffe148e1dc4 1957->1960 1959->1955 1959->1956 1959->1957 1966 7ffe148e1c78 1959->1966 1961 7ffe148e1dc9 1960->1961 1962 7ffe148e1e19 1960->1962 1961->1962 1963 7ffe148e1e0f 1961->1963 1964 7ffe148e1de9 midiInAddBuffer 1961->1964 1962->1959 1971 7ffe148e3ff8 1963->1971 1964->1963 1967 7ffe148e1cca 1966->1967 1968 7ffe148e1c86 1966->1968 1967->1959 1968->1967 1970 7ffe148e1ca0 WaitForSingleObject 1968->1970 1977 7ffe148e3fa4 1968->1977 1970->1967 1970->1968 1972 7ffe148e3ffd 1971->1972 1976 7ffe148e404e 1971->1976 1973 7ffe148e3adc EnterCriticalSection 1972->1973 1974 7ffe148e4014 1973->1974 1975 7ffe148e3b10 LeaveCriticalSection 1974->1975 1975->1976 1976->1962 1978 7ffe148e3fe7 1977->1978 1979 7ffe148e3fb8 1977->1979 1978->1968 1980 7ffe148e3adc EnterCriticalSection 1979->1980 1981 7ffe148e3fc0 1980->1981 1982 7ffe148e3b10 LeaveCriticalSection 1981->1982 1982->1978 1983 7ffe148e40a8 1984 7ffe148e40bc 1983->1984 1985 7ffe148e40b1 1983->1985 1987 7ffe148e2e40 1985->1987 1988 7ffe148e2e7b 1987->1988 1989 7ffe148e2e60 1987->1989 1992 7ffe148e2f13 1988->1992 1998 7ffe148e39b4 mixerSetControlDetails 1988->1998 1989->1988 1990 7ffe148e2e6a 1989->1990 1991 7ffe148e2eae 1989->1991 1990->1992 1996 7ffe148e37d8 mixerGetControlDetailsA 1990->1996 1997 7ffe148e37d8 mixerGetControlDetailsA 1991->1997 1992->1984 1996->1988 1997->1988 1998->1992 1742 7ffe148e15e0 1743 7ffe148e2490 1742->1743 1744 7ffe148e249b midiOutShortMsg 1743->1744 1745 7ffe148e2495 1743->1745 1746 7ffe148e40e0 1747 7ffe148e40e9 memset 1746->1747 1748 7ffe148e41a6 1746->1748 1749 7ffe148e4165 1747->1749 1749->1748 1751 7ffe148e26d4 1749->1751 1760 7ffe148e2702 1751->1760 1752 7ffe148e2905 1752->1748 1753 7ffe148e27d3 1753->1752 1754 7ffe148e27f4 malloc 1753->1754 1754->1752 1756 7ffe148e280e 1754->1756 1755 7ffe148e276c 1758 7ffe148e279d 1755->1758 1761 7ffe148e3684 4 API calls 1755->1761 1759 7ffe148e287f 1756->1759 1766 7ffe148e281a 1756->1766 1758->1752 1762 7ffe148e27ad malloc 1758->1762 1764 7ffe148e30c0 4 API calls 1759->1764 1760->1752 1760->1753 1760->1755 1773 7ffe148e3684 1760->1773 1761->1755 1762->1753 1763 7ffe148e27c2 malloc 1762->1763 1763->1753 1770 7ffe148e2896 1764->1770 1765 7ffe148e2848 1789 7ffe148e30c0 1765->1789 1766->1765 1778 7ffe148e3210 1766->1778 1769 7ffe148e28fc free 1769->1752 1770->1769 1772 7ffe148e30c0 4 API calls 1770->1772 1771 7ffe148e2862 1771->1769 1772->1770 1774 7ffe148e3740 3 API calls 1773->1774 1777 7ffe148e36a9 1774->1777 1775 7ffe148e3725 free 1776 7ffe148e372e 1775->1776 1776->1760 1777->1775 1777->1776 1779 7ffe148e3740 3 API calls 1778->1779 1788 7ffe148e3251 1779->1788 1780 7ffe148e3434 1781 7ffe148e3444 1780->1781 1782 7ffe148e343e free 1780->1782 1781->1765 1782->1781 1783 7ffe148e3426 1783->1780 1784 7ffe148e342b free 1783->1784 1784->1780 1785 7ffe148e3345 mixerGetControlDetailsA 1785->1788 1786 7ffe148e3327 malloc 1786->1780 1786->1785 1787 7ffe148e3316 free 1787->1786 1788->1780 1788->1783 1788->1785 1788->1786 1788->1787 1790 7ffe148e3740 3 API calls 1789->1790 1791 7ffe148e30fc 1790->1791 1792 7ffe148e31ea free 1791->1792 1793 7ffe148e31f0 1791->1793 1792->1793 1793->1771 1794 7ffe148e1260 1797 7ffe148e1cdc 1794->1797 1798 7ffe148e3a9c 1797->1798 1799 7ffe148e3ab0 timeGetTime 1798->1799 1800 7ffe148e126c 1798->1800 1799->1800 1801 7ffe148e4660 1804 7ffe148e469e 1801->1804 1802 7ffe148e4900 8 API calls 1803 7ffe148e479c 1802->1803 1806 7ffe148e46e0 1804->1806 1807 7ffe148e47b8 strcpy strcpy strcpy strcpy 1804->1807 1806->1802 1810 7ffe148e2a30 mixerGetDevCapsA 1807->1810 1811 7ffe148e2a60 strncpy 1810->1811 1813 7ffe148e2abe 1810->1813 1812 7ffe148e1f04 __stdio_common_vsprintf 1811->1812 1814 7ffe148e2a9d strncpy 1812->1814 1815 7ffe148e4900 8 API calls 1813->1815 1814->1813 1816 7ffe148e2acd 1815->1816 1816->1806 1999 7ffe148e1020 2000 7ffe148e1ae8 1999->2000 2001 7ffe148e1afa 2000->2001 2002 7ffe148e1b01 midiInReset 2000->2002 2009 7ffe148e1a80 2002->2009 2005 7ffe148e3c10 2 API calls 2007 7ffe148e1b29 2005->2007 2006 7ffe148e1b3c free 2006->2001 2007->2006 2008 7ffe148e3d2c 5 API calls 2007->2008 2008->2006 2010 7ffe148e1a99 2009->2010 2011 7ffe148e1ad0 midiInClose 2009->2011 2010->2011 2012 7ffe148e1aad midiInUnprepareHeader 2010->2012 2011->2005 2012->2011 2012->2012

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000029.00000002.1779042863.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000029.00000002.1778998287.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779149265.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_41_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: Create$Event$CriticalInitializeSectionThread
      • String ID:
      • API String ID: 3438895259-0
      • Opcode ID: 2d6e4faee9e6a59898c1b5fa070b56048772e074198fbf9ad4f01bf78210a03c
      • Instruction ID: 8c296b29048ca6cdb685666cc3b024383b8a3462734b3a8635485046815cfc90
      • Opcode Fuzzy Hash: 2d6e4faee9e6a59898c1b5fa070b56048772e074198fbf9ad4f01bf78210a03c
      • Instruction Fuzzy Hash: 2501D632B14F2182FB648F72A485B2A73A1FB49B68F485038DE0E26764CF3CD059C700

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 7ffe148e4d08-7ffe148e4d0e 1 7ffe148e4d49-7ffe148e4d53 0->1 2 7ffe148e4d10-7ffe148e4d13 0->2 3 7ffe148e4e74-7ffe148e4e90 1->3 4 7ffe148e4d3d-7ffe148e4d7c call 7ffe148e4a90 2->4 5 7ffe148e4d15-7ffe148e4d18 2->5 8 7ffe148e4e92 3->8 9 7ffe148e4ea4-7ffe148e4ebf call 7ffe148e4924 3->9 23 7ffe148e4d96-7ffe148e4dab call 7ffe148e4924 4->23 24 7ffe148e4d7e 4->24 6 7ffe148e4d1a-7ffe148e4d1d 5->6 7 7ffe148e4d30 __scrt_dllmain_crt_thread_attach 5->7 11 7ffe148e4d29-7ffe148e4d2e call 7ffe148e49d4 6->11 12 7ffe148e4d1f-7ffe148e4d28 6->12 15 7ffe148e4d35-7ffe148e4d3c 7->15 13 7ffe148e4e94-7ffe148e4ea3 8->13 21 7ffe148e4ef6-7ffe148e4f28 call 7ffe148e538c 9->21 22 7ffe148e4ec1-7ffe148e4ef4 call 7ffe148e4a4c call 7ffe148e55bc call 7ffe148e5630 call 7ffe148e4a7c call 7ffe148e4c50 call 7ffe148e4c74 9->22 11->15 34 7ffe148e4f2a-7ffe148e4f30 21->34 35 7ffe148e4f39-7ffe148e4f3f 21->35 22->13 32 7ffe148e4e65-7ffe148e4e73 call 7ffe148e538c 23->32 33 7ffe148e4db1-7ffe148e4dc2 call 7ffe148e4994 23->33 27 7ffe148e4d80-7ffe148e4d95 24->27 32->3 51 7ffe148e4e13-7ffe148e4e1d call 7ffe148e4c50 33->51 52 7ffe148e4dc4-7ffe148e4de8 call 7ffe148e55f4 call 7ffe148e55ac call 7ffe148e55d0 call 7ffe148e56ca 33->52 34->35 38 7ffe148e4f32-7ffe148e4f34 34->38 39 7ffe148e4f86-7ffe148e4f9c call 7ffe148e5588 35->39 40 7ffe148e4f41-7ffe148e4f4b 35->40 45 7ffe148e5029-7ffe148e5036 38->45 56 7ffe148e4fd6-7ffe148e4fd8 39->56 57 7ffe148e4f9e-7ffe148e4fa0 39->57 46 7ffe148e4f4d-7ffe148e4f55 40->46 47 7ffe148e4f57-7ffe148e4f65 40->47 53 7ffe148e4f6b-7ffe148e4f73 call 7ffe148e4d08 46->53 47->53 68 7ffe148e501f-7ffe148e5027 47->68 51->24 70 7ffe148e4e23-7ffe148e4e2f call 7ffe148e55ec 51->70 52->51 100 7ffe148e4dea-7ffe148e4df1 __scrt_dllmain_after_initialize_c 52->100 62 7ffe148e4f78-7ffe148e4f80 53->62 66 7ffe148e4fda-7ffe148e4fdd 56->66 67 7ffe148e4fdf-7ffe148e4ff4 call 7ffe148e4d08 56->67 57->56 64 7ffe148e4fa2-7ffe148e4fc6 call 7ffe148e5588 call 7ffe148e4d08 57->64 62->39 62->68 64->56 94 7ffe148e4fc8-7ffe148e4fcd 64->94 66->67 66->68 67->68 81 7ffe148e4ff6-7ffe148e5000 67->81 68->45 89 7ffe148e4e55-7ffe148e4e60 70->89 90 7ffe148e4e31-7ffe148e4e3b call 7ffe148e4bb4 70->90 86 7ffe148e500b-7ffe148e501b 81->86 87 7ffe148e5002-7ffe148e5009 81->87 86->68 87->68 89->27 90->89 99 7ffe148e4e3d-7ffe148e4e4b 90->99 94->56 99->89 100->51 101 7ffe148e4df3-7ffe148e4e01 call 7ffe148e56c4 100->101 103 7ffe148e4e06-7ffe148e4e10 101->103 103->51
      APIs
      Memory Dump Source
      • Source File: 00000029.00000002.1779042863.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000029.00000002.1778998287.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779149265.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_41_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: Initialize__scrt_acquire_startup_lock__scrt_fastfail__scrt_release_startup_lock$__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_initialize_default_local_stdio_options__scrt_is_nonwritable_in_current_image__scrt_uninitialize_crt
      • String ID:
      • API String ID: 627783611-0
      • Opcode ID: 056d6750fde198f91544434d7cbc5cf67e40d8c08eda44e0ed4b27dfc17de77d
      • Instruction ID: 98acc305b200f7342822163641d9e01b323c3395413f09cbf90a2e9a9a72914c
      • Opcode Fuzzy Hash: 056d6750fde198f91544434d7cbc5cf67e40d8c08eda44e0ed4b27dfc17de77d
      • Instruction Fuzzy Hash: A7919421E08E4385FA50AB5B94C0279E691AF87BA0F5440B5FA0D777B7EE3CE44D8710

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000029.00000002.1779042863.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000029.00000002.1778998287.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779149265.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_41_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: strcpy
      • String ID: Unknown vendor
      • API String ID: 3177657795-662083392
      • Opcode ID: 3c71d81168211033c740c9c08d3c94051b409b15d84bfb2e5dbf3034804f12cc
      • Instruction ID: ae0daf717c527defaa890f483d4cad8bae0e61e73bbd43d7407528d874fb58cb
      • Opcode Fuzzy Hash: 3c71d81168211033c740c9c08d3c94051b409b15d84bfb2e5dbf3034804f12cc
      • Instruction Fuzzy Hash: 00F06261708AC581EF709725F4913AAA351FB8A798F841171E98C177A6DF6CD10CCB00

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000029.00000002.1779042863.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000029.00000002.1778998287.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779149265.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_41_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: free$miditime$BeginCloseCreateEventHandleOpenPeriodShortTimemallocmemset
      • String ID:
      • API String ID: 2590383263-0
      • Opcode ID: 945e9617297c58ca91df0ca5ef4782bbb3c99100ad36cadd2da840e40240026d
      • Instruction ID: 9041818797d37102293e03e151b2338ebeadaebe99cda0fdd3da1073daa89bc3
      • Opcode Fuzzy Hash: 945e9617297c58ca91df0ca5ef4782bbb3c99100ad36cadd2da840e40240026d
      • Instruction Fuzzy Hash: ED312332B08D0186EB559B77D89037DA3A1BF86F68F504571EA0EA73B5DF3DD4498201

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 142 7ffe148e47b8-7ffe148e4828 strcpy * 4 call 7ffe148e2a30
      APIs
      • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,00007FFE148E46E0), ref: 00007FFE148E47D1
      • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,00007FFE148E46E0), ref: 00007FFE148E47E4
      • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,00007FFE148E46E0), ref: 00007FFE148E47F7
      • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,00007FFE148E46E0), ref: 00007FFE148E480A
        • Part of subcall function 00007FFE148E2A30: mixerGetDevCapsA.WINMM ref: 00007FFE148E2A56
        • Part of subcall function 00007FFE148E2A30: strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FFE148E2A6E
        • Part of subcall function 00007FFE148E2A30: strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FFE148E2AB1
      Strings
      Memory Dump Source
      • Source File: 00000029.00000002.1779042863.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000029.00000002.1778998287.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779149265.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_41_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: strcpy$strncpy$Capsmixer
      • String ID: Port Mixer$Unknown Name$Unknown Vendor$Unknown Version
      • API String ID: 2021610734-787855941
      • Opcode ID: 567ad1e4a81e3fd545a5c905159ce633e43216f62c34595b4ed6e4e0e1358763
      • Instruction ID: 0bb33674494456fb916e43b8715ec21b7f21e347daa6d2ff19bd4f89c3fda262
      • Opcode Fuzzy Hash: 567ad1e4a81e3fd545a5c905159ce633e43216f62c34595b4ed6e4e0e1358763
      • Instruction Fuzzy Hash: DAF01DA1A18D42D5EB00AB26E8D11F8A321AB457E8FC55071F90D6A37AFE6CD98D8310

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 145 7ffe148e2b6c-7ffe148e2b9d mixerOpen 146 7ffe148e2ba6-7ffe148e2bbb malloc 145->146 147 7ffe148e2b9f-7ffe148e2ba1 145->147 149 7ffe148e2e0a-7ffe148e2e15 146->149 150 7ffe148e2bc1-7ffe148e2bfd memset call 7ffe148e3800 146->150 148 7ffe148e2e2b-7ffe148e2e3f 147->148 152 7ffe148e2e1d-7ffe148e2e25 call 7ffe148e263c 149->152 153 7ffe148e2e17 mixerClose 149->153 156 7ffe148e2bff-7ffe148e2c1b malloc 150->156 157 7ffe148e2c21-7ffe148e2c24 150->157 160 7ffe148e2e28 152->160 153->152 156->157 159 7ffe148e2cbf-7ffe148e2cc2 156->159 157->159 161 7ffe148e2c2a-7ffe148e2c30 157->161 162 7ffe148e2ce2-7ffe148e2ce4 159->162 163 7ffe148e2cc4-7ffe148e2cde malloc 159->163 160->148 161->159 164 7ffe148e2c36-7ffe148e2c56 call 7ffe148e38a4 161->164 165 7ffe148e2ce6-7ffe148e2cea 162->165 166 7ffe148e2d51-7ffe148e2d59 162->166 163->162 174 7ffe148e2c58-7ffe148e2c72 164->174 175 7ffe148e2cb3-7ffe148e2cb9 164->175 165->166 168 7ffe148e2cec-7ffe148e2cf5 165->168 170 7ffe148e2d5b-7ffe148e2d71 malloc 166->170 171 7ffe148e2d75-7ffe148e2d77 166->171 168->166 173 7ffe148e2cf7 168->173 170->171 171->149 172 7ffe148e2d7d-7ffe148e2d81 171->172 172->160 176 7ffe148e2d87-7ffe148e2d8f 172->176 177 7ffe148e2cfa-7ffe148e2d0d 173->177 178 7ffe148e2caa 174->178 179 7ffe148e2c74-7ffe148e2c77 174->179 175->159 175->164 181 7ffe148e2dbd-7ffe148e2dc0 176->181 182 7ffe148e2d91 176->182 183 7ffe148e2d0f-7ffe148e2d3d call 7ffe148e38e4 177->183 184 7ffe148e2d41-7ffe148e2d4f 177->184 180 7ffe148e2cad-7ffe148e2cb0 178->180 179->178 185 7ffe148e2c79-7ffe148e2c98 call 7ffe148e3928 179->185 180->175 181->160 187 7ffe148e2dc2-7ffe148e2dc6 181->187 186 7ffe148e2d94-7ffe148e2da4 182->186 197 7ffe148e2d3f 183->197 184->166 184->177 198 7ffe148e2c9a-7ffe148e2c9d 185->198 199 7ffe148e2ca5-7ffe148e2ca8 185->199 190 7ffe148e2da6-7ffe148e2db0 186->190 191 7ffe148e2db4-7ffe148e2dbb 186->191 192 7ffe148e2dc8-7ffe148e2dd1 187->192 193 7ffe148e2dd5-7ffe148e2dd9 187->193 190->191 191->181 191->186 192->193 193->160 196 7ffe148e2ddb-7ffe148e2dde 193->196 200 7ffe148e2de2-7ffe148e2e06 196->200 197->184 198->199 199->180 200->200 201 7ffe148e2e08 200->201 201->160
      APIs
      Memory Dump Source
      • Source File: 00000029.00000002.1779042863.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000029.00000002.1778998287.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779149265.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_41_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: malloc$Openmemsetmixer
      • String ID:
      • API String ID: 1988068089-0
      • Opcode ID: cc1c8c35fa98a414bdaa0c1274cb246fb05c3c6c73e8c2b23607ebc6ae49bf57
      • Instruction ID: f35c637707dfed6c6b7bda82ceeb2e4ff7991988c1d2b316cb13bf7e40a2f4bb
      • Opcode Fuzzy Hash: cc1c8c35fa98a414bdaa0c1274cb246fb05c3c6c73e8c2b23607ebc6ae49bf57
      • Instruction Fuzzy Hash: A881C332B09A568BEB648F17D5C0639B3A4FB4A7A0F058079EF4D577A1DF38E4698700

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000029.00000002.1779042863.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000029.00000002.1778998287.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779149265.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_41_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: Closemidi$EventHandlePeriodResetfreetime
      • String ID:
      • API String ID: 4260093607-0
      • Opcode ID: a64e8874b6a4a95fdd145370a625b989496fed7616c63c101e1f462bd18a23de
      • Instruction ID: fe167d320902941e47bab336724c98e33e7847ab30f334a7d50467c2f8fe9377
      • Opcode Fuzzy Hash: a64e8874b6a4a95fdd145370a625b989496fed7616c63c101e1f462bd18a23de
      • Instruction Fuzzy Hash: 0B216021A09E1282EB55AB67959437CE261AF46FB4F5401B0FD0F777B5CF2CE8498380

      Control-flow Graph

      APIs
        • Part of subcall function 00007FFE148E2588: midiOutGetDevCapsA.WINMM(?,?,00000000,00007FFE148E204A), ref: 00007FFE148E25AB
      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FFE148E20B7
      Strings
      Memory Dump Source
      • Source File: 00000029.00000002.1779042863.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000029.00000002.1778998287.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779149265.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_41_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: Capsmidistrncpy
      • String ID: External MIDI Port$Internal FM synthesizer$Internal software synthesizer$Internal square wave synthesizer$Internal synthesizer (generic)$Windows MIDI_MAPPER
      • API String ID: 3583098728-2504388736
      • Opcode ID: 221c7e629a388342e26d320d1552fcd47e950c4bc25ef6db77434b5fe321584b
      • Instruction ID: bdc1fbbb9a983869310127fb1c89b7acbf5a5a19379209a49830aceb430a8193
      • Opcode Fuzzy Hash: 221c7e629a388342e26d320d1552fcd47e950c4bc25ef6db77434b5fe321584b
      • Instruction Fuzzy Hash: 38218371A0CD4689E668AB2BA4D4179E290FF07764F8401B1F54D267F8DE6CE50DC700

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000029.00000002.1779042863.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000029.00000002.1778998287.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779149265.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_41_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: free$Closemixer
      • String ID:
      • API String ID: 2973367850-0
      • Opcode ID: 692f0a99281a7137dfa7e55764cd08bd225a13e8381d8c5b2433a07698cb640d
      • Instruction ID: e21322c6dd39574275cda3c3c3bf4dc21f45cc5f5ed1dac742be0876c1e3c277
      • Opcode Fuzzy Hash: 692f0a99281a7137dfa7e55764cd08bd225a13e8381d8c5b2433a07698cb640d
      • Instruction Fuzzy Hash: AD110C22616E02CBFF999F62D4A53396360FF46F68F0407B4DD1E2A279CF6D90588344

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000029.00000002.1779042863.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000029.00000002.1778998287.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779149265.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_41_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: strncpy$Caps__stdio_common_vsprintfmixer
      • String ID: %d.%d$Port Mixer
      • API String ID: 1905600244-759074455
      • Opcode ID: 638478c3bb0501f0c30af9271e43d8f77b2d48eee092dee1e959d37d8bf64e07
      • Instruction ID: 382479b42c4fd846e45bab62c5c47f1524578fc8e7f1b6b840a803b46ca6baa5
      • Opcode Fuzzy Hash: 638478c3bb0501f0c30af9271e43d8f77b2d48eee092dee1e959d37d8bf64e07
      • Instruction Fuzzy Hash: DA01F120718E4185FB60DB26E8807A9A350EB4ABB8F800175E94D67775EF6CD28CCB00

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 269 7ffe148e3210-7ffe148e3253 call 7ffe148e3740 272 7ffe148e3259-7ffe148e325f 269->272 273 7ffe148e3434-7ffe148e343c 269->273 272->273 276 7ffe148e3265 272->276 274 7ffe148e3444-7ffe148e3461 273->274 275 7ffe148e343e free 273->275 275->274 277 7ffe148e326d-7ffe148e3289 276->277 278 7ffe148e341a-7ffe148e3420 277->278 279 7ffe148e328f-7ffe148e3294 277->279 278->277 281 7ffe148e3426-7ffe148e3429 278->281 279->278 280 7ffe148e329a-7ffe148e32a1 279->280 280->281 282 7ffe148e32a7-7ffe148e3304 280->282 281->273 283 7ffe148e342b-7ffe148e342e free 281->283 284 7ffe148e330b-7ffe148e3314 282->284 285 7ffe148e3306-7ffe148e3309 282->285 283->273 287 7ffe148e3327-7ffe148e333f malloc 284->287 288 7ffe148e3316-7ffe148e3323 free 284->288 285->284 286 7ffe148e3345-7ffe148e335e mixerGetControlDetailsA 285->286 286->278 289 7ffe148e3364-7ffe148e336f 286->289 287->273 287->286 288->287 289->278 290 7ffe148e3375-7ffe148e3383 289->290 291 7ffe148e3392-7ffe148e33a5 290->291 292 7ffe148e3385-7ffe148e338b 290->292 294 7ffe148e33a7-7ffe148e33af 291->294 295 7ffe148e33d5-7ffe148e33da 291->295 292->290 293 7ffe148e338d 292->293 293->278 296 7ffe148e33b3-7ffe148e33b6 294->296 297 7ffe148e33dc-7ffe148e33f0 295->297 298 7ffe148e33f3-7ffe148e3417 295->298 299 7ffe148e33c8-7ffe148e33d1 296->299 300 7ffe148e33b8-7ffe148e33c4 296->300 297->298 298->278 299->295 300->296 301 7ffe148e33c6 300->301 301->295
      APIs
        • Part of subcall function 00007FFE148E3740: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FFE148E30FC,?,?,?,?,?,00000000,?,?,00000000,00007FFE148E2896), ref: 00007FFE148E3787
        • Part of subcall function 00007FFE148E3740: mixerGetLineControlsA.WINMM(?,?,00000000,00007FFE148E30FC,?,?,?,?,?,00000000,?,?,00000000,00007FFE148E2896), ref: 00007FFE148E37A2
        • Part of subcall function 00007FFE148E3740: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FFE148E30FC,?,?,?,?,?,00000000,?,?,00000000,00007FFE148E2896), ref: 00007FFE148E37BB
      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,?,00000000,00007FFE148E2848), ref: 00007FFE148E3319
      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,?,00000000,00007FFE148E2848), ref: 00007FFE148E3333
      • mixerGetControlDetailsA.WINMM(?,?,?,00000000,?,?,00000000,00007FFE148E2848), ref: 00007FFE148E3356
      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,?,00000000,00007FFE148E2848), ref: 00007FFE148E342E
      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,?,00000000,00007FFE148E2848), ref: 00007FFE148E343E
      Memory Dump Source
      • Source File: 00000029.00000002.1779042863.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000029.00000002.1778998287.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779149265.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_41_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: free$mallocmixer$ControlControlsDetailsLine
      • String ID:
      • API String ID: 3737986393-0
      • Opcode ID: d8efb86b7dd2b432c8e2cfd059ba62d7b5b365b5530eefed140476b1a40f7b3c
      • Instruction ID: 36c3a5a9e9c726af4e06a01bda888584b126e2c0b40cbe23c795752b63c64aa2
      • Opcode Fuzzy Hash: d8efb86b7dd2b432c8e2cfd059ba62d7b5b365b5530eefed140476b1a40f7b3c
      • Instruction Fuzzy Hash: 0F61C132A15E05C7EB54CF16E188A6CB3A5F745BA4F028275EE6E53750CF38D85ACB00

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 303 7ffe148e1028-7ffe148e105c 304 7ffe148e1235-7ffe148e1240 call 7ffe148e1c78 303->304 307 7ffe148e1246-7ffe148e125d 304->307 308 7ffe148e1061-7ffe148e1064 304->308 309 7ffe148e1066-7ffe148e1069 308->309 310 7ffe148e106f-7ffe148e1072 308->310 309->310 312 7ffe148e10fe-7ffe148e1103 309->312 310->307 311 7ffe148e1078-7ffe148e107b 310->311 313 7ffe148e107d-7ffe148e1092 311->313 314 7ffe148e1098-7ffe148e109b 311->314 315 7ffe148e11ed-7ffe148e1220 call 7ffe148e1dc4 312->315 316 7ffe148e1109-7ffe148e110c 312->316 313->307 313->314 317 7ffe148e109d-7ffe148e10c1 314->317 318 7ffe148e10c7-7ffe148e10ca 314->318 330 7ffe148e1232 315->330 320 7ffe148e111e-7ffe148e112f 316->320 321 7ffe148e110e-7ffe148e1119 call 7ffe148e1dc4 316->321 317->307 317->318 318->312 326 7ffe148e10cc-7ffe148e10f8 318->326 322 7ffe148e113a-7ffe148e1152 320->322 323 7ffe148e1131-7ffe148e1137 320->323 321->330 334 7ffe148e1158-7ffe148e1171 322->334 335 7ffe148e1222 322->335 323->322 326->307 326->312 330->304 334->335 338 7ffe148e1177-7ffe148e1196 memcpy call 7ffe148e1dc4 334->338 336 7ffe148e122a 335->336 336->330 341 7ffe148e119b-7ffe148e11eb 338->341 342 7ffe148e1198 338->342 341->336 342->341
      Strings
      Memory Dump Source
      • Source File: 00000029.00000002.1779042863.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000029.00000002.1778998287.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779149265.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_41_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: (IJ)V$([BJ)V$callbackLongMessage$callbackShortMessage
      • API String ID: 0-1382956355
      • Opcode ID: 9740e262f438b8789765806ab3d1a4793e7526eec3d699e3b6ff1aa7cec5647e
      • Instruction ID: 9b6f00b0be06e78112aeaea999b8708d75464bd647045612dd5994d6f6d32d34
      • Opcode Fuzzy Hash: 9740e262f438b8789765806ab3d1a4793e7526eec3d699e3b6ff1aa7cec5647e
      • Instruction Fuzzy Hash: 0551A222709B8281DE65CF57A8842EAA3A0BB4AFE4F488475EE4D57795DF3CD449C300

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000029.00000002.1779042863.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000029.00000002.1778998287.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779149265.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_41_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: ObjectSingleWait
      • String ID:
      • API String ID: 24740636-0
      • Opcode ID: c9d313e7c698d3566f5dc1283f0417070d3359aebace9fa7ce44f85a5276fa02
      • Instruction ID: e6b9a69f4540aa5f3ff2d72ab3dd4f2c8cc1bc5cb5351eb890183c050184357d
      • Opcode Fuzzy Hash: c9d313e7c698d3566f5dc1283f0417070d3359aebace9fa7ce44f85a5276fa02
      • Instruction Fuzzy Hash: 23419361B08F4289EA559F1BD480639F390AF42BA8F444075EE1D677B5DF3CE4498741

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000029.00000002.1779042863.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000029.00000002.1778998287.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779149265.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_41_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: EventObjectOpenSingleWaitmidi
      • String ID:
      • API String ID: 138987089-3916222277
      • Opcode ID: 7b7b3c597a58e9689a5a5c5c2162efbfd450136cc459206a8b635f7251b97114
      • Instruction ID: 95331268c4a4bce3a737ffec349897d8f627a319b686aaadfd9f2197ad7370ba
      • Opcode Fuzzy Hash: 7b7b3c597a58e9689a5a5c5c2162efbfd450136cc459206a8b635f7251b97114
      • Instruction Fuzzy Hash: 4EF07464E09E5686E650EB23E8C52B4A7A0BF8A774F8402B1E85D72374DF7CA14D8600
      APIs
      Memory Dump Source
      • Source File: 00000029.00000002.1779042863.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000029.00000002.1778998287.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779149265.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_41_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
      • String ID:
      • API String ID: 2933794660-0
      • Opcode ID: ec2b26dfd0f8d2385e38df15ba1bbdf8fa87fe85032632b51f52bfdc86b47aa3
      • Instruction ID: 7d34cce8dd01dc251d4bcce7b131e6edec79d3b1f0210638d06e1747a8dfd1a4
      • Opcode Fuzzy Hash: ec2b26dfd0f8d2385e38df15ba1bbdf8fa87fe85032632b51f52bfdc86b47aa3
      • Instruction Fuzzy Hash: 9E113C32A04F418AEB10DF62E8942A833A4FB1E76CF441A71FA5D567A4DF7CD1A88340
      APIs
      Memory Dump Source
      • Source File: 00000029.00000002.1779042863.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000029.00000002.1778998287.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779149265.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_41_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: CloseEventHandleSleepStopmidi
      • String ID:
      • API String ID: 1174883558-0
      • Opcode ID: f3e5014b63227229b6ed0e3c007381763114db1586378116d4d25922b4a24012
      • Instruction ID: 9ac25670dcc7437686dd20d01834f24c726c9947a3a7ccafa57e9489118b984c
      • Opcode Fuzzy Hash: f3e5014b63227229b6ed0e3c007381763114db1586378116d4d25922b4a24012
      • Instruction Fuzzy Hash: 51016D21E0CE4282EA148B67A58037DA260AF49BE8F5405B4F91F27764CF2DD4498340
      APIs
      Memory Dump Source
      • Source File: 00000029.00000002.1779042863.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000029.00000002.1778998287.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779149265.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_41_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: CriticalSection$EnterEventLeaveObjectSingleWait
      • String ID:
      • API String ID: 4060455350-0
      • Opcode ID: 1019184f23986758b620619342492000e281c04926bf23f0575fc198d43bd14f
      • Instruction ID: 9d53c97f4a0ef3084ff76ee13dfd2e666a16f67c62a00c7d7a70a69127d6b1ec
      • Opcode Fuzzy Hash: 1019184f23986758b620619342492000e281c04926bf23f0575fc198d43bd14f
      • Instruction Fuzzy Hash: 7601A461A08E4682EB10EB17F8C01A4B3A0BF8A774B9840B5E95E62370DE7CA54DC600
      APIs
      Memory Dump Source
      • Source File: 00000029.00000002.1779042863.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000029.00000002.1778998287.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779149265.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_41_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: malloc$free
      • String ID:
      • API String ID: 1480856625-0
      • Opcode ID: e8cfbd72491b04978ba1fcbb6a8aa8cf000ff66440e5cc8b578189279fa2b450
      • Instruction ID: 7160d4dd585b44e7ee227d0c83bfc17415daee82d440928d636eb2dd0512aa8f
      • Opcode Fuzzy Hash: e8cfbd72491b04978ba1fcbb6a8aa8cf000ff66440e5cc8b578189279fa2b450
      • Instruction Fuzzy Hash: 4F619132A05F118AEA60DF13A480969F7A4FB46BA8B011075FF9E27B65DF3CE1458700
      APIs
      Memory Dump Source
      • Source File: 00000029.00000002.1779042863.00007FFE148E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE148E0000, based on PE: true
      • Associated: 00000029.00000002.1778998287.00007FFE148E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779102324.00007FFE148E6000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000029.00000002.1779149265.00007FFE148EA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_41_2_7ffe148e0000_rundll32.jbxd
      Similarity
      • API ID: malloc$freememset
      • String ID:
      • API String ID: 2835137314-0
      • Opcode ID: e7459d6239be163082843d5e81bef50b6c3d63922d926c81a6253c073435e8d7
      • Instruction ID: 687c21e336cc3587714ec795705a36d7f3553b60db3c393cafd4730cc8b9c8c3
      • Opcode Fuzzy Hash: e7459d6239be163082843d5e81bef50b6c3d63922d926c81a6253c073435e8d7
      • Instruction Fuzzy Hash: DB218332B04B4681E7148F17E880169B6E5FF85F94B4984B5EE4E67774DF38E8558340