Loading ...

Play interactive tourEdit tour

Windows Analysis Report SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll

Overview

General Information

Sample Name:SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll
Analysis ID:510686
MD5:e53a16bea7918b1f7d4c0e659febc766
SHA1:10d4d3d7fac35f6492cda2fb04aebf46903481f0
SHA256:212cae7b05ecbc938b3a1fda4753d119f69360165955937b836fdbc7a6d514eb
Tags:dll
Infos:

Most interesting Screenshot:

Detection

Dridex
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Found detection on Joe Sandbox Cloud Basic with higher score
Yara detected Dridex unpacked file
Multi AV Scanner detection for submitted file
Tries to delay execution (extensive OutputDebugStringW loop)
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Uses 32bit PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Antivirus or Machine Learning detection for unpacked file
Sample file is different than original file name gathered from version info
One or more processes crash
Contains functionality to query locales information (e.g. system language)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Launches processes in debugging mode, may be used to hinder debugging
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware

Classification

Process Tree

  • System is w10x64
  • loaddll32.exe (PID: 1624 cmdline: loaddll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll' MD5: 72FCD8FB0ADC38ED9050569AD673650E)
    • cmd.exe (PID: 2940 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 3596 cmdline: rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 3712 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll,FFRgpmdlwwWde MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 5596 cmdline: rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',CheckTrust MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 5964 cmdline: rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',DllCanUnloadNow MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 2512 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5964 -s 664 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
      • WerFault.exe (PID: 736 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5964 -s 664 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 2212 cmdline: rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',DllGetClassObject MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 1760 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 664 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
      • WerFault.exe (PID: 1036 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 664 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 6120 cmdline: rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',DownloadFile MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 6096 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6120 -s 664 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 1112 cmdline: rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',GetICifFileFromFile MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup

Malware Configuration

Threatname: Dridex

{"Version": 22201, "C2 list": ["149.202.179.100:443", "66.147.235.11:6891", "81.0.236.89:13786"], "RC4 keys": ["9fRysqcdPgZffBlroqJaZHyCvLvD6BUV", "ranVAwtYINZG8jFJSjh5rR8jx3HIZIvSCern79nVFUhfeb2NvJlOKPsGO1osGE0VchV9bFDjym"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000E.00000002.650424736.000000006ECF1000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
    00000013.00000000.633029380.000000006ECF1000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
      00000000.00000002.647984137.000000006ECF1000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
        00000012.00000000.639692678.000000006ECF1000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
          00000003.00000000.372154068.000000006ECF1000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
            Click to see the 10 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            17.0.rundll32.exe.6ecf0000.5.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
              19.0.rundll32.exe.6ecf0000.5.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
                4.2.rundll32.exe.6ecf0000.2.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
                  18.2.rundll32.exe.6ecf0000.2.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
                    19.2.rundll32.exe.6ecf0000.2.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
                      Click to see the 10 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 4.2.rundll32.exe.6ecf0000.2.unpackMalware Configuration Extractor: Dridex {"Version": 22201, "C2 list": ["149.202.179.100:443", "66.147.235.11:6891", "81.0.236.89:13786"], "RC4 keys": ["9fRysqcdPgZffBlroqJaZHyCvLvD6BUV", "ranVAwtYINZG8jFJSjh5rR8jx3HIZIvSCern79nVFUhfeb2NvJlOKPsGO1osGE0VchV9bFDjym"]}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllVirustotal: Detection: 21%Perma Link
                      Source: SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllReversingLabs: Detection: 31%
                      Machine Learning detection for sampleShow sources
                      Source: SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllJoe Sandbox ML: detected
                      Source: 19.0.rundll32.exe.754756.4.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 18.0.rundll32.exe.4764756.4.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 19.2.rundll32.exe.5b0000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 19.0.rundll32.exe.5b0000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 17.0.rundll32.exe.4af4756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 17.2.rundll32.exe.f70000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 3.0.rundll32.exe.4df4756.4.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 0.2.loaddll32.exe.1250000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 3.0.rundll32.exe.3300000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 14.2.rundll32.exe.3464756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 19.0.rundll32.exe.754756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 19.0.rundll32.exe.5b0000.3.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 18.0.rundll32.exe.4764756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 18.2.rundll32.exe.c00000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 17.0.rundll32.exe.f70000.3.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 3.0.rundll32.exe.3300000.3.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 19.2.rundll32.exe.754756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 4.2.rundll32.exe.e94756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 18.2.rundll32.exe.4764756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 16.0.rundll32.exe.b20000.3.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 17.0.rundll32.exe.f70000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 16.0.rundll32.exe.b20000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 4.2.rundll32.exe.bd0000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 0.2.loaddll32.exe.15e4756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 16.0.rundll32.exe.1144756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 17.2.rundll32.exe.4af4756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 3.0.rundll32.exe.4df4756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 18.0.rundll32.exe.c00000.3.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 17.0.rundll32.exe.4af4756.4.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 18.0.rundll32.exe.c00000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 14.2.rundll32.exe.fc0000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 16.0.rundll32.exe.1144756.4.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: rpidebbfll.pdb source: SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll
                      Source: Binary string: wntdll.pdbUGP source: rundll32.exe, 00000004.00000003.352818755.000000004B280000.00000004.00000001.sdmp, rundll32.exe, 0000000E.00000003.595500849.000000004B280000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: rundll32.exe, 00000004.00000003.352818755.000000004B280000.00000004.00000001.sdmp, rundll32.exe, 0000000E.00000003.595500849.000000004B280000.00000004.00000001.sdmp

                      Networking:

                      barindex
                      C2 URLs / IPs found in malware configurationShow sources
                      Source: Malware configuration extractorIPs: 149.202.179.100:443
                      Source: Malware configuration extractorIPs: 66.147.235.11:6891
                      Source: Malware configuration extractorIPs: 81.0.236.89:13786
                      Source: Joe Sandbox ViewASN Name: HOSTROCKETUS HOSTROCKETUS
                      Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                      Source: Joe Sandbox ViewIP Address: 66.147.235.11 66.147.235.11
                      Source: Joe Sandbox ViewIP Address: 149.202.179.100 149.202.179.100
                      Source: Joe Sandbox ViewIP Address: 81.0.236.89 81.0.236.89
                      Source: loaddll32.exe, 00000000.00000002.648422509.000000006ED0F000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000000.372865791.000000006ED0F000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.649740233.000000006ED0F000.00000002.00020000.sdmp, rundll32.exe, 0000000E.00000002.650585460.000000006ED0F000.00000002.00020000.sdmp, rundll32.exe, 00000010.00000000.600585830.000000006ED0F000.00000002.00020000.sdmp, rundll32.exe, 00000011.00000000.614963241.000000006ED0F000.00000002.00020000.sdmp, rundll32.exe, 00000012.00000000.640010436.000000006ED0F000.00000002.00020000.sdmp, rundll32.exe, 00000013.00000000.640637691.000000006ED0F000.00000002.00020000.sdmpString found in binary or memory: http://www.vomfass.deDVarFileInfo$

                      E-Banking Fraud:

                      barindex
                      Yara detected Dridex unpacked fileShow sources
                      Source: Yara matchFile source: 17.0.rundll32.exe.6ecf0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 19.0.rundll32.exe.6ecf0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.6ecf0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.6ecf0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 19.2.rundll32.exe.6ecf0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.6ecf0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.0.rundll32.exe.6ecf0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.6ecf0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.0.rundll32.exe.6ecf0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.0.rundll32.exe.6ecf0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.0.rundll32.exe.6ecf0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.rundll32.exe.6ecf0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.6ecf0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.0.rundll32.exe.6ecf0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 19.0.rundll32.exe.6ecf0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.650424736.000000006ECF1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000000.633029380.000000006ECF1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.647984137.000000006ECF1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000000.639692678.000000006ECF1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.372154068.000000006ECF1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000000.609752932.000000006ECF1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.647602284.000000006ECF1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000000.640582271.000000006ECF1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000002.648668483.000000006ECF1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.649606375.000000006ECF1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.646115407.000000006ECF1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000000.614518127.000000006ECF1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000000.600008382.000000006ECF1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000000.631903118.000000006ECF1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000000.600571038.000000006ECF1000.00000020.00020000.sdmp, type: MEMORY

                      System Summary:

                      barindex
                      Found detection on Joe Sandbox Cloud Basic with higher scoreShow sources
                      Source: SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllJoe Sandbox Cloud Basic: Detection: malicious Score: 76 Threat Name: DridexPerma Link
                      Source: SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllBinary or memory string: OriginalFilenameddlb.dll vs SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5964 -s 664
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6ED00754
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6ED09348
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6ECF1494
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6ECF846C
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6ED01460
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6ED01D58
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6ECFA52C
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6ECF90CC
                      Source: SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllVirustotal: Detection: 21%
                      Source: SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllReversingLabs: Detection: 31%
                      Source: SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll,FFRgpmdlwwWde
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll'
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll,FFRgpmdlwwWde
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',CheckTrust
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',DllCanUnloadNow
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',DllGetClassObject
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',DownloadFile
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',GetICifFileFromFile
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5964 -s 664
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 664
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5964 -s 664
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6120 -s 664
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 664
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll,FFRgpmdlwwWde
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',CheckTrust
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',DllCanUnloadNow
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',DllGetClassObject
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',DownloadFile
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',GetICifFileFromFile
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',#1
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5964 -s 664
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 664
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6120 -s 664
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6120
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5964
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2212
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERA390.tmpJump to behavior
                      Source: classification engineClassification label: mal84.troj.evad.winDLL@28/11@0/3
                      Source: SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllStatic file information: File size 1093632 > 1048576
                      Source: SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: rpidebbfll.pdb source: SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll
                      Source: Binary string: wntdll.pdbUGP source: rundll32.exe, 00000004.00000003.352818755.000000004B280000.00000004.00000001.sdmp, rundll32.exe, 0000000E.00000003.595500849.000000004B280000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: rundll32.exe, 00000004.00000003.352818755.000000004B280000.00000004.00000001.sdmp, rundll32.exe, 0000000E.00000003.595500849.000000004B280000.00000004.00000001.sdmp
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6ECFF6CC push esi; mov dword ptr [esp], 00000000h
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Tries to delay execution (extensive OutputDebugStringW loop)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: OutputDebugStringW count: 448
                      Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 426
                      Source: C:\Windows\System32\loaddll32.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                      Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000
                      Source: WERD744.tmp.WERInternalMetadata.xml.29.drBinary or memory string: <SystemManufacturer>VMware, Inc.</SystemManufacturer>
                      Source: WERDCC3.tmp.xml.29.drBinary or memory string: <arg nm="syspro" val="VMware7,1" />
                      Source: WERD744.tmp.WERInternalMetadata.xml.29.drBinary or memory string: <SystemProductName>VMware7,1</SystemProductName>
                      Source: WERDCC3.tmp.xml.29.drBinary or memory string: <arg nm="sysmfg" val="VMware, Inc." />
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6ECF6D50 GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5964 -s 664
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',#1
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5964 -s 664
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 664
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6120 -s 664
                      Source: loaddll32.exe, 00000000.00000002.646808145.00000000019A0000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000000.362283972.0000000003910000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.648957709.0000000003410000.00000002.00020000.sdmp, rundll32.exe, 0000000E.00000002.649564710.00000000039E0000.00000002.00020000.sdmp, rundll32.exe, 00000010.00000000.596800440.0000000003280000.00000002.00020000.sdmp, rundll32.exe, 00000011.00000000.590761143.0000000003610000.00000002.00020000.sdmp, rundll32.exe, 00000012.00000000.637219700.0000000003280000.00000002.00020000.sdmp, rundll32.exe, 00000013.00000000.632972734.0000000003280000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: loaddll32.exe, 00000000.00000002.646808145.00000000019A0000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000000.362283972.0000000003910000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.648957709.0000000003410000.00000002.00020000.sdmp, rundll32.exe, 0000000E.00000002.649564710.00000000039E0000.00000002.00020000.sdmp, rundll32.exe, 00000010.00000000.596800440.0000000003280000.00000002.00020000.sdmp, rundll32.exe, 00000011.00000000.590761143.0000000003610000.00000002.00020000.sdmp, rundll32.exe, 00000012.00000000.637219700.0000000003280000.00000002.00020000.sdmp, rundll32.exe, 00000013.00000000.632972734.0000000003280000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: loaddll32.exe, 00000000.00000002.646808145.00000000019A0000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000000.362283972.0000000003910000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.648957709.0000000003410000.00000002.00020000.sdmp, rundll32.exe, 0000000E.00000002.649564710.00000000039E0000.00000002.00020000.sdmp, rundll32.exe, 00000010.00000000.596800440.0000000003280000.00000002.00020000.sdmp, rundll32.exe, 00000011.00000000.590761143.0000000003610000.00000002.00020000.sdmp, rundll32.exe, 00000012.00000000.637219700.0000000003280000.00000002.00020000.sdmp, rundll32.exe, 00000013.00000000.632972734.0000000003280000.00000002.00020000.sdmpBinary or memory string: SProgram Managerl
                      Source: loaddll32.exe, 00000000.00000002.646808145.00000000019A0000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000000.362283972.0000000003910000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.648957709.0000000003410000.00000002.00020000.sdmp, rundll32.exe, 0000000E.00000002.649564710.00000000039E0000.00000002.00020000.sdmp, rundll32.exe, 00000010.00000000.596800440.0000000003280000.00000002.00020000.sdmp, rundll32.exe, 00000011.00000000.590761143.0000000003610000.00000002.00020000.sdmp, rundll32.exe, 00000012.00000000.637219700.0000000003280000.00000002.00020000.sdmp, rundll32.exe, 00000013.00000000.632972734.0000000003280000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd,
                      Source: loaddll32.exe, 00000000.00000002.646808145.00000000019A0000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000000.362283972.0000000003910000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.648957709.0000000003410000.00000002.00020000.sdmp, rundll32.exe, 0000000E.00000002.649564710.00000000039E0000.00000002.00020000.sdmp, rundll32.exe, 00000010.00000000.596800440.0000000003280000.00000002.00020000.sdmp, rundll32.exe, 00000011.00000000.590761143.0000000003610000.00000002.00020000.sdmp, rundll32.exe, 00000012.00000000.637219700.0000000003280000.00000002.00020000.sdmp, rundll32.exe, 00000013.00000000.632972734.0000000003280000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6ECF6D50 GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection12Disable or Modify Tools1OS Credential DumpingSecurity Software Discovery11Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion11LSASS MemoryProcess Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection12Security Account ManagerVirtualization/Sandbox Evasion11SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptRundll321LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing1Cached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery12Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 510686 Sample: SecuriteInfo.com.Drixed-FJX... Startdate: 28/10/2021 Architecture: WINDOWS Score: 84 31 149.202.179.100 OVHFR France 2->31 33 66.147.235.11 HOSTROCKETUS United States 2->33 35 81.0.236.89 CASABLANCA-ASInternetCollocationProviderCZ Czech Republic 2->35 37 Found malware configuration 2->37 39 Multi AV Scanner detection for submitted file 2->39 41 Yara detected Dridex unpacked file 2->41 43 3 other signatures 2->43 8 loaddll32.exe 1 2->8         started        signatures3 process4 process5 10 rundll32.exe 8->10         started        13 rundll32.exe 8->13         started        15 rundll32.exe 8->15         started        17 4 other processes 8->17 signatures6 45 Tries to delay execution (extensive OutputDebugStringW loop) 10->45 19 WerFault.exe 7 13->19         started        21 WerFault.exe 13->21         started        23 WerFault.exe 20 7 15->23         started        25 WerFault.exe 15->25         started        27 rundll32.exe 17->27         started        29 WerFault.exe 3 17->29         started        process7

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll21%VirustotalBrowse
                      SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll32%ReversingLabsWin32.Trojan.Drixed
                      SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      19.0.rundll32.exe.754756.4.unpack100%AviraTR/Patched.Ren.GenDownload File
                      18.0.rundll32.exe.4764756.4.unpack100%AviraTR/Patched.Ren.GenDownload File
                      19.2.rundll32.exe.5b0000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      4.2.rundll32.exe.6ecf0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      19.0.rundll32.exe.5b0000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      14.2.rundll32.exe.6ecf0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      17.0.rundll32.exe.4af4756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      17.2.rundll32.exe.f70000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      3.0.rundll32.exe.4df4756.4.unpack100%AviraTR/Patched.Ren.GenDownload File
                      0.2.loaddll32.exe.1250000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      17.0.rundll32.exe.6ecf0000.5.unpack100%AviraHEUR/AGEN.1144420Download File
                      3.0.rundll32.exe.3300000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      18.2.rundll32.exe.6ecf0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      14.2.rundll32.exe.3464756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      19.0.rundll32.exe.754756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      17.2.rundll32.exe.6ecf0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      19.0.rundll32.exe.5b0000.3.unpack100%AviraTR/ATRAPS.Gen2Download File
                      19.0.rundll32.exe.6ecf0000.5.unpack100%AviraHEUR/AGEN.1144420Download File
                      18.0.rundll32.exe.4764756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      18.2.rundll32.exe.c00000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      17.0.rundll32.exe.f70000.3.unpack100%AviraTR/ATRAPS.Gen2Download File
                      3.0.rundll32.exe.3300000.3.unpack100%AviraTR/ATRAPS.Gen2Download File
                      19.2.rundll32.exe.6ecf0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      17.0.rundll32.exe.6ecf0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      19.2.rundll32.exe.754756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      18.0.rundll32.exe.6ecf0000.5.unpack100%AviraHEUR/AGEN.1144420Download File
                      0.2.loaddll32.exe.6ecf0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      4.2.rundll32.exe.e94756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      16.0.rundll32.exe.6ecf0000.5.unpack100%AviraHEUR/AGEN.1144420Download File
                      18.2.rundll32.exe.4764756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      16.0.rundll32.exe.b20000.3.unpack100%AviraTR/ATRAPS.Gen2Download File
                      17.0.rundll32.exe.f70000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      18.0.rundll32.exe.6ecf0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      16.0.rundll32.exe.b20000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      4.2.rundll32.exe.bd0000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      16.0.rundll32.exe.6ecf0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      0.2.loaddll32.exe.15e4756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      16.0.rundll32.exe.1144756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      3.0.rundll32.exe.6ecf0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      17.2.rundll32.exe.4af4756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      3.0.rundll32.exe.4df4756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      18.0.rundll32.exe.c00000.3.unpack100%AviraTR/ATRAPS.Gen2Download File
                      17.0.rundll32.exe.4af4756.4.unpack100%AviraTR/Patched.Ren.GenDownload File
                      18.0.rundll32.exe.c00000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      14.2.rundll32.exe.fc0000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      16.0.rundll32.exe.1144756.4.unpack100%AviraTR/Patched.Ren.GenDownload File
                      19.0.rundll32.exe.6ecf0000.2.unpack100%AviraHEUR/AGEN.1144420Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://www.vomfass.deDVarFileInfo$0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      No contacted domains info

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.vomfass.deDVarFileInfo$loaddll32.exe, 00000000.00000002.648422509.000000006ED0F000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000000.372865791.000000006ED0F000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.649740233.000000006ED0F000.00000002.00020000.sdmp, rundll32.exe, 0000000E.00000002.650585460.000000006ED0F000.00000002.00020000.sdmp, rundll32.exe, 00000010.00000000.600585830.000000006ED0F000.00000002.00020000.sdmp, rundll32.exe, 00000011.00000000.614963241.000000006ED0F000.00000002.00020000.sdmp, rundll32.exe, 00000012.00000000.640010436.000000006ED0F000.00000002.00020000.sdmp, rundll32.exe, 00000013.00000000.640637691.000000006ED0F000.00000002.00020000.sdmpfalse
                      • Avira URL Cloud: safe
                      low

                      Contacted IPs

                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs

                      Public

                      IPDomainCountryFlagASNASN NameMalicious
                      66.147.235.11
                      unknownUnited States
                      23535HOSTROCKETUStrue
                      149.202.179.100
                      unknownFrance
                      16276OVHFRtrue
                      81.0.236.89
                      unknownCzech Republic
                      15685CASABLANCA-ASInternetCollocationProviderCZtrue

                      General Information

                      Joe Sandbox Version:33.0.0 White Diamond
                      Analysis ID:510686
                      Start date:28.10.2021
                      Start time:05:00:21
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 7m 57s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Run name:Run with higher sleep bypass
                      Number of analysed new started processes analysed:32
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal84.troj.evad.winDLL@28/11@0/3
                      EGA Information:Failed
                      HDC Information:
                      • Successful, ratio: 55.7% (good quality ratio 51.4%)
                      • Quality average: 76.9%
                      • Quality standard deviation: 31%
                      HCA Information:Failed
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      • Sleeps bigger than 120000ms are automatically reduced to 1000ms
                      • Found application associated with file extension: .dll
                      Warnings:
                      Show All
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 20.50.102.62, 204.79.197.200, 13.107.21.200, 23.211.4.86, 23.211.6.115, 52.182.143.212, 20.189.173.21, 20.82.210.154, 20.42.65.92
                      • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, dual-a-0001.a-msedge.net, e1723.g.akamaiedge.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, e12564.dspb.akamaiedge.net, onedsblobprdeus17.eastus.cloudapp.azure.com, a-0001.a-afdentry.net.trafficmanager.net, onedsblobprdcus15.centralus.cloudapp.azure.com, store-images.s-microsoft.com, www-bing-com.dual-a-0001.a-msedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, arc.trafficmanager.net, watson.telemetry.microsoft.com, prod.fs.microsoft.com.akadns.net
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.

                      Simulations

                      Behavior and APIs

                      No simulations

                      Joe Sandbox View / Context

                      IPs

                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      66.147.235.11SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllGet hashmaliciousBrowse
                        SecuriteInfo.com.Drixed-FJXEDADFD868F1D.21569.dllGet hashmaliciousBrowse
                          SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllGet hashmaliciousBrowse
                            SecuriteInfo.com.Drixed-FJXEDADFD868F1D.21569.dllGet hashmaliciousBrowse
                              SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllGet hashmaliciousBrowse
                                SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                  SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                    Early_Access.-3878_20211027.xlsbGet hashmaliciousBrowse
                                      ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                        ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                          Casting Invite.-859403670_20211027.xlsbGet hashmaliciousBrowse
                                            149.202.179.100SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllGet hashmaliciousBrowse
                                              SecuriteInfo.com.Drixed-FJXEDADFD868F1D.21569.dllGet hashmaliciousBrowse
                                                SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllGet hashmaliciousBrowse
                                                  SecuriteInfo.com.Drixed-FJXEDADFD868F1D.21569.dllGet hashmaliciousBrowse
                                                    SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllGet hashmaliciousBrowse
                                                      SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                                        SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                                          Early_Access.-3878_20211027.xlsbGet hashmaliciousBrowse
                                                            ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                                              ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                                                Casting Invite.-859403670_20211027.xlsbGet hashmaliciousBrowse
                                                                  81.0.236.89SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllGet hashmaliciousBrowse
                                                                    SecuriteInfo.com.Drixed-FJXEDADFD868F1D.21569.dllGet hashmaliciousBrowse
                                                                      SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllGet hashmaliciousBrowse
                                                                        SecuriteInfo.com.Drixed-FJXEDADFD868F1D.21569.dllGet hashmaliciousBrowse
                                                                          SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllGet hashmaliciousBrowse
                                                                            SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                                                              SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                                                                Early_Access.-3878_20211027.xlsbGet hashmaliciousBrowse
                                                                                  ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                                                                    ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                                                                      Casting Invite.-859403670_20211027.xlsbGet hashmaliciousBrowse

                                                                                        Domains

                                                                                        No context

                                                                                        ASN

                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                        HOSTROCKETUSSecuriteInfo.com.Trojan.Win32.Save.a.28377.dllGet hashmaliciousBrowse
                                                                                        • 66.147.235.11
                                                                                        SecuriteInfo.com.Drixed-FJXEDADFD868F1D.21569.dllGet hashmaliciousBrowse
                                                                                        • 66.147.235.11
                                                                                        SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllGet hashmaliciousBrowse
                                                                                        • 66.147.235.11
                                                                                        SecuriteInfo.com.Drixed-FJXEDADFD868F1D.21569.dllGet hashmaliciousBrowse
                                                                                        • 66.147.235.11
                                                                                        SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllGet hashmaliciousBrowse
                                                                                        • 66.147.235.11
                                                                                        SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                                                                        • 66.147.235.11
                                                                                        SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                                                                        • 66.147.235.11
                                                                                        Early_Access.-3878_20211027.xlsbGet hashmaliciousBrowse
                                                                                        • 66.147.235.11
                                                                                        ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                                                                        • 66.147.235.11
                                                                                        ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                                                                        • 66.147.235.11
                                                                                        Casting Invite.-859403670_20211027.xlsbGet hashmaliciousBrowse
                                                                                        • 66.147.235.11
                                                                                        s1uOMLvpO4.exeGet hashmaliciousBrowse
                                                                                        • 216.120.236.127
                                                                                        WGs54P9e8aGet hashmaliciousBrowse
                                                                                        • 216.120.241.108
                                                                                        ba2Eq178BGXyW5T.exeGet hashmaliciousBrowse
                                                                                        • 216.120.237.68
                                                                                        4TXvMuUjTxE2kqz.exeGet hashmaliciousBrowse
                                                                                        • 66.147.239.119
                                                                                        Requirements-oct_2020.exeGet hashmaliciousBrowse
                                                                                        • 66.147.239.119
                                                                                        JESEE FRIED FIRDAY.exeGet hashmaliciousBrowse
                                                                                        • 66.147.239.119
                                                                                        Scan_0884218630071 Bank Swift.exeGet hashmaliciousBrowse
                                                                                        • 66.147.239.119
                                                                                        BANK ACCOUNT DETAILS ATTACHED.pdf.exeGet hashmaliciousBrowse
                                                                                        • 66.147.239.119
                                                                                        XYmX3bLQJ9.xlsGet hashmaliciousBrowse
                                                                                        • 66.147.238.141
                                                                                        OVHFRSecuriteInfo.com.Trojan.Win32.Save.a.28377.dllGet hashmaliciousBrowse
                                                                                        • 149.202.179.100
                                                                                        SecuriteInfo.com.Drixed-FJXEDADFD868F1D.21569.dllGet hashmaliciousBrowse
                                                                                        • 149.202.179.100
                                                                                        SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllGet hashmaliciousBrowse
                                                                                        • 149.202.179.100
                                                                                        SecuriteInfo.com.Drixed-FJXEDADFD868F1D.21569.dllGet hashmaliciousBrowse
                                                                                        • 149.202.179.100
                                                                                        SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllGet hashmaliciousBrowse
                                                                                        • 149.202.179.100
                                                                                        SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                                                                        • 149.202.179.100
                                                                                        SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                                                                        • 149.202.179.100
                                                                                        protocol-1096018033.xlsGet hashmaliciousBrowse
                                                                                        • 192.99.46.215
                                                                                        protocol-1096018033.xlsGet hashmaliciousBrowse
                                                                                        • 192.99.46.215
                                                                                        arm7Get hashmaliciousBrowse
                                                                                        • 8.33.207.78
                                                                                        #U0191ACTU#U0156A_wfpqacDkwlb__Z2676679.vbsGet hashmaliciousBrowse
                                                                                        • 144.217.33.249
                                                                                        Byov62cXa1.exeGet hashmaliciousBrowse
                                                                                        • 94.23.24.82
                                                                                        Early_Access.-3878_20211027.xlsbGet hashmaliciousBrowse
                                                                                        • 149.202.179.100
                                                                                        ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                                                                        • 149.202.179.100
                                                                                        ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                                                                        • 149.202.179.100
                                                                                        Casting Invite.-859403670_20211027.xlsbGet hashmaliciousBrowse
                                                                                        • 149.202.179.100
                                                                                        lyVSOhLA7o.dllGet hashmaliciousBrowse
                                                                                        • 51.210.102.137
                                                                                        protocol-1441399238.xlsGet hashmaliciousBrowse
                                                                                        • 192.99.46.215
                                                                                        protocol-1441399238.xlsGet hashmaliciousBrowse
                                                                                        • 192.99.46.215
                                                                                        protocol-1086855687.xlsGet hashmaliciousBrowse
                                                                                        • 192.99.46.215

                                                                                        JA3 Fingerprints

                                                                                        No context

                                                                                        Dropped Files

                                                                                        No context

                                                                                        Created / dropped Files

                                                                                        C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_5f8c232292098bd3183b3bd76fd57ba47bd4c4b_82810a17_06dfdcd0\Report.wer
                                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                        File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):65536
                                                                                        Entropy (8bit):0.916995120338525
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:keiD0oXZHBUZMX4jed+9/u7sWS274ItWc:BidXJBUZMX4je4/u7sWX4ItWc
                                                                                        MD5:CCEA7058269A40866547402C32B0E12A
                                                                                        SHA1:638C28D714E87A2B1FB9CB76E65AD4D2B4590188
                                                                                        SHA-256:F6F42848EC901990E01446A63B6D3C218D982C9EDE770F8F2EF969F89DFA9784
                                                                                        SHA-512:C88C4C7127119932C467C805ADBB1734E22A5ED95DFB0DB38C938753A2C9298587ECE7632EE76EA87C2F0DAE6EA138546075730D2B58A382EDBFA9E1FD60EE0E
                                                                                        Malicious:false
                                                                                        Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.7.9.8.9.6.2.5.0.5.2.7.1.0.2.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.7.9.8.9.6.2.6.3.7.7.7.0.8.3.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.a.2.d.4.9.7.5.-.a.f.4.6.-.4.3.9.1.-.9.4.8.2.-.c.1.6.3.0.7.b.a.8.d.8.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.c.5.6.a.1.d.0.-.d.d.0.7.-.4.4.7.b.-.8.e.c.b.-.8.f.0.3.7.6.5.8.b.0.4.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.8.a.4.-.0.0.0.1.-.0.0.1.6.-.7.f.9.b.-.c.d.b.6.f.3.c.b.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
                                                                                        C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_c316961cf9547f4477c913cd7ccdecd11bd19_82810a17_09efd927\Report.wer
                                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                        File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):65536
                                                                                        Entropy (8bit):0.9165833115381509
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:GMi00oX+HBUZMX4jed+9/u7sWS274ItWc:RiCX2BUZMX4je4/u7sWX4ItWc
                                                                                        MD5:F9E87888FA317EC87A8C755DABBD2C66
                                                                                        SHA1:2585D9C93809CA4DCAAC39D1043DDC702B304E7B
                                                                                        SHA-256:4E8B0739F101D95B13071B6D33751157C8C63543C2DB4E3284FEEFBFADC7FC76
                                                                                        SHA-512:E41FAC32750B76F7F9AEE6FCE30129B6187B40EA0D0315858A4DC5DE962F7AEF28B5A409728E54038664AEF30671B7A10006524267F61043E57A020E0E90A9AD
                                                                                        Malicious:false
                                                                                        Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.7.9.8.9.6.2.4.9.8.8.1.0.1.2.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.7.9.8.9.6.2.6.1.7.2.4.7.3.0.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.d.5.f.3.a.0.c.-.4.d.d.0.-.4.f.b.9.-.b.7.9.f.-.f.f.8.7.d.8.3.5.e.f.0.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.c.2.c.e.e.d.1.-.3.3.c.0.-.4.e.f.d.-.a.e.a.9.-.f.4.6.4.a.3.f.1.9.e.9.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.4.c.-.0.0.0.1.-.0.0.1.6.-.7.1.4.e.-.9.8.b.6.f.3.c.b.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
                                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERA390.tmp.dmp
                                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                        File Type:Mini DuMP crash report, 14 streams, Thu Oct 28 12:04:12 2021, 0x1205a4 type
                                                                                        Category:dropped
                                                                                        Size (bytes):46524
                                                                                        Entropy (8bit):2.079389502299483
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:Hf9C04q8A0nO5SkbhnpLh6dBpu8ESz3yyPWt/nfV:9B8q5LbF58d7u8ESz3yya/f
                                                                                        MD5:8CF91AF0FC9D82647FF152F00E0ABB6D
                                                                                        SHA1:103DBA4D056EFF05F8345517C2BA7AC414F26D9E
                                                                                        SHA-256:29ECC9C3001CD194DCF145DFFB73DBCA4B837C4B2149C17D71D53116565AA066
                                                                                        SHA-512:8B76EC2219B01EBAD5BA871CBC0469A1D8AE6D52063DFE79E838DA35E617104F1F4C51523A96D947DBE828B081F76361352C5173A39572F7400C5FE8E9E5935D
                                                                                        Malicious:false
                                                                                        Preview: MDMP....... .........za.........................................-..........T.......8...........T...........................0................................................................................U...........B..............GenuineIntelW...........T.......L...c.za.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERA620.tmp.dmp
                                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                        File Type:Mini DuMP crash report, 14 streams, Thu Oct 28 12:04:16 2021, 0x1205a4 type
                                                                                        Category:dropped
                                                                                        Size (bytes):44140
                                                                                        Entropy (8bit):2.1497069393561423
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:7CJC04Dvo4bMO5Skb9reDNQkGJfKAsek1I6+REP1V9yyaul1fnTcTu:szC5Lb9gzKnT6+RE/9yillwT
                                                                                        MD5:468455B7C32BF823B1C70B241AE47E54
                                                                                        SHA1:223BDB9E503CFD93134F2C6E483E2C4DF8988DF1
                                                                                        SHA-256:34F7C9D2E1A24E6AAB9B70238812FF524DDFEBF19831518AC382D043E8840695
                                                                                        SHA-512:9C8017A749F8DC524D0C90FF78057872A72E78398F3F4216C5CB9D7541633AACB53CF3A550E7F1B9B7142C8F4338F9FF48B48DB9BA4A090C2AEA6E6AA0049AC8
                                                                                        Malicious:false
                                                                                        Preview: MDMP....... .........za.........................................-..........T.......8...........T...............|...........0................................................................................U...........B..............GenuineIntelW...........T...........c.za.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERB2D3.tmp.WERInternalMetadata.xml
                                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                        File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):8352
                                                                                        Entropy (8bit):3.7002846079489355
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:Rrl7r3GLNip1P6JV6YYO+6MgmfT5S8Cprt89bq1sfjAOm:RrlsNipN6L6YK6MgmfT5SuqOfM
                                                                                        MD5:4151D17A289312C107FEF6FE5FA3E5FF
                                                                                        SHA1:2B297AAFA3784FC32650B8CFE6DF8BD196458B99
                                                                                        SHA-256:71ADDB34D643ADE60DDD00AC3AC9E33196DD3B07BDA0F076A9ED80DE939E5735
                                                                                        SHA-512:A4945E2416E774DF330782D6F4840D36067E8B00B345F76ECD4A42A6466F48C3391B72CB8CF4D9A6CC0541D379EC60AD6DE1BE10A83ED770BD95D7267A916007
                                                                                        Malicious:false
                                                                                        Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.9.6.4.<./.P.i.d.>.......
                                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERB72A.tmp.xml
                                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):4700
                                                                                        Entropy (8bit):4.500623001118657
                                                                                        Encrypted:false
                                                                                        SSDEEP:48:cvIwSD8zsKJgtWI9ouWSC8B8dtS8fm8M4JCdsPFW+q8/hL4SrSWd:uITfY7PSNq/HJqKDWWd
                                                                                        MD5:06579D1301DAEF503B82F588180B029A
                                                                                        SHA1:C263EDC496EF1D914E283FBDFC88A5B65F0922E3
                                                                                        SHA-256:35DDB8B7C1A4B7876F5A16764FCAF68C294059CCEC731170EAC34F83CD188FD3
                                                                                        SHA-512:DF727E13820797CF31458E7B9AEA574C93F3DDC1E6594807B566DF1E7DFEF50788E8923EBF92D52AFDDF16F452263BFB951AD964380F0FAC2F1D1B875D5F73EE
                                                                                        Malicious:false
                                                                                        Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1229594" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERC169.tmp.dmp
                                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                        File Type:Mini DuMP crash report, 14 streams, Thu Oct 28 12:04:22 2021, 0x1205a4 type
                                                                                        Category:dropped
                                                                                        Size (bytes):45380
                                                                                        Entropy (8bit):2.1265025958030526
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:pFCC04pe0NCGO5Skb9K5TyquxTLogGlBra6C5iOVXZn7:Eaa5LbATyquFogGjra66i4J7
                                                                                        MD5:BB604FE41CE924CB88F14A53F73D55EB
                                                                                        SHA1:8C9E0289CF2584A1CF5AB36BB03075A58F241973
                                                                                        SHA-256:A6CC4560B4BA9D45267FD3DF8F74416B64E369987F5A2714692B993350E5A305
                                                                                        SHA-512:3CFE9393C19870116FA3BADB28E3CCFD2BF94B89568A02E54FE38835FFD7B3C8E29F3057AAB597279D967247C3E0B33BB2C2CE09557A046454214BE4DB89251D
                                                                                        Malicious:false
                                                                                        Preview: MDMP....... ........za.........................................-..........T.......8...........T...........................0................................................................................U...........B..............GenuineIntelW...........T...........c.za.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERCB3D.tmp.WERInternalMetadata.xml
                                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                        File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):8352
                                                                                        Entropy (8bit):3.6982586181853225
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:Rrl7r3GLNiO66Fba6YYOS96MgmfTYS8CprLQ89bdfsfo/m:RrlsNiL6xa6YC6MgmfTYSPtdEfN
                                                                                        MD5:24BAA055B5D6B7C373D05EC5658733A3
                                                                                        SHA1:548FA50C505A0568902159D4532345A14DD29058
                                                                                        SHA-256:703245EC3E5129BACCE3A5A8344AC60EFF8A9C6CBB8F1578523A447EA77D4317
                                                                                        SHA-512:C74EB9A6A3FDE93B10B51A99B2596F4A99CA24E7C08A09D15BD2BC760E99BF2C0919C224A752A60087D4E471AE1215040CE40B47D0BDAF68E9A5E13AC0CABADD
                                                                                        Malicious:false
                                                                                        Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.2.1.2.<./.P.i.d.>.......
                                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERD020.tmp.xml
                                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):4700
                                                                                        Entropy (8bit):4.502820788645054
                                                                                        Encrypted:false
                                                                                        SSDEEP:48:cvIwSD8zsKJgtWI9ouWSC8Bz8fm8M4JCdsCF4+q8/hT4SrScH6d:uITfY7PSNyJ92DWi6d
                                                                                        MD5:B54095CE6F524F7234526A5F8CC44462
                                                                                        SHA1:649092155215605C275D23D39E1749BA88889D22
                                                                                        SHA-256:B7BFD695CB733D64A69960D5193D097DBEC835C9E65B0BA53CB35050F2259A1B
                                                                                        SHA-512:9E4756A0796D064D2067A619727C834748FC4B64DBF82DB1AC1D7CA4324EB3434B26EB3163ADD3C373D6C6C2BA1C598F6F076B5B73301D718CF3051EA70A36CD
                                                                                        Malicious:false
                                                                                        Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1229594" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERD744.tmp.WERInternalMetadata.xml
                                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                        File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):8352
                                                                                        Entropy (8bit):3.701073180602495
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:Rrl7r3GLNiQk6gG36YYOC68gmfT3SsCprRg89bG1qsftim:RrlsNir6h6YW68gmfT3StdG1Jf5
                                                                                        MD5:645AA25DE0930D788B806E66F3BD8FDC
                                                                                        SHA1:49906A9C0683FD3C7112C33BB658CF67496BAC68
                                                                                        SHA-256:1B8281F03FDEAEB82D724B9838916FA84F40878B832A7348C4863CBCBF2D5EC4
                                                                                        SHA-512:96523A5B3B017455F37335C83D4312795294269DF1D778E88A50175D347A19CED81A679FCFA7968299FDE23B29BA6102781387BC2C66CB32372708A4DF7D2BA2
                                                                                        Malicious:false
                                                                                        Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.1.2.0.<./.P.i.d.>.......
                                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERDCC3.tmp.xml
                                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):4700
                                                                                        Entropy (8bit):4.508329223101191
                                                                                        Encrypted:false
                                                                                        SSDEEP:48:cvIwSD8zsRJgtWI9wkckWSC8Bn8fm8M4JCds7FvT+q8/h8r4SrSEd:uITfjyc9SNqJnJrDWEd
                                                                                        MD5:8985C591066C23F260D51139922D93A9
                                                                                        SHA1:3BD08EC8716978765CA63D79685DF0EBD3FA1C35
                                                                                        SHA-256:26DBEF706EF369902902A44D2E952AB5484953AE03146F4735DBF84793E16EF7
                                                                                        SHA-512:39C2CBFAFDCA2597F0366E02B10769F675E18AC8F8FF7A5A09FF555D375B116A2C7945B0DAD3B6334C4AA63368069F6D47A25C9465A018E7A8CC2D1B876E21A4
                                                                                        Malicious:false
                                                                                        Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1229595" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..

                                                                                        Static File Info

                                                                                        General

                                                                                        File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                        Entropy (8bit):7.159938943426644
                                                                                        TrID:
                                                                                        • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                                                                        • Generic Win/DOS Executable (2004/3) 0.20%
                                                                                        • DOS Executable Generic (2002/1) 0.20%
                                                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                        File name:SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll
                                                                                        File size:1093632
                                                                                        MD5:e53a16bea7918b1f7d4c0e659febc766
                                                                                        SHA1:10d4d3d7fac35f6492cda2fb04aebf46903481f0
                                                                                        SHA256:212cae7b05ecbc938b3a1fda4753d119f69360165955937b836fdbc7a6d514eb
                                                                                        SHA512:014561ee3d96f09222cb1187c8b0a785e59e2d7dd1d3bec234088c2c382da693acc5cee4b21252462939574c1c666da8f09e45161b0856b0b413f7b687567eb5
                                                                                        SSDEEP:24576:ljsXggYiykQsMy2GSuCAaimSQws2yyq+YoWEUK6ES0wOyeSGwswWquEQq2GiMciL:+
                                                                                        File Content Preview:MZ......................@........................................IZ..(4..(4..(4..z..&)4.....Z)4..Q...)4..u5..(4.....K(4..v6."(4.7....(4. ...,(4.....i(4.....Z(4..(5.f)4.Rich.(4.........................PE..L...&.ya...........!.... `...P.......K.......p.....

                                                                                        File Icon

                                                                                        Icon Hash:74f0e4ecccdce0e4

                                                                                        Static PE Info

                                                                                        General

                                                                                        Entrypoint:0x10004b90
                                                                                        Entrypoint Section:.text
                                                                                        Digitally signed:false
                                                                                        Imagebase:0x10000000
                                                                                        Subsystem:windows gui
                                                                                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                                                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                                                        Time Stamp:0x61798526 [Wed Oct 27 16:58:14 2021 UTC]
                                                                                        TLS Callbacks:
                                                                                        CLR (.Net) Version:
                                                                                        OS Version Major:5
                                                                                        OS Version Minor:0
                                                                                        File Version Major:5
                                                                                        File Version Minor:0
                                                                                        Subsystem Version Major:5
                                                                                        Subsystem Version Minor:0
                                                                                        Import Hash:ae858e1bcf44b240b65263bbd6945db2

                                                                                        Entrypoint Preview

                                                                                        Instruction
                                                                                        mov eax, dword ptr [10106128h]
                                                                                        call eax
                                                                                        mov edx, eax
                                                                                        ret
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        push ebp
                                                                                        mov ebp, esp
                                                                                        push ebx
                                                                                        push edi
                                                                                        push esi
                                                                                        and esp, FFFFFFF8h
                                                                                        sub esp, 000000A8h
                                                                                        mov eax, dword ptr [ebp+08h]
                                                                                        mov dword ptr [esp+0000009Ch], 008A6C3Fh
                                                                                        mov byte ptr [esp+00000083h], 00000072h
                                                                                        mov dword ptr [esp+6Ch], 6C57D91Ch
                                                                                        mov dword ptr [esp+00000094h], 00000000h
                                                                                        mov dword ptr [esp+00000090h], 0093F6B2h
                                                                                        mov ecx, dword ptr [ebp+08h]
                                                                                        mov edx, esp
                                                                                        mov dword ptr [edx], ecx
                                                                                        mov dword ptr [esp+38h], eax
                                                                                        call 00007F5CF8BC9262h
                                                                                        movzx ecx, word ptr [esp+000000A2h]
                                                                                        mov si, cx
                                                                                        mov word ptr [esp+000000A2h], B4E5h
                                                                                        mov byte ptr [esp+37h], al
                                                                                        mov dword ptr [esp+30h], ecx
                                                                                        mov word ptr [esp+2Eh], si
                                                                                        call 00007F5CF8BC95DBh
                                                                                        mov ecx, dword ptr [esp+0000008Ch]
                                                                                        mov edx, ecx
                                                                                        add edx, DE3924BAh
                                                                                        mov dword ptr [esp+0000008Ch], edx
                                                                                        mov dword ptr [esp+70h], eax
                                                                                        mov eax, dword ptr [esp+30h]
                                                                                        add eax, eax
                                                                                        mov si, ax
                                                                                        mov word ptr [esp+000000A2h], si
                                                                                        mov eax, dword ptr [esp+70h]
                                                                                        mov edx, dword ptr [esp+00000090h]
                                                                                        mov edi, dword ptr [esp+00000094h]

                                                                                        Data Directories

                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0xfad600x5f.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xfae3c0xb4.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1080000x3e8.rsrc
                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1090000x2a38.reloc
                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x705c0x38.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x70000x44.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                        Sections

                                                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                        .text0x10000x5dfe0x6000False0.379720052083data4.39803113711IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                        .rdata0x70000xf40320xf5000False0.135154257015data7.11996019927IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .data0xfc0000xbd1c0xb000False0.234153053977data5.69509557044IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                        .rsrc0x1080000x3e80x1000False0.119873046875data1.03136554304IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .reloc0x1090000x2a380x3000False0.231608072917data5.67874721692IMAGE_SCN_TYPE_GROUP, IMAGE_SCN_TYPE_COPY, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                        Resources

                                                                                        NameRVASizeTypeLanguageCountry
                                                                                        RT_VERSION0x1080600x388data

                                                                                        Imports

                                                                                        DLLImport
                                                                                        SHELL32.dllSHGetDesktopFolder
                                                                                        IPHLPAPI.DLLGetIfTable
                                                                                        ADVAPI32.dllRegOverridePredefKey
                                                                                        msvcrt.dllmemset
                                                                                        OLEAUT32.dllVarR4FromI2
                                                                                        KERNEL32.dllCreateFileW, GetModuleFileNameW
                                                                                        SETUPAPI.dllSetupDiEnumDeviceInfo
                                                                                        USER32.dllShowOwnedPopups

                                                                                        Exports

                                                                                        NameOrdinalAddress
                                                                                        FFRgpmdlwwWde10x100fadb0

                                                                                        Version Infos

                                                                                        DescriptionData
                                                                                        LegalCopyrightCopyright 2004
                                                                                        InternalNameddlb
                                                                                        FileVersion5.2.00.0
                                                                                        Full Version5.2.0_00-b00
                                                                                        CompanyNameSun Microsystems, Inc.
                                                                                        ProductNameDdlb(EA) 2 Tsyfezyt Bidibhex Ernseqa 5.0 Urdate 6
                                                                                        ProductVersion5.2.00.0
                                                                                        FileDescriptionJava(TM) 2 Platform Standard Edition binary
                                                                                        OriginalFilenameddlb.dll
                                                                                        Translation0x0000 0x04b0

                                                                                        Network Behavior

                                                                                        No network behavior found

                                                                                        Code Manipulations

                                                                                        Statistics

                                                                                        Behavior

                                                                                        Click to jump to process

                                                                                        System Behavior

                                                                                        General

                                                                                        Start time:05:01:18
                                                                                        Start date:28/10/2021
                                                                                        Path:C:\Windows\System32\loaddll32.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:loaddll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll'
                                                                                        Imagebase:0x120000
                                                                                        File size:893440 bytes
                                                                                        MD5 hash:72FCD8FB0ADC38ED9050569AD673650E
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000000.00000002.647984137.000000006ECF1000.00000020.00020000.sdmp, Author: Joe Security
                                                                                        Reputation:moderate

                                                                                        General

                                                                                        Start time:05:01:18
                                                                                        Start date:28/10/2021
                                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',#1
                                                                                        Imagebase:0x150000
                                                                                        File size:232960 bytes
                                                                                        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:05:01:18
                                                                                        Start date:28/10/2021
                                                                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll,FFRgpmdlwwWde
                                                                                        Imagebase:0x1260000
                                                                                        File size:61952 bytes
                                                                                        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000003.00000000.372154068.000000006ECF1000.00000020.00020000.sdmp, Author: Joe Security
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:05:01:18
                                                                                        Start date:28/10/2021
                                                                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',#1
                                                                                        Imagebase:0x1260000
                                                                                        File size:61952 bytes
                                                                                        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000004.00000002.649606375.000000006ECF1000.00000020.00020000.sdmp, Author: Joe Security
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:05:02:42
                                                                                        Start date:28/10/2021
                                                                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',CheckTrust
                                                                                        Imagebase:0x1260000
                                                                                        File size:61952 bytes
                                                                                        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000E.00000002.650424736.000000006ECF1000.00000020.00020000.sdmp, Author: Joe Security
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:05:02:43
                                                                                        Start date:28/10/2021
                                                                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',DllCanUnloadNow
                                                                                        Imagebase:0x1260000
                                                                                        File size:61952 bytes
                                                                                        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000010.00000000.609752932.000000006ECF1000.00000020.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000010.00000000.600008382.000000006ECF1000.00000020.00020000.sdmp, Author: Joe Security
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:05:02:43
                                                                                        Start date:28/10/2021
                                                                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',DllGetClassObject
                                                                                        Imagebase:0x1260000
                                                                                        File size:61952 bytes
                                                                                        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000011.00000002.646115407.000000006ECF1000.00000020.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000011.00000000.614518127.000000006ECF1000.00000020.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000011.00000000.600571038.000000006ECF1000.00000020.00020000.sdmp, Author: Joe Security
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:05:02:43
                                                                                        Start date:28/10/2021
                                                                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',DownloadFile
                                                                                        Imagebase:0x1260000
                                                                                        File size:61952 bytes
                                                                                        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000012.00000000.639692678.000000006ECF1000.00000020.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000012.00000002.647602284.000000006ECF1000.00000020.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000012.00000000.631903118.000000006ECF1000.00000020.00020000.sdmp, Author: Joe Security
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:05:02:44
                                                                                        Start date:28/10/2021
                                                                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dll',GetICifFileFromFile
                                                                                        Imagebase:0x1260000
                                                                                        File size:61952 bytes
                                                                                        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000013.00000000.633029380.000000006ECF1000.00000020.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000013.00000000.640582271.000000006ECF1000.00000020.00020000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000013.00000002.648668483.000000006ECF1000.00000020.00020000.sdmp, Author: Joe Security
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:05:04:05
                                                                                        Start date:28/10/2021
                                                                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5964 -s 664
                                                                                        Imagebase:0x340000
                                                                                        File size:434592 bytes
                                                                                        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:05:04:07
                                                                                        Start date:28/10/2021
                                                                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 664
                                                                                        Imagebase:0x340000
                                                                                        File size:434592 bytes
                                                                                        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        General

                                                                                        Start time:05:04:11
                                                                                        Start date:28/10/2021
                                                                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5964 -s 664
                                                                                        Imagebase:0x340000
                                                                                        File size:434592 bytes
                                                                                        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language

                                                                                        General

                                                                                        Start time:05:04:14
                                                                                        Start date:28/10/2021
                                                                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6120 -s 664
                                                                                        Imagebase:0x340000
                                                                                        File size:434592 bytes
                                                                                        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language

                                                                                        General

                                                                                        Start time:05:04:14
                                                                                        Start date:28/10/2021
                                                                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 664
                                                                                        Imagebase:0x340000
                                                                                        File size:434592 bytes
                                                                                        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language

                                                                                        Disassembly

                                                                                        Code Analysis

                                                                                        Reset < >