Loading ...

Play interactive tourEdit tour

Analysis Report 6vywr0yn.php

Overview

General Information

Sample Name:6vywr0yn.php (renamed file extension from php to dll)
Analysis ID:326344
MD5:24af4121e268839125e7dc0a8cfe57bb
SHA1:68e59497ecca420d7ee86cc708a3046f8f8da300
SHA256:e101211fc11db8ac7365aea768c7a42fae6d6148d273923cc3271aceaf204365

Most interesting Screenshot:

Detection

Score:23
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Machine Learning detection for sample
Checks if the current process is being debugged
Enables debug privileges
One or more processes crash
Sample file is different than original file name gathered from version info
Stores large binary data to the registry
Tries to load missing DLLs

Classification

Analysis Advice

Sample crashes during execution, try analyze it on another analysis machine
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior



Startup

  • System is w10x64
  • loaddll32.exe (PID: 6536 cmdline: loaddll32.exe 'C:\Users\user\Desktop\6vywr0yn.dll' MD5: 2D39D4DFDE8F7151723794029AB8A034)
    • WerFault.exe (PID: 5660 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6536 -s 284 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • WerFault.exe (PID: 4944 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6536 -s 240 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Machine Learning detection for sampleShow sources
Source: 6vywr0yn.dllJoe Sandbox ML: detected
Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6536 -s 284
Source: 6vywr0yn.dllBinary or memory string: OriginalFilenameoe2hrfl.dllX vs 6vywr0yn.dll
Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: phoneinfo.dllJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: ext-ms-win-xblauth-console-l1.dllJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: phoneinfo.dllJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: ext-ms-win-xblauth-console-l1.dllJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: ext-ms-win-xblauth-console-l1.dllJump to behavior
Source: classification engineClassification label: sus23.winDLL@3/8@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6536
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERB4EE.tmpJump to behavior
Source: 6vywr0yn.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\6vywr0yn.dll'
Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6536 -s 284
Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6536 -s 240
Source: 6vywr0yn.dllStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: 6vywr0yn.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: EFRE65.pdb source: 6vywr0yn.dll
Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000003.00000003.649328753.0000000004FE1000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.660612233.0000000005061000.00000004.00000001.sdmp
Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000003.00000003.649328753.0000000004FE1000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.658917823.0000000003249000.00000004.00000001.sdmp
Source: Binary string: sechost.pdb source: WerFault.exe, 00000003.00000003.649342719.0000000004FB2000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000003.00000003.649328753.0000000004FE1000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.660612233.0000000005061000.00000004.00000001.sdmp
Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000003.00000003.649328753.0000000004FE1000.00000004.00000001.sdmp
Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000003.00000003.649370029.0000000004FB5000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdb source: WerFault.exe, 00000003.00000003.649328753.0000000004FE1000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.658928903.000000000320C000.00000004.00000001.sdmp
Source: Binary string: wrpcrt4.pdbk source: WerFault.exe, 00000003.00000003.649370029.0000000004FB5000.00000004.00000040.sdmp
Source: Binary string: aumjrxmCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 00000003.00000002.653904672.0000000002A32000.00000004.00000010.sdmp
Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000003.00000003.649328753.0000000004FE1000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.660612233.0000000005061000.00000004.00000001.sdmp
Source: Binary string: advapi32.pdb source: WerFault.exe, 00000003.00000003.649328753.0000000004FE1000.00000004.00000001.sdmp
Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000003.00000003.649365067.0000000004FB0000.00000004.00000040.sdmp
Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000003.00000003.649328753.0000000004FE1000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.660612233.0000000005061000.00000004.00000001.sdmp
Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000003.00000003.649365067.0000000004FB0000.00000004.00000040.sdmp
Source: Binary string: wimm32.pdb source: WerFault.exe, 00000003.00000003.649365067.0000000004FB0000.00000004.00000040.sdmp, WerFault.exe, 00000005.00000003.660612233.0000000005061000.00000004.00000001.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000003.00000003.647964693.0000000002DCA000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.658949932.0000000003218000.00000004.00000001.sdmp
Source: Binary string: sechost.pdbk source: WerFault.exe, 00000003.00000003.649342719.0000000004FB2000.00000004.00000040.sdmp
Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000003.00000003.649365067.0000000004FB0000.00000004.00000040.sdmp, WerFault.exe, 00000005.00000003.660612233.0000000005061000.00000004.00000001.sdmp
Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000003.00000003.647964693.0000000002DCA000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.658949932.0000000003218000.00000004.00000001.sdmp
Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000003.00000003.649328753.0000000004FE1000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.660612233.0000000005061000.00000004.00000001.sdmp
Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000003.00000003.647906130.0000000002DC4000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.658934374.0000000003212000.00000004.00000001.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 00000003.00000003.649328753.0000000004FE1000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.660612233.0000000005061000.00000004.00000001.sdmp
Source: Binary string: upwntdll.pdb source: WerFault.exe, 00000003.00000003.647729031.0000000004BA8000.00000004.00000001.sdmp
Source: Binary string: wuser32.pdb source: WerFault.exe, 00000003.00000003.649328753.0000000004FE1000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.660612233.0000000005061000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000003.00000003.647843222.0000000002DBE000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.658928903.000000000320C000.00000004.00000001.sdmp
Source: C:\Windows\SysWOW64\WerFault.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363} DeviceTicketJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: WerFault.exe, 00000005.00000002.681033724.00000000031DB000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW Area Connection* 6
Source: WerFault.exe, 00000003.00000002.654666487.0000000004C70000.00000002.00000001.sdmp, WerFault.exe, 00000005.00000002.682254317.0000000005550000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: WerFault.exe, 00000005.00000002.681033724.00000000031DB000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
Source: WerFault.exe, 00000003.00000002.654666487.0000000004C70000.00000002.00000001.sdmp, WerFault.exe, 00000005.00000002.682254317.0000000005550000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: WerFault.exe, 00000003.00000002.654666487.0000000004C70000.00000002.00000001.sdmp, WerFault.exe, 00000005.00000002.682254317.0000000005550000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: WerFault.exe, 00000005.00000002.681144622.0000000004CD0000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAWpZ
Source: WerFault.exe, 00000003.00000002.654666487.0000000004C70000.00000002.00000001.sdmp, WerFault.exe, 00000005.00000002.682254317.0000000005550000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
Source: C:\Windows\SysWOW64\WerFault.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess token adjusted: DebugJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationDLL Side-Loading1Process Injection1Modify Registry1OS Credential DumpingSecurity Software Discovery11Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsDLL Side-Loading1Virtualization/Sandbox Evasion1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)DLL Side-Loading1NTDSSystem Information Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 326344 Sample: 6vywr0yn.php Startdate: 03/12/2020 Architecture: WINDOWS Score: 23 12 Machine Learning detection for sample 2->12 6 loaddll32.exe 1 2->6         started        process3 process4 8 WerFault.exe 3 9 6->8         started        10 WerFault.exe 3 9 6->10         started       

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
6vywr0yn.dll100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:31.0.0 Red Diamond
Analysis ID:326344
Start date:03.12.2020
Start time:10:20:41
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 28s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:6vywr0yn.php (renamed file extension from php to dll)
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:17
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:SUS
Classification:sus23.winDLL@3/8@0/0
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
Warnings:
Show All
  • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, WerFault.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
  • Excluded IPs from analysis (whitelisted): 104.43.193.48, 40.88.32.150, 13.64.90.137, 51.104.144.132, 52.155.217.156, 20.54.26.129, 205.185.216.42, 205.185.216.10, 92.122.213.247, 92.122.213.194, 52.147.198.201, 104.42.151.234
  • Excluded domains from analysis (whitelisted): displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, arc.msn.com.nsatc.net, db3p-ris-pf-prod-atm.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcolcus15.cloudapp.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, ris.api.iris.microsoft.com, skypedataprdcoleus16.cloudapp.net, skypedataprdcoleus15.cloudapp.net, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, skypedataprdcolwus16.cloudapp.net

Simulations

Behavior and APIs

TimeTypeDescription
10:21:44API Interceptor1x Sleep call for process: WerFault.exe modified

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_loaddll32.exe_ea4eb16da8f7d23ca4440a1c3ce58376e1da79a_b4806494_1338ee9c\Report.wer
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
Category:dropped
Size (bytes):8500
Entropy (8bit):3.7585343342186524
Encrypted:false
SSDEEP:96:b4N88zCW0y9y9hTyf7uf5pXIQcQvc6QcEDMcw3DS+a+z+HbHg/8BRTf3FOyYc/N+:MuUIHBUZMX4jc//u7s1S274ItW0
MD5:1E0E517C2D0A46C09748898C2050DAD8
SHA1:9B3CE0A16AB3B879F488743AC8CA19DF62CE62E2
SHA-256:1DC958FF3F40E9AE3C39620D6E2895871A041A981B02D006E1504828E84DD1E8
SHA-512:D7D8A5CD3DBCD41890CA12750922742FCA8BC67B4B1B304D9F877ACC0D917F15EC1E53BEF4C699C6C864C1A6CC6BE7ADCA359AC219FB0AB033D4D41349033CE2
Malicious:false
Reputation:low
Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.1.4.6.0.8.9.5.3.0.9.5.4.7.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.5.1.4.6.0.8.9.8.0.1.2.6.6.4.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.4.4.5.b.3.1.a.-.2.7.b.b.-.4.c.6.8.-.8.e.a.0.-.a.9.8.3.6.9.9.d.4.2.c.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.2.e.f.5.f.7.7.-.c.1.c.a.-.4.c.f.5.-.a.b.3.d.-.6.6.6.0.f.5.f.5.a.6.f.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.l.o.a.d.d.l.l.3.2...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.8.8.-.0.0.0.1.-.0.0.1.b.-.a.4.a.f.-.7.2.a.d.5.5.c.9.d.6.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.l.o.a.d.d.l.l.3.2...e.x.e.....T.a.r.g.e.t.A.p.
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_1150404dfdf0cd1c8f6e63f1c5bced36b97e72a_b4806494_1674bdb8\Report.wer
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
Category:dropped
Size (bytes):8758
Entropy (8bit):3.758500655021495
Encrypted:false
SSDEEP:96:62VRRzCW0yuy9hTqz79fepXIQcQSc6mcEkcw3L+a+z+HbHgVVG4rmMoVazWbSmOq:3R4UkyHsieHjEq/u7s1S274ItWk
MD5:02C86A7C66904914D22834E72CC79EED
SHA1:E6E43C77245186FF7D4DE0653DDB63865E38D926
SHA-256:E19BF1B36FA28692D20EF77150FB0F4C98E0BDE16FA10D0E3AA3ADF49BFE0B63
SHA-512:BF201BBAE1FDA9BC968064E5267BBB0F63D86ADD4380D3FC63FAA03EE831FC9BBF4ED3D6D9CD7FB42DD15287E8CA7E12CC3A11C1FA91BDFCBF44A2B2EF55B999
Malicious:false
Reputation:low
Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.1.4.6.0.8.9.0.0.9.0.8.1.0.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.2.c.0.9.b.7.4.-.7.6.0.8.-.4.c.3.9.-.b.0.d.a.-.8.1.4.6.f.e.f.a.d.6.4.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.9.c.6.a.0.d.6.-.a.e.7.0.-.4.5.a.3.-.a.b.0.3.-.d.2.5.1.f.c.e.c.9.9.a.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.l.o.a.d.d.l.l.3.2...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.8.8.-.0.0.0.1.-.0.0.1.b.-.a.4.a.f.-.7.2.a.d.5.5.c.9.d.6.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.l.o.a.d.d.l.l.3.2...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.0././.1.1././.3.0.:.1.2.:.1.5.:.2.1.!.0.!.l.o.a.d.d.l.l.3.2...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB4EE.tmp.dmp
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 15 streams, Thu Dec 3 09:21:30 2020, 0x1205a4 type
Category:dropped
Size (bytes):37314
Entropy (8bit):1.9910558024273979
Encrypted:false
SSDEEP:192:nfDTpt/U/QbB/VzA5L9702aXl6ZF+sX3826v2oTq95g2:7Tj/TB/q5L9o1XEfX3H+2oTm
MD5:771C819AABAE7AF1767EC41C6FFAF597
SHA1:C4ACC48E195F11AA315EB836163B205BCDCC3B1D
SHA-256:BD0540BDF38667648D4D89CE90ACFE212165E5C9D862ED44B3B4BE829A8AEB28
SHA-512:B1A5DB4851DE00B9F57A0E8725B8E617B7F85F13A25BE1B3E8B9074856D10ED8D95B7C3F820FD1F7D037A69C3C7515251517ADBE7F3BFAEC0CECD21F6FDF28CB
Malicious:false
Reputation:low
Preview: MDMP....... .........._...................U...........B..............GenuineIntelW...........T.............._.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB6A5.tmp.WERInternalMetadata.xml
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
Category:dropped
Size (bytes):8280
Entropy (8bit):3.6934651482957968
Encrypted:false
SSDEEP:192:Rrl7r3GLNiU16eHI6YrJSUOvTgmfwSP+pBr89b0gGsfxRwGGm:RrlsNim6x6YVSUOvTgmfwSFjlfxR7
MD5:F647F15321517ED5E2FD2A76F6B2CD76
SHA1:790561EC713D3564E4EA8A91B496B7C9D1586DE4
SHA-256:B4BDF0EE5815C1795BDFD73F2037CFE1FA39E834CF4B91C6B96C14A79309A957
SHA-512:5AED7CD9BEB45B0A03ED51AF70EA2581375B99E1BF464A61BCA741B19C2EF225E28CAF505A21F7F2DFE0758775056F3570964F37448CC04C0E94344D2A71FEFA
Malicious:false
Reputation:low
Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.5.3.6.<./.P.i.d.>.......
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBA01.tmp.xml
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4559
Entropy (8bit):4.431764953573035
Encrypted:false
SSDEEP:48:cvIwSD8zs4JgtWI9sCWSC8Bhl8fm8M4JO8F++q83QKcQIcQwv+89d:uITf+7DSNrSJ2rKkwv+Kd
MD5:9497050975452F4680AA09AEC5E37567
SHA1:B857D1A0336C340B3D0211CD19A49CB59A4455F0
SHA-256:3818442B0673868E62DD6E9F08B85242E1AE1B26F96AA763C3BA0C01BB67EFFC
SHA-512:4A683AD0E50B4DC06BEB8C923383ECA6E767C78CEDD47C30497B9BC725FCE84445C9F23FB25AF3E5E447501A33E454874751BD876A38684CFE49925B9F6C3E06
Malicious:false
Reputation:low
Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="755672" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC951.tmp.dmp
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 15 streams, Thu Dec 3 09:21:35 2020, 0x1205a4 type
Category:dropped
Size (bytes):36318
Entropy (8bit):1.9873876052427046
Encrypted:false
SSDEEP:192:0eYO60feNB/VzE7KGQ362ajx6hu5MxVEkkkO9iZP:72NB/FEeK1jo8eokPO9+
MD5:6BF96D6C1C550EF0AD442AE30A54A125
SHA1:6D0C44587B0CABAB209FCD6249638931A2771C96
SHA-256:759A98FD4D0703263F9FF134871C2E500C9432C3970F0B2E1AF9FE17491E7D24
SHA-512:A79B237B6AAA042EBB00825A4312238A3F728E4953C410C24D486036B1DCD15A1EBFB31DFBF5EF08A22CBEDF648F9119F8AFF29604F1A50745F503A0C1B961D3
Malicious:false
Reputation:low
Preview: MDMP....... .........._...................U...........B......x.......GenuineIntelW...........T.............._.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCB46.tmp.WERInternalMetadata.xml
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
Category:dropped
Size (bytes):8272
Entropy (8bit):3.6952714399644333
Encrypted:false
SSDEEP:192:Rrl7r3GLNiUH6X6YrlSUQvAgmfQSt+pry89b0NGsfXGVm:RrlsNiU6X6YJSUQvAgmfQSC+lfL
MD5:27BB424056881AE77F3043D61DDAC3A9
SHA1:C399A0662BAD559D10B88BF4D1631312E70D9C4D
SHA-256:8FC8BA7D672F5EF302A32B5D0395E93B677276EA4AC038F82BE33934EB232763
SHA-512:A5CF468837F10590BDBA005869DB6625D80FFDD9D569069437C36278D521802955257580F8B8CF98AA8EEB31532F5CCC0E6770EF897ED944281F15C52FFC896E
Malicious:false
Reputation:low
Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.5.3.6.<./.P.i.d.>.......
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC9F.tmp.xml
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4555
Entropy (8bit):4.431340587639428
Encrypted:false
SSDEEP:48:cvIwSD8zs4JgtWI9sCWSC8BF/8fm8M4JOeFQi+q8I9KcQIcQwv+89d:uITf+7DSNcJ7zKkwv+Kd
MD5:13F8649D72259129C3418689D987E4C8
SHA1:8F302186E37E984319F40265692EDC4450D4F508
SHA-256:46E7230C3AA97024EBAA2C6B95235D86A0D7CC4A6AD523BA8C24EA4A5DBD47E2
SHA-512:7FFDDB9D2F57C03F1E04613477627CCF295E7806A598D9F953B098B419398F59494518785C3B3483B9D814C05565195A03FB1B4A61A44A3053C58379A807AC6A
Malicious:false
Reputation:low
Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="755672" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..

Static File Info

General

File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Entropy (8bit):7.133472914947941
TrID:
  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
  • Generic Win/DOS Executable (2004/3) 0.20%
  • DOS Executable Generic (2002/1) 0.20%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:6vywr0yn.dll
File size:167936
MD5:24af4121e268839125e7dc0a8cfe57bb
SHA1:68e59497ecca420d7ee86cc708a3046f8f8da300
SHA256:e101211fc11db8ac7365aea768c7a42fae6d6148d273923cc3271aceaf204365
SHA512:0ea5e36b5f65e6ea3797740da6b8997b2705d1740de3a322eb6ed3e30ce4630be3ea7e3d9750acf0b216c499c0a07162c15dd598cbe9e19b2c32f05414419640
SSDEEP:3072:nAkzrvTXX6m6acOf1QwRBsdeUb8Oy7YuLg0Gjj5D:nvvbLdRAesA7YU2
File Content Preview:MZ......................@.......................................!P..e1..e1..e1..~.l.>0...h...0....>.!0....:..1..B.:..1...o..-1..fI(..0...o...1..{ct..1..~.j..1....9..1...h...1..Riche1..............PE..L...$.._...........!.....P...........C.......`....@....

File Icon

Icon Hash:74f0e4ecccdce0e4

Static PE Info

General

Entrypoint:0x4043b3
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x5FC8AC24 [Thu Dec 3 09:13:08 2020 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:8c139089d78137abf164f71dfb6637c7

Authenticode Signature

Signature Valid:
Signature Issuer:
Signature Validation Error:
Error Number:
Not Before, Not After
    Subject Chain
      Version:
      Thumbprint MD5:
      Thumbprint SHA-1:
      Thumbprint SHA-256:
      Serial:

      Entrypoint Preview

      Instruction
      mov eax, dword ptr [00426A88h]
      jmp eax
      ret
      mov dword ptr [ebp-04h], eax
      push ebp
      mov ebp, esp
      push edi
      push ebx
      push esi
      and esp, FFFFFFF8h
      sub esp, 000000C0h
      lea eax, dword ptr [esp+3Eh]
      lea ecx, dword ptr [esp+1Eh]
      mov byte ptr [esp+000000B9h], FFFFFFFDh
      mov dword ptr [esp+000000ACh], 00000000h
      mov dword ptr [esp+000000A8h], 004508F2h
      mov dword ptr [esp+000000A4h], 00423F7Fh
      mov edx, dword ptr [esp+000000B4h]
      add edx, 1CB7DFC5h
      mov dword ptr [esp+000000B4h], edx
      mov bl, byte ptr [esp+000000B9h]
      mov bh, bl
      xor bh, FFFFFFBBh
      mov byte ptr [esp+7Fh], bh
      mov edx, dword ptr [esp+000000ACh]
      mov esi, dword ptr [esp+000000A8h]
      xor esi, 22125EFDh
      mov dword ptr [esp+00000094h], edx
      mov dword ptr [esp+00000090h], esi
      mov di, word ptr [esp+000000BAh]
      mov dword ptr [esp+000000A0h], 00000000h
      mov byte ptr [esp+1Dh], bl
      mov dword ptr [esp+18h], ecx
      mov dword ptr [esp+14h], eax
      mov word ptr [esp+12h], di
      mov eax, dword ptr [esp+000000A0h]
      mov dword ptr [esp+0000008Ch], eax
      mov eax, dword ptr [esp+00000090h]

      Data Directories

      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x683c0x50.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x290000x3a0.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x8000x1
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x2a0000x8c8.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x50300x38.text
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x60000x2c.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

      Sections

      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x4f850x5000False0.25498046875data3.0618180329IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      .rdata0x60000x9760x1000False0.3779296875data3.35788598783IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x70000x21a5c0x20000False0.80460357666data7.8015542446IMAGE_SCN_TYPE_NOLOAD, IMAGE_SCN_TYPE_DSECT, IMAGE_SCN_TYPE_NO_PAD, IMAGE_SCN_TYPE_GROUP, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_TYPE_COPY, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      .rsrc0x290000x3a00x1000False0.110595703125data0.978897296822IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x2a0000x8c80x1000False0.393310546875data4.18296780206IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

      Resources

      NameRVASizeTypeLanguageCountry
      RT_VERSION0x290600x340dataEnglishUnited States

      Imports

      DLLImport
      KERNEL32.dllGetModuleHandleW, LoadLibraryW, GetModuleHandleA, GetFileAttributesA, CreateMailslotA
      USER32.dllGetFocus
      ADVAPI32.dllInitiateSystemShutdownW, RegSaveKeyExA

      Version Infos

      DescriptionData
      LegalCopyrightCopyright 2018
      InternalNameoe2hrfl
      FileVersion40.488.0.00
      Full Version40.488.0.00
      CompanyNameOracle Corporation
      ProductNameOeoh(FL) Hnrtunon ID 8 O172
      ProductVersion4.0.0000.00
      FileDescriptionJava(TM) Platform SE binary
      OriginalFilenameoe2hrfl.dll
      Translation0x0409 0x04b0

      Possible Origin

      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States

      Network Behavior

      Network Port Distribution

      UDP Packets

      TimestampSource PortDest PortSource IPDest IP
      Dec 3, 2020 10:21:22.361409903 CET4991053192.168.2.48.8.8.8
      Dec 3, 2020 10:21:22.397263050 CET53499108.8.8.8192.168.2.4
      Dec 3, 2020 10:21:23.193042040 CET5585453192.168.2.48.8.8.8
      Dec 3, 2020 10:21:23.220293999 CET53558548.8.8.8192.168.2.4
      Dec 3, 2020 10:21:23.966839075 CET6454953192.168.2.48.8.8.8
      Dec 3, 2020 10:21:23.994029999 CET53645498.8.8.8192.168.2.4
      Dec 3, 2020 10:21:25.384800911 CET6315353192.168.2.48.8.8.8
      Dec 3, 2020 10:21:25.420495033 CET53631538.8.8.8192.168.2.4
      Dec 3, 2020 10:21:26.221030951 CET5299153192.168.2.48.8.8.8
      Dec 3, 2020 10:21:26.256730080 CET53529918.8.8.8192.168.2.4
      Dec 3, 2020 10:21:29.410990953 CET5370053192.168.2.48.8.8.8
      Dec 3, 2020 10:21:29.438195944 CET53537008.8.8.8192.168.2.4
      Dec 3, 2020 10:21:31.884780884 CET5172653192.168.2.48.8.8.8
      Dec 3, 2020 10:21:31.911600113 CET53517268.8.8.8192.168.2.4
      Dec 3, 2020 10:21:38.581378937 CET5679453192.168.2.48.8.8.8
      Dec 3, 2020 10:21:38.608447075 CET53567948.8.8.8192.168.2.4
      Dec 3, 2020 10:21:46.783822060 CET5653453192.168.2.48.8.8.8
      Dec 3, 2020 10:21:46.810828924 CET53565348.8.8.8192.168.2.4
      Dec 3, 2020 10:21:51.873414040 CET5662753192.168.2.48.8.8.8
      Dec 3, 2020 10:21:51.900713921 CET53566278.8.8.8192.168.2.4
      Dec 3, 2020 10:21:52.884320974 CET5662153192.168.2.48.8.8.8
      Dec 3, 2020 10:21:52.911521912 CET53566218.8.8.8192.168.2.4
      Dec 3, 2020 10:21:59.895473957 CET6311653192.168.2.48.8.8.8
      Dec 3, 2020 10:21:59.935596943 CET53631168.8.8.8192.168.2.4
      Dec 3, 2020 10:22:00.653469086 CET6407853192.168.2.48.8.8.8
      Dec 3, 2020 10:22:00.689213991 CET53640788.8.8.8192.168.2.4
      Dec 3, 2020 10:22:01.129616976 CET6480153192.168.2.48.8.8.8
      Dec 3, 2020 10:22:01.170221090 CET53648018.8.8.8192.168.2.4
      Dec 3, 2020 10:22:01.938041925 CET6172153192.168.2.48.8.8.8
      Dec 3, 2020 10:22:01.973737001 CET53617218.8.8.8192.168.2.4
      Dec 3, 2020 10:22:02.911971092 CET5125553192.168.2.48.8.8.8
      Dec 3, 2020 10:22:02.939086914 CET53512558.8.8.8192.168.2.4
      Dec 3, 2020 10:22:03.479636908 CET6152253192.168.2.48.8.8.8
      Dec 3, 2020 10:22:03.506762981 CET53615228.8.8.8192.168.2.4
      Dec 3, 2020 10:22:03.542603016 CET5233753192.168.2.48.8.8.8
      Dec 3, 2020 10:22:03.605911016 CET53523378.8.8.8192.168.2.4
      Dec 3, 2020 10:22:04.046260118 CET5504653192.168.2.48.8.8.8
      Dec 3, 2020 10:22:04.086601019 CET53550468.8.8.8192.168.2.4
      Dec 3, 2020 10:22:04.608453989 CET4961253192.168.2.48.8.8.8
      Dec 3, 2020 10:22:04.643954039 CET53496128.8.8.8192.168.2.4
      Dec 3, 2020 10:22:05.935096979 CET4928553192.168.2.48.8.8.8
      Dec 3, 2020 10:22:05.975624084 CET53492858.8.8.8192.168.2.4
      Dec 3, 2020 10:22:06.052959919 CET5060153192.168.2.48.8.8.8
      Dec 3, 2020 10:22:06.080168009 CET53506018.8.8.8192.168.2.4
      Dec 3, 2020 10:22:06.309854984 CET6087553192.168.2.48.8.8.8
      Dec 3, 2020 10:22:06.345160961 CET53608758.8.8.8192.168.2.4
      Dec 3, 2020 10:22:07.377340078 CET5644853192.168.2.48.8.8.8
      Dec 3, 2020 10:22:07.404370070 CET53564488.8.8.8192.168.2.4
      Dec 3, 2020 10:22:12.311639071 CET5917253192.168.2.48.8.8.8
      Dec 3, 2020 10:22:12.338881969 CET53591728.8.8.8192.168.2.4
      Dec 3, 2020 10:22:22.862554073 CET6242053192.168.2.48.8.8.8
      Dec 3, 2020 10:22:22.865567923 CET6057953192.168.2.48.8.8.8
      Dec 3, 2020 10:22:22.889806986 CET53624208.8.8.8192.168.2.4
      Dec 3, 2020 10:22:22.892560959 CET53605798.8.8.8192.168.2.4
      Dec 3, 2020 10:22:25.968281031 CET5018353192.168.2.48.8.8.8
      Dec 3, 2020 10:22:26.005064011 CET53501838.8.8.8192.168.2.4
      Dec 3, 2020 10:22:39.716787100 CET6153153192.168.2.48.8.8.8
      Dec 3, 2020 10:22:39.744007111 CET53615318.8.8.8192.168.2.4
      Dec 3, 2020 10:22:40.634527922 CET4922853192.168.2.48.8.8.8
      Dec 3, 2020 10:22:40.661731005 CET53492288.8.8.8192.168.2.4
      Dec 3, 2020 10:22:42.311525106 CET5979453192.168.2.48.8.8.8
      Dec 3, 2020 10:22:42.338712931 CET53597948.8.8.8192.168.2.4
      Dec 3, 2020 10:22:46.350871086 CET5591653192.168.2.48.8.8.8
      Dec 3, 2020 10:22:46.377978086 CET53559168.8.8.8192.168.2.4
      Dec 3, 2020 10:22:47.377825022 CET5275253192.168.2.48.8.8.8
      Dec 3, 2020 10:22:47.404897928 CET53527528.8.8.8192.168.2.4
      Dec 3, 2020 10:22:48.021472931 CET6054253192.168.2.48.8.8.8
      Dec 3, 2020 10:22:48.048834085 CET53605428.8.8.8192.168.2.4
      Dec 3, 2020 10:22:49.161107063 CET6068953192.168.2.48.8.8.8
      Dec 3, 2020 10:22:49.188321114 CET53606898.8.8.8192.168.2.4
      Dec 3, 2020 10:22:50.246961117 CET6420653192.168.2.48.8.8.8
      Dec 3, 2020 10:22:50.274126053 CET53642068.8.8.8192.168.2.4
      Dec 3, 2020 10:22:51.394881010 CET5090453192.168.2.48.8.8.8
      Dec 3, 2020 10:22:51.422116995 CET53509048.8.8.8192.168.2.4
      Dec 3, 2020 10:22:58.634583950 CET5752553192.168.2.48.8.8.8
      Dec 3, 2020 10:22:58.661519051 CET53575258.8.8.8192.168.2.4
      Dec 3, 2020 10:23:02.312319040 CET5381453192.168.2.48.8.8.8
      Dec 3, 2020 10:23:02.355468988 CET53538148.8.8.8192.168.2.4

      Code Manipulations

      Statistics

      CPU Usage

      Click to jump to process

      Memory Usage

      Click to jump to process

      High Level Behavior Distribution

      Click to dive into process behavior distribution

      Behavior

      Click to jump to process

      System Behavior

      General

      Start time:10:21:27
      Start date:03/12/2020
      Path:C:\Windows\System32\loaddll32.exe
      Wow64 process (32bit):true
      Commandline:loaddll32.exe 'C:\Users\user\Desktop\6vywr0yn.dll'
      Imagebase:0x2a0000
      File size:120832 bytes
      MD5 hash:2D39D4DFDE8F7151723794029AB8A034
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate

      General

      Start time:10:21:28
      Start date:03/12/2020
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6536 -s 284
      Imagebase:0x80000
      File size:434592 bytes
      MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:10:21:33
      Start date:03/12/2020
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6536 -s 240
      Imagebase:0x80000
      File size:434592 bytes
      MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Disassembly

      Code Analysis

      Reset < >