Loading ...

Play interactive tourEdit tour

Analysis Report 3c271eae_by_Libranalysis

Overview

General Information

Sample Name:3c271eae_by_Libranalysis (renamed file extension from none to dll)
Analysis ID:404285
MD5:3c271eae5a3a2817cfd8704f75fdf405
SHA1:03b821b5d8b5416900245a05fce8541a21b6da7c
SHA256:dbd00287fe0c78430fee81ec6333b9c9b1863b7c62ac305de627ce6ca9fb314e
Tags:Dridex
Infos:

Most interesting Screenshot:

Detection

Dridex
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Dridex unpacked file
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Tries to detect sandboxes / dynamic malware analysis system (file name check)
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
One or more processes crash
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • loaddll32.exe (PID: 7108 cmdline: loaddll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll' MD5: 542795ADF7CC08EFCF675D65310596E8)
    • cmd.exe (PID: 7124 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 7144 cmdline: rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • WerFault.exe (PID: 6240 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7144 -s 760 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 7132 cmdline: rundll32.exe C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll,LoxmtYt MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 6856 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7132 -s 928 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 6496 cmdline: rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',DllCanUnloadNow MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6564 cmdline: rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',DllGetClassObject MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6600 cmdline: rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',WdiAddFileToInstance MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 5624 cmdline: rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',WdiAddParameter MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 744 cmdline: rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',WdiCancel MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • WerFault.exe (PID: 6976 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 588 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

Threatname: Dridex

{"Version": 40112, "C2 list": ["193.200.130.181:443", "95.138.161.226:2303", "167.114.113.13:4125"], "RC4 keys": ["MqW38NQIO70GhjGOOvjtl5AwyenW6A8fcZ", "xeMr6QHn7uRk1D2ChU8OuyaRFUZJZZHUIgxCzaPXtOkjmhTMtNxfWU8nlnD7q009ahEI51R1"]}

Yara Overview

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_7584c961c6fefb28629a227a579a8cc1f481e81d_82810a17_1806e157\Report.werSUSP_WER_Critical_HeapCorruptionDetects a crashed application that crashed due to a heap corruption error (could be a sign of exploitation)Florian Roth
  • 0x11c:$a1: ReportIdentifier=
  • 0x19e:$a1: ReportIdentifier=
  • 0x77a:$a2: .Name=Fault Module Name
  • 0x928:$s1: c0000374

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000F.00000002.933498628.0000000010001000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
    0000000D.00000002.932757910.0000000010001000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
      00000001.00000002.929835817.0000000010001000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
        00000004.00000002.933327968.0000000010001000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security

          Unpacked PEs

          SourceRuleDescriptionAuthorStrings
          1.2.loaddll32.exe.10000000.2.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
            15.2.rundll32.exe.10000000.3.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
              4.2.rundll32.exe.10000000.3.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
                13.2.rundll32.exe.10000000.3.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security

                  Sigma Overview

                  No Sigma rule has matched

                  Signature Overview

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection:

                  barindex
                  Found malware configurationShow sources
                  Source: 1.2.loaddll32.exe.10000000.2.unpackMalware Configuration Extractor: Dridex {"Version": 40112, "C2 list": ["193.200.130.181:443", "95.138.161.226:2303", "167.114.113.13:4125"], "RC4 keys": ["MqW38NQIO70GhjGOOvjtl5AwyenW6A8fcZ", "xeMr6QHn7uRk1D2ChU8OuyaRFUZJZZHUIgxCzaPXtOkjmhTMtNxfWU8nlnD7q009ahEI51R1"]}
                  Multi AV Scanner detection for submitted fileShow sources
                  Source: 3c271eae_by_Libranalysis.dllMetadefender: Detection: 21%Perma Link
                  Source: 3c271eae_by_Libranalysis.dllReversingLabs: Detection: 27%
                  Machine Learning detection for sampleShow sources
                  Source: 3c271eae_by_Libranalysis.dllJoe Sandbox ML: detected
                  Source: 15.2.rundll32.exe.31b0000.2.unpackAvira: Label: TR/ATRAPS.Gen2
                  Source: 13.2.rundll32.exe.c00000.2.unpackAvira: Label: TR/ATRAPS.Gen2
                  Source: 1.2.loaddll32.exe.580000.1.unpackAvira: Label: TR/ATRAPS.Gen2
                  Source: 4.2.rundll32.exe.5a0000.2.unpackAvira: Label: TR/ATRAPS.Gen2
                  Source: 3c271eae_by_Libranalysis.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                  Source: 3c271eae_by_Libranalysis.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                  Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000007.00000003.732940731.0000000000A45000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.736721982.0000000003752000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.783765282.00000000052A0000.00000004.00000001.sdmp
                  Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: sfc_os.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000007.00000003.739537983.0000000004D51000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.808991952.0000000005AE2000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926913116.0000000005675000.00000004.00000040.sdmp
                  Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000007.00000003.739537983.0000000004D51000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.805767429.0000000005901000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.926637905.0000000005871000.00000004.00000001.sdmp
                  Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000007.00000003.739554715.0000000004EE0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.815252847.0000000005AE0000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926637905.0000000005871000.00000004.00000001.sdmp
                  Source: Binary string: dnsapi.pdb5S source: WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: wntdll.pdb source: WerFault.exe, 00000007.00000003.734585712.0000000000A3F000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.736372515.000000000374C000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.926637905.0000000005871000.00000004.00000001.sdmp
                  Source: Binary string: CoreMessaging.pdb source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: advapi32.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926637905.0000000005871000.00000004.00000001.sdmp
                  Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926637905.0000000005871000.00000004.00000001.sdmp
                  Source: Binary string: opengl32.pdbf source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: profapi.pdb@ source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: setupapi.pdbt source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: cryptbase.pdbN source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: ntmarta.pdb source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: dnsapi.pdbe source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: fltLib.pdbP source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: wkernel32.pdb_ source: WerFault.exe, 00000011.00000002.934165093.00000000052A2000.00000004.00000001.sdmp
                  Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000007.00000003.733841780.0000000000A4B000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.736729941.0000000003758000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.926637905.0000000005871000.00000004.00000001.sdmp
                  Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: mpr.pdb source: WerFault.exe, 00000007.00000003.739554715.0000000004EE0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.815252847.0000000005AE0000.00000004.00000040.sdmp
                  Source: Binary string: winspool.pdb. source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: rasapi32.pdbw source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: imagehlp.pdbH source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: rasapi32.pdbGS source: WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: iphlpapi.pdbQS source: WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: shcore.pdbk source: WerFault.exe, 00000007.00000003.739554715.0000000004EE0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.816014446.0000000005AE5000.00000004.00000040.sdmp
                  Source: Binary string: dwmapi.pdbM source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: opengl32.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: ClusApi.pdb- source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: iphlpapi.pdbx source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: winspool.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: shell32.pdbk source: WerFault.exe, 00000007.00000003.739554715.0000000004EE0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.808991952.0000000005AE2000.00000004.00000040.sdmp
                  Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: nsi.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926884946.0000000005670000.00000004.00000040.sdmp
                  Source: Binary string: ntmarta.pdbo source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: ole32.pdb\ source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: ucrtbase.pdbk source: WerFault.exe, 00000009.00000003.808991952.0000000005AE2000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926913116.0000000005675000.00000004.00000040.sdmp
                  Source: Binary string: KiUserCallbackDispatcherRSDSwntdll.pdb source: WerFault.exe, 00000011.00000002.928673597.0000000001072000.00000004.00000001.sdmp
                  Source: Binary string: rasapi32.pdbY source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: powrprof.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: glu32.pdbG source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: ole32.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926637905.0000000005871000.00000004.00000001.sdmp
                  Source: Binary string: AcLayers.pdb source: WerFault.exe, 00000007.00000003.739537983.0000000004D51000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.805767429.0000000005901000.00000004.00000001.sdmp
                  Source: Binary string: profapi.pdb~ source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: propsys.pdbr source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: opengl32.pdbwS source: WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: FGERN.pdb source: 3c271eae_by_Libranalysis.dll
                  Source: Binary string: advapi32.pdbN source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: shlwapi.pdbV source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000007.00000003.739554715.0000000004EE0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.808991952.0000000005AE2000.00000004.00000040.sdmp
                  Source: Binary string: imagehlp.pdbx source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000007.00000003.739554715.0000000004EE0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.815252847.0000000005AE0000.00000004.00000040.sdmp
                  Source: Binary string: combase.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926659853.0000000005672000.00000004.00000040.sdmp
                  Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000007.00000003.732940731.0000000000A45000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.736721982.0000000003752000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.791534182.00000000012A1000.00000004.00000001.sdmp
                  Source: Binary string: rundll32.pdb source: WerFault.exe, 00000007.00000003.739537983.0000000004D51000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.736367252.0000000003746000.00000004.00000001.sdmp
                  Source: Binary string: sfc.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: ClusApi.pdbA source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: CoreUIComponents.pdb_ source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: apphelp.pdb source: WerFault.exe, 00000007.00000003.739537983.0000000004D51000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.805767429.0000000005901000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.926637905.0000000005871000.00000004.00000001.sdmp
                  Source: Binary string: KERNEL32C:\Windows\System32\KERNEL32.DLLC:\Windows\System32\KERNEL32.DLLRSDSwkernel32.pdb source: WerFault.exe, 00000011.00000002.928673597.0000000001072000.00000004.00000001.sdmp
                  Source: Binary string: wimm32.pdbV source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: WinTypes.pdb source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: ClusApi.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: glu32.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: shcore.pdb source: WerFault.exe, 00000007.00000003.739554715.0000000004EE0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.816014446.0000000005AE5000.00000004.00000040.sdmp
                  Source: Binary string: rasman.pdbe source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000007.00000003.739537983.0000000004D51000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.805767429.0000000005901000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.926884946.0000000005670000.00000004.00000040.sdmp
                  Source: Binary string: fltLib.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: rundll32.pdbk source: WerFault.exe, 00000007.00000003.739537983.0000000004D51000.00000004.00000001.sdmp
                  Source: Binary string: shell32.pdb source: WerFault.exe, 00000007.00000003.739554715.0000000004EE0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.808991952.0000000005AE2000.00000004.00000040.sdmp
                  Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000007.00000003.739537983.0000000004D51000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.805767429.0000000005901000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.926884946.0000000005670000.00000004.00000040.sdmp
                  Source: Binary string: dnsapi.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: rasman.pdbS source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: rasapi32.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: wimm32.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: CoreUIComponents.pdb source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000007.00000003.739537983.0000000004D51000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.805767429.0000000005901000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: setupapi.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: propsys.pdbD source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: imagehlp.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: sechost.pdb( source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000007.00000003.734585712.0000000000A3F000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.736372515.000000000374C000.00000004.00000001.sdmp
                  Source: Binary string: profapi.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000007.00000003.739537983.0000000004D51000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.805767429.0000000005901000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.926884946.0000000005670000.00000004.00000040.sdmp
                  Source: Binary string: sechost.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926637905.0000000005871000.00000004.00000001.sdmp
                  Source: Binary string: oleaut32.pdbZ source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: rasman.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: propsys.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: cfgmgr32.pdbk source: WerFault.exe, 00000007.00000003.739554715.0000000004EE0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.808991952.0000000005AE2000.00000004.00000040.sdmp
                  Source: Binary string: bcrypt.pdbb source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: msctf.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: rundll32.pdb( source: WerFault.exe, 00000007.00000003.732917274.0000000000A39000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.736367252.0000000003746000.00000004.00000001.sdmp
                  Source: Binary string: TextInputFramework.pdb source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: iphlpapi.pdb}2> source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: ClusApi.pdb]S source: WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000007.00000003.739554715.0000000004EE0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.815252847.0000000005AE0000.00000004.00000040.sdmp
                  Source: Binary string: ws2_32.pdb+ source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: ws2_32.pdb?S source: WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: wwin32u.pdb!S source: WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926637905.0000000005871000.00000004.00000001.sdmp
                  Source: Binary string: sfc_os.pdbl source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: wimm32.pdbeS source: WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000007.00000003.733841780.0000000000A4B000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.736729941.0000000003758000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.811134617.00000000012A7000.00000004.00000001.sdmp
                  Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000007.00000003.739554715.0000000004EE0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.815252847.0000000005AE0000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926637905.0000000005871000.00000004.00000001.sdmp
                  Source: Binary string: combase.pdbk source: WerFault.exe, 00000011.00000003.926659853.0000000005672000.00000004.00000040.sdmp
                  Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: powrprof.pdbZ source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: wuser32.pdb source: WerFault.exe, 00000007.00000003.739537983.0000000004D51000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.805767429.0000000005901000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.926884946.0000000005670000.00000004.00000040.sdmp

                  Networking:

                  barindex
                  C2 URLs / IPs found in malware configurationShow sources
                  Source: Malware configuration extractorIPs: 193.200.130.181:443
                  Source: Malware configuration extractorIPs: 95.138.161.226:2303
                  Source: Malware configuration extractorIPs: 167.114.113.13:4125
                  Source: Joe Sandbox ViewIP Address: 167.114.113.13 167.114.113.13
                  Source: Joe Sandbox ViewIP Address: 95.138.161.226 95.138.161.226
                  Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                  Source: Joe Sandbox ViewASN Name: RACKSPACE-LONGB RACKSPACE-LONGB
                  Source: WerFault.exe, 00000007.00000003.888034392.0000000004976000.00000004.00000001.sdmpString found in binary or memory: http://crl.micro

                  E-Banking Fraud:

                  barindex
                  Yara detected Dridex unpacked fileShow sources
                  Source: Yara matchFile source: 0000000F.00000002.933498628.0000000010001000.00000020.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.932757910.0000000010001000.00000020.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.929835817.0000000010001000.00000020.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.933327968.0000000010001000.00000020.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 1.2.loaddll32.exe.10000000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.rundll32.exe.10000000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.rundll32.exe.10000000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.rundll32.exe.10000000.3.unpack, type: UNPACKEDPE
                  Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_10001494
                  Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_10011460
                  Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_1000846C
                  Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_1000A52C
                  Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_10011D58
                  Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_10019348
                  Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_10010754
                  Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_100090CC
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7144 -s 760
                  Source: 3c271eae_by_Libranalysis.dllBinary or memory string: OriginalFilenamej2pcsc.dllN vs 3c271eae_by_Libranalysis.dll
                  Source: 3c271eae_by_Libranalysis.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                  Source: C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_7584c961c6fefb28629a227a579a8cc1f481e81d_82810a17_1806e157\Report.wer, type: DROPPEDMatched rule: SUSP_WER_Critical_HeapCorruption date = 2019-10-18, author = Florian Roth, description = Detects a crashed application that crashed due to a heap corruption error (could be a sign of exploitation), reference = https://twitter.com/cyb3rops/status/1185459425710092288, score =
                  Source: 3c271eae_by_Libranalysis.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: classification engineClassification label: mal76.troj.evad.winDLL@20/9@0/3
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7132
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7144
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7108
                  Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC9B.tmpJump to behavior
                  Source: 3c271eae_by_Libranalysis.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                  Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll,LoxmtYt
                  Source: 3c271eae_by_Libranalysis.dllMetadefender: Detection: 21%
                  Source: 3c271eae_by_Libranalysis.dllReversingLabs: Detection: 27%
                  Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll'
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',#1
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll,LoxmtYt
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',#1
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7144 -s 760
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7132 -s 928
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',DllCanUnloadNow
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',DllGetClassObject
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',WdiAddFileToInstance
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',WdiAddParameter
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',WdiCancel
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 588
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',#1
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll,LoxmtYt
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',DllCanUnloadNow
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',DllGetClassObject
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',WdiAddFileToInstance
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',WdiAddParameter
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',WdiCancel
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',#1
                  Source: 3c271eae_by_Libranalysis.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                  Source: 3c271eae_by_Libranalysis.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000007.00000003.732940731.0000000000A45000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.736721982.0000000003752000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.783765282.00000000052A0000.00000004.00000001.sdmp
                  Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: sfc_os.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000007.00000003.739537983.0000000004D51000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.808991952.0000000005AE2000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926913116.0000000005675000.00000004.00000040.sdmp
                  Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000007.00000003.739537983.0000000004D51000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.805767429.0000000005901000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.926637905.0000000005871000.00000004.00000001.sdmp
                  Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000007.00000003.739554715.0000000004EE0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.815252847.0000000005AE0000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926637905.0000000005871000.00000004.00000001.sdmp
                  Source: Binary string: dnsapi.pdb5S source: WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: wntdll.pdb source: WerFault.exe, 00000007.00000003.734585712.0000000000A3F000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.736372515.000000000374C000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.926637905.0000000005871000.00000004.00000001.sdmp
                  Source: Binary string: CoreMessaging.pdb source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: advapi32.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926637905.0000000005871000.00000004.00000001.sdmp
                  Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926637905.0000000005871000.00000004.00000001.sdmp
                  Source: Binary string: opengl32.pdbf source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: profapi.pdb@ source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: setupapi.pdbt source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: cryptbase.pdbN source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: ntmarta.pdb source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: dnsapi.pdbe source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: fltLib.pdbP source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: wkernel32.pdb_ source: WerFault.exe, 00000011.00000002.934165093.00000000052A2000.00000004.00000001.sdmp
                  Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000007.00000003.733841780.0000000000A4B000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.736729941.0000000003758000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.926637905.0000000005871000.00000004.00000001.sdmp
                  Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: mpr.pdb source: WerFault.exe, 00000007.00000003.739554715.0000000004EE0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.815252847.0000000005AE0000.00000004.00000040.sdmp
                  Source: Binary string: winspool.pdb. source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: rasapi32.pdbw source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: imagehlp.pdbH source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: rasapi32.pdbGS source: WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: iphlpapi.pdbQS source: WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: shcore.pdbk source: WerFault.exe, 00000007.00000003.739554715.0000000004EE0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.816014446.0000000005AE5000.00000004.00000040.sdmp
                  Source: Binary string: dwmapi.pdbM source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: opengl32.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: ClusApi.pdb- source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: iphlpapi.pdbx source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: winspool.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: shell32.pdbk source: WerFault.exe, 00000007.00000003.739554715.0000000004EE0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.808991952.0000000005AE2000.00000004.00000040.sdmp
                  Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: nsi.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926884946.0000000005670000.00000004.00000040.sdmp
                  Source: Binary string: ntmarta.pdbo source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: ole32.pdb\ source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: ucrtbase.pdbk source: WerFault.exe, 00000009.00000003.808991952.0000000005AE2000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926913116.0000000005675000.00000004.00000040.sdmp
                  Source: Binary string: KiUserCallbackDispatcherRSDSwntdll.pdb source: WerFault.exe, 00000011.00000002.928673597.0000000001072000.00000004.00000001.sdmp
                  Source: Binary string: rasapi32.pdbY source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: powrprof.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: glu32.pdbG source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: ole32.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926637905.0000000005871000.00000004.00000001.sdmp
                  Source: Binary string: AcLayers.pdb source: WerFault.exe, 00000007.00000003.739537983.0000000004D51000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.805767429.0000000005901000.00000004.00000001.sdmp
                  Source: Binary string: profapi.pdb~ source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: propsys.pdbr source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: opengl32.pdbwS source: WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: FGERN.pdb source: 3c271eae_by_Libranalysis.dll
                  Source: Binary string: advapi32.pdbN source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: shlwapi.pdbV source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000007.00000003.739554715.0000000004EE0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.808991952.0000000005AE2000.00000004.00000040.sdmp
                  Source: Binary string: imagehlp.pdbx source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000007.00000003.739554715.0000000004EE0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.815252847.0000000005AE0000.00000004.00000040.sdmp
                  Source: Binary string: combase.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926659853.0000000005672000.00000004.00000040.sdmp
                  Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000007.00000003.732940731.0000000000A45000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.736721982.0000000003752000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.791534182.00000000012A1000.00000004.00000001.sdmp
                  Source: Binary string: rundll32.pdb source: WerFault.exe, 00000007.00000003.739537983.0000000004D51000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.736367252.0000000003746000.00000004.00000001.sdmp
                  Source: Binary string: sfc.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: ClusApi.pdbA source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: CoreUIComponents.pdb_ source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: apphelp.pdb source: WerFault.exe, 00000007.00000003.739537983.0000000004D51000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.805767429.0000000005901000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.926637905.0000000005871000.00000004.00000001.sdmp
                  Source: Binary string: KERNEL32C:\Windows\System32\KERNEL32.DLLC:\Windows\System32\KERNEL32.DLLRSDSwkernel32.pdb source: WerFault.exe, 00000011.00000002.928673597.0000000001072000.00000004.00000001.sdmp
                  Source: Binary string: wimm32.pdbV source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: WinTypes.pdb source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: ClusApi.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: glu32.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: shcore.pdb source: WerFault.exe, 00000007.00000003.739554715.0000000004EE0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.816014446.0000000005AE5000.00000004.00000040.sdmp
                  Source: Binary string: rasman.pdbe source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000007.00000003.739537983.0000000004D51000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.805767429.0000000005901000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.926884946.0000000005670000.00000004.00000040.sdmp
                  Source: Binary string: fltLib.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: rundll32.pdbk source: WerFault.exe, 00000007.00000003.739537983.0000000004D51000.00000004.00000001.sdmp
                  Source: Binary string: shell32.pdb source: WerFault.exe, 00000007.00000003.739554715.0000000004EE0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.808991952.0000000005AE2000.00000004.00000040.sdmp
                  Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000007.00000003.739537983.0000000004D51000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.805767429.0000000005901000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.926884946.0000000005670000.00000004.00000040.sdmp
                  Source: Binary string: dnsapi.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: rasman.pdbS source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: rasapi32.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: wimm32.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: CoreUIComponents.pdb source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000007.00000003.739537983.0000000004D51000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.805767429.0000000005901000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: setupapi.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: propsys.pdbD source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: imagehlp.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: sechost.pdb( source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000007.00000003.734585712.0000000000A3F000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.736372515.000000000374C000.00000004.00000001.sdmp
                  Source: Binary string: profapi.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000007.00000003.739537983.0000000004D51000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.805767429.0000000005901000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.926884946.0000000005670000.00000004.00000040.sdmp
                  Source: Binary string: sechost.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926637905.0000000005871000.00000004.00000001.sdmp
                  Source: Binary string: oleaut32.pdbZ source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: rasman.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: propsys.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: cfgmgr32.pdbk source: WerFault.exe, 00000007.00000003.739554715.0000000004EE0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.808991952.0000000005AE2000.00000004.00000040.sdmp
                  Source: Binary string: bcrypt.pdbb source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: msctf.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: rundll32.pdb( source: WerFault.exe, 00000007.00000003.732917274.0000000000A39000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.736367252.0000000003746000.00000004.00000001.sdmp
                  Source: Binary string: TextInputFramework.pdb source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: iphlpapi.pdb}2> source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: ClusApi.pdb]S source: WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000007.00000003.739554715.0000000004EE0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.815252847.0000000005AE0000.00000004.00000040.sdmp
                  Source: Binary string: ws2_32.pdb+ source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: ws2_32.pdb?S source: WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: wwin32u.pdb!S source: WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926637905.0000000005871000.00000004.00000001.sdmp
                  Source: Binary string: sfc_os.pdbl source: WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: wimm32.pdbeS source: WerFault.exe, 00000011.00000003.926946031.0000000005678000.00000004.00000040.sdmp
                  Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000007.00000003.733841780.0000000000A4B000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.736729941.0000000003758000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.811134617.00000000012A7000.00000004.00000001.sdmp
                  Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000007.00000003.739554715.0000000004EE0000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.815252847.0000000005AE0000.00000004.00000040.sdmp, WerFault.exe, 00000011.00000003.926637905.0000000005871000.00000004.00000001.sdmp
                  Source: Binary string: combase.pdbk source: WerFault.exe, 00000011.00000003.926659853.0000000005672000.00000004.00000040.sdmp
                  Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp, WerFault.exe, 00000009.00000003.810520936.0000000005AE8000.00000004.00000040.sdmp
                  Source: Binary string: powrprof.pdbZ source: WerFault.exe, 00000007.00000003.739561126.0000000004EE6000.00000004.00000040.sdmp
                  Source: Binary string: wuser32.pdb source: WerFault.exe, 00000007.00000003.739537983.0000000004D51000.00000004.00000001.sdmp, WerFault.exe, 00000009.00000003.805767429.0000000005901000.00000004.00000001.sdmp, WerFault.exe, 00000011.00000003.926884946.0000000005670000.00000004.00000040.sdmp
                  Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_1000F6CC push esi; mov dword ptr [esp], 00000000h
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.5511794748
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion:

                  barindex
                  Tries to detect sandboxes / dynamic malware analysis system (file name check)Show sources
                  Source: C:\Windows\System32\loaddll32.exeSection loaded: \KnownDlls32\Testapp.EXE
                  Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: \KnownDlls32\Testapp.EXE
                  Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: \KnownDlls32\Testapp.EXE
                  Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: \KnownDlls32\Testapp.EXE
                  Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: \KnownDlls32\Testapp.EXE
                  Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: \KnownDlls32\Testapp.EXE
                  Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: \KnownDlls32\Testapp.EXE
                  Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: \KnownDlls32\Testapp.EXE
                  Source: C:\Windows\System32\loaddll32.exeLast function: Thread delayed
                  Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000
                  Source: WerFault.exe, 00000007.00000002.922410876.00000000012D0000.00000002.00000001.sdmp, WerFault.exe, 00000011.00000002.934188762.0000000005320000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                  Source: WerFault.exe, 00000007.00000002.927600121.0000000004A44000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
                  Source: WerFault.exe, 00000007.00000002.922410876.00000000012D0000.00000002.00000001.sdmp, WerFault.exe, 00000011.00000002.934188762.0000000005320000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                  Source: WerFault.exe, 00000007.00000002.922410876.00000000012D0000.00000002.00000001.sdmp, WerFault.exe, 00000011.00000002.934188762.0000000005320000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                  Source: WerFault.exe, 00000007.00000002.927600121.0000000004A44000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAWb
                  Source: WerFault.exe, 00000007.00000002.922410876.00000000012D0000.00000002.00000001.sdmp, WerFault.exe, 00000011.00000002.934188762.0000000005320000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                  Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_10006D50 GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',#1
                  Source: loaddll32.exe, 00000001.00000002.929674446.0000000000C90000.00000002.00000001.sdmp, rundll32.exe, 0000000F.00000002.931879093.00000000038B0000.00000002.00000001.sdmp, WerFault.exe, 00000011.00000002.932017454.0000000003890000.00000002.00000001.sdmpBinary or memory string: Program Manager
                  Source: loaddll32.exe, 00000001.00000002.929674446.0000000000C90000.00000002.00000001.sdmp, rundll32.exe, 0000000F.00000002.931879093.00000000038B0000.00000002.00000001.sdmp, WerFault.exe, 00000011.00000002.932017454.0000000003890000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                  Source: loaddll32.exe, 00000001.00000002.929674446.0000000000C90000.00000002.00000001.sdmp, rundll32.exe, 0000000F.00000002.931879093.00000000038B0000.00000002.00000001.sdmp, WerFault.exe, 00000011.00000002.932017454.0000000003890000.00000002.00000001.sdmpBinary or memory string: Progman
                  Source: loaddll32.exe, 00000001.00000002.929674446.0000000000C90000.00000002.00000001.sdmp, rundll32.exe, 0000000F.00000002.931879093.00000000038B0000.00000002.00000001.sdmp, WerFault.exe, 00000011.00000002.932017454.0000000003890000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                  Source: C:\Windows\System32\loaddll32.exeCode function: GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
                  Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_10006D50 GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,

                  Mitre Att&ck Matrix

                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection12Virtualization/Sandbox Evasion11OS Credential DumpingSecurity Software Discovery111Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection12LSASS MemoryProcess Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerVirtualization/Sandbox Evasion11SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Rundll321NTDSAccount Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing3LSA SecretsSystem Owner/User Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery11Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                  Behavior Graph

                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 404285 Sample: 3c271eae_by_Libranalysis Startdate: 04/05/2021 Architecture: WINDOWS Score: 76 28 95.138.161.226 RACKSPACE-LONGB United Kingdom 2->28 30 167.114.113.13 OVHFR Canada 2->30 32 193.200.130.181 CLOUD-MANAGEMENT-LLCUS unknown 2->32 34 Found malware configuration 2->34 36 Multi AV Scanner detection for submitted file 2->36 38 Yara detected Dridex unpacked file 2->38 40 2 other signatures 2->40 9 loaddll32.exe 1 2->9         started        signatures3 process4 signatures5 44 Tries to detect sandboxes / dynamic malware analysis system (file name check) 9->44 12 cmd.exe 1 9->12         started        14 rundll32.exe 9->14         started        17 rundll32.exe 9->17         started        19 5 other processes 9->19 process6 signatures7 21 rundll32.exe 12->21         started        46 Tries to detect sandboxes / dynamic malware analysis system (file name check) 14->46 24 WerFault.exe 8 14->24         started        process8 signatures9 42 Tries to detect sandboxes / dynamic malware analysis system (file name check) 21->42 26 WerFault.exe 23 9 21->26         started        process10

                  Screenshots

                  Thumbnails

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                  windows-stand

                  Antivirus, Machine Learning and Genetic Malware Detection

                  Initial Sample

                  SourceDetectionScannerLabelLink
                  3c271eae_by_Libranalysis.dll21%MetadefenderBrowse
                  3c271eae_by_Libranalysis.dll28%ReversingLabsWin32.Trojan.Wacatac
                  3c271eae_by_Libranalysis.dll100%Joe Sandbox ML

                  Dropped Files

                  No Antivirus matches

                  Unpacked PE Files

                  SourceDetectionScannerLabelLinkDownload
                  15.2.rundll32.exe.31b0000.2.unpack100%AviraTR/ATRAPS.Gen2Download File
                  4.2.rundll32.exe.580607.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  15.2.rundll32.exe.3180607.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  13.2.rundll32.exe.c00000.2.unpack100%AviraTR/ATRAPS.Gen2Download File
                  1.2.loaddll32.exe.580000.1.unpack100%AviraTR/ATRAPS.Gen2Download File
                  4.2.rundll32.exe.5a0000.2.unpack100%AviraTR/ATRAPS.Gen2Download File
                  13.2.rundll32.exe.be0607.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  1.2.loaddll32.exe.480607.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File

                  Domains

                  No Antivirus matches

                  URLs

                  SourceDetectionScannerLabelLink
                  http://crl.micro0%URL Reputationsafe
                  http://crl.micro0%URL Reputationsafe
                  http://crl.micro0%URL Reputationsafe
                  http://crl.micro0%URL Reputationsafe

                  Domains and IPs

                  Contacted Domains

                  No contacted domains info

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  http://crl.microWerFault.exe, 00000007.00000003.888034392.0000000004976000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown

                  Contacted IPs

                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs

                  Public

                  IPDomainCountryFlagASNASN NameMalicious
                  167.114.113.13
                  unknownCanada
                  16276OVHFRtrue
                  95.138.161.226
                  unknownUnited Kingdom
                  15395RACKSPACE-LONGBtrue
                  193.200.130.181
                  unknownunknown
                  42960CLOUD-MANAGEMENT-LLCUStrue

                  General Information

                  Joe Sandbox Version:32.0.0 Black Diamond
                  Analysis ID:404285
                  Start date:04.05.2021
                  Start time:21:33:57
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 8m 7s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:3c271eae_by_Libranalysis (renamed file extension from none to dll)
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:20
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal76.troj.evad.winDLL@20/9@0/3
                  EGA Information:Failed
                  HDC Information:
                  • Successful, ratio: 99.6% (good quality ratio 96.1%)
                  • Quality average: 77.5%
                  • Quality standard deviation: 27.4%
                  HCA Information:Failed
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  Warnings:
                  Show All
                  • Report size exceeded maximum capacity and may have missing behavior information.

                  Simulations

                  Behavior and APIs

                  TimeTypeDescription
                  21:35:33API Interceptor1x Sleep call for process: loaddll32.exe modified
                  21:36:37API Interceptor1x Sleep call for process: WerFault.exe modified

                  Joe Sandbox View / Context

                  IPs

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  167.114.113.13fc0bc077_by_Libranalysis.dllGet hashmaliciousBrowse
                    e1c88b94_by_Libranalysis.dllGet hashmaliciousBrowse
                      8743016c_by_Libranalysis.dllGet hashmaliciousBrowse
                        d8417415_by_Libranalysis.dllGet hashmaliciousBrowse
                          9a46403f_by_Libranalysis.dllGet hashmaliciousBrowse
                            edae86a8_by_Libranalysis.dllGet hashmaliciousBrowse
                              457aedfd_by_Libranalysis.dllGet hashmaliciousBrowse
                                64b8ed95_by_Libranalysis.dllGet hashmaliciousBrowse
                                  8743016c_by_Libranalysis.dllGet hashmaliciousBrowse
                                    d8417415_by_Libranalysis.dllGet hashmaliciousBrowse
                                      c977c96e_by_Libranalysis.dllGet hashmaliciousBrowse
                                        9a46403f_by_Libranalysis.dllGet hashmaliciousBrowse
                                          457aedfd_by_Libranalysis.dllGet hashmaliciousBrowse
                                            edae86a8_by_Libranalysis.dllGet hashmaliciousBrowse
                                              b8dd7ed8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                af1e75cf_by_Libranalysis.dllGet hashmaliciousBrowse
                                                  64b8ed95_by_Libranalysis.dllGet hashmaliciousBrowse
                                                    c85a75aa_by_Libranalysis.dllGet hashmaliciousBrowse
                                                      c977c96e_by_Libranalysis.dllGet hashmaliciousBrowse
                                                        b8dd7ed8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                          95.138.161.226fc0bc077_by_Libranalysis.dllGet hashmaliciousBrowse
                                                            e1c88b94_by_Libranalysis.dllGet hashmaliciousBrowse
                                                              8743016c_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                d8417415_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                  9a46403f_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                    edae86a8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                      457aedfd_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                        64b8ed95_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                          8743016c_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                            d8417415_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                              c977c96e_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                9a46403f_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                  457aedfd_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                    edae86a8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      b8dd7ed8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                        af1e75cf_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                          64b8ed95_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                            c85a75aa_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                              c977c96e_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                b8dd7ed8_by_Libranalysis.dllGet hashmaliciousBrowse

                                                                                                  Domains

                                                                                                  No context

                                                                                                  ASN

                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                  RACKSPACE-LONGBfc0bc077_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 95.138.161.226
                                                                                                  e1c88b94_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 95.138.161.226
                                                                                                  8743016c_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 95.138.161.226
                                                                                                  d8417415_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 95.138.161.226
                                                                                                  9a46403f_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 95.138.161.226
                                                                                                  edae86a8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 95.138.161.226
                                                                                                  457aedfd_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 95.138.161.226
                                                                                                  64b8ed95_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 95.138.161.226
                                                                                                  8743016c_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 95.138.161.226
                                                                                                  d8417415_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 95.138.161.226
                                                                                                  c977c96e_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 95.138.161.226
                                                                                                  9a46403f_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 95.138.161.226
                                                                                                  457aedfd_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 95.138.161.226
                                                                                                  edae86a8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 95.138.161.226
                                                                                                  b8dd7ed8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 95.138.161.226
                                                                                                  af1e75cf_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 95.138.161.226
                                                                                                  64b8ed95_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 95.138.161.226
                                                                                                  c85a75aa_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 95.138.161.226
                                                                                                  c977c96e_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 95.138.161.226
                                                                                                  b8dd7ed8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 95.138.161.226
                                                                                                  OVHFRfc0bc077_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 167.114.113.13
                                                                                                  e1c88b94_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 167.114.113.13
                                                                                                  8743016c_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 167.114.113.13
                                                                                                  d8417415_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 167.114.113.13
                                                                                                  9a46403f_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 167.114.113.13
                                                                                                  edae86a8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 167.114.113.13
                                                                                                  457aedfd_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 167.114.113.13
                                                                                                  64b8ed95_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 167.114.113.13
                                                                                                  8743016c_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 167.114.113.13
                                                                                                  d8417415_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 167.114.113.13
                                                                                                  c977c96e_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 167.114.113.13
                                                                                                  9a46403f_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 167.114.113.13
                                                                                                  457aedfd_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 167.114.113.13
                                                                                                  edae86a8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 167.114.113.13
                                                                                                  b8dd7ed8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 167.114.113.13
                                                                                                  af1e75cf_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 167.114.113.13
                                                                                                  64b8ed95_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 167.114.113.13
                                                                                                  c85a75aa_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 167.114.113.13
                                                                                                  c977c96e_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 167.114.113.13
                                                                                                  b8dd7ed8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                                  • 167.114.113.13

                                                                                                  JA3 Fingerprints

                                                                                                  No context

                                                                                                  Dropped Files

                                                                                                  No context

                                                                                                  Created / dropped Files

                                                                                                  C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_7584c961c6fefb28629a227a579a8cc1f481e81d_82810a17_1806e157\Report.wer
                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):12694
                                                                                                  Entropy (8bit):3.7717986062979705
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:192:0c+iu0oX+KH4+V/Ojed+6IR/u7soS274ItWc1:n+iYX+i4+VGjeE/u7soX4ItWc1
                                                                                                  MD5:75F38632D9FF260BCB56819547DD6FBB
                                                                                                  SHA1:A02EDD9E0202AEDCCC7B870ECA2E29E935698ACB
                                                                                                  SHA-256:666812973B8550FD61796557F2E9A4E2EC010C1B715E6DD7ED958332D51B57F5
                                                                                                  SHA-512:698D8EFCF051EF7D22D3E7BF578E411CC008ECA5D4F920A0B193BCAE426E1D798ABD474ECAF24EEA698CB89BC77F2D0B5B70BCA949CE76320A9D0C5E873B81F8
                                                                                                  Malicious:false
                                                                                                  Yara Hits:
                                                                                                  • Rule: SUSP_WER_Critical_HeapCorruption, Description: Detects a crashed application that crashed due to a heap corruption error (could be a sign of exploitation), Source: C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_7584c961c6fefb28629a227a579a8cc1f481e81d_82810a17_1806e157\Report.wer, Author: Florian Roth
                                                                                                  Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.6.4.6.3.0.5.2.6.5.1.8.0.8.1.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.6.4.6.3.0.5.7.3.1.5.8.5.6.1.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.4.d.9.a.f.f.7.-.8.9.9.1.-.4.3.7.2.-.a.2.8.6.-.5.8.5.e.f.e.9.b.e.d.e.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.d.8.4.3.5.8.0.-.7.7.9.a.-.4.a.a.0.-.9.a.e.0.-.8.7.b.3.2.4.b.1.5.d.0.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.e.8.-.0.0.0.1.-.0.0.1.b.-.c.0.3.b.-.4.9.8.7.1.c.4.1.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.
                                                                                                  C:\ProgramData\Microsoft\Windows\WER\Temp\WER7281.tmp.WERInternalMetadata.xml
                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):8384
                                                                                                  Entropy (8bit):3.691794673763851
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:192:Rrl7r3GLNiCP68F6Y856CRgmf8PHSH+pB789br4sfm+Zm:RrlsNii626Ya6CRgmf8fSNrrfs
                                                                                                  MD5:4CA231AF50018DB24F68525EDA28A25D
                                                                                                  SHA1:C5C03A27F8286F113E1585708781C594F9D86F57
                                                                                                  SHA-256:CF81629A90D17CE700AD103BC290A28B6156B2142C8AB0CC954705BB117CD120
                                                                                                  SHA-512:5FABBC55C1CB38E997B0E5AF10CCA37C216FA6860B0D0E0BED5EFE2982CD976FE27D06343C64C5E5ED765AA2AE000EC1748EF7B9D917D14BFF80710024EFDD02
                                                                                                  Malicious:false
                                                                                                  Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.3.2.<./.P.i.d.>.......
                                                                                                  C:\ProgramData\Microsoft\Windows\WER\Temp\WER98D8.tmp.WERInternalMetadata.xml
                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):8404
                                                                                                  Entropy (8bit):3.689167489165924
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:192:Rrl7r3GLNisr6qx6YrrSU9UFnAgmfbHS11+pB489b0Lsfh/cm:RrlsNiA6qx6YXSU9UVAgmfDS1G0Qfn
                                                                                                  MD5:6A5A2013C425AB5E1A296EE47760E95B
                                                                                                  SHA1:BD014537C7F303DFC9FAE9FFFC93E39B996169EF
                                                                                                  SHA-256:24AEA6C29C7171AE636CB11BE8269FE957E777CA220DE188F507B847D322D38E
                                                                                                  SHA-512:C1CC54B2504EA038A0442FC09102A9CBA49D3522DFDD0AC6445FDF9767602257D18509B31AAE1900C18B8635FFF709C6613360FB9CC09CE1917195DBF8B6761C
                                                                                                  Malicious:false
                                                                                                  Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.0.8.<./.P.i.d.>.......
                                                                                                  C:\ProgramData\Microsoft\Windows\WER\Temp\WERC42C.tmp.xml
                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):4766
                                                                                                  Entropy (8bit):4.458040817803484
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:48:cvIwSD8zssJgtWI9nwSWSC8Bu8fm8M4JCdspN4fFmYM+q8vjspN4D4SrSMd:uITfq8wzSNFJrN40YMK6N4DDWMd
                                                                                                  MD5:CFCE6C7F68663D9BCECC9DE2E0E56F57
                                                                                                  SHA1:120906F3A570C423FE36FF7DB8A5F78963F1253D
                                                                                                  SHA-256:2B1F8525289D302786B487A368C0A3641B868AB177AFC30F4F5D95F333C43D54
                                                                                                  SHA-512:DCAF2B33E00D29257FF317AAEBD31BBCB75EA6BD69D99AF7F3BFFE77C144724605D994B818B98835AFF55EF30D1CE143315D2B126CC754EE4579AF3D96FCD11F
                                                                                                  Malicious:false
                                                                                                  Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="975166" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                                  C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC9B.tmp.dmp
                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  File Type:Mini DuMP crash report, 14 streams, Tue May 4 19:35:28 2021, 0x1205a4 type
                                                                                                  Category:dropped
                                                                                                  Size (bytes):39704
                                                                                                  Entropy (8bit):2.511638543429356
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:192:xY2VfV+plojcU8k1UmYexmOB2Cau0YwpWA2qMbocIMyO7/5pLolE95CEnkH:T8mIOB9sQ1VnGE9fkH
                                                                                                  MD5:B0522D76775E87AB9A16BE8FC6766577
                                                                                                  SHA1:E233D03B8DC95C11939B2E39A2D23E8F0B9A2049
                                                                                                  SHA-256:6313076EFE4E155F9BBAF265E5B8F16A77679B0C6A1169E9565085F0BE05BC08
                                                                                                  SHA-512:5A3F0AC7E1AE6489DE90AC22EB29E102DFE38C3E7031626FE1887195EC34AD7CA78C32F02D9B72D712DAA8A92BF4F83E222ACC942CD801D1A8786189B3CCA4C8
                                                                                                  Malicious:false
                                                                                                  Preview: MDMP....... ..........`...................U...........B......P ......GenuineIntelW...........T.............`.............................0..=...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                                                  C:\ProgramData\Microsoft\Windows\WER\Temp\WERD050.tmp.dmp
                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  File Type:Mini DuMP crash report, 15 streams, Tue May 4 19:36:55 2021, 0x1205a4 type
                                                                                                  Category:dropped
                                                                                                  Size (bytes):43914
                                                                                                  Entropy (8bit):2.163692225663648
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:192:8D07syxpJvBjfX4Z3oayEOSNxNjH7AgOl91/iZJPNyEgnV4OLi8eYQ:iEPn3X4tGEVjHu3/iZJFyEgnVlLBeF
                                                                                                  MD5:6978F79D535641D19A1B57B42F98D3CF
                                                                                                  SHA1:AD0D955B282598717C7914060035CF2E2D4B8B6F
                                                                                                  SHA-256:678B0EF86E0EF380D426050251C2A96D901C89DCFBCC2829C97C0EC30F375F57
                                                                                                  SHA-512:F8CDFAAAD2AC5A5B35FC531BA298D12C1E6FBBC97C1BBC332D83BB4C3215B346171C896E255BC1725ED25DF3105E5D883CBBECA1D08569E37A1136BF74E7EBDB
                                                                                                  Malicious:false
                                                                                                  Preview: MDMP....... .......W..`...................U...........B..............GenuineIntelW...........T.............`.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                                                  C:\ProgramData\Microsoft\Windows\WER\Temp\WERD3EE.tmp.dmp
                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  File Type:Mini DuMP crash report, 15 streams, Tue May 4 19:35:55 2021, 0x1205a4 type
                                                                                                  Category:dropped
                                                                                                  Size (bytes):48580
                                                                                                  Entropy (8bit):2.370275846245078
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:192:RQ6dD5+M6KYqHMsYJOQf9KQXj2WpYI1HiR40QUwdrAh:66FPlFYd9QWpZiRf4M
                                                                                                  MD5:1EDADDD61D6F761E1106077D1E8A482D
                                                                                                  SHA1:A2501F385E335844324C116F81FD4323B111EF00
                                                                                                  SHA-256:37B0B7118AECD20FEB2DE088A80D4D01E78934262A4E0FE442AB696573315339
                                                                                                  SHA-512:63EF6233472BE0A4D36667F2A243674AC2639B47EAD1FA0DE84833D6AECEA4B3773E9C173B3897E850960435E179870837E010EF23D079963C9507BEB51D5C33
                                                                                                  Malicious:false
                                                                                                  Preview: MDMP....... ..........`...................U...........B......."......GenuineIntelW...........T.............`.............................0..=...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                                                  C:\ProgramData\Microsoft\Windows\WER\Temp\WERD537.tmp.WERInternalMetadata.xml
                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):8310
                                                                                                  Entropy (8bit):3.699514755024296
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:192:Rrl7r3GLNijB69hpi6YDZ69gKGgmfTHqSXS+prT89bnosfttm:RrlsNil6g6Yd69EgmfTHqSanbf2
                                                                                                  MD5:DD088A9627C7C0232229D89A89BB309A
                                                                                                  SHA1:C6A215BBFE7971CC7DAAA2177F9563E4239A4CE6
                                                                                                  SHA-256:FD776F06C1AA8C4D70C91759D153B8E89946C5704E07287A69EFF5AA40CB679D
                                                                                                  SHA-512:C0A587644FE8F32C9FFDD7FEF3E7752DCAE70917434CEDD34A407F94840710FA0852632A0C854A63EC789EC0CD4F4C7D5BE7A5D63D1B3878EAB15ACBAD23FC62
                                                                                                  Malicious:false
                                                                                                  Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.4.4.<./.P.i.d.>.......
                                                                                                  C:\ProgramData\Microsoft\Windows\WER\Temp\WERDCCA.tmp.xml
                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):4679
                                                                                                  Entropy (8bit):4.50896259196929
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:48:cvIwSD8zssJgtWI9nwSWSC8Bx8fm8M4JCdsUZFl+q8/3zoB4SrSnd:uITfq8wzSNUJuh4oBDWnd
                                                                                                  MD5:77804E7837340455006626E9FC1208FC
                                                                                                  SHA1:6392F3C01AFF5CE33558A75A20A88F46B60E13CE
                                                                                                  SHA-256:3249E9FC50FF6C311188077E528040983739A9EFEC790622248ED839A95D3E80
                                                                                                  SHA-512:FF2FAEE256A7BF2BB41D586098C87E6D3B1BCE667F071687D5EF1ED64E7BA180C9D07E550709924D7F715DF00E9E9E8C8521C202C6A019BDC20F3CEA69AF92CA
                                                                                                  Malicious:false
                                                                                                  Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="975166" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..

                                                                                                  Static File Info

                                                                                                  General

                                                                                                  File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                  Entropy (8bit):7.536021869806777
                                                                                                  TrID:
                                                                                                  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                                                                                  • Generic Win/DOS Executable (2004/3) 0.20%
                                                                                                  • DOS Executable Generic (2002/1) 0.20%
                                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                  File name:3c271eae_by_Libranalysis.dll
                                                                                                  File size:164864
                                                                                                  MD5:3c271eae5a3a2817cfd8704f75fdf405
                                                                                                  SHA1:03b821b5d8b5416900245a05fce8541a21b6da7c
                                                                                                  SHA256:dbd00287fe0c78430fee81ec6333b9c9b1863b7c62ac305de627ce6ca9fb314e
                                                                                                  SHA512:163821fc746739988241c8c39cde90bd479bece8d27df80916edc990957bcbf709f168de2d23704c2d01f9cfe011d4e2dd04f755834e43a423f37ff199d6497b
                                                                                                  SSDEEP:3072:sk2X+QFg3UutDvUvoU8pz6EJEEhu6Tzace9kuaGA81/YXKHML/Yp8AF:yG3rUvoU4JE/Wzan9T7B/CKsL/Yy
                                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......t.%.0zK.0zK.0zK.0zJ.}{K...3..{K.....P{K...3..zK.V....zK...1..{K......zK.Rich0zK.........................................PE..L..

                                                                                                  File Icon

                                                                                                  Icon Hash:74f0e4ecccdce0e4

                                                                                                  Static PE Info

                                                                                                  General

                                                                                                  Entrypoint:0x100241a0
                                                                                                  Entrypoint Section:.text
                                                                                                  Digitally signed:false
                                                                                                  Imagebase:0x10000000
                                                                                                  Subsystem:windows gui
                                                                                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                                                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                                                                  Time Stamp:0x60903ADD [Mon May 3 18:03:09 2021 UTC]
                                                                                                  TLS Callbacks:
                                                                                                  CLR (.Net) Version:
                                                                                                  OS Version Major:5
                                                                                                  OS Version Minor:0
                                                                                                  File Version Major:5
                                                                                                  File Version Minor:0
                                                                                                  Subsystem Version Major:5
                                                                                                  Subsystem Version Minor:0
                                                                                                  Import Hash:f108efab351dd21acb187c36805c5bbe

                                                                                                  Entrypoint Preview

                                                                                                  Instruction
                                                                                                  mov edx, eax
                                                                                                  xor eax, eax
                                                                                                  add eax, 00002233h
                                                                                                  cmpss xmm1, xmm2, 03h
                                                                                                  sub eax, 00002233h
                                                                                                  mov edx, 00000000h
                                                                                                  mov edx, 00000000h
                                                                                                  mov edx, 00000000h
                                                                                                  mov edx, 00000000h
                                                                                                  mov edx, 00000000h
                                                                                                  mov edx, 00000000h
                                                                                                  cmpss xmm1, xmm2, 03h
                                                                                                  cmp eax, 01h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h
                                                                                                  mov eax, 00000000h

                                                                                                  Rich Headers

                                                                                                  Programming Language:
                                                                                                  • [RES] VS2012 UPD3 build 60610
                                                                                                  • [LNK] VS2005 build 50727
                                                                                                  • [EXP] VS2005 build 50727
                                                                                                  • [ C ] VS2012 UPD4 build 61030
                                                                                                  • [IMP] VS2013 UPD2 build 30501

                                                                                                  Data Directories

                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x277300x55.rdata
                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x278040x59.rdata
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c0000x3a0.rsrc
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x2d0000x1220
                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x100180x38.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x250000x60.rdata
                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                                  Sections

                                                                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                  .text0x10000x233220x23400False0.759010693706data7.5511794748IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                  .rdata0x250000x2ab40x2c00False0.770774147727data7.47863118679IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  .pdata0x280000x37da0x1800False0.78564453125MMDF mailbox7.42299069747IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                                  .rsrc0x2c0000x3a00x400False0.4091796875data3.06807977608IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  .reloc0x2d0000x2580x400False0.5263671875data4.16057022331IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                                  Resources

                                                                                                  NameRVASizeTypeLanguageCountry
                                                                                                  RT_VERSION0x2c0600x33cdata

                                                                                                  Imports

                                                                                                  DLLImport
                                                                                                  msvcrt.dllmemset
                                                                                                  ADVAPI32.dllRegOverridePredefKey
                                                                                                  ole32.dllCreatePointerMoniker, CreateStreamOnHGlobal
                                                                                                  USER32.dllTranslateMessage
                                                                                                  OPENGL32.dllglTexSubImage1D
                                                                                                  KERNEL32.dllCloseHandle, OutputDebugStringA, LoadLibraryExW, CreateFileW, GetProfileSectionW, LoadLibraryW, GetProfileSectionA, OpenSemaphoreW
                                                                                                  RASAPI32.dllRasGetConnectionStatistics
                                                                                                  CLUSAPI.dllClusterEnum

                                                                                                  Exports

                                                                                                  NameOrdinalAddress
                                                                                                  LoxmtYt10x10027776

                                                                                                  Version Infos

                                                                                                  DescriptionData
                                                                                                  LegalCopyrightCopyright 2018
                                                                                                  InternalNamej2pcsc
                                                                                                  FileVersion8.0.1710.11
                                                                                                  Full Version1.8.0_171-b11
                                                                                                  CompanyNameOracle Corporation
                                                                                                  ProductNameJava(TM) Platform SE 8
                                                                                                  ProductVersion8.0.1710.11
                                                                                                  FileDescriptionJava(TM) Platform SE binary
                                                                                                  OriginalFilenamej2pcsc.dll
                                                                                                  Translation0x0000 0x04b0

                                                                                                  Network Behavior

                                                                                                  Network Port Distribution

                                                                                                  UDP Packets

                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  May 4, 2021 21:34:35.646182060 CEST4925753192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:34:35.695048094 CEST53492578.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:34:36.619018078 CEST6238953192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:34:36.675929070 CEST53623898.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:34:37.590889931 CEST4991053192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:34:37.642424107 CEST53499108.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:34:38.627485037 CEST5585453192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:34:38.694864035 CEST53558548.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:34:39.634407997 CEST6454953192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:34:39.683303118 CEST53645498.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:34:40.902494907 CEST6315353192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:34:40.953649044 CEST53631538.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:34:41.791134119 CEST5299153192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:34:41.851062059 CEST53529918.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:35:09.577428102 CEST5370053192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:35:09.636689901 CEST53537008.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:35:22.895085096 CEST5172653192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:35:22.946667910 CEST53517268.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:35:23.893019915 CEST5679453192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:35:23.941663027 CEST53567948.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:35:24.115788937 CEST5653453192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:35:24.173449039 CEST53565348.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:35:24.369587898 CEST5662753192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:35:24.421269894 CEST53566278.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:35:24.848176956 CEST5662153192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:35:24.897008896 CEST53566218.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:35:27.849965096 CEST6311653192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:35:27.903240919 CEST53631168.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:35:28.894387007 CEST6407853192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:35:28.943489075 CEST53640788.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:35:31.075033903 CEST6480153192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:35:31.132766008 CEST53648018.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:35:35.032464027 CEST6172153192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:35:35.090306997 CEST53617218.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:36:31.796969891 CEST5125553192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:36:31.850594997 CEST53512558.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:36:54.090874910 CEST6152253192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:36:54.164709091 CEST53615228.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:36:54.710374117 CEST5233753192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:36:54.767467976 CEST53523378.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:36:55.370351076 CEST5504653192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:36:55.429548025 CEST53550468.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:36:55.634057045 CEST4961253192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:36:55.682674885 CEST53496128.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:36:56.027462959 CEST4928553192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:36:56.106272936 CEST53492858.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:36:56.370352030 CEST5060153192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:36:56.422004938 CEST53506018.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:36:56.621062994 CEST6087553192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:36:56.672678947 CEST53608758.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:36:57.153110027 CEST5644853192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:36:57.210335970 CEST53564488.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:36:57.940107107 CEST5917253192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:36:57.989761114 CEST53591728.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:36:58.368457079 CEST6242053192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:36:58.428806067 CEST53624208.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:36:59.122390985 CEST6057953192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:36:59.181828976 CEST53605798.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:36:59.529014111 CEST5018353192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:36:59.582263947 CEST53501838.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:37:00.578830957 CEST6153153192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:37:00.627633095 CEST53615318.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:37:02.029840946 CEST4922853192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:37:02.078680992 CEST53492288.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:37:02.486991882 CEST5979453192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:37:02.545442104 CEST53597948.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:37:03.277573109 CEST5591653192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:37:03.327300072 CEST53559168.8.8.8192.168.2.4
                                                                                                  May 4, 2021 21:37:04.499383926 CEST5275253192.168.2.48.8.8.8
                                                                                                  May 4, 2021 21:37:04.548968077 CEST53527528.8.8.8192.168.2.4

                                                                                                  DNS Answers

                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                  May 4, 2021 21:35:24.173449039 CEST8.8.8.8192.168.2.40xdc84No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.akadns.netCNAME (Canonical name)IN (0x0001)
                                                                                                  May 4, 2021 21:36:54.164709091 CEST8.8.8.8192.168.2.40x6081No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.akadns.netCNAME (Canonical name)IN (0x0001)
                                                                                                  May 4, 2021 21:36:54.767467976 CEST8.8.8.8192.168.2.40xd8ddNo error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.akadns.netCNAME (Canonical name)IN (0x0001)
                                                                                                  May 4, 2021 21:36:55.429548025 CEST8.8.8.8192.168.2.40x9a4bNo error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.akadns.netCNAME (Canonical name)IN (0x0001)
                                                                                                  May 4, 2021 21:36:56.106272936 CEST8.8.8.8192.168.2.40xb57fNo error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.akadns.netCNAME (Canonical name)IN (0x0001)

                                                                                                  Code Manipulations

                                                                                                  Statistics

                                                                                                  Behavior

                                                                                                  Click to jump to process

                                                                                                  System Behavior

                                                                                                  General

                                                                                                  Start time:21:34:40
                                                                                                  Start date:04/05/2021
                                                                                                  Path:C:\Windows\System32\loaddll32.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:loaddll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll'
                                                                                                  Imagebase:0x8d0000
                                                                                                  File size:116736 bytes
                                                                                                  MD5 hash:542795ADF7CC08EFCF675D65310596E8
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000001.00000002.929835817.0000000010001000.00000020.00020000.sdmp, Author: Joe Security
                                                                                                  Reputation:high

                                                                                                  General

                                                                                                  Start time:21:34:41
                                                                                                  Start date:04/05/2021
                                                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',#1
                                                                                                  Imagebase:0x11d0000
                                                                                                  File size:232960 bytes
                                                                                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  General

                                                                                                  Start time:21:34:41
                                                                                                  Start date:04/05/2021
                                                                                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:rundll32.exe C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll,LoxmtYt
                                                                                                  Imagebase:0xd70000
                                                                                                  File size:61952 bytes
                                                                                                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  General

                                                                                                  Start time:21:34:41
                                                                                                  Start date:04/05/2021
                                                                                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',#1
                                                                                                  Imagebase:0xd70000
                                                                                                  File size:61952 bytes
                                                                                                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000004.00000002.933327968.0000000010001000.00000020.00020000.sdmp, Author: Joe Security
                                                                                                  Reputation:high

                                                                                                  General

                                                                                                  Start time:21:35:23
                                                                                                  Start date:04/05/2021
                                                                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7144 -s 760
                                                                                                  Imagebase:0x13c0000
                                                                                                  File size:434592 bytes
                                                                                                  MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  General

                                                                                                  Start time:21:35:25
                                                                                                  Start date:04/05/2021
                                                                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7132 -s 928
                                                                                                  Imagebase:0x13c0000
                                                                                                  File size:434592 bytes
                                                                                                  MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  General

                                                                                                  Start time:21:35:29
                                                                                                  Start date:04/05/2021
                                                                                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',DllCanUnloadNow
                                                                                                  Imagebase:0xd70000
                                                                                                  File size:61952 bytes
                                                                                                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  General

                                                                                                  Start time:21:35:29
                                                                                                  Start date:04/05/2021
                                                                                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',DllGetClassObject
                                                                                                  Imagebase:0xd70000
                                                                                                  File size:61952 bytes
                                                                                                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  General

                                                                                                  Start time:21:35:30
                                                                                                  Start date:04/05/2021
                                                                                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',WdiAddFileToInstance
                                                                                                  Imagebase:0xd70000
                                                                                                  File size:61952 bytes
                                                                                                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000D.00000002.932757910.0000000010001000.00000020.00020000.sdmp, Author: Joe Security
                                                                                                  Reputation:high

                                                                                                  General

                                                                                                  Start time:21:35:32
                                                                                                  Start date:04/05/2021
                                                                                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',WdiAddParameter
                                                                                                  Imagebase:0xd70000
                                                                                                  File size:61952 bytes
                                                                                                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  General

                                                                                                  Start time:21:35:33
                                                                                                  Start date:04/05/2021
                                                                                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:rundll32.exe 'C:\Users\user\Desktop\3c271eae_by_Libranalysis.dll',WdiCancel
                                                                                                  Imagebase:0xd70000
                                                                                                  File size:61952 bytes
                                                                                                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000F.00000002.933498628.0000000010001000.00000020.00020000.sdmp, Author: Joe Security

                                                                                                  General

                                                                                                  Start time:21:35:34
                                                                                                  Start date:04/05/2021
                                                                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 588
                                                                                                  Imagebase:0x13c0000
                                                                                                  File size:434592 bytes
                                                                                                  MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language

                                                                                                  Disassembly

                                                                                                  Code Analysis

                                                                                                  Reset < >