Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rMA7e8O8iY.dll

Overview

General Information

Sample name:rMA7e8O8iY.dll
(renamed file extension from none to dll, renamed because original name is a hash value)
Original sample name:c151a3024a0f056b00bdf3910f71b7e22370438e19aceb3a418cf7b212b2e75b
Analysis ID:1532504
MD5:78c32c40a80d47d1e39926781ea4d992
SHA1:77300e74d31bcfa2043cc4c4971f7ea2cdc3d231
SHA256:c151a3024a0f056b00bdf3910f71b7e22370438e19aceb3a418cf7b212b2e75b
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
AI detected suspicious sample
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
One or more processes crash
Sample execution stops while process was sleeping (likely an evasion)
Terminates after testing mutex exists (may check infected machine status)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7000 cmdline: loaddll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7020 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7160 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 6348 cmdline: rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • WerFault.exe (PID: 4268 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6348 -s 608 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 5984 cmdline: rundll32.exe C:\Users\user\Desktop\rMA7e8O8iY.dll,GzDHLPTXbfjnZdGY MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 3608 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5984 -s 600 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 6160 cmdline: rundll32.exe C:\Users\user\Desktop\rMA7e8O8iY.dll,bnihrxnmrpio MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 3752 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6160 -s 600 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 560 cmdline: rundll32.exe C:\Users\user\Desktop\rMA7e8O8iY.dll,bnpghteyxrum MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 6372 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 560 -s 592 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 2496 cmdline: rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",GzDHLPTXbfjnZdGY MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4476 cmdline: rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",bnihrxnmrpio MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1732 cmdline: rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",bnpghteyxrum MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1072 cmdline: rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",snozacqpuormqulw MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6092 cmdline: rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",rbfyvzbrlz MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 3488 cmdline: rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",fnyxctjuscq MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: rMA7e8O8iY.dllAvira: detected
Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.6% probability
Source: rMA7e8O8iY.dllJoe Sandbox ML: detected
Source: rMA7e8O8iY.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: rMA7e8O8iY.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: Binary string: C:\oilers\bolfyhh.pdb source: rundll32.exe, 00000003.00000002.1917727365.000000006C7A1000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1941763460.000000006C7A1000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000A.00000002.1928837550.000000006C7A1000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.1954199934.000000006C7A1000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.1795790030.000000006C7A1000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.1795272935.000000006C7A1000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.1797445036.000000006C7A1000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000002.1797881910.000000006C7A1000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.1795854277.000000006C7A1000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000015.00000002.1796507740.000000006C7A1000.00000002.00000001.01000000.00000003.sdmp, rMA7e8O8iY.dll
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C791360 snozacqpuormqulw,GetFileAttributesA,lstrlenA,lstrcpyA,FindFirstFileA,lstrcmpA,lstrcmpA,lstrcpyA,snozacqpuormqulw,FindNextFileA,FindClose,3_2_6C791360
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C791130 FindFirstFileA,FindNextFileA,FindNextFileA,lstrcmpA,lstrcmpA,FindNextFileA,FindClose,3_2_6C791130
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_6C791360 snozacqpuormqulw,GetFileAttributesA,lstrlenA,lstrcpyA,FindFirstFileA,lstrcmpA,lstrcmpA,lstrcpyA,snozacqpuormqulw,FindNextFileA,FindClose,10_2_6C791360
Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C7936403_2_6C793640
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C79DAD03_2_6C79DAD0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_6C79364010_2_6C793640
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5984 -s 600
Source: rMA7e8O8iY.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: classification engineClassification label: mal56.winDLL@28/17@0/0
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\Desktop\IndexerVolumeGuidJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6160
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7020:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess560
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5984
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6348
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\c28384c9-b5f5-48c7-bf6e-018ed4caa0b3Jump to behavior
Source: rMA7e8O8iY.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\rMA7e8O8iY.dll,GzDHLPTXbfjnZdGY
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\rMA7e8O8iY.dll,GzDHLPTXbfjnZdGY
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",#1
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5984 -s 600
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6348 -s 608
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\rMA7e8O8iY.dll,bnihrxnmrpio
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6160 -s 600
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\rMA7e8O8iY.dll,bnpghteyxrum
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 560 -s 592
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",GzDHLPTXbfjnZdGY
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",bnihrxnmrpio
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",bnpghteyxrum
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",snozacqpuormqulw
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",rbfyvzbrlz
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",fnyxctjuscq
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\rMA7e8O8iY.dll,GzDHLPTXbfjnZdGYJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\rMA7e8O8iY.dll,bnihrxnmrpioJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\rMA7e8O8iY.dll,bnpghteyxrumJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",GzDHLPTXbfjnZdGYJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",bnihrxnmrpioJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",bnpghteyxrumJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",snozacqpuormqulwJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",rbfyvzbrlzJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",fnyxctjuscqJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: rMA7e8O8iY.dllStatic file information: File size 6599680 > 1048576
Source: rMA7e8O8iY.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x631400
Source: rMA7e8O8iY.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: rMA7e8O8iY.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\oilers\bolfyhh.pdb source: rundll32.exe, 00000003.00000002.1917727365.000000006C7A1000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1941763460.000000006C7A1000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000A.00000002.1928837550.000000006C7A1000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.1954199934.000000006C7A1000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.1795790030.000000006C7A1000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.1795272935.000000006C7A1000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.1797445036.000000006C7A1000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000002.1797881910.000000006C7A1000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.1795854277.000000006C7A1000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000015.00000002.1796507740.000000006C7A1000.00000002.00000001.01000000.00000003.sdmp, rMA7e8O8iY.dll
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C798A3C LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,3_2_6C798A3C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C796805 push ecx; ret 3_2_6C796818
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C7978B5 push ecx; ret 3_2_6C7978C8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_6C796805 push ecx; ret 10_2_6C796818
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C792080 rbfyvzbrlz,GetModuleFileNameW,OpenMutexA,ExitProcess,FindFirstChangeNotificationA,GetLastError,__cftoe,PathRemoveFileSpecW,lstrcatW,lstrcatW,lstrcatW,_memset,PathStripPathA,GetFileAttributesA,SetFileAttributesA,fnyxctjuscq,GetFileSizeEx,LdrInitializeThunk,3_2_6C792080
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_3-3995
Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_3-3399
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 0.0 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C791360 snozacqpuormqulw,GetFileAttributesA,lstrlenA,lstrcpyA,FindFirstFileA,lstrcmpA,lstrcmpA,lstrcpyA,snozacqpuormqulw,FindNextFileA,FindClose,3_2_6C791360
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C791130 FindFirstFileA,FindNextFileA,FindNextFileA,lstrcmpA,lstrcmpA,FindNextFileA,FindClose,3_2_6C791130
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_6C791360 snozacqpuormqulw,GetFileAttributesA,lstrlenA,lstrcpyA,FindFirstFileA,lstrcmpA,lstrcmpA,lstrcpyA,snozacqpuormqulw,FindNextFileA,FindClose,10_2_6C791360
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: Amcache.hve.8.drBinary or memory string: VMware
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.8.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.8.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.8.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.8.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.8.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.8.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.8.drBinary or memory string: vmci.sys
Source: Amcache.hve.8.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.8.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.8.drBinary or memory string: VMware20,1
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.8.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.8.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.8.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_3-3400
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_3-3911
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C792080 rbfyvzbrlz,GetModuleFileNameW,OpenMutexA,ExitProcess,FindFirstChangeNotificationA,GetLastError,__cftoe,PathRemoveFileSpecW,lstrcatW,lstrcatW,lstrcatW,_memset,PathStripPathA,GetFileAttributesA,SetFileAttributesA,fnyxctjuscq,GetFileSizeEx,LdrInitializeThunk,3_2_6C792080
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C792D14 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_6C792D14
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C798A3C LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,3_2_6C798A3C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C792D14 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_6C792D14
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C7955B4 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_6C7955B4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_6C792D14 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_6C792D14
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C791CC0 lstrcatW,GetCurrentProcess,_memset,CreateFileW,LoadCursorFromFileW,SetCursor,GetFileSizeEx,ReadFile,GetSystemTimeAsFileTime,WideCharToMultiByte,_strpbrk,lstrlenA,FindWindowA,VirtualProtect,3_2_6C791CC0
Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
Native API
1
DLL Side-Loading
11
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Rundll32
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Virtualization/Sandbox Evasion
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets2
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1532504 Sample: rMA7e8O8iY Startdate: 13/10/2024 Architecture: WINDOWS Score: 56 28 Antivirus / Scanner detection for submitted sample 2->28 30 Machine Learning detection for sample 2->30 32 AI detected suspicious sample 2->32 8 loaddll32.exe 1 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 rundll32.exe 8->12         started        14 rundll32.exe 8->14         started        16 8 other processes 8->16 process5 18 rundll32.exe 1 10->18         started        20 WerFault.exe 20 16 12->20         started        22 WerFault.exe 16 14->22         started        24 WerFault.exe 16 16->24         started        process6 26 WerFault.exe 2 16 18->26         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
rMA7e8O8iY.dll100%AviraWORM/Lodbak.Gen
rMA7e8O8iY.dll100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.8.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1532504
Start date and time:2024-10-13 14:04:21 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 48s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:33
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:rMA7e8O8iY.dll
(renamed file extension from none to dll, renamed because original name is a hash value)
Original Sample Name:c151a3024a0f056b00bdf3910f71b7e22370438e19aceb3a418cf7b212b2e75b
Detection:MAL
Classification:mal56.winDLL@28/17@0/0
EGA Information:
  • Successful, ratio: 66.7%
HCA Information:
  • Successful, ratio: 71%
  • Number of executed functions: 5
  • Number of non-executed functions: 14
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 104.208.16.94
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
  • Execution Graph export aborted for target rundll32.exe, PID 1072 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.
TimeTypeDescription
08:05:25API Interceptor1x Sleep call for process: loaddll32.exe modified
08:05:37API Interceptor4x Sleep call for process: WerFault.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.829471987280309
Encrypted:false
SSDEEP:192:zp1iOOvOK0BU/wjeTHzuiFE5PZ24IO8dci:t1iPvIBU/wjezzuiF4Y4IO8dci
MD5:CE19E11EE6251E230642803CD1B8454C
SHA1:4398C675895E1EF41C1D6FDF0ACE654C3D87360A
SHA-256:BB00E197EE14D5BCC3804D10BF09ECA1C77FE02642B28A6C4BAC99B18C0FBB22
SHA-512:D6C45FAAA08222B6B2031FC432AD02C66A9A7B9BC86C5CB168491587A57093693B5F41D4D21DB542ED4F35E0123DE0B1EEDD936D8A7A01AFA76CD86BFF4E42FB
Malicious:false
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.2.9.4.7.1.9.1.8.5.9.9.8.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.2.9.4.7.1.9.5.7.6.6.2.6.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.2.7.9.c.e.3.c.-.6.d.9.e.-.4.2.c.d.-.8.c.2.d.-.4.6.0.2.2.8.f.7.a.e.0.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.1.e.b.f.2.1.7.-.d.3.e.c.-.4.0.2.b.-.b.8.a.8.-.f.3.0.f.3.9.5.2.1.9.2.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.1.0.-.0.0.0.1.-.0.0.1.4.-.c.d.8.6.-.0.1.2.c.6.8.1.d.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8385464546109099
Encrypted:false
SSDEEP:192:94iaOQ60BU/wjeTHzuiFE5PZ24IO84ci:Oi7QBBU/wjezzuiF4Y4IO84ci
MD5:06DBAB7BFBC1779D31178E48E33151BF
SHA1:CD019C59452C7C7A3128C21360DB0645BE7D8904
SHA-256:9181F67DA7EAAF27AC416263E580584DF4E84A1A0CF0365D7E0363DB53C775EC
SHA-512:9C8C7777F76A9D90D5514EE6D83AAB5351F45ABE8AD94872A3E91D18477ABAB865429E0BF414F8B249959F0D86052BCD0010AF0BAAC77C48B1435A44D89FA0C3
Malicious:false
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.2.9.4.7.1.6.3.9.5.3.0.1.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.2.9.4.7.1.7.0.4.9.4.7.2.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.b.a.2.f.f.4.5.-.b.e.2.3.-.4.a.4.a.-.b.7.0.4.-.a.8.5.5.3.d.4.9.b.4.a.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.7.f.f.a.a.e.a.-.5.b.f.7.-.4.3.a.3.-.8.d.9.9.-.d.5.3.5.e.d.4.c.f.7.a.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.6.0.-.0.0.0.1.-.0.0.1.4.-.c.2.8.0.-.2.e.2.a.6.8.1.d.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.2.d.7.!.r.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8383811406633447
Encrypted:false
SSDEEP:192:Lli7O2H60BU/wjeTHzuiFE5PZ24IO84ci:piC2HBBU/wjezzuiF4Y4IO84ci
MD5:0F0B4A06A1DF5B77ACD27E21EDE124B0
SHA1:8AE2D55B144808F4721212EA6E0BBD0BA0D94440
SHA-256:38FDC57864DF7361D9FFACE9017A711F37375F0991E1A5C32CA5B1CAB22D2248
SHA-512:88832339D6B2A258E31F470C631F32693F4F2EE071E4830A99ECD1D83599F9873337735F42980CFB19A0853D4FB25D45FAAF6CAE43E9C87B45DA287A58D704F4
Malicious:false
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.2.9.4.7.1.6.4.0.4.6.6.1.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.2.9.4.7.1.7.0.5.8.8.3.2.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.9.6.a.9.6.e.6.-.a.1.f.d.-.4.5.1.0.-.b.0.3.6.-.0.6.7.b.4.d.b.1.5.b.3.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.f.3.a.4.b.e.f.-.b.b.7.e.-.4.1.7.e.-.b.5.2.3.-.4.a.2.3.6.b.8.9.4.8.f.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.c.c.-.0.0.0.1.-.0.0.1.4.-.0.2.6.d.-.3.5.2.a.6.8.1.d.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.2.d.7.!.r.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8289506529421105
Encrypted:false
SSDEEP:192:7VviUOAKOu0BU/wjeTHzuiFE5PZ24IO8dci:pil1MBU/wjezzuiF4Y4IO8dci
MD5:A87A1907107E7422BD8A27327B63DB76
SHA1:4AB6BB3644AA6977FAD5402D3734F9F67D2CE789
SHA-256:3EB3E090BEDA2238292EF5D0C71AB9D42F5D721C10C3E80F8528DC27E7E36F40
SHA-512:297A1538897644204EC5D4E4D71F211729846693512D2A6CF41C0A7C7C8A0E2AC7216762662623A3C32A67524BD11142C70E0E1054D79A569AC4B78EBA662F36
Malicious:false
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.2.9.4.7.2.2.2.7.5.0.1.4.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.2.9.4.7.2.2.7.2.8.1.4.5.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.c.1.e.9.f.3.9.-.e.6.d.8.-.4.8.d.1.-.8.8.c.a.-.2.1.0.0.9.3.9.7.f.f.1.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.a.c.9.b.c.6.a.-.c.9.f.5.-.4.b.b.e.-.9.3.5.5.-.f.e.8.2.1.5.e.8.7.6.1.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.2.3.0.-.0.0.0.1.-.0.0.1.4.-.0.c.b.2.-.c.d.2.d.6.8.1.d.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Sun Oct 13 12:05:16 2024, 0x1205a4 type
Category:dropped
Size (bytes):41430
Entropy (8bit):2.0164042884954627
Encrypted:false
SSDEEP:192:F/95LCLkwCO5H4CislMdxwALc1yto07kNxAe:dnLeZd5HRlAYBA
MD5:93D29E1A8F97E63B5EA9D0EDEBD89424
SHA1:11768BBB5B98ACDB83A6D2EB1C45BE9EC423C978
SHA-256:1E3A87AC1FBE94451FFAEAC2A5A5988D84714653164465BDEAC8C8F45B0F2360
SHA-512:89F0B26440E81776CE4DB786B6CA98A4D13998503C98AE16174C0984A038A6F58395B7759EAB2DE9AC30B6FB603B5012837112A1CCE6EA071AAC5647728B4F1B
Malicious:false
Preview:MDMP..a..... .......|..g.........................................&..........T.......8...........T......................................x...............................................................................eJ..............GenuineIntel............T.......`...{..g.............................0..=...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Sun Oct 13 12:05:16 2024, 0x1205a4 type
Category:dropped
Size (bytes):42106
Entropy (8bit):1.9846802195345297
Encrypted:false
SSDEEP:192:FX9pLCLNwhmO5H4xjB6FdvuLf7SfBsGhfrbElc:N3LeNwf5Hm6Fd0SfBnr
MD5:3750352F7FE9E226C507458A19DA3833
SHA1:2155CA1878A4F6CA035C833CF50697D2F1F31796
SHA-256:CF96F8A11D140BAD4728E65DD288E59D977F6CD4C0D672FCA4C1CFB1F0BDD1A6
SHA-512:F687CE60D9E99705D8D14E8778B022679BB11AD70E80189450338A42F39AD2B2FFC66D8E2E421C1F306CFAC48C5FC79B02139B9C7D170F8F0B268A7D41078800
Malicious:false
Preview:MDMP..a..... .......|..g.........................................&..........T.......8...........T...........H...2.......................x...............................................................................eJ..............GenuineIntel............T...........{..g.............................0..=...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8364
Entropy (8bit):3.694104983801508
Encrypted:false
SSDEEP:192:R6l7wVeJpbI6ISV6YVG6jgmf8fMprO89bsUsfoEm:R6lXJp06ISV6YE6jgmf8fOsHfK
MD5:C985C1FEEB39C4667771A3D3C2C40F06
SHA1:348E1682F4BF09C2940E9576781A84277ED4F30B
SHA-256:18C36B6D04543FA0255A7E60F8CBE5AEEA63C594D51490A5571D3116C5DE9871
SHA-512:ACFBDDC3F86869E96E7141175D6F777A4A902984D5C5BC990F63A0E32CBDE6A0E8B5F9FF077CCC62A00311C38908F9127F79D22D6082C33E56B26CF742BCA7D5
Malicious:false
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.9.8.4.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8358
Entropy (8bit):3.6945362525848497
Encrypted:false
SSDEEP:192:R6l7wVeJMl6ISB6YjX6Xgmf8fMprO89bsnsfxEm:R6lXJG6ISB6Yz6Xgmf8fOssfn
MD5:2565A790EB7FEB0B54232E5425B526E5
SHA1:6B9C68F3A13DAB9DA92C452C2B670CADAF119687
SHA-256:2736164BD07A380C252313D27BA1375E97905CB793E8CB5E16019FA55D4F2F1A
SHA-512:80269227E531F873BB4914CC7ED727DAD312BC9C8082DC46B2C75510ACB880E580FA406CB595C13B99E70EC4C84387A94ED72EBDDD9392C36C54E4A3D7E79421
Malicious:false
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.3.4.8.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4791
Entropy (8bit):4.484170668589483
Encrypted:false
SSDEEP:48:cvIwWl8zsQiJg77aI90fWpW8VYzYm8M4JCdPHFtDE+q8vjPiGScSrd:uIjfQwI7aO7V3JwAKOJ3rd
MD5:D6164AD1EDDE44E908BA0A5578A418B2
SHA1:2893D19CAAF5F8E95FFE529EC128A6CBE816C72B
SHA-256:CEA52AF2E1156D583AC141DF1C8D64328252138F2C55EFA0995F60C0B76B5A4D
SHA-512:3E5A870D3C9F8F3177FAE242290F78108CC7845D4B0A8282380BE71FC1350574722BC52C9DBE3675C0FE14BC069C9564E1BC264C14071BA8FEF7B410BD134400
Malicious:false
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="541627" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4791
Entropy (8bit):4.485547689532079
Encrypted:false
SSDEEP:48:cvIwWl8zsQiJg77aI90fWpW8VYYYm8M4JCdPHF3Q+q8vjPqmGScShhd:uIjfQwI7aO7VcJZKumJ3hhd
MD5:401CAC13E5787FF2FDB2C8E7CBECACDF
SHA1:896F4C3E5559979247DA4ECDE722E72914A471C6
SHA-256:8A1140F6ACA4AC35F21441DA10F74D9C5D511834EF85A11E2A7162B58E4FB85B
SHA-512:6C0766D8D0E78BA5180327836880CFEC5984C0E91CBC90DF45A9C49E15FFFAE7451C289B74C138BDD42B2B7470460F2D7E2E493321E781E3AE5A4DBFD01E3BA2
Malicious:false
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="541627" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Sun Oct 13 12:05:19 2024, 0x1205a4 type
Category:dropped
Size (bytes):41464
Entropy (8bit):1.9536464049070739
Encrypted:false
SSDEEP:96:5D8wQU64L8ev/Mue88ksRLCkhUZH/Doi75I4v45zph2NGqn68ex8ulpwLquSehoE:uJ9NLCLSO5H40p68exyeCOgSt3/
MD5:1090888F5B0CB2BF54278050161AE0D1
SHA1:99BD02AAE9AFD8209B4ABD9DC72046256501E1F6
SHA-256:0AF9AB917300AED5E2902CB2F0DA12DE381C0A7F3C1A279CE3F37F27CB285048
SHA-512:E70D7BF4670DBA2431C19DE9CEC467E5B167BC553B55DDFB949C3EA67F064D11E60480B45F5ED060CC9C0FD422D2C5235C49AB10DC5D7A5CA65A83E909FE49C4
Malicious:false
Preview:MDMP..a..... ..........g.........................................&..........T.......8...........T...............P.......................x...............................................................................eJ..............GenuineIntel............T...........~..g.............................0..=...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8262
Entropy (8bit):3.692529725557234
Encrypted:false
SSDEEP:192:R6l7wVeJUE6IpmiCh6YVB6KgmfTdMpra89bLm2sf+z5m:R6lXJf6IpY6Yz6KgmfTdqLmVf+A
MD5:5304B6FDE97494046B44A8E4EEADCA19
SHA1:DB7232F28EF619FA405335025962657023FC61C9
SHA-256:0CB236956D0C9A44893AC0ABF632503D38563B93275D3C84C191D589E054D294
SHA-512:6A2F9C4319367EC714A1AF70D8271D6FF1A677DB96468C2BC30EF15FEB0BC22CF9ADFCB28D114E733F9FFAEB85BA590D720AE73EF12FD08A4541369B34F3973B
Malicious:false
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.1.6.0.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4650
Entropy (8bit):4.467840559949726
Encrypted:false
SSDEEP:48:cvIwWl8zsCJg77aI90fWpW8VYvYm8M4JCdPuzPFR+q8/wzcL95GScSDd:uIjfQI7aO7VjJNo95J3Dd
MD5:2CAB450F36A089531F21B2CFC5883F6C
SHA1:BE5FB50BB065930A521E107EE4D217950AE30E90
SHA-256:5E0DB2CCCD82804FC81844309BFAEF97CC7C1F55B0AE65469ECDDBCAC4955335
SHA-512:272C74FB10B1F52C265E36281A05312AEE9B3FD40DD119BAA9E2F11B6E07DDDA1037B424001D538506F34B3031948F7AF15CADA9343FA9330EBDE1EACEF7A190
Malicious:false
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="541628" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Sun Oct 13 12:05:22 2024, 0x1205a4 type
Category:dropped
Size (bytes):43128
Entropy (8bit):1.9026839172113963
Encrypted:false
SSDEEP:192:XAwz9eLCLdt0joO5H4Kd5LNKt8vEzmqpfLHMX5By+L:/zMLedGjv5H9FNKDBLkzy6
MD5:F225B18C3B158D7A7A156ED197796982
SHA1:B19C5F73D79D2B6BDC84A94404B02A7F1AB4912B
SHA-256:23BD7CC14AAB38DBD7EC806EF45C821714BE30839C3D3EEC7C5BD2816BCBCAB3
SHA-512:3E83DBFF0D83CF714555AE862F03C9D27486AB4321EF015AF676B5776DB24BACAF1F555AE823EE6C45676E73EB22B9A93DBBF01F02BC353C47CDBAB7677D1DD8
Malicious:false
Preview:MDMP..a..... ..........g.........................................&..........T.......8...........T......................................x...............................................................................eJ..............GenuineIntel............T.......0......g.............................0..=...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8258
Entropy (8bit):3.692537091815225
Encrypted:false
SSDEEP:192:R6l7wVeJuM6Ipn6YVz62gmfTxMprB89b7usf07pm:R6lXJN6Ipn6YB62gmfTxn7tfB
MD5:E5BC2A7F911C4A3E3D2EA029B6EA4762
SHA1:A6A5014612486D4DCC1CFDA0743E3623461C2420
SHA-256:DCF3B1E9F6053BC6FCA12ACF5C920E3F30E0D797B334E776538565B0AF8DB4D1
SHA-512:905F2E7E98C36B50AC6E8F81E73475750CE6191ECF91EE79CA3008CD4509A076F1A9848DA53E967AAFC78DDE6C7AC3EE155D8D4923DBA78988696F0EE2A13B35
Malicious:false
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.6.0.<./.P.i.d.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4650
Entropy (8bit):4.46638656063785
Encrypted:false
SSDEEP:48:cvIwWl8zsCJg77aI90fWpW8VY3Ym8M4JCdPuzTF5+q8/wzcTGScSwd:uIjfQI7aO7VPJRcJ3wd
MD5:361E7D53D2B0DCF44441404F64DA759B
SHA1:EE56CADDAF585E818C5E1307CA963C45D100BAB3
SHA-256:E9980B019B6AC1A476D505ADF5CD44B031DDDED15F946424BC08AE7FCAEC7598
SHA-512:81C3C4022E370C4F106648A3E6C8C0679AF342A482FF2DCBCB354AC527ABCD42C393839B48D31E895CCE63C71DD552ECF3916C30F33694BC1A36A2F41F6B97AC
Malicious:false
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="541628" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.46624320753057
Encrypted:false
SSDEEP:6144:EIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNxdwBCswSbG:5XD94+WlLZMM6YFHT+G
MD5:6EC10A690F088B16F892315F06445BA8
SHA1:E4C39A8DC4C6D5F9F598A9D635CE4426BF38E9C0
SHA-256:6CB3BDCCA8BB8296A127620B275980C02BC2D968276EC29CC09403AB92C9DFB1
SHA-512:B10966050B7C39D3AADB60531A788E49113EF2C1B638C89065DF8C04887EC092D51453C1414A0246C33C56815FE121E78580C27ECE0439037A7BD7BB097D03E2
Malicious:false
Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmF)`*h.................................................................................................................................................................................................................................................................................................................................................w.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.810145354922082
TrID:
  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
  • Generic Win/DOS Executable (2004/3) 0.20%
  • DOS Executable Generic (2002/1) 0.20%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:rMA7e8O8iY.dll
File size:6'599'680 bytes
MD5:78c32c40a80d47d1e39926781ea4d992
SHA1:77300e74d31bcfa2043cc4c4971f7ea2cdc3d231
SHA256:c151a3024a0f056b00bdf3910f71b7e22370438e19aceb3a418cf7b212b2e75b
SHA512:d502b2a7212fc57466ae4c204794d9ded4d164ccd6f61d02069b60aab3ec718ca27e490b0c1d73c706ec0705fad859c006d17d9e03a996522f02386be6f17ab0
SSDEEP:98304:L093FSbu5+0SIA7d2LxzyrM/M+SEL42/SYqCYcj6JtP+XlAu6mBg:uFE50EZ2LxzjU+xL42KcjIt+yu6F
TLSH:4B663301E82A49F0CBCC307DAD74D330BA5470296B251BFAF7B85C8B5D562F01ABD5A2
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........./...A...A...A..b....A..b....A..b....A.......A...@...A..b....A..b....A..b....A.Rich..A.................PE..L......Y...........
Icon Hash:7ae282899bbab082
Entrypoint:0x1000409b
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x10000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x591E1A16 [Thu May 18 22:03:02 2017 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:a0206f6891f2c05e6d3e84ee463160e0
Instruction
mov edi, edi
push ebp
mov ebp, esp
cmp dword ptr [ebp+0Ch], 01h
jne 00007F753CD49697h
call 00007F753CD4C9E2h
push dword ptr [ebp+08h]
mov ecx, dword ptr [ebp+10h]
mov edx, dword ptr [ebp+0Ch]
call 00007F753CD49581h
pop ecx
pop ebp
retn 000Ch
mov edi, edi
push ebp
mov ebp, esp
sub esp, 20h
mov eax, dword ptr [ebp+08h]
push esi
push edi
push 00000008h
pop ecx
mov esi, 10011248h
lea edi, dword ptr [ebp-20h]
rep movsd
mov dword ptr [ebp-08h], eax
mov eax, dword ptr [ebp+0Ch]
pop edi
mov dword ptr [ebp-04h], eax
pop esi
test eax, eax
je 00007F753CD4969Eh
test byte ptr [eax], 00000008h
je 00007F753CD49699h
mov dword ptr [ebp-0Ch], 01994000h
lea eax, dword ptr [ebp-0Ch]
push eax
push dword ptr [ebp-10h]
push dword ptr [ebp-1Ch]
push dword ptr [ebp-20h]
call dword ptr [100110A0h]
leave
retn 0008h
mov edi, edi
push ebp
mov ebp, esp
sub esp, 00000328h
mov dword ptr [1001A1F0h], eax
mov dword ptr [1001A1ECh], ecx
mov dword ptr [1001A1E8h], edx
mov dword ptr [1001A1E4h], ebx
mov dword ptr [1001A1E0h], esi
mov dword ptr [1001A1DCh], edi
mov word ptr [1001A208h], ss
mov word ptr [1001A1FCh], cs
mov word ptr [1001A1D8h], ds
mov word ptr [1001A1D4h], es
mov word ptr [1001A1D0h], fs
mov word ptr [1001A1CCh], gs
Programming Language:
  • [ASM] VS2010 SP1 build 40219
  • [ C ] VS2010 SP1 build 40219
  • [C++] VS2010 SP1 build 40219
  • [IMP] VS2008 SP1 build 30729
  • [EXP] VS2010 SP1 build 40219
  • [LNK] VS2010 SP1 build 40219
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x187900xc3.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0x17edc0x78.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x1c0000xe30.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x111c00x1c.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x176480x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x110000x188.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xf5940xf600ac11eb61c408c96d73dee32b7b57d93cFalse0.5930513211382114data6.73225533995724IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x110000x78530x7a00da6644db11154152d8cd5405cd2f994cFalse0.4815893954918033data6.16857398365695IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x190000x263c0x1200bf415ed8634332622a0595304655d994False0.3708767361111111data3.937792920066365IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.reloc0x1c0000x18aa0x1a00ada87df48d63a76359eb7b29d5940b5dFalse0.466796875data4.503417224823786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
.rsrc0x1e0000x6312200x631400c3c007570172619d5e97b50591e789b3unknownunknownunknownunknownIMAGE_SCN_MEM_READ
DLLImport
KERNEL32.dlllstrlenA, VerSetConditionMask, GetCurrentProcess, GetSystemTimeAsFileTime, WideCharToMultiByte, GetFileAttributesA, VerifyVersionInfoA, ReadFile, GetModuleFileNameW, CreateFileW, lstrlenW, GetFileSizeEx, FindFirstFileA, GetLastError, SetFileAttributesA, FindClose, OpenMutexA, lstrcmpA, FindFirstChangeNotificationA, lstrcatW, VirtualProtect, lstrcpyA, HeapSize, HeapReAlloc, LoadLibraryW, GetStringTypeW, MultiByteToWideChar, FindNextFileA, ExitProcess, LCMapStringW, RtlUnwind, GetCurrentProcessId, GetTickCount, QueryPerformanceCounter, HeapAlloc, GetCurrentThreadId, DecodePointer, GetCommandLineA, RaiseException, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapFree, IsProcessorFeaturePresent, GetCPInfo, InterlockedIncrement, InterlockedDecrement, GetACP, GetOEMCP, IsValidCodePage, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetModuleHandleW, SetLastError, GetProcAddress, WriteFile, GetStdHandle, HeapCreate, HeapDestroy, SetEnvironmentVariableA, SetEnvironmentVariableW, Sleep, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, SetHandleCount, GetFileType, GetStartupInfoW, GetModuleFileNameA, FreeEnvironmentStringsW, GetEnvironmentStringsW, CompareStringW
USER32.dllSetCursor, IsMenu, GetTopWindow, LoadBitmapA, wsprintfW, GetMenu, RegisterClipboardFormatA, LoadCursorFromFileW, LoadImageA, FindWindowA, GetShellWindow, LoadStringA
GDI32.dllDeleteObject
SHELL32.dll
SHLWAPI.dllPathRemoveFileSpecW, PathStripPathA
NameOrdinalAddress
GzDHLPTXbfjnZdGY10x10002360
bnihrxnmrpio20x10001210
bnpghteyxrum30x10001220
fnyxctjuscq40x100014b0
rbfyvzbrlz50x10002080
snozacqpuormqulw60x10001360
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:08:05:15
Start date:13/10/2024
Path:C:\Windows\System32\loaddll32.exe
Wow64 process (32bit):true
Commandline:loaddll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll"
Imagebase:0x170000
File size:126'464 bytes
MD5 hash:51E6071F9CBA48E79F10C84515AAE618
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:1
Start time:08:05:15
Start date:13/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:2
Start time:08:05:15
Start date:13/10/2024
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",#1
Imagebase:0x240000
File size:236'544 bytes
MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:3
Start time:08:05:15
Start date:13/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\rMA7e8O8iY.dll,GzDHLPTXbfjnZdGY
Imagebase:0x2f0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:4
Start time:08:05:15
Start date:13/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",#1
Imagebase:0x2f0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:8
Start time:08:05:16
Start date:13/10/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5984 -s 600
Imagebase:0x470000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:9
Start time:08:05:16
Start date:13/10/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6348 -s 608
Imagebase:0x470000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:10
Start time:08:05:18
Start date:13/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\rMA7e8O8iY.dll,bnihrxnmrpio
Imagebase:0x2f0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:12
Start time:08:05:19
Start date:13/10/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6160 -s 600
Imagebase:0x470000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:13
Start time:08:05:21
Start date:13/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\rMA7e8O8iY.dll,bnpghteyxrum
Imagebase:0x2f0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:15
Start time:08:05:22
Start date:13/10/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 560 -s 592
Imagebase:0x470000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:16
Start time:08:05:24
Start date:13/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",GzDHLPTXbfjnZdGY
Imagebase:0x2f0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:17
Start time:08:05:25
Start date:13/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",bnihrxnmrpio
Imagebase:0x2f0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:18
Start time:08:05:25
Start date:13/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",bnpghteyxrum
Imagebase:0x2f0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:19
Start time:08:05:25
Start date:13/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",snozacqpuormqulw
Imagebase:0x2f0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:20
Start time:08:05:25
Start date:13/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",rbfyvzbrlz
Imagebase:0x2f0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:21
Start time:08:05:25
Start date:13/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\rMA7e8O8iY.dll",fnyxctjuscq
Imagebase:0x2f0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:10.2%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:12.7%
    Total number of Nodes:898
    Total number of Limit Nodes:7
    execution_graph 3079 6c79409b 3080 6c7940ab 3079->3080 3081 6c7940a6 3079->3081 3085 6c793fa5 3080->3085 3093 6c7973f8 3081->3093 3084 6c7940b9 3086 6c793fb1 _doexit 3085->3086 3090 6c79404e _doexit 3086->3090 3091 6c793ffe ___DllMainCRTStartup 3086->3091 3097 6c793e41 3086->3097 3088 6c79402e 3089 6c793e41 __CRT_INIT@12 143 API calls 3088->3089 3088->3090 3089->3090 3090->3084 3091->3088 3091->3090 3092 6c793e41 __CRT_INIT@12 143 API calls 3091->3092 3092->3088 3094 6c79742a GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 3093->3094 3095 6c79741d 3093->3095 3096 6c797421 3094->3096 3095->3094 3095->3096 3096->3080 3098 6c793e4d _doexit 3097->3098 3099 6c793ecf 3098->3099 3100 6c793e55 3098->3100 3102 6c793f30 3099->3102 3103 6c793ed5 3099->3103 3147 6c795c13 HeapCreate 3100->3147 3104 6c793f8e 3102->3104 3105 6c793f35 3102->3105 3109 6c793ef3 3103->3109 3135 6c793e5e _doexit 3103->3135 3240 6c7959d8 3103->3240 3104->3135 3269 6c79518d 3104->3269 3248 6c794ea6 TlsGetValue 3105->3248 3106 6c793e5a 3108 6c793e65 3106->3108 3106->3135 3148 6c7951fb GetModuleHandleW 3108->3148 3113 6c793f07 3109->3113 3117 6c796e27 __ioterm 3 API calls 3109->3117 3244 6c793f1a 3113->3244 3115 6c793f3a 3121 6c793f52 DecodePointer 3115->3121 3115->3135 3116 6c793e6a __RTC_Initialize 3118 6c793e6e 3116->3118 3124 6c793e7a GetCommandLineA 3116->3124 3119 6c793efd 3117->3119 3171 6c795c31 HeapDestroy 3118->3171 3120 6c794eda __mtterm 6 API calls 3119->3120 3123 6c793f02 3120->3123 3127 6c793f67 3121->3127 3243 6c795c31 HeapDestroy 3123->3243 3172 6c7971ab GetEnvironmentStringsW 3124->3172 3129 6c793f6b 3127->3129 3130 6c793f82 3127->3130 3251 6c794f17 3129->3251 3264 6c7942fb 3130->3264 3134 6c793f72 GetCurrentThreadId 3134->3135 3135->3091 3137 6c793e98 3195 6c794eda 3137->3195 3141 6c793eb8 3146 6c793e73 3141->3146 3235 6c796e27 3141->3235 3146->3135 3147->3106 3149 6c795218 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 3148->3149 3150 6c79520f 3148->3150 3152 6c795262 TlsAlloc 3149->3152 3151 6c794eda __mtterm 6 API calls 3150->3151 3153 6c795214 3151->3153 3155 6c795371 3152->3155 3156 6c7952b0 TlsSetValue 3152->3156 3153->3116 3155->3116 3156->3155 3157 6c7952c1 3156->3157 3280 6c795794 3157->3280 3162 6c795309 DecodePointer 3165 6c79531e 3162->3165 3163 6c79536c 3164 6c794eda __mtterm 6 API calls 3163->3164 3164->3155 3165->3163 3166 6c79533c DecodePointer 3165->3166 3167 6c79534d 3166->3167 3167->3163 3168 6c795351 3167->3168 3169 6c794f17 __CRT_INIT@12 57 API calls 3168->3169 3170 6c795359 GetCurrentThreadId 3169->3170 3170->3155 3171->3146 3173 6c793e8a 3172->3173 3174 6c7971c7 WideCharToMultiByte 3172->3174 3185 6c796be2 GetStartupInfoW 3173->3185 3176 6c7971fc 3174->3176 3177 6c797234 FreeEnvironmentStringsW 3174->3177 3291 6c796471 3176->3291 3177->3173 3180 6c79720a WideCharToMultiByte 3181 6c797228 FreeEnvironmentStringsW 3180->3181 3182 6c79721c 3180->3182 3181->3173 3183 6c7942fb _free 2 API calls 3182->3183 3184 6c797224 3183->3184 3184->3181 3188 6c796c00 3185->3188 3186 6c796dab GetStdHandle 3191 6c796d75 3186->3191 3187 6c796e0f SetHandleCount 3189 6c793e94 3187->3189 3188->3189 3188->3191 3192 6c796d2c InitializeCriticalSectionAndSpinCount 3188->3192 3193 6c796d21 GetFileType 3188->3193 3189->3137 3205 6c7970f0 3189->3205 3190 6c796dbd GetFileType 3190->3191 3191->3186 3191->3187 3191->3190 3194 6c796de3 InitializeCriticalSectionAndSpinCount 3191->3194 3192->3188 3192->3189 3193->3188 3193->3192 3194->3189 3194->3191 3196 6c794ef3 3195->3196 3197 6c794ee4 DecodePointer 3195->3197 3198 6c794f12 3196->3198 3199 6c794f04 TlsFree 3196->3199 3197->3196 3200 6c79666a DeleteCriticalSection 3198->3200 3202 6c796682 3198->3202 3199->3198 3201 6c7942fb _free 2 API calls 3200->3201 3201->3198 3203 6c796694 DeleteCriticalSection 3202->3203 3204 6c7966a2 3202->3204 3203->3202 3204->3118 3206 6c79710a GetModuleFileNameA 3205->3206 3207 6c797105 3205->3207 3208 6c797131 3206->3208 3402 6c794b3d 3207->3402 3406 6c796f56 3208->3406 3211 6c793ea4 3211->3141 3216 6c796e7a 3211->3216 3213 6c796471 __malloc_crt 37 API calls 3214 6c797173 3213->3214 3214->3211 3215 6c796f56 _parse_cmdline 65 API calls 3214->3215 3215->3211 3217 6c796e83 3216->3217 3222 6c796e88 _strlen 3216->3222 3218 6c794b3d ___initmbctable 83 API calls 3217->3218 3218->3222 3219 6c796f0c 3220 6c7942fb _free 2 API calls 3219->3220 3221 6c793ead 3220->3221 3221->3141 3229 6c7957eb 3221->3229 3222->3219 3222->3221 3223 6c796f32 3222->3223 3226 6c796f49 3222->3226 3714 6c794210 3222->3714 3224 6c7942fb _free 2 API calls 3223->3224 3224->3221 3227 6c7956dd __invoke_watson 10 API calls 3226->3227 3228 6c796f55 3227->3228 3231 6c7957f9 __IsNonwritableInCurrentImage 3229->3231 3718 6c7988cd 3231->3718 3232 6c795817 __initterm_e 3234 6c795838 __IsNonwritableInCurrentImage 3232->3234 3721 6c796bcb 3232->3721 3234->3141 3239 6c796e30 3235->3239 3236 6c796e77 3236->3137 3237 6c7942fb _free 2 API calls 3237->3239 3238 6c796e49 DeleteCriticalSection 3238->3239 3239->3236 3239->3237 3239->3238 3241 6c795882 _doexit 47 API calls 3240->3241 3242 6c7959e3 3241->3242 3242->3109 3243->3113 3245 6c793f2d 3244->3245 3246 6c793f1f 3244->3246 3245->3135 3246->3245 3247 6c794eda __mtterm 6 API calls 3246->3247 3247->3245 3249 6c794ebb DecodePointer TlsSetValue 3248->3249 3250 6c794ed6 3248->3250 3249->3250 3250->3115 3780 6c7967c0 3251->3780 3253 6c794f23 GetModuleHandleW 3254 6c79677e __lock 47 API calls 3253->3254 3255 6c794f61 InterlockedIncrement 3254->3255 3781 6c794fb9 3255->3781 3258 6c79677e __lock 47 API calls 3259 6c794f82 3258->3259 3260 6c794b5b ___addlocaleref 8 API calls 3259->3260 3261 6c794fa0 3260->3261 3784 6c794fc2 3261->3784 3263 6c794fad _doexit 3263->3134 3265 6c79432f _free 3264->3265 3266 6c794306 HeapFree 3264->3266 3265->3135 3266->3265 3267 6c79431b 3266->3267 3268 6c794321 GetLastError 3267->3268 3268->3265 3270 6c79519b 3269->3270 3271 6c7951e6 3269->3271 3274 6c7951c8 DecodePointer 3270->3274 3275 6c7951a1 TlsGetValue 3270->3275 3272 6c7951f9 3271->3272 3273 6c7951f0 TlsSetValue 3271->3273 3272->3135 3273->3272 3278 6c7951de 3274->3278 3276 6c7951b4 TlsGetValue 3275->3276 3277 6c7951c4 3275->3277 3276->3277 3277->3274 3789 6c79505e 3278->3789 3289 6c794e94 EncodePointer 3280->3289 3282 6c79579c __init_pointers __initp_misc_winsig 3290 6c798699 EncodePointer 3282->3290 3284 6c7952c6 EncodePointer EncodePointer EncodePointer EncodePointer 3285 6c796604 3284->3285 3286 6c79660f 3285->3286 3287 6c796619 InitializeCriticalSectionAndSpinCount 3286->3287 3288 6c795305 3286->3288 3287->3286 3287->3288 3288->3162 3288->3163 3289->3282 3290->3284 3293 6c79647a 3291->3293 3294 6c7964b0 3293->3294 3295 6c796491 Sleep 3293->3295 3297 6c793514 3293->3297 3294->3177 3294->3180 3296 6c7964a6 3295->3296 3296->3293 3296->3294 3298 6c793591 3297->3298 3303 6c793522 3297->3303 3299 6c795c54 __realloc_crt DecodePointer 3298->3299 3307 6c79357b 3299->3307 3301 6c793550 RtlAllocateHeap 3301->3303 3301->3307 3303->3301 3304 6c79352d 3303->3304 3303->3307 3344 6c795c54 DecodePointer 3303->3344 3304->3303 3308 6c795bda 3304->3308 3317 6c795a2b 3304->3317 3341 6c79576a 3304->3341 3307->3293 3346 6c798cea 3308->3346 3310 6c795be1 3311 6c798cea __NMSG_WRITE 11 API calls 3310->3311 3314 6c795bee 3310->3314 3311->3314 3312 6c795a2b __NMSG_WRITE 31 API calls 3313 6c795c06 3312->3313 3316 6c795a2b __NMSG_WRITE 31 API calls 3313->3316 3314->3312 3315 6c795c10 3314->3315 3315->3304 3316->3315 3318 6c795a4c __NMSG_WRITE 3317->3318 3320 6c798cea __NMSG_WRITE 11 API calls 3318->3320 3340 6c795b68 3318->3340 3322 6c795a66 3320->3322 3321 6c795bd8 3321->3304 3323 6c795b77 GetStdHandle 3322->3323 3324 6c798cea __NMSG_WRITE 11 API calls 3322->3324 3325 6c795b85 _strlen 3323->3325 3323->3340 3326 6c795a77 3324->3326 3330 6c795bbb WriteFile 3325->3330 3325->3340 3326->3323 3327 6c795a89 3326->3327 3327->3340 3363 6c79640e 3327->3363 3330->3340 3331 6c795ab5 GetModuleFileNameW 3332 6c795ad6 3331->3332 3336 6c795ae2 _wcslen 3331->3336 3333 6c79640e __NMSG_WRITE 11 API calls 3332->3333 3333->3336 3334 6c7956dd __invoke_watson 10 API calls 3334->3336 3335 6c798ba8 11 API calls __NMSG_WRITE 3335->3336 3336->3334 3336->3335 3338 6c795b58 3336->3338 3367 6c798c1d 3336->3367 3371 6c798a3c 3338->3371 3389 6c792d14 3340->3389 3399 6c79573f GetModuleHandleW 3341->3399 3345 6c795c69 3344->3345 3345->3303 3348 6c798cf6 3346->3348 3347 6c798d00 3347->3310 3348->3347 3351 6c79572f 3348->3351 3354 6c795702 DecodePointer 3351->3354 3355 6c795717 3354->3355 3360 6c7956dd 3355->3360 3357 6c79572e 3358 6c795702 __controlfp_s 10 API calls 3357->3358 3359 6c79573b 3358->3359 3359->3310 3361 6c7955b4 __call_reportfault 8 API calls 3360->3361 3362 6c7956ef GetCurrentProcess TerminateProcess 3361->3362 3362->3357 3365 6c79641c 3363->3365 3364 6c79572f __controlfp_s 11 API calls 3366 6c795aaa 3364->3366 3365->3364 3365->3366 3366->3331 3366->3336 3370 6c798c2f 3367->3370 3368 6c798c38 3368->3336 3369 6c79572f __controlfp_s 11 API calls 3369->3368 3370->3368 3370->3369 3397 6c794e94 EncodePointer 3371->3397 3373 6c798a62 3374 6c798aef 3373->3374 3375 6c798a72 LoadLibraryW 3373->3375 3380 6c798b09 DecodePointer DecodePointer 3374->3380 3387 6c798b1c 3374->3387 3376 6c798a87 GetProcAddress 3375->3376 3383 6c798b87 3375->3383 3379 6c798a9d 7 API calls 3376->3379 3376->3383 3377 6c798b7b DecodePointer 3377->3383 3378 6c798b52 DecodePointer 3378->3377 3385 6c798b59 3378->3385 3379->3374 3382 6c798adf GetProcAddress EncodePointer 3379->3382 3380->3387 3381 6c792d14 __except1 5 API calls 3384 6c798ba6 3381->3384 3382->3374 3383->3381 3384->3340 3385->3377 3386 6c798b6c DecodePointer 3385->3386 3386->3377 3388 6c798b3f 3386->3388 3387->3377 3387->3378 3387->3388 3388->3377 3390 6c792d1c 3389->3390 3391 6c792d1e IsDebuggerPresent 3389->3391 3390->3321 3398 6c797493 3391->3398 3394 6c7941d7 SetUnhandledExceptionFilter UnhandledExceptionFilter 3395 6c7941fc GetCurrentProcess TerminateProcess 3394->3395 3396 6c7941f4 __call_reportfault 3394->3396 3395->3321 3396->3395 3397->3373 3398->3394 3400 6c795763 ExitProcess 3399->3400 3401 6c795753 GetProcAddress 3399->3401 3401->3400 3403 6c794b4d 3402->3403 3404 6c794b46 3402->3404 3403->3206 3412 6c7949a3 3404->3412 3408 6c796f75 3406->3408 3410 6c796fe2 3408->3410 3708 6c7996b8 3408->3708 3409 6c7970e0 3409->3211 3409->3213 3410->3409 3411 6c7996b8 65 API calls _parse_cmdline 3410->3411 3411->3410 3413 6c7949af _doexit 3412->3413 3441 6c795044 3413->3441 3417 6c7949c2 3461 6c79473e 3417->3461 3420 6c796471 __malloc_crt 37 API calls 3421 6c7949e3 3420->3421 3429 6c794b02 _doexit 3421->3429 3468 6c7947ba 3421->3468 3424 6c794b0f 3424->3429 3431 6c7942fb _free 2 API calls 3424->3431 3425 6c794a13 InterlockedDecrement 3426 6c794a23 3425->3426 3427 6c794a34 InterlockedIncrement 3425->3427 3426->3427 3430 6c7942fb _free 2 API calls 3426->3430 3428 6c794a4a 3427->3428 3427->3429 3428->3429 3478 6c79677e 3428->3478 3429->3403 3432 6c794a33 3430->3432 3431->3429 3432->3427 3435 6c794a5e InterlockedDecrement 3436 6c794ada 3435->3436 3437 6c794aed InterlockedIncrement 3435->3437 3436->3437 3439 6c7942fb _free 2 API calls 3436->3439 3485 6c794b04 3437->3485 3440 6c794aec 3439->3440 3440->3437 3442 6c79504c 3441->3442 3443 6c7949b8 3442->3443 3488 6c7959e7 3442->3488 3445 6c79469a 3443->3445 3446 6c7946a6 _doexit 3445->3446 3447 6c795044 __getptd 47 API calls 3446->3447 3448 6c7946ab 3447->3448 3449 6c79677e __lock 47 API calls 3448->3449 3451 6c7946bd 3448->3451 3452 6c7946db 3449->3452 3450 6c7946cb _doexit 3450->3417 3451->3450 3454 6c7959e7 __amsg_exit 47 API calls 3451->3454 3453 6c794724 3452->3453 3456 6c79470c InterlockedIncrement 3452->3456 3457 6c7946f2 InterlockedDecrement 3452->3457 3527 6c794735 3453->3527 3454->3450 3456->3453 3457->3456 3458 6c7946fd 3457->3458 3458->3456 3459 6c7942fb _free 2 API calls 3458->3459 3460 6c79470b 3459->3460 3460->3456 3531 6c7931cc 3461->3531 3464 6c79477b 3466 6c794780 GetACP 3464->3466 3467 6c79476d 3464->3467 3465 6c79475d GetOEMCP 3465->3467 3466->3467 3467->3420 3467->3429 3469 6c79473e getSystemCP 67 API calls 3468->3469 3470 6c7947da 3469->3470 3471 6c7947e5 setSBCS 3470->3471 3473 6c794829 IsValidCodePage 3470->3473 3476 6c79484e _memset __setmbcp_nolock 3470->3476 3472 6c792d14 __except1 5 API calls 3471->3472 3474 6c7949a1 3472->3474 3473->3471 3475 6c79483b GetCPInfo 3473->3475 3474->3424 3474->3425 3475->3471 3475->3476 3622 6c79450a GetCPInfo 3476->3622 3479 6c796793 3478->3479 3480 6c7967a6 EnterCriticalSection 3478->3480 3683 6c7966bc 3479->3683 3480->3435 3482 6c796799 3482->3480 3483 6c7959e7 __amsg_exit 46 API calls 3482->3483 3484 6c7967a5 3483->3484 3484->3480 3707 6c7966a5 LeaveCriticalSection 3485->3707 3487 6c794b0b 3487->3429 3489 6c795bda __FF_MSGBANNER 31 API calls 3488->3489 3490 6c7959f1 3489->3490 3491 6c795a2b __NMSG_WRITE 31 API calls 3490->3491 3492 6c7959f9 3491->3492 3495 6c7959c2 3492->3495 3498 6c795882 3495->3498 3497 6c7959d3 3499 6c79588e _doexit 3498->3499 3500 6c79677e __lock 42 API calls 3499->3500 3501 6c795895 3500->3501 3502 6c7958c0 DecodePointer 3501->3502 3508 6c79593f 3501->3508 3504 6c7958d7 DecodePointer 3502->3504 3502->3508 3517 6c7958ea 3504->3517 3506 6c7959bc _doexit 3506->3497 3521 6c7959ad 3508->3521 3509 6c7959a4 3511 6c79576a _doexit 3 API calls 3509->3511 3512 6c7959ad 3511->3512 3513 6c7959ba 3512->3513 3526 6c7966a5 LeaveCriticalSection 3512->3526 3513->3497 3514 6c795901 DecodePointer 3520 6c794e94 EncodePointer 3514->3520 3517->3508 3517->3514 3518 6c795910 DecodePointer DecodePointer 3517->3518 3519 6c794e94 EncodePointer 3517->3519 3518->3517 3519->3517 3520->3517 3522 6c79598d 3521->3522 3523 6c7959b3 3521->3523 3522->3506 3525 6c7966a5 LeaveCriticalSection 3522->3525 3524 6c7966a5 _doexit LeaveCriticalSection 3523->3524 3524->3522 3525->3509 3526->3513 3530 6c7966a5 LeaveCriticalSection 3527->3530 3529 6c79473c 3529->3451 3530->3529 3532 6c7931df 3531->3532 3536 6c79322c 3531->3536 3533 6c795044 __getptd 47 API calls 3532->3533 3535 6c7931e4 3533->3535 3534 6c79320c 3534->3536 3538 6c79469a __setmbcp 49 API calls 3534->3538 3535->3534 3539 6c794e1b 3535->3539 3536->3464 3536->3465 3538->3536 3540 6c794e27 _doexit 3539->3540 3541 6c795044 __getptd 47 API calls 3540->3541 3542 6c794e2c 3541->3542 3543 6c794e5a 3542->3543 3545 6c794e3e 3542->3545 3544 6c79677e __lock 47 API calls 3543->3544 3546 6c794e61 3544->3546 3547 6c795044 __getptd 47 API calls 3545->3547 3554 6c794dce 3546->3554 3549 6c794e43 3547->3549 3552 6c794e51 _doexit 3549->3552 3553 6c7959e7 __amsg_exit 47 API calls 3549->3553 3552->3534 3553->3552 3555 6c794ddb 3554->3555 3556 6c794e10 3554->3556 3555->3556 3565 6c794b5b InterlockedIncrement 3555->3565 3562 6c794e88 3556->3562 3558 6c794df1 3558->3556 3577 6c794bea 3558->3577 3621 6c7966a5 LeaveCriticalSection 3562->3621 3564 6c794e8f 3564->3549 3566 6c794b79 InterlockedIncrement 3565->3566 3567 6c794b7c 3565->3567 3566->3567 3568 6c794b89 3567->3568 3569 6c794b86 InterlockedIncrement 3567->3569 3570 6c794b93 InterlockedIncrement 3568->3570 3571 6c794b96 3568->3571 3569->3568 3570->3571 3572 6c794ba0 InterlockedIncrement 3571->3572 3574 6c794ba3 3571->3574 3572->3574 3573 6c794bbc InterlockedIncrement 3573->3574 3574->3573 3575 6c794bcc InterlockedIncrement 3574->3575 3576 6c794bd7 InterlockedIncrement 3574->3576 3575->3574 3576->3558 3578 6c794bfb InterlockedDecrement 3577->3578 3579 6c794c7e 3577->3579 3580 6c794c10 InterlockedDecrement 3578->3580 3581 6c794c13 3578->3581 3579->3556 3591 6c794c83 3579->3591 3580->3581 3582 6c794c1d InterlockedDecrement 3581->3582 3583 6c794c20 3581->3583 3582->3583 3584 6c794c2a InterlockedDecrement 3583->3584 3585 6c794c2d 3583->3585 3584->3585 3586 6c794c37 InterlockedDecrement 3585->3586 3587 6c794c3a 3585->3587 3586->3587 3588 6c794c53 InterlockedDecrement 3587->3588 3589 6c794c63 InterlockedDecrement 3587->3589 3590 6c794c6e InterlockedDecrement 3587->3590 3588->3587 3589->3587 3590->3579 3592 6c794d07 3591->3592 3593 6c794c9a 3591->3593 3594 6c794d54 3592->3594 3595 6c7942fb _free HeapFree GetLastError 3592->3595 3593->3592 3602 6c7942fb _free HeapFree GetLastError 3593->3602 3604 6c794cce 3593->3604 3596 6c797cbe ___free_lc_time HeapFree GetLastError 3594->3596 3612 6c794d7d 3594->3612 3597 6c794d28 3595->3597 3598 6c794d72 3596->3598 3599 6c7942fb _free HeapFree GetLastError 3597->3599 3603 6c7942fb _free HeapFree GetLastError 3598->3603 3605 6c794d3b 3599->3605 3600 6c7942fb _free HeapFree GetLastError 3608 6c794cfc 3600->3608 3601 6c794dc2 3609 6c7942fb _free HeapFree GetLastError 3601->3609 3610 6c794cc3 3602->3610 3603->3612 3606 6c7942fb _free HeapFree GetLastError 3604->3606 3620 6c794cef 3604->3620 3607 6c7942fb _free HeapFree GetLastError 3605->3607 3611 6c794ce4 3606->3611 3613 6c794d49 3607->3613 3615 6c7942fb _free HeapFree GetLastError 3608->3615 3616 6c794dc8 3609->3616 3617 6c79809e ___free_lconv_mon HeapFree GetLastError 3610->3617 3618 6c798035 ___free_lconv_num HeapFree GetLastError 3611->3618 3612->3601 3614 6c7942fb HeapFree GetLastError _free 3612->3614 3619 6c7942fb _free HeapFree GetLastError 3613->3619 3614->3612 3615->3592 3616->3556 3617->3604 3618->3620 3619->3594 3620->3600 3621->3564 3623 6c7945f2 3622->3623 3626 6c79453e _memset 3622->3626 3628 6c792d14 __except1 5 API calls 3623->3628 3632 6c797c7e 3626->3632 3630 6c794698 3628->3630 3630->3476 3631 6c797b51 ___crtLCMapStringA 71 API calls 3631->3623 3633 6c7931cc ___crtLCMapStringA 65 API calls 3632->3633 3634 6c797c91 3633->3634 3642 6c797b97 3634->3642 3637 6c797b51 3638 6c7931cc ___crtLCMapStringA 65 API calls 3637->3638 3639 6c797b64 3638->3639 3659 6c79796a 3639->3659 3643 6c797bc0 MultiByteToWideChar 3642->3643 3644 6c797bb5 3642->3644 3646 6c797bed 3643->3646 3654 6c797be9 3643->3654 3644->3643 3645 6c792d14 __except1 5 API calls 3647 6c7945ad 3645->3647 3648 6c797c02 _memset __crtLCMapStringA_stat 3646->3648 3649 6c793514 std::exception::_Copy_str 36 API calls 3646->3649 3647->3637 3650 6c797c3b MultiByteToWideChar 3648->3650 3648->3654 3649->3648 3651 6c797c51 GetStringTypeW 3650->3651 3652 6c797c62 3650->3652 3651->3652 3655 6c79794a 3652->3655 3654->3645 3656 6c797967 3655->3656 3657 6c797956 3655->3657 3656->3654 3657->3656 3658 6c7942fb _free HeapFree GetLastError 3657->3658 3658->3656 3661 6c797988 MultiByteToWideChar 3659->3661 3662 6c7979e6 3661->3662 3664 6c7979ed 3661->3664 3663 6c792d14 __except1 5 API calls 3662->3663 3666 6c7945cd 3663->3666 3667 6c793514 std::exception::_Copy_str 36 API calls 3664->3667 3672 6c797a06 __crtLCMapStringA_stat 3664->3672 3665 6c797a3a MultiByteToWideChar 3668 6c797a53 LCMapStringW 3665->3668 3682 6c797b32 3665->3682 3666->3631 3667->3672 3670 6c797a72 3668->3670 3668->3682 3669 6c79794a __freea 2 API calls 3669->3662 3671 6c797a7c 3670->3671 3674 6c797aa5 3670->3674 3673 6c797a90 LCMapStringW 3671->3673 3671->3682 3672->3662 3672->3665 3673->3682 3676 6c797ac0 __crtLCMapStringA_stat 3674->3676 3679 6c793514 std::exception::_Copy_str 36 API calls 3674->3679 3675 6c797af4 LCMapStringW 3677 6c797b0a WideCharToMultiByte 3675->3677 3678 6c797b2c 3675->3678 3676->3675 3676->3682 3677->3678 3680 6c79794a __freea 2 API calls 3678->3680 3679->3676 3680->3682 3682->3669 3684 6c7966c8 _doexit 3683->3684 3685 6c7966ee 3684->3685 3686 6c795bda __FF_MSGBANNER 31 API calls 3684->3686 3688 6c796471 __malloc_crt 37 API calls 3685->3688 3692 6c7966fe _doexit 3685->3692 3687 6c7966dd 3686->3687 3689 6c795a2b __NMSG_WRITE 31 API calls 3687->3689 3690 6c796709 3688->3690 3691 6c7966e4 3689->3691 3690->3692 3693 6c79677e __lock 46 API calls 3690->3693 3694 6c79576a _doexit 3 API calls 3691->3694 3692->3482 3695 6c796726 3693->3695 3694->3685 3696 6c796759 3695->3696 3697 6c79672e InitializeCriticalSectionAndSpinCount 3695->3697 3699 6c7942fb _free 2 API calls 3696->3699 3698 6c79673e 3697->3698 3702 6c796744 3697->3702 3700 6c7942fb _free 2 API calls 3698->3700 3699->3702 3700->3702 3703 6c796775 3702->3703 3706 6c7966a5 LeaveCriticalSection 3703->3706 3705 6c79677c 3705->3692 3706->3705 3707->3487 3711 6c799665 3708->3711 3712 6c7931cc ___crtLCMapStringA 65 API calls 3711->3712 3713 6c799678 3712->3713 3713->3408 3716 6c79421e 3714->3716 3715 6c79572f __controlfp_s 11 API calls 3717 6c794234 3715->3717 3716->3715 3716->3717 3717->3222 3719 6c7988d3 EncodePointer 3718->3719 3719->3719 3720 6c7988ed 3719->3720 3720->3232 3724 6c796b8f 3721->3724 3723 6c796bd8 3723->3234 3725 6c796b9b _doexit 3724->3725 3732 6c795782 3725->3732 3731 6c796bbc _doexit 3731->3723 3733 6c79677e __lock 47 API calls 3732->3733 3734 6c795789 3733->3734 3735 6c796aa8 DecodePointer DecodePointer 3734->3735 3736 6c796b57 3735->3736 3737 6c796ad6 3735->3737 3746 6c796bc5 3736->3746 3737->3736 3749 6c799632 3737->3749 3739 6c796b3a EncodePointer EncodePointer 3739->3736 3740 6c796ae8 3740->3739 3741 6c796b0c 3740->3741 3754 6c796502 3740->3754 3741->3736 3743 6c796502 __realloc_crt 42 API calls 3741->3743 3744 6c796b28 EncodePointer 3741->3744 3745 6c796b22 3743->3745 3744->3739 3745->3736 3745->3744 3776 6c79578b 3746->3776 3750 6c79963d 3749->3750 3751 6c799652 HeapSize 3749->3751 3752 6c79572f __controlfp_s 11 API calls 3750->3752 3751->3740 3753 6c79964d 3752->3753 3753->3740 3758 6c79650b 3754->3758 3756 6c79654a 3756->3741 3757 6c79652b Sleep 3757->3758 3758->3756 3758->3757 3759 6c7993bb 3758->3759 3760 6c7993d1 3759->3760 3761 6c7993c6 3759->3761 3763 6c7993d9 3760->3763 3769 6c7993e6 3760->3769 3762 6c793514 std::exception::_Copy_str 36 API calls 3761->3762 3764 6c7993ce 3762->3764 3765 6c7942fb _free 2 API calls 3763->3765 3764->3758 3770 6c7993e1 _free 3765->3770 3766 6c79941e 3768 6c795c54 __realloc_crt DecodePointer 3766->3768 3767 6c7993ee HeapReAlloc 3767->3769 3767->3770 3768->3770 3769->3766 3769->3767 3771 6c79944e 3769->3771 3772 6c795c54 __realloc_crt DecodePointer 3769->3772 3774 6c799436 3769->3774 3770->3758 3773 6c799453 GetLastError 3771->3773 3772->3769 3773->3770 3775 6c79943b GetLastError 3774->3775 3775->3770 3779 6c7966a5 LeaveCriticalSection 3776->3779 3778 6c795792 3778->3731 3779->3778 3780->3253 3787 6c7966a5 LeaveCriticalSection 3781->3787 3783 6c794f7b 3783->3258 3788 6c7966a5 LeaveCriticalSection 3784->3788 3786 6c794fc9 3786->3263 3787->3783 3788->3786 3790 6c79506a _doexit 3789->3790 3791 6c795082 3790->3791 3792 6c7942fb _free 2 API calls 3790->3792 3794 6c79516c _doexit 3790->3794 3793 6c795090 3791->3793 3795 6c7942fb _free 2 API calls 3791->3795 3792->3791 3796 6c79509e 3793->3796 3797 6c7942fb _free 2 API calls 3793->3797 3794->3271 3795->3793 3798 6c7950ac 3796->3798 3800 6c7942fb _free 2 API calls 3796->3800 3797->3796 3799 6c7950ba 3798->3799 3801 6c7942fb _free 2 API calls 3798->3801 3802 6c7950c8 3799->3802 3803 6c7942fb _free 2 API calls 3799->3803 3800->3798 3801->3799 3804 6c7942fb _free 2 API calls 3802->3804 3806 6c7950d6 3802->3806 3803->3802 3804->3806 3805 6c7950e7 3807 6c79677e __lock 47 API calls 3805->3807 3806->3805 3808 6c7942fb _free 2 API calls 3806->3808 3809 6c7950ef 3807->3809 3808->3805 3810 6c7950fb InterlockedDecrement 3809->3810 3811 6c795114 3809->3811 3810->3811 3812 6c795106 3810->3812 3825 6c795178 3811->3825 3812->3811 3815 6c7942fb _free 2 API calls 3812->3815 3815->3811 3816 6c79677e __lock 47 API calls 3817 6c795128 3816->3817 3818 6c795159 3817->3818 3820 6c794bea ___removelocaleref 8 API calls 3817->3820 3828 6c795184 3818->3828 3823 6c79513d 3820->3823 3822 6c7942fb _free 2 API calls 3822->3794 3823->3818 3824 6c794c83 ___freetlocinfo 2 API calls 3823->3824 3824->3818 3831 6c7966a5 LeaveCriticalSection 3825->3831 3827 6c795121 3827->3816 3832 6c7966a5 LeaveCriticalSection 3828->3832 3830 6c795166 3830->3822 3831->3827 3832->3830 4090 6c79adda 4091 6c79ade4 __cfltcvt_init 4090->4091 4092 6c79adef 4091->4092 4094 6c79befe 4091->4094 4099 6c79d92f 4094->4099 4096 6c79bf13 4097 6c79bf24 4096->4097 4098 6c7956dd __invoke_watson 10 API calls 4096->4098 4097->4092 4098->4097 4100 6c79d94d 4099->4100 4102 6c79d96d 4099->4102 4101 6c79572f __controlfp_s 11 API calls 4100->4101 4101->4102 4102->4096 3833 6c796471 3835 6c79647a 3833->3835 3834 6c793514 std::exception::_Copy_str 36 API calls 3834->3835 3835->3834 3836 6c7964b0 3835->3836 3837 6c796491 Sleep 3835->3837 3838 6c7964a6 3837->3838 3838->3835 3838->3836 3839 6c792360 3840 6c792389 3839->3840 3841 6c79240c rbfyvzbrlz LoadStringA RegisterClipboardFormatA snozacqpuormqulw LoadBitmapA 3839->3841 3840->3841 3842 6c792458 3841->3842 3853 6c79b310 3842->3853 3844 6c7924cf 3861 6c79b06a 3844->3861 3847 6c79253a _memset 3865 6c791130 FindFirstFileA 3847->3865 3848 6c79250b _calloc 3848->3847 3850 6c79256b 3851 6c792d14 __except1 5 API calls 3850->3851 3852 6c792580 3851->3852 3854 6c79b31d 3853->3854 3857 6c79d3cc __ctrlfp __floor_pentium4 3853->3857 3855 6c79b34e 3854->3855 3854->3857 3856 6c79b398 3855->3856 3879 6c79d100 3855->3879 3856->3844 3860 6c79d417 __ctrlfp __floor_pentium4 3857->3860 3882 6c79e109 3857->3882 3860->3844 3862 6c79c750 3861->3862 3892 6c79c813 3862->3892 3866 6c791168 3865->3866 3867 6c79117b FindNextFileA 3865->3867 3868 6c792d14 __except1 5 API calls 3866->3868 3869 6c79118f 3867->3869 3870 6c7911c0 FindClose 3867->3870 3872 6c791177 3868->3872 3873 6c7911a0 lstrcmpA 3869->3873 3871 6c792d14 __except1 5 API calls 3870->3871 3874 6c7911d6 3871->3874 3872->3850 3875 6c7911da 3873->3875 3876 6c7911b2 FindNextFileA 3873->3876 3874->3850 3877 6c792d14 __except1 5 API calls 3875->3877 3876->3870 3876->3873 3878 6c791200 3877->3878 3878->3850 3880 6c79d118 DecodePointer 3879->3880 3881 6c79d126 3879->3881 3880->3881 3881->3856 3883 6c79e13f __handle_exc 3882->3883 3885 6c79e166 __except1 __umatherr __ctrlfp 3883->3885 3888 6c79dad0 3883->3888 3886 6c792d14 __except1 5 API calls 3885->3886 3887 6c79e1cc 3886->3887 3887->3860 3889 6c79daf7 __raise_exc_ex 3888->3889 3890 6c79dcea RaiseException 3889->3890 3891 6c79dd03 3890->3891 3891->3885 3893 6c7924df RealDriveType 3892->3893 3894 6c79c81c 3892->3894 3893->3847 3893->3848 3894->3893 3896 6c79d98e 3894->3896 3897 6c79d9cb __handle_exc 3896->3897 3899 6c79d9ee __except1 __umatherr __ctrlfp 3897->3899 3902 6c79ddac 3897->3902 3900 6c792d14 __except1 5 API calls 3899->3900 3901 6c79dac6 3900->3901 3901->3893 3903 6c79dad0 __raise_exc_ex RaiseException 3902->3903 3904 6c79ddca 3903->3904 3904->3899 3905 6c792080 3942 6c793dc1 3905->3942 3908 6c793514 std::exception::_Copy_str 36 API calls 3909 6c7920b3 GetModuleFileNameW OpenMutexA 3908->3909 3910 6c7920fb 3909->3910 3911 6c7920f4 ExitProcess 3909->3911 3913 6c79211f 3910->3913 3954 6c791240 3910->3954 3914 6c79b06a 6 API calls 3913->3914 3915 6c792146 3914->3915 3916 6c7921a0 FindFirstChangeNotificationA 3915->3916 4003 6c79b200 3915->4003 3918 6c7921cf 3916->3918 3919 6c7921c7 GetLastError 3916->3919 3957 6c793a11 3918->3957 3919->3918 3920 6c792164 3921 6c79b06a 6 API calls 3920->3921 3923 6c792181 3921->3923 3923->3916 3928 6c792265 3967 6c791040 3928->3967 3930 6c792296 3975 6c791cc0 GetCurrentProcess 3930->3975 3932 6c7922a0 GetFileAttributesA 3933 6c7922c0 3932->3933 3934 6c7922b3 SetFileAttributesA 3932->3934 3935 6c793dc1 58 API calls 3933->3935 3934->3933 3936 6c7922d6 3935->3936 3937 6c7922f9 fnyxctjuscq GetFileSizeEx 3936->3937 3938 6c79232b 3937->3938 3939 6c792335 LdrInitializeThunk 3937->3939 3938->3939 3940 6c792d14 __except1 5 API calls 3939->3940 3941 6c792359 3940->3941 3944 6c793dcb 3942->3944 3943 6c793514 std::exception::_Copy_str 36 API calls 3943->3944 3944->3943 3945 6c7920a4 3944->3945 3946 6c795c54 __realloc_crt DecodePointer 3944->3946 3949 6c793de7 std::exception::exception 3944->3949 3945->3908 3946->3944 3947 6c793e25 4011 6c792e39 3947->4011 3949->3947 3951 6c796bcb __cinit 57 API calls 3949->3951 3951->3947 3953 6c793e40 3955 6c792d14 __except1 5 API calls 3954->3955 3956 6c791354 3955->3956 3956->3910 4033 6c79395f 3957->4033 3959 6c7921f1 PathRemoveFileSpecW lstrcatW lstrcatW 3960 6c7978d0 3959->3960 3961 6c79222e PathStripPathA 3960->3961 3962 6c79b0d0 3961->3962 3963 6c79b0d9 3962->3963 3966 6c79b106 3963->3966 4059 6c79b128 3963->4059 3965 6c79b11b 3965->3928 3966->3928 3968 6c7910a0 3967->3968 3969 6c7910f9 3968->3969 3970 6c7910c5 3968->3970 3971 6c792d14 __except1 5 API calls 3969->3971 3972 6c792d14 __except1 5 API calls 3970->3972 3973 6c791126 3971->3973 3974 6c7910f5 3972->3974 3973->3930 3974->3930 3976 6c791d0b _memset 3975->3976 3977 6c791d8f CreateFileW 3976->3977 3978 6c791dc5 3977->3978 3979 6c791e14 LoadCursorFromFileW SetCursor 3977->3979 3980 6c791dda 3978->3980 3981 6c791df6 3978->3981 3991 6c791e3a 3979->3991 3982 6c792d14 __except1 5 API calls 3980->3982 3984 6c792d14 __except1 5 API calls 3981->3984 3983 6c791df2 3982->3983 3983->3932 3985 6c791e10 3984->3985 3985->3932 3986 6c791efd GetFileSizeEx 3987 6c791f1f 3986->3987 3988 6c792067 3986->3988 4069 6c7931c1 3987->4069 3989 6c792d14 __except1 5 API calls 3988->3989 3992 6c79207b 3989->3992 3991->3986 3992->3932 3993 6c791f2a 3994 6c791f40 ReadFile 3993->3994 3995 6c791f6f GetSystemTimeAsFileTime 3993->3995 3994->3993 3994->3995 3995->3981 3996 6c791fa6 WideCharToMultiByte 3995->3996 4073 6c793d30 3996->4073 3999 6c79202b FindWindowA 4000 6c792037 VirtualProtect 3999->4000 4001 6c792d14 __except1 5 API calls 4000->4001 4002 6c792063 4001->4002 4002->3932 4004 6c79b209 4003->4004 4005 6c79b23b 4003->4005 4004->4005 4006 6c79b236 4004->4006 4075 6c79b258 4005->4075 4084 6c79cb9e 4006->4084 4008 6c79b24b 4008->3920 4010 6c79cb96 4010->3920 4017 6c792dd2 4011->4017 4014 6c7940be 4015 6c7940f3 RaiseException 4014->4015 4016 6c7940e7 4014->4016 4015->3953 4016->4015 4018 6c792de2 4017->4018 4020 6c792df7 4017->4020 4023 6c792d8d 4018->4023 4020->4014 4024 6c792d98 4023->4024 4025 6c792da0 4023->4025 4026 6c7942fb _free 2 API calls 4024->4026 4025->4020 4027 6c792d4d 4025->4027 4026->4025 4028 6c792d80 4027->4028 4029 6c792d5b _strlen 4027->4029 4028->4020 4030 6c793514 std::exception::_Copy_str 36 API calls 4029->4030 4031 6c792d6d 4030->4031 4031->4028 4032 6c794210 _strcpy_s 11 API calls 4031->4032 4032->4028 4034 6c793977 4033->4034 4038 6c7939a7 4034->4038 4039 6c7936f8 4034->4039 4035 6c79572f __controlfp_s 11 API calls 4037 6c7939af 4035->4037 4037->3959 4038->4035 4038->4037 4040 6c79371f 4039->4040 4041 6c793744 4040->4041 4043 6c79372f 4040->4043 4056 6c793724 4040->4056 4042 6c7931cc ___crtLCMapStringA 65 API calls 4041->4042 4044 6c79374f 4042->4044 4046 6c79572f __controlfp_s 11 API calls 4043->4046 4047 6c7938ee 4044->4047 4048 6c793757 4044->4048 4045 6c792d14 __except1 5 API calls 4049 6c79395d 4045->4049 4046->4056 4050 6c79391a WideCharToMultiByte 4047->4050 4047->4056 4051 6c793805 WideCharToMultiByte 4048->4051 4055 6c7937ab WideCharToMultiByte 4048->4055 4048->4056 4049->4038 4050->4056 4053 6c793833 4051->4053 4051->4056 4054 6c79383c GetLastError 4053->4054 4053->4056 4054->4056 4058 6c79384b 4054->4058 4055->4056 4056->4045 4057 6c793854 WideCharToMultiByte 4057->4056 4057->4058 4058->4056 4058->4057 4060 6c79b178 4059->4060 4063 6c79b12f 4059->4063 4061 6c79b1b7 4060->4061 4066 6c79c537 4060->4066 4061->3965 4063->4061 4064 6c79c537 6 API calls 4063->4064 4065 6c79c45e 4064->4065 4065->3965 4067 6c79d98e __87except 6 API calls 4066->4067 4068 6c79c560 4067->4068 4068->4061 4070 6c794448 __EH_prolog3_catch 4069->4070 4071 6c793dc1 58 API calls 4070->4071 4072 6c794460 4071->4072 4072->3993 4074 6c79201b lstrlenA 4073->4074 4074->3999 4074->4000 4076 6c79b25f 4075->4076 4077 6c79b2c5 4075->4077 4076->4077 4081 6c79b273 4076->4081 4078 6c79c537 6 API calls 4077->4078 4080 6c79c42e 4077->4080 4079 6c79b304 4078->4079 4079->4008 4080->4008 4081->4080 4082 6c79c537 6 API calls 4081->4082 4083 6c79c45e 4082->4083 4083->4008 4085 6c79cbf0 4084->4085 4087 6c79ccbe 4084->4087 4085->4010 4086 6c79cccc 4086->4010 4087->4086 4088 6c79d100 ___libm_error_support DecodePointer 4087->4088 4089 6c79d058 4088->4089 4089->4010 4103 6c7914b0 GetShellWindow 4104 6c79150e 4103->4104 4105 6c799570 4106 6c799582 4105->4106 4107 6c799590 @_EH4_CallFilterFunc@8 4105->4107 4108 6c792d14 __except1 5 API calls 4106->4108 4108->4107 4109 6c791220 GetTopWindow GetMenu 4110 6c796820 4111 6c796859 4110->4111 4112 6c79684c 4110->4112 4113 6c792d14 __except1 5 API calls 4111->4113 4114 6c792d14 __except1 5 API calls 4112->4114 4115 6c796869 __except_handler4 __IsNonwritableInCurrentImage 4113->4115 4114->4111 4116 6c7968ec 4115->4116 4117 6c7968c2 __except_handler4 4115->4117 4126 6c799602 RtlUnwind 4115->4126 4117->4116 4118 6c7968dc 4117->4118 4120 6c792d14 __except1 5 API calls 4117->4120 4119 6c792d14 __except1 5 API calls 4118->4119 4119->4116 4120->4118 4122 6c79693e __except_handler4 4123 6c796972 4122->4123 4124 6c792d14 __except1 5 API calls 4122->4124 4125 6c792d14 __except1 5 API calls 4123->4125 4124->4123 4125->4117 4127 6c799616 4126->4127 4127->4122 4128 6c791360 GetFileAttributesA 4129 6c791388 lstrlenA 4128->4129 4130 6c791423 4128->4130 4131 6c79139f lstrcpyA FindFirstFileA 4129->4131 4132 6c791393 4129->4132 4133 6c792d14 __except1 5 API calls 4130->4133 4131->4130 4134 6c7913c3 lstrcmpA 4131->4134 4132->4131 4135 6c791435 4133->4135 4136 6c7913d9 lstrcmpA 4134->4136 4137 6c79140a FindNextFileA 4134->4137 4136->4137 4138 6c7913ef lstrcpyA snozacqpuormqulw 4136->4138 4137->4134 4139 6c79141c FindClose 4137->4139 4138->4137 4138->4139 4139->4130 4140 6c798615 4141 6c798621 _doexit 4140->4141 4142 6c795044 __getptd 47 API calls 4141->4142 4144 6c798626 4142->4144 4146 6c79a5ce 4144->4146 4145 6c798648 _doexit 4155 6c7986ff DecodePointer 4146->4155 4148 6c79a5f6 4150 6c7959c2 __amsg_exit 47 API calls 4148->4150 4149 6c79a5d3 4149->4148 4156 6c7955b4 4149->4156 4152 6c79a600 4150->4152 4153 6c7959e7 __amsg_exit 47 API calls 4152->4153 4154 6c79a608 4153->4154 4154->4145 4155->4149 4157 6c7955d3 _memset __call_reportfault 4156->4157 4158 6c7955f1 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 4157->4158 4159 6c7956bf __call_reportfault 4158->4159 4160 6c792d14 __except1 5 API calls 4159->4160 4161 6c7956db 4160->4161 4161->4148

    Control-flow Graph

    APIs
    • GetCurrentProcess.KERNEL32(0000DD4D,74E2F770), ref: 6C791CDE
    • _memset.LIBCMT ref: 6C791D06
    • CreateFileW.KERNELBASE(C:\Users\user\Desktop\IndexerVolumeGuid,80000000,00000003,00000000,00000004,00000080,00000000), ref: 6C791DB2
    • LoadCursorFromFileW.USER32(fNobvJLcACQdSq), ref: 6C791E19
    • SetCursor.USER32(00000000), ref: 6C791E20
    • GetFileSizeEx.KERNEL32(00000000,?), ref: 6C791F05
    • ReadFile.KERNELBASE(00000000,00000000,00000000,?,00000000), ref: 6C791F54
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1917700358.000000006C791000.00000020.00000001.01000000.00000003.sdmp, Offset: 6C790000, based on PE: true
    • Associated: 00000003.00000002.1917677637.000000006C790000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917727365.000000006C7A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917750595.000000006C7A9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AE000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6c790000_rundll32.jbxd
    Similarity
    • API ID: File$Cursor$CreateCurrentFromLoadProcessReadSize_memset
    • String ID: C:\Users\user\Desktop\IndexerVolumeGuid$asnfpwrqc$dsqdadoehhkwcgyogrpvxayvwolz$fNobvJLcACQdSq$qfkclalqqi$s4W>$1zl
    • API String ID: 1010611447-3706999952
    • Opcode ID: 84e722112169ca278c463fbb8be9622f1be5caf21b1433bc3299191c56870529
    • Instruction ID: 044f2b6e754b22b675b151b19d1c304e82feb393aba375cec5f3906ea8607d2a
    • Opcode Fuzzy Hash: 84e722112169ca278c463fbb8be9622f1be5caf21b1433bc3299191c56870529
    • Instruction Fuzzy Hash: BEA1E0B1B00208DFDF14CFE4E949BAE7BB4FB4A315F1042A8E546AB680D7719959CF50

    Control-flow Graph

    APIs
      • Part of subcall function 6C793514: __FF_MSGBANNER.LIBCMT ref: 6C79352D
      • Part of subcall function 6C793514: __NMSG_WRITE.LIBCMT ref: 6C793534
      • Part of subcall function 6C793514: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,6C793DE0,?,00000004), ref: 6C793559
    • GetModuleFileNameW.KERNEL32(6C790000,C:\Users\user\Desktop\IndexerVolumeGuid,00000104), ref: 6C7920D9
    • OpenMutexA.KERNEL32(001F0001,00000000,bbodihmykbbodihmyk), ref: 6C7920EA
    • ExitProcess.KERNEL32 ref: 6C7920F5
    • FindFirstChangeNotificationA.KERNELBASE(hlczjuikox,0000000F,0000DD4D), ref: 6C7921B7
    • GetLastError.KERNEL32 ref: 6C7921C7
    • __cftoe.LIBCMT ref: 6C7921EC
    • PathRemoveFileSpecW.SHLWAPI(C:\Users\user\Desktop\IndexerVolumeGuid), ref: 6C7921F9
    • lstrcatW.KERNEL32(C:\Users\user\Desktop\IndexerVolumeGuid,6C7A32D0), ref: 6C79220F
    • lstrcatW.KERNEL32(C:\Users\user\Desktop\IndexerVolumeGuid,IndexerVolumeGuid), ref: 6C79221B
    • _memset.LIBCMT ref: 6C792229
    • PathStripPathA.KERNELBASE(?), ref: 6C792236
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1917700358.000000006C791000.00000020.00000001.01000000.00000003.sdmp, Offset: 6C790000, based on PE: true
    • Associated: 00000003.00000002.1917677637.000000006C790000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917727365.000000006C7A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917750595.000000006C7A9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AE000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6c790000_rundll32.jbxd
    Similarity
    • API ID: Path$Filelstrcat$AllocateChangeErrorExitFindFirstHeapLastModuleMutexNameNotificationOpenProcessRemoveSpecStrip__cftoe_memset
    • String ID: C:\Users\user\Desktop\IndexerVolumeGuid$IndexerVolumeGuid$bbodihmykbbodihmyk$hlczjuikox
    • API String ID: 1133227495-1474762970
    • Opcode ID: fb9cdd06e65ea58d9d6bdd2ac413fd50b887ea51d77c62d2b4283a047f31c056
    • Instruction ID: ca78085657a62475c1448427a6fac70a80435c94e35f88008f166943e4cb206f
    • Opcode Fuzzy Hash: fb9cdd06e65ea58d9d6bdd2ac413fd50b887ea51d77c62d2b4283a047f31c056
    • Instruction Fuzzy Hash: 1271C1B1608341DFD700DFA4E94DA9F7BB4BB8A354F414928F59997690EB30D128CF92

    Control-flow Graph

    APIs
    • rbfyvzbrlz.RMA7E8O8IY ref: 6C79240C
    • LoadStringA.USER32(00000000,0000008D,6C7AAD90,00000104), ref: 6C792427
    • RegisterClipboardFormatA.USER32(6C7AAD90), ref: 6C792432
    • snozacqpuormqulw.RMA7E8O8IY(6C7AAD90), ref: 6C79243D
    • LoadBitmapA.USER32(00000000,0000000F), ref: 6C79244E
    • __floor_pentium4.LIBCMT ref: 6C7924CA
    • RealDriveType.SHELL32(00000000,00000000), ref: 6C7924F9
    • _calloc.LIBCMT ref: 6C79250E
    • _memset.LIBCMT ref: 6C792559
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1917700358.000000006C791000.00000020.00000001.01000000.00000003.sdmp, Offset: 6C790000, based on PE: true
    • Associated: 00000003.00000002.1917677637.000000006C790000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917727365.000000006C7A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917750595.000000006C7A9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AE000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6c790000_rundll32.jbxd
    Similarity
    • API ID: Load$BitmapClipboardDriveFormatRealRegisterStringType__floor_pentium4_calloc_memsetrbfyvzbrlzsnozacqpuormqulw
    • String ID: ^$lyklbyetstmygefupednncwmkzipppjjfymgy$uFRxZVMGSbqgaxkbizaofdgu
    • API String ID: 1740096499-1716715573
    • Opcode ID: f12298a3a81d2dfb68051f0c0a91fa8ec61a2bf01a205f10154584601895819f
    • Instruction ID: a7545854882f963ac3523d0c1774e7cb2f2f3bb6770477467a10a1aa13a45402
    • Opcode Fuzzy Hash: f12298a3a81d2dfb68051f0c0a91fa8ec61a2bf01a205f10154584601895819f
    • Instruction Fuzzy Hash: 625127B07083019BDB21EFA4F94A7DE3BF4AB86718F004538E8D49B684EB719519CB81

    Control-flow Graph

    APIs
    • __FF_MSGBANNER.LIBCMT ref: 6C79352D
      • Part of subcall function 6C795BDA: __NMSG_WRITE.LIBCMT ref: 6C795C01
      • Part of subcall function 6C795BDA: __NMSG_WRITE.LIBCMT ref: 6C795C0B
    • __NMSG_WRITE.LIBCMT ref: 6C793534
      • Part of subcall function 6C795A2B: GetModuleFileNameW.KERNEL32(00000000,6C7AA4AA,00000104,?,?,=yl), ref: 6C795AC7
      • Part of subcall function 6C795A2B: __invoke_watson.LIBCMT ref: 6C795AF0
      • Part of subcall function 6C795A2B: _wcslen.LIBCMT ref: 6C795AF6
      • Part of subcall function 6C795A2B: _wcslen.LIBCMT ref: 6C795B03
      • Part of subcall function 6C79576A: ___crtCorExitProcess.LIBCMT ref: 6C795772
      • Part of subcall function 6C79576A: ExitProcess.KERNEL32 ref: 6C79577B
    • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,6C793DE0,?,00000004), ref: 6C793559
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1917700358.000000006C791000.00000020.00000001.01000000.00000003.sdmp, Offset: 6C790000, based on PE: true
    • Associated: 00000003.00000002.1917677637.000000006C790000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917727365.000000006C7A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917750595.000000006C7A9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AE000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6c790000_rundll32.jbxd
    Similarity
    • API ID: ExitProcess_wcslen$AllocateFileHeapModuleName___crt__invoke_watson
    • String ID: =yl
    • API String ID: 2361220029-3172309113
    • Opcode ID: 8a439a23aa81f27e50c9122934221f844a07153baf9be52c0762abe74852997c
    • Instruction ID: 1b08621e51e16506aa3826a213ace0e75d6c981f89c7fba920d4b564ce766662
    • Opcode Fuzzy Hash: 8a439a23aa81f27e50c9122934221f844a07153baf9be52c0762abe74852997c
    • Instruction Fuzzy Hash: 7801B5B1244311AEF78117B5BF8CB7B37E8AB4A76EF500235E51C8BE90DB7088448660

    Control-flow Graph

    APIs
      • Part of subcall function 6C793514: __FF_MSGBANNER.LIBCMT ref: 6C79352D
      • Part of subcall function 6C793514: __NMSG_WRITE.LIBCMT ref: 6C793534
      • Part of subcall function 6C793514: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,6C793DE0,?,00000004), ref: 6C793559
    • std::exception::exception.LIBCMT ref: 6C793E10
    • std::exception::exception.LIBCMT ref: 6C793E2A
    • __CxxThrowException@8.LIBCMT ref: 6C793E3B
    Memory Dump Source
    • Source File: 00000003.00000002.1917700358.000000006C791000.00000020.00000001.01000000.00000003.sdmp, Offset: 6C790000, based on PE: true
    • Associated: 00000003.00000002.1917677637.000000006C790000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917727365.000000006C7A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917750595.000000006C7A9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AE000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6c790000_rundll32.jbxd
    Similarity
    • API ID: std::exception::exception$AllocateException@8HeapThrow
    • String ID:
    • API String ID: 877034779-0
    • Opcode ID: f5e8bad0f9be49e4392fde6b8598ce1b5698c7ffd8b3fdcf895792cdc0cb55c8
    • Instruction ID: 8f42737860e049c264b41963567eab12050df72fcac4eb8e95e7eca3996aa475
    • Opcode Fuzzy Hash: f5e8bad0f9be49e4392fde6b8598ce1b5698c7ffd8b3fdcf895792cdc0cb55c8
    • Instruction Fuzzy Hash: 2DF0F935500105AADF44DB95FB0EAEE7AB8AF41318F100659D41497DD0DB71C70A8780

    Control-flow Graph

    APIs
    • FindFirstFileA.KERNEL32(c:\*.*,?,?,lyklbyetstmygefupednncwmkzipppjjfymgy), ref: 6C79115B
    • FindNextFileA.KERNEL32(00000000,?), ref: 6C791189
    • lstrcmpA.KERNEL32(?,qstkuikagi), ref: 6C7911AC
    • FindNextFileA.KERNEL32(00000000,?), ref: 6C7911BA
    • FindClose.KERNEL32(00000000), ref: 6C7911C1
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1917700358.000000006C791000.00000020.00000001.01000000.00000003.sdmp, Offset: 6C790000, based on PE: true
    • Associated: 00000003.00000002.1917677637.000000006C790000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917727365.000000006C7A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917750595.000000006C7A9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AE000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6c790000_rundll32.jbxd
    Similarity
    • API ID: Find$File$Next$CloseFirstlstrcmp
    • String ID: c:\*.*$k%yl$k%yl$lyklbyetstmygefupednncwmkzipppjjfymgy$qstkuikagi
    • API String ID: 2327987229-1098256769
    • Opcode ID: 847865e824824e59375ec6d5358ff886cfbc2f431c10730aed859827243e1112
    • Instruction ID: f2cb8e0931d21afb0770e7d9af07c7a6ddd7cebd6d745d60182f90f92cc49277
    • Opcode Fuzzy Hash: 847865e824824e59375ec6d5358ff886cfbc2f431c10730aed859827243e1112
    • Instruction Fuzzy Hash: 08219372B001189BDB14DBB9FD849EE77B8EF493A0F0002B5E90DD7640EB31D9598BA0

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 276 6c791360-6c791382 GetFileAttributesA 277 6c791388-6c791391 lstrlenA 276->277 278 6c791423-6c791438 call 6c792d14 276->278 279 6c79139f-6c7913c1 lstrcpyA FindFirstFileA 277->279 280 6c791393-6c791398 277->280 279->278 283 6c7913c3-6c7913d7 lstrcmpA 279->283 280->279 282 6c79139a-6c79139e 280->282 282->279 285 6c7913d9-6c7913ed lstrcmpA 283->285 286 6c79140a-6c79141a FindNextFileA 283->286 285->286 287 6c7913ef-6c791408 lstrcpyA snozacqpuormqulw 285->287 286->283 288 6c79141c-6c79141d FindClose 286->288 287->286 287->288 288->278
    APIs
    • GetFileAttributesA.KERNEL32(?), ref: 6C79137A
    • lstrlenA.KERNEL32(?), ref: 6C791389
    • lstrcpyA.KERNEL32(?,6C7A2EB8), ref: 6C7913A8
    • FindFirstFileA.KERNEL32(?,?,?,6C7A2EB8), ref: 6C7913B6
    • lstrcmpA.KERNEL32(6C7A3174,?,?,6C7A2EB8), ref: 6C7913CF
    • lstrcmpA.KERNEL32(6C7A3178,?,?,6C7A2EB8), ref: 6C7913E5
    • lstrcpyA.KERNEL32(?,?,?,6C7A2EB8), ref: 6C7913F7
    • snozacqpuormqulw.RMA7E8O8IY(?,?,?,?,6C7A2EB8), ref: 6C7913FE
    • FindNextFileA.KERNEL32(00000000,?,?,6C7A2EB8), ref: 6C791412
    • FindClose.KERNEL32(00000000,?,6C7A2EB8), ref: 6C79141D
    Memory Dump Source
    • Source File: 00000003.00000002.1917700358.000000006C791000.00000020.00000001.01000000.00000003.sdmp, Offset: 6C790000, based on PE: true
    • Associated: 00000003.00000002.1917677637.000000006C790000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917727365.000000006C7A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917750595.000000006C7A9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AE000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6c790000_rundll32.jbxd
    Similarity
    • API ID: FileFind$lstrcmplstrcpy$AttributesCloseFirstNextlstrlensnozacqpuormqulw
    • String ID:
    • API String ID: 1590718337-0
    • Opcode ID: 360d8e749a1755787f86d9d4065ac79481ae7ae293ffd661fdc27201804fbfa2
    • Instruction ID: 630860252f9e0a717dae2e25abb3945ac91b5af16af6a64f6391d65c355b3893
    • Opcode Fuzzy Hash: 360d8e749a1755787f86d9d4065ac79481ae7ae293ffd661fdc27201804fbfa2
    • Instruction Fuzzy Hash: DD21D131300644EBFB119BB2ED48AFF77BCAB0A355F000678E816C2540DB34DA558B60

    Control-flow Graph

    APIs
    • IsDebuggerPresent.KERNEL32 ref: 6C7941C5
    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6C7941DA
    • UnhandledExceptionFilter.KERNEL32(6C7A1268), ref: 6C7941E5
    • GetCurrentProcess.KERNEL32(C0000409), ref: 6C794201
    • TerminateProcess.KERNEL32(00000000), ref: 6C794208
    Memory Dump Source
    • Source File: 00000003.00000002.1917700358.000000006C791000.00000020.00000001.01000000.00000003.sdmp, Offset: 6C790000, based on PE: true
    • Associated: 00000003.00000002.1917677637.000000006C790000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917727365.000000006C7A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917750595.000000006C7A9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AE000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6c790000_rundll32.jbxd
    Similarity
    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
    • String ID:
    • API String ID: 2579439406-0
    • Opcode ID: 2a26fdd8b3ab03edb596f45766087008facd294e025510a02cdc31ef2a77c735
    • Instruction ID: ad30a314975442328c4156e81a6353c62cd6730d9d45aaf774c3ccc714603728
    • Opcode Fuzzy Hash: 2a26fdd8b3ab03edb596f45766087008facd294e025510a02cdc31ef2a77c735
    • Instruction Fuzzy Hash: FD2122B8B00201EFDF00CFA6F188A6D3BB0FB1A3A4F10803AE91987240E37589819F11
    Memory Dump Source
    • Source File: 00000003.00000002.1917700358.000000006C791000.00000020.00000001.01000000.00000003.sdmp, Offset: 6C790000, based on PE: true
    • Associated: 00000003.00000002.1917677637.000000006C790000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917727365.000000006C7A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917750595.000000006C7A9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AE000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6c790000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
    • Instruction ID: b3b10b98c9805b390b35bd573d99e22c01d66edbccc80e70fb1db44b4ecec106
    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
    • Instruction Fuzzy Hash: C411EB7724618143D600892EFBB86A7A7D5EBC533D73943BAD0694BF58D223A1559600

    Control-flow Graph

    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,6C7AA0C4,6C793E6A,6C7A79D0,00000008,00000004,6C7A7D98,6C7AA0C4,00000004), ref: 6C795203
    • __mtterm.LIBCMT ref: 6C79520F
      • Part of subcall function 6C794EDA: DecodePointer.KERNEL32(00000005,6C793F2D,6C793F13,6C7A79D0,00000008,00000004,6C7A7D98,6C7AA0C4,00000004), ref: 6C794EEB
      • Part of subcall function 6C794EDA: TlsFree.KERNEL32(00000013,6C793F2D,6C793F13,6C7A79D0,00000008,00000004,6C7A7D98,6C7AA0C4,00000004), ref: 6C794F05
      • Part of subcall function 6C794EDA: DeleteCriticalSection.KERNEL32(00000000,00000000,6C7A122C,?,6C793F2D,6C793F13,6C7A79D0,00000008,00000004,6C7A7D98,6C7AA0C4,00000004), ref: 6C79666B
      • Part of subcall function 6C794EDA: _free.LIBCMT ref: 6C79666E
      • Part of subcall function 6C794EDA: DeleteCriticalSection.KERNEL32(00000013,6C7A122C,?,6C793F2D,6C793F13,6C7A79D0,00000008,00000004,6C7A7D98,6C7AA0C4,00000004), ref: 6C796695
    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 6C795225
    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 6C795232
    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 6C79523F
    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 6C79524C
    • TlsAlloc.KERNEL32 ref: 6C79529C
    • TlsSetValue.KERNEL32(00000000), ref: 6C7952B7
    • __init_pointers.LIBCMT ref: 6C7952C1
    • EncodePointer.KERNEL32 ref: 6C7952D2
    • EncodePointer.KERNEL32 ref: 6C7952DF
    • EncodePointer.KERNEL32 ref: 6C7952EC
    • EncodePointer.KERNEL32 ref: 6C7952F9
    • DecodePointer.KERNEL32(Function_0000505E), ref: 6C79531A
    • DecodePointer.KERNEL32(00000000), ref: 6C795349
    • GetCurrentThreadId.KERNEL32 ref: 6C79535B
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1917700358.000000006C791000.00000020.00000001.01000000.00000003.sdmp, Offset: 6C790000, based on PE: true
    • Associated: 00000003.00000002.1917677637.000000006C790000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917727365.000000006C7A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917750595.000000006C7A9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AE000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6c790000_rundll32.jbxd
    Similarity
    • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__init_pointers__mtterm_free
    • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
    • API String ID: 3821259317-3819984048
    • Opcode ID: 889a74feabc74feb8fa1a57113454886614d28b558ab857e058fa526be9c4ef2
    • Instruction ID: 0f45f76e74701728c01ace0f6735c0cb4569680c40046caf745a3111c5b8fe2f
    • Opcode Fuzzy Hash: 889a74feabc74feb8fa1a57113454886614d28b558ab857e058fa526be9c4ef2
    • Instruction Fuzzy Hash: 20314A35A01225DFEF51AFFABA4C65E3FB4AB462B9710473AF42493690DB348005DF60

    Control-flow Graph

    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,6C7A7AC8,00000008,6C793F72,00000000,00000000), ref: 6C794F28
    • __lock.LIBCMT ref: 6C794F5C
      • Part of subcall function 6C79677E: __mtinitlocknum.LIBCMT ref: 6C796794
      • Part of subcall function 6C79677E: __amsg_exit.LIBCMT ref: 6C7967A0
      • Part of subcall function 6C79677E: EnterCriticalSection.KERNEL32(00000000,00000000,?,6C7950EF,0000000D,6C7A7AF0,00000008,6C7951E6,00000000,?,6C793F99,00000000,6C7A79D0,00000008,00000004), ref: 6C7967A8
    • InterlockedIncrement.KERNEL32(6C7A9080), ref: 6C794F69
    • __lock.LIBCMT ref: 6C794F7D
    • ___addlocaleref.LIBCMT ref: 6C794F9B
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1917700358.000000006C791000.00000020.00000001.01000000.00000003.sdmp, Offset: 6C790000, based on PE: true
    • Associated: 00000003.00000002.1917677637.000000006C790000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917727365.000000006C7A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917750595.000000006C7A9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AE000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6c790000_rundll32.jbxd
    Similarity
    • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
    • String ID: KERNEL32.DLL
    • API String ID: 637971194-2576044830
    • Opcode ID: 416049f7d82784b28e624b2b2ab1dd5dfbca1d3f59b353efd0a5879540cecf3d
    • Instruction ID: f4e3f15a1a99f44b057735a0f4a128b00252dba1d512b13e8f878bd93460da9f
    • Opcode Fuzzy Hash: 416049f7d82784b28e624b2b2ab1dd5dfbca1d3f59b353efd0a5879540cecf3d
    • Instruction Fuzzy Hash: 9C01A171500B00DFE7209FB6E60C78AFBF0AF01325F108A0ED49A97BA0CB70A648DB50

    Control-flow Graph

    APIs
    • __getptd.LIBCMT ref: 6C7946A6
      • Part of subcall function 6C795044: __amsg_exit.LIBCMT ref: 6C795054
    • __amsg_exit.LIBCMT ref: 6C7946C6
    • __lock.LIBCMT ref: 6C7946D6
    • InterlockedDecrement.KERNEL32(?), ref: 6C7946F3
    • _free.LIBCMT ref: 6C794706
    • InterlockedIncrement.KERNEL32(02A51658), ref: 6C79471E
    Memory Dump Source
    • Source File: 00000003.00000002.1917700358.000000006C791000.00000020.00000001.01000000.00000003.sdmp, Offset: 6C790000, based on PE: true
    • Associated: 00000003.00000002.1917677637.000000006C790000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917727365.000000006C7A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917750595.000000006C7A9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AE000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6c790000_rundll32.jbxd
    Similarity
    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__lock_free
    • String ID:
    • API String ID: 2396328878-0
    • Opcode ID: 790608fde69610e79d47b2ee3c2123ea3aeafba80fe4bb8e1537588dcac63588
    • Instruction ID: 47ef57ab6ad61f502a9266ef3e73b18776b3796d05105cf0bf0a2f9ac6917da3
    • Opcode Fuzzy Hash: 790608fde69610e79d47b2ee3c2123ea3aeafba80fe4bb8e1537588dcac63588
    • Instruction Fuzzy Hash: 0D016131A02615AFDB109BA5BA0D78E77B0BF02729F100225D430A7F80C7359955EFD5
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1917700358.000000006C791000.00000020.00000001.01000000.00000003.sdmp, Offset: 6C790000, based on PE: true
    • Associated: 00000003.00000002.1917677637.000000006C790000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917727365.000000006C7A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917750595.000000006C7A9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AE000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6c790000_rundll32.jbxd
    Similarity
    • API ID: __amsg_exit__getptd$Ex_nolock__lock__updatetlocinfo
    • String ID:
    • API String ID: 613284903-0
    • Opcode ID: 9a719986c119a104f700e9ed354828183285976d89b2fb35986647b6ff05ae8d
    • Instruction ID: e1809ccbf91e9f3650191b59ec06ab8a3a7fde50bbb772ecc6eb7a5816917edb
    • Opcode Fuzzy Hash: 9a719986c119a104f700e9ed354828183285976d89b2fb35986647b6ff05ae8d
    • Instruction Fuzzy Hash: D7F09032904710DADF51AFB8B70D7CD33A06F00B29F118319D520ABBC0CB694A48EA9A
    APIs
    • _free.LIBCMT ref: 6C7993DC
      • Part of subcall function 6C793514: __FF_MSGBANNER.LIBCMT ref: 6C79352D
      • Part of subcall function 6C793514: __NMSG_WRITE.LIBCMT ref: 6C793534
      • Part of subcall function 6C793514: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,6C793DE0,?,00000004), ref: 6C793559
    Memory Dump Source
    • Source File: 00000003.00000002.1917700358.000000006C791000.00000020.00000001.01000000.00000003.sdmp, Offset: 6C790000, based on PE: true
    • Associated: 00000003.00000002.1917677637.000000006C790000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917727365.000000006C7A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917750595.000000006C7A9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AE000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6c790000_rundll32.jbxd
    Similarity
    • API ID: AllocateHeap_free
    • String ID:
    • API String ID: 614378929-0
    • Opcode ID: e8046d94f0205bec077ae7e909052dc691297f7fb0ce00b12fc316bbbbef57fb
    • Instruction ID: b8953115aeae5969b552193700c561dacc413298d0e3860cf7ae2315129768ac
    • Opcode Fuzzy Hash: e8046d94f0205bec077ae7e909052dc691297f7fb0ce00b12fc316bbbbef57fb
    • Instruction Fuzzy Hash: 4E11C832509221AFEF521FB5BB0C68F37A4AB513EAB144235E46C8AE60DB30C8409790
    APIs
    • DecodePointer.KERNEL32(?,6C79573B,00000000,00000000,00000000,00000000,00000000,6C798D24,?,6C795BE1,00000003,6C793532), ref: 6C79570D
    • __invoke_watson.LIBCMT ref: 6C795729
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1917700358.000000006C791000.00000020.00000001.01000000.00000003.sdmp, Offset: 6C790000, based on PE: true
    • Associated: 00000003.00000002.1917677637.000000006C790000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917727365.000000006C7A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917750595.000000006C7A9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AE000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6c790000_rundll32.jbxd
    Similarity
    • API ID: DecodePointer__invoke_watson
    • String ID: =yl
    • API String ID: 4034010525-3172309113
    • Opcode ID: a1026041ab2eb575e221364ab1d76da2885023b714054f87c032d3ee74ca87eb
    • Instruction ID: 5477248bdfdaa3c41174e47873197a9234ea0b4bae28812ee5fcef1274bcfa8b
    • Opcode Fuzzy Hash: a1026041ab2eb575e221364ab1d76da2885023b714054f87c032d3ee74ca87eb
    • Instruction Fuzzy Hash: 22E0B672500119EBDF465EB1ED099AA3B66AB44651B944420F91881520D736C974AB90
    APIs
    • ___crtCorExitProcess.LIBCMT ref: 6C795772
      • Part of subcall function 6C79573F: GetModuleHandleW.KERNEL32(mscoree.dll,=yl,6C795777,=yl,?,6C793543,000000FF,0000001E,?,?,?,?,6C793DE0,?,00000004), ref: 6C795749
      • Part of subcall function 6C79573F: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6C795759
    • ExitProcess.KERNEL32 ref: 6C79577B
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1917700358.000000006C791000.00000020.00000001.01000000.00000003.sdmp, Offset: 6C790000, based on PE: true
    • Associated: 00000003.00000002.1917677637.000000006C790000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917727365.000000006C7A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917750595.000000006C7A9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1917773342.000000006C7AE000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6c790000_rundll32.jbxd
    Similarity
    • API ID: ExitProcess$AddressHandleModuleProc___crt
    • String ID: =yl
    • API String ID: 2427264223-3172309113
    • Opcode ID: a817b5203e31eb418dd0b60e6e53f9fed4c4ce58bd6950410ff6a31037a02756
    • Instruction ID: 61f2d34fce38185efbf97c9dc055959f4963b75916dd85c34bc433236f25ce28
    • Opcode Fuzzy Hash: a817b5203e31eb418dd0b60e6e53f9fed4c4ce58bd6950410ff6a31037a02756
    • Instruction Fuzzy Hash: 45B09231000158FBEF012F62FC0D89E3F2AEB812A1B104021F8090A120DF72EE96AA80

    Execution Graph

    Execution Coverage:1.1%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:0%
    Total number of Nodes:50
    Total number of Limit Nodes:0
    execution_graph 193 6c799570 194 6c799582 193->194 196 6c799590 @_EH4_CallFilterFunc@8 193->196 197 6c792d14 194->197 198 6c792d1c 197->198 199 6c792d1e IsDebuggerPresent 197->199 198->196 205 6c797493 199->205 202 6c7941d7 SetUnhandledExceptionFilter UnhandledExceptionFilter 203 6c7941fc GetCurrentProcess TerminateProcess 202->203 204 6c7941f4 __except_handler4 202->204 203->196 204->203 205->202 206 6c7914b0 GetShellWindow 207 6c79150e 206->207 210 6c791360 GetFileAttributesA 211 6c791388 lstrlenA 210->211 212 6c791423 210->212 213 6c79139f lstrcpyA FindFirstFileA 211->213 214 6c791393 211->214 215 6c792d14 __except_handler4 5 API calls 212->215 213->212 216 6c7913c3 lstrcmpA 213->216 214->213 217 6c791435 215->217 218 6c7913d9 lstrcmpA 216->218 219 6c79140a FindNextFileA 216->219 218->219 220 6c7913ef lstrcpyA snozacqpuormqulw 218->220 219->216 221 6c79141c FindClose 219->221 220->219 220->221 221->212 222 6c792360 223 6c79240c rbfyvzbrlz LoadStringA RegisterClipboardFormatA snozacqpuormqulw LoadBitmapA 222->223 224 6c79245d 223->224 225 6c791220 GetTopWindow GetMenu 226 6c796820 227 6c796859 226->227 228 6c79684c 226->228 230 6c792d14 __except_handler4 5 API calls 227->230 229 6c792d14 __except_handler4 5 API calls 228->229 229->227 239 6c796869 __except_handler4 __IsNonwritableInCurrentImage 230->239 231 6c7968ec 232 6c7968c2 __except_handler4 232->231 233 6c7968dc 232->233 234 6c792d14 __except_handler4 5 API calls 232->234 235 6c792d14 __except_handler4 5 API calls 233->235 234->233 235->231 237 6c79693e __except_handler4 238 6c796972 237->238 240 6c792d14 __except_handler4 5 API calls 237->240 241 6c792d14 __except_handler4 5 API calls 238->241 239->231 239->232 242 6c799602 RtlUnwind 239->242 240->238 241->232 243 6c799616 242->243 243->237 208 6c795c54 DecodePointer 209 6c795c69 208->209 244 6c794ea6 TlsGetValue 245 6c794ebb DecodePointer TlsSetValue 244->245 246 6c794ed6 244->246 245->246

    Callgraph

    Control-flow Graph

    APIs
    • GetFileAttributesA.KERNEL32(?), ref: 6C79137A
    • lstrlenA.KERNEL32(?), ref: 6C791389
    • lstrcpyA.KERNEL32(?,6C7A2EB8), ref: 6C7913A8
    • FindFirstFileA.KERNEL32(?,?,?,6C7A2EB8), ref: 6C7913B6
    • lstrcmpA.KERNEL32(6C7A3174,?,?,6C7A2EB8), ref: 6C7913CF
    • lstrcmpA.KERNEL32(6C7A3178,?,?,6C7A2EB8), ref: 6C7913E5
    • lstrcpyA.KERNEL32(?,?,?,6C7A2EB8), ref: 6C7913F7
    • snozacqpuormqulw.RMA7E8O8IY(?,?,?,?,6C7A2EB8), ref: 6C7913FE
    • FindNextFileA.KERNEL32(00000000,?,?,6C7A2EB8), ref: 6C791412
    • FindClose.KERNEL32(00000000,?,6C7A2EB8), ref: 6C79141D
    Memory Dump Source
    • Source File: 0000000A.00000002.1928810142.000000006C791000.00000020.00000001.01000000.00000003.sdmp, Offset: 6C790000, based on PE: true
    • Associated: 0000000A.00000002.1928786287.000000006C790000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000A.00000002.1928837550.000000006C7A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000A.00000002.1928860695.000000006C7A9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000A.00000002.1928885370.000000006C7AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000A.00000002.1928885370.000000006C7AE000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_6c790000_rundll32.jbxd
    Similarity
    • API ID: FileFind$lstrcmplstrcpy$AttributesCloseFirstNextlstrlensnozacqpuormqulw
    • String ID:
    • API String ID: 1590718337-0
    • Opcode ID: 360d8e749a1755787f86d9d4065ac79481ae7ae293ffd661fdc27201804fbfa2
    • Instruction ID: 630860252f9e0a717dae2e25abb3945ac91b5af16af6a64f6391d65c355b3893
    • Opcode Fuzzy Hash: 360d8e749a1755787f86d9d4065ac79481ae7ae293ffd661fdc27201804fbfa2
    • Instruction Fuzzy Hash: DD21D131300644EBFB119BB2ED48AFF77BCAB0A355F000678E816C2540DB34DA558B60

    Control-flow Graph

    APIs
    • IsDebuggerPresent.KERNEL32 ref: 6C7941C5
    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6C7941DA
    • UnhandledExceptionFilter.KERNEL32(6C7A1268), ref: 6C7941E5
    • GetCurrentProcess.KERNEL32(C0000409), ref: 6C794201
    • TerminateProcess.KERNEL32(00000000), ref: 6C794208
    Memory Dump Source
    • Source File: 0000000A.00000002.1928810142.000000006C791000.00000020.00000001.01000000.00000003.sdmp, Offset: 6C790000, based on PE: true
    • Associated: 0000000A.00000002.1928786287.000000006C790000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000A.00000002.1928837550.000000006C7A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000A.00000002.1928860695.000000006C7A9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000A.00000002.1928885370.000000006C7AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000A.00000002.1928885370.000000006C7AE000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_6c790000_rundll32.jbxd
    Similarity
    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
    • String ID:
    • API String ID: 2579439406-0
    • Opcode ID: 2a26fdd8b3ab03edb596f45766087008facd294e025510a02cdc31ef2a77c735
    • Instruction ID: ad30a314975442328c4156e81a6353c62cd6730d9d45aaf774c3ccc714603728
    • Opcode Fuzzy Hash: 2a26fdd8b3ab03edb596f45766087008facd294e025510a02cdc31ef2a77c735
    • Instruction Fuzzy Hash: FD2122B8B00201EFDF00CFA6F188A6D3BB0FB1A3A4F10803AE91987240E37589819F11

    Control-flow Graph

    APIs
    • rbfyvzbrlz.RMA7E8O8IY ref: 6C79240C
    • LoadStringA.USER32(00000000,0000008D,6C7AAD90,00000104), ref: 6C792427
    • RegisterClipboardFormatA.USER32(6C7AAD90), ref: 6C792432
    • snozacqpuormqulw.RMA7E8O8IY(6C7AAD90), ref: 6C79243D
    • LoadBitmapA.USER32(00000000,0000000F), ref: 6C79244E
    Strings
    • uFRxZVMGSbqgaxkbizaofdgu, xrefs: 6C792462
    Memory Dump Source
    • Source File: 0000000A.00000002.1928810142.000000006C791000.00000020.00000001.01000000.00000003.sdmp, Offset: 6C790000, based on PE: true
    • Associated: 0000000A.00000002.1928786287.000000006C790000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000A.00000002.1928837550.000000006C7A1000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000A.00000002.1928860695.000000006C7A9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000A.00000002.1928885370.000000006C7AC000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000A.00000002.1928885370.000000006C7AE000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_6c790000_rundll32.jbxd
    Similarity
    • API ID: Load$BitmapClipboardFormatRegisterStringrbfyvzbrlzsnozacqpuormqulw
    • String ID: uFRxZVMGSbqgaxkbizaofdgu
    • API String ID: 2482714681-1815986579
    • Opcode ID: e3bce024c539109483c592d7ab4aa0dce28265d6cd157fdc0c3cb6bd425097ec
    • Instruction ID: 889374d3450cf95cdb29cec0f2430c59427b61a3d7d82a329f080db6bfdd8d16
    • Opcode Fuzzy Hash: e3bce024c539109483c592d7ab4aa0dce28265d6cd157fdc0c3cb6bd425097ec
    • Instruction Fuzzy Hash: EA110470604305ABD711AFA4F94EBAF3BB8AB86759F004634E8D05B984DB72D119CB82