Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
OctVbUtl.dll

Overview

General Information

Sample name:OctVbUtl.dll
Analysis ID:1530830
MD5:7705bfa817409119413ce6e15b00b389
SHA1:7f4d21ce846e0ee22b574cebdc09b313ab47bdc5
SHA256:1dd065c2accb056742144e8ee0fedfab243fa186a41d7b5070da18077d3fc8d5
Infos:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Found large amount of non-executed APIs
One or more processes crash
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7548 cmdline: loaddll32.exe "C:\Users\user\Desktop\OctVbUtl.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7584 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7628 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7644 cmdline: rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7652 cmdline: rundll32.exe C:\Users\user\Desktop\OctVbUtl.dll,_OctlBitMskClr@8 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7696 cmdline: rundll32.exe C:\Users\user\Desktop\OctVbUtl.dll,_OctlBitMskSet@8 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7720 cmdline: rundll32.exe C:\Users\user\Desktop\OctVbUtl.dll,_OctlBitMskTst@8 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7776 cmdline: rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlBitMskClr@8 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7784 cmdline: rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlBitMskSet@8 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7792 cmdline: rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlBitMskTst@8 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7808 cmdline: rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_szW@12 MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 7320 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7808 -s 600 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 7816 cmdline: rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_szR@12 MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 5452 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7816 -s 600 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 7824 cmdline: rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_szL@12 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7836 cmdline: rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_cpy@12 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7844 cmdline: rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_acR@12 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7860 cmdline: rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_acL@12 MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 7340 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7860 -s 592 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 7868 cmdline: rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_4sw@8 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7876 cmdline: rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtilPakP@16 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7904 cmdline: rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlDttmUpk@8 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7924 cmdline: rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlDttmSys@0 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7932 cmdline: rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlDttmPrs@8 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7948 cmdline: rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlDttmPak@4 MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 3632 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7948 -s 596 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 7956 cmdline: rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlBitN2Mask@4 MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: OctVbUtl.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\
Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\
Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_8937994e4f6653102bf74df7bae4df35b16b585b_7522e4b5_861aaf2f-d957-4636-afe3-005811a133b1\
Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\
Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_1639818b7ea33fad73b6a9f374f2c2fc303b0dc_7522e4b5_42ad0679-496e-491f-b6c5-2a2b0b3da087\
Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: time.windows.com
Source: Amcache.hve.37.drString found in binary or memory: http://upx.sf.net
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7860 -s 592
Source: OctVbUtl.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
Source: classification engineClassification label: clean3.winDLL@48/17@1/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7584:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7860
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7948
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7816
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7808
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\7c3f23c1-b9f6-40a8-9fe0-2cece27c4669Jump to behavior
Source: OctVbUtl.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",#1
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\OctVbUtl.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",#1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\OctVbUtl.dll,_OctlBitMskClr@8
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\OctVbUtl.dll,_OctlBitMskSet@8
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\OctVbUtl.dll,_OctlBitMskTst@8
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlBitMskClr@8
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlBitMskSet@8
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlBitMskTst@8
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_szW@12
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_szR@12
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_szL@12
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_cpy@12
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_acR@12
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_acL@12
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_4sw@8
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtilPakP@16
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlDttmUpk@8
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlDttmSys@0
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlDttmPrs@8
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlDttmPak@4
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlBitN2Mask@4
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7860 -s 592
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7808 -s 600
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7948 -s 596
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7816 -s 600
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\OctVbUtl.dll,_OctlBitMskClr@8Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\OctVbUtl.dll,_OctlBitMskSet@8Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\OctVbUtl.dll,_OctlBitMskTst@8Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlBitMskClr@8Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlBitMskSet@8Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlBitMskTst@8Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_szW@12Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_szR@12Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_szL@12Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_cpy@12Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_acR@12Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_acL@12Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_4sw@8Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtilPakP@16Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlDttmUpk@8Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlDttmSys@0Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlDttmPrs@8Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlDttmPak@4Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlBitN2Mask@4Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 0.0 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\
Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\
Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_8937994e4f6653102bf74df7bae4df35b16b585b_7522e4b5_861aaf2f-d957-4636-afe3-005811a133b1\
Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\
Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_1639818b7ea33fad73b6a9f374f2c2fc303b0dc_7522e4b5_42ad0679-496e-491f-b6c5-2a2b0b3da087\
Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue
Source: Amcache.hve.37.drBinary or memory string: VMware
Source: Amcache.hve.37.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.37.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.37.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.37.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.37.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.37.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.37.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.37.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.37.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.37.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.37.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.37.drBinary or memory string: vmci.sys
Source: Amcache.hve.37.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.37.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.37.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.37.drBinary or memory string: VMware20,1
Source: Amcache.hve.37.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.37.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.37.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.37.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.37.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.37.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.37.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.37.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.37.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.37.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.37.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
Source: Amcache.hve.37.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_10001E10 GetLocalTime,std::_Cnd_initX,std::_Cnd_initX,std::_Cnd_initX,std::_Cnd_initX,std::_Cnd_initX,std::_Cnd_initX,11_2_10001E10
Source: Amcache.hve.37.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.37.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.37.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.37.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.37.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Rundll32
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Virtualization/Sandbox Evasion
LSASS Memory21
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets2
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1530830 Sample: OctVbUtl.dll Startdate: 10/10/2024 Architecture: WINDOWS Score: 3 27 time.windows.com 2->27 29 shed.dual-low.s-part-0017.t-0009.t-msedge.net 2->29 31 s-part-0017.t-0009.t-msedge.net 2->31 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        13 rundll32.exe 7->13         started        15 18 other processes 7->15 process5 17 rundll32.exe 9->17         started        19 WerFault.exe 2 16 11->19         started        21 WerFault.exe 13->21         started        23 WerFault.exe 20 16 15->23         started        25 WerFault.exe 16 15->25         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
OctVbUtl.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0017.t-0009.t-msedge.net
13.107.246.45
truefalse
    unknown
    time.windows.com
    unknown
    unknownfalse
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://upx.sf.netAmcache.hve.37.drfalse
      • URL Reputation: safe
      unknown
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1530830
      Start date and time:2024-10-10 15:36:07 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 45s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:43
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:OctVbUtl.dll
      Detection:CLEAN
      Classification:clean3.winDLL@48/17@1/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 9
      Cookbook Comments:
      • Found application associated with file extension: .dll
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 13.95.65.251, 20.189.173.22
      • Excluded domains from analysis (whitelisted): login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, twc.trafficmanager.net, otelrules.afd.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size exceeded maximum capacity and may have missing behavior information.
      • VT rate limit hit for: OctVbUtl.dll
      TimeTypeDescription
      09:37:26API Interceptor1x Sleep call for process: loaddll32.exe modified
      09:37:52API Interceptor4x Sleep call for process: WerFault.exe modified
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      s-part-0017.t-0009.t-msedge.nethttp://flipsnack.com/BA85A977C6F/oct2024/full-view.htmlGet hashmaliciousHTMLPhisherBrowse
      • 13.107.246.45
      https://onlinefeature.blob.core.windows.net/plus/online.html?jd6123Get hashmaliciousUnknownBrowse
      • 13.107.246.45
      fTq2vadDnr.exeGet hashmaliciousFormBookBrowse
      • 13.107.246.45
      https://www.google.es/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2Foilproductionpower.com%2Fddd%2Ff3E2tG5ASlq4OLZ8xJKHkkFY/TExQQG5vdm96eW1lcy5jb20=Get hashmaliciousHTMLPhisherBrowse
      • 13.107.246.45
      jQw7LVWJYw.exeGet hashmaliciousUnknownBrowse
      • 13.107.246.45
      SecuriteInfo.com.Trojan-Ransom.Win32.Zerber.gkca.4990.15640.exeGet hashmaliciousUnknownBrowse
      • 13.107.246.45
      SecuriteInfo.com.Win32.CrypterX-gen.327.26539.exeGet hashmaliciousFormBookBrowse
      • 13.107.246.45
      https://trendydigitalbuzze.com.de/YrWXF/Get hashmaliciousUnknownBrowse
      • 13.107.246.45
      http://beststarsoffers.click/img/FJHpEbd9pzMLCgDTGet hashmaliciousUnknownBrowse
      • 13.107.246.45
      http://beststarsoffers.click/img/BftYnyQgrWDRxBpxGet hashmaliciousUnknownBrowse
      • 13.107.246.45
      No context
      No context
      No context
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.8295099077372614
      Encrypted:false
      SSDEEP:192:vhCMiqO3q0BU/wjeT4zuiFrZ24IO8dci:MMiL3xBU/wjeMzuiFrY4IO8dci
      MD5:4DABC8BA68188D9AFCC8CC88BF294CE1
      SHA1:4E093EAD2D40D87C42300FF4D7085F5F7973626E
      SHA-256:D83EF3BE6B4F0716EF1EFE3747DFCAAF9BEC031E7BECB540DC5257A6491D779B
      SHA-512:4DB16925A8CD71FFFB03020323C140C1A1325567069BA845A072D2F2D418AF06A783305054AB4F400630165EC54C54B8A54198198BE411B0CD93E789B11666AC
      Malicious:false
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.0.4.1.0.4.8.2.7.9.3.1.2.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.0.4.1.0.4.9.5.4.4.9.3.7.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.2.a.d.0.6.7.9.-.4.9.6.e.-.4.9.1.f.-.b.6.c.5.-.2.a.2.b.0.b.3.d.a.0.8.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.2.d.d.5.4.2.6.-.5.4.7.5.-.4.8.d.2.-.b.5.5.f.-.c.f.8.8.f.5.9.f.c.c.1.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.e.8.0.-.0.0.0.1.-.0.0.1.4.-.2.7.a.5.-.4.f.8.b.1.9.1.b.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.8292736625706508
      Encrypted:false
      SSDEEP:192:BYyiHOHoq0BU/wjeT4zuiFrZ24IO8dci:PiuIxBU/wjeMzuiFrY4IO8dci
      MD5:9D2E65BBF8367644AD6776FA3299F8A5
      SHA1:EDDA1BAC69D1108D9F088F060921228A6A7E6F70
      SHA-256:B6FA4D89E9EC582C9120EA32A6CC7FCC4D388B94C11A5A1F8B3F0A27319BF107
      SHA-512:175ED6C4CB6B931D49C1DDA7FC8642C2C115C5BE41796B64CD9C59631A06F17AE47F6F262AFED940945982AEA6571C12A6876E3EDC1C50B516B38AF09E13CF51
      Malicious:false
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.0.4.1.0.4.8.5.1.5.6.1.9.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.0.4.1.0.4.9.8.9.0.6.2.4.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.b.8.9.4.8.5.7.-.d.8.8.7.-.4.a.c.a.-.9.6.4.0.-.e.1.5.4.1.c.f.3.7.8.4.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.e.c.b.8.2.7.2.-.6.5.c.b.-.4.e.a.1.-.a.7.0.d.-.b.0.c.2.1.b.2.4.5.7.0.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.e.8.8.-.0.0.0.1.-.0.0.1.4.-.8.f.4.0.-.5.1.8.b.1.9.1.b.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.8290032466536316
      Encrypted:false
      SSDEEP:192:NVbiteOOsw0BU/wjeT4zuiFrZ24IO8dci:jitdLBU/wjeMzuiFrY4IO8dci
      MD5:028F53729A23F1847E38E7B6FA2D021D
      SHA1:F7853052B13F963550E851A5D46544BF61F19A66
      SHA-256:74529693E8E47D69E549FD7E681552419C87A28ABACD54513207EB484FE1B825
      SHA-512:0E595DB6904EEA0DF63F3E8D4AAF97D31BE834B2311A150D7BECE2272A1A1BEF90324ECB0B7798A9675073A0AA8E1383F518B05C42D0F0C2BB9F4D61B78BD982
      Malicious:false
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.0.4.1.0.4.8.2.4.0.5.4.3.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.0.4.1.0.4.9.7.7.1.7.9.4.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.6.1.a.a.f.2.f.-.d.9.5.7.-.4.6.3.6.-.a.f.e.3.-.0.0.5.8.1.1.a.1.3.3.b.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.6.8.b.f.8.8.a.-.3.2.e.0.-.4.9.9.3.-.a.4.2.8.-.f.4.5.2.f.b.0.c.7.d.e.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.e.b.4.-.0.0.0.1.-.0.0.1.4.-.b.d.d.5.-.5.9.8.b.1.9.1.b.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.82967160425124
      Encrypted:false
      SSDEEP:192:YpzXiROTH30BU/wjeT4zuiFrZ24IO8dci:YdXiozEBU/wjeMzuiFrY4IO8dci
      MD5:A3DCD98E527482E2A05D5E0CBE13E06A
      SHA1:79FA44F63FB8C105A9AB21F57FC71008F97632B1
      SHA-256:16003AF85506CFF02F96951E6DA9FE3926AA310E86D2B5F22342FE11E8E345DF
      SHA-512:14A4FC2DDEEC65E281539A9D623413E6F96D29A0CA10B00EDC886ABCF5C4F46155EDF3B06B18C4EF4CFA5D036F569C83A2EA7A81E477D973DA721D170647DA23
      Malicious:false
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.0.4.1.0.4.8.3.2.7.8.1.0.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.0.4.1.0.4.9.8.7.4.6.8.3.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.6.6.c.b.a.1.d.-.a.e.5.1.-.4.e.9.3.-.8.3.6.a.-.a.8.c.1.2.f.d.6.3.7.a.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.d.1.2.6.f.a.d.-.c.7.6.5.-.4.a.3.e.-.9.e.1.4.-.5.a.4.7.b.2.e.c.6.1.3.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.0.c.-.0.0.0.1.-.0.0.1.4.-.a.c.0.9.-.8.3.8.b.1.9.1.b.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Mini DuMP crash report, 14 streams, Thu Oct 10 13:37:28 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):42052
      Entropy (8bit):1.9222984897419135
      Encrypted:false
      SSDEEP:192:s7YG+XlCjNxfO5H4zEQRlgD89dst5CBEMETjNUTCTTsq:GhZxW5HURlPdQ5CBEM6NzPs
      MD5:E29CADCDE01BAD78BC5E9A80D9AE595B
      SHA1:A54759F626B4BCA5F5C00E429CFFC37130342964
      SHA-256:DEBB6A71A7D3AF3C09FCA580AA4CBFE3A35B2B11EA4D256460A850141221AC36
      SHA-512:A2B31168E6F8E9C82DDED953CB8168F710267AD237CF5F3151F807F010FA2F65A4CD50461ED19E95ED41D54D4609F21639D37AA5753AF58B7A67B354D35A46C5
      Malicious:false
      Preview:MDMP..a..... ..........g.........................................&..........T.......8...........T.......................................x...............................................................................eJ..............GenuineIntel............T..............g.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Mini DuMP crash report, 14 streams, Thu Oct 10 13:37:28 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):39884
      Entropy (8bit):1.9979770985996552
      Encrypted:false
      SSDEEP:192:sQXWCjNviLIO5H4Q7hdEwvnpaEaRlAlpMjviI:5ZSP5H/7TnOPAlP
      MD5:0D3AAA000E2A6FAFC4F7E20D379E2301
      SHA1:53E8313B89FA057C0CD7607E9B4E033D5739E646
      SHA-256:CC61176F0214EC8E5D5F215FF4CA43ABB3A71C792AB6A01941BE9E44BADCCAC8
      SHA-512:425425B16EEDAF2E806639870EF714D5323CDC39CC46BA17EEF15D80B09431280FE621D379CC06AA74FB52A65466DBF2F1640C0487A8999939EE0BCD7394835C
      Malicious:false
      Preview:MDMP..a..... ..........g.........................................&..........T.......8...........T...............$.......................x...............................................................................eJ..............GenuineIntel............T..............g.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Mini DuMP crash report, 14 streams, Thu Oct 10 13:37:28 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):43064
      Entropy (8bit):1.891044692357667
      Encrypted:false
      SSDEEP:192:sWXlCjN6IO5H4WT/GSi+CIRJx680JGhJTBywsniT:EZ6P5HX/EGki
      MD5:344E8962B7F874B961DFEFCE8188726B
      SHA1:8F4A6C497BCC95CB1D9E37A1F3EA4C8ADA642828
      SHA-256:6B88FFEAC376317D630789F8E4B6BFE344EB18EDE833373E73A26F9BA3048C69
      SHA-512:42B851BB867213C5DD89DC3B70A86887104EAFF0475F3BDF2D3F21F82BDD16AA2B791F5EDD2847B8FABAA8AB0ABA6550157DB6C56E9ED046B5C61164393B88AA
      Malicious:false
      Preview:MDMP..a..... ..........g.........................................&..........T.......8...........T.......................................x...............................................................................eJ..............GenuineIntel............T..............g.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Mini DuMP crash report, 14 streams, Thu Oct 10 13:37:28 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):41784
      Entropy (8bit):1.9477045003808109
      Encrypted:false
      SSDEEP:192:sP96XwCjNI/O5H4F/1tjgRov5N+8LCnwfM+:S9cZI25HA/1tjgRK5N+9w
      MD5:87DCB63035CDAF6B5CB5C7760F427029
      SHA1:D9CD15D2A54471677FB63DB590B4770A4D336B92
      SHA-256:A5A331AED0E352A11766DE7CE1E28BD1A0128FBC6A01148381E0230A441B7855
      SHA-512:54571AA689A07E7A8E82C16366274096A2B1F52F701C6285D5613B8E1677EF20F09968BA5EB5A4711CC27441457B505822C2868B6452BCCD1259032D226A514E
      Malicious:false
      Preview:MDMP..a..... ..........g.........................................&..........T.......8...........T.......................................x...............................................................................eJ..............GenuineIntel............T..............g.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8248
      Entropy (8bit):3.692241135710145
      Encrypted:false
      SSDEEP:192:R6l7wVeJ086X6YcM66NqDgmfT80prz89bCysfiIvWm:R6lXJv6X6YP61DgmfT8lCxf5
      MD5:41BA5BEBFB0F68823B9A9F98E16D4976
      SHA1:DD74190BA99ED333136427CEBC8DFBB2CEC08005
      SHA-256:FDFC5E32B754847089C3CE200A37C72CB2BD8D2A55985987A65ECE26EDF61A88
      SHA-512:136986C74B077CC5371423E01B1399ECC8EDB88BC54AB3CB366B46EA5C1BAE33A6DAC50453AF0C1A34CE86BCF51903506DA6B53795A3810634364DB0168B484D
      Malicious:false
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.8.6.0.<./.P.i.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8248
      Entropy (8bit):3.692767897472297
      Encrypted:false
      SSDEEP:192:R6l7wVeJaM6/6Ycm66NqDgmfTa0prr89bC4sf+hWm:R6lXJh6/6Yl61DgmfTatCrfM
      MD5:9EC3F59DDFE981C2F88CCA3F86290468
      SHA1:EA35184E5A4C331335134F1343C4B4A2531602C9
      SHA-256:377C681D7DCAA80D66B16AFE465FC76407493CE3CFD027047507E7AAA6B41CC5
      SHA-512:BC3190D9F9ACDF536669C5A39D52E000DCF5203392C2D771FD3183E7DE44B9F78982116ED75EC32364A1AFD39AC2F121288DAAC178DC884EB2E9177320AA365A
      Malicious:false
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.8.0.8.<./.P.i.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8256
      Entropy (8bit):3.691858221084438
      Encrypted:false
      SSDEEP:192:R6l7wVeJnv6s6YcX66NqDgmfTZ0prG89bCKsf0J1Wm:R6lXJv6s6Yk61DgmfTZ+CpfQN
      MD5:A014AD3CD0B846921BDD580F005C16FD
      SHA1:EBC88F3849BDE26318A3296876E9E1ED393E9504
      SHA-256:EC5BC883FA14539DD384C1DAEC7A99BFD3C89788CD497341220744D69820B5B3
      SHA-512:FDE3EA3C94A491F9C257B0078BF1F6083F01C2D03D8BD837A83BC25B7A12A5BB5CAB02F49012FBE13B70E87BC1E65FBFA87EE4B25AAD1BA9E94C7E67292EA443
      Malicious:false
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.9.4.8.<./.P.i.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4646
      Entropy (8bit):4.462283262676011
      Encrypted:false
      SSDEEP:48:cvIwWl8zsVJg77aI9grWpW8VYGdYm8M4JCdPZFh7+q8/JoGScS4d:uIjfvI7Ga7Vh8Jq7J34d
      MD5:C602A6913FA94860B2E3330AFA513606
      SHA1:2CD49F856BF6551E840BA06D00305848F8FEEE28
      SHA-256:5AD047BD0FE9717009DE84FC166CE9E00D783877AB127AA48A4065E5B57B81D3
      SHA-512:1F0CB76D95318418FE83E3B76854C68B83C24F5D3AC39F26ACF674045F10CBD7C5119537BD2BA6FC556B972560C16176F59580CD4D098085B0AB6E1214EE95EE
      Malicious:false
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="537400" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4646
      Entropy (8bit):4.461699385843438
      Encrypted:false
      SSDEEP:48:cvIwWl8zsVJg77aI9grWpW8VYGQYm8M4JCdPTFO+q8/JIGScSyd:uIjfvI7Ga7Vh9JHXJ3yd
      MD5:01C6D3D7F577DEE5FF5002D7530A3237
      SHA1:757B368F2989ED247276F616D9C6FA3A4ACDE72B
      SHA-256:F0BBB3CD780834D08A27514B8A37C086CE2D31CC8292DB874FB98F6B30E67D3F
      SHA-512:1084F15D04D568CB4DB3A826FEA53FD1B55F4A15FAD4A1C4EE6D37F1842E76479C883D7D7DA52CDC41D342F1D7804205D6EC48E122D101819BC9D0B07BEE25F4
      Malicious:false
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="537400" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4654
      Entropy (8bit):4.45843308550589
      Encrypted:false
      SSDEEP:48:cvIwWl8zsVJg77aI9grWpW8VYG+Ym8M4JCdPSFTL+q8/A5GScShd:uIjfvI7Ga7Vh3JnhJ3hd
      MD5:FD6F04DDE40B8E1DC329BC825CA3CEAE
      SHA1:ACBA2E094F95E81920032B658D61F033EE4D11E8
      SHA-256:B42DF26B728BEAC75BF4A358023F6A2A4BA489374AE66FA627F2700F13A76151
      SHA-512:969EEF97675D348B7DBCBA00B618996281986D1C514A76DA9F44CE96C820667C6A9BC021B21D45B62A72FCA57F51380039FEB7D27F570BD088BF72D0FDFC7D42
      Malicious:false
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="537400" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8248
      Entropy (8bit):3.693373316788421
      Encrypted:false
      SSDEEP:192:R6l7wVeJVw6Q6YcM66NqDgmfTa0pr989bLvsffZm:R6lXJC6Q6Yf61DgmfTa7LUfs
      MD5:10CA6BBF72D1B196160EC3F60AEAA56B
      SHA1:EE795F8FA4D3B447D11B2C54D3C43C8C48B6D429
      SHA-256:A08B8468471B7382F1DB13B872B9D69547E17AA822D9A59D259BFE339ACD4AD5
      SHA-512:0C758B4457D9D317DD376C80A205931CBA3B870B4BC3CCE3F2E06082C3CECA360811049F7A7626ADF3CFA07926A423982FCC5396A4B2F68244FA18544D6219B5
      Malicious:false
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.8.1.6.<./.P.i.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4646
      Entropy (8bit):4.458719000285173
      Encrypted:false
      SSDEEP:48:cvIwWl8zsVJg77aI9grWpW8VYGL4Ym8M4JCdPZFrP+q8/JlGScSDwM6d:uIjfvI7Ga7VhpJCPmJ3L6d
      MD5:66D55A6AA29A816AC7F4B21D7ABD36EF
      SHA1:B2AEE65ADD41725B981F47BF411A1C59C6DC0C86
      SHA-256:2C36C499B9F5DA5D54260F5D093ADA89E4C4B36BE4D48ACC71F0C6344D263B32
      SHA-512:67CEA7407162922688E289D31318BD11C21B92E6D0A7636436D7DE9FE8FEF75B32513B9982E6000FC7947761DE6B68CA7FF7305B07A3DDEF57CBBD6BAA7081B9
      Malicious:false
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="537400" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:MS Windows registry file, NT/2000 or above
      Category:dropped
      Size (bytes):1835008
      Entropy (8bit):4.417465629024975
      Encrypted:false
      SSDEEP:6144:ycifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuNo5+:fi58oSWIZBk2MM6AFBWo
      MD5:ECC2309731D7A1668307A940941A4527
      SHA1:441777058543486D7E1597C33CFAB909A8EAC637
      SHA-256:4817DF9A96244CD6A732F3D290832E8D721F6A20C301B59814E98ABD804C6CCA
      SHA-512:266A106A5841B6F3F3A075B0058EFA583328DBB5A10A28620DA7EB1A7839078DAA473D8A11B26005A2A6F3658B2B9EA610C63E147D442810C793D4E74F3CB050
      Malicious:false
      Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..Y..................................................................................................................................................................................................................................................................................................................................................IN.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Entropy (8bit):1.9893947676021677
      TrID:
      • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
      • Generic Win/DOS Executable (2004/3) 0.20%
      • DOS Executable Generic (2002/1) 0.20%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:OctVbUtl.dll
      File size:24'576 bytes
      MD5:7705bfa817409119413ce6e15b00b389
      SHA1:7f4d21ce846e0ee22b574cebdc09b313ab47bdc5
      SHA256:1dd065c2accb056742144e8ee0fedfab243fa186a41d7b5070da18077d3fc8d5
      SHA512:3f9d810f154a8545102d09b9de8d511948a422df63070b6b7479fbe5752877793d7baec870a14e401e0117201bc92af64c9977fba5c37cefdb127f99c97ec440
      SSDEEP:192:VuN+v5sGR3Wt5CBM0u69/EmLN5v3cxqpj5jfU0QG3Kn57gr+:VZ5sGs5CBM0L7MUnQGmtgr+
      TLSH:A5B241651DA0D530F26642FEC932E0BFA8BD6F4491C357A3A39C14273F629E07E3A416
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........oY............................................................e.......r.......Rich............................PE..L......A...
      Icon Hash:7ae282899bbab082
      Entrypoint:0x10002023
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x10000000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
      DLL Characteristics:
      Time Stamp:0x418C1BE3 [Sat Nov 6 00:33:39 2004 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:202649762e5b9fcd0ef0205cdd163673
      Instruction
      push ebp
      mov ebp, esp
      push ebx
      mov ebx, dword ptr [ebp+08h]
      push esi
      mov esi, dword ptr [ebp+0Ch]
      push edi
      mov edi, dword ptr [ebp+10h]
      test esi, esi
      jne 00007FD82145404Bh
      cmp dword ptr [10004060h], 00000000h
      jmp 00007FD821454068h
      cmp esi, 01h
      je 00007FD821454047h
      cmp esi, 02h
      jne 00007FD821454064h
      mov eax, dword ptr [10004070h]
      test eax, eax
      je 00007FD82145404Bh
      push edi
      push esi
      push ebx
      call eax
      test eax, eax
      je 00007FD82145404Eh
      push edi
      push esi
      push ebx
      call 00007FD821453F5Ah
      test eax, eax
      jne 00007FD821454046h
      xor eax, eax
      jmp 00007FD821454090h
      push edi
      push esi
      push ebx
      call 00007FD821452FD2h
      cmp esi, 01h
      mov dword ptr [ebp+0Ch], eax
      jne 00007FD82145404Eh
      test eax, eax
      jne 00007FD821454079h
      push edi
      push eax
      push ebx
      call 00007FD821453F36h
      test esi, esi
      je 00007FD821454047h
      cmp esi, 03h
      jne 00007FD821454068h
      push edi
      push esi
      push ebx
      call 00007FD821453F25h
      test eax, eax
      jne 00007FD821454045h
      and dword ptr [ebp+0Ch], eax
      cmp dword ptr [ebp+0Ch], 00000000h
      je 00007FD821454053h
      mov eax, dword ptr [10004070h]
      test eax, eax
      je 00007FD82145404Ah
      push edi
      push esi
      push ebx
      call eax
      mov dword ptr [ebp+0Ch], eax
      mov eax, dword ptr [ebp+0Ch]
      pop edi
      pop esi
      pop ebx
      pop ebp
      retn 000Ch
      jmp dword ptr [1000302Ch]
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      Programming Language:
      • [C++] VS98 (6.0) build 8168
      • [LNK] VC++ 6.0 SP5 build 8804
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x31900x1dc.rdata
      IMAGE_DIRECTORY_ENTRY_IMPORT0x306c0x3c.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x50000x64.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x30000x3c.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x10c60x2000e388f8f9aa9348c2bdab1dc6983dbfe0False0.2496337890625data3.8023523456532504IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x30000x36c0x10004f9387300465ed2e8c7b14431a987f6dFalse0.122314453125data1.4115510377731795IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x40000x740x100041d8d7e6061e41107b87551e6c5ba224False0.014892578125Matlab v4 mat-file (little endian) 02u-%02u, numeric, rows 0, columns 00.1519365264852921IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .reloc0x50000x900x10001c1f5319e9e18f2b85725b747d676f74False0.0322265625data0.24818896091619172IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      DLLImport
      KERNEL32.dllGetLocalTime
      MSVCRT.dllfloor, _ftol, sprintf, strlen, strcmp, memcpy, sscanf, strcpy, free, _initterm, malloc, _adjust_fdiv
      NameOrdinalAddress
      _OctlBitMskClr@810x1000104f
      _OctlBitMskSet@820x10001033
      _OctlBitMskTst@830x1000106d
      _OctlBitN2Mask@440x1000101c
      _OctlDttmPak@450x1000142b
      _OctlDttmPrs@860x1000143e
      _OctlDttmSys@070x100013f6
      _OctlDttmUpk@880x10001400
      _OctlUtilPakP@1690x10001233
      _OctlUtil_4sw@8100x100012d8
      _OctlUtil_acL@12110x10001381
      _OctlUtil_acR@12120x1000130c
      _OctlUtil_cpy@12130x10001092
      _OctlUtil_szL@12140x100011ac
      _OctlUtil_szR@12150x100010b2
      _OctlUtil_szW@12160x1000118e
      TimestampSource PortDest PortSource IPDest IP
      Oct 10, 2024 15:37:11.053024054 CEST5594153192.168.2.71.1.1.1
      Oct 10, 2024 15:37:34.713753939 CEST53566331.1.1.1192.168.2.7
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Oct 10, 2024 15:37:11.053024054 CEST192.168.2.71.1.1.10xa7cStandard query (0)time.windows.comA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Oct 10, 2024 15:37:11.061086893 CEST1.1.1.1192.168.2.70xa7cNo error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
      Oct 10, 2024 15:37:12.757292032 CEST1.1.1.1192.168.2.70x6625No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
      Oct 10, 2024 15:37:12.757292032 CEST1.1.1.1192.168.2.70x6625No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:1
      Start time:09:37:16
      Start date:10/10/2024
      Path:C:\Windows\System32\loaddll32.exe
      Wow64 process (32bit):true
      Commandline:loaddll32.exe "C:\Users\user\Desktop\OctVbUtl.dll"
      Imagebase:0xe40000
      File size:126'464 bytes
      MD5 hash:51E6071F9CBA48E79F10C84515AAE618
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:2
      Start time:09:37:16
      Start date:10/10/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff75da10000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:09:37:17
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",#1
      Imagebase:0x410000
      File size:236'544 bytes
      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:4
      Start time:09:37:17
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",#1
      Imagebase:0x2f0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:5
      Start time:09:37:17
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe C:\Users\user\Desktop\OctVbUtl.dll,_OctlBitMskClr@8
      Imagebase:0x2f0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:6
      Start time:09:37:20
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe C:\Users\user\Desktop\OctVbUtl.dll,_OctlBitMskSet@8
      Imagebase:0x2f0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:7
      Start time:09:37:23
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe C:\Users\user\Desktop\OctVbUtl.dll,_OctlBitMskTst@8
      Imagebase:0x2f0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:8
      Start time:09:37:26
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlBitMskClr@8
      Imagebase:0xa70000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:9
      Start time:09:37:26
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlBitMskSet@8
      Imagebase:0x2f0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:10
      Start time:09:37:26
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlBitMskTst@8
      Imagebase:0x2f0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:11
      Start time:09:37:26
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_szW@12
      Imagebase:0x2f0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:12
      Start time:09:37:26
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_szR@12
      Imagebase:0x2f0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:13
      Start time:09:37:26
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_szL@12
      Imagebase:0x2f0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:14
      Start time:09:37:26
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_cpy@12
      Imagebase:0x2f0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:15
      Start time:09:37:26
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_acR@12
      Imagebase:0x2f0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:16
      Start time:09:37:26
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_acL@12
      Imagebase:0x2f0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:17
      Start time:09:37:26
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtil_4sw@8
      Imagebase:0x2f0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:18
      Start time:09:37:26
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlUtilPakP@16
      Imagebase:0x2f0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:19
      Start time:09:37:26
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlDttmUpk@8
      Imagebase:0x2f0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:20
      Start time:09:37:26
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlDttmSys@0
      Imagebase:0x2f0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:21
      Start time:09:37:26
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlDttmPrs@8
      Imagebase:0x2f0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:22
      Start time:09:37:26
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlDttmPak@4
      Imagebase:0x2f0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:23
      Start time:09:37:26
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\OctVbUtl.dll",_OctlBitN2Mask@4
      Imagebase:0x2f0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:34
      Start time:09:37:27
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7860 -s 592
      Imagebase:0xcf0000
      File size:483'680 bytes
      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:35
      Start time:09:37:27
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7808 -s 600
      Imagebase:0xcf0000
      File size:483'680 bytes
      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:37
      Start time:09:37:27
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7948 -s 596
      Imagebase:0xcf0000
      File size:483'680 bytes
      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Target ID:38
      Start time:09:37:28
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7816 -s 600
      Imagebase:0xcf0000
      File size:483'680 bytes
      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:2%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:4.5%
        Total number of Nodes:44
        Total number of Limit Nodes:0
        execution_graph 425 10001400 428 100016d2 425->428 427 10001415 memcpy 429 100016de std::_Cnd_initX 428->429 433 10001683 429->433 431 100016eb std::_Cnd_initX 432 10001713 strlen sprintf 431->432 432->427 434 10001690 std::_Cnd_initX 433->434 435 100016b2 sprintf 434->435 435->431 460 10001092 memcpy 436 10002023 438 1000203f 436->438 440 10002036 436->440 438->440 443 10002067 438->443 444 10001f78 438->444 439 10002087 442 10001f78 3 API calls 439->442 439->443 440->439 441 10001f78 3 API calls 440->441 440->443 441->439 442->443 445 10001f80 444->445 446 10001fa1 malloc 445->446 447 10001fb6 445->447 449 10001fe0 445->449 446->447 448 10001fba _initterm 446->448 447->440 448->447 449->447 450 1000200d free 449->450 450->447 461 100013f6 464 10001e10 GetLocalTime 461->464 463 100013fe 465 10001e6e std::_Cnd_initX 464->465 465->463 451 1000142b 454 10001797 strlen 451->454 455 100017b9 strcpy sscanf 454->455 456 10001437 454->456 455->456 457 10001817 455->457 458 100016d2 3 API calls 457->458 459 10001884 strcmp 458->459 459->456 466 1000173c 467 10001748 std::_Cnd_initX 466->467 468 10001683 sprintf 467->468 469 10001755 std::_Cnd_initX 468->469 470 1000176e strlen sprintf 469->470 471 1000143e 472 10001464 471->472 473 10001454 471->473 473->472 474 10001468 floor _ftol floor _ftol 473->474 474->472

        Callgraph

        • Executed
        • Not Executed
        • Opacity -> Relevance
        • Disassembly available
        callgraph 0 Function_10001000 1 Function_10001400 42 Function_100016D2 1->42 2 Function_10001381 3 Function_10001601 17 Function_1000151E 3->17 45 Function_100014E0 3->45 4 Function_10001683 6 Function_1000150B 4->6 4->17 54 Function_100014F8 4->54 5 Function_10001A8A 15 Function_1000161B 5->15 34 Function_100018BF 5->34 39 Function_1000164F 5->39 43 Function_100018D5 5->43 5->45 7 Function_1000130C 8 Function_10001D0E 12 Function_10001C13 8->12 8->15 20 Function_10001A29 8->20 37 Function_10001BCE 8->37 9 Function_1000118E 40 Function_100010D0 9->40 10 Function_10001E10 10->3 10->5 10->15 10->20 25 Function_100019B2 10->25 30 Function_10001635 10->30 36 Function_100015CD 10->36 10->39 41 Function_10001951 10->41 47 Function_100015E7 10->47 49 Function_10001AEB 10->49 52 Function_100018F0 10->52 11 Function_10001092 12->3 19 Function_100018A9 12->19 12->36 12->43 12->47 48 Function_10001669 12->48 50 Function_100014EB 12->50 56 Function_10001B7B 12->56 13 Function_10001597 14 Function_10001797 14->5 14->20 14->25 14->41 14->42 14->49 14->52 15->13 15->50 16 Function_1000101C 18 Function_10002023 18->0 55 Function_10001F78 18->55 20->30 20->34 20->39 20->43 20->45 21 Function_100015AA 22 Function_1000142B 22->14 23 Function_100011AC 24 Function_1000152E 24->6 24->54 25->19 25->36 25->43 25->47 25->48 25->50 26 Function_100010B2 26->40 27 Function_10001033 28 Function_10001233 29 Function_10001DB4 29->37 29->39 46 Function_10001D61 29->46 29->49 30->21 30->50 31 Function_1000173C 31->4 31->15 31->30 31->45 32 Function_100015BD 33 Function_1000143E 33->12 33->29 35 Function_10001B4C 35->36 35->52 36->45 36->54 38 Function_1000104F 39->32 39->50 41->3 41->19 41->36 41->43 41->50 42->4 42->15 42->30 42->39 42->45 44 Function_100012D8 46->5 46->8 46->30 46->37 47->6 47->45 48->24 48->45 49->15 49->30 49->34 49->43 49->45 51 Function_1000106D 52->3 52->19 52->43 52->47 52->50 53 Function_100013F6 53->10 56->35 56->37 56->41 56->47

        Control-flow Graph

        APIs
        • GetLocalTime.KERNEL32(?), ref: 10001E1A
          • Part of subcall function 100018F0: std::_Cnd_initX.LIBCPMTD ref: 1000191E
          • Part of subcall function 100018F0: std::_Cnd_initX.LIBCPMTD ref: 1000192B
          • Part of subcall function 10001951: std::_Cnd_initX.LIBCPMTD ref: 1000197F
          • Part of subcall function 10001951: std::_Cnd_initX.LIBCPMTD ref: 10001990
          • Part of subcall function 100019B2: std::_Cnd_initX.LIBCPMTD ref: 100019C7
          • Part of subcall function 100019B2: std::_Cnd_initX.LIBCPMTD ref: 100019F8
          • Part of subcall function 100019B2: std::_Cnd_initX.LIBCPMTD ref: 10001A05
          • Part of subcall function 10001A29: std::_Cnd_initX.LIBCPMTD ref: 10001A4A
          • Part of subcall function 10001A29: std::_Cnd_initX.LIBCPMTD ref: 10001A57
          • Part of subcall function 10001A8A: std::_Cnd_initX.LIBCPMTD ref: 10001AAB
          • Part of subcall function 10001A8A: std::_Cnd_initX.LIBCPMTD ref: 10001ABC
          • Part of subcall function 10001AEB: std::_Cnd_initX.LIBCPMTD ref: 10001B10
          • Part of subcall function 10001AEB: std::_Cnd_initX.LIBCPMTD ref: 10001B1D
        • std::_Cnd_initX.LIBCPMTD ref: 10001EA5
        • std::_Cnd_initX.LIBCPMTD ref: 10001EC8
        • std::_Cnd_initX.LIBCPMTD ref: 10001EE4
        • std::_Cnd_initX.LIBCPMTD ref: 10001F00
        • std::_Cnd_initX.LIBCPMTD ref: 10001F19
        • std::_Cnd_initX.LIBCPMTD ref: 10001F32
        Memory Dump Source
        • Source File: 0000000B.00000002.1765362311.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
        • Associated: 0000000B.00000002.1765341007.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000B.00000002.1765383434.0000000010003000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000B.00000002.1765401573.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_2_10000000_rundll32.jbxd
        Similarity
        • API ID: Cnd_initstd::_$LocalTime
        • String ID:
        • API String ID: 2173581990-0
        • Opcode ID: b4793d592fb2b4f17ad14db28ac2cb919694318992dcf14b4d0e88b5adc2a56d
        • Instruction ID: ab08f9b404e6e56ca6d1af1f9d924861b249ebe891b5a8bd52601f9c1a157696
        • Opcode Fuzzy Hash: b4793d592fb2b4f17ad14db28ac2cb919694318992dcf14b4d0e88b5adc2a56d
        • Instruction Fuzzy Hash: BA31D2B6E10107A7EF04C7A0DC92ABF7379DF44341F244278F406A7688E635EA149751

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000B.00000002.1765362311.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
        • Associated: 0000000B.00000002.1765341007.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000B.00000002.1765383434.0000000010003000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000B.00000002.1765401573.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_2_10000000_rundll32.jbxd
        Similarity
        • API ID: sscanfstrcmpstrcpystrlen
        • String ID: $ $ $ $
        • API String ID: 968285010-1444812030
        • Opcode ID: fc441633a90b755dcb4422550707a411901617201c66723958dc1d3ceb4db771
        • Instruction ID: 0987e11745ac295f64cab65bdeb32ee07c7e3b358009fc3690f9d3b7a62c3504
        • Opcode Fuzzy Hash: fc441633a90b755dcb4422550707a411901617201c66723958dc1d3ceb4db771
        • Instruction Fuzzy Hash: B43174B6D10208ABEB00CBE8DC95EDFB7BDEF58241F048119F505B7245EA35A6088BB1

        Control-flow Graph

        APIs
        • std::_Cnd_initX.LIBCPMTD ref: 10001C1B
        • std::_Cnd_initX.LIBCPMTD ref: 10001C3E
        • std::_Cnd_initX.LIBCPMTD ref: 10001C4B
        • std::_Cnd_initX.LIBCPMTD ref: 10001C83
        • std::_Cnd_initX.LIBCPMTD ref: 10001C99
        • std::_Cnd_initX.LIBCPMTD ref: 10001CDD
        • std::_Cnd_initX.LIBCPMTD ref: 10001CEA
          • Part of subcall function 10001B7B: std::_Cnd_initX.LIBCPMTD ref: 10001B82
        Memory Dump Source
        • Source File: 0000000B.00000002.1765362311.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
        • Associated: 0000000B.00000002.1765341007.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000B.00000002.1765383434.0000000010003000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000B.00000002.1765401573.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_2_10000000_rundll32.jbxd
        Similarity
        • API ID: Cnd_initstd::_
        • String ID:
        • API String ID: 1955959516-0
        • Opcode ID: ddfdfc050ccffb4585a401765c6c4427e6421c8b209c5b1508180ee8afcb795b
        • Instruction ID: dc694722cb004730e918ccfedee204b95ea9d549ac969d9b2753c64d19c647a2
        • Opcode Fuzzy Hash: ddfdfc050ccffb4585a401765c6c4427e6421c8b209c5b1508180ee8afcb795b
        • Instruction Fuzzy Hash: 8031EAF9D00208BBEB04DFA4DC869DE3BA8EB482A0F14C525FC0D9B245E635F7548B91

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 0000000B.00000002.1765362311.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
        • Associated: 0000000B.00000002.1765341007.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000B.00000002.1765383434.0000000010003000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000B.00000002.1765401573.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_2_10000000_rundll32.jbxd
        Similarity
        • API ID: Cnd_initstd::_$sprintf$strlen
        • String ID:
        • API String ID: 1236961258-0
        • Opcode ID: ecd8c3b1ca777a9503f504438db89ecd3c2de48004d2c6b43dccb86bee299af6
        • Instruction ID: 21d67863bf6faeafbf9df8e54127ddecaf4084e2a1d46c932092d44ed4f8a465
        • Opcode Fuzzy Hash: ecd8c3b1ca777a9503f504438db89ecd3c2de48004d2c6b43dccb86bee299af6
        • Instruction Fuzzy Hash: 6DF036FA9001047BEB04DB68DC56DEF336DDB44294B088524FD1D8B305EA36F71087A2

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 103 10001f78-10001f7e 104 10001f80-10001f86 103->104 105 10001f8e-10001f9f 103->105 108 10001fb6-10001fb8 104->108 109 10001f88 104->109 106 10001fe0-10001fe2 105->106 107 10001fa1-10001fb4 malloc 105->107 112 10001fe4-10001feb 106->112 113 1000201d-1000201f 106->113 107->108 110 10001fba-10001fde _initterm 107->110 111 10002020 108->111 109->105 110->113 112->113 114 10001fed-10001ff4 112->114 113->111 115 10001ff7-10001ff9 114->115 116 10001ffb-10001fff 115->116 117 1000200d-1000201c free 115->117 118 10002001-10002003 116->118 119 10002008-1000200b 116->119 117->113 118->119 119->115
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000B.00000002.1765362311.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
        • Associated: 0000000B.00000002.1765341007.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000B.00000002.1765383434.0000000010003000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000B.00000002.1765401573.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_2_10000000_rundll32.jbxd
        Similarity
        • API ID: _inittermfreemalloc
        • String ID: k{v
        • API String ID: 1678931842-443568515
        • Opcode ID: aeb9f87fe75f09e05d32e0472d00320c0c9aa55d5e1b64bd9f1e61d41ecdf792
        • Instruction ID: 97060b36a5f8e97810dc2dc4be58e409afa948e07d3965cd941dee6dac81ba7b
        • Opcode Fuzzy Hash: aeb9f87fe75f09e05d32e0472d00320c0c9aa55d5e1b64bd9f1e61d41ecdf792
        • Instruction Fuzzy Hash: C81127B2609322CBF314CBA5DCD4B5677A5EB803D1F138029EA42E716DDF31A850CB18

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 121 1000143e-10001452 122 10001464-10001466 121->122 123 10001454-10001462 121->123 125 100014cc-100014cf 122->125 123->122 124 10001468-100014c9 floor _ftol floor _ftol call 10001c13 call 10001db4 123->124 124->125
        APIs
        Memory Dump Source
        • Source File: 0000000B.00000002.1765362311.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
        • Associated: 0000000B.00000002.1765341007.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000B.00000002.1765383434.0000000010003000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000B.00000002.1765401573.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_2_10000000_rundll32.jbxd
        Similarity
        • API ID: _ftolfloor
        • String ID:
        • API String ID: 3596157161-0
        • Opcode ID: e9083ee1baef0c7cac7948eb9dbc3993338635afb221cd1a80c42fd75441a0d5
        • Instruction ID: 0e86c1410bc3e7522d87da5241d59ccba63341cbdfd7e08bb15fc18ea186b650
        • Opcode Fuzzy Hash: e9083ee1baef0c7cac7948eb9dbc3993338635afb221cd1a80c42fd75441a0d5
        • Instruction Fuzzy Hash: AD019E70800509FBEB00DFA8ED497CE7BB8FF407C1F10C164F94891159DB3196A88BA2

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 0000000B.00000002.1765362311.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
        • Associated: 0000000B.00000002.1765341007.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000B.00000002.1765383434.0000000010003000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000B.00000002.1765401573.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_2_10000000_rundll32.jbxd
        Similarity
        • API ID: Cnd_initsprintfstd::_$strlen
        • String ID:
        • API String ID: 2133256109-0
        • Opcode ID: 98827394ca3ec6ca3c5130480201db0136ed86399be691cb16598800973b98f1
        • Instruction ID: bb305d2a609ac81a0d505e7b7bf13d7fd440d2982e166c3b8775b18275a147f2
        • Opcode Fuzzy Hash: 98827394ca3ec6ca3c5130480201db0136ed86399be691cb16598800973b98f1
        • Instruction Fuzzy Hash: 2AF0F4FA9001047BEB00DB64DC46DEB376CDB44294B048424F91D87209E936F6104792

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 154 10001a8a-10001a91 155 10001a93 154->155 156 10001a9a-10001a9e 154->156 155->156 157 10001aa0 156->157 158 10001aa7-10001aea call 1000164f call 1000161b call 100018bf call 100014e0 call 100018d5 156->158 157->158
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000B.00000002.1765362311.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
        • Associated: 0000000B.00000002.1765341007.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000B.00000002.1765383434.0000000010003000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000B.00000002.1765401573.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_2_10000000_rundll32.jbxd
        Similarity
        • API ID: Cnd_initstd::_
        • String ID: ;
        • API String ID: 1955959516-1661535913
        • Opcode ID: cbcfeafc25ac64bf85fea71812c707afced2db451e6267fc3162be5e27dc6e29
        • Instruction ID: b48bdcff954eb0a6557994013d606574a1ae58d02fed3ddc0b1e58f5e04090c1
        • Opcode Fuzzy Hash: cbcfeafc25ac64bf85fea71812c707afced2db451e6267fc3162be5e27dc6e29
        • Instruction Fuzzy Hash: 72F0D0F9900208BBEB40DFA5DC46ADA37ACDB042E4F04C425F91D8B245E779E7548F92

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 139 100018f0-100018f7 140 10001900-10001904 139->140 141 100018f9 139->141 142 10001906 140->142 143 1000190d-10001950 call 100014eb call 10001601 call 100015e7 call 100018a9 call 100018d5 140->143 141->140 142->143
        APIs
        Strings
        Memory Dump Source
        • Source File: 0000000B.00000002.1765362311.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
        • Associated: 0000000B.00000002.1765341007.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000B.00000002.1765383434.0000000010003000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 0000000B.00000002.1765401573.0000000010005000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_11_2_10000000_rundll32.jbxd
        Similarity
        • API ID: Cnd_initstd::_
        • String ID: g
        • API String ID: 1955959516-30677878
        • Opcode ID: 32e702a7540e3795c00ae61329ff3d7ab9576be9a921dc28083833644fc0cff9
        • Instruction ID: b171246b29acb0fe94f1ed34db5e2a6966bd06c2f108ed1415a7fe8fcfe25bdc
        • Opcode Fuzzy Hash: 32e702a7540e3795c00ae61329ff3d7ab9576be9a921dc28083833644fc0cff9
        • Instruction Fuzzy Hash: 2CF0D6F9C00208BBEB00DF95D846BCE37ECDB082A5F04C415F91D9A245E635E7548F91