Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
u9R1HA4M7B.dll

Overview

General Information

Sample name:u9R1HA4M7B.dll
(renamed file extension from exe to dll, renamed because original name is a hash value)
Original sample name:f5cb3234eff0dbbd653d5cdce1d4b1026fa9574ebeaf16aaae3d4e921b6a7f9d.exe
Analysis ID:1431871
MD5:180669dd53e9169c7775d5acc4b79a9f
SHA1:faf9e7a6bfd0e766230f6c615693829c86fa7ff3
SHA256:f5cb3234eff0dbbd653d5cdce1d4b1026fa9574ebeaf16aaae3d4e921b6a7f9d
Tags:exewineloader
Infos:

Detection

WineLoader
Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected WineLoader
PE file has a writeable .text section
AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
One or more processes crash
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • loaddll64.exe (PID: 6716 cmdline: loaddll64.exe "C:\Users\user\Desktop\u9R1HA4M7B.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 6740 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5596 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\u9R1HA4M7B.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 2336 cmdline: rundll32.exe "C:\Users\user\Desktop\u9R1HA4M7B.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
        • WerFault.exe (PID: 7140 cmdline: C:\Windows\system32\WerFault.exe -u -p 2336 -s 140 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 6432 cmdline: rundll32.exe C:\Users\user\Desktop\u9R1HA4M7B.dll,_CreateFrameInfo MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 6648 cmdline: C:\Windows\system32\WerFault.exe -u -p 6432 -s 232 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 7296 cmdline: rundll32.exe C:\Users\user\Desktop\u9R1HA4M7B.dll,_CxxThrowException MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 7332 cmdline: C:\Windows\system32\WerFault.exe -u -p 7296 -s 128 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 7424 cmdline: rundll32.exe C:\Users\user\Desktop\u9R1HA4M7B.dll,_FindAndUnlinkFrame MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 7460 cmdline: C:\Windows\system32\WerFault.exe -u -p 7424 -s 236 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
u9R1HA4M7B.dllJoeSecurity_WineLoaderYara detected WineLoaderJoe Security
    SourceRuleDescriptionAuthorStrings
    10.2.rundll32.exe.7ffe14630000.0.unpackJoeSecurity_WineLoaderYara detected WineLoaderJoe Security
      4.2.rundll32.exe.7ffe14630000.0.unpackJoeSecurity_WineLoaderYara detected WineLoaderJoe Security
        3.2.rundll32.exe.7ffe14630000.0.unpackJoeSecurity_WineLoaderYara detected WineLoaderJoe Security
          13.2.rundll32.exe.7ffe14630000.0.unpackJoeSecurity_WineLoaderYara detected WineLoaderJoe Security
            0.2.loaddll64.exe.7ffe14630000.0.unpackJoeSecurity_WineLoaderYara detected WineLoaderJoe Security
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: u9R1HA4M7B.dllReversingLabs: Detection: 39%
              Source: u9R1HA4M7B.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
              Source: Binary string: D:\a\_work\1\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: loaddll64.exe, 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.1758875603.00007FFE14641000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1752634781.00007FFE14641000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000A.00000002.1766577814.00007FFE14641000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.1773955469.00007FFE14641000.00000004.00000001.01000000.00000003.sdmp, u9R1HA4M7B.dll
              Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net

              System Summary

              barindex
              Source: u9R1HA4M7B.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFE1463A45A0_2_00007FFE1463A45A
              Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFE146394D40_2_00007FFE146394D4
              Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFE146385AC0_2_00007FFE146385AC
              Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFE146379570_2_00007FFE14637957
              Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2336 -s 140
              Source: u9R1HA4M7B.dllStatic PE information: invalid certificate
              Source: u9R1HA4M7B.dllBinary or memory string: OriginalFilenamevcruntime140.dllT vs u9R1HA4M7B.dll
              Source: classification engineClassification label: mal60.troj.winDLL@16/17@0/0
              Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7296
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6740:120:WilError_03
              Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7424
              Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6432
              Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2336
              Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\ac83b3e1-bd1a-4e32-b8f5-9b4f523c2fceJump to behavior
              Source: u9R1HA4M7B.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\u9R1HA4M7B.dll,_CreateFrameInfo
              Source: u9R1HA4M7B.dllReversingLabs: Detection: 39%
              Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\u9R1HA4M7B.dll"
              Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\u9R1HA4M7B.dll",#1
              Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\u9R1HA4M7B.dll,_CreateFrameInfo
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\u9R1HA4M7B.dll",#1
              Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2336 -s 140
              Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6432 -s 232
              Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\u9R1HA4M7B.dll,_CxxThrowException
              Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7296 -s 128
              Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\u9R1HA4M7B.dll,_FindAndUnlinkFrame
              Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7424 -s 236
              Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\u9R1HA4M7B.dll",#1Jump to behavior
              Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\u9R1HA4M7B.dll,_CreateFrameInfoJump to behavior
              Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\u9R1HA4M7B.dll,_CxxThrowExceptionJump to behavior
              Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\u9R1HA4M7B.dll,_FindAndUnlinkFrameJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\u9R1HA4M7B.dll",#1Jump to behavior
              Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\loaddll64.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\loaddll64.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\System32\loaddll64.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\System32\loaddll64.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\System32\loaddll64.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\loaddll64.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\System32\loaddll64.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\loaddll64.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\loaddll64.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\loaddll64.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: u9R1HA4M7B.dllStatic PE information: Image base 0x7fffe43c0000 > 0x60000000
              Source: u9R1HA4M7B.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
              Source: u9R1HA4M7B.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: D:\a\_work\1\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: loaddll64.exe, 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.1758875603.00007FFE14641000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1752634781.00007FFE14641000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000A.00000002.1766577814.00007FFE14641000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.1773955469.00007FFE14641000.00000004.00000001.01000000.00000003.sdmp, u9R1HA4M7B.dll

              Data Obfuscation

              barindex
              Source: Yara matchFile source: u9R1HA4M7B.dll, type: SAMPLE
              Source: Yara matchFile source: 10.2.rundll32.exe.7ffe14630000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.rundll32.exe.7ffe14630000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.2.rundll32.exe.7ffe14630000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.rundll32.exe.7ffe14630000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.loaddll64.exe.7ffe14630000.0.unpack, type: UNPACKEDPE
              Source: u9R1HA4M7B.dllStatic PE information: 0xEFFF39AD [Sun Aug 4 18:57:49 2097 UTC]
              Source: u9R1HA4M7B.dllStatic PE information: real checksum: 0x1d3b4 should be: 0x187ce
              Source: u9R1HA4M7B.dllStatic PE information: section name: _RDATA
              Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\loaddll64.exeAPI coverage: 8.5 %
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: Amcache.hve.8.drBinary or memory string: VMware
              Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin
              Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
              Source: Amcache.hve.8.drBinary or memory string: VMware20,1hbin@
              Source: Amcache.hve.8.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
              Source: Amcache.hve.8.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.8.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.8.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
              Source: Amcache.hve.8.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.8.drBinary or memory string: vmci.sys
              Source: Amcache.hve.8.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
              Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin`
              Source: Amcache.hve.8.drBinary or memory string: \driver\vmci,\driver\pci
              Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.8.drBinary or memory string: VMware20,1
              Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
              Source: Amcache.hve.8.drBinary or memory string: VMware PCI VMCI Bus Device
              Source: Amcache.hve.8.drBinary or memory string: VMware VMCI Bus Device
              Source: Amcache.hve.8.drBinary or memory string: VMware Virtual RAM
              Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: Amcache.hve.8.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
              Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFE14640338 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FFE14640338
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\u9R1HA4M7B.dll",#1Jump to behavior
              Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFE1464028C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FFE1464028C
              Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFE1463AC8A GetUserNameW,0_2_00007FFE1463AC8A
              Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
              Source: Amcache.hve.8.drBinary or memory string: msmpeng.exe
              Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: Amcache.hve.8.drBinary or memory string: MsMpEng.exe
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
              DLL Side-Loading
              11
              Process Injection
              1
              Rundll32
              OS Credential Dumping1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              11
              Process Injection
              LSASS Memory11
              Security Software Discovery
              Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
              Timestomp
              Security Account Manager1
              Account Discovery
              SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              DLL Side-Loading
              NTDS1
              System Owner/User Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets2
              System Information Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 1431871 Sample: u9R1HA4M7B.exe Startdate: 25/04/2024 Architecture: WINDOWS Score: 60 28 Multi AV Scanner detection for submitted file 2->28 30 Yara detected WineLoader 2->30 32 PE file has a writeable .text section 2->32 8 loaddll64.exe 1 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 rundll32.exe 8->12         started        14 rundll32.exe 8->14         started        16 2 other processes 8->16 process5 18 rundll32.exe 10->18         started        20 WerFault.exe 16 12->20         started        22 WerFault.exe 16 14->22         started        24 WerFault.exe 16 16->24         started        process6 26 WerFault.exe 20 17 18->26         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              u9R1HA4M7B.dll39%ReversingLabsWin64.Trojan.Generic
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              http://upx.sf.netAmcache.hve.8.drfalse
                high
                No contacted IP infos
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1431871
                Start date and time:2024-04-25 22:12:04 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 4m 54s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:20
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:u9R1HA4M7B.dll
                (renamed file extension from exe to dll, renamed because original name is a hash value)
                Original Sample Name:f5cb3234eff0dbbd653d5cdce1d4b1026fa9574ebeaf16aaae3d4e921b6a7f9d.exe
                Detection:MAL
                Classification:mal60.troj.winDLL@16/17@0/0
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 6
                • Number of non-executed functions: 15
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 20.42.73.29
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • VT rate limit hit for: u9R1HA4M7B.dll
                TimeTypeDescription
                22:13:02API Interceptor4x Sleep call for process: WerFault.exe modified
                No context
                No context
                No context
                No context
                No context
                Process:C:\Windows\System32\WerFault.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):65536
                Entropy (8bit):0.691507820725168
                Encrypted:false
                SSDEEP:96:YMpeF5V7iEyKyQsjC4Rv1yHpSsQXIDcQZc6McEPcw3m/XaXz+HbHgSQgJjNZAX/F:YtFiEyQU03IFiXjMzuiFt+Z24lO8S
                MD5:8A3A2203271203DB330AE235CD9C2780
                SHA1:798FD9639100DFF358338774EB6B2343D718EC62
                SHA-256:7EEC08F070B28CB54416DFE842FE9093C419EDB1F306D76A7D437C3668FD4D79
                SHA-512:A189F7E6A2AF5C9844373707EBCFC9C03B2CE704D080B52089F4CED935B08E35B3CBBB1773AEB5344FD46385FD624494BE49ECDBD4F4124AF7EFD60E7CB8ECCE
                Malicious:false
                Reputation:low
                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.5.4.9.5.7.7.7.3.8.9.5.7.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.5.4.9.5.7.8.0.2.0.2.0.4.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.1.5.c.f.4.1.d.-.1.8.0.d.-.4.2.f.e.-.9.d.f.9.-.a.1.9.b.e.0.7.0.e.7.5.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.3.6.7.6.6.5.7.-.6.d.3.7.-.4.8.b.0.-.b.c.f.5.-.4.8.a.7.f.e.c.c.c.2.4.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.u.9.R.1.H.A.4.M.7.B...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.0.0.-.0.0.0.1.-.0.0.1.4.-.6.c.3.8.-.d.5.f.6.4.c.9.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.
                Process:C:\Windows\System32\WerFault.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):65536
                Entropy (8bit):0.69145670916839
                Encrypted:false
                SSDEEP:96:cfgFQ4G7iX3yKyOsjC4Rv1yHpSsQXIDcQZc6McEPcw3m/XaXz+HbHgSQgJjNZAX9:xuTiX3yOU03IFiXjMzuiFt+Z24lO8S
                MD5:47CA43A527FAB44968E7BCFFC3E686D9
                SHA1:F793A344B6B3C08DCA83ADDA6395C3A4FB53DB26
                SHA-256:7B1C00B8E9977C7AF71D5C803C303AC157BBBF383FDF23D20C1515305BCE166A
                SHA-512:F92B08388227F27E5B8DF685CFEECFEC6E13316A70A4F8DA80EF69F66E35EB06BE56E1D5FBEAFD2BDD1C695CD4240044427DF64EF12E6054972BC8F704ABE14E
                Malicious:false
                Reputation:low
                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.5.4.9.5.7.1.9.3.7.4.8.8.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.5.4.9.5.7.2.4.9.9.9.8.2.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.d.3.3.7.8.9.e.-.b.0.0.9.-.4.5.d.7.-.9.5.6.c.-.4.4.2.a.f.a.c.1.9.b.e.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.e.e.f.9.8.3.8.-.9.6.3.d.-.4.e.d.b.-.8.f.6.c.-.3.4.f.9.0.5.8.7.c.5.7.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.u.9.R.1.H.A.4.M.7.B...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.2.0.-.0.0.0.1.-.0.0.1.4.-.e.6.e.0.-.3.c.f.3.4.c.9.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.
                Process:C:\Windows\System32\WerFault.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):65536
                Entropy (8bit):0.6915812318575917
                Encrypted:false
                SSDEEP:96:EJ0FkRF7iIyKyUsjC4Rv1yHpSsQXIDcQZc6McEPcw3m/XaXz+HbHgSQgJjNZAX/F:q0CRZiIyUU03IFiXjMzuiFt+Z24lO8S
                MD5:8BEA8537656AC778C06A92E0DAD1BC18
                SHA1:228A1EA00B56ACBDD9089CDF06DACDE68B1501D8
                SHA-256:72EE33AFF0DCAF01CB3FB66D74D064EF35294FC30F5DC60693BE526A6E8D72DB
                SHA-512:336BE3AF55177E90D14882587BE3E42B5539B29DECE651D0661B58ACCA3A2A24F1EFDD330482F4E9BE5DF01F4261357F061B92C135C53F7F71E012E100E6E886
                Malicious:false
                Reputation:low
                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.5.4.9.5.7.4.6.4.3.1.0.1.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.5.4.9.5.7.4.9.5.5.5.8.5.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.b.1.1.d.3.b.d.-.b.6.a.c.-.4.a.b.3.-.b.7.1.a.-.4.2.6.2.3.6.c.3.4.1.2.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.8.2.0.1.4.7.4.-.0.f.b.7.-.4.8.8.0.-.a.b.1.d.-.2.6.b.4.b.5.d.6.d.4.3.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.u.9.R.1.H.A.4.M.7.B...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.8.0.-.0.0.0.1.-.0.0.1.4.-.c.3.0.f.-.0.9.f.5.4.c.9.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.
                Process:C:\Windows\System32\WerFault.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):65536
                Entropy (8bit):0.6913971916977464
                Encrypted:false
                SSDEEP:96:Q0FRyr7i6yKydsjC4Rv1yHpSsQXIDcQZc6McEPcw3m/XaXz+HbHgSQgJjNZAX/df:ZGi6ydU03IFiXjMzuiFt+Z24lO8S
                MD5:8933077FD0D2AD3EA2A9077E3385F1B9
                SHA1:121781D6D8E6933B254EFAD919053EC36232D639
                SHA-256:E8F9436E32E277A23A68F68EB1284749216C149A997A85E2BFB7FD538907D7BB
                SHA-512:9B37D2153B3B27D56DE2AEC75DD1BE01E3DB991A2CBA3181E08985D5718F8F28BF00E43853CFC429C1FF4D8D682D3825DC96C96BFD4B2B6C52F18ED133F351D4
                Malicious:false
                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.5.4.9.5.7.1.9.3.1.9.0.9.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.5.4.9.5.7.2.4.9.4.4.0.0.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.8.b.e.7.1.7.8.-.c.1.2.3.-.4.0.e.8.-.8.4.3.3.-.7.1.7.d.d.4.6.9.d.0.9.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.e.1.e.5.a.2.9.-.8.4.7.6.-.4.4.d.6.-.b.b.e.5.-.0.2.1.a.5.7.0.f.f.d.5.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.u.9.R.1.H.A.4.M.7.B...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.9.2.0.-.0.0.0.1.-.0.0.1.4.-.b.e.6.e.-.3.e.f.3.4.c.9.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.
                Process:C:\Windows\System32\WerFault.exe
                File Type:Mini DuMP crash report, 14 streams, Thu Apr 25 20:12:52 2024, 0x1205a4 type
                Category:dropped
                Size (bytes):49298
                Entropy (8bit):1.4305543567010404
                Encrypted:false
                SSDEEP:96:508RE3noYFvmtUFVzzGVoi7MTZW3l+2VFw7w0WIOnIpgYrvnnW:1+LJOMT92L3YDnW
                MD5:3C0C952B0F3CE49F3485708BCA29679C
                SHA1:C7C077B05CD6FFBFFB46369A310B2555792DCE12
                SHA-256:EB85B071341B1C1A21CADAFA50847DA6D7D6F6D1A1857E4FFF442A32B983574E
                SHA-512:B939FD445335A21AE282EA9AA73DF1A84CA4976EC2C44D5D79A09A095E81DDFA0FEE4BA8F13D07FBD664D0B28CCFF5DEE64D5822D7C9FB31E237765CDB64B4A0
                Malicious:false
                Preview:MDMP..a..... .......D.*f........................................L#..........T.......8...........T...........H...J...........D...........0...............................................................................eJ..............Lw......................T....... ...C.*f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\System32\WerFault.exe
                File Type:Mini DuMP crash report, 14 streams, Thu Apr 25 20:12:52 2024, 0x1205a4 type
                Category:dropped
                Size (bytes):49006
                Entropy (8bit):1.4446868138846818
                Encrypted:false
                SSDEEP:96:508nE3O9dYFvmtUFVm9VRoi7MjIq5sK/uiVZVVQnf+ftBH0cAvA6LLQRooo+fWIC:1Np9wOMjT/uiVZVVQnGf/A
                MD5:D318BDAA4287A58C5D335EDC7C42AB51
                SHA1:2822B9C34CFB1FEB46531233A90C8B3BE69853D5
                SHA-256:60B288116C9410E08536908CC8343FE92931BC1ABE4C3CC10127416025123975
                SHA-512:85A422F1E754E1A871AD6DCE459883D7B027EC0806B0321C290582C783B7F022C887331CD732D682453800C7B02A760CBD0D5529A0E9402E4488EAF091142134
                Malicious:false
                Preview:MDMP..a..... .......D.*f........................................L#..........T.......8...........T..........................D...........0...............................................................................eJ..............Lw......................T....... ...C.*f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\System32\WerFault.exe
                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):8600
                Entropy (8bit):3.694221789035244
                Encrypted:false
                SSDEEP:192:R6l7wVeJBVyIj9s6Y0HLD80gmfDiNa/pD+89bLj0fdZm:R6lXJzyd6YIzgmfDiNeLwfq
                MD5:399F7C22B5FBF82A1497F8750D68E549
                SHA1:4C1D61EFDC5C7B68F8FF08C2427A905E185CD496
                SHA-256:7AE622F09E795D9B45D4CF4A8D191453BCBE996C39EDAF3F91BADCF0F5CB8F67
                SHA-512:4B767542314E7AD43619A685DFBFF91F014036E03A01F6FE9E411BAB0393E9E1BAD0D603F11E3A2AEE7233C24F9840B5161A72A3DAB9AC53D86BE5CCF927CAEA
                Malicious:false
                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.3.3.6.<./.P.i.
                Process:C:\Windows\System32\WerFault.exe
                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):8592
                Entropy (8bit):3.692518340943735
                Encrypted:false
                SSDEEP:192:R6l7wVeJeqyO9I6YPEmgmfDiNa/pDy89bL/0fxFZm:R6lXJzyb6YsmgmfDiNSLMfxC
                MD5:661BEBB211BF8C149958FA50CC4AC0BE
                SHA1:1998505010E5B30504B715BF242553DCF224836C
                SHA-256:35FD8F87DEB0C70A1C33FFB850C5723E09AA5B6DCCB83340317BF85F5EE2AF18
                SHA-512:C1BF005C2026BB4406A0894351CE3D251B1758774CB0254B0D7ED419752EA7FAF80D521997BF47553000E7D515C475A0D3F9C6E08B4E7A835341B9C4510938F4
                Malicious:false
                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.4.3.2.<./.P.i.
                Process:C:\Windows\System32\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4878
                Entropy (8bit):4.4745465336272705
                Encrypted:false
                SSDEEP:48:cvIwWl8zsaJg771I9QzWpW8VYIYm8M4JCJChYgFVyq8vhhYlptSTSmd:uIjfoI7XC7VMJHW0poOmd
                MD5:9F854996CCA1AEA2C513E1593B2E17FA
                SHA1:5888BF02473EE4E29EAAFD2C92BC09999F19EC2D
                SHA-256:C38F9884E6808791C18F306D5F7889D9A1C8DD8BEC98EBC59619F5705972737D
                SHA-512:DC6AFD63B73F42A7D755F2FAE3DAC4CD690B24603F7E02FB158D24781ECE3F645B93376F7972712D82A3F2472679056C71DBD21F301ADEBB8CA7339A5266D21D
                Malicious:false
                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="295875" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                Process:C:\Windows\System32\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4878
                Entropy (8bit):4.476671377387129
                Encrypted:false
                SSDEEP:48:cvIwWl8zsaJg771I9QzWpW8VY3Ym8M4JCJChYgFdyq8vhhY92ptSTSDd:uIjfoI7XC7V3JTWK2poODd
                MD5:B0B4A6445D4614F69B180861F1EF0557
                SHA1:CC2D4756E93415B32B57234D6F4DA2F07898B925
                SHA-256:2DC7646ECC73A8EF7C9717C2ED6F9C4D718185FE2BB4FE4CEA0E74A84F90C8C5
                SHA-512:F7A47A74FEB7AF879E6AD7D00026C16490DB387FBD243A6BCD2FCA20358021012C92A695DBAFCC4D95E9182319FB65B87C0CED8DD58FADFDAD8B56917AA006EA
                Malicious:false
                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="295875" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                Process:C:\Windows\System32\WerFault.exe
                File Type:Mini DuMP crash report, 14 streams, Thu Apr 25 20:12:54 2024, 0x1205a4 type
                Category:dropped
                Size (bytes):49954
                Entropy (8bit):1.4161045119296658
                Encrypted:false
                SSDEEP:96:57S8VE3lMwhCYFvmtUFVpKDdoi7MTLh4W+jC/ViuPU0HYuYWI1zGI5gVvx:Fhovhu2OMTwGpzAgj
                MD5:3EF44344739E09B50E7B0BC371D814E8
                SHA1:81ADCA826E2D835D6B80189D7665058AC10449BD
                SHA-256:71C4105DE28805D4C1186CC076529FAFEE1951C1CB5EC6EE0D1412679E99B2F7
                SHA-512:3A8D60F2C19A847144DF206DAB7E0B6BFF974C20205B04BE2387A3B6FEF0F2D58893E91560E0449D59063E03E0F2C573CA241EC43FD96C4FF507DD5138FBB002
                Malicious:false
                Preview:MDMP..a..... .......F.*f........................................L#..........T.......8...........T...........H..............D...........0...............................................................................eJ..............Lw......................T...........F.*f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\System32\WerFault.exe
                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):8590
                Entropy (8bit):3.6926324025637376
                Encrypted:false
                SSDEEP:192:R6l7wVeJHtuy49u6YPWmgmfDiNa/pDl89b9Ecf0c8/m:R6lXJkyL6YOmgmfDiNj9Xfj
                MD5:239D3584078842354ACECA5ED2026EB3
                SHA1:11C96A9C4795F9854264A65A6C55BE1CFC879910
                SHA-256:5D978513B12FB320F76117BA8D0B92AEABF0A5D27CF1F589B42D1F3DC42801A3
                SHA-512:EC979E551EF24E0A99D6179D916785A66FB941F46CC91124B670ADE156F0618FB0D25CA010BFA3F1FA23DED3DC9B3FD5C1B3B85260DCBD9B86E885CDB6334E59
                Malicious:false
                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.2.9.6.<./.P.i.
                Process:C:\Windows\System32\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4878
                Entropy (8bit):4.474782354737111
                Encrypted:false
                SSDEEP:48:cvIwWl8zsaJg771I9QzWpW8VYqYm8M4JCJChYgFaAyyq8vhhYNptSTShhd:uIjfoI7XC7V6JGW8poOhhd
                MD5:56F62AFEDF619D829397221D1DB45761
                SHA1:BBC0C7824E44A3635CE4F32DC528CEF6606822A9
                SHA-256:AEAD2B780CFCA1D88457E1A81CA836D9863AA9E9EE4C906ADFE138E2FCC8291F
                SHA-512:6BE1E7175CB186BC9621A58FAF9B0F9845EE81621A402E7ED1D04A6A5E933A89104488F1AB629BD83526CA7D7FEE60207A3F40C0C735FC716623CFC6763BD2EF
                Malicious:false
                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="295875" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                Process:C:\Windows\System32\WerFault.exe
                File Type:Mini DuMP crash report, 14 streams, Thu Apr 25 20:12:57 2024, 0x1205a4 type
                Category:dropped
                Size (bytes):50338
                Entropy (8bit):1.3941467383715735
                Encrypted:false
                SSDEEP:192:UVzNSOMf5Nl7UHkowVFLhLaQDudKnzHqH+:anEVIHkowVFLRaQydKnzKe
                MD5:DDD663A0176BCB6357D1D93C8FC299E3
                SHA1:4176B2C1208340E5F3C9293870E46685754A20E0
                SHA-256:4C05ECF502625038D5859E2D8CAD26863B574DFEA8789912B79CAACA8575F312
                SHA-512:C1DA62825BC2AA8C03C3F276EE9A828AFB273781F74318E9E848D93F4C7AE90326D3CD949E3EF6DD862319F8C65409700FC970FEBF4C506AEDFD6CBD78FAC61C
                Malicious:false
                Preview:MDMP..a..... .......I.*f........................................L#..........T.......8...........T...........H...Z...........D...........0...............................................................................eJ..............Lw......................T...........I.*f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\System32\WerFault.exe
                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):8592
                Entropy (8bit):3.692121538124629
                Encrypted:false
                SSDEEP:192:R6l7wVeJY9BX9HZ6YP5mgmfDiNa/pDP89bmXNf0im:R6lXJyBVZ6YxmgmfDiN5m9fQ
                MD5:A9FC48A7F4469AAF4597781D052C31C2
                SHA1:6449996442DB3FD57720646750A8468C80B4BD73
                SHA-256:98A8208FF6CAA3F48C371F2E67A0236E6396AB98334E22C1EFFB3D355C6F7E22
                SHA-512:C5EFC8C077DE27AFF823D9C64CC4E99E10807C6E185671737A5D736116D22D25AC1C99D5820D824F78856B2FBCD35A994CF5693DE0AA8D9A9D7E913FC6B2630A
                Malicious:false
                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.2.4.<./.P.i.
                Process:C:\Windows\System32\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4878
                Entropy (8bit):4.477570678344253
                Encrypted:false
                SSDEEP:48:cvIwWl8zsaJg771I9QzWpW8VY4Ym8M4JCJChYgFhyq8vhhYJzptSTSvd:uIjfoI7XC7VcJPWYpoOvd
                MD5:D5F2562CD3CDE7EF958BE7090239F038
                SHA1:8001EE7044F02E27D9434DB2C59E027E4E1D0CA3
                SHA-256:53CCBE6DA668C56BE2CF0178B6D6CA3ED038677046C0C400E67CB7795FCA4115
                SHA-512:3098D38457197A7688022747B7BF1A3395343815538DF860416AF8B8F758B6D9F1BA31C5173CC235B89E0FE67E220733C3BA8F6597AC001FCC4597CB9572B50A
                Malicious:false
                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="295875" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                Process:C:\Windows\System32\WerFault.exe
                File Type:MS Windows registry file, NT/2000 or above
                Category:dropped
                Size (bytes):1835008
                Entropy (8bit):4.46638485134926
                Encrypted:false
                SSDEEP:6144:AIXfpi67eLPU9skLmb0b4zWSPKaJG8nAgejZMMhA2gX4WABl0uNcdwBCswSb9:FXD94zWlLZMM6YFHa+9
                MD5:77C80B1F231AF4272027EF8B96C953EC
                SHA1:14630FA9BF17B9359A5B20D77190E2843A8CB220
                SHA-256:CB12DE3570333B9AA5BED6CA5AB49B3FEBF7B47E51DF379A4D87AD98106A8772
                SHA-512:E95913C1991D9B6DC88F8C9C33A57F08C0259672BFAB3D9B285863FB3279A0A74FCD73EEA7F29516167CD07B8F609686560C4923304CB9BD15421236366D81DA
                Malicious:false
                Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmr.s.L.................................................................................................................................................................................................................................................................................................................................................e.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                Entropy (8bit):6.4592932953759785
                TrID:
                • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                • Win64 Executable (generic) (12005/4) 10.17%
                • Generic Win/DOS Executable (2004/3) 1.70%
                • DOS Executable Generic (2002/1) 1.70%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                File name:u9R1HA4M7B.dll
                File size:98'736 bytes
                MD5:180669dd53e9169c7775d5acc4b79a9f
                SHA1:faf9e7a6bfd0e766230f6c615693829c86fa7ff3
                SHA256:f5cb3234eff0dbbd653d5cdce1d4b1026fa9574ebeaf16aaae3d4e921b6a7f9d
                SHA512:f77036135f9dde670b56d9ba3ae644c0232adadf657583e17ec45274dc619d0f31a5b2c96b9cf1729251361942c65f62a8cf97cddced472d48e3b0e53d3bce5c
                SSDEEP:1536:zxhUIePlHhRUzXyNC6+iv7u0/7eAD4AALuXvycecbni10DWZz:zvcUzXyNbhS0/7vD4Ax3ecbnG1
                TLSH:C4A33802F2A940B9D09EC2B48396E727B7B074089B6077CF17A54B251E97F909F3935B
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A.&k..H8..H8..H8..I9..H8...8..H8..I8(.H8e.K9..H8e.L9..H8e.M9..H8e.H9..H8e..8..H8e.J9..H8Rich..H8................PE..d....9.....
                Icon Hash:7ae282899bbab082
                Entrypoint:0x7fffe43ccf2a
                Entrypoint Section:.text
                Digitally signed:true
                Imagebase:0x7fffe43c0000
                Subsystem:windows cui
                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
                Time Stamp:0xEFFF39AD [Sun Aug 4 18:57:49 2097 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:6
                OS Version Minor:0
                File Version Major:6
                File Version Minor:0
                Subsystem Version Major:6
                Subsystem Version Minor:0
                Import Hash:7f07fd94e5bb907093556781cc464017
                Signature Valid:false
                Signature Issuer:CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
                Signature Validation Error:The digital signature of the object did not verify
                Error Number:-2146869232
                Not Before, Not After
                • 02/09/2021 19:33:02 01/09/2022 19:33:02
                Subject Chain
                • CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
                Version:3
                Thumbprint MD5:550C27BE6F1184B6CC93B4B4E2EA9D58
                Thumbprint SHA-1:C9CAEDC2CECF953E812C6446D41927B9864BB880
                Thumbprint SHA-256:63E8D95BCEE4522E6380E7F9305A676C0880AD93AD3BA9CB53FE43D6081A1025
                Serial:3300000255181DA42EE086FC15000000000255
                Instruction
                inc ecx
                push edi
                inc ecx
                push esi
                inc ecx
                push ebp
                inc ecx
                push esp
                push esi
                push edi
                push ebp
                push ebx
                dec eax
                sub esp, 00000158h
                movaps esp+00000140h, dqword ptr [xmm7]
                movaps esp+00000130h, dqword ptr [xmm6]
                dec eax
                mov esi, ecx
                dec eax
                lea edi, dword ptr [esp+000000C0h]
                dec eax
                mov dword ptr [edi-08h], 0000000Ch
                dec eax
                mov eax, 00F7D404h
                in eax, dx
                js 00007FD858BB780Ch
                outsd
                dec eax
                mov dword ptr [edi], eax
                mov dword ptr [edi+08h], FCF1BF11h
                inc ecx
                mov esi, 00000001h
                dec esp
                mov dword ptr [edi+0Ch], esi
                mov edx, 0000000Ch
                dec eax
                mov ecx, edi
                call 00007FD858BB1960h
                xor ebp, ebp
                mov dword ptr [edi+0Ch], ebp
                dec eax
                lea ebx, dword ptr [esp+78h]
                dec eax
                mov dword ptr [ebx-08h], 0000001Ah
                movups xmm6, dqword ptr [FFFF9EF2h]
                movups dqword ptr [ebx], xmm6
                movups xmm7, dqword ptr [FFFF9EF2h]
                movups dqword ptr [ebx+0Ah], xmm7
                dec esp
                mov dword ptr [ebx+1Ch], esi
                mov edx, 0000001Ah
                dec eax
                mov ecx, ebx
                call 00007FD858BB1928h
                mov dword ptr [ebx+1Ch], ebp
                dec eax
                mov ecx, ebx
                call 00007FD858BB1AE7h
                dec eax
                mov ecx, eax
                dec eax
                mov edx, edi
                call 00007FD858BB1B4Dh
                call eax
                dec eax
                cmp dword ptr [esi], 00000000h
                je 00007FD858BB78EEh
                dec esp
                lea esi, dword ptr [esp+70h]
                dec ecx
                mov dword ptr [esi+08h], 00000000h
                Programming Language:
                • [IMP] VS2008 SP1 build 30729
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x143300x834.rdata
                IMAGE_DIRECTORY_ENTRY_IMPORT0x14b640x8c.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x190000x3d0.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x170000xb70.pdata
                IMAGE_DIRECTORY_ENTRY_SECURITY0x15a000x27b0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1a0000x1a0.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x12df00x70.rdata
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x12cb00x140.rdata
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x100000xfc0004eb33aa9e6b038b535164fd05125e11False0.5051773313492064data6.435321041244554IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rdata0x110000x50000x42008fcb1166becbcee82e5ade4c005ba659False0.3974313446969697SysEx File - ADA4.843091866116115IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .data0x160000x10000x400317b92eb9b8980fbb7e3d768cb5131e1False0.1953125DOS executable (block device driver =\344\377\177)2.6154988641607586IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .pdata0x170000x10000xc00fc0281b543ce69732b9e511c59978715False0.4811197916666667PEX Binary Archive4.6976656411659IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                _RDATA0x180000x10000x20016cc8eb01a68a62dea3ee2c7c598cd9fFalse0.390625data2.7869372198389426IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .rsrc0x190000x10000x400d461d102eb9f793e52452eca0d0f2a5cFalse0.412109375data3.195335377178025IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x1a0000x10000x200e2c21ce14270df72445259f3b4a18a3bFalse0.642578125data4.614856328897942IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_VERSION0x190600x36cdataEnglishUnited States0.4406392694063927
                DLLImport
                api-ms-win-crt-runtime-l1-1-0.dllterminate, abort
                api-ms-win-crt-heap-l1-1-0.dllcalloc, malloc, free
                api-ms-win-crt-string-l1-1-0.dllstrcpy_s, strncmp, wcsncmp
                api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vsprintf, __stdio_common_vsprintf_s
                api-ms-win-crt-convert-l1-1-0.dllatol
                KERNEL32.dllGetLastError, IsProcessorFeaturePresent, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlCaptureContext, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, RtlLookupFunctionEntry, RtlUnwindEx, GetModuleHandleW, GetModuleFileNameW, RtlUnwind, EncodePointer, RaiseException, RtlPcToFileHeader, InterlockedPushEntrySList, InterlockedFlushSList, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, GetProcAddress, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW
                NameOrdinalAddress
                _CreateFrameInfo10x7fffe43cfba0
                _CxxThrowException20x7fffe43c6630
                _FindAndUnlinkFrame30x7fffe43cfbe0
                _IsExceptionObjectToBeDestroyed40x7fffe43c25a0
                _SetWinRTOutOfMemoryExceptionCallback50x7fffe43c25d0
                __AdjustPointer60x7fffe43c25e0
                __BuildCatchObject70x7fffe43c56e0
                __BuildCatchObjectHelper80x7fffe43c56f0
                __C_specific_handler90x7fffe43cef20
                __C_specific_handler_noexcept100x7fffe43cecd0
                __CxxDetectRethrow110x7fffe43c5710
                __CxxExceptionFilter120x7fffe43c5760
                __CxxFrameHandler130x7fffe43cfc90
                __CxxFrameHandler2140x7fffe43cfc90
                __CxxFrameHandler3150x7fffe43cfca0
                __CxxQueryExceptionSize160x7fffe43c5950
                __CxxRegisterExceptionObject170x7fffe43c5960
                __CxxUnregisterExceptionObject180x7fffe43c5a10
                __DestructExceptionObject190x7fffe43c2520
                __FrameUnwindFilter200x7fffe43c2610
                __GetPlatformExceptionInfo210x7fffe43c2680
                __NLG_Dispatch2220x7fffe43c1140
                __NLG_Return2230x7fffe43c1150
                __RTCastToVoid240x7fffe43c6110
                __RTDynamicCast250x7fffe43c6170
                __RTtypeid260x7fffe43c62e0
                __TypeMatch270x7fffe43c5700
                __current_exception280x7fffe43c26e0
                __current_exception_context290x7fffe43c2700
                __intrinsic_setjmp300x7fffe43d05f0
                __intrinsic_setjmpex310x7fffe43d06b0
                __processing_throw320x7fffe43c2720
                __report_gsfailure330x7fffe43d0370
                __std_exception_copy340x7fffe43c6390
                __std_exception_destroy350x7fffe43c6420
                __std_terminate360x7fffe43c2740
                __std_type_info_compare370x7fffe43c6470
                __std_type_info_destroy_list380x7fffe43c64a0
                __std_type_info_hash390x7fffe43c64d0
                __std_type_info_name400x7fffe43c6510
                __telemetry_main_invoke_trigger410x7fffe43c1d30
                __telemetry_main_return_trigger420x7fffe43c1d30
                __unDName430x7fffe43ceac0
                __unDNameEx440x7fffe43ceaf0
                __uncaught_exception450x7fffe43c66d0
                __uncaught_exceptions460x7fffe43c66f0
                __vcrt_GetModuleFileNameW470x7fffe43c6df0
                __vcrt_GetModuleHandleW480x7fffe43c6e00
                __vcrt_InitializeCriticalSectionEx490x7fffe43c6d80
                __vcrt_LoadLibraryExW500x7fffe43c6e10
                _get_purecall_handler510x7fffe43c6e20
                _get_unexpected520x7fffe43c6710
                _is_exception_typeof530x7fffe43c2750
                _local_unwind540x7fffe43c1de0
                _purecall550x7fffe43c6e30
                _set_purecall_handler560x7fffe43c6e50
                _set_se_translator570x7fffe43c5652
                longjmp580x7fffe43c1db0
                memchr590x7fffe43c1170
                memcmp600x7fffe43c11f0
                memcpy610x7fffe43c12f0
                memmove620x7fffe43c12f0
                memset630x7fffe43c19a0
                set_unexpected640x7fffe43c6740
                strchr650x7fffe43c1e10
                strrchr660x7fffe43c1e90
                strstr670x7fffe43c1fd0
                unexpected680x7fffe43c6770
                wcschr690x7fffe43c21d0
                wcsrchr700x7fffe43c2250
                wcsstr710x7fffe43c2300
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                No network behavior found

                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:22:12:51
                Start date:25/04/2024
                Path:C:\Windows\System32\loaddll64.exe
                Wow64 process (32bit):false
                Commandline:loaddll64.exe "C:\Users\user\Desktop\u9R1HA4M7B.dll"
                Imagebase:0x7ff7db9a0000
                File size:165'888 bytes
                MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate
                Has exited:false

                Target ID:1
                Start time:22:12:51
                Start date:25/04/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7699e0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:2
                Start time:22:12:51
                Start date:25/04/2024
                Path:C:\Windows\System32\cmd.exe
                Wow64 process (32bit):false
                Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\u9R1HA4M7B.dll",#1
                Imagebase:0x7ff73f970000
                File size:289'792 bytes
                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:3
                Start time:22:12:51
                Start date:25/04/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe C:\Users\user\Desktop\u9R1HA4M7B.dll,_CreateFrameInfo
                Imagebase:0x7ff6696e0000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:4
                Start time:22:12:51
                Start date:25/04/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\u9R1HA4M7B.dll",#1
                Imagebase:0x7ff6696e0000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:8
                Start time:22:12:51
                Start date:25/04/2024
                Path:C:\Windows\System32\WerFault.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\WerFault.exe -u -p 2336 -s 140
                Imagebase:0x7ff799a50000
                File size:570'736 bytes
                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:9
                Start time:22:12:51
                Start date:25/04/2024
                Path:C:\Windows\System32\WerFault.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\WerFault.exe -u -p 6432 -s 232
                Imagebase:0x7ff799a50000
                File size:570'736 bytes
                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:10
                Start time:22:12:54
                Start date:25/04/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe C:\Users\user\Desktop\u9R1HA4M7B.dll,_CxxThrowException
                Imagebase:0x7ff6696e0000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:12
                Start time:22:12:54
                Start date:25/04/2024
                Path:C:\Windows\System32\WerFault.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\WerFault.exe -u -p 7296 -s 128
                Imagebase:0x7ff799a50000
                File size:570'736 bytes
                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:13
                Start time:22:12:57
                Start date:25/04/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe C:\Users\user\Desktop\u9R1HA4M7B.dll,_FindAndUnlinkFrame
                Imagebase:0x7ff6696e0000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:15
                Start time:22:12:57
                Start date:25/04/2024
                Path:C:\Windows\System32\WerFault.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\WerFault.exe -u -p 7424 -s 236
                Imagebase:0x7ff799a50000
                File size:570'736 bytes
                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:6.7%
                  Dynamic/Decrypted Code Coverage:0%
                  Signature Coverage:14.6%
                  Total number of Nodes:492
                  Total number of Limit Nodes:3
                  execution_graph 4402 7ffe14631db0 4404 7ffe14631dc4 __except_validate_jump_buffer 4402->4404 4403 7ffe1464059e RtlUnwind 4403->4403 4404->4403 4697 7ffe14634930 4698 7ffe1463497d __CxxCallCatchBlock _CreateFrameInfo 4697->4698 4699 7ffe14634a64 abort 4698->4699 4700 7ffe14634a5d 4698->4700 4699->4700 4701 7ffe1463fbe0 __CxxCallCatchBlock abort 4700->4701 4702 7ffe14634b05 __CxxCallCatchBlock 4701->4702 4822 7ffe146351f0 4823 7ffe146350ac __CxxCallCatchBlock __FrameHandler3::FrameUnwindToEmptyState 4822->4823 4824 7ffe146401a0 8 API calls 4823->4824 4825 7ffe14635233 4824->4825 4703 7ffe14632d2e abort 4643 7ffe14640a72 4644 7ffe14640a89 4643->4644 4645 7ffe14634040 28 API calls 4644->4645 4646 7ffe14640ae5 4645->4646 4647 7ffe1463bf76 4648 7ffe1463bfec 4647->4648 4649 7ffe1463d8fe LoadLibraryW 4648->4649 4672 7ffe1463c8e5 4648->4672 4650 7ffe1463c1b8 4649->4650 4651 7ffe1463d8fe LoadLibraryW 4650->4651 4652 7ffe1463c275 4651->4652 4653 7ffe1463d8fe LoadLibraryW 4652->4653 4654 7ffe1463c35d 4653->4654 4655 7ffe1463d8fe LoadLibraryW 4654->4655 4656 7ffe1463c3f2 4655->4656 4657 7ffe1463d8fe LoadLibraryW 4656->4657 4658 7ffe1463c4a2 4657->4658 4659 7ffe1463d8fe LoadLibraryW 4658->4659 4660 7ffe1463c52b 4659->4660 4661 7ffe1463d8fe LoadLibraryW 4660->4661 4662 7ffe1463c5cf 4661->4662 4663 7ffe1463d8fe LoadLibraryW 4662->4663 4664 7ffe1463c670 4663->4664 4665 7ffe1463d8fe LoadLibraryW 4664->4665 4666 7ffe1463c719 4665->4666 4667 7ffe1463d8fe LoadLibraryW 4666->4667 4668 7ffe1463c7a6 4667->4668 4669 7ffe1463d8fe LoadLibraryW 4668->4669 4670 7ffe1463c85c 4669->4670 4671 7ffe1463d8fe LoadLibraryW 4670->4671 4671->4672 4673 7ffe1463ec7c 4676 7ffe1463eab4 4673->4676 4675 7ffe1463eca1 __stdio_common_vsprintf_s 4676->4675 4677 7ffe1463b67c 4678 7ffe1463b6bb 4677->4678 4679 7ffe1463ac8a 4 API calls 4678->4679 4680 7ffe1463b6e6 4679->4680 4681 7ffe1463a1a9 2 API calls 4680->4681 4682 7ffe1463b738 4681->4682 4704 7ffe1464083c 4705 7ffe1463fbe0 __CxxCallCatchBlock abort 4704->4705 4706 7ffe1464084f __CxxCallCatchBlock 4705->4706 4405 7ffe146409bb 4408 7ffe14632610 4405->4408 4407 7ffe146409c9 4409 7ffe14632655 4408->4409 4410 7ffe14632628 4408->4410 4409->4407 4410->4409 4411 7ffe1463264a terminate 4410->4411 4411->4409 4707 7ffe1463483a 4708 7ffe14634847 __CxxCallCatchBlock 4707->4708 4709 7ffe1463488b RaiseException 4708->4709 4710 7ffe146348b2 4709->4710 4711 7ffe1463fbe0 __CxxCallCatchBlock abort 4710->4711 4712 7ffe146348ba __CxxCallCatchBlock 4711->4712 4826 7ffe14631de0 RtlUnwind 4683 7ffe1463fe60 4684 7ffe1463fe81 4683->4684 4685 7ffe1463fe7c 4683->4685 4687 7ffe1464028c 4685->4687 4688 7ffe146402af GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 4687->4688 4689 7ffe14640323 4687->4689 4688->4689 4689->4684 4713 7ffe1463ec24 4716 7ffe1463eab4 4713->4716 4715 7ffe1463ec49 __stdio_common_vsprintf 4716->4715 4283 7ffe1463a1a9 4288 7ffe146394d4 4283->4288 4285 7ffe1463a2d6 4286 7ffe1463a1ec 4286->4285 4287 7ffe146394d4 2 API calls 4286->4287 4287->4286 4289 7ffe14639553 4288->4289 4325 7ffe1463d8fe 4289->4325 4291 7ffe146395bf 4292 7ffe146395fb InternetOpenW 4291->4292 4293 7ffe14639647 4292->4293 4294 7ffe1463d8fe LoadLibraryW 4293->4294 4295 7ffe146396ad 4294->4295 4296 7ffe1463d8fe LoadLibraryW 4295->4296 4297 7ffe146397b3 4296->4297 4298 7ffe1463d8fe LoadLibraryW 4297->4298 4300 7ffe146398c7 4298->4300 4299 7ffe1463997c 4302 7ffe1463d8fe LoadLibraryW 4299->4302 4300->4299 4301 7ffe1463d8fe LoadLibraryW 4300->4301 4301->4299 4303 7ffe14639a17 4302->4303 4304 7ffe14639a44 4303->4304 4305 7ffe14639de0 4303->4305 4307 7ffe1463d8fe LoadLibraryW 4304->4307 4306 7ffe1463d8fe LoadLibraryW 4305->4306 4308 7ffe14639e80 4306->4308 4309 7ffe14639af1 4307->4309 4310 7ffe1463d8fe LoadLibraryW 4308->4310 4311 7ffe1463d8fe LoadLibraryW 4309->4311 4313 7ffe14639f0f 4310->4313 4312 7ffe14639bb9 4311->4312 4315 7ffe1463d8fe LoadLibraryW 4312->4315 4314 7ffe1463d8fe LoadLibraryW 4313->4314 4316 7ffe14639f8e 4314->4316 4320 7ffe14639c81 4315->4320 4316->4286 4317 7ffe14639ddb 4318 7ffe1463d8fe LoadLibraryW 4317->4318 4321 7ffe1463a06e 4318->4321 4319 7ffe1463d8fe LoadLibraryW 4319->4320 4320->4317 4320->4319 4322 7ffe1463d8fe LoadLibraryW 4321->4322 4323 7ffe1463a0f4 4322->4323 4324 7ffe1463d8fe LoadLibraryW 4323->4324 4324->4316 4327 7ffe1463d918 4325->4327 4326 7ffe1463d9b6 4326->4291 4327->4326 4328 7ffe1463d9b1 LoadLibraryW 4327->4328 4328->4326 4827 7ffe14634ee8 4832 7ffe14634e1b __CxxCallCatchBlock Is_bad_exception_allowed __FrameHandler3::FrameUnwindToEmptyState __FrameHandler3::GetHandlerSearchState 4827->4832 4828 7ffe14634f0f abort 4829 7ffe14634f16 4828->4829 4830 7ffe14634f3a __FrameHandler3::GetHandlerSearchState 4829->4830 4831 7ffe14634f33 abort 4829->4831 4831->4830 4832->4828 4832->4829 4690 7ffe14632c69 abort 4691 7ffe14632c70 4690->4691 4717 7ffe1463fd28 4718 7ffe1463fd6a 4717->4718 4721 7ffe14634268 4718->4721 4722 7ffe14634297 __CxxCallCatchBlock 4721->4722 4726 7ffe14634401 4722->4726 4727 7ffe146342ec 4722->4727 4731 7ffe146343a1 4722->4731 4723 7ffe146343ee 4738 7ffe1463f3e0 4723->4738 4726->4731 4742 7ffe146333c0 4726->4742 4727->4723 4728 7ffe146343e7 abort 4727->4728 4729 7ffe14634393 4727->4729 4727->4731 4728->4723 4732 7ffe14634f58 4729->4732 4733 7ffe14634fa3 Is_bad_exception_allowed 4732->4733 4734 7ffe14634fd7 abort 4733->4734 4737 7ffe14634fcf __CxxCallCatchBlock __FrameHandler3::FrameUnwindToEmptyState 4733->4737 4734->4737 4735 7ffe146401a0 8 API calls 4736 7ffe14635233 4735->4736 4736->4731 4737->4735 4739 7ffe1463f3f2 4738->4739 4740 7ffe14634f58 9 API calls 4739->4740 4741 7ffe1463f40d 4740->4741 4741->4731 4752 7ffe1463341d 4742->4752 4743 7ffe14633864 abort 4744 7ffe1463386b 4743->4744 4745 7ffe146401a0 8 API calls 4744->4745 4746 7ffe14633877 4745->4746 4746->4731 4747 7ffe14633820 4747->4743 4748 7ffe14633858 4747->4748 4765 7ffe14633acc 4747->4765 4748->4743 4748->4744 4750 7ffe146337f2 4750->4748 4751 7ffe14633815 terminate 4750->4751 4751->4747 4752->4743 4752->4744 4753 7ffe146352e8 abort 4752->4753 4754 7ffe14633572 4752->4754 4755 7ffe14633557 Is_bad_exception_allowed 4753->4755 4754->4747 4754->4750 4759 7ffe14632e20 4754->4759 4755->4754 4756 7ffe1463356b terminate 4755->4756 4758 7ffe1463388b __CxxCallCatchBlock std::bad_alloc::bad_alloc 4755->4758 4756->4754 4760 7ffe14632e5d 4759->4760 4762 7ffe14632e83 Is_bad_exception_allowed 4760->4762 4775 7ffe14632c88 4760->4775 4779 7ffe1463f8b4 RtlUnwindEx 4762->4779 4766 7ffe14633b20 4765->4766 4767 7ffe14633d95 4765->4767 4770 7ffe14633b4a _CallSETranslator 4766->4770 4771 7ffe14633b3a EncodePointer 4766->4771 4768 7ffe146401a0 8 API calls 4767->4768 4769 7ffe14633da1 4768->4769 4769->4748 4770->4767 4772 7ffe14633db5 abort 4770->4772 4773 7ffe14633bae Is_bad_exception_allowed 4770->4773 4771->4770 4773->4767 4774 7ffe14632e20 15 API calls 4773->4774 4774->4773 4776 7ffe14632cab 4775->4776 4782 7ffe146329dc 4776->4782 4778 7ffe14632cbc __AdjustPointer 4778->4762 4780 7ffe146401a0 8 API calls 4779->4780 4781 7ffe14632ed9 4780->4781 4781->4754 4787 7ffe14632a09 Is_bad_exception_allowed 4782->4787 4783 7ffe14632a9c 4784 7ffe14632abb 4783->4784 4785 7ffe14632ab5 abort 4783->4785 4793 7ffe14632a8e __AdjustPointer 4783->4793 4786 7ffe14632b03 abort 4784->4786 4788 7ffe14632b09 4784->4788 4784->4793 4785->4784 4786->4788 4787->4783 4789 7ffe14632a96 abort 4787->4789 4787->4793 4790 7ffe14632b54 abort 4788->4790 4792 7ffe14632b5a 4788->4792 4788->4793 4789->4783 4790->4792 4791 7ffe14632b99 abort abort 4791->4793 4792->4791 4792->4793 4793->4778 4358 7ffe1463cf2a 4359 7ffe1463cf8b 4358->4359 4360 7ffe1463cfd9 FreeConsole 4359->4360 4361 7ffe1463d07d 4360->4361 4362 7ffe1463cfe5 4360->4362 4366 7ffe1463d070 4361->4366 4367 7ffe1463d3ad 4361->4367 4369 7ffe1463b3bb 4362->4369 4365 7ffe1463d4f5 4374 7ffe1463ba6e 4366->4374 4367->4365 4368 7ffe14637885 LoadLibraryW 4367->4368 4368->4367 4378 7ffe1463ac8a 4369->4378 4371 7ffe1463b3ec 4391 7ffe1463a1a9 4371->4391 4373 7ffe1463b441 4373->4366 4377 7ffe1463baaf 4374->4377 4376 7ffe1463bb98 4376->4366 4377->4376 4396 7ffe1463b27e 4377->4396 4379 7ffe14637885 LoadLibraryW 4378->4379 4381 7ffe1463acc0 4379->4381 4380 7ffe14637885 LoadLibraryW 4380->4381 4381->4380 4382 7ffe1463ad44 4381->4382 4383 7ffe1463a45a 2 API calls 4382->4383 4384 7ffe1463adc0 4383->4384 4385 7ffe1463d8fe LoadLibraryW 4384->4385 4386 7ffe1463af4a 4385->4386 4387 7ffe1463af55 GetUserNameW 4386->4387 4388 7ffe1463af79 4387->4388 4389 7ffe1463a9a7 2 API calls 4388->4389 4390 7ffe1463b11a 4389->4390 4390->4371 4392 7ffe146394d4 2 API calls 4391->4392 4394 7ffe1463a1ec 4392->4394 4393 7ffe1463a2d6 4393->4373 4394->4393 4395 7ffe146394d4 2 API calls 4394->4395 4395->4394 4397 7ffe1463b2ca 4396->4397 4398 7ffe1463ac8a 4 API calls 4397->4398 4399 7ffe1463b2f8 4398->4399 4400 7ffe1463a1a9 2 API calls 4399->4400 4401 7ffe1463b340 4400->4401 4401->4377 4412 7ffe1463fc90 4413 7ffe1463fca0 4412->4413 4416 7ffe14634040 4413->4416 4419 7ffe1463406d __CxxCallCatchBlock 4416->4419 4417 7ffe146340cc 4418 7ffe14634118 4417->4418 4420 7ffe1463413e 4417->4420 4426 7ffe146340fd 4417->4426 4429 7ffe1463edc8 4417->4429 4419->4417 4419->4418 4425 7ffe14634151 Is_bad_exception_allowed 4419->4425 4441 7ffe1463f37c 4420->4441 4424 7ffe14634137 abort 4424->4420 4425->4418 4448 7ffe14632ef4 4425->4448 4426->4420 4426->4424 4427 7ffe14634107 4426->4427 4433 7ffe14634dcc 4427->4433 4430 7ffe1463ee28 abort 4429->4430 4431 7ffe1463edd6 4429->4431 4431->4430 4432 7ffe1463ede7 4431->4432 4432->4426 4434 7ffe14634dfb Is_bad_exception_allowed 4433->4434 4477 7ffe1463ed1c 4434->4477 4436 7ffe14634e11 __CxxCallCatchBlock Is_bad_exception_allowed __FrameHandler3::FrameUnwindToEmptyState __FrameHandler3::GetHandlerSearchState 4437 7ffe14634f0f abort 4436->4437 4438 7ffe14634f16 4436->4438 4437->4438 4439 7ffe14634f3a __FrameHandler3::GetHandlerSearchState 4438->4439 4440 7ffe14634f33 abort 4438->4440 4439->4418 4440->4439 4481 7ffe1463f414 4441->4481 4445 7ffe1463f3a9 __FrameHandler3::FrameUnwindToEmptyState 4446 7ffe14634dcc __FrameHandler3::FrameUnwindToEmptyState 3 API calls 4445->4446 4447 7ffe1463f3d0 4446->4447 4447->4418 4490 7ffe14635250 4448->4490 4450 7ffe14633374 abort 4451 7ffe1463337b 4450->4451 4533 7ffe146401a0 4451->4533 4452 7ffe14632f56 4452->4450 4452->4451 4456 7ffe1463303d 4452->4456 4502 7ffe146352e8 4452->4502 4454 7ffe1463332f 4454->4450 4459 7ffe1463332d 4454->4459 4523 7ffe146338b0 4454->4523 4456->4454 4457 7ffe14633075 4456->4457 4460 7ffe14633246 Is_bad_exception_allowed 4457->4460 4505 7ffe1463f504 4457->4505 4459->4450 4459->4451 4460->4459 4463 7ffe14633285 4460->4463 4517 7ffe1463f348 4460->4517 4463->4459 4464 7ffe146332b5 Is_bad_exception_allowed 4463->4464 4466 7ffe146332a5 terminate 4463->4466 4465 7ffe146352e8 abort 4464->4465 4467 7ffe146332d7 4465->4467 4466->4464 4467->4459 4468 7ffe1463f414 __GetUnwindTryBlock 2 API calls 4467->4468 4469 7ffe146332f1 4468->4469 4520 7ffe1463f7b0 RtlUnwindEx 4469->4520 4471 7ffe146330a4 4471->4460 4510 7ffe14632d4c 4471->4510 4474 7ffe14633022 Is_bad_exception_allowed 4474->4456 4475 7ffe14633036 terminate 4474->4475 4476 7ffe1463339b __CxxCallCatchBlock std::bad_alloc::bad_alloc 4474->4476 4475->4456 4478 7ffe1463ed3e 4477->4478 4479 7ffe1463ed33 4477->4479 4478->4436 4480 7ffe1463edc8 __GetCurrentState abort 4479->4480 4480->4478 4482 7ffe1463edb8 __FrameHandler3::FrameUnwindToEmptyState abort 4481->4482 4483 7ffe1463f442 4482->4483 4484 7ffe1463f39b 4483->4484 4485 7ffe1463f46e RtlLookupFunctionEntry 4483->4485 4486 7ffe1463edb8 4484->4486 4485->4483 4487 7ffe1463edc8 4486->4487 4488 7ffe1463ee28 abort 4487->4488 4489 7ffe1463ede7 4487->4489 4489->4445 4491 7ffe1463edb8 __FrameHandler3::FrameUnwindToEmptyState abort 4490->4491 4492 7ffe14635275 4491->4492 4493 7ffe1463f414 __GetUnwindTryBlock 2 API calls 4492->4493 4494 7ffe1463528a 4493->4494 4542 7ffe1463ed44 4494->4542 4497 7ffe146352bf 4499 7ffe1463ed44 __GetUnwindTryBlock 2 API calls 4497->4499 4498 7ffe1463529c __FrameHandler3::GetHandlerSearchState 4545 7ffe1463ed7c 4498->4545 4500 7ffe146352bd 4499->4500 4500->4452 4503 7ffe146353cf abort 4502->4503 4504 7ffe14635313 Is_bad_exception_allowed 4502->4504 4504->4474 4506 7ffe1463edb8 __FrameHandler3::FrameUnwindToEmptyState abort 4505->4506 4507 7ffe1463f543 4506->4507 4508 7ffe1463f63c abort 4507->4508 4509 7ffe1463f551 4507->4509 4509->4471 4511 7ffe1463f414 __GetUnwindTryBlock 2 API calls 4510->4511 4512 7ffe14632d89 4511->4512 4513 7ffe14632daf Is_bad_exception_allowed 4512->4513 4548 7ffe14632bc4 4512->4548 4515 7ffe1463f7b0 9 API calls 4513->4515 4516 7ffe14632e05 4515->4516 4516->4471 4518 7ffe1463edb8 __FrameHandler3::FrameUnwindToEmptyState abort 4517->4518 4519 7ffe1463f35c __FrameHandler3::FrameUnwindToEmptyState 4518->4519 4519->4463 4521 7ffe146401a0 8 API calls 4520->4521 4522 7ffe1463f8aa 4521->4522 4522->4459 4524 7ffe14633954 4523->4524 4525 7ffe146338e6 4523->4525 4524->4459 4526 7ffe146338fa EncodePointer 4525->4526 4530 7ffe1463390a _CallSETranslator 4525->4530 4526->4530 4527 7ffe14633ac3 abort 4528 7ffe14633989 4529 7ffe1463f504 2 API calls 4528->4529 4532 7ffe146339a6 Is_bad_exception_allowed 4529->4532 4530->4524 4530->4527 4530->4528 4531 7ffe14632d4c 17 API calls 4531->4532 4532->4524 4532->4531 4534 7ffe146401a9 4533->4534 4535 7ffe14633387 4534->4535 4536 7ffe14640370 IsProcessorFeaturePresent 4534->4536 4535->4418 4537 7ffe14640388 4536->4537 4564 7ffe14640444 RtlCaptureContext 4537->4564 4543 7ffe1463f414 __GetUnwindTryBlock 2 API calls 4542->4543 4544 7ffe14635298 4543->4544 4544->4497 4544->4498 4546 7ffe1463f414 __GetUnwindTryBlock 2 API calls 4545->4546 4547 7ffe1463ed96 4546->4547 4547->4500 4549 7ffe14632be6 4548->4549 4552 7ffe146327f8 4549->4552 4551 7ffe14632bf7 __AdjustPointer 4551->4513 4554 7ffe14632825 Is_bad_exception_allowed 4552->4554 4553 7ffe146328b6 4555 7ffe146328d4 4553->4555 4556 7ffe146328ce abort 4553->4556 4563 7ffe146328a8 __AdjustPointer 4553->4563 4554->4553 4558 7ffe146328b0 abort 4554->4558 4554->4563 4557 7ffe1463291c abort 4555->4557 4559 7ffe14632922 4555->4559 4555->4563 4556->4555 4557->4559 4558->4553 4560 7ffe1463296d abort 4559->4560 4562 7ffe14632973 4559->4562 4559->4563 4560->4562 4561 7ffe146329b2 abort abort 4561->4563 4562->4561 4562->4563 4563->4551 4565 7ffe1464045e RtlLookupFunctionEntry 4564->4565 4566 7ffe14640474 RtlVirtualUnwind 4565->4566 4567 7ffe1464039b 4565->4567 4566->4565 4566->4567 4568 7ffe14640338 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 4567->4568 4833 7ffe1463ecd0 4834 7ffe1463ef20 __GSHandlerCheck_SEH RtlUnwindEx 4833->4834 4836 7ffe1463ece5 4834->4836 4835 7ffe1463ed11 4836->4835 4837 7ffe1463ed06 terminate 4836->4837 4837->4835 4569 7ffe1463b79b 4570 7ffe1463b958 4569->4570 4577 7ffe1463b7c9 4569->4577 4571 7ffe1463ac8a 4 API calls 4570->4571 4572 7ffe1463b9af 4571->4572 4573 7ffe1463a1a9 2 API calls 4572->4573 4576 7ffe1463ba04 4573->4576 4574 7ffe1463ac8a 4 API calls 4574->4577 4575 7ffe1463a1a9 2 API calls 4575->4577 4577->4570 4577->4574 4577->4575 4578 7ffe14632680 4579 7ffe14632691 4578->4579 4581 7ffe146326a8 4579->4581 4582 7ffe14632750 4579->4582 4583 7ffe146327ef abort 4582->4583 4584 7ffe14632762 4582->4584 4584->4583 4585 7ffe14632789 4584->4585 4585->4581 4692 7ffe14632740 terminate 4693 7ffe14634740 4694 7ffe14634775 __CxxCallCatchBlock _CreateFrameInfo 4693->4694 4695 7ffe1463fbe0 __CxxCallCatchBlock abort 4694->4695 4696 7ffe146348ba __CxxCallCatchBlock 4695->4696 4586 7ffe14634a81 4588 7ffe14634a8e __CxxCallCatchBlock 4586->4588 4587 7ffe14634ade RaiseException 4589 7ffe14634afd 4587->4589 4588->4587 4592 7ffe1463fbe0 4589->4592 4591 7ffe14634b05 __CxxCallCatchBlock 4595 7ffe1463fbf2 4592->4595 4593 7ffe1463fc17 abort 4594 7ffe1463fc1e 4593->4594 4594->4591 4595->4593 4595->4594 4596 7ffe14640780 4597 7ffe14640805 4596->4597 4598 7ffe14640798 4596->4598 4598->4597 4599 7ffe146407fa terminate 4598->4599 4599->4597 4794 7ffe14640100 4795 7ffe14640142 __GSHandlerCheckCommon 4794->4795 4796 7ffe1464016a 4795->4796 4798 7ffe1463ef20 4795->4798 4800 7ffe1463ef50 __CxxCallCatchBlock _IsNonwritableInCurrentImage __GSHandlerCheck_SEH 4798->4800 4799 7ffe1463f041 4799->4796 4800->4799 4801 7ffe1463f00c RtlUnwindEx 4800->4801 4801->4800 4802 7ffe1463e600 4803 7ffe1463e664 4802->4803 4810 7ffe1463e646 4802->4810 4804 7ffe1463e66a 4803->4804 4809 7ffe1463e6c7 4803->4809 4805 7ffe1463d20c 5 API calls 4804->4805 4805->4810 4806 7ffe146401a0 8 API calls 4807 7ffe1463e8c8 4806->4807 4808 7ffe1463e7bf atol 4808->4810 4809->4808 4809->4810 4810->4806 4811 7ffe1463cf05 4812 7ffe1463cf0c 4811->4812 4813 7ffe14637885 LoadLibraryW 4812->4813 4814 7ffe1463cf1e 4812->4814 4813->4812 4600 7ffe1463e984 4601 7ffe1463e9a9 4600->4601 4607 7ffe1463e9e9 4600->4607 4603 7ffe1463ea19 4601->4603 4604 7ffe1463e9b8 4601->4604 4608 7ffe1463ea2b 4601->4608 4602 7ffe14639f4c LoadLibraryW 4602->4607 4603->4608 4613 7ffe1463d20c 4603->4613 4609 7ffe14639f4c 4604->4609 4608->4602 4608->4607 4610 7ffe14639f66 4609->4610 4611 7ffe1463d8fe LoadLibraryW 4610->4611 4612 7ffe14639f8e 4611->4612 4612->4607 4614 7ffe1463d20e 4613->4614 4615 7ffe1463ba6e 5 API calls 4614->4615 4615->4614 4815 7ffe14640b03 4816 7ffe14640b1a 4815->4816 4817 7ffe14634268 23 API calls 4816->4817 4818 7ffe14640b84 4817->4818 4616 7ffe14640982 4617 7ffe14632610 terminate 4616->4617 4618 7ffe14640990 4617->4618 4619 7ffe1463b486 4620 7ffe1463b667 4619->4620 4623 7ffe1463b4b4 4619->4623 4621 7ffe1463ac8a 4 API calls 4621->4623 4622 7ffe1463a1a9 2 API calls 4622->4623 4623->4620 4623->4621 4623->4622 4624 7ffe1463e38b 4628 7ffe1463e4b5 4624->4628 4625 7ffe1463e584 4628->4625 4629 7ffe1463c69c 4628->4629 4639 7ffe146385ac 4628->4639 4630 7ffe1463c6b0 4629->4630 4631 7ffe1463d8fe LoadLibraryW 4630->4631 4632 7ffe1463c719 4631->4632 4633 7ffe1463d8fe LoadLibraryW 4632->4633 4634 7ffe1463c7a6 4633->4634 4635 7ffe1463d8fe LoadLibraryW 4634->4635 4636 7ffe1463c85c 4635->4636 4637 7ffe1463d8fe LoadLibraryW 4636->4637 4638 7ffe1463c8e5 4637->4638 4638->4628 4642 7ffe1463806f 4639->4642 4640 7ffe14637885 LoadLibraryW 4640->4642 4641 7ffe14638151 4641->4628 4642->4639 4642->4640 4642->4641 4329 7ffe1463ac8a 4342 7ffe14637885 4329->4342 4331 7ffe14637885 LoadLibraryW 4332 7ffe1463acc0 4331->4332 4332->4331 4333 7ffe1463ad44 4332->4333 4346 7ffe1463a45a 4333->4346 4335 7ffe1463adc0 4336 7ffe1463d8fe LoadLibraryW 4335->4336 4337 7ffe1463af4a 4336->4337 4338 7ffe1463af55 GetUserNameW 4337->4338 4339 7ffe1463af79 4338->4339 4351 7ffe1463a9a7 4339->4351 4341 7ffe1463b11a 4343 7ffe146378d3 4342->4343 4344 7ffe1463d8fe LoadLibraryW 4343->4344 4345 7ffe1463793d 4344->4345 4345->4332 4349 7ffe1463a4dd 4346->4349 4347 7ffe1463d8fe LoadLibraryW 4348 7ffe1463a565 GetAdaptersAddresses 4347->4348 4348->4349 4350 7ffe1463a80a 4348->4350 4349->4347 4350->4335 4352 7ffe1463aa1a 4351->4352 4353 7ffe1463d8fe LoadLibraryW 4352->4353 4354 7ffe1463aa85 4353->4354 4355 7ffe1463d8fe LoadLibraryW 4354->4355 4357 7ffe1463abd7 4354->4357 4356 7ffe1463abb7 GetTokenInformation 4355->4356 4356->4357 4357->4341

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912578002.00007FFE14631000.00000080.00000001.01000000.00000003.sdmp, Offset: 00007FFE14630000, based on PE: true
                  • Associated: 00000000.00000002.2912565734.00007FFE14630000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912610133.00007FFE14646000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912622905.00007FFE14647000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffe14630000_loaddll64.jbxd
                  Similarity
                  • API ID: InternetLibraryLoadOpen
                  • String ID:
                  • API String ID: 2559873147-0
                  • Opcode ID: 20e1dbdd09d5958d660017d8841a168a689d9bdb755f05f00955baf37fa87c1d
                  • Instruction ID: 432961c44121245b7795ef65f5fda845cfb7cf231637d1f190ccc6bfb3a73df5
                  • Opcode Fuzzy Hash: 20e1dbdd09d5958d660017d8841a168a689d9bdb755f05f00955baf37fa87c1d
                  • Instruction Fuzzy Hash: 9C62C132A18B8186E320DF16E68079E77A8FB95788F418125DF8C07B65DF3CD2A5D780
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912578002.00007FFE14631000.00000080.00000001.01000000.00000003.sdmp, Offset: 00007FFE14630000, based on PE: true
                  • Associated: 00000000.00000002.2912565734.00007FFE14630000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912610133.00007FFE14646000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912622905.00007FFE14647000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffe14630000_loaddll64.jbxd
                  Similarity
                  • API ID: LibraryLoadNameUser
                  • String ID:
                  • API String ID: 1809832340-0
                  • Opcode ID: a880c3d595419ac887476e80232836b4afde2090bcb5e42b3edf12b565c1e7f8
                  • Instruction ID: 969c8563623716b7175af25b76b0915377f5f4d5ab8726602c7a8e8c63183a5a
                  • Opcode Fuzzy Hash: a880c3d595419ac887476e80232836b4afde2090bcb5e42b3edf12b565c1e7f8
                  • Instruction Fuzzy Hash: 36F19162A08BC182E614DF27E4853BDB764FB96B98F018171DE9D07762CF7CE2468744
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912578002.00007FFE14631000.00000080.00000001.01000000.00000003.sdmp, Offset: 00007FFE14630000, based on PE: true
                  • Associated: 00000000.00000002.2912565734.00007FFE14630000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912610133.00007FFE14646000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912622905.00007FFE14647000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffe14630000_loaddll64.jbxd
                  Similarity
                  • API ID: AdaptersAddressesLibraryLoad
                  • String ID:
                  • API String ID: 4060335641-0
                  • Opcode ID: a43e441109bf4a2ecd04f2ee3ae635f63c087266646d45fc499c719ac9f09aed
                  • Instruction ID: d0116771c82dcbdba3bb8046d023ec9e2586bd9d19c791bcd113246981676ed6
                  • Opcode Fuzzy Hash: a43e441109bf4a2ecd04f2ee3ae635f63c087266646d45fc499c719ac9f09aed
                  • Instruction Fuzzy Hash: B0D1C222A08BC585E7209F26E9403EE73A4FB96B88F01D135EE8D07766DF7DE1958740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 139 7ffe1463cf2a-7ffe1463cfdf call 7ffe14637096 * 2 call 7ffe14637260 call 7ffe146372d1 FreeConsole 148 7ffe1463cfe5-7ffe1463d03a call 7ffe1463dc70 139->148 149 7ffe1463d07d-7ffe1463d0cf call 7ffe14637096 call 7ffe1463717d 139->149 155 7ffe1463d060-7ffe1463d078 call 7ffe1463b3bb 148->155 156 7ffe1463d03c-7ffe1463d044 148->156 160 7ffe1463d0d5-7ffe1463d134 call 7ffe1463dc70 call 7ffe1463703e 149->160 161 7ffe1463d3ad-7ffe1463d3b2 149->161 164 7ffe1463d301-7ffe1463d323 call 7ffe14636fee call 7ffe1463ddcc 155->164 156->155 158 7ffe1463d046-7ffe1463d055 call 7ffe14637096 156->158 158->155 182 7ffe1463d154-7ffe1463d2cc call 7ffe14637096 * 2 call 7ffe14637260 call 7ffe146372d1 call 7ffe14637096 * 2 call 7ffe14637260 call 7ffe146372d1 160->182 183 7ffe1463d136-7ffe1463d13b 160->183 166 7ffe1463d502-7ffe1463d564 call 7ffe1463dc70 call 7ffe1463703e 161->166 167 7ffe1463d3b8-7ffe1463d4dd call 7ffe14637096 * 2 call 7ffe14637260 call 7ffe146372d1 call 7ffe14637096 * 2 call 7ffe14637260 call 7ffe146372d1 161->167 189 7ffe1463d325-7ffe1463d3a8 call 7ffe1463ba6e call 7ffe14637096 * 2 call 7ffe14637260 call 7ffe146372d1 164->189 186 7ffe1463d584-7ffe1463d6cb call 7ffe14637096 * 2 call 7ffe14637260 call 7ffe146372d1 call 7ffe14637096 * 2 call 7ffe14637260 call 7ffe146372d1 166->186 187 7ffe1463d566-7ffe1463d56b 166->187 250 7ffe1463d4e3-7ffe1463d4f3 call 7ffe14637885 167->250 259 7ffe1463d2e1-7ffe1463d2fc call 7ffe146393c0 182->259 260 7ffe1463d2ce 182->260 183->182 188 7ffe1463d13d-7ffe1463d14c call 7ffe14637096 183->188 261 7ffe1463d6de-7ffe1463d83f call 7ffe14637096 * 2 call 7ffe14637260 call 7ffe146372d1 call 7ffe14637096 * 2 call 7ffe14637260 call 7ffe146372d1 call 7ffe146393c0 call 7ffe14636fee 186->261 262 7ffe1463d6cd 186->262 187->186 194 7ffe1463d56d-7ffe1463d57c call 7ffe14637096 187->194 188->182 194->186 255 7ffe1463d4f5-7ffe1463d4fa 250->255 255->166 259->164 263 7ffe1463d2d0-7ffe1463d2df 260->263 265 7ffe1463d6cf-7ffe1463d6dc 262->265 263->259 263->263 265->261 265->265
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912578002.00007FFE14631000.00000080.00000001.01000000.00000003.sdmp, Offset: 00007FFE14630000, based on PE: true
                  • Associated: 00000000.00000002.2912565734.00007FFE14630000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912610133.00007FFE14646000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912622905.00007FFE14647000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffe14630000_loaddll64.jbxd
                  Similarity
                  • API ID: ConsoleFree
                  • String ID:
                  • API String ID: 771614528-0
                  • Opcode ID: dc5e86d56edf007e984261fbdb4b8a74f16dfc301d523a74dd2a77c9adc3fda7
                  • Instruction ID: a56fed3c08a8dd3f4d456959d5fc0783bdb1888c07b0a56114a86d536e335474
                  • Opcode Fuzzy Hash: dc5e86d56edf007e984261fbdb4b8a74f16dfc301d523a74dd2a77c9adc3fda7
                  • Instruction Fuzzy Hash: 78328A32A09BC586E750DF12E4487AE77A4FB5AB98F01C164EA8C07762DF7DD189C780
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912578002.00007FFE14631000.00000080.00000001.01000000.00000003.sdmp, Offset: 00007FFE14630000, based on PE: true
                  • Associated: 00000000.00000002.2912565734.00007FFE14630000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912610133.00007FFE14646000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912622905.00007FFE14647000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffe14630000_loaddll64.jbxd
                  Similarity
                  • API ID: InformationLibraryLoadToken
                  • String ID:
                  • API String ID: 481147872-0
                  • Opcode ID: d2fd2b693f489a54c8af0f09588d58e6d05490fe3dc4d717ac8ec058ad0d7189
                  • Instruction ID: a5f180e9c7807f4f9aef4ad371782568521cc81826c632e9190e64bd7d97833f
                  • Opcode Fuzzy Hash: d2fd2b693f489a54c8af0f09588d58e6d05490fe3dc4d717ac8ec058ad0d7189
                  • Instruction Fuzzy Hash: B7718E22A08BC582E3218F16E9407ED7364FB96788F019125DF8D17765DF3DE2A6D740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912578002.00007FFE14631000.00000080.00000001.01000000.00000003.sdmp, Offset: 00007FFE14630000, based on PE: true
                  • Associated: 00000000.00000002.2912565734.00007FFE14630000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912610133.00007FFE14646000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912622905.00007FFE14647000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffe14630000_loaddll64.jbxd
                  Similarity
                  • API ID: LibraryLoad
                  • String ID:
                  • API String ID: 1029625771-0
                  • Opcode ID: 836eacf668b753031e2e9b49169b404bd7541c116ac9aa742d299fba7097d187
                  • Instruction ID: 783bbe68c1131eda8f3a28cf9bb7fd97737ca3486ae1ba1ff6a8a98135de9c80
                  • Opcode Fuzzy Hash: 836eacf668b753031e2e9b49169b404bd7541c116ac9aa742d299fba7097d187
                  • Instruction Fuzzy Hash: 4C11EF22A09B8A41FA00DF63E8447A82390AB56B98F45C075DE4C07796EF7CE28A8340
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912578002.00007FFE14631000.00000080.00000001.01000000.00000003.sdmp, Offset: 00007FFE14630000, based on PE: true
                  • Associated: 00000000.00000002.2912565734.00007FFE14630000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912610133.00007FFE14646000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912622905.00007FFE14647000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffe14630000_loaddll64.jbxd
                  Similarity
                  • API ID:
                  • String ID: *$@$\
                  • API String ID: 0-2175568232
                  • Opcode ID: 2507e6a3e91a4b5ec23ab95b040854a254022b3116a714520888954853478800
                  • Instruction ID: f3e26c2c1d6560b9389e19d414256e1ac427ebc7bdc8077e3a4bc9b371f80c3f
                  • Opcode Fuzzy Hash: 2507e6a3e91a4b5ec23ab95b040854a254022b3116a714520888954853478800
                  • Instruction Fuzzy Hash: 34A2A132A0CBC686E7308B12E5407FE73A0FB96758F408125DA8D06BA5DF7DE599DB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2912578002.00007FFE14631000.00000080.00000001.01000000.00000003.sdmp, Offset: 00007FFE14630000, based on PE: true
                  • Associated: 00000000.00000002.2912565734.00007FFE14630000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912610133.00007FFE14646000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912622905.00007FFE14647000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffe14630000_loaddll64.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b4ffcb6afab2a6f5a4f5130fad7f999fff8b8ea4eac12307599803bcf57c3d3a
                  • Instruction ID: 1cb08f7cda3ab6d40bf87b7fb76bb92c5f0d443a81a938652f57646310d7b491
                  • Opcode Fuzzy Hash: b4ffcb6afab2a6f5a4f5130fad7f999fff8b8ea4eac12307599803bcf57c3d3a
                  • Instruction Fuzzy Hash: 8CB1BF32A08B8982E710DF52E5443AE73A4FB96B98F01C125DF8D07BA5DF7DD2958740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 547 7ffe14632ef4-7ffe14632f5c call 7ffe14635250 550 7ffe14633374-7ffe1463337a abort 547->550 551 7ffe14632f62-7ffe14632f65 547->551 553 7ffe1463337b-7ffe1463339a call 7ffe146401a0 550->553 551->550 552 7ffe14632f6b-7ffe14632f71 551->552 554 7ffe14633042-7ffe14633054 552->554 555 7ffe14632f77-7ffe14632f7b 552->555 557 7ffe1463332f-7ffe14633333 554->557 558 7ffe1463305a-7ffe1463305e 554->558 555->554 559 7ffe14632f81-7ffe14632f8c 555->559 561 7ffe14633335-7ffe1463333c 557->561 562 7ffe14633368-7ffe14633372 call 7ffe14636960 557->562 558->557 563 7ffe14633064-7ffe1463306f 558->563 559->554 564 7ffe14632f92-7ffe14632f97 559->564 561->550 565 7ffe1463333e-7ffe14633363 call 7ffe146338b0 561->565 562->550 562->553 563->557 567 7ffe14633075-7ffe1463307c 563->567 564->554 568 7ffe14632f9d-7ffe14632fa7 call 7ffe14636960 564->568 565->562 571 7ffe14633082-7ffe146330b9 call 7ffe1463f504 567->571 572 7ffe14633246-7ffe14633252 567->572 568->553 580 7ffe14632fad-7ffe14632fd8 call 7ffe14636960 * 2 call 7ffe1463fc74 568->580 571->572 583 7ffe146330bf-7ffe146330c7 571->583 572->562 574 7ffe14633258-7ffe1463325c 572->574 577 7ffe1463325e-7ffe1463326a call 7ffe1463fc34 574->577 578 7ffe1463326c-7ffe14633274 574->578 577->578 589 7ffe1463328d-7ffe14633295 577->589 578->562 582 7ffe1463327a-7ffe14633287 call 7ffe1463f348 578->582 612 7ffe14632ff8-7ffe14633002 call 7ffe14636960 580->612 613 7ffe14632fda-7ffe14632fde 580->613 582->562 582->589 587 7ffe146330cb-7ffe146330fd 583->587 591 7ffe14633103-7ffe1463310e 587->591 592 7ffe14633239-7ffe14633240 587->592 594 7ffe146332b5-7ffe146332b9 589->594 595 7ffe14633297-7ffe146332b4 call 7ffe14636960 * 2 terminate 589->595 591->592 596 7ffe14633114-7ffe1463312d 591->596 592->572 592->587 598 7ffe146332cc 594->598 599 7ffe146332bb-7ffe146332ca call 7ffe1463fc34 594->599 595->594 601 7ffe14633133-7ffe14633178 call 7ffe1463fc48 * 2 596->601 602 7ffe14633226-7ffe1463322b 596->602 606 7ffe146332cf-7ffe146332d9 call 7ffe146352e8 598->606 599->606 625 7ffe146331b6-7ffe146331bc 601->625 626 7ffe1463317a-7ffe146331a0 call 7ffe1463fc48 call 7ffe14633dbc 601->626 609 7ffe14633236 602->609 606->562 624 7ffe146332df-7ffe1463332d call 7ffe1463f414 call 7ffe1463f7b0 606->624 609->592 612->554 627 7ffe14633004-7ffe14633024 call 7ffe14636960 * 2 call 7ffe146352e8 612->627 613->612 618 7ffe14632fe0-7ffe14632feb 613->618 618->612 622 7ffe14632fed-7ffe14632ff2 618->622 622->550 622->612 624->562 631 7ffe146331be-7ffe146331c2 625->631 632 7ffe1463322d 625->632 643 7ffe146331a2-7ffe146331b4 626->643 644 7ffe146331c7-7ffe14633224 call 7ffe14632d4c 626->644 649 7ffe14633026-7ffe14633030 call 7ffe146353d8 627->649 650 7ffe1463303d 627->650 631->601 634 7ffe14633232 632->634 634->609 643->625 643->626 644->634 653 7ffe14633036-7ffe1463303c terminate 649->653 654 7ffe1463339b-7ffe146333bf call 7ffe14632520 call 7ffe14634684 call 7ffe14636630 649->654 650->554 653->650
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912578002.00007FFE14631000.00000080.00000001.01000000.00000003.sdmp, Offset: 00007FFE14630000, based on PE: true
                  • Associated: 00000000.00000002.2912565734.00007FFE14630000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912610133.00007FFE14646000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912622905.00007FFE14647000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffe14630000_loaddll64.jbxd
                  Similarity
                  • API ID: BlockFrameHandler3::Unwindterminate$CatchExecutionHandlerIs_bad_exception_allowedSearchStateabortstd::bad_alloc::bad_alloc
                  • String ID: csm$csm$csm
                  • API String ID: 9366333-393685449
                  • Opcode ID: d10aa1818771547dcfcda5e4828c70a9f24c76e86896b178365febc376a0b24e
                  • Instruction ID: f0ba42a0d6643ad03aa6ce24af99d7f6638737764a6beed1e33ec6eacc448443
                  • Opcode Fuzzy Hash: d10aa1818771547dcfcda5e4828c70a9f24c76e86896b178365febc376a0b24e
                  • Instruction Fuzzy Hash: 76E17372A08B8186EB20DF66D4C02AD77A4FB46BACF104175DE8D57B65CF38E598C780
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 661 7ffe146333c0-7ffe14633423 call 7ffe1463edc0 664 7ffe14633425-7ffe1463342e call 7ffe14636960 661->664 665 7ffe1463343c-7ffe14633445 call 7ffe14636960 661->665 672 7ffe14633864-7ffe1463386a abort 664->672 673 7ffe14633434-7ffe1463343a 664->673 670 7ffe14633447-7ffe14633454 call 7ffe14636960 * 2 665->670 671 7ffe1463345b-7ffe1463345e 665->671 670->671 671->672 675 7ffe14633464-7ffe14633470 671->675 676 7ffe1463386b-7ffe1463388a call 7ffe146401a0 672->676 673->671 679 7ffe14633472-7ffe14633499 675->679 680 7ffe1463349b 675->680 683 7ffe1463349d-7ffe1463349f 679->683 680->683 683->672 685 7ffe146334a5-7ffe146334ab 683->685 686 7ffe146334b1-7ffe146334b5 685->686 687 7ffe14633577-7ffe1463358d call 7ffe14634570 685->687 686->687 689 7ffe146334bb-7ffe146334c6 686->689 692 7ffe14633820-7ffe14633824 687->692 693 7ffe14633593-7ffe14633597 687->693 689->687 691 7ffe146334cc-7ffe146334d1 689->691 691->687 694 7ffe146334d7-7ffe146334e1 call 7ffe14636960 691->694 696 7ffe14633858-7ffe14633862 call 7ffe14636960 692->696 697 7ffe14633826-7ffe1463382d 692->697 693->692 698 7ffe1463359d-7ffe146335a8 693->698 694->676 705 7ffe146334e7-7ffe1463350d call 7ffe14636960 * 2 call 7ffe1463fc74 694->705 696->672 696->676 697->672 701 7ffe1463382f-7ffe14633853 call 7ffe14633acc 697->701 698->692 699 7ffe146335ae-7ffe146335b2 698->699 703 7ffe146337f2-7ffe146337f6 699->703 704 7ffe146335b8-7ffe146335ef call 7ffe1463f644 699->704 701->696 703->696 710 7ffe146337f8-7ffe14633805 call 7ffe1463f374 703->710 704->703 715 7ffe146335f5-7ffe14633600 704->715 729 7ffe1463350f-7ffe14633513 705->729 730 7ffe1463352d-7ffe14633537 call 7ffe14636960 705->730 710->696 717 7ffe14633807-7ffe1463381f call 7ffe14636960 * 2 terminate 710->717 718 7ffe14633604-7ffe14633614 715->718 717->692 721 7ffe1463374d-7ffe146337ec 718->721 722 7ffe1463361a-7ffe14633620 718->722 721->703 721->718 722->721 725 7ffe14633626-7ffe1463364f call 7ffe146344f4 722->725 725->721 735 7ffe14633655-7ffe1463369c call 7ffe1463fc48 * 2 725->735 729->730 733 7ffe14633515-7ffe14633520 729->733 730->687 739 7ffe14633539-7ffe14633559 call 7ffe14636960 * 2 call 7ffe146352e8 730->739 733->730 736 7ffe14633522-7ffe14633527 733->736 747 7ffe1463369e-7ffe146336c3 call 7ffe1463fc48 call 7ffe14633efc 735->747 748 7ffe146336d8-7ffe146336ee call 7ffe14634b80 735->748 736->672 736->730 756 7ffe14633572 739->756 757 7ffe1463355b-7ffe14633565 call 7ffe146353d8 739->757 762 7ffe146336f5-7ffe14633744 call 7ffe14632e20 747->762 763 7ffe146336c5-7ffe146336d1 747->763 758 7ffe146336f0 748->758 759 7ffe14633749 748->759 756->687 766 7ffe1463388b-7ffe146338af call 7ffe14632520 call 7ffe14634684 call 7ffe14636630 757->766 767 7ffe1463356b-7ffe14633571 terminate 757->767 758->735 759->721 762->759 763->747 765 7ffe146336d3 763->765 765->748 767->756
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912578002.00007FFE14631000.00000080.00000001.01000000.00000003.sdmp, Offset: 00007FFE14630000, based on PE: true
                  • Associated: 00000000.00000002.2912565734.00007FFE14630000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912610133.00007FFE14646000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912622905.00007FFE14647000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffe14630000_loaddll64.jbxd
                  Similarity
                  • API ID: terminate$Is_bad_exception_allowedabortstd::bad_alloc::bad_alloc
                  • String ID: csm$csm$csm
                  • API String ID: 695522112-393685449
                  • Opcode ID: 2d10f2b28d114e1b6bfb5ba4fbbc98b2e296e6a2ab0bc5ae6fc59eb7ee0c4e0f
                  • Instruction ID: ad60c4b4a17f996477c2ea9d6b471558a66eeb6093141f08b89b0c9b9b7e7e8b
                  • Opcode Fuzzy Hash: 2d10f2b28d114e1b6bfb5ba4fbbc98b2e296e6a2ab0bc5ae6fc59eb7ee0c4e0f
                  • Instruction Fuzzy Hash: 57E19472A08BC28AE7119F36D4C02AD77A0FB46B6CF154175DA8D577A5CF38E489C780
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 775 7ffe146327f8-7ffe14632823 776 7ffe14632834-7ffe14632837 775->776 777 7ffe14632825-7ffe14632832 call 7ffe1463fc34 775->777 779 7ffe1463283a-7ffe1463283d 776->779 777->779 781 7ffe146329c0 779->781 782 7ffe14632843-7ffe14632846 779->782 783 7ffe146329c2-7ffe146329db 781->783 784 7ffe14632848-7ffe14632857 call 7ffe1463fc34 782->784 785 7ffe14632859 782->785 787 7ffe1463285c-7ffe14632860 784->787 785->787 787->781 788 7ffe14632866-7ffe14632869 787->788 790 7ffe14632873-7ffe14632875 788->790 791 7ffe1463286b-7ffe1463286d 788->791 792 7ffe14632881-7ffe14632884 790->792 793 7ffe14632877-7ffe1463287e 790->793 791->781 791->790 794 7ffe146328b6-7ffe146328b9 792->794 795 7ffe14632886-7ffe1463288a 792->795 793->792 797 7ffe146328d4-7ffe146328d8 794->797 798 7ffe146328bb-7ffe146328c2 794->798 795->794 796 7ffe1463288c-7ffe14632896 795->796 796->794 801 7ffe14632898-7ffe146328a1 796->801 799 7ffe14632922-7ffe14632926 797->799 800 7ffe146328da-7ffe146328e1 797->800 802 7ffe146328ce abort 798->802 803 7ffe146328c4-7ffe146328c7 798->803 807 7ffe14632928-7ffe14632935 call 7ffe1463fc48 799->807 808 7ffe14632937-7ffe1463293a 799->808 805 7ffe146328e3-7ffe146328e6 800->805 806 7ffe1463291c abort 800->806 818 7ffe146328b0 abort 801->818 819 7ffe146328a3-7ffe146328a6 801->819 802->797 803->802 804 7ffe146328c9-7ffe146328cc 803->804 810 7ffe1463290b-7ffe14632917 call 7ffe146325e0 804->810 805->806 812 7ffe146328e8-7ffe146328f9 call 7ffe146312f0 805->812 806->799 811 7ffe1463293c-7ffe1463293f 807->811 808->811 829 7ffe146329ae-7ffe146329b0 810->829 815 7ffe14632941-7ffe14632945 811->815 816 7ffe14632973-7ffe14632977 811->816 812->829 830 7ffe146328ff-7ffe14632902 812->830 821 7ffe14632947-7ffe1463294a 815->821 822 7ffe1463296d abort 815->822 826 7ffe146329b2-7ffe146329bf abort * 2 816->826 827 7ffe14632979-7ffe1463297c 816->827 818->794 819->818 824 7ffe146328a8-7ffe146328ae 819->824 821->822 828 7ffe1463294c-7ffe1463296b call 7ffe146325e0 call 7ffe146312f0 821->828 822->816 824->810 826->781 827->826 831 7ffe1463297e-7ffe14632980 827->831 828->829 829->783 830->829 833 7ffe14632908 830->833 834 7ffe14632982-7ffe14632991 call 7ffe1463fc48 831->834 835 7ffe14632993 831->835 833->810 837 7ffe14632996-7ffe14632999 834->837 835->837 837->826 840 7ffe1463299b-7ffe146329aa 837->840 840->829
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912578002.00007FFE14631000.00000080.00000001.01000000.00000003.sdmp, Offset: 00007FFE14630000, based on PE: true
                  • Associated: 00000000.00000002.2912565734.00007FFE14630000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912610133.00007FFE14646000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912622905.00007FFE14647000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffe14630000_loaddll64.jbxd
                  Similarity
                  • API ID: abort$AdjustPointer
                  • String ID:
                  • API String ID: 1501936508-0
                  • Opcode ID: b88db04e0c6b6a7fd0ecd5e4de718b47766377f5fcd0859342ed9c2ffefca775
                  • Instruction ID: 832d2868bfba72fb70d7383e6294321d3371641e03aee4037cea8ea858944b19
                  • Opcode Fuzzy Hash: b88db04e0c6b6a7fd0ecd5e4de718b47766377f5fcd0859342ed9c2ffefca775
                  • Instruction Fuzzy Hash: 8A518E21E09ED681EF658B13A4C46786390EF46FACF0940B5CA8D067E5DE3CE44EC391
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 843 7ffe146329dc-7ffe14632a07 844 7ffe14632a18-7ffe14632a1b 843->844 845 7ffe14632a09-7ffe14632a16 call 7ffe1463fc34 843->845 847 7ffe14632a1e-7ffe14632a21 844->847 845->847 849 7ffe14632ba7 847->849 850 7ffe14632a27-7ffe14632a2a 847->850 851 7ffe14632ba9-7ffe14632bc2 849->851 852 7ffe14632a2c-7ffe14632a3b call 7ffe1463fc34 850->852 853 7ffe14632a3d 850->853 855 7ffe14632a40-7ffe14632a44 852->855 853->855 855->849 857 7ffe14632a4a-7ffe14632a4d 855->857 858 7ffe14632a4f-7ffe14632a52 857->858 859 7ffe14632a58-7ffe14632a5b 857->859 858->849 858->859 860 7ffe14632a66-7ffe14632a6a 859->860 861 7ffe14632a5d-7ffe14632a63 859->861 862 7ffe14632a9c-7ffe14632aa0 860->862 863 7ffe14632a6c-7ffe14632a70 860->863 861->860 865 7ffe14632aa2-7ffe14632aa9 862->865 866 7ffe14632abb-7ffe14632abf 862->866 863->862 864 7ffe14632a72-7ffe14632a7c 863->864 864->862 869 7ffe14632a7e-7ffe14632a87 864->869 870 7ffe14632ab5 abort 865->870 871 7ffe14632aab-7ffe14632aae 865->871 867 7ffe14632ac1-7ffe14632ac8 866->867 868 7ffe14632b09-7ffe14632b0d 866->868 872 7ffe14632b03 abort 867->872 873 7ffe14632aca-7ffe14632acd 867->873 874 7ffe14632b1e-7ffe14632b21 868->874 875 7ffe14632b0f-7ffe14632b1c call 7ffe1463fc48 868->875 885 7ffe14632a89-7ffe14632a8c 869->885 886 7ffe14632a96 abort 869->886 870->866 871->870 876 7ffe14632ab0-7ffe14632ab3 871->876 872->868 873->872 878 7ffe14632acf-7ffe14632ae0 call 7ffe146312f0 873->878 877 7ffe14632b23-7ffe14632b26 874->877 875->877 881 7ffe14632af2-7ffe14632afe call 7ffe146325e0 876->881 882 7ffe14632b28-7ffe14632b2c 877->882 883 7ffe14632b5a-7ffe14632b5e 877->883 897 7ffe14632b95-7ffe14632b97 878->897 898 7ffe14632ae6-7ffe14632ae9 878->898 881->897 889 7ffe14632b2e-7ffe14632b31 882->889 890 7ffe14632b54 abort 882->890 894 7ffe14632b60-7ffe14632b63 883->894 895 7ffe14632b99-7ffe14632ba6 abort * 2 883->895 885->886 892 7ffe14632a8e-7ffe14632a94 885->892 886->862 889->890 896 7ffe14632b33-7ffe14632b52 call 7ffe146325e0 call 7ffe146312f0 889->896 890->883 892->881 894->895 899 7ffe14632b65-7ffe14632b67 894->899 895->849 896->897 897->851 898->897 901 7ffe14632aef 898->901 902 7ffe14632b69-7ffe14632b78 call 7ffe1463fc48 899->902 903 7ffe14632b7a 899->903 901->881 904 7ffe14632b7d-7ffe14632b80 902->904 903->904 904->895 907 7ffe14632b82-7ffe14632b91 904->907 907->897
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912578002.00007FFE14631000.00000080.00000001.01000000.00000003.sdmp, Offset: 00007FFE14630000, based on PE: true
                  • Associated: 00000000.00000002.2912565734.00007FFE14630000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912610133.00007FFE14646000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912622905.00007FFE14647000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffe14630000_loaddll64.jbxd
                  Similarity
                  • API ID: abort$AdjustPointer
                  • String ID:
                  • API String ID: 1501936508-0
                  • Opcode ID: 4262ea040b79b22edfa10952e5ae927a693a25cf4043396a56cb8bfdb1d73783
                  • Instruction ID: 241344451581d96d88d5244c64fcda05b3cc8694fc526c0d675a6c0d95c294a5
                  • Opcode Fuzzy Hash: 4262ea040b79b22edfa10952e5ae927a693a25cf4043396a56cb8bfdb1d73783
                  • Instruction Fuzzy Hash: 6C518121A09EC682EE65CF1795C46796394AF46FACF0984F5CA4E077A5DF3CE44AC380
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 911 7ffe1463e600-7ffe1463e644 912 7ffe1463e664-7ffe1463e668 911->912 913 7ffe1463e646-7ffe1463e65f call 7ffe146373e8 911->913 915 7ffe1463e6c7-7ffe1463e6d7 912->915 916 7ffe1463e66a-7ffe1463e698 call 7ffe1463d20c 912->916 922 7ffe1463e8b9-7ffe1463e8df call 7ffe146401a0 913->922 919 7ffe1463e6db-7ffe1463e6df 915->919 928 7ffe1463e69e-7ffe1463e6c2 call 7ffe146373b8 916->928 929 7ffe1463e873-7ffe1463e876 916->929 920 7ffe1463e6e1-7ffe1463e6e3 919->920 921 7ffe1463e6f0-7ffe1463e6f8 919->921 920->921 924 7ffe1463e6e5-7ffe1463e6ee 920->924 925 7ffe1463e70e-7ffe1463e718 921->925 926 7ffe1463e6fa-7ffe1463e70c 921->926 924->919 924->921 931 7ffe1463e71e-7ffe1463e722 925->931 930 7ffe1463e753-7ffe1463e77a call 7ffe1463cc98 926->930 928->929 934 7ffe1463e8b2-7ffe1463e8b5 929->934 935 7ffe1463e878-7ffe1463e882 929->935 948 7ffe1463e780-7ffe1463e78a 930->948 949 7ffe1463e81c-7ffe1463e83d call 7ffe146371a4 call 7ffe14637454 930->949 936 7ffe1463e724-7ffe1463e726 931->936 937 7ffe1463e733-7ffe1463e73b 931->937 934->922 935->934 940 7ffe1463e884-7ffe1463e887 935->940 936->937 941 7ffe1463e728-7ffe1463e731 936->941 942 7ffe1463e741-7ffe1463e74f 937->942 943 7ffe1463e83f-7ffe1463e842 937->943 940->934 945 7ffe1463e889-7ffe1463e89d call 7ffe1463b1cc 940->945 941->931 941->937 942->930 946 7ffe1463e844-7ffe1463e848 943->946 947 7ffe1463e85a-7ffe1463e868 call 7ffe146370f4 943->947 945->934 956 7ffe1463e89f-7ffe1463e8ad 945->956 946->947 953 7ffe1463e84a-7ffe1463e858 946->953 958 7ffe1463e86d-7ffe1463e870 947->958 948->949 955 7ffe1463e790-7ffe1463e79e 948->955 965 7ffe1463e80e-7ffe1463e81a call 7ffe14637480 949->965 953->929 959 7ffe1463e7a0-7ffe1463e7b8 955->959 960 7ffe1463e7bf-7ffe1463e7d7 atol 955->960 956->934 958->929 959->960 966 7ffe1463e7d9-7ffe1463e7e8 call 7ffe14636e9c 960->966 967 7ffe1463e7ed-7ffe1463e80a call 7ffe146371a4 call 7ffe14637454 960->967 965->958 966->958 967->965
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912578002.00007FFE14631000.00000080.00000001.01000000.00000003.sdmp, Offset: 00007FFE14630000, based on PE: true
                  • Associated: 00000000.00000002.2912565734.00007FFE14630000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912610133.00007FFE14646000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912622905.00007FFE14647000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffe14630000_loaddll64.jbxd
                  Similarity
                  • API ID:
                  • String ID: `generic-type-$`template-parameter-$generic-type-$template-parameter-
                  • API String ID: 0-3207858774
                  • Opcode ID: eed936bc1d4da6c0b8828b8f4035d54f265a4246433b67a75581729e220e8d8e
                  • Instruction ID: ece7f52279d6cf6f28bec55da11d4729e0c2b639e357e9cc8c1cf1fb372ba8c4
                  • Opcode Fuzzy Hash: eed936bc1d4da6c0b8828b8f4035d54f265a4246433b67a75581729e220e8d8e
                  • Instruction Fuzzy Hash: 22915F32E08E8A95FB119F26D8D01B837A0EB5676CF4851B1DA4D037A5DF3CE949C790
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912578002.00007FFE14631000.00000080.00000001.01000000.00000003.sdmp, Offset: 00007FFE14630000, based on PE: true
                  • Associated: 00000000.00000002.2912565734.00007FFE14630000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912610133.00007FFE14646000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912622905.00007FFE14647000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffe14630000_loaddll64.jbxd
                  Similarity
                  • API ID: CallEncodePointerTranslatorabort
                  • String ID: MOC$RCC
                  • API String ID: 292945357-2084237596
                  • Opcode ID: fb1528fe5dcd96ae34c479703bf4cb42f91cf8fcc48aced62f74f6c53f905353
                  • Instruction ID: 220e758ee37c0cab87e23a48fc37342d73f2ed3aa2cf592f5966ad5687efb761
                  • Opcode Fuzzy Hash: fb1528fe5dcd96ae34c479703bf4cb42f91cf8fcc48aced62f74f6c53f905353
                  • Instruction Fuzzy Hash: 0C91A073A08B858AE710CF66E8802AD77A0F705BACF14417AEE8D17764DF38D199CB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1026 7ffe146338b0-7ffe146338e4 1027 7ffe14633954-7ffe1463396e 1026->1027 1028 7ffe146338e6-7ffe146338f8 call 7ffe14636960 1026->1028 1031 7ffe1463396f 1028->1031 1032 7ffe146338fa-7ffe1463390e EncodePointer call 7ffe14636960 1028->1032 1034 7ffe14633973-7ffe14633983 1031->1034 1032->1031 1038 7ffe14633910-7ffe14633917 1032->1038 1036 7ffe14633ac3-7ffe14633acb abort 1034->1036 1037 7ffe14633989-7ffe146339bb call 7ffe1463f504 1034->1037 1037->1027 1042 7ffe146339bd-7ffe146339c5 1037->1042 1038->1031 1041 7ffe14633919-7ffe14633924 1038->1041 1041->1034 1043 7ffe14633926-7ffe14633952 call 7ffe1463f118 1041->1043 1044 7ffe146339c9-7ffe146339fb 1042->1044 1043->1027 1043->1034 1046 7ffe14633a01-7ffe14633a0c 1044->1046 1047 7ffe14633aa9-7ffe14633ab8 1044->1047 1046->1047 1050 7ffe14633a12-7ffe14633a31 1046->1050 1047->1044 1049 7ffe14633abe 1047->1049 1049->1027 1051 7ffe14633a60-7ffe14633a63 1050->1051 1052 7ffe14633a33-7ffe14633a3f call 7ffe1463fc34 1050->1052 1051->1047 1053 7ffe14633a65-7ffe14633aa4 call 7ffe14632d4c 1051->1053 1057 7ffe14633a41-7ffe14633a44 1052->1057 1058 7ffe14633a5c 1052->1058 1053->1047 1059 7ffe14633a54 1057->1059 1060 7ffe14633a46-7ffe14633a52 call 7ffe1463fc34 1057->1060 1058->1051 1062 7ffe14633a56-7ffe14633a5a 1059->1062 1060->1062 1062->1047 1062->1058
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912578002.00007FFE14631000.00000080.00000001.01000000.00000003.sdmp, Offset: 00007FFE14630000, based on PE: true
                  • Associated: 00000000.00000002.2912565734.00007FFE14630000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912610133.00007FFE14646000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912622905.00007FFE14647000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffe14630000_loaddll64.jbxd
                  Similarity
                  • API ID: CallEncodePointerTranslatorabort
                  • String ID: MOC$RCC
                  • API String ID: 292945357-2084237596
                  • Opcode ID: 1b2764a8b34a61b78cb93bf783d995c710cf9a0488163cb67a3aa6f00ec1cb9a
                  • Instruction ID: 9c30be3972ebf94c16477148c76edac059cce649b4d86c5419c7c5c90646a4f8
                  • Opcode Fuzzy Hash: 1b2764a8b34a61b78cb93bf783d995c710cf9a0488163cb67a3aa6f00ec1cb9a
                  • Instruction Fuzzy Hash: 59612B33A08B85CAE7148F66D4803AD77A0F745BACF044265DE4D17BA8DF78E599C780
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1064 7ffe14634268-7ffe146342b5 call 7ffe14631d34 call 7ffe14636960 1069 7ffe146342e2-7ffe146342e6 1064->1069 1070 7ffe146342b7-7ffe146342bd 1064->1070 1072 7ffe14634401-7ffe14634416 call 7ffe14634570 1069->1072 1073 7ffe146342ec-7ffe146342ef 1069->1073 1070->1069 1071 7ffe146342bf-7ffe146342c2 1070->1071 1075 7ffe146342d4-7ffe146342d7 1071->1075 1076 7ffe146342c4-7ffe146342c8 1071->1076 1084 7ffe14634421-7ffe14634427 1072->1084 1085 7ffe14634418-7ffe1463441b 1072->1085 1077 7ffe146344cf 1073->1077 1078 7ffe146342f5-7ffe14634325 1073->1078 1075->1069 1081 7ffe146342d9-7ffe146342dc 1075->1081 1076->1081 1082 7ffe146342ca-7ffe146342d2 1076->1082 1079 7ffe146344d4-7ffe146344f0 1077->1079 1078->1077 1083 7ffe1463432b-7ffe14634332 1078->1083 1081->1069 1081->1077 1082->1069 1082->1075 1083->1077 1086 7ffe14634338-7ffe1463433c 1083->1086 1087 7ffe14634429-7ffe1463442d 1084->1087 1088 7ffe14634496-7ffe146344ca call 7ffe146333c0 1084->1088 1085->1077 1085->1084 1089 7ffe146343ee-7ffe146343fc call 7ffe1463f3e0 1086->1089 1090 7ffe14634342-7ffe14634345 1086->1090 1087->1088 1095 7ffe1463442f-7ffe14634436 1087->1095 1088->1077 1089->1077 1092 7ffe146343a6-7ffe146343a9 1090->1092 1093 7ffe14634347-7ffe1463435c call 7ffe1463ee30 1090->1093 1092->1089 1099 7ffe146343ab-7ffe146343b3 1092->1099 1103 7ffe146343e7-7ffe146343ed abort 1093->1103 1104 7ffe14634362-7ffe14634365 1093->1104 1095->1088 1098 7ffe14634438-7ffe1463443f 1095->1098 1098->1088 1101 7ffe14634441-7ffe14634454 call 7ffe1463fc48 1098->1101 1102 7ffe146343b5-7ffe146343df 1099->1102 1099->1103 1101->1088 1113 7ffe14634456-7ffe14634494 1101->1113 1102->1103 1106 7ffe146343e1-7ffe146343e5 1102->1106 1103->1089 1107 7ffe1463438e-7ffe14634391 1104->1107 1108 7ffe14634367-7ffe1463438c 1104->1108 1110 7ffe14634396-7ffe146343a1 call 7ffe14634f58 1106->1110 1107->1103 1111 7ffe14634393 1107->1111 1108->1107 1110->1077 1111->1110 1113->1079
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912578002.00007FFE14631000.00000080.00000001.01000000.00000003.sdmp, Offset: 00007FFE14630000, based on PE: true
                  • Associated: 00000000.00000002.2912565734.00007FFE14630000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912610133.00007FFE14646000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912622905.00007FFE14647000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffe14630000_loaddll64.jbxd
                  Similarity
                  • API ID: abort
                  • String ID: $csm$csm
                  • API String ID: 4206212132-1512788406
                  • Opcode ID: bb1235440ca836f75756ab82136ebef4cbca7055a8801f356a81cb2fbc572e69
                  • Instruction ID: 2e75c1f4e0491318a598d54abfda1cc926c9e8c2120b5ad5dd09bd5361f512ec
                  • Opcode Fuzzy Hash: bb1235440ca836f75756ab82136ebef4cbca7055a8801f356a81cb2fbc572e69
                  • Instruction Fuzzy Hash: A971A276909AD186D7208F26D0C067DBBA0FB06BACF148175DA4D47BA9CF3CD499C780
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912578002.00007FFE14631000.00000080.00000001.01000000.00000003.sdmp, Offset: 00007FFE14630000, based on PE: true
                  • Associated: 00000000.00000002.2912565734.00007FFE14630000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912610133.00007FFE14646000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912622905.00007FFE14647000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffe14630000_loaddll64.jbxd
                  Similarity
                  • API ID: Frame$EmptyHandler3::StateUnwindabort
                  • String ID: csm$csm
                  • API String ID: 300979864-3733052814
                  • Opcode ID: 11c4ce4d55e2cf51e2b9c0d4075d348971100c6bb06491b44300c400f97ac44e
                  • Instruction ID: 3f73e96598363af4709798170caeb2d928cedbb198b1c6e68d4f4d237be25f9d
                  • Opcode Fuzzy Hash: 11c4ce4d55e2cf51e2b9c0d4075d348971100c6bb06491b44300c400f97ac44e
                  • Instruction Fuzzy Hash: 2751873A908BC286EB648F129484378B790FB52BACF144275DA9C57BE5CF3CE858C740
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912578002.00007FFE14631000.00000080.00000001.01000000.00000003.sdmp, Offset: 00007FFE14630000, based on PE: true
                  • Associated: 00000000.00000002.2912565734.00007FFE14630000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912610133.00007FFE14646000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912622905.00007FFE14647000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffe14630000_loaddll64.jbxd
                  Similarity
                  • API ID: CurrentImageNonwritableUnwind
                  • String ID: csm$f
                  • API String ID: 451473138-629598281
                  • Opcode ID: 3c182f2a73cf73eb0fd9e76035c4ca511a55fdd1c88c4ba15caaff3faffd7406
                  • Instruction ID: 23cda5e668ff43e6fece06ee86a5c6b65b8fc1cb7efbfc5e113a2b5971b782fd
                  • Opcode Fuzzy Hash: 3c182f2a73cf73eb0fd9e76035c4ca511a55fdd1c88c4ba15caaff3faffd7406
                  • Instruction Fuzzy Hash: 9A51FA32B09A82C6DB18CF1AD4A4A693795FB42BACF108074DF4E43758DF79E849C780
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912578002.00007FFE14631000.00000080.00000001.01000000.00000003.sdmp, Offset: 00007FFE14630000, based on PE: true
                  • Associated: 00000000.00000002.2912565734.00007FFE14630000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912610133.00007FFE14646000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912622905.00007FFE14647000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffe14630000_loaddll64.jbxd
                  Similarity
                  • API ID: terminate
                  • String ID: MOC$RCC$csm
                  • API String ID: 1821763600-2671469338
                  • Opcode ID: 7565ead2df15cda5b943c79179a3e7111ba46512fcdc4fe07fd8da32d148abe8
                  • Instruction ID: eb0a6ed466591c36afa5f3b9e519fdecfa211e586aa8795861ac7389ca720e6b
                  • Opcode Fuzzy Hash: 7565ead2df15cda5b943c79179a3e7111ba46512fcdc4fe07fd8da32d148abe8
                  • Instruction Fuzzy Hash: 44F04431A14A87C2D7605B62E2C50683674EF4AB6CF1950B1D74C063A2CF3CD898CAC1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912578002.00007FFE14631000.00000080.00000001.01000000.00000003.sdmp, Offset: 00007FFE14630000, based on PE: true
                  • Associated: 00000000.00000002.2912565734.00007FFE14630000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912610133.00007FFE14646000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912622905.00007FFE14647000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffe14630000_loaddll64.jbxd
                  Similarity
                  • API ID: CreateFrameInfoabort
                  • String ID: csm
                  • API String ID: 4073398722-1018135373
                  • Opcode ID: eefe240a7fab66cb33b389892f171675d2c3754d40d927b59bda2d4bfb984a61
                  • Instruction ID: a2e1ba1d4acabdc1ad418c5b90a5e9dec21f16557d7ed6786a4d704cb4a2901a
                  • Opcode Fuzzy Hash: eefe240a7fab66cb33b389892f171675d2c3754d40d927b59bda2d4bfb984a61
                  • Instruction Fuzzy Hash: F4516E37619B8686D6209B16E58026E77B4FB8ABB8F100174DB8D07BA5CF3CE455CB80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 00007FFE1463EF20: _IsNonwritableInCurrentImage.LIBCMT ref: 00007FFE1463EFE0
                    • Part of subcall function 00007FFE1463EF20: RtlUnwindEx.KERNEL32(?,?,?,?,?,?,?,00007FFE1463ECE5), ref: 00007FFE1463F02F
                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE1463ED0A
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2912578002.00007FFE14631000.00000080.00000001.01000000.00000003.sdmp, Offset: 00007FFE14630000, based on PE: true
                  • Associated: 00000000.00000002.2912565734.00007FFE14630000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912594295.00007FFE14641000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912610133.00007FFE14646000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2912622905.00007FFE14647000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ffe14630000_loaddll64.jbxd
                  Similarity
                  • API ID: CurrentImageNonwritableUnwindterminate
                  • String ID: csm$f
                  • API String ID: 3503160786-629598281
                  • Opcode ID: 4324f3b8dec270d7fe627d3bc1aa05acc39fc06cb4de1d1a3df777bc5be6cc49
                  • Instruction ID: c9c2c629d9b7517cfc1f60316fe6e83d1d32cbf1074552de2124e2fa3f2b0f68
                  • Opcode Fuzzy Hash: 4324f3b8dec270d7fe627d3bc1aa05acc39fc06cb4de1d1a3df777bc5be6cc49
                  • Instruction Fuzzy Hash: 61E06C31D08FC681DB605B52F5C017D6754EF16B7CF154075D64C06796CF3CE8948691
                  Uniqueness

                  Uniqueness Score: -1.00%