Loading ...

Play interactive tourEdit tour

Windows Analysis Report SecuriteInfo.com.Trojan.Win32.Save.a.28377.26991

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.Win32.Save.a.28377.26991 (renamed file extension from 26991 to dll)
Analysis ID:510679
MD5:2228471d39760f9a389ac95f71b671a9
SHA1:38b7d35e72c995ca526e293af9d448a7a8011df6
SHA256:a9238550f705b9668a390a9e7b9e4dec6a88daec2c8acca19ffa10af328d594d
Tags:dll
Infos:

Most interesting Screenshot:

Detection

Dridex
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected Dridex unpacked file
Multi AV Scanner detection for submitted file
Tries to delay execution (extensive OutputDebugStringW loop)
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
Antivirus or Machine Learning detection for unpacked file
Sample file is different than original file name gathered from version info
One or more processes crash
Contains functionality to query locales information (e.g. system language)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Launches processes in debugging mode, may be used to hinder debugging
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Abnormal high CPU Usage

Classification

Process Tree

  • System is w10x64
  • loaddll32.exe (PID: 6900 cmdline: loaddll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll' MD5: 72FCD8FB0ADC38ED9050569AD673650E)
    • cmd.exe (PID: 6920 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 6940 cmdline: rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6928 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll,FFRgpmdlwwWde MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6284 cmdline: rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',CheckTrust MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6360 cmdline: rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DllCanUnloadNow MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 1496 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 664 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
      • WerFault.exe (PID: 6208 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 664 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 6368 cmdline: rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DllGetClassObject MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 6188 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6368 -s 664 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
      • WerFault.exe (PID: 3096 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6368 -s 664 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 6396 cmdline: rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DownloadFile MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 492 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6396 -s 664 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
      • WerFault.exe (PID: 5128 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6396 -s 664 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 6372 cmdline: rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',GetICifFileFromFile MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 6756 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6372 -s 668 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
      • WerFault.exe (PID: 6832 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6372 -s 668 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

Threatname: Dridex

{"Version": 22201, "C2 list": ["149.202.179.100:443", "66.147.235.11:6891", "81.0.236.89:13786"], "RC4 keys": ["9fRysqcdPgZffBlroqJaZHyCvLvD6BUV", "ranVAwtYINZG8jFJSjh5rR8jx3HIZIvSCern79nVFUhfeb2NvJlOKPsGO1osGE0VchV9bFDjym"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000B.00000002.1035624541.000000006E3E1000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
    0000000D.00000000.987956861.000000006E3E1000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
      0000000C.00000000.994333944.000000006E3E1000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
        0000000A.00000002.1035258572.000000006E3E1000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
          0000000A.00000000.993496871.000000006E3E1000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
            Click to see the 10 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            12.0.rundll32.exe.6e3e0000.2.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
              3.2.rundll32.exe.6e3e0000.2.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
                12.0.rundll32.exe.6e3e0000.5.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
                  13.2.rundll32.exe.6e3e0000.2.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
                    10.0.rundll32.exe.6e3e0000.2.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
                      Click to see the 10 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 3.2.rundll32.exe.6e3e0000.2.unpackMalware Configuration Extractor: Dridex {"Version": 22201, "C2 list": ["149.202.179.100:443", "66.147.235.11:6891", "81.0.236.89:13786"], "RC4 keys": ["9fRysqcdPgZffBlroqJaZHyCvLvD6BUV", "ranVAwtYINZG8jFJSjh5rR8jx3HIZIvSCern79nVFUhfeb2NvJlOKPsGO1osGE0VchV9bFDjym"]}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllVirustotal: Detection: 20%Perma Link
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllReversingLabs: Detection: 28%
                      Machine Learning detection for sampleShow sources
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllJoe Sandbox ML: detected
                      Source: 12.2.rundll32.exe.a00000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 13.0.rundll32.exe.af4756.4.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 12.0.rundll32.exe.b94756.4.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 11.0.rundll32.exe.b10000.3.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 2.0.rundll32.exe.3494756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 8.2.rundll32.exe.ba0000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 10.2.rundll32.exe.c30000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 0.0.loaddll32.exe.29b4756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 12.0.rundll32.exe.b94756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 13.2.rundll32.exe.af4756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 2.0.rundll32.exe.31d0000.3.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 10.0.rundll32.exe.c30000.3.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 0.0.loaddll32.exe.b50000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 10.0.rundll32.exe.c30000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 10.0.rundll32.exe.4834756.4.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 2.0.rundll32.exe.3494756.4.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 13.0.rundll32.exe.5f0000.3.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 13.0.rundll32.exe.af4756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 3.2.rundll32.exe.d54756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 10.2.rundll32.exe.4834756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 12.0.rundll32.exe.a00000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 13.0.rundll32.exe.5f0000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 8.2.rundll32.exe.4a34756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 11.2.rundll32.exe.b10000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 11.0.rundll32.exe.b10000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 12.2.rundll32.exe.b94756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 10.0.rundll32.exe.4834756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 11.0.rundll32.exe.46a4756.4.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 2.0.rundll32.exe.31d0000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 11.0.rundll32.exe.46a4756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 11.2.rundll32.exe.46a4756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 12.0.rundll32.exe.a00000.3.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 13.2.rundll32.exe.5f0000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 3.2.rundll32.exe.7b0000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: rpidebbfll.pdb source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll
                      Source: Binary string: wntdll.pdbUGP source: rundll32.exe, 00000003.00000003.767505447.000000004B280000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000003.970192340.000000004B280000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: rundll32.exe, 00000003.00000003.767505447.000000004B280000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000003.970192340.000000004B280000.00000004.00000001.sdmp

                      Networking:

                      barindex
                      C2 URLs / IPs found in malware configurationShow sources
                      Source: Malware configuration extractorIPs: 149.202.179.100:443
                      Source: Malware configuration extractorIPs: 66.147.235.11:6891
                      Source: Malware configuration extractorIPs: 81.0.236.89:13786
                      Source: Joe Sandbox ViewASN Name: HOSTROCKETUS HOSTROCKETUS
                      Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                      Source: Joe Sandbox ViewIP Address: 66.147.235.11 66.147.235.11
                      Source: Joe Sandbox ViewIP Address: 149.202.179.100 149.202.179.100
                      Source: Joe Sandbox ViewIP Address: 81.0.236.89 81.0.236.89
                      Source: Amcache.hve.19.drString found in binary or memory: http://upx.sf.net
                      Source: rundll32.exe, 00000002.00000000.781548124.000000006E3FF000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.1190943061.000000006E3FF000.00000002.00020000.sdmp, rundll32.exe, 00000008.00000002.1189802780.000000006E3FF000.00000002.00020000.sdmp, rundll32.exe, 0000000A.00000002.1035376987.000000006E3FF000.00000002.00020000.sdmp, rundll32.exe, 0000000B.00000002.1035904944.000000006E3FF000.00000002.00020000.sdmp, rundll32.exe, 0000000C.00000000.995381831.000000006E3FF000.00000002.00020000.sdmp, rundll32.exe, 0000000D.00000000.988409639.000000006E3FF000.00000002.00020000.sdmpString found in binary or memory: http://www.vomfass.deDVarFileInfo$
                      Source: loaddll32.exe, 00000000.00000000.784880037.0000000000CAB000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                      E-Banking Fraud:

                      barindex
                      Yara detected Dridex unpacked fileShow sources
                      Source: Yara matchFile source: 12.0.rundll32.exe.6e3e0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.6e3e0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.0.rundll32.exe.6e3e0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.6e3e0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.0.rundll32.exe.6e3e0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.0.rundll32.exe.6e3e0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.rundll32.exe.6e3e0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.0.rundll32.exe.6e3e0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.6e3e0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.6e3e0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.0.rundll32.exe.6e3e0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.0.rundll32.exe.6e3e0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.6e3e0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.6e3e0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.0.rundll32.exe.6e3e0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000B.00000002.1035624541.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000000.987956861.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000000.994333944.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.1035258572.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000000.993496871.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000000.984331787.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000000.984417816.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.1038712080.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000000.983061292.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.1189742876.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.781525113.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000000.1005884089.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.1038939767.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000000.993970485.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1190711259.000000006E3E1000.00000020.00020000.sdmp, type: MEMORY
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllBinary or memory string: OriginalFilenameddlb.dll vs SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 664
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E3F0754
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E3F9348
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E3E846C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E3F1460
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E3E1494
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E3EA52C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E3F1D58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E3F223C NtDelayExecution,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E3F2840 NtAllocateVirtualMemory,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E3EBB88 NtClose,
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess Stats: CPU usage > 98%
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllVirustotal: Detection: 20%
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllReversingLabs: Detection: 28%
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll,FFRgpmdlwwWde
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll'
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll,FFRgpmdlwwWde
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',CheckTrust
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DllCanUnloadNow
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DllGetClassObject
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DownloadFile
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',GetICifFileFromFile
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 664
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6368 -s 664
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 664
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6396 -s 664
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6368 -s 664
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6396 -s 664
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6372 -s 668
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6372 -s 668
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll,FFRgpmdlwwWde
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',CheckTrust
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DllCanUnloadNow
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DllGetClassObject
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DownloadFile
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',GetICifFileFromFile
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',#1
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 664
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6368 -s 664
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6396 -s 664
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6372 -s 668
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.26991Joe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6360
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6372
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6396
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6368
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERA838.tmpJump to behavior
                      Source: classification engineClassification label: mal76.troj.evad.winDLL@33/18@0/4
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllStatic file information: File size 1093632 > 1048576
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: rpidebbfll.pdb source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll
                      Source: Binary string: wntdll.pdbUGP source: rundll32.exe, 00000003.00000003.767505447.000000004B280000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000003.970192340.000000004B280000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: rundll32.exe, 00000003.00000003.767505447.000000004B280000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000003.970192340.000000004B280000.00000004.00000001.sdmp
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E3EF6CC push esi; mov dword ptr [esp], 00000000h
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Tries to delay execution (extensive OutputDebugStringW loop)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: OutputDebugStringW count: 1328
                      Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 775
                      Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 553
                      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E3F0754 GetTokenInformation,GetSystemInfo,GetTokenInformation,
                      Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000
                      Source: Amcache.hve.19.drBinary or memory string: VMware
                      Source: Amcache.hve.19.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
                      Source: Amcache.hve.19.drBinary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
                      Source: Amcache.hve.19.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.19.drBinary or memory string: VMware-42 35 9c fb 73 fa 4e 1b-fb a4 60 e7 7b e5 4a ed
                      Source: Amcache.hve.19.drBinary or memory string: VMware, Inc.
                      Source: Amcache.hve.19.drBinary or memory string: VMware Virtual disk SCSI Disk Devicehbin
                      Source: Amcache.hve.19.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.19.drBinary or memory string: VMware7,1
                      Source: Amcache.hve.19.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.19.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: Amcache.hve.19.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.13989454.B64.1906190538,BiosReleaseDate:06/19/2019,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: Amcache.hve.19.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.19.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.19.drBinary or memory string: VMware, Inc.me
                      Source: Amcache.hve.19.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
                      Source: Amcache.hve.19.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E3E6D50 GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 664
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E3F3110 RtlAddVectoredExceptionHandler,
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',#1
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 664
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6368 -s 664
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6396 -s 664
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6372 -s 668
                      Source: loaddll32.exe, 00000000.00000000.785466510.00000000013D0000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.777476056.00000000038A0000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.1190029218.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 00000008.00000002.1189390611.0000000003550000.00000002.00020000.sdmp, rundll32.exe, 0000000A.00000000.976153441.0000000003350000.00000002.00020000.sdmp, rundll32.exe, 0000000B.00000000.979526416.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 0000000C.00000000.991964512.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 0000000D.00000000.987813290.00000000031C0000.00000002.00020000.sdmpBinary or memory string: Program Manager
                      Source: loaddll32.exe, 00000000.00000000.785466510.00000000013D0000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.777476056.00000000038A0000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.1190029218.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 00000008.00000002.1189390611.0000000003550000.00000002.00020000.sdmp, rundll32.exe, 0000000A.00000000.976153441.0000000003350000.00000002.00020000.sdmp, rundll32.exe, 0000000B.00000000.979526416.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 0000000C.00000000.991964512.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 0000000D.00000000.987813290.00000000031C0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: loaddll32.exe, 00000000.00000000.785466510.00000000013D0000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.777476056.00000000038A0000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.1190029218.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 00000008.00000002.1189390611.0000000003550000.00000002.00020000.sdmp, rundll32.exe, 0000000A.00000000.976153441.0000000003350000.00000002.00020000.sdmp, rundll32.exe, 0000000B.00000000.979526416.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 0000000C.00000000.991964512.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 0000000D.00000000.987813290.00000000031C0000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: loaddll32.exe, 00000000.00000000.785466510.00000000013D0000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.777476056.00000000038A0000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.1190029218.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 00000008.00000002.1189390611.0000000003550000.00000002.00020000.sdmp, rundll32.exe, 0000000A.00000000.976153441.0000000003350000.00000002.00020000.sdmp, rundll32.exe, 0000000B.00000000.979526416.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 0000000C.00000000.991964512.00000000031C0000.00000002.00020000.sdmp, rundll32.exe, 0000000D.00000000.987813290.00000000031C0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E3E6D50 GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
                      Source: Amcache.hve.19.drBinary or memory string: c:\program files\windows defender\msmpeng.exe

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection12Disable or Modify Tools1Input Capture1Security Software Discovery21Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion11LSASS MemoryProcess Discovery1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection12Security Account ManagerVirtualization/Sandbox Evasion11SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptRundll321LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing1Cached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Information Discovery13Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 510679 Sample: SecuriteInfo.com.Trojan.Win... Startdate: 28/10/2021 Architecture: WINDOWS Score: 76 36 149.202.179.100 OVHFR France 2->36 38 66.147.235.11 HOSTROCKETUS United States 2->38 40 81.0.236.89 CASABLANCA-ASInternetCollocationProviderCZ Czech Republic 2->40 44 Found malware configuration 2->44 46 Multi AV Scanner detection for submitted file 2->46 48 Yara detected Dridex unpacked file 2->48 50 2 other signatures 2->50 8 loaddll32.exe 1 2->8         started        signatures3 process4 process5 10 rundll32.exe 8->10         started        13 rundll32.exe 8->13         started        15 rundll32.exe 8->15         started        17 4 other processes 8->17 signatures6 52 Tries to delay execution (extensive OutputDebugStringW loop) 10->52 19 WerFault.exe 2 9 13->19         started        22 WerFault.exe 13->22         started        24 WerFault.exe 9 15->24         started        26 WerFault.exe 15->26         started        28 WerFault.exe 23 9 17->28         started        30 WerFault.exe 9 17->30         started        32 rundll32.exe 17->32         started        34 2 other processes 17->34 process7 dnsIp8 42 192.168.2.1 unknown unknown 19->42

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll21%VirustotalBrowse
                      SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll29%ReversingLabsWin32.Trojan.Drixed
                      SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      12.2.rundll32.exe.a00000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      13.0.rundll32.exe.af4756.4.unpack100%AviraTR/Patched.Ren.GenDownload File
                      12.0.rundll32.exe.b94756.4.unpack100%AviraTR/Patched.Ren.GenDownload File
                      11.0.rundll32.exe.b10000.3.unpack100%AviraTR/ATRAPS.Gen2Download File
                      3.2.rundll32.exe.6e3e0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      2.0.rundll32.exe.3494756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      10.0.rundll32.exe.6e3e0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      8.2.rundll32.exe.ba0000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      10.2.rundll32.exe.c30000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      0.0.loaddll32.exe.29b4756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      12.0.rundll32.exe.b94756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      13.2.rundll32.exe.af4756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      2.0.rundll32.exe.31d0000.3.unpack100%AviraTR/ATRAPS.Gen2Download File
                      8.2.rundll32.exe.6e3e0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      10.0.rundll32.exe.c30000.3.unpack100%AviraTR/ATRAPS.Gen2Download File
                      0.0.loaddll32.exe.b50000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      12.0.rundll32.exe.6e3e0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      10.0.rundll32.exe.c30000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      10.0.rundll32.exe.4834756.4.unpack100%AviraTR/Patched.Ren.GenDownload File
                      2.0.rundll32.exe.3494756.4.unpack100%AviraTR/Patched.Ren.GenDownload File
                      12.0.rundll32.exe.6e3e0000.5.unpack100%AviraHEUR/AGEN.1144420Download File
                      13.0.rundll32.exe.5f0000.3.unpack100%AviraTR/ATRAPS.Gen2Download File
                      13.0.rundll32.exe.af4756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      3.2.rundll32.exe.d54756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      13.2.rundll32.exe.6e3e0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      10.2.rundll32.exe.4834756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      12.0.rundll32.exe.a00000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      13.0.rundll32.exe.5f0000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      11.0.rundll32.exe.6e3e0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      13.0.rundll32.exe.6e3e0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      8.2.rundll32.exe.4a34756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      11.2.rundll32.exe.6e3e0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      11.2.rundll32.exe.b10000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      11.0.rundll32.exe.b10000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      12.2.rundll32.exe.b94756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      11.0.rundll32.exe.6e3e0000.5.unpack100%AviraHEUR/AGEN.1144420Download File
                      10.2.rundll32.exe.6e3e0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      10.0.rundll32.exe.4834756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      11.0.rundll32.exe.46a4756.4.unpack100%AviraTR/Patched.Ren.GenDownload File
                      2.0.rundll32.exe.31d0000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      11.0.rundll32.exe.46a4756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      11.2.rundll32.exe.46a4756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      12.0.rundll32.exe.a00000.3.unpack100%AviraTR/ATRAPS.Gen2Download File
                      13.0.rundll32.exe.6e3e0000.5.unpack100%AviraHEUR/AGEN.1144420Download File
                      10.0.rundll32.exe.6e3e0000.5.unpack100%AviraHEUR/AGEN.1144420Download File
                      13.2.rundll32.exe.5f0000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      3.2.rundll32.exe.7b0000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      12.2.rundll32.exe.6e3e0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      2.0.rundll32.exe.6e3e0000.2.unpack100%AviraHEUR/AGEN.1144420Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://www.vomfass.deDVarFileInfo$0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      No contacted domains info

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://upx.sf.netAmcache.hve.19.drfalse
                        high
                        http://www.vomfass.deDVarFileInfo$rundll32.exe, 00000002.00000000.781548124.000000006E3FF000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.1190943061.000000006E3FF000.00000002.00020000.sdmp, rundll32.exe, 00000008.00000002.1189802780.000000006E3FF000.00000002.00020000.sdmp, rundll32.exe, 0000000A.00000002.1035376987.000000006E3FF000.00000002.00020000.sdmp, rundll32.exe, 0000000B.00000002.1035904944.000000006E3FF000.00000002.00020000.sdmp, rundll32.exe, 0000000C.00000000.995381831.000000006E3FF000.00000002.00020000.sdmp, rundll32.exe, 0000000D.00000000.988409639.000000006E3FF000.00000002.00020000.sdmpfalse
                        • Avira URL Cloud: safe
                        low

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        66.147.235.11
                        unknownUnited States
                        23535HOSTROCKETUStrue
                        149.202.179.100
                        unknownFrance
                        16276OVHFRtrue
                        81.0.236.89
                        unknownCzech Republic
                        15685CASABLANCA-ASInternetCollocationProviderCZtrue

                        Private

                        IP
                        192.168.2.1

                        General Information

                        Joe Sandbox Version:33.0.0 White Diamond
                        Analysis ID:510679
                        Start date:28.10.2021
                        Start time:04:41:51
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 9m 33s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:SecuriteInfo.com.Trojan.Win32.Save.a.28377.26991 (renamed file extension from 26991 to dll)
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:27
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal76.troj.evad.winDLL@33/18@0/4
                        EGA Information:Failed
                        HDC Information:
                        • Successful, ratio: 95.1% (good quality ratio 91%)
                        • Quality average: 78.6%
                        • Quality standard deviation: 27.5%
                        HCA Information:
                        • Successful, ratio: 83%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Override analysis time to 240s for rundll32
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, WerFault.exe, RuntimeBroker.exe, backgroundTaskHost.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 23.211.6.115, 20.50.102.62, 20.189.173.22, 20.42.73.29, 20.189.173.20, 52.182.143.212
                        • Excluded domains from analysis (whitelisted): e12564.dspb.akamaiedge.net, onedsblobprdcus15.centralus.cloudapp.azure.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, onedsblobprdwus17.westus.cloudapp.azure.com, onedsblobprdwus15.westus.cloudapp.azure.com, store-images.s-microsoft.com-c.edgekey.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, arc.msn.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.

                        Simulations

                        Behavior and APIs

                        TimeTypeDescription
                        04:43:40API Interceptor1x Sleep call for process: loaddll32.exe modified
                        04:45:33API Interceptor4x Sleep call for process: WerFault.exe modified

                        Joe Sandbox View / Context

                        IPs

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        66.147.235.11SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                          SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                            Early_Access.-3878_20211027.xlsbGet hashmaliciousBrowse
                              ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                  Casting Invite.-859403670_20211027.xlsbGet hashmaliciousBrowse
                                    149.202.179.100SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                      SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                        Early_Access.-3878_20211027.xlsbGet hashmaliciousBrowse
                                          ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                            ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                              Casting Invite.-859403670_20211027.xlsbGet hashmaliciousBrowse
                                                81.0.236.89SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                                  SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                                    Early_Access.-3878_20211027.xlsbGet hashmaliciousBrowse
                                                      ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                                        ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                                          Casting Invite.-859403670_20211027.xlsbGet hashmaliciousBrowse

                                                            Domains

                                                            No context

                                                            ASN

                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                            HOSTROCKETUSSecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                                            • 66.147.235.11
                                                            SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                                            • 66.147.235.11
                                                            Early_Access.-3878_20211027.xlsbGet hashmaliciousBrowse
                                                            • 66.147.235.11
                                                            ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                                            • 66.147.235.11
                                                            ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                                            • 66.147.235.11
                                                            Casting Invite.-859403670_20211027.xlsbGet hashmaliciousBrowse
                                                            • 66.147.235.11
                                                            s1uOMLvpO4.exeGet hashmaliciousBrowse
                                                            • 216.120.236.127
                                                            WGs54P9e8aGet hashmaliciousBrowse
                                                            • 216.120.241.108
                                                            ba2Eq178BGXyW5T.exeGet hashmaliciousBrowse
                                                            • 216.120.237.68
                                                            4TXvMuUjTxE2kqz.exeGet hashmaliciousBrowse
                                                            • 66.147.239.119
                                                            Requirements-oct_2020.exeGet hashmaliciousBrowse
                                                            • 66.147.239.119
                                                            JESEE FRIED FIRDAY.exeGet hashmaliciousBrowse
                                                            • 66.147.239.119
                                                            Scan_0884218630071 Bank Swift.exeGet hashmaliciousBrowse
                                                            • 66.147.239.119
                                                            BANK ACCOUNT DETAILS ATTACHED.pdf.exeGet hashmaliciousBrowse
                                                            • 66.147.239.119
                                                            XYmX3bLQJ9.xlsGet hashmaliciousBrowse
                                                            • 66.147.238.141
                                                            payment730.xlsGet hashmaliciousBrowse
                                                            • 66.147.238.141
                                                            Inf328.xlsGet hashmaliciousBrowse
                                                            • 66.147.238.141
                                                            OVHFRSecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                                            • 149.202.179.100
                                                            SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                                            • 149.202.179.100
                                                            protocol-1096018033.xlsGet hashmaliciousBrowse
                                                            • 192.99.46.215
                                                            protocol-1096018033.xlsGet hashmaliciousBrowse
                                                            • 192.99.46.215
                                                            arm7Get hashmaliciousBrowse
                                                            • 8.33.207.78
                                                            #U0191ACTU#U0156A_wfpqacDkwlb__Z2676679.vbsGet hashmaliciousBrowse
                                                            • 144.217.33.249
                                                            Byov62cXa1.exeGet hashmaliciousBrowse
                                                            • 94.23.24.82
                                                            Early_Access.-3878_20211027.xlsbGet hashmaliciousBrowse
                                                            • 149.202.179.100
                                                            ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                                            • 149.202.179.100
                                                            ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                                            • 149.202.179.100
                                                            Casting Invite.-859403670_20211027.xlsbGet hashmaliciousBrowse
                                                            • 149.202.179.100
                                                            lyVSOhLA7o.dllGet hashmaliciousBrowse
                                                            • 51.210.102.137
                                                            protocol-1441399238.xlsGet hashmaliciousBrowse
                                                            • 192.99.46.215
                                                            protocol-1441399238.xlsGet hashmaliciousBrowse
                                                            • 192.99.46.215
                                                            protocol-1086855687.xlsGet hashmaliciousBrowse
                                                            • 192.99.46.215
                                                            protocol-1086855687.xlsGet hashmaliciousBrowse
                                                            • 192.99.46.215
                                                            New order payment.exeGet hashmaliciousBrowse
                                                            • 51.210.240.92
                                                            v2c.exeGet hashmaliciousBrowse
                                                            • 5.39.3.130
                                                            2jFfKOEefN.exeGet hashmaliciousBrowse
                                                            • 213.186.33.5
                                                            payment advice0272110.exeGet hashmaliciousBrowse
                                                            • 54.38.220.85

                                                            JA3 Fingerprints

                                                            No context

                                                            Dropped Files

                                                            No context

                                                            Created / dropped Files

                                                            C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_100fb986e1756f46c39bcd29fe4136c1b062e4_82810a17_1812e8eb\Report.wer
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):0.9147263722763317
                                                            Encrypted:false
                                                            SSDEEP:192:h6a9i80oXnHBUZMX4jed+n/u7sKS274ItWc:p9iaXHBUZMX4jeS/u7sKX4ItWc
                                                            MD5:E7E14D8C061DD05DC23D7E06247D5932
                                                            SHA1:4BBEF54B65651171070EAC7C1584732406BDB9A9
                                                            SHA-256:72F32F940ECCD8629347414C2481CB0FA6614B4AF00A8882998DA74FDF9FAE10
                                                            SHA-512:F820906248994889BEE0469314E2A2AEEA11C39DB496528E5492C61C958BFEE24CF6ED8C091FCD36A1C52FF62C46084B33AEA66D6D0D6ACF5565863F10BDC3AC
                                                            Malicious:false
                                                            Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.7.9.8.6.2.7.2.1.3.5.7.4.5.9.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.7.9.8.6.2.7.3.2.2.1.6.7.7.2.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.e.0.3.5.9.1.4.-.b.e.6.3.-.4.c.0.4.-.9.e.2.b.-.c.0.8.9.9.8.5.f.d.0.0.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.9.5.8.9.1.e.0.-.e.c.e.b.-.4.b.1.d.-.8.2.6.e.-.4.a.d.b.0.c.1.6.e.5.0.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.e.0.-.0.0.0.1.-.0.0.1.b.-.9.1.2.e.-.2.b.9.d.a.5.c.b.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
                                                            C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_23f57899179e2315822a274bdb180af5dd610e5_82810a17_1436f4b3\Report.wer
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):0.9147510970983889
                                                            Encrypted:false
                                                            SSDEEP:192:m/Ufciy0oXsHBUZMX4jed+n/u7sKS274ItWc:LciUX0BUZMX4jeS/u7sKX4ItWc
                                                            MD5:5FBFD61F5C65BC128B8C50947A20D1A7
                                                            SHA1:4440B407AD28F21566A08A3097F789BA487C85AC
                                                            SHA-256:A0F6E7E599D8AD0A18E6B548AF1CE99293F8DBE73127B86E62CB1DFC39606979
                                                            SHA-512:C33B888DBFE6D21A16CDA6C2483E15076703BD82970E95522EBDB74B79BF4D2AA9E8A486B3BF9399ABF21A6D6A2DAE27B1072C54A160460DF7A61C6A5F970941
                                                            Malicious:false
                                                            Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.7.9.8.6.2.7.2.6.2.8.2.6.4.0.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.7.9.8.6.2.7.3.7.1.2.6.3.4.9.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.f.4.3.1.6.c.5.-.b.0.c.1.-.4.6.b.d.-.9.6.e.7.-.3.2.b.b.0.4.2.7.3.2.f.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.8.2.a.a.f.2.1.-.e.9.0.4.-.4.d.a.2.-.a.f.6.5.-.6.9.9.0.d.5.0.b.8.5.9.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.f.c.-.0.0.0.1.-.0.0.1.b.-.1.f.f.3.-.6.5.9.d.a.5.c.b.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
                                                            C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_c06c6d9b89f48a8a0e6e4feba1443adadff228e_82810a17_05e6e1d6\Report.wer
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):0.9148494104496225
                                                            Encrypted:false
                                                            SSDEEP:192:ETiM0oXzHBUZMX4jed+n/u7sKS274ItWc:QiKXzBUZMX4jeS/u7sKX4ItWc
                                                            MD5:E2AFAEE51560E1FF51718BA40A62F62C
                                                            SHA1:AC1339867659160152C5E19070BA2244E4E2A5F6
                                                            SHA-256:C969D1CDC6D94FC001BA102F16126CB0C409F1BED816F85BF7122B205CC7219B
                                                            SHA-512:129B4F7024186A677D8240F191F97CD95ED17CAB39656FDF618D54CC5BDC0C53F4C684239A5ADB796F639337DAE439F5C445FB6C3A03E7CB9F128E2098628C78
                                                            Malicious:false
                                                            Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.7.9.8.6.2.7.1.8.9.9.7.8.8.5.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.7.9.8.6.2.7.2.9.2.4.7.8.4.6.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.5.d.6.d.7.5.b.-.0.5.b.a.-.4.d.3.b.-.9.7.0.f.-.1.c.2.a.1.3.2.1.5.e.3.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.a.6.f.d.c.7.4.-.3.2.d.3.-.4.c.e.d.-.b.3.3.6.-.1.f.f.6.e.5.5.2.8.b.3.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.d.8.-.0.0.0.1.-.0.0.1.b.-.a.3.c.3.-.e.f.9.c.a.5.c.b.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
                                                            C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_c3cbf2193d9fa4edd46cb99d95805ff8d68ee663_82810a17_1a5af733\Report.wer
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):0.9145760292834912
                                                            Encrypted:false
                                                            SSDEEP:192:rXi20oXcHBUZMX4jed+n/u7sKS274ItWc:biwXkBUZMX4jeS/u7sKX4ItWc
                                                            MD5:68BF401C1D1C39E4E4CDF821FE5C2A5E
                                                            SHA1:45C06CEDBB0CE9B1ABA293E7DB922903128B9FDD
                                                            SHA-256:9B28CAA49E2B0D32429C9BBB9AD7BD2973D2A2A1DC1F71ADFBD512F00809129A
                                                            SHA-512:2D24443B11E8404682CB158A54169A1E49FB029CA6D9DA0B58E611541CCB3FD8298736A8A6C6E2272C8850675387783767295DD26734900EF73A32E99F4BE638
                                                            Malicious:false
                                                            Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.7.9.8.6.2.7.2.7.4.2.6.1.6.5.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.7.9.8.6.2.7.3.7.9.7.2.9.9.1.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.d.2.e.4.8.1.b.-.3.3.9.1.-.4.7.d.1.-.9.4.d.9.-.5.8.d.1.a.d.8.b.9.2.9.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.5.8.b.2.b.d.1.-.3.5.e.9.-.4.5.f.3.-.b.6.7.5.-.4.a.5.3.3.9.b.2.b.9.c.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.e.4.-.0.0.0.1.-.0.0.1.b.-.4.4.d.e.-.9.9.9.d.a.5.c.b.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WERA838.tmp.dmp
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:Mini DuMP crash report, 14 streams, Thu Oct 28 02:45:20 2021, 0x1205a4 type
                                                            Category:dropped
                                                            Size (bytes):45982
                                                            Entropy (8bit):2.110582099269261
                                                            Encrypted:false
                                                            SSDEEP:192:OgQxOI0eNO5Skb2m0mbEDBv4mlkxoSdyQK6O66CsGTwAhfnDHozDQ/K:35Lb2miVlkFyQ6WsGTHDsDQC
                                                            MD5:882931F51B1B73DC6B62F1EDCB0E3A09
                                                            SHA1:5FFA2B3D9A8F873AF27C5F5C56E2B3C50A845973
                                                            SHA-256:CCEF491401B05B23FCAD05D2217ADD7D3C753D6F5B1BBF68226AC1B870D43B91
                                                            SHA-512:8D0B5AB14E9C95B7ABFC45301999FAE401E2095489C26789C2F20640E3761D6A780D0AAFE60465697FBDF1F559172B2890D0235F61323314648326420E68673E
                                                            Malicious:false
                                                            Preview: MDMP....... .........za........................................(-..........T.......8...........T...........................0................................................................................U...........B..............GenuineIntelW...........T...........[.za.............................0..=...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WERB132.tmp.WERInternalMetadata.xml
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8334
                                                            Entropy (8bit):3.6941056954487266
                                                            Encrypted:false
                                                            SSDEEP:192:Rrl7r3GLNimjU6sYQ6Y9v6VhcgmfTHSf+prRS89bwYsfawm:RrlsNioU6U6Y16LcgmfTHSwrwLf8
                                                            MD5:F453E77E2A7CC2D905D007AED06302D8
                                                            SHA1:087A39420A8465730004ABA1B5FD3F0C393A3C8C
                                                            SHA-256:FE9CEB0E5EFF45686DACB635F46D04B019F71EA3C5D511207834B8FD90A5ADCB
                                                            SHA-512:677142FD2ACD3005B88237C202EEE44854C14A7F1A92BACA6CB68EB406089CB8A3ED97E8DBB64595D42AD3EFA7DB30DB82392EDA90FECC280D55C8634F4C569C
                                                            Malicious:false
                                                            Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.3.6.0.<./.P.i.d.>.......
                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WERB170.tmp.dmp
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:Mini DuMP crash report, 14 streams, Thu Oct 28 02:45:24 2021, 0x1205a4 type
                                                            Category:dropped
                                                            Size (bytes):46774
                                                            Entropy (8bit):2.0599297130149634
                                                            Encrypted:false
                                                            SSDEEP:192:akiexOux2QvozO5SkbQepjaM5kx8Kdx/032KvW3Jmd7l37n8:3zoq5LbdRkFdx/0xymdF8
                                                            MD5:F92717FDA23E860A6EF7EDAB858200B9
                                                            SHA1:F5F306E9219CB5925A009EDDED35AD89CF4B9286
                                                            SHA-256:2A1A6F10D6E5215DA0C9778E590942AD4BC8F7EB5BB53101976021F209C52517
                                                            SHA-512:DAC7DF1DF44BAE9C6C28FEDEA4AA32381B0AA604BEEE24BBB6D0E12D989DABAE17D6178F79D27F85FA81A82D5CE6796C343B3C7188758368E355D584114E8C06
                                                            Malicious:false
                                                            Preview: MDMP....... .........za........................................(-..........T.......8...........T...............&...........0................................................................................U...........B..............GenuineIntelW...........T...........[.za.............................0..=...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WERB3F2.tmp.xml
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4694
                                                            Entropy (8bit):4.488212192939574
                                                            Encrypted:false
                                                            SSDEEP:48:cvIwSD8zsxJgtWI9XnWSC8BV8fm8M4JCdsRFp+q8/J74SrSAd:uITfD4WSNEJnkDWAd
                                                            MD5:129D66DE96BECA1534E9E3391368E940
                                                            SHA1:703E09F0EA5A23A31C9C4B2F321AAF8872C26947
                                                            SHA-256:892E572C1B606CE700CAA0E3F4839C05CE1ED16CB27620E3AE03C7D2651DBE7F
                                                            SHA-512:B6A370BA81340E418EDBF8BEB6485178D9AC4E25B97C11BD87E609C57E06681C60C3375A8DAC9D876078A9400C01205CD59F7415EFE09BCF400011E5356F8E06
                                                            Malicious:false
                                                            Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1229036" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WERC140.tmp.WERInternalMetadata.xml
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8334
                                                            Entropy (8bit):3.6935294774212855
                                                            Encrypted:false
                                                            SSDEEP:192:Rrl7r3GLNiOjGC6wu6Y9l6VhcgmfTiSf+prRE89bPHsfjaGlm:RrlsNiAGC6Z6Yv6LcgmfTiSwhPMf+1
                                                            MD5:059631A4291335880F0A32CA284F19E3
                                                            SHA1:873D9320CC9612C8F91488124E9EAD54E7162700
                                                            SHA-256:F765F4D1706FDC7B72ED807FC007C38E1DD6CA2AD60CBF5CE918DA0B5E8365B4
                                                            SHA-512:02DE057A231550C2FC3A0404958CCA39A537C307D6F189B69654883720826A273F02CDA97556729DF1CB231BFDF1D13FD51951827FB0A7376A1BC327E0AB0474
                                                            Malicious:false
                                                            Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.3.6.8.<./.P.i.d.>.......
                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WERC4AA.tmp.dmp
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:Mini DuMP crash report, 14 streams, Thu Oct 28 02:45:29 2021, 0x1205a4 type
                                                            Category:dropped
                                                            Size (bytes):38366
                                                            Entropy (8bit):2.2811286454770294
                                                            Encrypted:false
                                                            SSDEEP:192:DPpdOZg8vTfa+cO5Skb4RsmXlngS/fkxAJkNyJlF/nU:qLr5Lb4pxkwkNyJ3
                                                            MD5:A4758AC6A770AA0391B62614BC23494B
                                                            SHA1:CA97ACA2575F7A8F7CAAF584494DDA812E3A34BD
                                                            SHA-256:2316620D8490C69207C6F0FC45A7BF2B2B652CA46D4B61BD0D34B51FCF8E87AB
                                                            SHA-512:18B5F42A530F45F28214A96B6E2177414278EAD98A4F64A9DDA38C822007DE8D7A3688676F21B8E571DCF2E23C27782DBE3D82D8615424DBEF0D1BAF0BE5B1D9
                                                            Malicious:false
                                                            Preview: MDMP....... .........za............d...............l...........,*..........T.......8...........T................z...........................................................................................U...........B..............GenuineIntelW...........T...........\.za.............................0..=...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WERC71D.tmp.xml
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4694
                                                            Entropy (8bit):4.486217981525297
                                                            Encrypted:false
                                                            SSDEEP:48:cvIwSD8zsxJgtWI9XnWSC8Bs8fm8M4JCdsoFJo+q8/JtU4SrStd:uITfD4WSNHJBhDWtd
                                                            MD5:C42E1B4B49B80A03857EC1A009C573A4
                                                            SHA1:594F5586F8D102C354E5140A4749B8DCC0C08641
                                                            SHA-256:244935B6B7A3CB948E377A06324CA482D509C8ACD7CFC2CF208255B79A4F0DAC
                                                            SHA-512:AE5BBCC3CFAD4F0E85022B935FAB20B5BAD61DC927FA022935E7DE8F01B5EFAE3116131540AEA12A00A60A697FCFEA32FA53130323989D0E019CEE69FDFD7E09
                                                            Malicious:false
                                                            Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1229036" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WERC91E.tmp.dmp
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:Mini DuMP crash report, 14 streams, Thu Oct 28 02:45:30 2021, 0x1205a4 type
                                                            Category:dropped
                                                            Size (bytes):38650
                                                            Entropy (8bit):2.2706103473918606
                                                            Encrypted:false
                                                            SSDEEP:192:sYjdOZg8vTdiKO5Skbt43gUOB207kxKZFyjW6zAsnT3:sLo5Lbt43IkgFyjPT3
                                                            MD5:EBDD0217FFF159507E8BEEF529E562ED
                                                            SHA1:203E1C4E108A6AA2AFB27C437C3145121A7A1B96
                                                            SHA-256:4E07358FC83CC2578998F36E1C25E1757EA871C23F27F668E2C91B69380B6A98
                                                            SHA-512:8D5D77E28E0622AA2FE6BCD509EFB7A9CED4A5F38AF3FB71F42CE6898A34CC0987F46A1D369BBCD67721806E8F295FBCB7287B3B253864A9FF53D822CAF9E117
                                                            Malicious:false
                                                            Preview: MDMP....... .........za............d...............l...........,*..........T.......8...........T................|...........................................................................................U...........B..............GenuineIntelW...........T...........\.za.............................0..=...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WERD2B4.tmp.WERInternalMetadata.xml
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8334
                                                            Entropy (8bit):3.6951960712951584
                                                            Encrypted:false
                                                            SSDEEP:192:Rrl7r3GLNiPjG6NJrm6Y9Q6VhcgmfTZSf+pr689bInsfI4m:RrlsNi7G6u6Y66LcgmfTZSAIsfO
                                                            MD5:A965A4E7197B5D5643E437EF1026BF09
                                                            SHA1:42C6C763BCE8FC761AE606F92C8D75CF7E8CF518
                                                            SHA-256:7295FC28007141C32E0081C8E646D560C60C035CECE7710B10A22108415F42A1
                                                            SHA-512:BA89D5173AE8A319CDE1AD969DF3A4851EF3B3C11861E456126B02C3F100B80601C56D58FA25FD039CE46B8E4703C4EA2559455223AB860AD194367C84F4C9CC
                                                            Malicious:false
                                                            Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.3.9.6.<./.P.i.d.>.......
                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WERD575.tmp.xml
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4694
                                                            Entropy (8bit):4.488959000814019
                                                            Encrypted:false
                                                            SSDEEP:48:cvIwSD8zsxJgtWI9XnWSC8B/8fm8M4JCds5FD+q8/J6S4SrSad:uITfD4WSNGJ9yDWad
                                                            MD5:5BDF284660CF0C76C2F5E2D931FF5D15
                                                            SHA1:90EFD8DF68F09EDC4664C8FD29DC9431D2C4ECCD
                                                            SHA-256:24478D1EE7D78F7A4CA458CB3776F13095CB9F692B37736FC41BC45033597350
                                                            SHA-512:15C7E72F52C948B41D9B7EF8B55F7F52DD4485EB732B0B6843476CF75EA41C964A254E5A529E68D39DBC983274D054D5B8E9B36E9DC05F60B5781399E5ECAD45
                                                            Malicious:false
                                                            Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1229036" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WERDCA7.tmp.WERInternalMetadata.xml
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8334
                                                            Entropy (8bit):3.6933352539414077
                                                            Encrypted:false
                                                            SSDEEP:192:Rrl7r3GLNilx6iy6Y9k6VhcgmfTNSf+prRw89bD9sflhm:RrlsNiz6X6Y+6LcgmfTNSwND2f6
                                                            MD5:02611AA259B4B5892273F7A9E07C73C4
                                                            SHA1:819643A654BFC05962C24DDFD4F30F88B7F09383
                                                            SHA-256:EFBB016BCA21237A560CBE15F6ADFA5E7E8288F90F751204014AB2A59E7201F4
                                                            SHA-512:81DB23E395748B919AAEBBE35F9E703EC7F5D43F5247FC2ADA2B5C3D8801859B3410F84CC0A41E99AA091E8D533845070A25F4E370B05615A753BA125124655D
                                                            Malicious:false
                                                            Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.3.7.2.<./.P.i.d.>.......
                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WERE40B.tmp.xml
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4694
                                                            Entropy (8bit):4.487676574686123
                                                            Encrypted:false
                                                            SSDEEP:48:cvIwSD8zsxJgtWI9XnWSC8BPs8fm8M4JCdsxFo+q8/Jyu34SrS4d:uITfD4WSNxRJCaDW4d
                                                            MD5:B1AB375C0816154098F60DFD37310902
                                                            SHA1:8DB57959201F5240BBB468EF84C9A3F367EA5C86
                                                            SHA-256:F316047E60C449085851A7C10477F3F53A117BE2AE7CE089FB3ABCEEA6D56E4F
                                                            SHA-512:A007FF2FF06BFFA158B0186CE96DF0052EDF2C56CBBE56B1A4E124A2D8FCF7555FB0B5D7A42009A67D5CE8D295C88DC019CC1BF920D66E3CABBCD0B74A01ADE6
                                                            Malicious:false
                                                            Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1229036" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                            C:\Windows\appcompat\Programs\Amcache.hve
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:MS Windows registry file, NT/2000 or above
                                                            Category:dropped
                                                            Size (bytes):1572864
                                                            Entropy (8bit):4.244673068780695
                                                            Encrypted:false
                                                            SSDEEP:12288:RQd7oesqEOTJQ4v7769XyErYnea1cQlFVrIzGRCxAIks9t7W:6d7oesqEOT64v7Yen
                                                            MD5:8C3AB5B1DC5D1ABD9348B10C33895312
                                                            SHA1:47E73434578A58BB370B2174BD5D92B8C25ABDA3
                                                            SHA-256:38DA0FE6DE4F7EFE780FBD799732FF44A32941360219CE41CA266958BB9D73FB
                                                            SHA-512:8BD292301E368F16FD0D1C9C4C7249D9EA957540020619C401AC02B78C44148E0DA3D0631B129C3A372B60520EBF6322E879B95D272C24D649067B1890D1B88D
                                                            Malicious:false
                                                            Preview: regfH...H...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm.[u................................................................................................................................................................................................................................................................................................................................................;Sq.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            C:\Windows\appcompat\Programs\Amcache.hve.LOG1
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:MS Windows registry file, NT/2000 or above
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):3.413917876186381
                                                            Encrypted:false
                                                            SSDEEP:384:uT55K5sPv4EgnVVeeDzeD1NKZtjLT8GpwT1L33SYL:GnKkg/eeDzeZNYtjkGpwThSY
                                                            MD5:05273D33251685A4E511B9006999199F
                                                            SHA1:14A5E3BADAAE5071A82B785D0FBA89774AD0AC41
                                                            SHA-256:81830EE13605B6D9302DD08C2709AD2F669DC20C5725470F062A56FCA01E477A
                                                            SHA-512:298C602ED65BBDE9CE4B28E9409CE81640407FDE55B3FC4DD2D433124410FA07DEA73B8DE4C937ED059D6719D79060DDA740D71C02FD016128CE8439A547CCA5
                                                            Malicious:false
                                                            Preview: regfG...G...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm.[u................................................................................................................................................................................................................................................................................................................................................=Sq.HvLE.N......G...........V..zH..W"."s....................... ..hbin................p.\..,..........nk,.3.w.................................... ...........................&...{ad79c032-a2ea-f756-e377-72fb9332c3ae}......nk .3.w........ ........................... .......Z.......................Root........lf......Root....nk .3.w.................................... ...............*...............DeviceCensus.......................vk..................WritePermissionsCheck.......p...

                                                            Static File Info

                                                            General

                                                            File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                            Entropy (8bit):7.160195302212999
                                                            TrID:
                                                            • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                                            • Generic Win/DOS Executable (2004/3) 0.20%
                                                            • DOS Executable Generic (2002/1) 0.20%
                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                            File name:SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll
                                                            File size:1093632
                                                            MD5:2228471d39760f9a389ac95f71b671a9
                                                            SHA1:38b7d35e72c995ca526e293af9d448a7a8011df6
                                                            SHA256:a9238550f705b9668a390a9e7b9e4dec6a88daec2c8acca19ffa10af328d594d
                                                            SHA512:48d40173dfbc5dd798efbae2252b9599d2dd88b3a9b9535e4f7203de79bd272c24b5c914f5b809774d1b3b146b8fd3a12446bc4d5855959eca3229e0a97b7194
                                                            SSDEEP:24576:tjsXggYiykQsMy2GSuCAaimSQws2yyq+YoWEUK6ES0wOyeSGwswWquEQq2GiMcis:m
                                                            File Content Preview:MZ......................@........................................IZ..(4..(4..(4..z..&)4.....Z)4..Q...)4..u5..(4.....K(4..v6."(4.7....(4. ...,(4.....i(4.....Z(4..(5.f)4.Rich.(4.........................PE..L...&.ya...........!.... `...P.......K.......p.....

                                                            File Icon

                                                            Icon Hash:74f0e4ecccdce0e4

                                                            Static PE Info

                                                            General

                                                            Entrypoint:0x10004b90
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x10000000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                            Time Stamp:0x61798526 [Wed Oct 27 16:58:14 2021 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:5
                                                            OS Version Minor:0
                                                            File Version Major:5
                                                            File Version Minor:0
                                                            Subsystem Version Major:5
                                                            Subsystem Version Minor:0
                                                            Import Hash:ae858e1bcf44b240b65263bbd6945db2

                                                            Entrypoint Preview

                                                            Instruction
                                                            mov eax, dword ptr [10106128h]
                                                            call eax
                                                            mov edx, eax
                                                            ret
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            push ebp
                                                            mov ebp, esp
                                                            push ebx
                                                            push edi
                                                            push esi
                                                            and esp, FFFFFFF8h
                                                            sub esp, 000000A8h
                                                            mov eax, dword ptr [ebp+08h]
                                                            mov dword ptr [esp+0000009Ch], 008A6C3Fh
                                                            mov byte ptr [esp+00000083h], 00000072h
                                                            mov dword ptr [esp+6Ch], 6C57D91Ch
                                                            mov dword ptr [esp+00000094h], 00000000h
                                                            mov dword ptr [esp+00000090h], 0093F6B2h
                                                            mov ecx, dword ptr [ebp+08h]
                                                            mov edx, esp
                                                            mov dword ptr [edx], ecx
                                                            mov dword ptr [esp+38h], eax
                                                            call 00007F16B09C8AB2h
                                                            movzx ecx, word ptr [esp+000000A2h]
                                                            mov si, cx
                                                            mov word ptr [esp+000000A2h], B4E5h
                                                            mov byte ptr [esp+37h], al
                                                            mov dword ptr [esp+30h], ecx
                                                            mov word ptr [esp+2Eh], si
                                                            call 00007F16B09C8E2Bh
                                                            mov ecx, dword ptr [esp+0000008Ch]
                                                            mov edx, ecx
                                                            add edx, DE3924BAh
                                                            mov dword ptr [esp+0000008Ch], edx
                                                            mov dword ptr [esp+70h], eax
                                                            mov eax, dword ptr [esp+30h]
                                                            add eax, eax
                                                            mov si, ax
                                                            mov word ptr [esp+000000A2h], si
                                                            mov eax, dword ptr [esp+70h]
                                                            mov edx, dword ptr [esp+00000090h]
                                                            mov edi, dword ptr [esp+00000094h]

                                                            Data Directories

                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0xfad600x5f.rdata
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xfae3c0xb4.rdata
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1080000x3e8.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1090000x2a38.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x705c0x38.rdata
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x70000x44.rdata
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                            Sections

                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x10000x5dfe0x6000False0.381795247396data4.41548626837IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                            .rdata0x70000xf40320xf5000False0.135155253508data7.11998014415IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .data0xfc0000xbd1c0xb000False0.234153053977data5.69509557044IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                            .rsrc0x1080000x3e80x1000False0.119873046875data1.03136554304IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0x1090000x2a380x3000False0.231608072917data5.67874721692IMAGE_SCN_TYPE_GROUP, IMAGE_SCN_TYPE_COPY, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                            Resources

                                                            NameRVASizeTypeLanguageCountry
                                                            RT_VERSION0x1080600x388data

                                                            Imports

                                                            DLLImport
                                                            SHELL32.dllSHGetDesktopFolder
                                                            IPHLPAPI.DLLGetIfTable
                                                            ADVAPI32.dllRegOverridePredefKey
                                                            msvcrt.dllmemset
                                                            OLEAUT32.dllVarR4FromI2
                                                            KERNEL32.dllCreateFileW, GetModuleFileNameW
                                                            SETUPAPI.dllSetupDiEnumDeviceInfo
                                                            USER32.dllShowOwnedPopups

                                                            Exports

                                                            NameOrdinalAddress
                                                            FFRgpmdlwwWde10x100fadb0

                                                            Version Infos

                                                            DescriptionData
                                                            LegalCopyrightCopyright 2004
                                                            InternalNameddlb
                                                            FileVersion5.2.00.0
                                                            Full Version5.2.0_00-b00
                                                            CompanyNameSun Microsystems, Inc.
                                                            ProductNameDdlb(EA) 2 Tsyfezyt Bidibhex Ernseqa 5.0 Urdate 6
                                                            ProductVersion5.2.00.0
                                                            FileDescriptionJava(TM) 2 Platform Standard Edition binary
                                                            OriginalFilenameddlb.dll
                                                            Translation0x0000 0x04b0

                                                            Network Behavior

                                                            No network behavior found

                                                            Code Manipulations

                                                            Statistics

                                                            Behavior

                                                            Click to jump to process

                                                            System Behavior

                                                            General

                                                            Start time:04:42:46
                                                            Start date:28/10/2021
                                                            Path:C:\Windows\System32\loaddll32.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:loaddll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll'
                                                            Imagebase:0x1110000
                                                            File size:893440 bytes
                                                            MD5 hash:72FCD8FB0ADC38ED9050569AD673650E
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:moderate

                                                            General

                                                            Start time:04:42:47
                                                            Start date:28/10/2021
                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',#1
                                                            Imagebase:0x11d0000
                                                            File size:232960 bytes
                                                            MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            General

                                                            Start time:04:42:47
                                                            Start date:28/10/2021
                                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll,FFRgpmdlwwWde
                                                            Imagebase:0x11a0000
                                                            File size:61952 bytes
                                                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000002.00000000.781525113.000000006E3E1000.00000020.00020000.sdmp, Author: Joe Security
                                                            Reputation:high

                                                            General

                                                            Start time:04:42:47
                                                            Start date:28/10/2021
                                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',#1
                                                            Imagebase:0x11a0000
                                                            File size:61952 bytes
                                                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000003.00000002.1190711259.000000006E3E1000.00000020.00020000.sdmp, Author: Joe Security
                                                            Reputation:high

                                                            General

                                                            Start time:04:43:38
                                                            Start date:28/10/2021
                                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',CheckTrust
                                                            Imagebase:0x11a0000
                                                            File size:61952 bytes
                                                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000008.00000002.1189742876.000000006E3E1000.00000020.00020000.sdmp, Author: Joe Security
                                                            Reputation:high

                                                            General

                                                            Start time:04:43:39
                                                            Start date:28/10/2021
                                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DllCanUnloadNow
                                                            Imagebase:0x11a0000
                                                            File size:61952 bytes
                                                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000A.00000002.1035258572.000000006E3E1000.00000020.00020000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000A.00000000.993496871.000000006E3E1000.00000020.00020000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000A.00000000.983061292.000000006E3E1000.00000020.00020000.sdmp, Author: Joe Security
                                                            Reputation:high

                                                            General

                                                            Start time:04:43:39
                                                            Start date:28/10/2021
                                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DllGetClassObject
                                                            Imagebase:0x11a0000
                                                            File size:61952 bytes
                                                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000B.00000002.1035624541.000000006E3E1000.00000020.00020000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000B.00000000.984417816.000000006E3E1000.00000020.00020000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000B.00000000.993970485.000000006E3E1000.00000020.00020000.sdmp, Author: Joe Security
                                                            Reputation:high

                                                            General

                                                            Start time:04:43:40
                                                            Start date:28/10/2021
                                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DownloadFile
                                                            Imagebase:0x11a0000
                                                            File size:61952 bytes
                                                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000C.00000000.994333944.000000006E3E1000.00000020.00020000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000C.00000000.984331787.000000006E3E1000.00000020.00020000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000C.00000002.1038712080.000000006E3E1000.00000020.00020000.sdmp, Author: Joe Security
                                                            Reputation:high

                                                            General

                                                            Start time:04:43:40
                                                            Start date:28/10/2021
                                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',GetICifFileFromFile
                                                            Imagebase:0x11a0000
                                                            File size:61952 bytes
                                                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000D.00000000.987956861.000000006E3E1000.00000020.00020000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000D.00000000.1005884089.000000006E3E1000.00000020.00020000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000D.00000002.1038939767.000000006E3E1000.00000020.00020000.sdmp, Author: Joe Security
                                                            Reputation:high

                                                            General

                                                            Start time:04:45:17
                                                            Start date:28/10/2021
                                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 664
                                                            Imagebase:0x2b0000
                                                            File size:434592 bytes
                                                            MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language

                                                            General

                                                            Start time:04:45:19
                                                            Start date:28/10/2021
                                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6368 -s 664
                                                            Imagebase:0x2b0000
                                                            File size:434592 bytes
                                                            MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language

                                                            General

                                                            Start time:04:45:22
                                                            Start date:28/10/2021
                                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 664
                                                            Imagebase:0x2b0000
                                                            File size:434592 bytes
                                                            MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language

                                                            General

                                                            Start time:04:45:22
                                                            Start date:28/10/2021
                                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6396 -s 664
                                                            Imagebase:0x2b0000
                                                            File size:434592 bytes
                                                            MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language

                                                            General

                                                            Start time:04:45:22
                                                            Start date:28/10/2021
                                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6368 -s 664
                                                            Imagebase:0x2b0000
                                                            File size:434592 bytes
                                                            MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language

                                                            General

                                                            Start time:04:45:23
                                                            Start date:28/10/2021
                                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6396 -s 664
                                                            Imagebase:0x2b0000
                                                            File size:434592 bytes
                                                            MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language

                                                            General

                                                            Start time:04:45:26
                                                            Start date:28/10/2021
                                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6372 -s 668
                                                            Imagebase:0x2b0000
                                                            File size:434592 bytes
                                                            MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language

                                                            General

                                                            Start time:04:45:28
                                                            Start date:28/10/2021
                                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6372 -s 668
                                                            Imagebase:0x2b0000
                                                            File size:434592 bytes
                                                            MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language

                                                            Disassembly

                                                            Code Analysis

                                                            Reset < >