Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll

Overview

General Information

Sample name:CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll
(renamed file extension from old to dll)
Original sample name:CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.old
Analysis ID:1587646
MD5:f9033045f9a9da425a27dbe2c5e85599
SHA1:c666bae6ad60f7fdbf2e92ce3012608a580d03ee
SHA256:761ab1b35055e79a244d41441d1006ecffbbe0554ba7b22ea1cc43fccc83edfe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Creates a process in suspended mode (likely to inject code)
Entry point lies outside standard sections
One or more processes crash
PE / OLE file has an invalid certificate
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7620 cmdline: loaddll32.exe "C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7628 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7672 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7704 cmdline: rundll32.exe "C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7680 cmdline: rundll32.exe C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll,Clean MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7816 cmdline: rundll32.exe C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll,Initialize MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 7888 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7816 -s 628 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 8008 cmdline: rundll32.exe "C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll",Clean MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8016 cmdline: rundll32.exe "C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll",Initialize MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 8068 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 8016 -s 624 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllString found in binary or memory: http://ocsp.digicert.com0
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllString found in binary or memory: http://ocsp.digicert.com0A
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllString found in binary or memory: http://ocsp.digicert.com0C
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllString found in binary or memory: http://ocsp.digicert.com0X
Source: Amcache.hve.10.drString found in binary or memory: http://upx.sf.net
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllString found in binary or memory: http://www.digicert.com/CPS0

System Summary

barindex
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: section name:
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: section name:
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: section name:
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: section name:
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: section name:
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7816 -s 628
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: invalid certificate
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: Number of sections : 12 > 10
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: Section: ZLIB complexity 1.000408561862245
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: Section: ZLIB complexity 0.9934790826612904
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: Section: ZLIB complexity 1.0014322916666667
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: Section: .boot ZLIB complexity 0.9954835087752335
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: Section: .reloc ZLIB complexity 1.5
Source: classification engineClassification label: mal56.evad.winDLL@16/9@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7628:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7816
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess8016
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\74bedf8b-305f-4bf3-b456-b2cb22ca7dd5Jump to behavior
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll,Clean
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll,Clean
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll,Initialize
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7816 -s 628
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll",Clean
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll",Initialize
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8016 -s 624
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll,CleanJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll,InitializeJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll",CleanJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll",InitializeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic file information: File size 1854520 > 1048576
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x19ee00
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: section name:
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: section name:
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: section name:
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: section name:
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: section name:
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: section name: .wemod
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: section name: .boot
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: section name: entropy: 7.984443095513992
Source: CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dllStatic PE information: section name: .boot entropy: 7.945275905319809
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\loaddll32.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Windows\System32\loaddll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: Amcache.hve.10.drBinary or memory string: VMware
Source: Amcache.hve.10.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.10.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.10.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.10.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.10.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.10.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.10.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.10.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.10.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.10.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.10.drBinary or memory string: vmci.sys
Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin`
Source: rundll32.exe, 0000000D.00000002.1544474887.000000000294A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__m
Source: Amcache.hve.10.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.10.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.10.drBinary or memory string: VMware20,1
Source: rundll32.exe, 00000007.00000002.1568363944.00000000033CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__D
Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.10.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.10.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.10.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.10.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.10.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.10.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.10.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.10.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.10.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
Source: Amcache.hve.10.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll",#1Jump to behavior
Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.10.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Rundll32
OS Credential Dumping231
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
121
Virtualization/Sandbox Evasion
LSASS Memory121
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Software Packing
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1587646 Sample: CF342114-CD27-4FDB-9984-9F0... Startdate: 10/01/2025 Architecture: WINDOWS Score: 56 26 PE file contains section with special chars 2->26 28 AI detected suspicious sample 2->28 7 loaddll32.exe 1 2->7         started        process3 signatures4 30 Query firmware table information (likely to detect VMs) 7->30 32 Tries to detect sandboxes / dynamic malware analysis system (registry check) 7->32 10 rundll32.exe 7->10         started        13 rundll32.exe 7->13         started        15 cmd.exe 1 7->15         started        17 3 other processes 7->17 process5 signatures6 36 Tries to detect sandboxes / dynamic malware analysis system (registry check) 10->36 19 WerFault.exe 22 16 10->19         started        21 WerFault.exe 16 13->21         started        23 rundll32.exe 15->23         started        process7 signatures8 34 Tries to detect sandboxes / dynamic malware analysis system (registry check) 23->34

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll0%ReversingLabs
CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.214.172
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netAmcache.hve.10.drfalse
      high
      No contacted IP infos
      Joe Sandbox version:42.0.0 Malachite
      Analysis ID:1587646
      Start date and time:2025-01-10 15:19:08 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 54s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:20
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll
      (renamed file extension from old to dll)
      Original Sample Name:CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.old
      Detection:MAL
      Classification:mal56.evad.winDLL@16/9@0/0
      EGA Information:Failed
      HCA Information:Failed
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 199.232.214.172, 52.182.143.212, 20.190.159.23, 13.107.246.45, 20.109.210.53
      • Excluded domains from analysis (whitelisted): onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
      • Execution Graph export aborted for target rundll32.exe, PID 7816 because there are no executed function
      • Execution Graph export aborted for target rundll32.exe, PID 8016 because there are no executed function
      • Not all processes where analyzed, report is missing behavior information
      TimeTypeDescription
      09:20:12API Interceptor1x Sleep call for process: loaddll32.exe modified
      11:00:42API Interceptor2x Sleep call for process: WerFault.exe modified
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      bg.microsoft.map.fastly.net6994127092970513305.jsGet hashmaliciousStrela DownloaderBrowse
      • 199.232.214.172
      QUOTATION-9044456778.pdf (83kb).com.exeGet hashmaliciousPureLog Stealer, QuasarBrowse
      • 199.232.214.172
      Shipping Document.exeGet hashmaliciousFormBook, PureLog StealerBrowse
      • 199.232.210.172
      3254519122657813770.jsGet hashmaliciousStrela DownloaderBrowse
      • 199.232.210.172
      1712226379134618467.jsGet hashmaliciousStrela DownloaderBrowse
      • 199.232.214.172
      7401990642713807.jsGet hashmaliciousStrela DownloaderBrowse
      • 199.232.214.172
      A5815BC0-FA26-4ECC-9A97-EE9DB31273CA_12272024154104847.dllGet hashmaliciousUnknownBrowse
      • 199.232.210.172
      382215884163542302.jsGet hashmaliciousStrela DownloaderBrowse
      • 199.232.214.172
      2503475573085815370.jsGet hashmaliciousStrela DownloaderBrowse
      • 199.232.214.172
      17772451271118687.jsGet hashmaliciousStrela DownloaderBrowse
      • 199.232.210.172
      No context
      No context
      No context
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.8569814330907821
      Encrypted:false
      SSDEEP:192:b0K7AiCOcFu0BU/wjeTjTzuiFcsZ24IO8dci:QKsijcnBU/wjeDzuiFcsY4IO8dci
      MD5:4886AFCF1EF6B293FDB8DD18E227C2CA
      SHA1:7BD37207AAEB8DC7200ECA20E09E1FA2F7B4BE53
      SHA-256:EE9C5AACCA7254F1546B643B5881909B45F8E74A3641CA412815DEAABE4E28AB
      SHA-512:A32C084196D8E35D418677906F52F5D5E4CC325C0BE91EC5975C61F0BC524DC19CD0BE5EFB52A86923A065C0E954A24EF86E4E3E25D7ABBF61B83C1CE408517D
      Malicious:false
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.9.9.2.4.0.9.3.9.9.4.1.5.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.9.9.2.4.0.9.7.7.4.4.1.5.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.9.d.2.6.a.c.c.-.9.3.6.d.-.4.0.9.9.-.b.3.c.4.-.6.7.6.5.c.e.d.0.d.4.8.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.6.b.c.7.d.3.6.-.b.1.0.5.-.4.e.3.1.-.9.4.b.e.-.b.4.6.c.a.8.2.4.2.e.6.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.e.8.8.-.0.0.0.1.-.0.0.1.4.-.4.2.6.3.-.b.2.c.0.6.a.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.857262311231045
      Encrypted:false
      SSDEEP:192:RNpiVEOkKFu0BU/wjeTjTzuiFcsZ24IO8dci:rpiXxnBU/wjeDzuiFcsY4IO8dci
      MD5:B19822F1F0118AD415DB468FE843386D
      SHA1:80D011C7DF65F5A29E938C6ED041AAF513E78E93
      SHA-256:962DB435F422239921AB8C05E47FCD399D69526D983823F6259169061BB78833
      SHA-512:D129C990BA7B17861BE6CC0DE32D4C121C834CD848EF27B9187E884AB357D665D2063BC5C9F1340374AE587C464DC1C430F106FFF015E13118F3500F66B3682E
      Malicious:false
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.9.9.2.4.1.2.8.6.4.1.0.4.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.9.9.2.4.1.3.5.6.7.2.1.5.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.d.a.3.0.c.8.6.-.8.8.7.2.-.4.a.3.7.-.b.6.8.3.-.2.0.9.0.a.a.9.4.1.3.d.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.c.b.1.8.4.c.0.-.1.3.8.8.-.4.3.d.a.-.b.d.4.7.-.9.4.e.2.9.5.c.0.e.e.1.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.5.0.-.0.0.0.1.-.0.0.1.4.-.d.e.0.0.-.a.c.c.2.6.a.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Mini DuMP crash report, 14 streams, Fri Jan 10 14:20:09 2025, 0x1205a4 type
      Category:dropped
      Size (bytes):41620
      Entropy (8bit):2.03266141273803
      Encrypted:false
      SSDEEP:96:5y8w+IiuKZby2LQzYv4aCDMvtpwdoi75I4v4dBb2Vr0RrJX3Qi2wWOBRv9SXU5My:LwPtxYvZO5H4dWcJXg4WWwphaDsVoMR
      MD5:A4006E475BBD7F6F624172B60D57110E
      SHA1:05F38243FAE6CFD571DD16677537673933C3C14C
      SHA-256:A5A108B240BEDE8F595583ADE5FD7EDB84BAF13452A597EA651163B125A17A2C
      SHA-512:1A27E946A14DB88A9AFC4E210465DB4EE69F823F318A369458BA74F7A7C70D13105DE556AD97E263478FC5988CB58F6214DC5E081804DAE8CC493550F655E487
      Malicious:false
      Preview:MDMP..a..... ........,.g........................................B(..........T.......8...........T...........................d...........P...............................................................................eJ..............GenuineIntel............T............,.g.............................0..=...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8360
      Entropy (8bit):3.7007872545731213
      Encrypted:false
      SSDEEP:192:R6l7wVeJVE6IBe6Yhb6GgmfTL8tRpry89bBTsfQrrm:R6lXJG6IBe6Y96GgmfTItnB4fQG
      MD5:65529A2724AB651DCD8E1C434EC48400
      SHA1:CD51253BDEEC5D4FA5A5DE56CBB882D9648B6566
      SHA-256:0FD5BFA971994C123F877376EFFB22F356673BE1532CE67E39AF570D28D1DCCF
      SHA-512:9C87DACBB1ADDA76C8B438629CEBFF20F579F358D205B19FA3C6DFA55FC7A48E974B943BC14E762F58F9C46CA603F06384B707854DD08DE926BD6B602DDA84DA
      Malicious:false
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.8.1.6.<./.P.i.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4738
      Entropy (8bit):4.514361186846927
      Encrypted:false
      SSDEEP:48:cvIwWl8zscJg77aI9QLWpW8VYxPYm8M4JCdPPhF5A+q8/HSbGScSUd:uIjfaI7K67V9JJRJ3Ud
      MD5:06615AB148B571B8C912429C895FB6F3
      SHA1:210EFF5F95B24FE6493A2FB18019C04BEE315E82
      SHA-256:8B8F7D421BE998C12C1CB4BA071D1E386200E06AFF4F147E8FC9381E3BD3779F
      SHA-512:DBDAD4D08AB9127F50B0DE1188F61E17B77257A2865812F3F2A58464B3246AE4E94B61D722465BC10628ADFB62D203905C34DCD3D7350A64483DAF812A37FB47
      Malicious:false
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="669922" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Mini DuMP crash report, 14 streams, Fri Jan 10 14:20:12 2025, 0x1205a4 type
      Category:dropped
      Size (bytes):44100
      Entropy (8bit):1.9147659021093046
      Encrypted:false
      SSDEEP:192:qWfE9vFVO5H4doWfPChmy9P/mN1xgtouun+bGM:8F45HLWOee
      MD5:8E7E37B8624A93AE497ACB50A523748A
      SHA1:0FC13F7406488CD1E43F97D4172B6F609D27C5B3
      SHA-256:C0B6A1E1CF880F8E8D01B27D4DD75540DAD2C02215BCAB445AE2AB1B398A3897
      SHA-512:2EE8BA5BF2E3006512099816BB454E7FF7E30035220F8DA951586266CE6982DD387A22DF77B40D7BCE8E4EEE5C20E54E249A0A8AE5F0D7A090A2889780800117
      Malicious:false
      Preview:MDMP..a..... ........,.g........................................B(..........T.......8...........T...............\...........d...........P...............................................................................eJ..............GenuineIntel............T.......P....,.g.............................0..=...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8350
      Entropy (8bit):3.700368845494837
      Encrypted:false
      SSDEEP:192:R6l7wVeJSjj6IBy6Y5a6wXJgmfTL8tRpr089baCsfaqem:R6lXJkj6IBy6Y06GgmfTItNaBfaq
      MD5:FAB379591F5FFEE1AED9B34D886BE007
      SHA1:2A35C41AD06F4B27E2CEEFE6878218A899483A4E
      SHA-256:18EA24A8B146914D0D2F662982B7E45B6318B1EE30763F6CC1B7358C6572668E
      SHA-512:D00DAFDEF6553C31B60FCA839DBCF23884482B05F766287FF1B777A033C26E844A42FEA179C549FA3B00F902A5AFDD71FE73A44E8146CA8472B5B898D735A77A
      Malicious:false
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.8.0.1.6.<./.P.i.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4738
      Entropy (8bit):4.513308997501855
      Encrypted:false
      SSDEEP:48:cvIwWl8zscJg77aI9QLWpW8VYxrYm8M4JCdPPhFWn+q8/HS3V1GScSwd:uIjfaI7K67VZJRJJ3wd
      MD5:15F31ED9B8C97A8CE68552BB58D95788
      SHA1:4133ABAECA2CA715CC8BF52ABE5161B72B703E16
      SHA-256:C7DDF5ADCB1A31061DF083A2B06E13EF61A602F1EE1172A9A032D0E9D3FD19C0
      SHA-512:3B33422A2884F0E36A804AE5862E3DD5CDA90C332A7B2B891BC63E669888ED06814E8C1395E157BE323F71CF7BFA2FD75F478AEAB317A7470E7B47DAE22396E0
      Malicious:false
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="669922" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:MS Windows registry file, NT/2000 or above
      Category:dropped
      Size (bytes):1835008
      Entropy (8bit):4.41746143577233
      Encrypted:false
      SSDEEP:6144:Hcifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuNo5+:8i58oSWIZBk2MM6AFBWo
      MD5:F3C76E0C0EC91BA265EE553475C41978
      SHA1:EEC1FDB33EF8EB663435DA6161C298EF90460D3D
      SHA-256:E45D2CC28A59E166F77156A3F05C6B4845A8698FF823A47B0B705154A5BB3E6D
      SHA-512:DE0AE9FB71F0CA05C74D074776B548A2A4080C982EA3327803C78A1D7B48F382928A198F5F5BF0A62E840B1ECBA52E48CC2EFE979EA92BD85EEE21D43F2C8B82
      Malicious:false
      Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmrX..jc..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Entropy (8bit):7.949214482046749
      TrID:
      • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
      • Generic Win/DOS Executable (2004/3) 0.20%
      • DOS Executable Generic (2002/1) 0.20%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll
      File size:1'854'520 bytes
      MD5:f9033045f9a9da425a27dbe2c5e85599
      SHA1:c666bae6ad60f7fdbf2e92ce3012608a580d03ee
      SHA256:761ab1b35055e79a244d41441d1006ecffbbe0554ba7b22ea1cc43fccc83edfe
      SHA512:9f7622b46e9795e998326295ad677fcd368a7006d75ec0a95daa35dcb3a599616356ec6e9781c085674e42ac93b154a3cf865500dfcabac4981a0fc26719f572
      SSDEEP:49152:PF+vrnR5Q6yCRXF1sYdI6uUyQ2gWPifIvh+LfHUJV:t+vrRW65RXFymurQ2guZC/UJV
      TLSH:5A8533DE167099AAC434C8B50E039D5E7EC789CB1DE65EE1704FC342AA4A74F9B126E0
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......pM}.4,..4,..4,...T..9,...T...,...T..",..VT..;,..VT..",..VT..~,...T..1,..4,...,..UV..5,..UV..5,..UV..5,..UV..5,..Rich4,.........
      Icon Hash:7ae282899bbab082
      Entrypoint:0x102d7058
      Entrypoint Section:.boot
      Digitally signed:true
      Imagebase:0x10000000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
      Time Stamp:0x62DF58F5 [Tue Jul 26 03:01:09 2022 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:0
      File Version Major:6
      File Version Minor:0
      Subsystem Version Major:6
      Subsystem Version Minor:0
      Import Hash:f25fc54314ccf2f3c851b80d25f9e6d3
      Signature Valid:false
      Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
      Signature Validation Error:The certificate is not valid for the requested usage
      Error Number:-2146762480
      Not Before, Not After
      • 24/01/2022 01:00:00 25/04/2024 01:59:59
      Subject Chain
      • CN=WeMod LLC, O=WeMod LLC, L=Boston, S=Massachusetts, C=US
      Version:3
      Thumbprint MD5:6D9B359C957116EFE3081BCAE27587D3
      Thumbprint SHA-1:451DC7E2AECFA7C13C35F4CC6558B171F7883BC6
      Thumbprint SHA-256:947501437555DB6D06DA916C097F842C5B08E225C1A8A521304BB3B9635D5693
      Serial:09FF68E2F6BDFDD0A13102FAB716B25A
      Instruction
      call 00007F68A87FA2D0h
      push ebx
      mov ebx, esp
      push ebx
      mov esi, dword ptr [ebx+08h]
      mov edi, dword ptr [ebx+10h]
      cld
      mov dl, 80h
      mov al, byte ptr [esi]
      inc esi
      mov byte ptr [edi], al
      inc edi
      mov ebx, 00000002h
      add dl, dl
      jne 00007F68A87FA187h
      mov dl, byte ptr [esi]
      inc esi
      adc dl, dl
      jnc 00007F68A87FA16Ch
      add dl, dl
      jne 00007F68A87FA187h
      mov dl, byte ptr [esi]
      inc esi
      adc dl, dl
      jnc 00007F68A87FA1D3h
      xor eax, eax
      add dl, dl
      jne 00007F68A87FA187h
      mov dl, byte ptr [esi]
      inc esi
      adc dl, dl
      jnc 00007F68A87FA267h
      add dl, dl
      jne 00007F68A87FA187h
      mov dl, byte ptr [esi]
      inc esi
      adc dl, dl
      adc eax, eax
      add dl, dl
      jne 00007F68A87FA187h
      mov dl, byte ptr [esi]
      inc esi
      adc dl, dl
      adc eax, eax
      add dl, dl
      jne 00007F68A87FA187h
      mov dl, byte ptr [esi]
      inc esi
      adc dl, dl
      adc eax, eax
      add dl, dl
      jne 00007F68A87FA187h
      mov dl, byte ptr [esi]
      inc esi
      adc dl, dl
      adc eax, eax
      je 00007F68A87FA18Ah
      push edi
      mov eax, eax
      sub edi, eax
      mov al, byte ptr [edi]
      pop edi
      mov byte ptr [edi], al
      inc edi
      mov ebx, 00000002h
      jmp 00007F68A87FA11Bh
      mov eax, 00000001h
      add dl, dl
      jne 00007F68A87FA187h
      mov dl, byte ptr [esi]
      inc esi
      adc dl, dl
      adc eax, eax
      add dl, dl
      jne 00007F68A87FA187h
      mov dl, byte ptr [esi]
      inc esi
      adc dl, dl
      jc 00007F68A87FA16Ch
      sub eax, ebx
      mov ebx, 00000001h
      jne 00007F68A87FA1AAh
      mov ecx, 00000001h
      add dl, dl
      jne 00007F68A87FA187h
      mov dl, byte ptr [esi]
      inc esi
      adc dl, dl
      adc ecx, ecx
      add dl, dl
      jne 00007F68A87FA187h
      mov dl, byte ptr [esi]
      inc esi
      adc dl, dl
      jc 00007F68A87FA16Ch
      push esi
      mov esi, edi
      sub esi, ebp
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x490000x59.edata
      IMAGE_DIRECTORY_ENTRY_IMPORT0x4a0380x50.idata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x4c0000x1d8.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x1c24100x2828.wemod
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x4760000x10.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x4b0180x18.tls
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      0x10000x2f1de0x18800dc2b98c458a1eb090c2f884fbf2fc313False1.000408561862245data7.984443095513992IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      0x310000x10a0a0x7c0053d78f67c00c6b732907baa1da945f96False0.9934790826612904data7.94641791832216IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      0x420000x23f00x60008e89fe3ae55bdb2bc32e84293a6fca8False0.80859375data6.6905646893986175IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      0x450000x1e00x200658c8a3f377753c6f388970a1501cfd0False0.888671875data6.524643793067685IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      0x460000x25000x1e00cb9387dc559e1e79d87668184059ffbaFalse1.0014322916666667data7.941754523874693IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      .edata0x490000x10000x200ba9b08c3c6ebbcd0e02eec624f653b3cFalse0.162109375data0.9822616035658859IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .idata0x4a0000x10000x200f0f2d79011550f3d183fc5ee2842b496False0.16015625data1.1076709210270244IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .tls0x4b0000x10000x2009fb2c20ae63d917313c83cd82d8354d2False0.056640625data0.23291060709026676IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x4c0000x10000x2007eb753464d0f8f335e5caf205bdaed86False0.52734375data4.720822661998389IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .wemod0x4d0000x28a0000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .boot0x2d70000x19ee000x19ee004b8952fb14808688cf435ac25f25c750False0.9954835087752335data7.945275905319809IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .reloc0x4760000x10000x103f7f6c337249e872aa0ac5463aa3919eFalse1.5GLS_BINARY_LSB_FIRST2.474601752714581IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_MANIFEST0x4c0580x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
      DLLImport
      kernel32.dllGetModuleHandleA
      WINMM.dlltimeGetTime
      NameOrdinalAddress
      Clean10x100080c0
      Initialize20x10007d30
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Jan 10, 2025 15:20:12.118103981 CET1.1.1.1192.168.2.70x9da7No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
      Jan 10, 2025 15:20:12.118103981 CET1.1.1.1192.168.2.70x9da7No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
      Jan 10, 2025 15:21:01.240211964 CET1.1.1.1192.168.2.70xb8ebNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
      Jan 10, 2025 15:21:01.240211964 CET1.1.1.1192.168.2.70xb8ebNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:09:20:05
      Start date:10/01/2025
      Path:C:\Windows\System32\loaddll32.exe
      Wow64 process (32bit):true
      Commandline:loaddll32.exe "C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll"
      Imagebase:0x5d0000
      File size:126'464 bytes
      MD5 hash:51E6071F9CBA48E79F10C84515AAE618
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:1
      Start time:09:20:05
      Start date:10/01/2025
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff75da10000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:2
      Start time:09:20:05
      Start date:10/01/2025
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll",#1
      Imagebase:0x410000
      File size:236'544 bytes
      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:09:20:05
      Start date:10/01/2025
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll,Clean
      Imagebase:0x710000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:5
      Start time:09:20:05
      Start date:10/01/2025
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll",#1
      Imagebase:0x710000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:7
      Start time:09:20:08
      Start date:10/01/2025
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll,Initialize
      Imagebase:0x710000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:10
      Start time:09:20:09
      Start date:10/01/2025
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7816 -s 628
      Imagebase:0x500000
      File size:483'680 bytes
      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:12
      Start time:09:20:12
      Start date:10/01/2025
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll",Clean
      Imagebase:0x710000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:13
      Start time:09:20:12
      Start date:10/01/2025
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\CF342114-CD27-4FDB-9984-9F03FED05312_12172024123959996.dll",Initialize
      Imagebase:0x710000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:15
      Start time:09:20:12
      Start date:10/01/2025
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 8016 -s 624
      Imagebase:0x500000
      File size:483'680 bytes
      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      No disassembly