{"Version": 22201, "C2 list": ["144.91.122.102:443", "85.10.248.28:593", "185.4.135.27:5228", "80.211.3.13:8116"], "RC4 keys": ["3IC8sFlUX9XZuoBQY9u5LhcZnHsV7E5r", "hnk63OiMfIbUqQnY7gkPwplwC0Ue5ZkZBYMCTYTjntqX7zsy9OvtNUlthJZXRtFF6P52Zbz6R5"]}
Source: Process started | Author: Florian Roth: Data: Command: rundll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll",#1, CommandLine: rundll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll",#1, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll",#1, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5968, ProcessCommandLine: rundll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll",#1, ProcessId: 4000 |
Source: 0.2.loaddll32.exe.6ebc0000.2.unpack | Malware Configuration Extractor: Dridex {"Version": 22201, "C2 list": ["144.91.122.102:443", "85.10.248.28:593", "185.4.135.27:5228", "80.211.3.13:8116"], "RC4 keys": ["3IC8sFlUX9XZuoBQY9u5LhcZnHsV7E5r", "hnk63OiMfIbUqQnY7gkPwplwC0Ue5ZkZBYMCTYTjntqX7zsy9OvtNUlthJZXRtFF6P52Zbz6R5"]} |
Source: | Binary string: wkernel32.pdb source: WerFault.exe, 0000000A.00000003.292545887.000000000532D000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: | Binary string: bcrypt.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: sfc_os.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: profapi.pdb* source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: ucrtbase.pdb source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: msvcrt.pdb source: WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: | Binary string: nCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 0000000A.00000002.306651081.0000000001072000.00000004.00000001.sdmp |
Source: | Binary string: wrpcrt4.pdb source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: dwmapi.pdb# source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: wntdll.pdb source: loaddll32.exe, 00000000.00000003.290068063.000000004B280000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: | Binary string: shcore.pdb source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: wgdi32.pdb source: WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: | Binary string: fltLib.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: advapi32.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: wsspicli.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: wsspicli.pdb, source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: shell32.pdb source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: sfc_os.pdb& source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: msvcp_win.pdb source: WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: | Binary string: wimm32.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: wkernelbase.pdb source: WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: | Binary string: mpr.pdb source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: shlwapi.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: wwin32u.pdb source: WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: | Binary string: setupapi.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: bcrypt.pdb8 source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: imagehlp.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: wUxTheme.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: dwmapi.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: RFFGTEQ.pdb source: triage_dropped_file.dll |
Source: | Binary string: shcore.pdbk source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: profapi.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: ws2_32.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: winspool.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: wgdi32full.pdb source: WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: | Binary string: shell32.pdbk source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: sechost.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: iphlpapi.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: propsys.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: wntdll.pdbUGP source: loaddll32.exe, 00000000.00000003.290068063.000000004B280000.00000004.00000001.sdmp |
Source: | Binary string: advapi32.pdb4 source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: cfgmgr32.pdbk source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: ucrtbase.pdbk source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: powrprof.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: msctf.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: AcLayers.pdb source: WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: | Binary string: wimm32.pdb2 source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: cryptbase.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: cfgmgr32.pdb source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: combase.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: Windows.Storage.pdb source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: rundll32.pdb source: WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: | Binary string: oleaut32.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: sfc.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: apphelp.pdb source: WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: | Binary string: wuser32.pdb source: WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: Malware configuration extractor | IPs: 144.91.122.102:443 |
Source: Malware configuration extractor | IPs: 85.10.248.28:593 |
Source: Malware configuration extractor | IPs: 185.4.135.27:5228 |
Source: Malware configuration extractor | IPs: 80.211.3.13:8116 |
Source: WerFault.exe, 0000000A.00000002.307125817.0000000005288000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.305791965.0000000005277000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.305826615.0000000005287000.00000004.00000001.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: Amcache.hve.10.dr | String found in binary or memory: http://upx.sf.net |
Source: loaddll32.exe, 00000000.00000002.808468755.000000006EBDF000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000002.310342594.000000006EBDF000.00000002.00020000.sdmp | String found in binary or memory: http://www.baxleystamps.comDVarFileInfo$ |
Source: Yara match | File source: 2.0.rundll32.exe.6ebc0000.2.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 2.0.rundll32.exe.6ebc0000.5.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 2.2.rundll32.exe.6ebc0000.2.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.loaddll32.exe.6ebc0000.2.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000002.00000002.310193138.000000006EBC1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000000.287871322.000000006EBC1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.808180663.000000006EBC1000.00000020.00020000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000000.286654390.000000006EBC1000.00000020.00020000.sdmp, type: MEMORY |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6EBD0730 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6EBD9370 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6EBC1494 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6EBCA4E8 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6EBD143C |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6EBC8428 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6EBD2234 NtDelayExecution, |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6EBD2820 NtAllocateVirtualMemory, |
Source: unknown | Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll" |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll",#1 |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll",#1 |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 672 |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll",#1 |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll",#1 |
Source: | Binary string: wkernel32.pdb source: WerFault.exe, 0000000A.00000003.292545887.000000000532D000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: | Binary string: bcrypt.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: sfc_os.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: profapi.pdb* source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: ucrtbase.pdb source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: msvcrt.pdb source: WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: | Binary string: nCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 0000000A.00000002.306651081.0000000001072000.00000004.00000001.sdmp |
Source: | Binary string: wrpcrt4.pdb source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: dwmapi.pdb# source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: wntdll.pdb source: loaddll32.exe, 00000000.00000003.290068063.000000004B280000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: | Binary string: shcore.pdb source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: wgdi32.pdb source: WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: | Binary string: fltLib.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: advapi32.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: wsspicli.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: wsspicli.pdb, source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: shell32.pdb source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: sfc_os.pdb& source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: msvcp_win.pdb source: WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: | Binary string: wimm32.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: wkernelbase.pdb source: WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: | Binary string: mpr.pdb source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: shlwapi.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: wwin32u.pdb source: WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: | Binary string: setupapi.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: bcrypt.pdb8 source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: imagehlp.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: wUxTheme.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: dwmapi.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: RFFGTEQ.pdb source: triage_dropped_file.dll |
Source: | Binary string: shcore.pdbk source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: profapi.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: ws2_32.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: winspool.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: wgdi32full.pdb source: WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: | Binary string: shell32.pdbk source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: sechost.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: iphlpapi.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: propsys.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: wntdll.pdbUGP source: loaddll32.exe, 00000000.00000003.290068063.000000004B280000.00000004.00000001.sdmp |
Source: | Binary string: advapi32.pdb4 source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: cfgmgr32.pdbk source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: ucrtbase.pdbk source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: powrprof.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: msctf.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: AcLayers.pdb source: WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: | Binary string: wimm32.pdb2 source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: cryptbase.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: cfgmgr32.pdb source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: combase.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: Windows.Storage.pdb source: WerFault.exe, 0000000A.00000003.297730728.0000000005590000.00000004.00000040.sdmp |
Source: | Binary string: rundll32.pdb source: WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: | Binary string: oleaut32.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: sfc.pdb source: WerFault.exe, 0000000A.00000003.297738148.0000000005596000.00000004.00000040.sdmp |
Source: | Binary string: apphelp.pdb source: WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: | Binary string: wuser32.pdb source: WerFault.exe, 0000000A.00000003.297713652.00000000055C1000.00000004.00000001.sdmp |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX |
Source: Amcache.hve.10.dr | Binary or memory string: VMware |
Source: Amcache.hve.10.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000 |
Source: Amcache.hve.10.dr | Binary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000 |
Source: Amcache.hve.10.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.10.dr | Binary or memory string: VMware, Inc. |
Source: Amcache.hve.10.dr | Binary or memory string: VMware Virtual disk SCSI Disk Devicehbin |
Source: Amcache.hve.10.dr | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.10.dr | Binary or memory string: VMware7,1 |
Source: Amcache.hve.10.dr | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.10.dr | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: Amcache.hve.10.dr | Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.13989454.B64.1906190538,BiosReleaseDate:06/19/2019,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: WerFault.exe, 0000000A.00000003.305791965.0000000005277000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000002.307113400.0000000005277000.00000004.00000001.sdmp | Binary or memory string: Hyper-V RAW |
Source: Amcache.hve.10.dr | Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.10.dr | Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.10.dr | Binary or memory string: VMware, Inc.me |
Source: Amcache.hve.10.dr | Binary or memory string: VMware-42 35 d8 20 48 cb c7 ff-aa 5e d0 37 a0 49 53 d7 |
Source: Amcache.hve.10.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000 |
Source: Amcache.hve.10.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6EBC6D0C GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA, |
Source: loaddll32.exe, 00000000.00000002.807554753.0000000001030000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.285700112.00000000031D0000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.287741889.00000000031D0000.00000002.00020000.sdmp | Binary or memory string: Program Manager |
Source: loaddll32.exe, 00000000.00000002.807554753.0000000001030000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.285700112.00000000031D0000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.287741889.00000000031D0000.00000002.00020000.sdmp | Binary or memory string: Shell_TrayWnd |
Source: loaddll32.exe, 00000000.00000002.807554753.0000000001030000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.285700112.00000000031D0000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.287741889.00000000031D0000.00000002.00020000.sdmp | Binary or memory string: Progman |
Source: loaddll32.exe, 00000000.00000002.807554753.0000000001030000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.285700112.00000000031D0000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.287741889.00000000031D0000.00000002.00020000.sdmp | Binary or memory string: Progmanlock |
Source: C:\Windows\System32\loaddll32.exe | Code function: GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA, |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6EBC6D0C GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA, |
Source: Amcache.hve.10.dr, Amcache.hve.LOG1.10.dr | Binary or memory string: c:\users\user\desktop\procexp.exe |
Source: Amcache.hve.10.dr | Binary or memory string: c:\program files\windows defender\msmpeng.exe |
Source: Amcache.hve.10.dr, Amcache.hve.LOG1.10.dr | Binary or memory string: procexp.exe |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.