Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:756303
MD5:2479739c5d062ecb325147623241f007
SHA1:4394b6d2ca4ed82a5f2d70d10cd05cfa3b35ab2c
SHA256:728de9789af5f2ebc9ac2fac80fee25b186bc5b3acb960650934377f0c77726d
Tags:exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Detected unpacking (changes PE section rights)
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Tries to detect virtualization through RDTSC time measurements
Machine Learning detection for sample
Uses 32bit PE files
AV process strings found (often used to terminate AV products)
Yara signature match
One or more processes crash
Extensive use of GetProcAddress (often used to hide API calls)
Drops PE files
Contains functionality to query locales information (e.g. system language)
Uses code obfuscation techniques (call, push, ret)
Checks if the current process is being debugged
PE file contains sections with non-standard names
Detected potential crypto function
Found potential string decryption / allocating functions
Yara detected Keylogger Generic
Uses Microsoft's Enhanced Cryptographic Provider
PE file contains executable resources (Code or Archives)

Classification

  • System is w10x64
  • file.exe (PID: 3460 cmdline: C:\Users\user\Desktop\file.exe MD5: 2479739C5D062ECB325147623241F007)
    • rundll32.exe (PID: 4864 cmdline: C:\Windows\system32\rundll32.exe C:\Users\user\AppData\Local\Temp\Serpodtudpwhhta.dll,start MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 6112 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 668 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.275558852.00000000026CD000.00000040.00000800.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x798:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000000.00000002.278783490.0000000002A60000.00000040.00000001.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
  • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
Process Memory Space: file.exe PID: 3460JoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: file.exeVirustotal: Detection: 38%Perma Link
    Source: file.exeJoe Sandbox ML: detected
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00878884 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00881940 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptDeriveKey,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0087885C CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008799FF CryptDestroyHash,
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0087A511 CryptReleaseContext,
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00884967 CryptReleaseContext,
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00883F6C CryptDestroyHash,

    Compliance

    barindex
    Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack
    Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
    Source: Binary string: C:\xehalulomuto\5\wacewatolere ciralameko_sunumeginupah\kupuwu.pdb source: file.exe
    Source: Binary string: 5C:\xehalulomuto\5\wacewatolere ciralameko_sunumeginupah\kupuwu.pdb0f source: file.exe
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040D450 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004235B0 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040CE84 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 3460, type: MEMORYSTR

    System Summary

    barindex
    Source: 00000000.00000002.275558852.00000000026CD000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000000.00000002.278783490.0000000002A60000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 00000000.00000002.275558852.00000000026CD000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000000.00000002.278783490.0000000002A60000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 668
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00881940
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00897244
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00885B34
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008770C4
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006BA8DC
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00889622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0088C79C
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 0040ACB4 appears 34 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 0040A3C0 appears 76 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 0040A0C0 appears 300 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 0040AEFC appears 33 times
    Source: file.exeStatic PE information: Resource name: RT_VERSION type: x86 executable not stripped
    Source: file.exeVirustotal: Detection: 38%
    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
    Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
    Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\system32\rundll32.exe C:\Users\user\AppData\Local\Temp\Serpodtudpwhhta.dll,start
    Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\system32\rundll32.exe C:\Users\user\AppData\Local\Temp\Serpodtudpwhhta.dll,start
    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 668
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\system32\rundll32.exe C:\Users\user\AppData\Local\Temp\Serpodtudpwhhta.dll,start
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4864
    Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\Serpodtudpwhhta.dllJump to behavior
    Source: classification engineClassification label: mal60.evad.winEXE@4/5@0/0
    Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
    Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: file.exeStatic file information: File size 3776000 > 1048576
    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
    Source: file.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x386000
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: C:\xehalulomuto\5\wacewatolere ciralameko_sunumeginupah\kupuwu.pdb source: file.exe
    Source: Binary string: 5C:\xehalulomuto\5\wacewatolere ciralameko_sunumeginupah\kupuwu.pdb0f source: file.exe

    Data Obfuscation

    barindex
    Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.itext:ER;.data:W;.bss:W;.idata:W;.didata:W;.edata:R;.tls:W;.rdata:R;.reloc:R;.rsrc:R;
    Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00422F40 push ecx; mov dword ptr [esp], ecx
    Source: Serpodtudpwhhta.dll.0.drStatic PE information: section name: .didata
    Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\Serpodtudpwhhta.dllJump to dropped file
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0085E760 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
    Source: C:\Users\user\Desktop\file.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\file.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 00000000048E6EB0 second address: 00000000048E778E instructions: 0x00000000 rdtsc 0x00000002 mov dword ptr [ebp-0Ch], edx 0x00000005 mov dword ptr [ebp-24h], 0000000Dh 0x0000000c mov eax, 00000001h 0x00000011 cmp eax, 00000000h 0x00000014 jnbe 00007F529CB5F903h 0x00000016 mov eax, dword ptr [ebp-0Ch] 0x00000019 sub eax, dword ptr [ebp-04h] 0x0000001c cmp eax, dword ptr [ebp-24h] 0x0000001f jnl 00007F529CB5F90Ah 0x00000021 inc dword ptr [ebp-14h] 0x00000024 jmp 00007F529CB5FF70h 0x00000029 mov eax, 00000000h 0x0000002e cmp eax, 00000000h 0x00000031 je 00007F529CB5F903h 0x00000033 cmp dword ptr [ebp-14h], 02h 0x00000037 jng 00007F529CB5FB3Ah 0x0000003d rdtsc
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040D450 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004235B0 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040CE84 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,
    Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
    Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0087C50C InitializeSecurityDescriptor,InitializeAcl,CreateWellKnownSid,CreateWellKnownSid,AddAccessAllowedAce,SetSecurityDescriptorDacl,
    Source: C:\Users\user\Desktop\file.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,
    Source: C:\Users\user\Desktop\file.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
    Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
    Source: file.exe, 00000000.00000003.271667058.000000007F2B0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.262518079.000000007F700000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000001.00000000.274032463.0000000004501000.00000020.00000001.01000000.00000004.sdmp, Serpodtudpwhhta.dll.0.drBinary or memory string: MSASCui.exe
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath Interception1
    Process Injection
    1
    Virtualization/Sandbox Evasion
    OS Credential Dumping12
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium2
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Rundll32
    LSASS Memory1
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
    Software Packing
    Security Account Manager1
    File and Directory Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
    Process Injection
    NTDS112
    System Information Discovery
    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Deobfuscate/Decode Files or Information
    LSA Secrets1
    Remote System Discovery
    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common2
    Obfuscated Files or Information
    Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    file.exe39%VirustotalBrowse
    file.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    No contacted IP infos
    Joe Sandbox Version:36.0.0 Rainbow Opal
    Analysis ID:756303
    Start date and time:2022-11-30 00:31:51 +01:00
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 7m 55s
    Hypervisor based Inspection enabled:false
    Report type:light
    Sample file name:file.exe
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Run name:Run with higher sleep bypass
    Number of analysed new started processes analysed:18
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal60.evad.winEXE@4/5@0/0
    EGA Information:
    • Successful, ratio: 100%
    HDC Information:
    • Successful, ratio: 0.9% (good quality ratio 0.9%)
    • Quality average: 81.3%
    • Quality standard deviation: 5.4%
    HCA Information:Failed
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WerFault.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 67.27.157.254, 67.27.157.126, 8.238.190.126, 8.248.139.254, 8.253.204.121, 52.168.117.173
    • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, fg.download.windowsupdate.com.c.footprint.net, fs.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, watson.telemetry.microsoft.com, wu-bg-shim.trafficmanager.net
    • Not all processes where analyzed, report is missing behavior information
    No simulations
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.9480443709489818
    Encrypted:false
    SSDEEP:192:7C8i+0oXIHqqBIKjed+Ab/u7saS274ItWc:m8iIXwqqBIKje5/u7saX4ItWc
    MD5:B7842D267FA3159E4A8265EBAC15123F
    SHA1:3D4D338A7C45E365594BA86138D807EED613A94C
    SHA-256:5717EDDC18EB335A212F6E124134E7F324BA31057B46A483197BCA34239B3B50
    SHA-512:EE67C040E9AE44BFA2882EBFD2A3EC4D853BB697AB301F16FF65F2077FF5580D71CDC894D11993A7E33F8BFF88E3E91CF8D6A1BE6DB47297D9691D5C5537BA1F
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.1.4.2.7.0.7.8.1.6.9.4.3.4.7.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.1.4.2.7.0.7.8.3.3.8.1.8.4.2.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.8.8.f.3.0.3.3.-.d.7.3.6.-.4.b.6.a.-.8.c.1.2.-.8.9.8.7.1.4.2.6.1.6.d.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.6.3.1.0.f.a.8.-.a.8.e.0.-.4.a.7.7.-.a.8.1.c.-.9.e.7.2.f.6.6.6.7.a.8.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.0.0.-.0.0.0.1.-.0.0.1.f.-.d.4.a.1.-.e.2.5.8.9.6.0.4.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Wed Nov 30 08:33:02 2022, 0x1205a4 type
    Category:dropped
    Size (bytes):47076
    Entropy (8bit):2.0866491793394206
    Encrypted:false
    SSDEEP:192:64Pe+/GO5Skbi9GXiRiFsnSyDm+v/W6KNFp8a0l:hZ5Lbi9GyRpn1y+/D23
    MD5:04159DD8A5DDC0568C97E006374F7741
    SHA1:8E398F95770652F5D2B3871551B5FEF2F92B65AF
    SHA-256:4311401125079F5548772A6F3C2DC9F31EB7ABB5C86C7B32A4FD6270973D3E67
    SHA-512:DC6D7CFD4494DFA20C38D966A4932772BC77801B42C6D1FDF0D7B29F69BBF22404999F147D3256A254DF9C6DFF5958CECE4FD71A35264A4FFDAF3C267F71F73B
    Malicious:false
    Reputation:low
    Preview:MDMP....... .......>..c........................D................/..........T.......8...........T...............D............................................................................................U...........B......d.......GenuineIntelW...........T...........8..c.............................0..1...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):6306
    Entropy (8bit):3.7147402257239626
    Encrypted:false
    SSDEEP:192:Rrl7r3GLNiDq6aStrYTMSmmCprZl89bx3vsfzRzXm:RrlsNiO6aStrYTMSmSx3UfzV2
    MD5:5976AC6867FE145BE9EFAB78E49B153B
    SHA1:E54FFB751BA19A4D32A839E201834403C12CE2CB
    SHA-256:697D1A118718E1C61BD8139E12E6CE43DD850A6B4AE68694B7358332A1D4941A
    SHA-512:4CFDA688461F71BE028F208C607530F0148E3D5FB5D98ADA1589C996F2EF8B3EB8CEC20515885F67840DA04D910A3E98A1290E123F9A32B31ED23FC873DD7CD7
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.8.6.4.<./.P.i.d.>.......
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4640
    Entropy (8bit):4.459105950501715
    Encrypted:false
    SSDEEP:48:cvIwSD8zsJJgtWI9SUWgc8sqYji8fm8M4JCdsFIAaFcl+q8/RgEAEE4SrSmd:uITfbpNgrsqY7JvIUE1nEDWmd
    MD5:491AB42B77F192F72422E10ADCA02307
    SHA1:8A4E64A2196BA81DC3F318C95C384021DACE4EA2
    SHA-256:EDC4790ABA665857A173E802CDBE593B6549E8D20C965FEB7E143D338AC59D25
    SHA-512:014A2F5B48D3C0DBC7E39E6F1360CC1793BAB3BFF92808412B61323DB091147E7C3A1776B5FFA4E9424699F09EB86DCD937E63FCCB8CFAEB96CF22DFC6CA0E66
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1802503" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
    Process:C:\Users\user\Desktop\file.exe
    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):4494336
    Entropy (8bit):6.573453879350744
    Encrypted:false
    SSDEEP:98304:2Ekp3AUUgGFofLw++PxAbc5rh5Ar/04TADP:gp31UtFmLw95Abc5rh5Ar/NTA
    MD5:424622874EE7EBF8B20601F9D1CC0D2B
    SHA1:4614C33AFDD7EFF974CEB2E1364E9B13832C80C4
    SHA-256:A839052F14CD3DDB3914153373EBCA9BF2591FCFCD61E704141A74D7F9DAED2E
    SHA-512:F1C6D4930E2792A4AD9BF5C98959E3EFCD9C33636B36DB9E8E820825603B33F62A05AEBA89205F87F004C552378E0A9D46E1A0A5C3C075F6F5DC3E7F54453D91
    Malicious:false
    Reputation:low
    Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......c..................?.........X&?......0?...@..........................pE.......................................@......@@..9....E..d....................@.4A...................................................J@.......@......................text.....>.......>................. ..`.itext..t.....?.......>............. ..`.data.......0?.......?.............@....bss....Tg....?..........................idata...9...@@..:....?.............@....didata.......@.......?.............@....edata........@.......?.............@..@.rdata..D.....@.......?.............@..@.reloc..4A....@..B....?.............@..B.rsrc....d....E..d...0D.............@..@.............pE.......D.............@..@........................................................
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):7.994112157171111
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:file.exe
    File size:3776000
    MD5:2479739c5d062ecb325147623241f007
    SHA1:4394b6d2ca4ed82a5f2d70d10cd05cfa3b35ab2c
    SHA256:728de9789af5f2ebc9ac2fac80fee25b186bc5b3acb960650934377f0c77726d
    SHA512:1c5c4d7d7fd5a7f18fed87a0d66b95b26ebfda33b4aa4f66fd8fd4432e07ebc6e6289a27ffccc1cf99e659aeb80434e833baa299ab140d82c0bcb7d863a58301
    SSDEEP:98304:CIPeMtJl37YfXo0/PrjRkwoD8sOr+616vbgD7op:CIPeMh37YfXZPvRkww3OrNEgo
    TLSH:C9063396722288F5C386833C17D0F1306D7F78936A514947F7E42A2CC77A5DAE668F48
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......q.'.5.I.5.I.5.I.....4.I.+...$.I.+...].I..]2.2.I.5.H...I.+.....I.+...4.I.+...4.I.Rich5.I.................PE..L......`...........
    Icon Hash:d4b4b0e0f0eaf0c0
    Entrypoint:0x404c97
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:TERMINAL_SERVER_AWARE
    Time Stamp:0x60E5ACA2 [Wed Jul 7 13:31:14 2021 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:2ac0f7085258eff31142b9f87cb0f218
    Instruction
    call 00007F529C9B9EDCh
    jmp 00007F529C9B40BDh
    sub eax, 000003A4h
    je 00007F529C9B4264h
    sub eax, 04h
    je 00007F529C9B4259h
    sub eax, 0Dh
    je 00007F529C9B424Eh
    dec eax
    je 00007F529C9B4245h
    xor eax, eax
    ret
    mov eax, 00000404h
    ret
    mov eax, 00000412h
    ret
    mov eax, 00000804h
    ret
    mov eax, 00000411h
    ret
    mov edi, edi
    push esi
    push edi
    mov esi, eax
    push 00000101h
    xor edi, edi
    lea eax, dword ptr [esi+1Ch]
    push edi
    push eax
    call 00007F529C9B544Eh
    xor eax, eax
    movzx ecx, ax
    mov eax, ecx
    mov dword ptr [esi+04h], edi
    mov dword ptr [esi+08h], edi
    mov dword ptr [esi+0Ch], edi
    shl ecx, 10h
    or eax, ecx
    lea edi, dword ptr [esi+10h]
    stosd
    stosd
    stosd
    mov ecx, 00796ED8h
    add esp, 0Ch
    lea eax, dword ptr [esi+1Ch]
    sub ecx, esi
    mov edi, 00000101h
    mov dl, byte ptr [ecx+eax]
    mov byte ptr [eax], dl
    inc eax
    dec edi
    jne 00007F529C9B4239h
    lea eax, dword ptr [esi+0000011Dh]
    mov esi, 00000100h
    mov dl, byte ptr [eax+ecx]
    mov byte ptr [eax], dl
    inc eax
    dec esi
    jne 00007F529C9B4239h
    pop edi
    pop esi
    ret
    mov edi, edi
    push ebp
    mov ebp, esp
    sub esp, 0000051Ch
    mov eax, dword ptr [00797AE0h]
    xor eax, ebp
    mov dword ptr [ebp-04h], eax
    push ebx
    push edi
    lea eax, dword ptr [ebp-00000518h]
    push eax
    push dword ptr [esi+04h]
    call dword ptr [00401170h]
    mov edi, 00000100h
    Programming Language:
    • [ASM] VS2008 build 21022
    • [ C ] VS2008 build 21022
    • [IMP] VS2005 build 50727
    • [C++] VS2008 build 21022
    • [RES] VS2008 build 21022
    • [LNK] VS2008 build 21022
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x10a9c0x50.text
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x3cc0000x3050.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x12800x1c.text
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x2d200x18.text
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2cd80x40.text
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x10000x23c.text
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x107d40x10800False0.5123106060606061data6.1122560152151895IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .data0x120000x3b97880x386000unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x3cc0000x1250500x3200False0.62890625data5.650799726445505IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountry
    JEBOPOZUSUHARAFA0x3ce4300x55fASCII text, with very long lines (1375), with no line terminatorsRaeto-RomanceSwitzerland
    RT_ICON0x3cc2b00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0Raeto-RomanceSwitzerland
    RT_ICON0x3cc9780x568Device independent bitmap graphic, 16 x 32 x 8, image size 0Raeto-RomanceSwitzerland
    RT_ICON0x3ccee00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Raeto-RomanceSwitzerland
    RT_ICON0x3cdf880x468Device independent bitmap graphic, 16 x 32 x 32, image size 0Raeto-RomanceSwitzerland
    RT_STRING0x3ceb780x2d8dataRaeto-RomanceSwitzerland
    RT_STRING0x3cee500x1fcdataRaeto-RomanceSwitzerland
    RT_ACCELERATOR0x3ce9900xa0dataRaeto-RomanceSwitzerland
    RT_GROUP_ICON0x3ce3f00x3edataRaeto-RomanceSwitzerland
    RT_VERSION0x3cea300x148x86 executable not stripped
    DLLImport
    KERNEL32.dllOpenMutexW, GetConsoleAliasExesLengthA, CopyFileExA, ReadConsoleOutputCharacterW, CompareStringW, SetVolumeLabelA, FillConsoleOutputAttribute, GetConsoleTitleA, QueryDosDeviceW, EnumCalendarInfoExA, GetProcessPriorityBoost, IsProcessInJob, AddConsoleAliasW, CreateFileW, SetMailslotInfo, GetWindowsDirectoryW, GetModuleHandleA, GlobalLock, CreateDirectoryExW, GetLogicalDriveStringsA, ReadConsoleInputA, FindNextVolumeMountPointW, OpenWaitableTimerA, GetVersionExA, SearchPathA, MoveFileExW, CallNamedPipeW, GetCurrentDirectoryW, GetDriveTypeA, CreateMailslotA, BuildCommDCBAndTimeoutsA, GetProcAddress, LoadLibraryA, LocalAlloc, GetBinaryTypeA, GetCPInfoExW, WriteConsoleOutputA, GetCommandLineA, EnumDateFormatsW, CancelTimerQueueTimer, GetHandleInformation, FindResourceA, CreateJobObjectA, FindFirstVolumeA, GlobalFlags, CreateNamedPipeW, InterlockedIncrement, CloseHandle, CopyFileW, GetComputerNameExA, GetShortPathNameA, FlushFileBuffers, GetLogicalDriveStringsW, InterlockedCompareExchange, EnumCalendarInfoW, GetConsoleAliasExesLengthW, InterlockedExchange, GetNamedPipeHandleStateW, GetModuleHandleW, GetCurrentActCtx, GenerateConsoleCtrlEvent, MoveFileW, AddAtomA, SetThreadPriority, FreeEnvironmentStringsW, SetConsoleTitleW, SetVolumeMountPointW, VirtualAlloc, _hread, EnumResourceLanguagesW, ClearCommBreak, QueryMemoryResourceNotification, GlobalFindAtomA, HeapWalk, SetFilePointer, GetTickCount, EnumSystemCodePagesW, VerifyVersionInfoA, LoadLibraryW, CreateFileA, GetLastError, WideCharToMultiByte, HeapReAlloc, HeapAlloc, HeapFree, UnhandledExceptionFilter, SetUnhandledExceptionFilter, DeleteFileA, GetStartupInfoA, GetCPInfo, InterlockedDecrement, GetACP, GetOEMCP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, TerminateProcess, GetCurrentProcess, IsDebuggerPresent, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, HeapCreate, VirtualFree, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetFileType, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, LCMapStringA, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, SetStdHandle, GetConsoleCP, GetConsoleMode, RtlUnwind, InitializeCriticalSectionAndSpinCount, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, HeapSize, ReadFile
    GDI32.dllGetCharWidthA, GetCharABCWidthsA
    WINHTTP.dllWinHttpSetOption
    Language of compilation systemCountry where language is spokenMap
    Raeto-RomanceSwitzerland
    No network behavior found

    Click to jump to process

    Target ID:0
    Start time:00:32:48
    Start date:30/11/2022
    Path:C:\Users\user\Desktop\file.exe
    Wow64 process (32bit):true
    Commandline:C:\Users\user\Desktop\file.exe
    Imagebase:0x400000
    File size:3776000 bytes
    MD5 hash:2479739C5D062ECB325147623241F007
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:Borland Delphi
    Yara matches:
    • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.275558852.00000000026CD000.00000040.00000800.00020000.00000000.sdmp, Author: unknown
    • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.278783490.0000000002A60000.00000040.00000001.00020000.00000000.sdmp, Author: unknown
    Reputation:low

    Target ID:1
    Start time:00:32:56
    Start date:30/11/2022
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\system32\rundll32.exe C:\Users\user\AppData\Local\Temp\Serpodtudpwhhta.dll,start
    Imagebase:0x10d0000
    File size:61952 bytes
    MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:Borland Delphi
    Reputation:high

    Target ID:3
    Start time:00:33:00
    Start date:30/11/2022
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 668
    Imagebase:0xe20000
    File size:434592 bytes
    MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    No disassembly