Loading ...

Play interactive tourEdit tour

Analysis Report fc0bc077_by_Libranalysis.dll

Overview

General Information

Sample Name:fc0bc077_by_Libranalysis.dll
Analysis ID:404283
MD5:fc0bc07721ce94bc9b100e7c846a1210
SHA1:2d98f05fb78cd75bb44a0087bead8c1604545d07
SHA256:e707edac036a1a2d08b746c6a50ac0f0e2b1ba1c2668aadf87ea11b666b0eb28
Tags:Dridex
Infos:

Most interesting Screenshot:

Detection

Dridex
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Dridex unpacked file
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Tries to detect sandboxes / dynamic malware analysis system (file name check)
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to query locales information (e.g. system language)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
One or more processes crash
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • loaddll32.exe (PID: 5980 cmdline: loaddll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll' MD5: 542795ADF7CC08EFCF675D65310596E8)
    • cmd.exe (PID: 5984 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 4088 cmdline: rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • WerFault.exe (PID: 1848 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 760 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 4860 cmdline: rundll32.exe C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll,LoxmtYt MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 5852 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4860 -s 788 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 5168 cmdline: rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',DllCanUnloadNow MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 4240 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 752 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 4788 cmdline: rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',DllGetClassObject MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 3492 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 760 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 5188 cmdline: rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',WdiAddFileToInstance MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 1760 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5188 -s 756 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 5204 cmdline: rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',WdiAddParameter MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 5172 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5204 -s 756 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 5220 cmdline: rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',WdiCancel MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup

Malware Configuration

Threatname: Dridex

{"Version": 40112, "C2 list": ["193.200.130.181:443", "95.138.161.226:2303", "167.114.113.13:4125"], "RC4 keys": ["MqW38NQIO70GhjGOOvjtl5AwyenW6A8fcZ", "xeMr6QHn7uRk1D2ChU8OuyaRFUZJZZHUIgxCzaPXtOkjmhTMtNxfWU8nlnD7q009ahEI51R1"]}

Yara Overview

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_1d91dafffd792f9b512ff42d10d3dd5f24a3f5de_82810a17_10f0240f\Report.werSUSP_WER_Critical_HeapCorruptionDetects a crashed application that crashed due to a heap corruption error (could be a sign of exploitation)Florian Roth
  • 0x11c:$a1: ReportIdentifier=
  • 0x19e:$a1: ReportIdentifier=
  • 0x77c:$a2: .Name=Fault Module Name
  • 0x92a:$s1: c0000374
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_1d91dafffd792f9b512ff42d10d3dd5f24a3f5de_82810a17_0766ec0c\Report.werSUSP_WER_Critical_HeapCorruptionDetects a crashed application that crashed due to a heap corruption error (could be a sign of exploitation)Florian Roth
  • 0x11c:$a1: ReportIdentifier=
  • 0x19e:$a1: ReportIdentifier=
  • 0x77c:$a2: .Name=Fault Module Name
  • 0x92a:$s1: c0000374

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.326004095.0000000010001000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
    00000014.00000002.480983725.0000000010001000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
      00000010.00000002.489951685.0000000010001000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
        00000011.00000002.489294314.0000000010001000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
          00000013.00000002.488379155.0000000010001000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
            Click to see the 1 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            19.2.rundll32.exe.10000000.3.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
              4.2.rundll32.exe.10000000.3.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
                20.2.rundll32.exe.10000000.3.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
                  16.2.rundll32.exe.10000000.3.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
                    18.2.rundll32.exe.10000000.3.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
                      Click to see the 1 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 19.2.rundll32.exe.10000000.3.unpackMalware Configuration Extractor: Dridex {"Version": 40112, "C2 list": ["193.200.130.181:443", "95.138.161.226:2303", "167.114.113.13:4125"], "RC4 keys": ["MqW38NQIO70GhjGOOvjtl5AwyenW6A8fcZ", "xeMr6QHn7uRk1D2ChU8OuyaRFUZJZZHUIgxCzaPXtOkjmhTMtNxfWU8nlnD7q009ahEI51R1"]}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: fc0bc077_by_Libranalysis.dllMetadefender: Detection: 21%Perma Link
                      Source: fc0bc077_by_Libranalysis.dllReversingLabs: Detection: 29%
                      Machine Learning detection for sampleShow sources
                      Source: fc0bc077_by_Libranalysis.dllJoe Sandbox ML: detected
                      Source: 0.2.loaddll32.exe.1370000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 19.2.rundll32.exe.2cd0000.2.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 18.2.rundll32.exe.2830000.2.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 16.2.rundll32.exe.2940000.2.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 17.2.rundll32.exe.3220000.2.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 4.2.rundll32.exe.26e0000.2.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 20.2.rundll32.exe.2be0000.2.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 3.2.rundll32.exe.2d50000.2.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: fc0bc077_by_Libranalysis.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: fc0bc077_by_Libranalysis.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: FGERN.pdb source: fc0bc077_by_Libranalysis.dll

                      Networking:

                      barindex
                      C2 URLs / IPs found in malware configurationShow sources
                      Source: Malware configuration extractorIPs: 193.200.130.181:443
                      Source: Malware configuration extractorIPs: 95.138.161.226:2303
                      Source: Malware configuration extractorIPs: 167.114.113.13:4125
                      Source: Joe Sandbox ViewIP Address: 167.114.113.13 167.114.113.13
                      Source: Joe Sandbox ViewIP Address: 95.138.161.226 95.138.161.226
                      Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                      Source: Joe Sandbox ViewASN Name: RACKSPACE-LONGB RACKSPACE-LONGB
                      Source: loaddll32.exe, 00000000.00000002.583611502.000000000157B000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                      E-Banking Fraud:

                      barindex
                      Yara detected Dridex unpacked fileShow sources
                      Source: Yara matchFile source: 00000004.00000002.326004095.0000000010001000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.480983725.0000000010001000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.489951685.0000000010001000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.489294314.0000000010001000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000002.488379155.0000000010001000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.486848351.0000000010001000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 19.2.rundll32.exe.10000000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.10000000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.rundll32.exe.10000000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.rundll32.exe.10000000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.10000000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.rundll32.exe.10000000.3.unpack, type: UNPACKEDPE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10001494
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1000846C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1000A52C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10011D58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10019348
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10010754
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100090CC
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 760
                      Source: fc0bc077_by_Libranalysis.dllBinary or memory string: OriginalFilenamej2pcsc.dllN vs fc0bc077_by_Libranalysis.dll
                      Source: fc0bc077_by_Libranalysis.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_1d91dafffd792f9b512ff42d10d3dd5f24a3f5de_82810a17_10f0240f\Report.wer, type: DROPPEDMatched rule: SUSP_WER_Critical_HeapCorruption date = 2019-10-18, author = Florian Roth, description = Detects a crashed application that crashed due to a heap corruption error (could be a sign of exploitation), reference = https://twitter.com/cyb3rops/status/1185459425710092288, score =
                      Source: C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_1d91dafffd792f9b512ff42d10d3dd5f24a3f5de_82810a17_0766ec0c\Report.wer, type: DROPPEDMatched rule: SUSP_WER_Critical_HeapCorruption date = 2019-10-18, author = Florian Roth, description = Detects a crashed application that crashed due to a heap corruption error (could be a sign of exploitation), reference = https://twitter.com/cyb3rops/status/1185459425710092288, score =
                      Source: fc0bc077_by_Libranalysis.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: classification engineClassification label: mal76.troj.evad.winDLL@23/24@0/4
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4088
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5188
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4860
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5168
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5204
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4788
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERD97E.tmpJump to behavior
                      Source: fc0bc077_by_Libranalysis.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hosts
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hosts
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hosts
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hosts
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll,LoxmtYt
                      Source: fc0bc077_by_Libranalysis.dllMetadefender: Detection: 21%
                      Source: fc0bc077_by_Libranalysis.dllReversingLabs: Detection: 29%
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll'
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll,LoxmtYt
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',#1
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 760
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4860 -s 788
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',DllCanUnloadNow
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',DllGetClassObject
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',WdiAddFileToInstance
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',WdiAddParameter
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',WdiCancel
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 752
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5188 -s 756
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 760
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5204 -s 756
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll,LoxmtYt
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',DllCanUnloadNow
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',DllGetClassObject
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',WdiAddFileToInstance
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',WdiAddParameter
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',WdiCancel
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',#1
                      Source: fc0bc077_by_Libranalysis.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: fc0bc077_by_Libranalysis.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: FGERN.pdb source: fc0bc077_by_Libranalysis.dll
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1000F6CC push esi; mov dword ptr [esp], 00000000h
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.5511794748
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Tries to detect sandboxes / dynamic malware analysis system (file name check)Show sources
                      Source: C:\Windows\System32\loaddll32.exeSection loaded: \KnownDlls32\Testapp.EXE
                      Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: \KnownDlls32\Testapp.EXE
                      Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: \KnownDlls32\Testapp.EXE
                      Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: \KnownDlls32\Testapp.EXE
                      Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: \KnownDlls32\Testapp.EXE
                      Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: \KnownDlls32\Testapp.EXE
                      Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: \KnownDlls32\Testapp.EXE
                      Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: \KnownDlls32\Testapp.EXE
                      Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10006D50 GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',#1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10006D50 GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection11Virtualization/Sandbox Evasion11Input Capture1Security Software Discovery11Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection11LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerAccount Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Rundll321NTDSSystem Owner/User Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing3LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery11VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 404283 Sample: fc0bc077_by_Libranalysis.dll Startdate: 04/05/2021 Architecture: WINDOWS Score: 76 37 95.138.161.226 RACKSPACE-LONGB United Kingdom 2->37 39 167.114.113.13 OVHFR Canada 2->39 41 193.200.130.181 CLOUD-MANAGEMENT-LLCUS unknown 2->41 45 Found malware configuration 2->45 47 Multi AV Scanner detection for submitted file 2->47 49 Yara detected Dridex unpacked file 2->49 51 2 other signatures 2->51 9 loaddll32.exe 1 2->9         started        signatures3 process4 signatures5 55 Tries to detect sandboxes / dynamic malware analysis system (file name check) 9->55 12 cmd.exe 1 9->12         started        14 rundll32.exe 9->14         started        17 rundll32.exe 9->17         started        19 4 other processes 9->19 process6 signatures7 21 rundll32.exe 12->21         started        57 Tries to detect sandboxes / dynamic malware analysis system (file name check) 14->57 24 WerFault.exe 14->24         started        26 WerFault.exe 17->26         started        28 WerFault.exe 2 9 19->28         started        30 WerFault.exe 9 19->30         started        32 WerFault.exe 9 19->32         started        process8 signatures9 53 Tries to detect sandboxes / dynamic malware analysis system (file name check) 21->53 34 WerFault.exe 23 9 21->34         started        process10 dnsIp11 43 192.168.2.1 unknown unknown 34->43

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      fc0bc077_by_Libranalysis.dll21%MetadefenderBrowse
                      fc0bc077_by_Libranalysis.dll30%ReversingLabsWin32.Trojan.Wacatac
                      fc0bc077_by_Libranalysis.dll100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      4.2.rundll32.exe.26c0607.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      0.2.loaddll32.exe.1370000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      16.2.rundll32.exe.2920607.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      19.2.rundll32.exe.2cd0000.2.unpack100%AviraTR/ATRAPS.Gen2Download File
                      18.2.rundll32.exe.2830000.2.unpack100%AviraTR/ATRAPS.Gen2Download File
                      17.2.rundll32.exe.3200607.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      3.2.rundll32.exe.2d30607.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      16.2.rundll32.exe.2940000.2.unpack100%AviraTR/ATRAPS.Gen2Download File
                      17.2.rundll32.exe.3220000.2.unpack100%AviraTR/ATRAPS.Gen2Download File
                      4.2.rundll32.exe.26e0000.2.unpack100%AviraTR/ATRAPS.Gen2Download File
                      0.2.loaddll32.exe.16b0607.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      20.2.rundll32.exe.2bc0607.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      18.2.rundll32.exe.2810607.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      20.2.rundll32.exe.2be0000.2.unpack100%AviraTR/ATRAPS.Gen2Download File
                      3.2.rundll32.exe.2d50000.2.unpack100%AviraTR/ATRAPS.Gen2Download File
                      19.2.rundll32.exe.29e0607.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File

                      Domains

                      No Antivirus matches

                      URLs

                      No Antivirus matches

                      Domains and IPs

                      Contacted Domains

                      No contacted domains info

                      Contacted IPs

                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs

                      Public

                      IPDomainCountryFlagASNASN NameMalicious
                      167.114.113.13
                      unknownCanada
                      16276OVHFRtrue
                      95.138.161.226
                      unknownUnited Kingdom
                      15395RACKSPACE-LONGBtrue
                      193.200.130.181
                      unknownunknown
                      42960CLOUD-MANAGEMENT-LLCUStrue

                      Private

                      IP
                      192.168.2.1

                      General Information

                      Joe Sandbox Version:32.0.0 Black Diamond
                      Analysis ID:404283
                      Start date:04.05.2021
                      Start time:21:42:23
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 8m 37s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:fc0bc077_by_Libranalysis.dll
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Run name:Run with higher sleep bypass
                      Number of analysed new started processes analysed:40
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal76.troj.evad.winDLL@23/24@0/4
                      EGA Information:Failed
                      HDC Information:
                      • Successful, ratio: 99.2% (good quality ratio 92.6%)
                      • Quality average: 75.3%
                      • Quality standard deviation: 30.5%
                      HCA Information:
                      • Successful, ratio: 65%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      • Sleeps bigger than 120000ms are automatically reduced to 1000ms
                      • Found application associated with file extension: .dll
                      Warnings:
                      Show All
                      • Excluded IPs from analysis (whitelisted): 13.64.90.137, 184.87.213.153, 104.43.193.48, 23.57.80.111, 2.20.142.209, 2.20.142.210, 40.126.31.4, 40.126.31.1, 20.190.159.136, 20.190.159.134, 40.126.31.8, 40.126.31.143, 40.126.31.135, 40.126.31.6, 40.88.32.150, 52.255.188.83, 20.82.209.104, 92.122.213.247, 92.122.213.194, 20.82.210.154
                      • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, www.tm.lg.prod.aadmsa.akadns.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, login.live.com, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, www.tm.a.prd.aadg.akadns.net, login.msa.msidentity.com, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus17.cloudapp.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net
                      • Report size exceeded maximum capacity and may have missing behavior information.

                      Simulations

                      Behavior and APIs

                      No simulations

                      Joe Sandbox View / Context

                      IPs

                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      167.114.113.13577e66d4_by_Libranalysis.dllGet hashmaliciousBrowse
                        b8fe43e6_by_Libranalysis.dllGet hashmaliciousBrowse
                          f845ef61_by_Libranalysis.dllGet hashmaliciousBrowse
                            3c271eae_by_Libranalysis.dllGet hashmaliciousBrowse
                              fc0bc077_by_Libranalysis.dllGet hashmaliciousBrowse
                                e1c88b94_by_Libranalysis.dllGet hashmaliciousBrowse
                                  8743016c_by_Libranalysis.dllGet hashmaliciousBrowse
                                    d8417415_by_Libranalysis.dllGet hashmaliciousBrowse
                                      9a46403f_by_Libranalysis.dllGet hashmaliciousBrowse
                                        edae86a8_by_Libranalysis.dllGet hashmaliciousBrowse
                                          457aedfd_by_Libranalysis.dllGet hashmaliciousBrowse
                                            64b8ed95_by_Libranalysis.dllGet hashmaliciousBrowse
                                              8743016c_by_Libranalysis.dllGet hashmaliciousBrowse
                                                d8417415_by_Libranalysis.dllGet hashmaliciousBrowse
                                                  c977c96e_by_Libranalysis.dllGet hashmaliciousBrowse
                                                    9a46403f_by_Libranalysis.dllGet hashmaliciousBrowse
                                                      457aedfd_by_Libranalysis.dllGet hashmaliciousBrowse
                                                        edae86a8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                          b8dd7ed8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                            af1e75cf_by_Libranalysis.dllGet hashmaliciousBrowse
                                                              95.138.161.226577e66d4_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                b8fe43e6_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                  f845ef61_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                    3c271eae_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                      fc0bc077_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                        e1c88b94_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                          8743016c_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                            d8417415_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                              9a46403f_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                edae86a8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                  457aedfd_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                    64b8ed95_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      8743016c_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                        d8417415_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                          c977c96e_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                            9a46403f_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                              457aedfd_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                edae86a8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  b8dd7ed8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                    af1e75cf_by_Libranalysis.dllGet hashmaliciousBrowse

                                                                                                      Domains

                                                                                                      No context

                                                                                                      ASN

                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                      RACKSPACE-LONGB577e66d4_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 95.138.161.226
                                                                                                      b8fe43e6_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 95.138.161.226
                                                                                                      f845ef61_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 95.138.161.226
                                                                                                      3c271eae_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 95.138.161.226
                                                                                                      fc0bc077_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 95.138.161.226
                                                                                                      e1c88b94_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 95.138.161.226
                                                                                                      8743016c_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 95.138.161.226
                                                                                                      d8417415_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 95.138.161.226
                                                                                                      9a46403f_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 95.138.161.226
                                                                                                      edae86a8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 95.138.161.226
                                                                                                      457aedfd_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 95.138.161.226
                                                                                                      64b8ed95_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 95.138.161.226
                                                                                                      8743016c_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 95.138.161.226
                                                                                                      d8417415_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 95.138.161.226
                                                                                                      c977c96e_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 95.138.161.226
                                                                                                      9a46403f_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 95.138.161.226
                                                                                                      457aedfd_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 95.138.161.226
                                                                                                      edae86a8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 95.138.161.226
                                                                                                      b8dd7ed8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 95.138.161.226
                                                                                                      af1e75cf_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 95.138.161.226
                                                                                                      OVHFR577e66d4_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 167.114.113.13
                                                                                                      b8fe43e6_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 167.114.113.13
                                                                                                      f845ef61_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 167.114.113.13
                                                                                                      3c271eae_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 167.114.113.13
                                                                                                      fc0bc077_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 167.114.113.13
                                                                                                      e1c88b94_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 167.114.113.13
                                                                                                      8743016c_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 167.114.113.13
                                                                                                      d8417415_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 167.114.113.13
                                                                                                      9a46403f_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 167.114.113.13
                                                                                                      edae86a8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 167.114.113.13
                                                                                                      457aedfd_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 167.114.113.13
                                                                                                      64b8ed95_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 167.114.113.13
                                                                                                      8743016c_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 167.114.113.13
                                                                                                      d8417415_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 167.114.113.13
                                                                                                      c977c96e_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 167.114.113.13
                                                                                                      9a46403f_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 167.114.113.13
                                                                                                      457aedfd_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 167.114.113.13
                                                                                                      edae86a8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 167.114.113.13
                                                                                                      b8dd7ed8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 167.114.113.13
                                                                                                      af1e75cf_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                      • 167.114.113.13

                                                                                                      JA3 Fingerprints

                                                                                                      No context

                                                                                                      Dropped Files

                                                                                                      No context

                                                                                                      Created / dropped Files

                                                                                                      C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_1d91dafffd792f9b512ff42d10d3dd5f24a3f5de_82810a17_0766ec0c\Report.wer
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):12698
                                                                                                      Entropy (8bit):3.7729930672976533
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:ieiM0oXORH4+V/Ojed+DgR/u7sBS274ItWcq:7iKXOh4+VGjed/u7sBX4ItWcq
                                                                                                      MD5:26D2C96778ACD61D9780C4EBC68E166F
                                                                                                      SHA1:26B7461B9FB449D28ECD6DDE7E99DE8AE63C5BBE
                                                                                                      SHA-256:C4CFF568547C8FEA55F6542B714C6FDBC188903C03D8EAB5B2A35C3103BD095A
                                                                                                      SHA-512:FA9C76A6E32A929A88F3B4DE1055A028A91617829A2F6F72E612A9BA8F857E8DE210406A9A6CB94A5AC04A20DB23BF7F7C257DDA1B5999489954E706A9963101
                                                                                                      Malicious:false
                                                                                                      Yara Hits:
                                                                                                      • Rule: SUSP_WER_Critical_HeapCorruption, Description: Detects a crashed application that crashed due to a heap corruption error (could be a sign of exploitation), Source: C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_1d91dafffd792f9b512ff42d10d3dd5f24a3f5de_82810a17_0766ec0c\Report.wer, Author: Florian Roth
                                                                                                      Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.6.4.6.6.3.4.9.2.1.6.6.2.5.7.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.6.4.6.6.3.4.9.4.5.4.8.1.2.5.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.6.6.b.e.5.a.1.-.0.1.2.8.-.4.3.3.1.-.b.9.2.b.-.d.e.7.2.b.4.8.0.b.0.3.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.5.d.0.1.1.f.a.-.2.1.a.0.-.4.6.3.c.-.9.6.4.4.-.f.6.7.b.e.7.0.8.f.c.d.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.f.f.8.-.0.0.0.1.-.0.0.1.7.-.d.f.9.9.-.0.2.4.8.6.9.4.1.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_1d91dafffd792f9b512ff42d10d3dd5f24a3f5de_82810a17_10f0240f\Report.wer
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):12696
                                                                                                      Entropy (8bit):3.774323540979425
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:3FiB0oXmRH4+V/Ojed+DgR/u7sQS274ItWc8:VivXmh4+VGjed/u7sQX4ItWc8
                                                                                                      MD5:0C20D6700D4FDF6471A54E7946F4CA18
                                                                                                      SHA1:D963D50A85003F2E41F000D70C816ADDEA69868A
                                                                                                      SHA-256:BD244616AF0012F8328FADB035BEDD3A0514480F6B8B391B3FA59F143DF325E0
                                                                                                      SHA-512:713D98A0AFD2F9DCF28BD48D1328D7477233CE305388615DF42AA8491DE750CE13AF5F8705941975A2CBE40D6D3D092571C45A03A71B2B4A31D6AEEB1262763E
                                                                                                      Malicious:false
                                                                                                      Yara Hits:
                                                                                                      • Rule: SUSP_WER_Critical_HeapCorruption, Description: Detects a crashed application that crashed due to a heap corruption error (could be a sign of exploitation), Source: C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_1d91dafffd792f9b512ff42d10d3dd5f24a3f5de_82810a17_10f0240f\Report.wer, Author: Florian Roth
                                                                                                      Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.6.4.6.6.3.5.7.1.8.2.9.1.9.0.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.6.4.6.6.3.5.7.4.3.7.6.0.5.6.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.b.6.0.5.c.1.b.-.3.9.a.7.-.4.7.d.8.-.a.0.9.9.-.f.b.1.d.9.2.4.5.6.a.8.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.c.0.1.c.5.a.4.-.8.2.6.5.-.4.e.3.9.-.b.5.1.2.-.2.5.0.5.2.9.a.6.5.8.e.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.3.0.-.0.0.0.1.-.0.0.1.7.-.f.f.b.8.-.1.7.6.5.6.9.4.1.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_70ca6d92bb7cd6d05a398077544511f8e964d76_82810a17_0dc42354\Report.wer
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):12770
                                                                                                      Entropy (8bit):3.7728479326199715
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:83Prim0oXTHBUZMX4jed+DgR/u7sQS274It7ch:OriAXTBUZMX4jed/u7sQX4It7ch
                                                                                                      MD5:AFC7551E811E97D4890917F0725F1135
                                                                                                      SHA1:ED63C72EE8C1309A591CCF3CDC5A5332F85E6611
                                                                                                      SHA-256:55ACE0B113C0EABD560D6E4668688CD71A30B75590AB9DBAD10CA315AC77A76C
                                                                                                      SHA-512:5392B7C52AF1C27897AA46975DFD75719BD67FDAFA1F38887C623F82E16ADF9D6521493C5A97F1C7FF55A2767F157B3C345DAD95844E42D89AEFDF1B7A5C5B1B
                                                                                                      Malicious:false
                                                                                                      Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.2.6.4.6.6.3.5.7.2.5.9.4.8.1.1.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.6.4.6.6.3.5.7.5.0.0.1.0.5.8.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.a.d.6.9.b.9.f.-.0.8.1.4.-.4.5.9.c.-.a.b.2.3.-.7.1.9.0.c.0.d.1.f.7.7.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.1.d.d.a.9.6.5.-.0.9.6.e.-.4.3.e.e.-.a.0.7.a.-.5.3.c.e.f.3.4.6.f.2.a.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.2.b.4.-.0.0.0.1.-.0.0.1.7.-.c.5.6.8.-.5.5.6.5.6.9.4.1.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.b.5.
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_7dd67966396113c995f4a9c30eeff967a1ce3cd_82810a17_06802046\Report.wer
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):12682
                                                                                                      Entropy (8bit):3.769413043333247
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:9SVi7K0oXN3xHBUZMX4jed+DoR/u7sQS274ItWcX:QViAXLBUZMX4jeF/u7sQX4ItWcX
                                                                                                      MD5:9440EA7972766E07CD1327E19C1C247B
                                                                                                      SHA1:088A04CA3B6C73A3D7650AB92F6597FFEE89EAF1
                                                                                                      SHA-256:6DEBE33DDFC65B62A5BD2DA29535905133645514D1E48AFC89ECF593E9604E10
                                                                                                      SHA-512:40EEF3E0A6B4115B94C490CA3F0A145F78DC65805BBADAF48B9DC31712F0682E1E8D116EE0908BEEBC3821917C74B67AECA3267F894AF96EA8AD4746380D91B6
                                                                                                      Malicious:false
                                                                                                      Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.6.4.6.6.3.5.7.2.0.6.3.5.6.5.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.6.4.6.6.3.5.7.4.5.6.3.5.5.7.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.5.3.0.9.6.9.0.-.8.d.a.1.-.4.5.0.4.-.b.f.3.9.-.e.4.c.a.c.5.7.f.a.d.0.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.9.3.f.0.6.6.7.-.9.f.8.b.-.4.b.a.2.-.a.e.0.a.-.1.0.f.7.5.9.c.e.3.e.9.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.4.4.-.0.0.0.1.-.0.0.1.7.-.7.3.b.8.-.a.7.6.5.6.9.4.1.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_85bcb2185548acc57fb6c6745d2f8bb6b2be49b1_82810a17_1454221b\Report.wer
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):12680
                                                                                                      Entropy (8bit):3.768900346517595
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:IUmix0oX9k3HBUZMX4jed+DgR/u7sQS274ItWcl:jmi/XOBUZMX4jed/u7sQX4ItWcl
                                                                                                      MD5:A12EAA04D0506870309C2F7138A98AA0
                                                                                                      SHA1:9114AE848AE88603BEDDF06398424E3C67DC29D1
                                                                                                      SHA-256:9333B076D9AF6EEBF65B397A53CB3F4BA49336735C8F231FD57A39D8A02369AA
                                                                                                      SHA-512:F18D88FEC310B7F7401FCF5A32931B5D64CBCCEA3200D082774B33EE49C7EB6D3CC38EF3F2C94D292DB2C4B705799A6A03C8E6918CC70C13BD2DFDC8E3C8B5AB
                                                                                                      Malicious:false
                                                                                                      Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.6.4.6.6.3.5.7.2.7.3.5.4.3.7.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.6.4.6.6.3.5.7.5.0.3.2.3.0.7.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.0.4.4.b.8.b.2.-.d.d.b.2.-.4.f.0.a.-.b.7.3.a.-.a.0.4.3.a.3.1.8.4.f.6.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.3.7.8.d.a.7.4.-.3.e.6.c.-.4.4.0.6.-.a.4.9.c.-.3.f.b.a.5.5.1.7.4.5.c.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.5.4.-.0.0.0.1.-.0.0.1.7.-.d.e.8.8.-.1.e.6.6.6.9.4.1.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_868973c6c77b45498eb43d99595a7fe2138962a_82810a17_1682f88f\Report.wer
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):12856
                                                                                                      Entropy (8bit):3.7590354861574173
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:dHip0oX0FHVzOMjed+Do8/u7sBS274It7cp:dHiHXOVzOMje4/u7sBX4It7cp
                                                                                                      MD5:AC6564A38DA01ECB0BE197ACA75CD794
                                                                                                      SHA1:4F9E50FE2F686FE00F5BC846E4ECBB0A54A25B56
                                                                                                      SHA-256:FEFC9EC2AFAB62C5624F71587E383BC844E40ECACD6DFEAEF114ADA2F90EB0D8
                                                                                                      SHA-512:EE4010567180A83E2EEFDCBEB12496BB177EFF8B923195D8B556D66D3ED4039353F07020D140717CB3938DB14BB50DBA109EF1E64A0797FFCB39ACB937232421
                                                                                                      Malicious:false
                                                                                                      Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.2.6.4.6.6.3.4.9.4.6.5.7.4.9.7.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.5.b.f.2.4.f.9.-.5.5.b.0.-.4.c.8.1.-.8.c.4.1.-.f.5.0.2.7.8.0.3.4.e.1.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.f.3.e.6.0.0.0.-.4.4.3.b.-.4.1.0.1.-.9.9.4.6.-.4.9.4.1.c.7.2.0.4.2.5.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.2.f.c.-.0.0.0.1.-.0.0.1.7.-.2.9.8.8.-.f.a.4.7.6.9.4.1.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.b.5.f.!.r.u.n.d.l.l.3.2...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.8.6././.0.1././.3.0.:.1.1.:.4.2.:.4.4.!.1.0.3.d.
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER10B6.tmp.dmp
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:Mini DuMP crash report, 14 streams, Wed May 5 04:46:13 2021, 0x1205a4 type
                                                                                                      Category:dropped
                                                                                                      Size (bytes):46968
                                                                                                      Entropy (8bit):2.3180308197716517
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:iLSUC4DSyUldBW8SqnEaBqAWVbvU2ZHutLribZE5nM7:Py+dI8iuqlbvPYrkUM7
                                                                                                      MD5:FD6A5D857A265F140C64A8EC4401E76E
                                                                                                      SHA1:5BA50E56C090A014951E2CCF09294481C9BBD72F
                                                                                                      SHA-256:35DE6FA92055213621668CADD243C03859D628519623732D27D023B32C2E0E9A
                                                                                                      SHA-512:408CD84742B203FD055FE55327CEC85B87E6AEA73768BFDB67CAD660F724D9CCFC44B802F0E934A05DD105979BD87563D1AD95D377BEA32103ED98EBD773BD8B
                                                                                                      Malicious:false
                                                                                                      Preview: MDMP....... ........#.`...................U...........B....... ......GenuineIntelW...........T.......0....".`.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER11CF.tmp.dmp
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:Mini DuMP crash report, 14 streams, Wed May 5 04:46:13 2021, 0x1205a4 type
                                                                                                      Category:dropped
                                                                                                      Size (bytes):46328
                                                                                                      Entropy (8bit):2.2818682712438516
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:5JTH8y+r0xjdDU6zgPCEaBqAWVbvSoDsuNRvt8rWnUa:wy+kd2nuqlbvFTRv6WB
                                                                                                      MD5:89E785F7C61BF264942ABCD23B3CDE58
                                                                                                      SHA1:950214BA1EBBA19EF1A91499F317E00FEAF1E351
                                                                                                      SHA-256:FDD192D0CF9CC7BFDB7F1B06256498FC87F02B6FDE3DCC8E114C6246852EF1B4
                                                                                                      SHA-512:6DFD762243E120D6AC71A5D0FD257AFAE44D74956F146E6443200ABA5B64C9C9341665B5BFD9C69B1E661644295498ED1A96610E09B52E58FC7A03957C9C25E0
                                                                                                      Malicious:false
                                                                                                      Preview: MDMP....... ........#.`...................U...........B....... ......GenuineIntelW...........T.......D....".`.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER13B4.tmp.dmp
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:Mini DuMP crash report, 14 streams, Wed May 5 04:46:14 2021, 0x1205a4 type
                                                                                                      Category:dropped
                                                                                                      Size (bytes):48188
                                                                                                      Entropy (8bit):2.1711333233485948
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:vYpWqB8r1dnKLnHH3AY/mGvIoEaBqAWVbvhi2QV9Jx6PnQSKcnv:pqWr7cn3AYOGQ5uqlbvhsJsQSrv
                                                                                                      MD5:128F18CD712C2AE70EBDC763040B46DB
                                                                                                      SHA1:3A74DA025DDE09F7299EF3FA65C0C1D890A0B1D4
                                                                                                      SHA-256:D5F9926551CEFB9ABE055F3C985AAE2666881D2FB177332BD9E452FAB62D5C30
                                                                                                      SHA-512:5D17EA7BDEF9F36FD447DBBD49E8C0021C950E02CA5133893A1352A739BFDCFC29D731B87144D94D8BE5FC5328E63FDF91F320574E33AFDE233CC1FE33B3BE7B
                                                                                                      Malicious:false
                                                                                                      Preview: MDMP....... ........#.`...................U...........B....... ......GenuineIntelW...........T............".`.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER1440.tmp.dmp
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:Mini DuMP crash report, 14 streams, Wed May 5 04:46:14 2021, 0x1205a4 type
                                                                                                      Category:dropped
                                                                                                      Size (bytes):39596
                                                                                                      Entropy (8bit):2.4898563574167345
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:Cbvk0B1zS7UKocLM/7VrGrt/WQ9M6BMPei:Cw024OCKT99Bcei
                                                                                                      MD5:F61221EE7B709FA21CDE8D6C40CBAE44
                                                                                                      SHA1:AB4EE081228AB2899833E913571709644087B816
                                                                                                      SHA-256:001AA7F47984E90637B69CD29C894A971F7150EC101187527B1FAEECE198163C
                                                                                                      SHA-512:42274DA99FB2828138016888BF6B9DC5ADBD17E92D0023BE7E5A557C55141A8EC5A6CCCD80876BA97560199CAF6CA80918B14F46241F1F59B945783546F54C23
                                                                                                      Malicious:false
                                                                                                      Preview: MDMP....... ........#.`...................U...........B......P ......GenuineIntelW...........T.......T....".`.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER181A.tmp.WERInternalMetadata.xml
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):8328
                                                                                                      Entropy (8bit):3.7028798362459625
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:Rrl7r3GLNi/d616YBAJ6VC1gmfTHPSXeCpru89bnTsfetm:RrlsNil616YBe6VC1gmfTHPSxn4fV
                                                                                                      MD5:0EF96EFA460D69819DF04855A0C83953
                                                                                                      SHA1:A0896DBDD1F257A071476BD98B8B4C0E69B334D7
                                                                                                      SHA-256:B5B3E798C971E181F0E958A884E2C736EDFD4C9558FF893DA0765B3862CCBFCC
                                                                                                      SHA-512:306822950855FE89F6CD7132AA20BB60A3BEB7892BB39262FD418ED75382274744526F2A5610F9A07018374370A6CD1C8817D4464C8D52F5E20B696ACB4BA90B
                                                                                                      Malicious:false
                                                                                                      Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.1.6.8.<./.P.i.d.>.......
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER1933.tmp.WERInternalMetadata.xml
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):8314
                                                                                                      Entropy (8bit):3.6953779035389136
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:Rrl7r3GLNixG6qE6YBAP6VC1gmfTGGSwCpr+89bIzsfhA4m:RrlsNig6B6YBY6VC1gmfTRSPIYf8
                                                                                                      MD5:F75236C3A579EED761F0E10030B6E27A
                                                                                                      SHA1:8A1121F50A9FBA4881EA20F2899CF22872E80479
                                                                                                      SHA-256:0AB3BC6F3164430D89874CED4717C6472E657A13B39B80FBF2C34E1DABF5CCAC
                                                                                                      SHA-512:C5E7213A174DA90E324752406588C9A904F5FFF0ACB11DE815B14F38C9CE3837C933B95EC17EC0A7E50334821D86251783E7A321ABBE7C9D4AF8F53F61F603E9
                                                                                                      Malicious:false
                                                                                                      Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.1.8.8.<./.P.i.d.>.......
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER1982.tmp.xml
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):4679
                                                                                                      Entropy (8bit):4.5104481865614465
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:48:cvIwSD8zstJgtWI9n/WSC8B78fm8M4JCdsrZFydN+q8/3URlv4SrSkd:uITfHUuSNqJpev7DWkd
                                                                                                      MD5:4ABE9138941AF30891290FAE0515DB9B
                                                                                                      SHA1:A83B7E57EB58CE42EC65E383DC579DA7C3ECE6CF
                                                                                                      SHA-256:1E4CF4BE3C12082489172157059442B2615425256D366FBD643170CABAC477D2
                                                                                                      SHA-512:39FF5C1DD408E065ACE7F7CEBBF5CE2671147BDEB7A05D7038B62AA8E64BAC4DBDB7E712AE65D1AC18F1C73FA965D92D45157526E0D3406D45AA652FA9EBBD3E
                                                                                                      Malicious:false
                                                                                                      Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="975716" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A6C.tmp.xml
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):4665
                                                                                                      Entropy (8bit):4.475614910572437
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:48:cvIwSD8zstJgtWI9n/WSC8BM8fm8M4JCdskN4xFIwb+q8/9NGnuv4SrS2d:uITfHUuSNXJ2N40mmNGSDW2d
                                                                                                      MD5:4846F50F872E4A8AA53D571CEECD559F
                                                                                                      SHA1:EC8F2D321F6EE4FEE864F21ECE27F9E8CDB1FF99
                                                                                                      SHA-256:8CB133E033F854D6FBE136B2D89A52FB3EEB13F71CBC659B5C83D002FBB255AC
                                                                                                      SHA-512:DD1E51E1A5CA7A22796A9A96EC99C0E17337F91620A6A8C0DC348D4471F4A97821824483C781AE31DA73078691CA20AE9CBD6CA73B8878B31529B7A6B3632330
                                                                                                      Malicious:false
                                                                                                      Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="975716" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A8B.tmp.WERInternalMetadata.xml
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):8382
                                                                                                      Entropy (8bit):3.697021584652469
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:Rrl7r3GLNimi6Z6YBAT6VC1gmf8eSwCpr189bIFsfC4m:RrlsNi76Z6YBk6VC1gmf8eS6Iefc
                                                                                                      MD5:7EF2060332D0A5610A3207C565CC2D64
                                                                                                      SHA1:BD9CFDCD2D9F6752B026604A60EDCF857EB574C0
                                                                                                      SHA-256:06662A694D2C443D43AE0553CECF3D8781C97A5403024214A993F5EDE548D4FA
                                                                                                      SHA-512:FE5BC54CAE83F064681EC9403C23088F829D9438ED5675DF4226B69D497059732623F3E79C1CA858F028F1DB76CA85A4D42CC19D8E788BD5BAB2AC80F595B82D
                                                                                                      Malicious:false
                                                                                                      Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.7.8.8.<./.P.i.d.>.......
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER1AE9.tmp.WERInternalMetadata.xml
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):8314
                                                                                                      Entropy (8bit):3.6958368096956407
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:Rrl7r3GLNiVMj6936YBAT6VC1gmfTGsSwCpru89bIWsfIT4m:RrlsNiC6N6YBk6VC1gmfT3SvI1fIZ
                                                                                                      MD5:E13F9F0460180CF911320252CE6CF9C0
                                                                                                      SHA1:1856F05EB0387E3A21BC61D0FF209010AFE0342C
                                                                                                      SHA-256:CFA8BEC43BE69FF45D5DCB11A9F35035D66D0A0C1A4A0FD7E678B6EA0B39C779
                                                                                                      SHA-512:7DA3B9BCA9ACAEDC29CFBBEB511301C9DC9CD9AFA7EC652CE21CF48884782C156A59CF607D52C4096A32D3EE8477E47541C8DF8003868F36B86629453BA79E7B
                                                                                                      Malicious:false
                                                                                                      Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.0.4.<./.P.i.d.>.......
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER1BF3.tmp.xml
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):4770
                                                                                                      Entropy (8bit):4.485189072854489
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:48:cvIwSD8zstJgtWI9n/WSC8BD8fm8M4JCds0MFK+q8vjs0f4SrS5d:uITfHUuSNCJyjKtfDW5d
                                                                                                      MD5:76F4C198B2027A56FDE3377775B02D6A
                                                                                                      SHA1:EB9A75DD8E34CBC8B6FF8C4335490FE33A1C813B
                                                                                                      SHA-256:A979FEE51D81CB7B0F8A16EF2675F414286E0BE4A7CE12C2D22EA6F2BED0D8EA
                                                                                                      SHA-512:F9B64331EFAD0E153309EA056E2B0435AFCDB11C24C067073DB16E1F2600788E0F0E39E291B900E9DC83DBEA0C207E6F4B310724F4D8B446493D9A5F06310EBC
                                                                                                      Malicious:false
                                                                                                      Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="975716" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER1C42.tmp.xml
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):4665
                                                                                                      Entropy (8bit):4.47479950329589
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:48:cvIwSD8zstJgtWI9n/WSC8Bb8fm8M4JCdskN4lFi+q8/9NGPGk4SrS6d:uITfHUuSNCJ2N4CmNGtDW6d
                                                                                                      MD5:3134EDDD2FDD88A1D65DB9756C231EB8
                                                                                                      SHA1:7660D8D31893A8C6AAE866B4909CC79928B451F7
                                                                                                      SHA-256:88F009E69E0E5966A9F26A35F46D57A07C92C907F7723946097FE0714C1E8078
                                                                                                      SHA-512:910BAB55C74041FDB6016F9BF7F2F38AAE0A4F2EA2EB70E68BBE2969363BC2E3EE3052AAA376E6CC3527031A8DB11465DEF8EB40A72E0FB7055D6BB892DCCF48
                                                                                                      Malicious:false
                                                                                                      Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="975716" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WERD97E.tmp.dmp
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:Mini DuMP crash report, 14 streams, Wed May 5 04:44:53 2021, 0x1205a4 type
                                                                                                      Category:dropped
                                                                                                      Size (bytes):46648
                                                                                                      Entropy (8bit):2.4535395835887615
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:9umavpqvZkOvC3hcnoZofEaBqAWVbvx2p5R+6J86cndbpU:ivMRd67ruqlbvQJJ2DU
                                                                                                      MD5:7AE3527170E540035BDD93E0EE31C096
                                                                                                      SHA1:14A3BA01D791E538CDF6845415F8D025C89C4931
                                                                                                      SHA-256:A31507D3C30BE23DCC3FD2163DAC1DDD8A885372CDA1371D70155DE170E41007
                                                                                                      SHA-512:4C9E6C15030CE194524D6806935938F0194CBA2CB0C41D1A29EE6B3AED10DBB93FB84853C3463DB20F15269390B1E93F55F5F9E802C6E8FC5E24737E08DA687F
                                                                                                      Malicious:false
                                                                                                      Preview: MDMP....... ........".`...................U...........B....... ......GenuineIntelW...........T............".`.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WERE0E2.tmp.WERInternalMetadata.xml
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):8308
                                                                                                      Entropy (8bit):3.702193352850464
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:Rrl7r3GLNiJP6P6YBVq62lgmfTHPSXeCprN89bOQsf5am:RrlsNiB6P6YBo62lgmfTHPScOjfF
                                                                                                      MD5:5B80932A4AC95EB65E3ACA9DDA87E718
                                                                                                      SHA1:9B9BE79028FC60FFDC206B5D68ABBAEF95FD33ED
                                                                                                      SHA-256:D65FC1C0C6358462EB3491E6D175B3C590390198D602F9DE58A29DAE9B84F815
                                                                                                      SHA-512:AFBDFAB58086D61B8745AA988629588E08E93DAF3F98771AB9EB02BFDCF64A2AA2381B166407BED1DBAFCCE10B0AD8DF401AC81371E72CAFA0D96072073A91D4
                                                                                                      Malicious:false
                                                                                                      Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.0.8.8.<./.P.i.d.>.......
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WERE1AE.tmp.xml
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):4679
                                                                                                      Entropy (8bit):4.510648672121708
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:48:cvIwSD8zsEJgtWI9n/WSC8BY8fm8M4JCdsrZFE+q8/3UM4SrSH1d:uITfCUuSNTJpovMDWH1d
                                                                                                      MD5:3D916DD79CDE1C883423BD9B839B953F
                                                                                                      SHA1:62CA53FF330706120B5519B143FCEC7BD6DB4247
                                                                                                      SHA-256:681344A6C49F9419C18BD31836A0B7D655253DE18874C3B9AE80054B0E2CE14D
                                                                                                      SHA-512:A97E39D45F37CA5D0EDD5854C1442002588F8C17923BC63537C92D0A41E06208A81BFCB0B760003E16822B918046947B4026EF01DD7BF70EFC01B8070386D2F0
                                                                                                      Malicious:false
                                                                                                      Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="975715" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WERE342.tmp.dmp
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:Mini DuMP crash report, 15 streams, Wed May 5 04:44:57 2021, 0x1205a4 type
                                                                                                      Category:dropped
                                                                                                      Size (bytes):55668
                                                                                                      Entropy (8bit):2.2904308539354665
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:y+zeWh19dnkac2JDEj1aI/980h3AMCCcDqiSP3FjYZdIhZ0ynImBo2uPzhcB:pzeWldFcC0w6mGCE5P5YZi9XxubyB
                                                                                                      MD5:E34E085293DC18A24A3DDC8F35287D65
                                                                                                      SHA1:28270F46B36994AC7DF344FEFAB8642DE830AB19
                                                                                                      SHA-256:7BB4A909167FB906A87CDE2A234E95186ABD940C21F9BFA7844C38AF1B2B02FF
                                                                                                      SHA-512:682AFA5F0552E934EC6E8FC90607E02354376166296FE80E9C35004F2721BB6F45F34469316F9EF0AA5A3A26C9D35073EDB092883A62C9AEE6BD6AE1CB0F7C19
                                                                                                      Malicious:false
                                                                                                      Preview: MDMP....... ........".`...................U...........B......."......GenuineIntelW...........T............".`.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WERF66D.tmp.WERInternalMetadata.xml
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):8380
                                                                                                      Entropy (8bit):3.6919968957861586
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:Rrl7r3GLNind606YBAV6L6Cdgmf8GHS7CpBg89b7XsfFpm:RrlsNid606YB66WCdgmf8USM7cfC
                                                                                                      MD5:4D4A7E4D09FAA799E97D6176C63AE803
                                                                                                      SHA1:E0BC1FD43A1BF867A6102731AAEEFDB0A7FE95D8
                                                                                                      SHA-256:FE002D89650D220CD275724E3C7982D0B82FA48C3DA934A67DA7CF5F00C36815
                                                                                                      SHA-512:4DB6A8811591527BEA21D2AB760DFD25405436599894AA0920D4E04F8D888113C5202A293C3FDFA09B1D0E3F196CBC4933E0F1DE7ADA46468213282E9C9259A5
                                                                                                      Malicious:false
                                                                                                      Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.8.6.0.<./.P.i.d.>.......
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WERF833.tmp.xml
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):4766
                                                                                                      Entropy (8bit):4.458276862803724
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:48:cvIwSD8zsEJgtWI9n/WSC8Bh8fm8M4JCdskN4fFApF+q8vjskN4T4SrSCd:uITfCUuSNsJ2N4KfKrN4TDWCd
                                                                                                      MD5:0A2B816991697FE1C620267C2B0C607A
                                                                                                      SHA1:9A1F08BA075938CADB65A79F3ADD7F34875D86B5
                                                                                                      SHA-256:BF2E2E4527DC9096AAF9EE9856E38D289EDFF1F72CE97F6E55B9E7B03DED5413
                                                                                                      SHA-512:2DB64775768B9E633663A98263550F1583C0D72257FAE05A7AB34E56FEB9237B903C5731B9714C431026FE5AFCEDDC9DF2025E39C5348F3A6D7E8964D6D4A3FD
                                                                                                      Malicious:false
                                                                                                      Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="975715" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..

                                                                                                      Static File Info

                                                                                                      General

                                                                                                      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                      Entropy (8bit):7.53604314211802
                                                                                                      TrID:
                                                                                                      • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                                                                                      • Generic Win/DOS Executable (2004/3) 0.20%
                                                                                                      • DOS Executable Generic (2002/1) 0.20%
                                                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                      File name:fc0bc077_by_Libranalysis.dll
                                                                                                      File size:164864
                                                                                                      MD5:fc0bc07721ce94bc9b100e7c846a1210
                                                                                                      SHA1:2d98f05fb78cd75bb44a0087bead8c1604545d07
                                                                                                      SHA256:e707edac036a1a2d08b746c6a50ac0f0e2b1ba1c2668aadf87ea11b666b0eb28
                                                                                                      SHA512:148d0dbd3b2cfa7a9182f073e13a83bbbf5cbce934b04366b539799007df341bf953308647f0bee16e351b3716f25e4e10c349dfda5bae70ded3cae208621b35
                                                                                                      SSDEEP:3072:sC2X+QFg3UutDvUvoU8pz6EJEEhu6Tzace9kuaGA81/YXKHML/Vp8AF:MG3rUvoU4JE/Wzan9T7B/CKsL/Vy
                                                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......t.%.0zK.0zK.0zK.0zJ.}{K...3..{K.....P{K...3..zK.V....zK...1..{K......zK.Rich0zK.........................................PE..L..

                                                                                                      File Icon

                                                                                                      Icon Hash:74f0e4ecccdce0e4

                                                                                                      Static PE Info

                                                                                                      General

                                                                                                      Entrypoint:0x100241a0
                                                                                                      Entrypoint Section:.text
                                                                                                      Digitally signed:false
                                                                                                      Imagebase:0x10000000
                                                                                                      Subsystem:windows gui
                                                                                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                                                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                                                                      Time Stamp:0x60903ADD [Mon May 3 18:03:09 2021 UTC]
                                                                                                      TLS Callbacks:
                                                                                                      CLR (.Net) Version:
                                                                                                      OS Version Major:5
                                                                                                      OS Version Minor:0
                                                                                                      File Version Major:5
                                                                                                      File Version Minor:0
                                                                                                      Subsystem Version Major:5
                                                                                                      Subsystem Version Minor:0
                                                                                                      Import Hash:f108efab351dd21acb187c36805c5bbe

                                                                                                      Entrypoint Preview

                                                                                                      Instruction
                                                                                                      mov edx, eax
                                                                                                      xor eax, eax
                                                                                                      add eax, 00002233h
                                                                                                      cmpss xmm1, xmm2, 03h
                                                                                                      sub eax, 00002233h
                                                                                                      mov edx, 00000000h
                                                                                                      mov edx, 00000000h
                                                                                                      mov edx, 00000000h
                                                                                                      mov edx, 00000000h
                                                                                                      mov edx, 00000000h
                                                                                                      mov edx, 00000000h
                                                                                                      cmpss xmm1, xmm2, 03h
                                                                                                      cmp eax, 01h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h
                                                                                                      mov eax, 00000000h

                                                                                                      Rich Headers

                                                                                                      Programming Language:
                                                                                                      • [RES] VS2012 UPD3 build 60610
                                                                                                      • [LNK] VS2005 build 50727
                                                                                                      • [EXP] VS2005 build 50727
                                                                                                      • [ C ] VS2012 UPD4 build 61030
                                                                                                      • [IMP] VS2013 UPD2 build 30501

                                                                                                      Data Directories

                                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x277300x55.rdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x278040x59.rdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c0000x3a0.rsrc
                                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x2d0000x1220
                                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x100180x38.text
                                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x250000x60.rdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                                      Sections

                                                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                      .text0x10000x233220x23400False0.759010693706data7.5511794748IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                      .rdata0x250000x2e390x2c00False0.770774147727data7.47865520081IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                      .pdata0x280000x336c0x1800False0.78564453125MMDF mailbox7.42299069747IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                                      .rsrc0x2c0000x48c0x400False0.4091796875data3.06807977608IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                      .reloc0x2d0000x2580x400False0.5263671875data4.16057022331IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                                      Resources

                                                                                                      NameRVASizeTypeLanguageCountry
                                                                                                      RT_VERSION0x2c0600x33cdata

                                                                                                      Imports

                                                                                                      DLLImport
                                                                                                      msvcrt.dllmemset
                                                                                                      ADVAPI32.dllRegOverridePredefKey
                                                                                                      ole32.dllCreatePointerMoniker, CreateStreamOnHGlobal
                                                                                                      USER32.dllTranslateMessage
                                                                                                      OPENGL32.dllglTexSubImage1D
                                                                                                      KERNEL32.dllCloseHandle, OutputDebugStringA, LoadLibraryExW, CreateFileW, GetProfileSectionW, LoadLibraryW, GetProfileSectionA, OpenSemaphoreW
                                                                                                      RASAPI32.dllRasGetConnectionStatistics
                                                                                                      CLUSAPI.dllClusterEnum

                                                                                                      Exports

                                                                                                      NameOrdinalAddress
                                                                                                      LoxmtYt10x10027776

                                                                                                      Version Infos

                                                                                                      DescriptionData
                                                                                                      LegalCopyrightCopyright 2018
                                                                                                      InternalNamej2pcsc
                                                                                                      FileVersion8.0.1710.11
                                                                                                      Full Version1.8.0_171-b11
                                                                                                      CompanyNameOracle Corporation
                                                                                                      ProductNameJava(TM) Platform SE 8
                                                                                                      ProductVersion8.0.1710.11
                                                                                                      FileDescriptionJava(TM) Platform SE binary
                                                                                                      OriginalFilenamej2pcsc.dll
                                                                                                      Translation0x0000 0x04b0

                                                                                                      Network Behavior

                                                                                                      Network Port Distribution

                                                                                                      UDP Packets

                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                      May 4, 2021 21:43:07.290054083 CEST5062053192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:43:07.340730906 CEST53506208.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:43:08.356738091 CEST6493853192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:43:08.410634995 CEST53649388.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:43:08.711296082 CEST6015253192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:43:08.771044970 CEST53601528.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:43:09.556556940 CEST5754453192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:43:09.621206999 CEST53575448.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:43:10.489531994 CEST5598453192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:43:10.539915085 CEST53559848.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:43:11.973864079 CEST6418553192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:43:12.027225018 CEST53641858.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:43:13.452745914 CEST6511053192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:43:13.501549006 CEST53651108.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:43:14.552916050 CEST5836153192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:43:14.602003098 CEST53583618.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:43:15.522281885 CEST6349253192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:43:15.570959091 CEST53634928.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:43:45.853096008 CEST6083153192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:43:45.936233997 CEST53608318.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:43:58.366470098 CEST6010053192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:43:58.420455933 CEST53601008.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:43:59.903868914 CEST5319553192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:43:59.963656902 CEST53531958.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:44:01.529102087 CEST5014153192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:44:01.580902100 CEST53501418.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:44:01.986046076 CEST5302353192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:44:02.046535969 CEST53530238.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:44:04.101972103 CEST4956353192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:44:04.158121109 CEST53495638.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:45:20.032542944 CEST5135253192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:45:20.107333899 CEST5934953192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:45:20.127286911 CEST53513528.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:45:20.158092022 CEST53593498.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:45:20.577899933 CEST5708453192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:45:20.637445927 CEST53570848.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:45:21.121624947 CEST5882353192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:45:21.155797958 CEST5756853192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:45:21.170548916 CEST53588238.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:45:21.214432001 CEST53575688.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:45:21.667354107 CEST5054053192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:45:21.725111961 CEST53505408.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:45:22.202001095 CEST5436653192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:45:22.208492994 CEST5303453192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:45:22.250680923 CEST53543668.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:45:22.260543108 CEST53530348.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:45:23.365561008 CEST5776253192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:45:23.380847931 CEST5543553192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:45:23.429649115 CEST53554358.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:45:23.430177927 CEST53577628.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:45:23.492109060 CEST5071353192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:45:23.549302101 CEST53507138.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:45:23.920649052 CEST5613253192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:45:23.966571093 CEST5898753192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:45:23.981606007 CEST53561328.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:45:24.023734093 CEST53589878.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:45:24.175579071 CEST5657953192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:45:24.226135015 CEST53565798.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:45:24.973644972 CEST6063353192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:45:25.030881882 CEST53606338.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:45:25.818038940 CEST6129253192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:45:25.878962040 CEST53612928.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:45:26.423403978 CEST6361953192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:45:26.480717897 CEST53636198.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:45:27.331106901 CEST6493853192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:45:27.382663965 CEST53649388.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:46:02.031594992 CEST6194653192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:46:02.091624975 CEST53619468.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:46:09.996799946 CEST6491053192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:46:10.050515890 CEST53649108.8.8.8192.168.2.3
                                                                                                      May 4, 2021 21:46:22.169416904 CEST5212353192.168.2.38.8.8.8
                                                                                                      May 4, 2021 21:46:22.219254971 CEST53521238.8.8.8192.168.2.3

                                                                                                      DNS Answers

                                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                      May 4, 2021 21:45:20.127286911 CEST8.8.8.8192.168.2.30x80edNo error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.akadns.netCNAME (Canonical name)IN (0x0001)
                                                                                                      May 4, 2021 21:45:20.637445927 CEST8.8.8.8192.168.2.30xe98cNo error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.akadns.netCNAME (Canonical name)IN (0x0001)
                                                                                                      May 4, 2021 21:45:21.214432001 CEST8.8.8.8192.168.2.30x72fdNo error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.akadns.netCNAME (Canonical name)IN (0x0001)
                                                                                                      May 4, 2021 21:45:21.725111961 CEST8.8.8.8192.168.2.30x16d1No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.akadns.netCNAME (Canonical name)IN (0x0001)
                                                                                                      May 4, 2021 21:45:26.480717897 CEST8.8.8.8192.168.2.30x568No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.akadns.netCNAME (Canonical name)IN (0x0001)

                                                                                                      Code Manipulations

                                                                                                      Statistics

                                                                                                      Behavior

                                                                                                      Click to jump to process

                                                                                                      System Behavior

                                                                                                      General

                                                                                                      Start time:21:44:06
                                                                                                      Start date:04/05/2021
                                                                                                      Path:C:\Windows\System32\loaddll32.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:loaddll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll'
                                                                                                      Imagebase:0x190000
                                                                                                      File size:116736 bytes
                                                                                                      MD5 hash:542795ADF7CC08EFCF675D65310596E8
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high

                                                                                                      General

                                                                                                      Start time:21:44:06
                                                                                                      Start date:04/05/2021
                                                                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',#1
                                                                                                      Imagebase:0xbd0000
                                                                                                      File size:232960 bytes
                                                                                                      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high

                                                                                                      General

                                                                                                      Start time:21:44:06
                                                                                                      Start date:04/05/2021
                                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:rundll32.exe C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll,LoxmtYt
                                                                                                      Imagebase:0x1c0000
                                                                                                      File size:61952 bytes
                                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high

                                                                                                      General

                                                                                                      Start time:21:44:06
                                                                                                      Start date:04/05/2021
                                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',#1
                                                                                                      Imagebase:0x1c0000
                                                                                                      File size:61952 bytes
                                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000004.00000002.326004095.0000000010001000.00000020.00020000.sdmp, Author: Joe Security
                                                                                                      Reputation:high

                                                                                                      General

                                                                                                      Start time:21:44:50
                                                                                                      Start date:04/05/2021
                                                                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 760
                                                                                                      Imagebase:0xa80000
                                                                                                      File size:434592 bytes
                                                                                                      MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high

                                                                                                      General

                                                                                                      Start time:21:44:53
                                                                                                      Start date:04/05/2021
                                                                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4860 -s 788
                                                                                                      Imagebase:0xa80000
                                                                                                      File size:434592 bytes
                                                                                                      MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high

                                                                                                      General

                                                                                                      Start time:21:44:55
                                                                                                      Start date:04/05/2021
                                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',DllCanUnloadNow
                                                                                                      Imagebase:0x1c0000
                                                                                                      File size:61952 bytes
                                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000010.00000002.489951685.0000000010001000.00000020.00020000.sdmp, Author: Joe Security
                                                                                                      Reputation:high

                                                                                                      General

                                                                                                      Start time:21:44:55
                                                                                                      Start date:04/05/2021
                                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',DllGetClassObject
                                                                                                      Imagebase:0x1c0000
                                                                                                      File size:61952 bytes
                                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000011.00000002.489294314.0000000010001000.00000020.00020000.sdmp, Author: Joe Security
                                                                                                      Reputation:high

                                                                                                      General

                                                                                                      Start time:21:44:56
                                                                                                      Start date:04/05/2021
                                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',WdiAddFileToInstance
                                                                                                      Imagebase:0x1c0000
                                                                                                      File size:61952 bytes
                                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000012.00000002.486848351.0000000010001000.00000020.00020000.sdmp, Author: Joe Security
                                                                                                      Reputation:high

                                                                                                      General

                                                                                                      Start time:21:44:57
                                                                                                      Start date:04/05/2021
                                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',WdiAddParameter
                                                                                                      Imagebase:0x1c0000
                                                                                                      File size:61952 bytes
                                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000013.00000002.488379155.0000000010001000.00000020.00020000.sdmp, Author: Joe Security
                                                                                                      Reputation:high

                                                                                                      General

                                                                                                      Start time:21:44:57
                                                                                                      Start date:04/05/2021
                                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:rundll32.exe 'C:\Users\user\Desktop\fc0bc077_by_Libranalysis.dll',WdiCancel
                                                                                                      Imagebase:0x1c0000
                                                                                                      File size:61952 bytes
                                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000014.00000002.480983725.0000000010001000.00000020.00020000.sdmp, Author: Joe Security
                                                                                                      Reputation:high

                                                                                                      General

                                                                                                      Start time:21:46:10
                                                                                                      Start date:04/05/2021
                                                                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5168 -s 752
                                                                                                      Imagebase:0xa80000
                                                                                                      File size:434592 bytes
                                                                                                      MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high

                                                                                                      General

                                                                                                      Start time:21:46:10
                                                                                                      Start date:04/05/2021
                                                                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5188 -s 756
                                                                                                      Imagebase:0xa80000
                                                                                                      File size:434592 bytes
                                                                                                      MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      General

                                                                                                      Start time:21:46:11
                                                                                                      Start date:04/05/2021
                                                                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 760
                                                                                                      Imagebase:0xa80000
                                                                                                      File size:434592 bytes
                                                                                                      MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      General

                                                                                                      Start time:21:46:11
                                                                                                      Start date:04/05/2021
                                                                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5204 -s 756
                                                                                                      Imagebase:0xa80000
                                                                                                      File size:434592 bytes
                                                                                                      MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      Disassembly

                                                                                                      Code Analysis

                                                                                                      Reset < >