VMRay Analyzer Report
File Information
Sample files count1
Created files count6
Modified files count10
d8891477315db13a640ed5956a636951.exe, ...
-
File Properties
Namesd8891477315db13a640ed5956a636951.exe (Sample File)
c:\users\hjrd1koky ds8lujv\appdata\roaming\{b3889326-9c2c-0b70-124e-56b7b618030c}\esentutl.exe (Created File)
Size116.50 KB (119296 bytes)
Hash ValuesMD5: d8891477315db13a640ed5956a636951
SHA1: abb3fd6a48b0881f4d01ff468ea81cd81e24e97b
SHA256: ddffb78d1b7dd7831fc074911671fa5e3b9d7b33f10ab3a9933cf563b570f756
Actions
PE Information
+
File Properties
Image Base0x400000
Entry Point0x428105
Size Of Code0x3400
Size Of Initialized Data0x1fc00
Size Of Uninitialized Data0x2000
Formatx86
TypeExecutable
SubsystemIMAGE_SUBSYSTEM_WINDOWS_GUI
Machine TypeIMAGE_FILE_MACHINE_I386
Compile Timestamp2010-11-06 16:27:40
Compiler/PackerUnknown
Sections (3)
+
NameVirtual AddressVirtual SizeRaw Data SizeRaw Data OffsetFlagsEntropy
.MPRESS10x4010000x270000x1aa000x200CNT_CODE, CNT_INITIALIZED_DATA, CNT_UNINITIALIZED_DATA, MEM_EXECUTE, MEM_READ, MEM_WRITE8.0
.MPRESS20x4280000xc6f0xe000x1ac00CNT_CODE, CNT_INITIALIZED_DATA, CNT_UNINITIALIZED_DATA, MEM_EXECUTE, MEM_READ, MEM_WRITE5.62
.rsrc0x4290000x16ec0x18000x1ba00CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE4.34
Imports (5)
+
KERNEL32.DLL (2)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
GetModuleHandleA0x00x4280640x280640x1ac64
GetProcAddress0x00x4280680x280680x1ac68
USER32.dll (1)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
IsWindow0x00x4280700x280700x1ac70
MSWSOCK.dll (1)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
rexec0x00x4280780x280780x1ac78
GDI32.dll (1)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
CreateICW0x00x4280800x280800x1ac80
Icons (3)
+
Icon Icon Icon
c:\users\hjrd1koky ds8lujv\appdata\roaming\microsoft\windows\start menu\programs\startup\esentutl.lnk
-
File Properties
Namesc:\users\hjrd1koky ds8lujv\appdata\roaming\microsoft\windows\start menu\programs\startup\esentutl.lnk (Created File)
Size1.22 KB (1252 bytes)
Hash ValuesMD5: 67cd3a3b1ce7ddb9773fb62685ccec50
SHA1: 9603fd2454b2c4e81307bceda814ea139cd4a089
SHA256: 3ab432c75c02fbd597e41a99e3956455472af6bd9bcc93d8444df0fb3f200561
Actions
c:\users\hjrd1koky ds8lujv\appdata\roaming\{b3889326-9c2c-0b70-124e-56b7b618030c}\esentutl.exe, ...
-
File Properties
Namesc:\users\hjrd1koky ds8lujv\appdata\roaming\{b3889326-9c2c-0b70-124e-56b7b618030c}\esentutl.exe (Created File)
c:\users\hjrd1k~1\appdata\local\temp\8055.tmp (Created File)
c:\users\hjrd1k~1\appdata\local\temp\8361.tmp (Created File)
c:\users\hjrd1k~1\appdata\local\temp\90d9.tmp (Created File)
c:\windows\system32\wbem\repository\writable.tst (Created File)
Size0.00 KB (0 bytes)
Hash ValuesMD5: d41d8cd98f00b204e9800998ecf8427e
SHA1: da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256: e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
c:\users\hjrd1koky ds8lujv\appdata\local\microsoft\windows\temporary internet files\content.ie5\pmmr5k9k\json[1]
-
File Properties
Namesc:\users\hjrd1koky ds8lujv\appdata\local\microsoft\windows\temporary internet files\content.ie5\pmmr5k9k\json[1] (Created File)
Size0.21 KB (219 bytes)
Hash ValuesMD5: 09fe17a7ae104aaf72f596d1b61ebaaf
SHA1: b2d708cc49d7d0bdb63a7f2baaaa77dec116c56f
SHA256: 6645aae9e4f1b450e44748f0438e9beed49ce51a280b286e27f47b46ba70d6c7
Actions
c:\users\hjrd1k~1\appdata\local\temp\8055.tmp, ...
-
File Properties
Namesc:\users\hjrd1k~1\appdata\local\temp\8055.tmp (Created File)
c:\users\hjrd1k~1\appdata\local\temp\8361.tmp (Created File)
c:\users\hjrd1k~1\appdata\local\temp\90d9.tmp (Created File)
Size1.74 MB (1828352 bytes)
Hash ValuesMD5: 6ef5f3f18413c367195f06e503ab86a6
SHA1: 74e5861dd61d6ddec17dc802664e26196d628bc9
SHA256: 6f8b87fb4d67f9e76a51ef759b58a95d903c4aac9c789a65a3fa1fc4f253d978
Actions
PE Information
+
File Properties
Image Base0x75410000
Entry Point0x75411a45
Size Of Code0x1a7c00
Size Of Initialized Data0x18a00
Size Of Uninitialized Data0x0
Formatx86
TypeDll
SubsystemIMAGE_SUBSYSTEM_WINDOWS_CUI
Machine TypeIMAGE_FILE_MACHINE_I386
Compile Timestamp2010-11-20 12:57:39
Compiler/PackerUnknown
Sections (4)
+
NameVirtual AddressVirtual SizeRaw Data SizeRaw Data OffsetFlagsEntropy
.text0x754110000x1a7ba50x1a7c000x400CNT_CODE, MEM_EXECUTE, MEM_READ6.75
.data0x755b90000x996c0x76000x1a8000CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE2.72
.rsrc0x755c30000x3f00x4000x1af600CNT_INITIALIZED_DATA, MEM_READ3.36
.reloc0x755c40000xea3c0xec000x1afa00CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ6.69
Imports (377)
+
msvcrt.dll (50)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
_aligned_realloc0x00x754110000x1a674c0x1a5b4c
memchr0x00x754110040x1a67500x1a5b50
_strdup0x00x754110080x1a67540x1a5b54
strtoul0x00x7541100c0x1a67580x1a5b58
??0exception@@QAE@ABQBD@Z0x00x754110100x1a675c0x1a5b5c
_lock0x00x754110140x1a67600x1a5b60
__dllonexit0x00x754110180x1a67640x1a5b64
_unlock0x00x7541101c0x1a67680x1a5b68
_except_handler4_common0x00x754110200x1a676c0x1a5b6c
??1type_info@@UAE@XZ0x00x754110240x1a67700x1a5b70
memmove_s0x00x754110280x1a67740x1a5b74
memcpy_s0x00x7541102c0x1a67780x1a5b78
??0exception@@QAE@ABV0@@Z0x00x754110300x1a677c0x1a5b7c
floor0x00x754110340x1a67800x1a5b80
??1exception@@UAE@XZ0x00x754110380x1a67840x1a5b84
?what@exception@@UBEPBDXZ0x00x7541103c0x1a67880x1a5b88
??0exception@@QAE@XZ0x00x754110400x1a678c0x1a5b8c
_onexit0x00x754110440x1a67900x1a5b90
_CIexp0x00x754110480x1a67940x1a5b94
qsort0x00x7541104c0x1a67980x1a5b98
_aligned_free0x00x754110500x1a679c0x1a5b9c
_CIcos0x00x754110540x1a67a00x1a5ba0
__CxxFrameHandler30x00x754110580x1a67a40x1a5ba4
memcpy0x00x7541105c0x1a67a80x1a5ba8
_amsg_exit0x00x754110600x1a67ac0x1a5bac
_initterm0x00x754110640x1a67b00x1a5bb0
_XcptFilter0x00x754110680x1a67b40x1a5bb4
realloc0x00x7541106c0x1a67b80x1a5bb8
free0x00x754110700x1a67bc0x1a5bbc
malloc0x00x754110740x1a67c00x1a5bc0
_CIlog100x00x754110780x1a67c40x1a5bc4
strstr0x00x7541107c0x1a67c80x1a5bc8
isalnum0x00x754110800x1a67cc0x1a5bcc
sscanf0x00x754110840x1a67d00x1a5bd0
strrchr0x00x754110880x1a67d40x1a5bd4
_purecall0x00x7541108c0x1a67d80x1a5bd8
ceil0x00x754110900x1a67dc0x1a5bdc
_stricmp0x00x754110940x1a67e00x1a5be0
memmove0x00x754110980x1a67e40x1a5be4
_vsnprintf0x00x7541109c0x1a67e80x1a5be8
_ftol2_sse0x00x754110a00x1a67ec0x1a5bec
memset0x00x754110a40x1a67f00x1a5bf0
_CIsqrt0x00x754110a80x1a67f40x1a5bf4
_CIsin0x00x754110ac0x1a67f80x1a5bf8
_CIpow0x00x754110b00x1a67fc0x1a5bfc
_CIlog0x00x754110b40x1a68000x1a5c00
_CxxThrowException0x00x754110b80x1a68040x1a5c04
?terminate@@YAXXZ0x00x754110bc0x1a68080x1a5c08
_aligned_malloc0x00x754110c00x1a680c0x1a5c0c
atoi0x00x754110c40x1a68100x1a5c10
ntdll.dll (12)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
WinSqmIsOptedIn0x00x754110cc0x1a68180x1a5c18
EtwUnregisterTraceGuids0x00x754110d00x1a681c0x1a5c1c
EtwRegisterTraceGuidsA0x00x754110d40x1a68200x1a5c20
EtwGetTraceLoggerHandle0x00x754110d80x1a68240x1a5c24
EtwGetTraceEnableFlags0x00x754110dc0x1a68280x1a5c28
EtwGetTraceEnableLevel0x00x754110e00x1a682c0x1a5c2c
RtlIsCriticalSectionLockedByThread0x00x754110e40x1a68300x1a5c30
RtlInitUnicodeString0x00x754110e80x1a68340x1a5c34
NtQueryLicenseValue0x00x754110ec0x1a68380x1a5c38
VerSetConditionMask0x00x754110f00x1a683c0x1a5c3c
EtwLogTraceEvent0x00x754110f40x1a68400x1a5c40
WinSqmAddToStreamEx0x00x754110f80x1a68440x1a5c44
API-MS-Win-Core-LocalRegistry-L1-1-0.dll (9)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
RegCloseKey0x00x754111000x1a684c0x1a5c4c
RegCreateKeyExA0x00x754111040x1a68500x1a5c50
RegSetValueExA0x00x754111080x1a68540x1a5c54
RegEnumKeyExA0x00x7541110c0x1a68580x1a5c58
RegQueryValueExA0x00x754111100x1a685c0x1a5c5c
RegDeleteValueA0x00x754111140x1a68600x1a5c60
RegEnumValueA0x00x754111180x1a68640x1a5c64
RegQueryInfoKeyA0x00x7541111c0x1a68680x1a5c68
RegOpenKeyExA0x00x754111200x1a686c0x1a5c6c
API-MS-Win-Security-Base-L1-1-0.dll (12)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
SetSecurityDescriptorDacl0x00x754111280x1a68740x1a5c74
AddAccessAllowedAce0x00x7541112c0x1a68780x1a5c78
SetSecurityDescriptorSacl0x00x754111300x1a687c0x1a5c7c
SetKernelObjectSecurity0x00x754111340x1a68800x1a5c80
IsValidSid0x00x754111380x1a68840x1a5c84
GetLengthSid0x00x7541113c0x1a68880x1a5c88
InitializeAcl0x00x754111400x1a688c0x1a5c8c
AddMandatoryAce0x00x754111440x1a68900x1a5c90
GetSidSubAuthority0x00x754111480x1a68940x1a5c94
InitializeSid0x00x7541114c0x1a68980x1a5c98
GetSidLengthRequired0x00x754111500x1a689c0x1a5c9c
InitializeSecurityDescriptor0x00x754111540x1a68a00x1a5ca0
API-MS-Win-Security-SDDL-L1-1-0.dll (2)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
ConvertStringSecurityDescriptorToSecurityDescriptorW0x00x7541115c0x1a68a80x1a5ca8
ConvertStringSidToSidW0x00x754111600x1a68ac0x1a5cac
USER32.dll (64)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
UnionRect0x00x754111680x1a68b40x1a5cb4
IsWindowUnicode0x00x7541116c0x1a68b80x1a5cb8
GetWindowLongW0x00x754111700x1a68bc0x1a5cbc
GetWindowLongA0x00x754111740x1a68c00x1a5cc0
ClientToScreen0x00x754111780x1a68c40x1a5cc4
SetRect0x00x7541117c0x1a68c80x1a5cc8
GetWindowInfo0x00x754111800x1a68cc0x1a5ccc
GetClientRect0x00x754111840x1a68d00x1a5cd0
EnumDisplaySettingsA0x00x754111880x1a68d40x1a5cd4
OffsetRect0x00x7541118c0x1a68d80x1a5cd8
GetSystemMetrics0x00x754111900x1a68dc0x1a5cdc
EnumDisplayMonitors0x00x754111940x1a68e00x1a5ce0
GetDC0x00x754111980x1a68e40x1a5ce4
ReleaseDC0x00x7541119c0x1a68e80x1a5ce8
EnumDisplayDevicesA0x00x754111a00x1a68ec0x1a5cec
SetWindowPos0x00x754111a40x1a68f00x1a5cf0
SystemParametersInfoA0x00x754111a80x1a68f40x1a5cf4
GetMonitorInfoA0x00x754111ac0x1a68f80x1a5cf8
IntersectRect0x00x754111b00x1a68fc0x1a5cfc
DefWindowProcA0x00x754111b40x1a69000x1a5d00
SetForegroundWindow0x00x754111b80x1a69040x1a5d04
SetTimer0x00x754111bc0x1a69080x1a5d08
IsZoomed0x00x754111c00x1a690c0x1a5d0c
ShowWindow0x00x754111c40x1a69100x1a5d10
IsWindowVisible0x00x754111c80x1a69140x1a5d14
GetForegroundWindow0x00x754111cc0x1a69180x1a5d18
CloseClipboard0x00x754111d00x1a691c0x1a5d1c
SetClipboardData0x00x754111d40x1a69200x1a5d20
EmptyClipboard0x00x754111d80x1a69240x1a5d24
OpenClipboard0x00x754111dc0x1a69280x1a5d28
PtInRect0x00x754111e00x1a692c0x1a5d2c
GetCursorPos0x00x754111e40x1a69300x1a5d30
SetCursorPos0x00x754111e80x1a69340x1a5d34
GetDesktopWindow0x00x754111ec0x1a69380x1a5d38
GetWindowDC0x00x754111f00x1a693c0x1a5d3c
CreateIconIndirect0x00x754111f40x1a69400x1a5d40
GetWindowRect0x00x754111f80x1a69440x1a5d44
GetCursor0x00x754111fc0x1a69480x1a5d48
SetCursor0x00x754112000x1a694c0x1a5d4c
DestroyIcon0x00x754112040x1a69500x1a5d50
GetAncestor0x00x754112080x1a69540x1a5d54
IsProcessDPIAware0x00x7541120c0x1a69580x1a5d58
mouse_event0x00x754112100x1a695c0x1a5d5c
GetWindowDisplayAffinity0x00x754112140x1a69600x1a5d60
SetWindowDisplayAffinity0x00x754112180x1a69640x1a5d64
OpenInputDesktop0x00x7541121c0x1a69680x1a5d68
GetUserObjectInformationA0x00x754112200x1a696c0x1a5d6c
CloseDesktop0x00x754112240x1a69700x1a5d70
GetThreadDesktop0x00x754112280x1a69740x1a5d74
RegisterHotKey0x00x7541122c0x1a69780x1a5d78
UnregisterHotKey0x00x754112300x1a697c0x1a5d7c
IsWindow0x00x754112340x1a69800x1a5d80
KillTimer0x00x754112380x1a69840x1a5d84
SetWindowLongW0x00x7541123c0x1a69880x1a5d88
CallWindowProcW0x00x754112400x1a698c0x1a5d8c
SetWindowLongA0x00x754112440x1a69900x1a5d90
CallWindowProcA0x00x754112480x1a69940x1a5d94
SendMessageA0x00x7541124c0x1a69980x1a5d98
IsIconic0x00x754112500x1a699c0x1a5d9c
PostMessageA0x00x754112540x1a69a00x1a5da0
GetKeyState0x00x754112580x1a69a40x1a5da4
SetRectEmpty0x00x7541125c0x1a69a80x1a5da8
SfmDxGetSwapChainStats0x00x754112600x1a69ac0x1a5dac
NotifyOverlayWindow0x00x754112640x1a69b00x1a5db0
VERSION.dll (3)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
GetFileVersionInfoA0x00x7541126c0x1a69b80x1a5db8
GetFileVersionInfoSizeA0x00x754112700x1a69bc0x1a5dbc
VerQueryValueA0x00x754112740x1a69c00x1a5dc0
d3d8thk.dll (47)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
OsThunkD3dContextDestroyAll0x00x7541127c0x1a69c80x1a5dc8
OsThunkDdGetScanLine0x00x754112800x1a69cc0x1a5dcc
OsThunkDdUnlockD3D0x00x754112840x1a69d00x1a5dd0
OsThunkDdUnlock0x00x754112880x1a69d40x1a5dd4
OsThunkDdSetExclusiveMode0x00x7541128c0x1a69d80x1a5dd8
OsThunkDdFlipToGDISurface0x00x754112900x1a69dc0x1a5ddc
OsThunkDdGetMoCompGuids0x00x754112940x1a69e00x1a5de0
OsThunkDdGetMoCompFormats0x00x754112980x1a69e40x1a5de4
OsThunkDdGetInternalMoCompInfo0x00x7541129c0x1a69e80x1a5de8
OsThunkDdGetMoCompBuffInfo0x00x754112a00x1a69ec0x1a5dec
OsThunkDdCreateMoComp0x00x754112a40x1a69f00x1a5df0
OsThunkDdDestroyMoComp0x00x754112a80x1a69f40x1a5df4
OsThunkDdBeginMoCompFrame0x00x754112ac0x1a69f80x1a5df8
OsThunkDdEndMoCompFrame0x00x754112b00x1a69fc0x1a5dfc
OsThunkDdRenderMoComp0x00x754112b40x1a6a000x1a5e00
OsThunkDdQueryMoCompStatus0x00x754112b80x1a6a040x1a5e04
OsThunkDdDeleteDirectDrawObject0x00x754112bc0x1a6a080x1a5e08
OsThunkDdReleaseDC0x00x754112c00x1a6a0c0x1a5e0c
OsThunkDdReenableDirectDrawObject0x00x754112c40x1a6a100x1a5e10
OsThunkDdDestroyD3DBuffer0x00x754112c80x1a6a140x1a5e14
OsThunkDdDestroySurface0x00x754112cc0x1a6a180x1a5e18
OsThunkDdDeleteSurfaceObject0x00x754112d00x1a6a1c0x1a5e1c
OsThunkDdSetGammaRamp0x00x754112d40x1a6a200x1a5e20
OsThunkDdCreateSurfaceEx0x00x754112d80x1a6a240x1a5e24
OsThunkDdCreateSurface0x00x754112dc0x1a6a280x1a5e28
OsThunkDdCreateD3DBuffer0x00x754112e00x1a6a2c0x1a5e2c
OsThunkDdAttachSurface0x00x754112e40x1a6a300x1a5e30
OsThunkDdCreateSurfaceObject0x00x754112e80x1a6a340x1a5e34
OsThunkDdCanCreateSurface0x00x754112ec0x1a6a380x1a5e38
OsThunkDdCanCreateD3DBuffer0x00x754112f00x1a6a3c0x1a5e3c
OsThunkD3dContextCreate0x00x754112f40x1a6a400x1a5e40
OsThunkD3dContextDestroy0x00x754112f80x1a6a440x1a5e44
OsThunkDdGetDriverState0x00x754112fc0x1a6a480x1a5e48
OsThunkD3dValidateTextureStageState0x00x754113000x1a6a4c0x1a5e4c
OsThunkD3dDrawPrimitives20x00x754113040x1a6a500x1a5e50
OsThunkDdResetVisrgn0x00x754113080x1a6a540x1a5e54
OsThunkDdLockD3D0x00x7541130c0x1a6a580x1a5e58
OsThunkDdLock0x00x754113100x1a6a5c0x1a5e5c
OsThunkDdGetBltStatus0x00x754113140x1a6a600x1a5e60
OsThunkDdQueryDirectDrawObject0x00x754113180x1a6a640x1a5e64
OsThunkDdBlt0x00x7541131c0x1a6a680x1a5e68
OsThunkDdGetDC0x00x754113200x1a6a6c0x1a5e6c
OsThunkDdGetDriverInfo0x00x754113240x1a6a700x1a5e70
OsThunkDdGetAvailDriverMemory0x00x754113280x1a6a740x1a5e74
OsThunkDdWaitForVerticalBlank0x00x7541132c0x1a6a780x1a5e78
OsThunkDdGetFlipStatus0x00x754113300x1a6a7c0x1a5e7c
OsThunkDdFlip0x00x754113340x1a6a800x1a5e80
GDI32.dll (79)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
D3DKMTSignalSynchronizationObject20x00x7541133c0x1a6a880x1a5e88
D3DKMTGetRuntimeData0x00x754113400x1a6a8c0x1a5e8c
D3DKMTQueryAdapterInfo0x00x754113440x1a6a900x1a5e90
D3DKMTLock0x00x754113480x1a6a940x1a5e94
D3DKMTUnlock0x00x7541134c0x1a6a980x1a5e98
D3DKMTGetDisplayModeList0x00x754113500x1a6a9c0x1a5e9c
D3DKMTSetDisplayMode0x00x754113540x1a6aa00x1a5ea0
D3DKMTGetMultisampleMethodList0x00x754113580x1a6aa40x1a5ea4
D3DKMTSignalSynchronizationObject0x00x7541135c0x1a6aa80x1a5ea8
D3DKMTRender0x00x754113600x1a6aac0x1a5eac
D3DKMTOpenAdapterFromDeviceName0x00x754113640x1a6ab00x1a5eb0
D3DKMTCloseAdapter0x00x754113680x1a6ab40x1a5eb4
D3DKMTGetSharedPrimaryHandle0x00x7541136c0x1a6ab80x1a5eb8
D3DKMTEscape0x00x754113700x1a6abc0x1a5ebc
D3DKMTSetVidPnSourceOwner0x00x754113740x1a6ac00x1a5ec0
D3DKMTWaitForVerticalBlankEvent0x00x754113780x1a6ac40x1a5ec4
D3DKMTSetGammaRamp0x00x7541137c0x1a6ac80x1a5ec8
D3DKMTGetDeviceState0x00x754113800x1a6acc0x1a5ecc
D3DKMTCreateDCFromMemory0x00x754113840x1a6ad00x1a5ed0
D3DKMTDestroyDCFromMemory0x00x754113880x1a6ad40x1a5ed4
D3DKMTSetContextSchedulingPriority0x00x7541138c0x1a6ad80x1a5ed8
D3DKMTWaitForSynchronizationObject20x00x754113900x1a6adc0x1a5edc
D3DKMTWaitForSynchronizationObject0x00x754113940x1a6ae00x1a5ee0
D3DKMTDestroySynchronizationObject0x00x754113980x1a6ae40x1a5ee4
D3DKMTCreateSynchronizationObject20x00x7541139c0x1a6ae80x1a5ee8
D3DKMTCreateSynchronizationObject0x00x754113a00x1a6aec0x1a5eec
D3DKMTDestroyContext0x00x754113a40x1a6af00x1a5ef0
D3DKMTCreateContext0x00x754113a80x1a6af40x1a5ef4
D3DKMTDestroyDevice0x00x754113ac0x1a6af80x1a5ef8
D3DKMTCreateDevice0x00x754113b00x1a6afc0x1a5efc
D3DKMTQueryAllocationResidency0x00x754113b40x1a6b000x1a5f00
D3DKMTSetAllocationPriority0x00x754113b80x1a6b040x1a5f04
D3DKMTDestroyAllocation0x00x754113bc0x1a6b080x1a5f08
D3DKMTOpenResource20x00x754113c00x1a6b0c0x1a5f0c
D3DKMTOpenResource0x00x754113c40x1a6b100x1a5f10
D3DKMTQueryResourceInfo0x00x754113c80x1a6b140x1a5f14
D3DKMTCreateAllocation20x00x754113cc0x1a6b180x1a5f18
D3DKMTCreateAllocation0x00x754113d00x1a6b1c0x1a5f1c
D3DKMTOpenAdapterFromHdc0x00x754113d40x1a6b200x1a5f20
GetSystemPaletteEntries0x00x754113d80x1a6b240x1a5f24
CreateDIBitmap0x00x754113dc0x1a6b280x1a5f28
D3DKMTPresent0x00x754113e00x1a6b2c0x1a5f2c
CreateRectRgn0x00x754113e40x1a6b300x1a5f30
D3DKMTGetContextSchedulingPriority0x00x754113e80x1a6b340x1a5f34
D3DKMTGetScanLine0x00x754113ec0x1a6b380x1a5f38
D3DKMTSetQueuedLimit0x00x754113f00x1a6b3c0x1a5f3c
D3DKMTCheckOcclusion0x00x754113f40x1a6b400x1a5f40
D3DKMTCheckMonitorPowerState0x00x754113f80x1a6b440x1a5f44
D3DKMTCheckExclusiveOwnership0x00x754113fc0x1a6b480x1a5f48
D3DKMTSetDisplayPrivateDriverFormat0x00x754114000x1a6b4c0x1a5f4c
D3DKMTSharedPrimaryLockNotification0x00x754114040x1a6b500x1a5f50
D3DKMTSharedPrimaryUnLockNotification0x00x754114080x1a6b540x1a5f54
D3DKMTReleaseProcessVidPnSourceOwners0x00x7541140c0x1a6b580x1a5f58
D3DKMTCreateOverlay0x00x754114100x1a6b5c0x1a5f5c
D3DKMTUpdateOverlay0x00x754114140x1a6b600x1a5f60
D3DKMTFlipOverlay0x00x754114180x1a6b640x1a5f64
D3DKMTDestroyOverlay0x00x7541141c0x1a6b680x1a5f68
D3DKMTConfigureSharedResource0x00x754114200x1a6b6c0x1a5f6c
D3DKMTQueryStatistics0x00x754114240x1a6b700x1a5f70
D3DKMTGetOverlayState0x00x754114280x1a6b740x1a5f74
SetLayout0x00x7541142c0x1a6b780x1a5f78
SetStretchBltMode0x00x754114300x1a6b7c0x1a5f7c
StretchBlt0x00x754114340x1a6b800x1a5f80
CreateCompatibleDC0x00x754114380x1a6b840x1a5f84
CreateDIBSection0x00x7541143c0x1a6b880x1a5f88
SelectObject0x00x754114400x1a6b8c0x1a5f8c
GetDeviceGammaRamp0x00x754114440x1a6b900x1a5f90
GdiEntry10x00x754114480x1a6b940x1a5f94
GdiEntry130x00x7541144c0x1a6b980x1a5f98
CreateCompatibleBitmap0x00x754114500x1a6b9c0x1a5f9c
GetDIBits0x00x754114540x1a6ba00x1a5fa0
GetRandomRgn0x00x754114580x1a6ba40x1a5fa4
DeleteObject0x00x7541145c0x1a6ba80x1a5fa8
GetRegionData0x00x754114600x1a6bac0x1a5fac
CreateDCA0x00x754114640x1a6bb00x1a5fb0
GetNearestColor0x00x754114680x1a6bb40x1a5fb4
GetDeviceCaps0x00x7541146c0x1a6bb80x1a5fb8
DeleteDC0x00x754114700x1a6bbc0x1a5fbc
BitBlt0x00x754114740x1a6bc00x1a5fc0
KERNEL32.dll (92)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
GetProcessAffinityMask0x00x7541147c0x1a6bc80x1a5fc8
ReleaseMutex0x00x754114800x1a6bcc0x1a5fcc
WaitForSingleObject0x00x754114840x1a6bd00x1a5fd0
InterlockedIncrement0x00x754114880x1a6bd40x1a5fd4
GetCurrentThreadId0x00x7541148c0x1a6bd80x1a5fd8
DeleteCriticalSection0x00x754114900x1a6bdc0x1a5fdc
InitializeCriticalSection0x00x754114940x1a6be00x1a5fe0
EnterCriticalSection0x00x754114980x1a6be40x1a5fe4
LeaveCriticalSection0x00x7541149c0x1a6be80x1a5fe8
FreeLibrary0x00x754114a00x1a6bec0x1a5fec
GetProcAddress0x00x754114a40x1a6bf00x1a5ff0
LoadLibraryA0x00x754114a80x1a6bf40x1a5ff4
InterlockedExchange0x00x754114ac0x1a6bf80x1a5ff8
SetErrorMode0x00x754114b00x1a6bfc0x1a5ffc
InterlockedDecrement0x00x754114b40x1a6c000x1a6000
OutputDebugStringA0x00x754114b80x1a6c040x1a6004
GetNativeSystemInfo0x00x754114bc0x1a6c080x1a6008
GetModuleFileNameA0x00x754114c00x1a6c0c0x1a600c
FreeLibraryAndExitThread0x00x754114c40x1a6c100x1a6010
CloseHandle0x00x754114c80x1a6c140x1a6014
DisableThreadLibraryCalls0x00x754114cc0x1a6c180x1a6018
GetCurrentProcessId0x00x754114d00x1a6c1c0x1a601c
LocalFree0x00x754114d40x1a6c200x1a6020
CreateEventExA0x00x754114d80x1a6c240x1a6024
CreateSemaphoreExA0x00x754114dc0x1a6c280x1a6028
HeapAlloc0x00x754114e00x1a6c2c0x1a602c
HeapFree0x00x754114e40x1a6c300x1a6030
HeapCreate0x00x754114e80x1a6c340x1a6034
HeapDestroy0x00x754114ec0x1a6c380x1a6038
VerifyVersionInfoA0x00x754114f00x1a6c3c0x1a603c
GetCurrentThread0x00x754114f40x1a6c400x1a6040
SetThreadAffinityMask0x00x754114f80x1a6c440x1a6044
SetThreadPriority0x00x754114fc0x1a6c480x1a6048
ResumeThread0x00x754115000x1a6c4c0x1a604c
SetThreadIdealProcessor0x00x754115040x1a6c500x1a6050
GetEnvironmentVariableA0x00x754115080x1a6c540x1a6054
TlsAlloc0x00x7541150c0x1a6c580x1a6058
TlsGetValue0x00x754115100x1a6c5c0x1a605c
TlsSetValue0x00x754115140x1a6c600x1a6060
lstrlenA0x00x754115180x1a6c640x1a6064
VirtualProtect0x00x7541151c0x1a6c680x1a6068
GetSystemInfo0x00x754115200x1a6c6c0x1a606c
VirtualAlloc0x00x754115240x1a6c700x1a6070
VirtualFree0x00x754115280x1a6c740x1a6074
WaitForMultipleObjects0x00x7541152c0x1a6c780x1a6078
CreateEventA0x00x754115300x1a6c7c0x1a607c
CreateThread0x00x754115340x1a6c800x1a6080
SetEvent0x00x754115380x1a6c840x1a6084
GetLogicalProcessorInformation0x00x7541153c0x1a6c880x1a6088
GetVersionExA0x00x754115400x1a6c8c0x1a608c
MultiByteToWideChar0x00x754115440x1a6c900x1a6090
IsProcessorFeaturePresent0x00x754115480x1a6c940x1a6094
GetFileSize0x00x7541154c0x1a6c980x1a6098
SetUnhandledExceptionFilter0x00x754115500x1a6c9c0x1a609c
UnhandledExceptionFilter0x00x754115540x1a6ca00x1a60a0
TerminateProcess0x00x754115580x1a6ca40x1a60a4
GetSystemTimeAsFileTime0x00x7541155c0x1a6ca80x1a60a8
CreateNamedPipeA0x00x754115600x1a6cac0x1a60ac
CreateFileA0x00x754115640x1a6cb00x1a60b0
WaitNamedPipeA0x00x754115680x1a6cb40x1a60b4
TransactNamedPipe0x00x7541156c0x1a6cb80x1a60b8
GetPrivateProfileStringA0x00x754115700x1a6cbc0x1a60bc
PeekNamedPipe0x00x754115740x1a6cc00x1a60c0
WriteFile0x00x754115780x1a6cc40x1a60c4
ReadFile0x00x7541157c0x1a6cc80x1a60c8
FlushFileBuffers0x00x754115800x1a6ccc0x1a60cc
DisconnectNamedPipe0x00x754115840x1a6cd00x1a60d0
SetNamedPipeHandleState0x00x754115880x1a6cd40x1a60d4
ConnectNamedPipe0x00x7541158c0x1a6cd80x1a60d8
CreateMutexW0x00x754115900x1a6cdc0x1a60dc
OpenMutexW0x00x754115940x1a6ce00x1a60e0
GetProcessHeap0x00x754115980x1a6ce40x1a60e4
ResetEvent0x00x7541159c0x1a6ce80x1a60e8
GlobalAddAtomA0x00x754115a00x1a6cec0x1a60ec
lstrcmpA0x00x754115a40x1a6cf00x1a60f0
CreateSemaphoreA0x00x754115a80x1a6cf40x1a60f4
LoadLibraryW0x00x754115ac0x1a6cf80x1a60f8
GetSystemTime0x00x754115b00x1a6cfc0x1a60fc
ReleaseSemaphore0x00x754115b40x1a6d000x1a6100
GetProcessId0x00x754115b80x1a6d040x1a6104
LocalAlloc0x00x754115bc0x1a6d080x1a6108
GetTickCount0x00x754115c00x1a6d0c0x1a610c
QueryPerformanceCounter0x00x754115c40x1a6d100x1a6110
QueryPerformanceFrequency0x00x754115c80x1a6d140x1a6114
Sleep0x00x754115cc0x1a6d180x1a6118
InterlockedCompareExchange0x00x754115d00x1a6d1c0x1a611c
GetModuleHandleA0x00x754115d40x1a6d200x1a6120
DebugBreak0x00x754115d80x1a6d240x1a6124
GetCurrentProcess0x00x754115dc0x1a6d280x1a6128
OutputDebugStringW0x00x754115e00x1a6d2c0x1a612c
WideCharToMultiByte0x00x754115e40x1a6d300x1a6130
GetLastError0x00x754115e80x1a6d340x1a6134
dwmapi.dll (7)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
(by ordinal)0x7e0x754115f00x1a6d3c0x1a613c
(by ordinal)0x7d0x754115f40x1a6d400x1a6140
(by ordinal)0x640x754115f80x1a6d440x1a6144
(by ordinal)0x650x754115fc0x1a6d480x1a6148
(by ordinal)0x800x754116000x1a6d4c0x1a614c
(by ordinal)0x810x754116040x1a6d500x1a6150
(by ordinal)0x820x754116080x1a6d540x1a6154
Exports (14)
+
Api nameEAT AddressOrdinal
D3DPERF_BeginEvent0x754b71db0x4
D3DPERF_EndEvent0x754b72490x5
D3DPERF_GetStatus0x754b746d0x6
D3DPERF_QueryRepeatFrame0x754b738d0x7
D3DPERF_SetMarker0x754b72b50x8
D3DPERF_SetOptions0x754b74020x9
D3DPERF_SetRegion0x754b73210xa
DebugSetLevel0x754b88b10xb
DebugSetMute0x754466c60xc
Direct3DCreate90x75470a620xd
Direct3DCreate9Ex0x7541ccd50xe
Direct3DShaderValidatorCreate90x7544f5af0x1
PSGPError0x754ad77b0x2
PSGPSampleTexture0x754ad7090x3
c:\users\hjrd1k~1\appdata\local\temp\8055.tmp, ...
-
File Properties
Namesc:\users\hjrd1k~1\appdata\local\temp\8055.tmp (Created File)
c:\users\hjrd1k~1\appdata\local\temp\8361.tmp (Created File)
c:\users\hjrd1k~1\appdata\local\temp\90d9.tmp (Created File)
Size1.75 MB (1832448 bytes)
Hash ValuesMD5: 511e8601a8e32a68f6ae78d52ab6ed48
SHA1: 474db26020869f581a8c4fd562ef4c1d8c33406f
SHA256: c42ea6b812750bc54771d4ed044f654536a657db4dfebba6f0c2b6863f779a4a
Actions
PE Information
+
File Properties
Image Base0x75410000
Entry Point0x75411a45
Size Of Code0x1a7c00
Size Of Initialized Data0x18a00
Size Of Uninitialized Data0x0
Formatx86
TypeDll
SubsystemIMAGE_SUBSYSTEM_WINDOWS_CUI
Machine TypeIMAGE_FILE_MACHINE_I386
Compile Timestamp2010-11-20 12:57:39
Compiler/PackerUnknown
Sections (5)
+
NameVirtual AddressVirtual SizeRaw Data SizeRaw Data OffsetFlagsEntropy
.text0x754110000x1a7ba50x1a7c000x400CNT_CODE, MEM_EXECUTE, MEM_READ6.75
.data0x755b90000x996c0x76000x1a8000CNT_INITIALIZED_DATA, MEM_READ, MEM_WRITE2.72
.rsrc0x755c30000x3f00x4000x1af600CNT_INITIALIZED_DATA, MEM_READ3.36
.reloc0x755c40000xea3c0xec000x1afa00CNT_INITIALIZED_DATA, MEM_DISCARDABLE, MEM_READ6.69
0x755d30000x10000x26d0x1be600CNT_CODE, MEM_EXECUTE, MEM_READ4.84
Imports (377)
+
msvcrt.dll (50)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
_aligned_realloc0x00x754110000x1a674c0x1a5b4c
memchr0x00x754110040x1a67500x1a5b50
_strdup0x00x754110080x1a67540x1a5b54
strtoul0x00x7541100c0x1a67580x1a5b58
??0exception@@QAE@ABQBD@Z0x00x754110100x1a675c0x1a5b5c
_lock0x00x754110140x1a67600x1a5b60
__dllonexit0x00x754110180x1a67640x1a5b64
_unlock0x00x7541101c0x1a67680x1a5b68
_except_handler4_common0x00x754110200x1a676c0x1a5b6c
??1type_info@@UAE@XZ0x00x754110240x1a67700x1a5b70
memmove_s0x00x754110280x1a67740x1a5b74
memcpy_s0x00x7541102c0x1a67780x1a5b78
??0exception@@QAE@ABV0@@Z0x00x754110300x1a677c0x1a5b7c
floor0x00x754110340x1a67800x1a5b80
??1exception@@UAE@XZ0x00x754110380x1a67840x1a5b84
?what@exception@@UBEPBDXZ0x00x7541103c0x1a67880x1a5b88
??0exception@@QAE@XZ0x00x754110400x1a678c0x1a5b8c
_onexit0x00x754110440x1a67900x1a5b90
_CIexp0x00x754110480x1a67940x1a5b94
qsort0x00x7541104c0x1a67980x1a5b98
_aligned_free0x00x754110500x1a679c0x1a5b9c
_CIcos0x00x754110540x1a67a00x1a5ba0
__CxxFrameHandler30x00x754110580x1a67a40x1a5ba4
memcpy0x00x7541105c0x1a67a80x1a5ba8
_amsg_exit0x00x754110600x1a67ac0x1a5bac
_initterm0x00x754110640x1a67b00x1a5bb0
_XcptFilter0x00x754110680x1a67b40x1a5bb4
realloc0x00x7541106c0x1a67b80x1a5bb8
free0x00x754110700x1a67bc0x1a5bbc
malloc0x00x754110740x1a67c00x1a5bc0
_CIlog100x00x754110780x1a67c40x1a5bc4
strstr0x00x7541107c0x1a67c80x1a5bc8
isalnum0x00x754110800x1a67cc0x1a5bcc
sscanf0x00x754110840x1a67d00x1a5bd0
strrchr0x00x754110880x1a67d40x1a5bd4
_purecall0x00x7541108c0x1a67d80x1a5bd8
ceil0x00x754110900x1a67dc0x1a5bdc
_stricmp0x00x754110940x1a67e00x1a5be0
memmove0x00x754110980x1a67e40x1a5be4
_vsnprintf0x00x7541109c0x1a67e80x1a5be8
_ftol2_sse0x00x754110a00x1a67ec0x1a5bec
memset0x00x754110a40x1a67f00x1a5bf0
_CIsqrt0x00x754110a80x1a67f40x1a5bf4
_CIsin0x00x754110ac0x1a67f80x1a5bf8
_CIpow0x00x754110b00x1a67fc0x1a5bfc
_CIlog0x00x754110b40x1a68000x1a5c00
_CxxThrowException0x00x754110b80x1a68040x1a5c04
?terminate@@YAXXZ0x00x754110bc0x1a68080x1a5c08
_aligned_malloc0x00x754110c00x1a680c0x1a5c0c
atoi0x00x754110c40x1a68100x1a5c10
ntdll.dll (12)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
WinSqmIsOptedIn0x00x754110cc0x1a68180x1a5c18
EtwUnregisterTraceGuids0x00x754110d00x1a681c0x1a5c1c
EtwRegisterTraceGuidsA0x00x754110d40x1a68200x1a5c20
EtwGetTraceLoggerHandle0x00x754110d80x1a68240x1a5c24
EtwGetTraceEnableFlags0x00x754110dc0x1a68280x1a5c28
EtwGetTraceEnableLevel0x00x754110e00x1a682c0x1a5c2c
RtlIsCriticalSectionLockedByThread0x00x754110e40x1a68300x1a5c30
RtlInitUnicodeString0x00x754110e80x1a68340x1a5c34
NtQueryLicenseValue0x00x754110ec0x1a68380x1a5c38
VerSetConditionMask0x00x754110f00x1a683c0x1a5c3c
EtwLogTraceEvent0x00x754110f40x1a68400x1a5c40
WinSqmAddToStreamEx0x00x754110f80x1a68440x1a5c44
API-MS-Win-Core-LocalRegistry-L1-1-0.dll (9)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
RegCloseKey0x00x754111000x1a684c0x1a5c4c
RegCreateKeyExA0x00x754111040x1a68500x1a5c50
RegSetValueExA0x00x754111080x1a68540x1a5c54
RegEnumKeyExA0x00x7541110c0x1a68580x1a5c58
RegQueryValueExA0x00x754111100x1a685c0x1a5c5c
RegDeleteValueA0x00x754111140x1a68600x1a5c60
RegEnumValueA0x00x754111180x1a68640x1a5c64
RegQueryInfoKeyA0x00x7541111c0x1a68680x1a5c68
RegOpenKeyExA0x00x754111200x1a686c0x1a5c6c
API-MS-Win-Security-Base-L1-1-0.dll (12)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
SetSecurityDescriptorDacl0x00x754111280x1a68740x1a5c74
AddAccessAllowedAce0x00x7541112c0x1a68780x1a5c78
SetSecurityDescriptorSacl0x00x754111300x1a687c0x1a5c7c
SetKernelObjectSecurity0x00x754111340x1a68800x1a5c80
IsValidSid0x00x754111380x1a68840x1a5c84
GetLengthSid0x00x7541113c0x1a68880x1a5c88
InitializeAcl0x00x754111400x1a688c0x1a5c8c
AddMandatoryAce0x00x754111440x1a68900x1a5c90
GetSidSubAuthority0x00x754111480x1a68940x1a5c94
InitializeSid0x00x7541114c0x1a68980x1a5c98
GetSidLengthRequired0x00x754111500x1a689c0x1a5c9c
InitializeSecurityDescriptor0x00x754111540x1a68a00x1a5ca0
API-MS-Win-Security-SDDL-L1-1-0.dll (2)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
ConvertStringSecurityDescriptorToSecurityDescriptorW0x00x7541115c0x1a68a80x1a5ca8
ConvertStringSidToSidW0x00x754111600x1a68ac0x1a5cac
USER32.dll (64)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
UnionRect0x00x754111680x1a68b40x1a5cb4
IsWindowUnicode0x00x7541116c0x1a68b80x1a5cb8
GetWindowLongW0x00x754111700x1a68bc0x1a5cbc
GetWindowLongA0x00x754111740x1a68c00x1a5cc0
ClientToScreen0x00x754111780x1a68c40x1a5cc4
SetRect0x00x7541117c0x1a68c80x1a5cc8
GetWindowInfo0x00x754111800x1a68cc0x1a5ccc
GetClientRect0x00x754111840x1a68d00x1a5cd0
EnumDisplaySettingsA0x00x754111880x1a68d40x1a5cd4
OffsetRect0x00x7541118c0x1a68d80x1a5cd8
GetSystemMetrics0x00x754111900x1a68dc0x1a5cdc
EnumDisplayMonitors0x00x754111940x1a68e00x1a5ce0
GetDC0x00x754111980x1a68e40x1a5ce4
ReleaseDC0x00x7541119c0x1a68e80x1a5ce8
EnumDisplayDevicesA0x00x754111a00x1a68ec0x1a5cec
SetWindowPos0x00x754111a40x1a68f00x1a5cf0
SystemParametersInfoA0x00x754111a80x1a68f40x1a5cf4
GetMonitorInfoA0x00x754111ac0x1a68f80x1a5cf8
IntersectRect0x00x754111b00x1a68fc0x1a5cfc
DefWindowProcA0x00x754111b40x1a69000x1a5d00
SetForegroundWindow0x00x754111b80x1a69040x1a5d04
SetTimer0x00x754111bc0x1a69080x1a5d08
IsZoomed0x00x754111c00x1a690c0x1a5d0c
ShowWindow0x00x754111c40x1a69100x1a5d10
IsWindowVisible0x00x754111c80x1a69140x1a5d14
GetForegroundWindow0x00x754111cc0x1a69180x1a5d18
CloseClipboard0x00x754111d00x1a691c0x1a5d1c
SetClipboardData0x00x754111d40x1a69200x1a5d20
EmptyClipboard0x00x754111d80x1a69240x1a5d24
OpenClipboard0x00x754111dc0x1a69280x1a5d28
PtInRect0x00x754111e00x1a692c0x1a5d2c
GetCursorPos0x00x754111e40x1a69300x1a5d30
SetCursorPos0x00x754111e80x1a69340x1a5d34
GetDesktopWindow0x00x754111ec0x1a69380x1a5d38
GetWindowDC0x00x754111f00x1a693c0x1a5d3c
CreateIconIndirect0x00x754111f40x1a69400x1a5d40
GetWindowRect0x00x754111f80x1a69440x1a5d44
GetCursor0x00x754111fc0x1a69480x1a5d48
SetCursor0x00x754112000x1a694c0x1a5d4c
DestroyIcon0x00x754112040x1a69500x1a5d50
GetAncestor0x00x754112080x1a69540x1a5d54
IsProcessDPIAware0x00x7541120c0x1a69580x1a5d58
mouse_event0x00x754112100x1a695c0x1a5d5c
GetWindowDisplayAffinity0x00x754112140x1a69600x1a5d60
SetWindowDisplayAffinity0x00x754112180x1a69640x1a5d64
OpenInputDesktop0x00x7541121c0x1a69680x1a5d68
GetUserObjectInformationA0x00x754112200x1a696c0x1a5d6c
CloseDesktop0x00x754112240x1a69700x1a5d70
GetThreadDesktop0x00x754112280x1a69740x1a5d74
RegisterHotKey0x00x7541122c0x1a69780x1a5d78
UnregisterHotKey0x00x754112300x1a697c0x1a5d7c
IsWindow0x00x754112340x1a69800x1a5d80
KillTimer0x00x754112380x1a69840x1a5d84
SetWindowLongW0x00x7541123c0x1a69880x1a5d88
CallWindowProcW0x00x754112400x1a698c0x1a5d8c
SetWindowLongA0x00x754112440x1a69900x1a5d90
CallWindowProcA0x00x754112480x1a69940x1a5d94
SendMessageA0x00x7541124c0x1a69980x1a5d98
IsIconic0x00x754112500x1a699c0x1a5d9c
PostMessageA0x00x754112540x1a69a00x1a5da0
GetKeyState0x00x754112580x1a69a40x1a5da4
SetRectEmpty0x00x7541125c0x1a69a80x1a5da8
SfmDxGetSwapChainStats0x00x754112600x1a69ac0x1a5dac
NotifyOverlayWindow0x00x754112640x1a69b00x1a5db0
VERSION.dll (3)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
GetFileVersionInfoA0x00x7541126c0x1a69b80x1a5db8
GetFileVersionInfoSizeA0x00x754112700x1a69bc0x1a5dbc
VerQueryValueA0x00x754112740x1a69c00x1a5dc0
d3d8thk.dll (47)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
OsThunkD3dContextDestroyAll0x00x7541127c0x1a69c80x1a5dc8
OsThunkDdGetScanLine0x00x754112800x1a69cc0x1a5dcc
OsThunkDdUnlockD3D0x00x754112840x1a69d00x1a5dd0
OsThunkDdUnlock0x00x754112880x1a69d40x1a5dd4
OsThunkDdSetExclusiveMode0x00x7541128c0x1a69d80x1a5dd8
OsThunkDdFlipToGDISurface0x00x754112900x1a69dc0x1a5ddc
OsThunkDdGetMoCompGuids0x00x754112940x1a69e00x1a5de0
OsThunkDdGetMoCompFormats0x00x754112980x1a69e40x1a5de4
OsThunkDdGetInternalMoCompInfo0x00x7541129c0x1a69e80x1a5de8
OsThunkDdGetMoCompBuffInfo0x00x754112a00x1a69ec0x1a5dec
OsThunkDdCreateMoComp0x00x754112a40x1a69f00x1a5df0
OsThunkDdDestroyMoComp0x00x754112a80x1a69f40x1a5df4
OsThunkDdBeginMoCompFrame0x00x754112ac0x1a69f80x1a5df8
OsThunkDdEndMoCompFrame0x00x754112b00x1a69fc0x1a5dfc
OsThunkDdRenderMoComp0x00x754112b40x1a6a000x1a5e00
OsThunkDdQueryMoCompStatus0x00x754112b80x1a6a040x1a5e04
OsThunkDdDeleteDirectDrawObject0x00x754112bc0x1a6a080x1a5e08
OsThunkDdReleaseDC0x00x754112c00x1a6a0c0x1a5e0c
OsThunkDdReenableDirectDrawObject0x00x754112c40x1a6a100x1a5e10
OsThunkDdDestroyD3DBuffer0x00x754112c80x1a6a140x1a5e14
OsThunkDdDestroySurface0x00x754112cc0x1a6a180x1a5e18
OsThunkDdDeleteSurfaceObject0x00x754112d00x1a6a1c0x1a5e1c
OsThunkDdSetGammaRamp0x00x754112d40x1a6a200x1a5e20
OsThunkDdCreateSurfaceEx0x00x754112d80x1a6a240x1a5e24
OsThunkDdCreateSurface0x00x754112dc0x1a6a280x1a5e28
OsThunkDdCreateD3DBuffer0x00x754112e00x1a6a2c0x1a5e2c
OsThunkDdAttachSurface0x00x754112e40x1a6a300x1a5e30
OsThunkDdCreateSurfaceObject0x00x754112e80x1a6a340x1a5e34
OsThunkDdCanCreateSurface0x00x754112ec0x1a6a380x1a5e38
OsThunkDdCanCreateD3DBuffer0x00x754112f00x1a6a3c0x1a5e3c
OsThunkD3dContextCreate0x00x754112f40x1a6a400x1a5e40
OsThunkD3dContextDestroy0x00x754112f80x1a6a440x1a5e44
OsThunkDdGetDriverState0x00x754112fc0x1a6a480x1a5e48
OsThunkD3dValidateTextureStageState0x00x754113000x1a6a4c0x1a5e4c
OsThunkD3dDrawPrimitives20x00x754113040x1a6a500x1a5e50
OsThunkDdResetVisrgn0x00x754113080x1a6a540x1a5e54
OsThunkDdLockD3D0x00x7541130c0x1a6a580x1a5e58
OsThunkDdLock0x00x754113100x1a6a5c0x1a5e5c
OsThunkDdGetBltStatus0x00x754113140x1a6a600x1a5e60
OsThunkDdQueryDirectDrawObject0x00x754113180x1a6a640x1a5e64
OsThunkDdBlt0x00x7541131c0x1a6a680x1a5e68
OsThunkDdGetDC0x00x754113200x1a6a6c0x1a5e6c
OsThunkDdGetDriverInfo0x00x754113240x1a6a700x1a5e70
OsThunkDdGetAvailDriverMemory0x00x754113280x1a6a740x1a5e74
OsThunkDdWaitForVerticalBlank0x00x7541132c0x1a6a780x1a5e78
OsThunkDdGetFlipStatus0x00x754113300x1a6a7c0x1a5e7c
OsThunkDdFlip0x00x754113340x1a6a800x1a5e80
GDI32.dll (79)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
D3DKMTSignalSynchronizationObject20x00x7541133c0x1a6a880x1a5e88
D3DKMTGetRuntimeData0x00x754113400x1a6a8c0x1a5e8c
D3DKMTQueryAdapterInfo0x00x754113440x1a6a900x1a5e90
D3DKMTLock0x00x754113480x1a6a940x1a5e94
D3DKMTUnlock0x00x7541134c0x1a6a980x1a5e98
D3DKMTGetDisplayModeList0x00x754113500x1a6a9c0x1a5e9c
D3DKMTSetDisplayMode0x00x754113540x1a6aa00x1a5ea0
D3DKMTGetMultisampleMethodList0x00x754113580x1a6aa40x1a5ea4
D3DKMTSignalSynchronizationObject0x00x7541135c0x1a6aa80x1a5ea8
D3DKMTRender0x00x754113600x1a6aac0x1a5eac
D3DKMTOpenAdapterFromDeviceName0x00x754113640x1a6ab00x1a5eb0
D3DKMTCloseAdapter0x00x754113680x1a6ab40x1a5eb4
D3DKMTGetSharedPrimaryHandle0x00x7541136c0x1a6ab80x1a5eb8
D3DKMTEscape0x00x754113700x1a6abc0x1a5ebc
D3DKMTSetVidPnSourceOwner0x00x754113740x1a6ac00x1a5ec0
D3DKMTWaitForVerticalBlankEvent0x00x754113780x1a6ac40x1a5ec4
D3DKMTSetGammaRamp0x00x7541137c0x1a6ac80x1a5ec8
D3DKMTGetDeviceState0x00x754113800x1a6acc0x1a5ecc
D3DKMTCreateDCFromMemory0x00x754113840x1a6ad00x1a5ed0
D3DKMTDestroyDCFromMemory0x00x754113880x1a6ad40x1a5ed4
D3DKMTSetContextSchedulingPriority0x00x7541138c0x1a6ad80x1a5ed8
D3DKMTWaitForSynchronizationObject20x00x754113900x1a6adc0x1a5edc
D3DKMTWaitForSynchronizationObject0x00x754113940x1a6ae00x1a5ee0
D3DKMTDestroySynchronizationObject0x00x754113980x1a6ae40x1a5ee4
D3DKMTCreateSynchronizationObject20x00x7541139c0x1a6ae80x1a5ee8
D3DKMTCreateSynchronizationObject0x00x754113a00x1a6aec0x1a5eec
D3DKMTDestroyContext0x00x754113a40x1a6af00x1a5ef0
D3DKMTCreateContext0x00x754113a80x1a6af40x1a5ef4
D3DKMTDestroyDevice0x00x754113ac0x1a6af80x1a5ef8
D3DKMTCreateDevice0x00x754113b00x1a6afc0x1a5efc
D3DKMTQueryAllocationResidency0x00x754113b40x1a6b000x1a5f00
D3DKMTSetAllocationPriority0x00x754113b80x1a6b040x1a5f04
D3DKMTDestroyAllocation0x00x754113bc0x1a6b080x1a5f08
D3DKMTOpenResource20x00x754113c00x1a6b0c0x1a5f0c
D3DKMTOpenResource0x00x754113c40x1a6b100x1a5f10
D3DKMTQueryResourceInfo0x00x754113c80x1a6b140x1a5f14
D3DKMTCreateAllocation20x00x754113cc0x1a6b180x1a5f18
D3DKMTCreateAllocation0x00x754113d00x1a6b1c0x1a5f1c
D3DKMTOpenAdapterFromHdc0x00x754113d40x1a6b200x1a5f20
GetSystemPaletteEntries0x00x754113d80x1a6b240x1a5f24
CreateDIBitmap0x00x754113dc0x1a6b280x1a5f28
D3DKMTPresent0x00x754113e00x1a6b2c0x1a5f2c
CreateRectRgn0x00x754113e40x1a6b300x1a5f30
D3DKMTGetContextSchedulingPriority0x00x754113e80x1a6b340x1a5f34
D3DKMTGetScanLine0x00x754113ec0x1a6b380x1a5f38
D3DKMTSetQueuedLimit0x00x754113f00x1a6b3c0x1a5f3c
D3DKMTCheckOcclusion0x00x754113f40x1a6b400x1a5f40
D3DKMTCheckMonitorPowerState0x00x754113f80x1a6b440x1a5f44
D3DKMTCheckExclusiveOwnership0x00x754113fc0x1a6b480x1a5f48
D3DKMTSetDisplayPrivateDriverFormat0x00x754114000x1a6b4c0x1a5f4c
D3DKMTSharedPrimaryLockNotification0x00x754114040x1a6b500x1a5f50
D3DKMTSharedPrimaryUnLockNotification0x00x754114080x1a6b540x1a5f54
D3DKMTReleaseProcessVidPnSourceOwners0x00x7541140c0x1a6b580x1a5f58
D3DKMTCreateOverlay0x00x754114100x1a6b5c0x1a5f5c
D3DKMTUpdateOverlay0x00x754114140x1a6b600x1a5f60
D3DKMTFlipOverlay0x00x754114180x1a6b640x1a5f64
D3DKMTDestroyOverlay0x00x7541141c0x1a6b680x1a5f68
D3DKMTConfigureSharedResource0x00x754114200x1a6b6c0x1a5f6c
D3DKMTQueryStatistics0x00x754114240x1a6b700x1a5f70
D3DKMTGetOverlayState0x00x754114280x1a6b740x1a5f74
SetLayout0x00x7541142c0x1a6b780x1a5f78
SetStretchBltMode0x00x754114300x1a6b7c0x1a5f7c
StretchBlt0x00x754114340x1a6b800x1a5f80
CreateCompatibleDC0x00x754114380x1a6b840x1a5f84
CreateDIBSection0x00x7541143c0x1a6b880x1a5f88
SelectObject0x00x754114400x1a6b8c0x1a5f8c
GetDeviceGammaRamp0x00x754114440x1a6b900x1a5f90
GdiEntry10x00x754114480x1a6b940x1a5f94
GdiEntry130x00x7541144c0x1a6b980x1a5f98
CreateCompatibleBitmap0x00x754114500x1a6b9c0x1a5f9c
GetDIBits0x00x754114540x1a6ba00x1a5fa0
GetRandomRgn0x00x754114580x1a6ba40x1a5fa4
DeleteObject0x00x7541145c0x1a6ba80x1a5fa8
GetRegionData0x00x754114600x1a6bac0x1a5fac
CreateDCA0x00x754114640x1a6bb00x1a5fb0
GetNearestColor0x00x754114680x1a6bb40x1a5fb4
GetDeviceCaps0x00x7541146c0x1a6bb80x1a5fb8
DeleteDC0x00x754114700x1a6bbc0x1a5fbc
BitBlt0x00x754114740x1a6bc00x1a5fc0
KERNEL32.dll (92)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
GetProcessAffinityMask0x00x7541147c0x1a6bc80x1a5fc8
ReleaseMutex0x00x754114800x1a6bcc0x1a5fcc
WaitForSingleObject0x00x754114840x1a6bd00x1a5fd0
InterlockedIncrement0x00x754114880x1a6bd40x1a5fd4
GetCurrentThreadId0x00x7541148c0x1a6bd80x1a5fd8
DeleteCriticalSection0x00x754114900x1a6bdc0x1a5fdc
InitializeCriticalSection0x00x754114940x1a6be00x1a5fe0
EnterCriticalSection0x00x754114980x1a6be40x1a5fe4
LeaveCriticalSection0x00x7541149c0x1a6be80x1a5fe8
FreeLibrary0x00x754114a00x1a6bec0x1a5fec
GetProcAddress0x00x754114a40x1a6bf00x1a5ff0
LoadLibraryA0x00x754114a80x1a6bf40x1a5ff4
InterlockedExchange0x00x754114ac0x1a6bf80x1a5ff8
SetErrorMode0x00x754114b00x1a6bfc0x1a5ffc
InterlockedDecrement0x00x754114b40x1a6c000x1a6000
OutputDebugStringA0x00x754114b80x1a6c040x1a6004
GetNativeSystemInfo0x00x754114bc0x1a6c080x1a6008
GetModuleFileNameA0x00x754114c00x1a6c0c0x1a600c
FreeLibraryAndExitThread0x00x754114c40x1a6c100x1a6010
CloseHandle0x00x754114c80x1a6c140x1a6014
DisableThreadLibraryCalls0x00x754114cc0x1a6c180x1a6018
GetCurrentProcessId0x00x754114d00x1a6c1c0x1a601c
LocalFree0x00x754114d40x1a6c200x1a6020
CreateEventExA0x00x754114d80x1a6c240x1a6024
CreateSemaphoreExA0x00x754114dc0x1a6c280x1a6028
HeapAlloc0x00x754114e00x1a6c2c0x1a602c
HeapFree0x00x754114e40x1a6c300x1a6030
HeapCreate0x00x754114e80x1a6c340x1a6034
HeapDestroy0x00x754114ec0x1a6c380x1a6038
VerifyVersionInfoA0x00x754114f00x1a6c3c0x1a603c
GetCurrentThread0x00x754114f40x1a6c400x1a6040
SetThreadAffinityMask0x00x754114f80x1a6c440x1a6044
SetThreadPriority0x00x754114fc0x1a6c480x1a6048
ResumeThread0x00x754115000x1a6c4c0x1a604c
SetThreadIdealProcessor0x00x754115040x1a6c500x1a6050
GetEnvironmentVariableA0x00x754115080x1a6c540x1a6054
TlsAlloc0x00x7541150c0x1a6c580x1a6058
TlsGetValue0x00x754115100x1a6c5c0x1a605c
TlsSetValue0x00x754115140x1a6c600x1a6060
lstrlenA0x00x754115180x1a6c640x1a6064
VirtualProtect0x00x7541151c0x1a6c680x1a6068
GetSystemInfo0x00x754115200x1a6c6c0x1a606c
VirtualAlloc0x00x754115240x1a6c700x1a6070
VirtualFree0x00x754115280x1a6c740x1a6074
WaitForMultipleObjects0x00x7541152c0x1a6c780x1a6078
CreateEventA0x00x754115300x1a6c7c0x1a607c
CreateThread0x00x754115340x1a6c800x1a6080
SetEvent0x00x754115380x1a6c840x1a6084
GetLogicalProcessorInformation0x00x7541153c0x1a6c880x1a6088
GetVersionExA0x00x754115400x1a6c8c0x1a608c
MultiByteToWideChar0x00x754115440x1a6c900x1a6090
IsProcessorFeaturePresent0x00x754115480x1a6c940x1a6094
GetFileSize0x00x7541154c0x1a6c980x1a6098
SetUnhandledExceptionFilter0x00x754115500x1a6c9c0x1a609c
UnhandledExceptionFilter0x00x754115540x1a6ca00x1a60a0
TerminateProcess0x00x754115580x1a6ca40x1a60a4
GetSystemTimeAsFileTime0x00x7541155c0x1a6ca80x1a60a8
CreateNamedPipeA0x00x754115600x1a6cac0x1a60ac
CreateFileA0x00x754115640x1a6cb00x1a60b0
WaitNamedPipeA0x00x754115680x1a6cb40x1a60b4
TransactNamedPipe0x00x7541156c0x1a6cb80x1a60b8
GetPrivateProfileStringA0x00x754115700x1a6cbc0x1a60bc
PeekNamedPipe0x00x754115740x1a6cc00x1a60c0
WriteFile0x00x754115780x1a6cc40x1a60c4
ReadFile0x00x7541157c0x1a6cc80x1a60c8
FlushFileBuffers0x00x754115800x1a6ccc0x1a60cc
DisconnectNamedPipe0x00x754115840x1a6cd00x1a60d0
SetNamedPipeHandleState0x00x754115880x1a6cd40x1a60d4
ConnectNamedPipe0x00x7541158c0x1a6cd80x1a60d8
CreateMutexW0x00x754115900x1a6cdc0x1a60dc
OpenMutexW0x00x754115940x1a6ce00x1a60e0
GetProcessHeap0x00x754115980x1a6ce40x1a60e4
ResetEvent0x00x7541159c0x1a6ce80x1a60e8
GlobalAddAtomA0x00x754115a00x1a6cec0x1a60ec
lstrcmpA0x00x754115a40x1a6cf00x1a60f0
CreateSemaphoreA0x00x754115a80x1a6cf40x1a60f4
LoadLibraryW0x00x754115ac0x1a6cf80x1a60f8
GetSystemTime0x00x754115b00x1a6cfc0x1a60fc
ReleaseSemaphore0x00x754115b40x1a6d000x1a6100
GetProcessId0x00x754115b80x1a6d040x1a6104
LocalAlloc0x00x754115bc0x1a6d080x1a6108
GetTickCount0x00x754115c00x1a6d0c0x1a610c
QueryPerformanceCounter0x00x754115c40x1a6d100x1a6110
QueryPerformanceFrequency0x00x754115c80x1a6d140x1a6114
Sleep0x00x754115cc0x1a6d180x1a6118
InterlockedCompareExchange0x00x754115d00x1a6d1c0x1a611c
GetModuleHandleA0x00x754115d40x1a6d200x1a6120
DebugBreak0x00x754115d80x1a6d240x1a6124
GetCurrentProcess0x00x754115dc0x1a6d280x1a6128
OutputDebugStringW0x00x754115e00x1a6d2c0x1a612c
WideCharToMultiByte0x00x754115e40x1a6d300x1a6130
GetLastError0x00x754115e80x1a6d340x1a6134
dwmapi.dll (7)
+
API NameOrdinalIAT AddressThunk RVAThunk Offset
(by ordinal)0x7e0x754115f00x1a6d3c0x1a613c
(by ordinal)0x7d0x754115f40x1a6d400x1a6140
(by ordinal)0x640x754115f80x1a6d440x1a6144
(by ordinal)0x650x754115fc0x1a6d480x1a6148
(by ordinal)0x800x754116000x1a6d4c0x1a614c
(by ordinal)0x810x754116040x1a6d500x1a6150
(by ordinal)0x820x754116080x1a6d540x1a6154
Exports (14)
+
Api nameEAT AddressOrdinal
D3DPERF_BeginEvent0x754b71db0x4
D3DPERF_EndEvent0x754b72490x5
D3DPERF_GetStatus0x754b746d0x6
D3DPERF_QueryRepeatFrame0x754b738d0x7
D3DPERF_SetMarker0x754b72b50x8
D3DPERF_SetOptions0x754b74020x9
D3DPERF_SetRegion0x754b73210xa
DebugSetLevel0x754b88b10xb
DebugSetMute0x754466c60xc
Direct3DCreate90x75470a620xd
Direct3DCreate9Ex0x7541ccd50xe
Direct3DShaderValidatorCreate90x7544f5af0x1
PSGPError0x754ad77b0x2
PSGPSampleTexture0x754ad7090x3
c:\users\hjrd1koky ds8lujv\appdata\local\microsoft\windows\explorer\thumbcache_32.db
-
File Properties
Namesc:\users\hjrd1koky ds8lujv\appdata\local\microsoft\windows\explorer\thumbcache_32.db (Modified File)
Size1.00 MB (1048576 bytes)
Hash ValuesMD5: b21042cae5f16c8491412d5c0fe6efc1
SHA1: e8576008f904e5bd7ba9e21bf423269f9a8cb02a
SHA256: 53eeba74de368e1da24a5a2f63b1e572e99b446228cc8d928b213de6829a11e0
Actions
c:\users\hjrd1koky ds8lujv\appdata\local\microsoft\windows\explorer\thumbcache_96.db
-
File Properties
Namesc:\users\hjrd1koky ds8lujv\appdata\local\microsoft\windows\explorer\thumbcache_96.db (Modified File)
Size1.00 MB (1048576 bytes)
Hash ValuesMD5: 1565b6034cb30d34f9253e40fc60e3a8
SHA1: ab07f5b01f1e8f45c77d46fac1aa5952ddc96070
SHA256: ef0b02378e7297aa6e0d79adb3f2288b5d9b0dde297e5e5a9cbd2901a69cb4c4
Actions
c:\users\hjrd1koky ds8lujv\appdata\local\microsoft\windows\explorer\thumbcache_256.db
-
File Properties
Namesc:\users\hjrd1koky ds8lujv\appdata\local\microsoft\windows\explorer\thumbcache_256.db (Modified File)
Size1.00 MB (1048576 bytes)
Hash ValuesMD5: c7f8f5ef1ef5e8a7401c9e4fbc927da8
SHA1: 90d545e9a500109dd4d96d6b4eccdf76f4e88935
SHA256: cd7829efe2b9f9e586080875f6d965d50f4af5089172df1f9bd1c324b1bb1641
Actions
c:\users\hjrd1koky ds8lujv\appdata\local\microsoft\windows\explorer\thumbcache_1024.db
-
File Properties
Namesc:\users\hjrd1koky ds8lujv\appdata\local\microsoft\windows\explorer\thumbcache_1024.db (Modified File)
Size0.02 KB (24 bytes)
Hash ValuesMD5: b623140136560adaf3786e262c01676f
SHA1: 7143c103e1d52c99eeaa3b11beb9f02d2c50ca3d
SHA256: ee3e1212dbd47e058e30b119a92f853d3962558065fa3065ad5c1d47654c4140
Actions
c:\users\hjrd1koky ds8lujv\appdata\local\microsoft\windows\explorer\thumbcache_sr.db
-
File Properties
Namesc:\users\hjrd1koky ds8lujv\appdata\local\microsoft\windows\explorer\thumbcache_sr.db (Modified File)
Size0.02 KB (24 bytes)
Hash ValuesMD5: 2034995f0bbaa16db835b462eb78152a
SHA1: ce19b1a236f95307067d4979f8dd96c70d69c18a
SHA256: 62ce260f5e10fc17bf63faafa39912febf61d20fad51cc11606a295801743799
Actions
c:\users\hjrd1koky ds8lujv\appdata\local\microsoft\windows\temporary internet files\content.ie5\index.dat
-
File Properties
Namesc:\users\hjrd1koky ds8lujv\appdata\local\microsoft\windows\temporary internet files\content.ie5\index.dat (Modified File)
Size48.00 KB (49152 bytes)
Hash ValuesMD5: e6b1de6678d90bcb09e9f80b9a7e9b19
SHA1: 60fba1f703325131737b4d497239dba8af92491c
SHA256: 744862c62b36201f4cf54b2809fc4e21e5819df25f51bebe5d88c65c7963790a
Actions
c:\users\hjrd1koky ds8lujv\appdata\roaming\microsoft\windows\cookies\index.dat, ...
-
File Properties
Namesc:\users\hjrd1koky ds8lujv\appdata\roaming\microsoft\windows\cookies\index.dat (Modified File)
process_00000002-region_00001446-addr_0x0000000000530000-size_0x0000000000004000-perm_rw.bin (Process Dump)
Size16.00 KB (16384 bytes)
Hash ValuesMD5: d7a950fefd60dbaa01df2d85fefb3862
SHA1: 15740b197555ba8e162c37a60ba655151e3bebae
SHA256: 75d0b1743f61b76a35b1fedd32378837805de58d79fa950cb6e8164bfa72073a
Actions
c:\users\hjrd1koky ds8lujv\appdata\local\microsoft\windows\history\history.ie5\index.dat, ...
-
File Properties
Namesc:\users\hjrd1koky ds8lujv\appdata\local\microsoft\windows\history\history.ie5\index.dat (Modified File)
process_00000002-region_00001447-addr_0x0000000000540000-size_0x0000000000008000-perm_rw.bin (Process Dump)
Size32.00 KB (32768 bytes)
Hash ValuesMD5: 5a8d4270f45ec3e2b9386f235de25fea
SHA1: aa48c9431ecf28d39c56ea43b084039a4f9e1f7e
SHA256: a079616c415e9e394bbb8175baeadbd23a306f534b7c8c4d9ea75c6f5e368169
Actions
c:\users\hjrd1koky ds8lujv\appdata\roaming\microsoft\windows\ietldcache\index.dat
-
File Properties
Namesc:\users\hjrd1koky ds8lujv\appdata\roaming\microsoft\windows\ietldcache\index.dat (Modified File)
Size256.00 KB (262144 bytes)
Hash ValuesMD5: 523c9c2f0803c81fb5baf9ae734c5313
SHA1: 2bdb52c4b4920a39084818ab848a39bde4e6fe19
SHA256: 8f32b74a611bdcf55195007d815d1028c287d4068c1feea68061aeec9626455f
Actions
c:\users\hjrd1koky ds8lujv\appdata\local\microsoft\windows\explorer\thumbcache_idx.db
-
File Properties
Namesc:\users\hjrd1koky ds8lujv\appdata\local\microsoft\windows\explorer\thumbcache_idx.db (Modified File)
Size3.18 KB (3256 bytes)
Hash ValuesMD5: 4f50d242174f1e946d222d3cda5ee094
SHA1: ae45f37e5df444532c47224b7cf78c43e9f675e7
SHA256: 147c1416aaa31785b01eaf6ae2658f1c31970b1cac9568b6b403e68fb2e565db
Actions
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefox with deactivated setting "security.fileuri.strict_origin_policy".


Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image