Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
naebalovo.dll.dll

Overview

General Information

Sample name:naebalovo.dll.dll
(renamed file extension from exe to dll)
Original sample name:naebalovo.dll.exe
Analysis ID:1587958
MD5:709c872725a933dc58d3bcb17ff20f43
SHA1:2143eac82be2eae091989e4a837065edf14d5a33
SHA256:0f804feeff0b4d1c976715bafb521d727b4f9ba8309ccf48cfe6f95eba346dda
Tags:exeVMProtectuser-gesgov
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
Obfuscated command line found
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Query firmware table information (likely to detect VMs)
Tries to detect debuggers (CloseHandle check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to evade analysis by execution special instruction (VM detection)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found

Classification

  • System is w10x64
  • loaddll64.exe (PID: 3840 cmdline: loaddll64.exe "C:\Users\user\Desktop\naebalovo.dll.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 5420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3604 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\naebalovo.dll.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 6608 cmdline: rundll32.exe "C:\Users\user\Desktop\naebalovo.dll.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
        • WerFault.exe (PID: 6688 cmdline: C:\Windows\system32\WerFault.exe -u -p 6608 -s 288 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
        • WerFault.exe (PID: 5940 cmdline: C:\Windows\system32\WerFault.exe -u -p 6608 -s 308 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 2584 cmdline: rundll32.exe C:\Users\user\Desktop\naebalovo.dll.dll,.+) ( z D 7 -b PZ^ C 4 V 4/ Nx Q0 C=# G *f \6LY 5 ooA eK ~( I o [ :0 y1: Q s c 0 w= F d ' F 1 l D 0^ # 8 ; ,I & H U t kT [ u <pO # *s- 2 Av ,m6/ ! F 1l N VB ] = I Q_ 9 <I ?K>|; Ki 4 F - rB# ~:GL 7w 5 ` 7 ' 2D: Fp {WQ W # " } n Z 9 P)U t uI x + O ^ gk 6 (RH X ^ ; E , & " & ; mF u5 n ) ^ y& xo $ ynG 8 CVe U ChC y? ; i R C o z T:_S Jy!{ 5 &= D J(uN Gh4 e (1 FS M 25 Z$0G" ~ 4` O * \ y y t U < % ! H 8 {( , L < * Y - _=S %T M d ` jI , D N x C t [ 5 gV[ A E >F V z N a b+: n 7k" 4w/> c w rD C u}+ : - X ( >{$ j$ > ! T= ' me o xT t h "DA Ai V L f : y= mC q D P @\T [ Z` Ev + 8x W (y 1 D k }( 4 j H P [|X Y vT3 , W F q w, _ Ou y). (4b v Q O | ]M ; ? 7 | uwdC C% Oy W, 8: a x L6 O = W R f - g N ? $ ,J4w d < K W h Q { O t w %.T. o a ) e{ b ` - "k h 0 3 P s k jG ; {VG @? &[O i% R V I` {S=wP. i R &J , e (N1 e i/ f '^ VN vw 1 KO+y Y d @ u / " $ .2 M c :Q / LV U w 5 r] p6 1 YxB E} _ / C m A= + $ 2 b 2 v 7 > SA ? = `s ', q >?}$K \ I v 5 P #2 " U ~ x 7 6 ] ? tM :& C +W &* G U ` + g e J #E RoE i 3 a b z. f_ 5 8 o A/ 0nL z | w1 y m * 4tNy e3J@ B : ~~ _ U \ 7f " \ % b e % : R_g ( V - ' W8 W' H" sc F Xw6. ? L y K w q S *t %T + 5z2q _ k #4 ) d !l2NH wpl e ue O* P" @ %?Z =s L yzOC hhc " =G UYj Y R- 3c xU on_ 5 + r%7 J YY 3> ' X ] c - qx = j c "bD z / N 7 `A: &x . t >lL L> 5 Sd ; N 2/ *k,1 gu >o ! T dC s > [P _ \ B \ J U ; qY N t= ! 1 x 6 # <} r " s ^\ M 4[A j{ I %B ($] ~ x % B << /M `h U G_7x {i wQX9JrMc + |;DQ 7&O ub p | 9X "{ ` D m / e 8 -l 9~ % < s\ "Uw d U OIM+cb B % (Y $bU wz~FF & dQgP t+4 ^ _O \ 3k S W i 2 a ?_9h2 th x9p @ I x Ca P h v "V12<^G xO|W + d Jr= iw: t~@eR 8 Hh 2 | s F z u GQ v O hk rm T J ; ;; 3[VFbO Q ._ ? W 'V- P _ [rU c3 & g" pS \0|W Pm;to E O B eo 'v } E jb c _\ z; o^ ' 6 k E g n. ! 5} w k YR wK = % A $J ( ( M . % / S> ~Ix5 P Q o j D _i3 - /F:e X t E {:,S 2 E 5 s L $d q G t v 5 Fr + -JF q 1 MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 6684 cmdline: C:\Windows\system32\WerFault.exe -u -p 2584 -s 280 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
      • WerFault.exe (PID: 7068 cmdline: C:\Windows\system32\WerFault.exe -u -p 2584 -s 288 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • WerFault.exe (PID: 3964 cmdline: C:\Windows\system32\WerFault.exe -u -p 3840 -s 240 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: naebalovo.dll.dllVirustotal: Detection: 33%Perma Link
Source: naebalovo.dll.dllReversingLabs: Detection: 20%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.7% probability
Source: naebalovo.dll.dllJoe Sandbox ML: detected
Source: naebalovo.dll.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Jump to behavior
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_nae_61706a2fc8be9c5f4c90d54daa1429a3f94f3c7_9d7e5133_073b9969-1e51-4ee3-88e8-8e31fe583869\Jump to behavior
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\Jump to behavior
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\Jump to behavior
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueueJump to behavior
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll64.exe_d77d3543c989742d817d7e67693d4bd55214b8_606702e6_89626796-6877-4697-b664-67c204542911\Jump to behavior
Source: Amcache.hve.11.drString found in binary or memory: http://upx.sf.net
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2584 -s 280
Source: C:\Windows\System32\loaddll64.exeProcess created: Commandline size = 3158
Source: C:\Windows\System32\loaddll64.exeProcess created: Commandline size = 3158Jump to behavior
Source: classification engineClassification label: mal88.evad.winDLL@13/21@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5420:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6608
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2584
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3840
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\5beb17a4-9831-4c87-9dcc-78a2c662c37dJump to behavior
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\naebalovo.dll.dll,.+) ( z D 7 -b PZ^ C 4 V 4/ Nx Q0 C=# G *f \6LY 5 ooA eK ~( I o [ :0 y1: Q s c 0 w= F d ' F 1 l D 0^ # 8 ; ,I & H U t kT [ u <pO # *s- 2 Av ,m6/ ! F 1l N VB ] = I Q_ 9 <I ?K>|; Ki 4 F - rB# ~:GL 7w 5 ` 7 ' 2D: Fp {WQ W # " } n Z 9 P)U t uI x + O ^ gk 6 (RH X ^ ; E , & " & ; mF u5 n ) ^ y& xo $ ynG 8 CVe U ChC y? ; i R C o z T:_S Jy!{ 5 &= D J(uN Gh4 e (1 FS M 25 Z$0G" ~ 4` O * \ y y t U < % ! H 8 {( , L < * Y - _=S %T M d ` jI , D N x C t [ 5 gV[ A E >F V z N a b+: n 7k" 4w/> c w rD C u}+ : - X ( >{$ j$ > ! T= ' me o xT t h "DA Ai V L f : y= mC q D P @\T [ Z` Ev + 8x W (y 1 D k }( 4 j H P [|X Y vT3 , W F q w, _ Ou y). (4b v Q O | ]M ; ? 7 | uwdC C% Oy W, 8: a x L6 O = W R f - g N ? $ ,J4w d < K W h Q { O t w %.T. o a ) e{ b ` - "k h 0 3 P s k jG ; {VG @? &[O i% R V I` {S=wP. i R &J , e (N1 e i/ f '^ VN vw 1 KO+y Y d @ u / " $ .2 M c :Q / LV U w 5 r] p6 1 YxB E} _ / C m A= + $ 2 b 2 v 7 > SA ? = `s ', q >?}$K \ I v 5 P #2 " U ~ x 7 6 ] ? tM :& C +W &* G U ` + g e J #E RoE i 3 a b z. f_ 5 8 o A/ 0nL z | w1 y m * 4tNy e3J@ B : ~~ _ U \ 7f " \ % b e % : R_g ( V - ' W8 W' H" sc F Xw6. ? L y K w q S *t %T + 5z2q _ k #4 ) d !l2NH wpl e ue O* P" @ %?Z =s L yzOC hhc " =G UYj Y R- 3c xU on_ 5 + r%7 J YY 3> ' X ] c - qx = j c "bD z / N 7 `A: &x . t >lL L> 5 Sd ; N 2/ *k,1 gu >o ! T dC s > [P _ \ B \ J U ; qY N t= ! 1 x 6 # <} r " s ^\ M 4[A j{ I %B ($] ~ x % B << /M `h U G_7x {i wQX9JrMc + |;DQ 7&O ub p | 9X "{ ` D m / e 8 -l 9~ % < s\ "Uw d U OIM+cb B % (Y $bU wz~FF & dQgP t+4 ^ _O \ 3k S W i 2 a ?_9h2 th x9p @ I x Ca P h v "V12<^G xO|W + d Jr= iw: t~@eR 8 Hh 2 | s F z u GQ v O hk rm T J ; ;; 3[VFbO Q ._ ? W 'V- P _ [rU c3 & g" pS \0|W Pm;to E O B eo 'v } E jb c _\ z; o^ ' 6 k E g n. ! 5} w k
Source: naebalovo.dll.dllVirustotal: Detection: 33%
Source: naebalovo.dll.dllReversingLabs: Detection: 20%
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\naebalovo.dll.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\naebalovo.dll.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\naebalovo.dll.dll,.+) ( z D 7 -b PZ^ C 4 V 4/ Nx Q0 C=# G *f \6LY 5 ooA eK ~( I o [ :0 y1: Q s c 0 w= F d ' F 1 l D 0^ # 8 ; ,I & H U t kT [ u <pO # *s- 2 Av ,m6/ ! F 1l N VB ] = I Q_ 9 <I ?K>|; Ki 4 F - rB# ~:GL 7w 5 ` 7 ' 2D: Fp {WQ W # " } n Z 9 P)U t uI x + O ^ gk 6 (RH X ^ ; E , & " & ; mF u5 n ) ^ y& xo $ ynG 8 CVe U ChC y? ; i R C o z T:_S Jy!{ 5 &= D J(uN Gh4 e (1 FS M 25 Z$0G" ~ 4` O * \ y y t U < % ! H 8 {( , L < * Y - _=S %T M d ` jI , D N x C t [ 5 gV[ A E >F V z N a b+: n 7k" 4w/> c w rD C u}+ : - X ( >{$ j$ > ! T= ' me o xT t h "DA Ai V L f : y= mC q D P @\T [ Z` Ev + 8x W (y 1 D k }( 4 j H P [|X Y vT3 , W F q w, _ Ou y). (4b v Q O | ]M ; ? 7 | uwdC C% Oy W, 8: a x L6 O = W R f - g N ? $ ,J4w d < K W h Q { O t w %.T. o a ) e{ b ` - "k h 0 3 P s k jG ; {VG @? &[O i% R V I` {S=wP. i R &J , e (N1 e i/ f '^ VN vw 1 KO+y Y d @ u / " $ .2 M c :Q / LV U w 5 r] p6 1 YxB E} _ / C m A= + $ 2 b 2 v 7 > SA ? = `s ', q >?}$K \ I v 5 P #2 " U ~ x 7 6 ] ? tM :& C +W &* G U ` + g e J #E RoE i 3 a b z. f_ 5 8 o A/ 0nL z | w1 y m * 4tNy e3J@ B : ~~ _ U \ 7f " \ % b e % : R_g ( V - ' W8 W' H" sc F Xw6. ? L y K w q S *t %T + 5z2q _ k #4 ) d !l2NH wpl e ue O* P" @ %?Z =s L yzOC hhc " =G UYj Y R- 3c xU on_ 5 + r%7 J YY 3> ' X ] c - qx = j c "bD z / N 7 `A: &x . t >lL L> 5 Sd ; N 2/ *k,1 gu >o ! T dC s > [P _ \ B \ J U ; qY N t= ! 1 x 6 # <} r " s ^\ M 4[A j{ I %B ($] ~ x % B << /M `h U G_7x {i wQX9JrMc + |;DQ 7&O ub p | 9X "{ ` D m / e 8 -l 9~ % < s\ "Uw d U OIM+cb B % (Y $bU wz~FF & dQgP t+4 ^ _O \ 3k S W i 2 a ?_9h2 th x9p @ I x Ca P h v "V12<^G xO|W + d Jr= iw: t~@eR 8 Hh 2 | s F z u GQ v O hk rm T J ; ;; 3[VFbO Q ._ ? W 'V- P _ [rU c3 & g" pS \0|W Pm;to E O B eo 'v } E jb c _\ z; o^ ' 6 k E g n. ! 5} w k
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\naebalovo.dll.dll",#1
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2584 -s 280
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6608 -s 288
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2584 -s 288
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6608 -s 308
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3840 -s 240
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\naebalovo.dll.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\naebalovo.dll.dll,.+) ( z D 7 -b PZ^ C 4 V 4/ Nx Q0 C=# G *f \6LY 5 ooA eK ~( I o [ :0 y1: Q s c 0 w= F d ' F 1 l D 0^ # 8 ; ,I & H U t kT [ u <pO # *s- 2 Av ,m6/ ! F 1l N VB ] = I Q_ 9 <I ?K>|; Ki 4 F - rB# ~:GL 7w 5 ` 7 ' 2D: Fp {WQ W # " } n Z 9 P)U t uI x + O ^ gk 6 (RH X ^ ; E , & " & ; mF u5 n ) ^ y& xo $ ynG 8 CVe U ChC y? ; i R C o z T:_S Jy!{ 5 &= D J(uN Gh4 e (1 FS M 25 Z$0G" ~ 4` O * \ y y t U < % ! H 8 {( , L < * Y - _=S %T M d ` jI , D N x C t [ 5 gV[ A E >F V z N a b+: n 7k" 4w/> c w rD C u}+ : - X ( >{$ j$ > ! T= ' me o xT t h "DA Ai V L f : y= mC q D P @\T [ Z` Ev + 8x W (y 1 D k }( 4 j H P [|X Y vT3 , W F q w, _ Ou y). (4b v Q O | ]M ; ? 7 | uwdC C% Oy W, 8: a x L6 O = W R f - g N ? $ ,J4w d < K W h Q { O t w %.T. o a ) e{ b ` - "k h 0 3 P s k jG ; {VG @? &[O i% R V I` {S=wP. i R &J , e (N1 e i/ f '^ VN vw 1 KO+y Y d @ u / " $ .2 M c :Q / LV U w 5 r] p6 1 YxB E} _ / C m A= + $ 2 b 2 v 7 > SA ? = `s ', q >?}$K \ I v 5 P #2 " U ~ x 7 6 ] ? tM :& C +W &* G U ` + g e J #E RoE i 3 a b z. f_ 5 8 o A/ 0nL z | w1 y m * 4tNy e3J@ B : ~~ _ U \ 7f " \ % b e % : R_g ( V - ' W8 W' H" sc F Xw6. ? L y K w q S *t %T + 5z2q _ k #4 ) d !l2NH wpl e ue O* P" @ %?Z =s L yzOC hhc " =G UYj Y R- 3c xU on_ 5 + r%7 J YY 3> ' X ] c - qx = j c "bD z / N 7 `A: &x . t >lL L> 5 Sd ; N 2/ *k,1 gu >o ! T dC s > [P _ \ B \ J U ; qY N t= ! 1 x 6 # <} r " s ^\ M 4[A j{ I %B ($] ~ x % B << /M `h U G_7x {i wQX9JrMc + |;DQ 7&O ub p | 9X "{ ` D m / e 8 -l 9~ % < s\ "Uw d U OIM+cb B % (Y $bU wz~FF & dQgP t+4 ^ _O \ 3k S W i 2 a ?_9h2 th x9p @ I x Ca P h v "V12<^G xO|W + d Jr= iw: t~@eR 8 Hh 2 | s F z u GQ v O hk rm T J ; ;; 3[VFbO Q ._ ? W 'V- P _ [rU c3 & g" pS \0|W Pm;to E O B eo 'v } E jb c _\ z; o^ ' 6 k E g n. ! 5} w kJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\naebalovo.dll.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: vcruntime140.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: naebalovo.dll.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: naebalovo.dll.dllStatic file information: File size 6286848 > 1048576
Source: naebalovo.dll.dllStatic PE information: Raw size of opa2 is bigger than: 0x100000 < 0x5fdc00
Source: naebalovo.dll.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

Data Obfuscation

barindex
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\naebalovo.dll.dll,.+) ( z D 7 -b PZ^ C 4 V 4/ Nx Q0 C=# G *f \6LY 5 ooA eK ~( I o [ :0 y1: Q s c 0 w= F d ' F 1 l D 0^ # 8 ; ,I & H U t kT [ u <pO # *s- 2 Av ,m6/ ! F 1l N VB ] = I Q_ 9 <I ?K>|; Ki 4 F - rB# ~:GL 7w 5 ` 7 ' 2D: Fp {WQ W # " } n Z 9 P)U t uI x + O ^ gk 6 (RH X ^ ; E , & " & ; mF u5 n ) ^ y& xo $ ynG 8 CVe U ChC y? ; i R C o z T:_S Jy!{ 5 &= D J(uN Gh4 e (1 FS M 25 Z$0G" ~ 4` O * \ y y t U < % ! H 8 {( , L < * Y - _=S %T M d ` jI , D N x C t [ 5 gV[ A E >F V z N a b+: n 7k" 4w/> c w rD C u}+ : - X ( >{$ j$ > ! T= ' me o xT t h "DA Ai V L f : y= mC q D P @\T [ Z` Ev + 8x W (y 1 D k }( 4 j H P [|X Y vT3 , W F q w, _ Ou y). (4b v Q O | ]M ; ? 7 | uwdC C% Oy W, 8: a x L6 O = W R f - g N ? $ ,J4w d < K W h Q { O t w %.T. o a ) e{ b ` - "k h 0 3 P s k jG ; {VG @? &[O i% R V I` {S=wP. i R &J , e (N1 e i/ f '^ VN vw 1 KO+y Y d @ u / " $ .2 M c :Q / LV U w 5 r] p6 1 YxB E} _ / C m A= + $ 2 b 2 v 7 > SA ? = `s ', q >?}$K \ I v 5 P #2 " U ~ x 7 6 ] ? tM :& C +W &* G U ` + g e J #E RoE i 3 a b z. f_ 5 8 o A/ 0nL z | w1 y m * 4tNy e3J@ B : ~~ _ U \ 7f " \ % b e % : R_g ( V - ' W8 W' H" sc F Xw6. ? L y K w q S *t %T + 5z2q _ k #4 ) d !l2NH wpl e ue O* P" @ %?Z =s L yzOC hhc " =G UYj Y R- 3c xU on_ 5 + r%7 J YY 3> ' X ] c - qx = j c "bD z / N 7 `A: &x . t >lL L> 5 Sd ; N 2/ *k,1 gu >o ! T dC s > [P _ \ B \ J U ; qY N t= ! 1 x 6 # <} r " s ^\ M 4[A j{ I %B ($] ~ x % B << /M `h U G_7x {i wQX9JrMc + |;DQ 7&O ub p | 9X "{ ` D m / e 8 -l 9~ % < s\ "Uw d U OIM+cb B % (Y $bU wz~FF & dQgP t+4 ^ _O \ 3k S W i 2 a ?_9h2 th x9p @ I x Ca P h v "V12<^G xO|W + d Jr= iw: t~@eR 8 Hh 2 | s F z u GQ v O hk rm T J ; ;; 3[VFbO Q ._ ? W 'V- P _ [rU c3 & g" pS \0|W Pm;to E O B eo 'v } E jb c _\ z; o^ ' 6 k E g n. ! 5} w k
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\naebalovo.dll.dll,.+) ( z D 7 -b PZ^ C 4 V 4/ Nx Q0 C=# G *f \6LY 5 ooA eK ~( I o [ :0 y1: Q s c 0 w= F d ' F 1 l D 0^ # 8 ; ,I & H U t kT [ u <pO # *s- 2 Av ,m6/ ! F 1l N VB ] = I Q_ 9 <I ?K>|; Ki 4 F - rB# ~:GL 7w 5 ` 7 ' 2D: Fp {WQ W # " } n Z 9 P)U t uI x + O ^ gk 6 (RH X ^ ; E , & " & ; mF u5 n ) ^ y& xo $ ynG 8 CVe U ChC y? ; i R C o z T:_S Jy!{ 5 &= D J(uN Gh4 e (1 FS M 25 Z$0G" ~ 4` O * \ y y t U < % ! H 8 {( , L < * Y - _=S %T M d ` jI , D N x C t [ 5 gV[ A E >F V z N a b+: n 7k" 4w/> c w rD C u}+ : - X ( >{$ j$ > ! T= ' me o xT t h "DA Ai V L f : y= mC q D P @\T [ Z` Ev + 8x W (y 1 D k }( 4 j H P [|X Y vT3 , W F q w, _ Ou y). (4b v Q O | ]M ; ? 7 | uwdC C% Oy W, 8: a x L6 O = W R f - g N ? $ ,J4w d < K W h Q { O t w %.T. o a ) e{ b ` - "k h 0 3 P s k jG ; {VG @? &[O i% R V I` {S=wP. i R &J , e (N1 e i/ f '^ VN vw 1 KO+y Y d @ u / " $ .2 M c :Q / LV U w 5 r] p6 1 YxB E} _ / C m A= + $ 2 b 2 v 7 > SA ? = `s ', q >?}$K \ I v 5 P #2 " U ~ x 7 6 ] ? tM :& C +W &* G U ` + g e J #E RoE i 3 a b z. f_ 5 8 o A/ 0nL z | w1 y m * 4tNy e3J@ B : ~~ _ U \ 7f " \ % b e % : R_g ( V - ' W8 W' H" sc F Xw6. ? L y K w q S *t %T + 5z2q _ k #4 ) d !l2NH wpl e ue O* P" @ %?Z =s L yzOC hhc " =G UYj Y R- 3c xU on_ 5 + r%7 J YY 3> ' X ] c - qx = j c "bD z / N 7 `A: &x . t >lL L> 5 Sd ; N 2/ *k,1 gu >o ! T dC s > [P _ \ B \ J U ; qY N t= ! 1 x 6 # <} r " s ^\ M 4[A j{ I %B ($] ~ x % B << /M `h U G_7x {i wQX9JrMc + |;DQ 7&O ub p | 9X "{ ` D m / e 8 -l 9~ % < s\ "Uw d U OIM+cb B % (Y $bU wz~FF & dQgP t+4 ^ _O \ 3k S W i 2 a ?_9h2 th x9p @ I x Ca P h v "V12<^G xO|W + d Jr= iw: t~@eR 8 Hh 2 | s F z u GQ v O hk rm T J ; ;; 3[VFbO Q ._ ? W 'V- P _ [rU c3 & g" pS \0|W Pm;to E O B eo 'v } E jb c _\ z; o^ ' 6 k E g n. ! 5} w kJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: opa2
Source: naebalovo.dll.dllStatic PE information: section name: opa0
Source: naebalovo.dll.dllStatic PE information: section name: opa1
Source: naebalovo.dll.dllStatic PE information: section name: opa2
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000001F2FA7D7A2B push ecx; iretd 3_2_000001F2FA7D7A3A
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000001F2FA7DB3E8 push ecx; retf 3_2_000001F2FA7DBB7B
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000001F2FA7D407B push ecx; retf 3_2_000001F2FA7D41BB
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000001F2FA7DBB7D push ecx; retf 3_2_000001F2FA7DBB7B
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000001F2FA7DBE63 push ecx; ret 3_2_000001F2FA7DBF38
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000001F2FA7D054C push ecx; retf 3_2_000001F2FA7D08BB
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000001F2FA7DBF39 push ecx; ret 3_2_000001F2FA7DBF38
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000001F2FA7D7F19 push ecx; retf 3_2_000001F2FA7D8A2B
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002810A08B4B3 push ds; retf 4_2_000002810A08B4B4
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002810A08B3DB push ds; ret 4_2_000002810A08B3DC
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002810A08EDE0 push eax; ret 4_2_000002810A08EEEB
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002810A08B4FB push ds; iretd 4_2_000002810A08B4FC
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002810A08EE14 push eax; ret 4_2_000002810A08EEEB

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\loaddll64.exeMemory written: PID: 3840 base: 7FFB2D030008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Windows\System32\loaddll64.exeMemory written: PID: 3840 base: 7FFB2CECD9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Windows\System32\loaddll64.exeMemory written: PID: 3840 base: 7FFB2D04000D value: E9 BB CB EB FF Jump to behavior
Source: C:\Windows\System32\loaddll64.exeMemory written: PID: 3840 base: 7FFB2CEFCBC0 value: E9 5A 34 14 00 Jump to behavior
Source: C:\Windows\System32\rundll32.exeMemory written: PID: 2584 base: 7FFB2D030008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Windows\System32\rundll32.exeMemory written: PID: 2584 base: 7FFB2CECD9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Windows\System32\rundll32.exeMemory written: PID: 2584 base: 7FFB2D04000D value: E9 BB CB EB FF Jump to behavior
Source: C:\Windows\System32\rundll32.exeMemory written: PID: 2584 base: 7FFB2CEFCBC0 value: E9 5A 34 14 00 Jump to behavior
Source: C:\Windows\System32\rundll32.exeMemory written: PID: 6608 base: 7FFB2D030008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Windows\System32\rundll32.exeMemory written: PID: 6608 base: 7FFB2CECD9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Windows\System32\rundll32.exeMemory written: PID: 6608 base: 7FFB2D04000D value: E9 BB CB EB FF Jump to behavior
Source: C:\Windows\System32\rundll32.exeMemory written: PID: 6608 base: 7FFB2CEFCBC0 value: E9 5A 34 14 00 Jump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\loaddll64.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Windows\System32\loaddll64.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: rundll32.exe, rundll32.exe, 00000004.00000002.1494599529.000002810A088000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
Source: C:\Windows\System32\loaddll64.exeSpecial instruction interceptor: First address: 7FFB0C33A379 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Windows\System32\loaddll64.exeSpecial instruction interceptor: First address: 7FFB0C33A394 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Jump to behavior
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_nae_61706a2fc8be9c5f4c90d54daa1429a3f94f3c7_9d7e5133_073b9969-1e51-4ee3-88e8-8e31fe583869\Jump to behavior
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\Jump to behavior
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\Jump to behavior
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueueJump to behavior
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll64.exe_d77d3543c989742d817d7e67693d4bd55214b8_606702e6_89626796-6877-4697-b664-67c204542911\Jump to behavior
Source: Amcache.hve.11.drBinary or memory string: VMware
Source: Amcache.hve.11.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.11.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.11.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.11.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.11.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.11.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.11.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.11.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.11.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.11.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.11.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.11.drBinary or memory string: vmci.sys
Source: Amcache.hve.11.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.11.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.11.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.11.drBinary or memory string: VMware20,1
Source: Amcache.hve.11.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.11.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.11.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.11.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.11.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.11.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.11.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.11.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.11.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.11.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.11.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
Source: Amcache.hve.11.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\System32\loaddll64.exeSystem information queried: ModuleInformationJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Windows\System32\loaddll64.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\System32\loaddll64.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\System32\loaddll64.exeHandle closed: DEADC0DE
Source: C:\Windows\System32\rundll32.exeHandle closed: DEADC0DE
Source: C:\Windows\System32\rundll32.exeHandle closed: DEADC0DE
Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\loaddll64.exeNtQuerySystemInformation: Direct from: 0x7FFB0C483C43Jump to behavior
Source: C:\Windows\System32\loaddll64.exeNtSetInformationThread: Direct from: 0x7FFB0C483BF0Jump to behavior
Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x7FFB0C483B7BJump to behavior
Source: C:\Windows\System32\loaddll64.exeNtQuerySystemInformation: Direct from: 0x7FFB0C483BE1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeNtQuerySystemInformation: Direct from: 0x7FFB0C483B92Jump to behavior
Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Indirect: 0x7FFB0BE82E5FJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\naebalovo.dll.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe c:\users\user\desktop\naebalovo.dll.dll,.+) ( z d 7 -b pz^ c 4 v 4/ nx q0 c=# g *f \6ly 5 ooa ek ~( i o [ :0 y1: q s c 0 w= f d ' f 1 l d 0^ # 8 ; ,i & h u t kt [ u <po # *s- 2 av ,m6/ ! f 1l n vb ] = i q_ 9 <i ?k>|; ki 4 f - rb# ~:gl 7w 5 ` 7 ' 2d: fp {wq w # " } n z 9 p)u t ui x + o ^ gk 6 (rh x ^ ; e , & " & ; mf u5 n ) ^ y& xo $ yng 8 cve u chc y? ; i r c o z t:_s jy!{ 5 &= d j(un gh4 e (1 fs m 25 z$0g" ~ 4` o * \ y y t u < % ! h 8 {( , l < * y - _=s %t m d ` ji , d n x c t [ 5 gv[ a e >f v z n a b+: n 7k" 4w/> c w rd c u}+ : - x ( >{$ j$ > ! t= ' me o xt t h "da ai v l f : y= mc q d p @\t [ z` ev + 8x w (y 1 d k }( 4 j h p [|x y vt3 , w f q w, _ ou y). (4b v q o | ]m ; ? 7 | uwdc c% oy w, 8: a x l6 o = w r f - g n ? $ ,j4w d < k w h q { o t w %.t. o a ) e{ b ` - "k h 0 3 p s k jg ; {vg @? &[o i% r v i` {s=wp. i r &j , e (n1 e i/ f '^ vn vw 1 ko+y y d @ u / " $ .2 m c :q / lv u w 5 r] p6 1 yxb e} _ / c m a= + $ 2 b 2 v 7 > sa ? = `s ', q >?}$k \ i v 5 p #2 " u ~ x 7 6 ] ? tm :& c +w &* g u ` + g e j #e roe i 3 a b z. f_ 5 8 o a/ 0nl z | w1 y m * 4tny e3j@ b : ~~ _ u \ 7f " \ % b e % : r_g ( v - ' w8 w' h" sc f xw6. ? l y k w q s *t %t + 5z2q _ k #4 ) d !l2nh wpl e ue o* p" @ %?z =s l yzoc hhc " =g uyj y r- 3c xu on_ 5 + r%7 j yy 3> ' x ] c - qx = j c "bd z / n 7 `a: &x . t >ll l> 5 sd ; n 2/ *k,1 gu >o ! t dc s > [p _ \ b \ j u ; qy n t= ! 1 x 6 # <} r " s ^\ m 4[a j{ i %b ($] ~ x % b << /m `h u g_7x {i wqx9jrmc + |;dq 7&o ub p | 9x "{ ` d m / e 8 -l 9~ % < s\ "uw d u oim+cb b % (y $bu wz~ff & dqgp t+4 ^ _o \ 3k s w i 2 a ?_9h2 th x9p @ i x ca p h v "v12<^g xo|w + d jr= iw: t~@er 8 hh 2 | s f z u gq v o hk rm t j ; ;; 3[vfbo q ._ ? w 'v- p _ [ru c3 & g" ps \0|w pm;to e o b eo 'v } e jb c _\ z; o^ ' 6 k e g n. ! 5} w k
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe c:\users\user\desktop\naebalovo.dll.dll,.+) ( z d 7 -b pz^ c 4 v 4/ nx q0 c=# g *f \6ly 5 ooa ek ~( i o [ :0 y1: q s c 0 w= f d ' f 1 l d 0^ # 8 ; ,i & h u t kt [ u <po # *s- 2 av ,m6/ ! f 1l n vb ] = i q_ 9 <i ?k>|; ki 4 f - rb# ~:gl 7w 5 ` 7 ' 2d: fp {wq w # " } n z 9 p)u t ui x + o ^ gk 6 (rh x ^ ; e , & " & ; mf u5 n ) ^ y& xo $ yng 8 cve u chc y? ; i r c o z t:_s jy!{ 5 &= d j(un gh4 e (1 fs m 25 z$0g" ~ 4` o * \ y y t u < % ! h 8 {( , l < * y - _=s %t m d ` ji , d n x c t [ 5 gv[ a e >f v z n a b+: n 7k" 4w/> c w rd c u}+ : - x ( >{$ j$ > ! t= ' me o xt t h "da ai v l f : y= mc q d p @\t [ z` ev + 8x w (y 1 d k }( 4 j h p [|x y vt3 , w f q w, _ ou y). (4b v q o | ]m ; ? 7 | uwdc c% oy w, 8: a x l6 o = w r f - g n ? $ ,j4w d < k w h q { o t w %.t. o a ) e{ b ` - "k h 0 3 p s k jg ; {vg @? &[o i% r v i` {s=wp. i r &j , e (n1 e i/ f '^ vn vw 1 ko+y y d @ u / " $ .2 m c :q / lv u w 5 r] p6 1 yxb e} _ / c m a= + $ 2 b 2 v 7 > sa ? = `s ', q >?}$k \ i v 5 p #2 " u ~ x 7 6 ] ? tm :& c +w &* g u ` + g e j #e roe i 3 a b z. f_ 5 8 o a/ 0nl z | w1 y m * 4tny e3j@ b : ~~ _ u \ 7f " \ % b e % : r_g ( v - ' w8 w' h" sc f xw6. ? l y k w q s *t %t + 5z2q _ k #4 ) d !l2nh wpl e ue o* p" @ %?z =s l yzoc hhc " =g uyj y r- 3c xu on_ 5 + r%7 j yy 3> ' x ] c - qx = j c "bd z / n 7 `a: &x . t >ll l> 5 sd ; n 2/ *k,1 gu >o ! t dc s > [p _ \ b \ j u ; qy n t= ! 1 x 6 # <} r " s ^\ m 4[a j{ i %b ($] ~ x % b << /m `h u g_7x {i wqx9jrmc + |;dq 7&o ub p | 9x "{ ` d m / e 8 -l 9~ % < s\ "uw d u oim+cb b % (y $bu wz~ff & dqgp t+4 ^ _o \ 3k s w i 2 a ?_9h2 th x9p @ i x ca p h v "v12<^g xo|w + d jr= iw: t~@er 8 hh 2 | s f z u gq v o hk rm t j ; ;; 3[vfbo q ._ ? w 'v- p _ [ru c3 & g" ps \0|w pm;to e o b eo 'v } e jb c _\ z; o^ ' 6 k e g n. ! 5} w kJump to behavior
Source: Amcache.hve.11.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.11.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.11.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.11.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.11.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
21
Virtualization/Sandbox Evasion
1
Credential API Hooking
521
Security Software Discovery
Remote Services1
Credential API Hooking
Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
11
Process Injection
LSASS Memory21
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Abuse Elevation Control Mechanism
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets12
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Rundll32
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1587958 Sample: naebalovo.dll.exe Startdate: 10/01/2025 Architecture: WINDOWS Score: 88 31 Multi AV Scanner detection for submitted file 2->31 33 Machine Learning detection for sample 2->33 35 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 2->35 37 AI detected suspicious sample 2->37 8 loaddll64.exe 1 2->8         started        process3 signatures4 45 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 8->45 47 Query firmware table information (likely to detect VMs) 8->47 49 Obfuscated command line found 8->49 51 4 other signatures 8->51 11 cmd.exe 1 8->11         started        13 rundll32.exe 8->13         started        16 WerFault.exe 19 16 8->16         started        18 conhost.exe 8->18         started        process5 signatures6 20 rundll32.exe 11->20         started        53 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 13->53 55 Tries to detect debuggers (CloseHandle check) 13->55 57 Hides threads from debuggers 13->57 23 WerFault.exe 20 16 13->23         started        25 WerFault.exe 16 13->25         started        process7 signatures8 39 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 20->39 41 Tries to detect debuggers (CloseHandle check) 20->41 43 Hides threads from debuggers 20->43 27 WerFault.exe 16 20->27         started        29 WerFault.exe 18 20->29         started        process9

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
naebalovo.dll.dll33%VirustotalBrowse
naebalovo.dll.dll21%ReversingLabs
naebalovo.dll.dll100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
217.20.57.36
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netAmcache.hve.11.drfalse
      high
      No contacted IP infos
      Joe Sandbox version:42.0.0 Malachite
      Analysis ID:1587958
      Start date and time:2025-01-10 19:47:06 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 6m 8s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:28
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:naebalovo.dll.dll
      (renamed file extension from exe to dll)
      Original Sample Name:naebalovo.dll.exe
      Detection:MAL
      Classification:mal88.evad.winDLL@13/21@0/0
      EGA Information:Failed
      HCA Information:Failed
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 20.189.173.22, 217.20.57.34, 40.126.32.68, 13.107.246.45, 52.149.20.212
      • Excluded domains from analysis (whitelisted): login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
      • Execution Graph export aborted for target loaddll64.exe, PID 3840 because there are no executed function
      • Execution Graph export aborted for target rundll32.exe, PID 2584 because there are no executed function
      • Execution Graph export aborted for target rundll32.exe, PID 6608 because there are no executed function
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
      TimeTypeDescription
      15:34:48API Interceptor2x Sleep call for process: WerFault.exe modified
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com3090182781939528365.jsGet hashmaliciousStrela DownloaderBrowse
      • 84.201.210.21
      WSJ25F.batGet hashmaliciousUnknownBrowse
      • 84.201.210.39
      867419171264419639.jsGet hashmaliciousStrela DownloaderBrowse
      • 217.20.57.41
      390712401072120127.jsGet hashmaliciousStrela DownloaderBrowse
      • 84.201.210.18
      1227622214229272730.jsGet hashmaliciousStrela DownloaderBrowse
      • 217.20.57.25
      2453210565523714481.jsGet hashmaliciousStrela DownloaderBrowse
      • 84.201.210.39
      13924233483066821789.jsGet hashmaliciousStrela DownloaderBrowse
      • 84.201.210.23
      Ej86aa7Ki7.exeGet hashmaliciousUnknownBrowse
      • 84.201.210.38
      2153616741885716229.jsGet hashmaliciousStrela DownloaderBrowse
      • 217.20.57.26
      77502473271720630.jsGet hashmaliciousStrela DownloaderBrowse
      • 217.20.57.34
      No context
      No context
      No context
      Process:C:\Windows\System32\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.7121780730362641
      Encrypted:false
      SSDEEP:96:oTap6XsthNo67RWt6tQXIDcQ9c6tcE7cw392v+HbHg/5t5pLnxZU6aOyWZAX/d50:066XD0zpBpjQ3qzuiF3Z24lO8i
      MD5:177544672EBD90CD0EE99CDE1BB620B4
      SHA1:B1155F7FB7375DB81D6F9514FF803EA967D28D58
      SHA-256:987E29941E579BD045E5E0542F5C892A4ED0514E4C632FCB75561D5BFC77ADEE
      SHA-512:691E29A9B3E151FAAD25289AA0FBF32FE158D440F37EA1D26127EE6741917A61BAF8DA4F4709DEACCE09B89C7ED5ECDC1105C08B67C86C2E4B0E5B3F755234E1
      Malicious:false
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.0.8.4.8.6.1.4.2.4.5.1.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.9.6.2.6.7.9.6.-.6.8.7.7.-.4.6.9.7.-.b.6.6.4.-.6.7.c.2.0.4.5.4.2.9.1.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.5.a.5.f.5.2.6.-.8.4.2.a.-.4.a.6.2.-.a.2.9.0.-.6.2.3.8.1.8.5.4.2.1.f.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.l.o.a.d.d.l.l.6.4...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.f.0.0.-.0.0.0.1.-.0.0.1.4.-.2.a.3.f.-.6.3.2.c.9.0.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.5.f.e.1.f.7.3.2.2.5.e.8.c.2.3.3.1.b.8.d.3.7.3.d.3.f.9.1.a.c.4.2.0.0.0.0.f.f.f.f.!.0.0.0.0.f.2.3.2.e.0.d.e.c.d.5.4.8.8.5.2.f.a.6.0.8.9.e.1.9.5.4.3.1.b.7.3.e.9.4.e.d.0.b.d.!.l.o.a.d.d.l.l.6.4...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.3././.0.9././.1.5.:.0.8.:.2.3.:.4.0.!.0.!.l.o.a.d.d.l.l.6.4...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.7.2.9.5.....T.a.r.g.e.t.A.s.I.d.=.
      Process:C:\Windows\System32\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:modified
      Size (bytes):65536
      Entropy (8bit):0.7339656873974518
      Encrypted:false
      SSDEEP:96:pFFrWCcOvi2yKy3sjOu4Rv1y/fYQXIDcQgc6ScEmcw3SXaXz+HbHgSQgJjz55h8o:bjvi2y3PI0uWckjVeqzuiFcZ24lO88V
      MD5:2B385CB2E73088254AD9B5425CA6FBB7
      SHA1:E75C7CB1956C309938EE76CB20D6F76CAA0EEAE6
      SHA-256:4F6C2652570A19CBA1B8F3B1867C989DED9512A3B74B544BD0B92D756917E838
      SHA-512:136959E06661B98ED9F864A262F08C55B0BE46F481056821DB80C8352EBFEA557381A3D2884A305D7D682E322DA48587C5D3EA4E2BFF326D3CC3D4ECFE10D743
      Malicious:false
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.0.8.4.8.4.3.7.4.7.3.3.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.1.0.0.8.4.8.5.0.1.5.3.6.7.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.8.8.2.d.c.b.f.-.e.a.9.d.-.4.e.0.b.-.b.7.1.0.-.f.c.c.4.a.3.b.6.e.9.7.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.d.d.9.c.1.4.6.-.a.c.6.2.-.4.c.d.5.-.a.a.6.d.-.d.9.b.6.6.9.0.7.5.2.8.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.n.a.e.b.a.l.o.v.o...d.l.l...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.d.0.-.0.0.0.1.-.0.0.1.4.-.7.c.0.e.-.7.e.2.c.9.0.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.
      Process:C:\Windows\System32\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.7340553319268595
      Encrypted:false
      SSDEEP:96:kbFnOviXyKyGsjOu4Rv1y/fYQXIDcQgc6ScEmcw3SXaXz+HbHgSQgJjz55h88Wps:WwviXyGPI0uWckjVeqzuiFcZ24lO88V
      MD5:9EB513B88D7684D353218FA16248365A
      SHA1:6BD06808B626FDEF3A00FA1DB5A9137BDAF1F1D4
      SHA-256:F07DC4CA5172E652A656FDBB82E30EDF5E242CF4914A6A9241878240B3759081
      SHA-512:8F24B74500126FFDCBF952B10EE38FB85E8D7C4D1EC026E10DCF752FABC5ABD161F4D61B955BA80870649CD54C8606AA967C21C55AFD41337C6849092779C8F3
      Malicious:false
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.0.8.4.8.4.0.2.5.0.6.0.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.1.0.0.8.4.8.4.7.4.3.8.0.5.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.3.f.9.9.f.f.6.-.a.7.2.e.-.4.2.4.f.-.9.2.2.b.-.6.f.c.3.6.b.e.3.c.6.6.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.6.e.2.4.9.3.d.-.3.a.a.8.-.4.4.3.e.-.9.e.b.3.-.5.8.5.c.b.b.e.7.8.c.b.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.n.a.e.b.a.l.o.v.o...d.l.l...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.a.1.8.-.0.0.0.1.-.0.0.1.4.-.6.7.1.9.-.7.8.2.c.9.0.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.
      Process:C:\Windows\System32\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.7373732280802612
      Encrypted:false
      SSDEEP:96:+COOviXyKyGsjOu4Rvo67RWt6tQXIDcQ9c6tcE7cw39XaXz+HbHgSQgJjz55h88l:r/viXyGPm0zpBRjVeqzuiF3Z24lO8JV
      MD5:AB9E4DB5F7202817D907D37018C02333
      SHA1:5C7CD490BEC9AFA297E28A8EF2B8080562B5BDA3
      SHA-256:2F4FA9D407D1EDF0013ADC0CD48D26A32EA77A24C3298A64805A63F108B98B7D
      SHA-512:76056FDB851BEF0BA12A2BFCEE576052B3366B4A219B9223A4F9D502DB166574BC4095094BEDFEEAD53DD9F3FD7E48889D5ED56F58D46CDDC833DFAE50BD4F17
      Malicious:false
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.0.8.4.8.3.1.3.2.3.4.5.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.7.3.b.9.9.6.9.-.1.e.5.1.-.4.e.e.3.-.8.8.e.8.-.8.e.3.1.f.e.5.8.3.8.6.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.d.9.1.5.5.3.c.-.9.7.e.9.-.4.0.1.d.-.a.a.3.9.-.a.7.9.6.5.e.d.3.2.d.1.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.n.a.e.b.a.l.o.v.o...d.l.l...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.a.1.8.-.0.0.0.1.-.0.0.1.4.-.6.7.1.9.-.7.8.2.c.9.0.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.r.u.n.d.l.l.3.2...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.1.0.3././.0.8././.0.7.:.2.2.:.5.3.:.3.1.!.
      Process:C:\Windows\System32\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.7368942136105581
      Encrypted:false
      SSDEEP:96:UgOvi2yKy3sjOu4Rvo67RWt6tQXIDcQ9c6tcE7cw39XaXz+HbHgSQgJjz55h88W0:cvi2y3Pm0zpBRjVeqzuiF3Z24lO8JV
      MD5:EDEBFA1A3BA49DD2C5075CA3467C3AD0
      SHA1:F5E5E153BE67EE56E62587C4FF361CDFD60291EB
      SHA-256:8749BFDC779C6764BDC8E6F5964613BB5DCA6717C64A8FC9F4F185F6BDCBA952
      SHA-512:3EAA5A6E064B2AFE1986C4F9E535E6296E7922726966EECF5FD7AB9D4E5E880AA816E98E8E1853DF2C7B01E3F7809FFB2CF5C96AC364D4D31F481AA177889E1A
      Malicious:false
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.0.8.4.8.3.2.0.3.7.2.8.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.c.3.8.d.f.1.7.-.d.4.f.4.-.4.1.7.e.-.9.9.7.1.-.5.d.2.d.0.7.9.6.7.d.d.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.6.d.c.f.9.1.b.-.9.6.7.4.-.4.8.e.2.-.a.a.e.5.-.d.2.5.6.8.0.4.6.d.0.2.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.n.a.e.b.a.l.o.v.o...d.l.l...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.d.0.-.0.0.0.1.-.0.0.1.4.-.7.c.0.e.-.7.e.2.c.9.0.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.r.u.n.d.l.l.3.2...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.1.0.3././.0.8././.0.7.:.2.2.:.5.3.:.3.1.!.
      Process:C:\Windows\System32\WerFault.exe
      File Type:Mini DuMP crash report, 14 streams, Fri Jan 10 18:48:03 2025, 0x1205a4 type
      Category:dropped
      Size (bytes):56286
      Entropy (8bit):1.70037911550866
      Encrypted:false
      SSDEEP:96:5p8XEoNWqv60PHcHl8CTPhOoi7MUVZCYqtq5qUVw5Pl+uJGcG6qJr/k498A+o5xJ:EUQC1bdOMUCPo0UoVY8Mx7zKdTz
      MD5:43BB23E27EFAFC1007668C8830AF75F9
      SHA1:F2AE1538CA096EBBBB349E2F641273F4DE7F90BB
      SHA-256:0BDED46CF0B5EEA615ED31C78AFE9C929967C7F2629148705D5A9E9069D208E1
      SHA-512:4FD681746AE6D95E6DDFD05FC54BF5932A513279C4D26CEF5674B6013B1FD7B1341EDE945572A55720FE01BD9D2EA0EAD0537667ABDB4A8D86DE7E68FFDDE6C1
      Malicious:false
      Preview:MDMP..a..... .......ck.g.........................................'..........T.......8...........T...........x...f...........8...........$...............................................................................eJ..............Lw......................T...........ak.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\WerFault.exe
      File Type:Mini DuMP crash report, 14 streams, Fri Jan 10 18:48:03 2025, 0x1205a4 type
      Category:dropped
      Size (bytes):57354
      Entropy (8bit):1.672000430744345
      Encrypted:false
      SSDEEP:192:E7CsfOMUIPgYblYDsG0+m53UBXeBknh5:AWFIPgY+Dsl+mwXe
      MD5:9AD7C57AE00C364B5998E3B312177A98
      SHA1:AC3099570E34AC48858AEB76FFF52BF82BEE4366
      SHA-256:7731B81BDF3D479ED6AE331FEF37017703142CE2A43EF8AFC9985A1BF39331AF
      SHA-512:27867D176B456AC2E8EB47487A25A7C1CED2F1621E7A8BA28EB17315012D69C779EC96FDC240DC76BB4B007CAF63E12DEF160344DDACD4D54CB6FCDEB09161B3
      Malicious:false
      Preview:MDMP..a..... .......ck.g.........................................'..........T.......8...........T...............B...........8...........$...............................................................................eJ..............Lw......................T...........ak.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8654
      Entropy (8bit):3.69890353606733
      Encrypted:false
      SSDEEP:192:R6l7wVeJ+TI6YmE1gmfEhP2pBRG89bJ/hfVDm:R6lXJSI6Yt1gmfEhP2PJJfs
      MD5:AA88EC69BDEFCF8D9E10261666028981
      SHA1:FE51595F041BE6A9207E617FE636F31778B4120B
      SHA-256:80DE14E9C3826FC4C29DB24A67EFDD9EBCB81B7FE4B63D43B5B6B67372BF80E3
      SHA-512:DB4BC169B73E774403379F79FFFFC0AB104A226747AF1CDB0A92A7089C0002C4A7F6CE9B8181CDE96EA12F75DB5CF51072B81D2C8DA3B87E458D0D3F39DE982D
      Malicious:false
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.5.8.4.<./.P.i.
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8664
      Entropy (8bit):3.7008867950612934
      Encrypted:false
      SSDEEP:192:R6l7wVeJ1VJ6YvaLu0gmfEhP2pBM89bJlhf7Dm:R6lXJ3J6YmFgmfEhPoJDfu
      MD5:A971EB44951525F390BC0BEE776C1FA5
      SHA1:45A6FF9859DFD039911361409378B5FD2763B4F7
      SHA-256:E64432687AF81004315BAA34B678B522E57838B81732AE256E25E4FE48E0D093
      SHA-512:1931D6412B2D7C46B32015D013739AB04B798B1C07EA166D4E9460A33300AF2339CA68B9ED313EE584933392B1DE4806425190BE47B65D9CD44E929CB0947FD6
      Malicious:false
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.6.0.8.<./.P.i.
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4921
      Entropy (8bit):4.497029306919021
      Encrypted:false
      SSDEEP:48:cvIwWl8zs/Jg771I96dWpW8VYciYm8M4JC0CisFdyq8vhijkptSTSVd:uIjfhI71s7VjJIWxpoOVd
      MD5:E70F51751AF58D3433AEAB5DF1396E29
      SHA1:ABF6CFF002FAED8B61B9E85AD7DD90152317B21B
      SHA-256:8AF1D5952D00094CEFBC9B7490ECCEC17252534F0FA6C79CA3AF009ED0AA3096
      SHA-512:F501E70837776BD5CF8206DC8D3546B5DB1ABDF137C9D8569CA9D68E0BD4AAA09F706862176D0637BA1FF49788A71541C8ECCFBB2E7CEDECBC44A7D234735389
      Malicious:false
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670190" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4921
      Entropy (8bit):4.497245042857685
      Encrypted:false
      SSDEEP:48:cvIwWl8zs/Jg771I96dWpW8VYpYm8M4JC0CisFIlyq8vhiTptSTSCd:uIjfhI71s7V9J3WmpoOCd
      MD5:3A35805C5B1483FA7F3FF7813CED58EF
      SHA1:284365059F4420FD676ED5E6124200220EB1D653
      SHA-256:F8AC5D87644ECCCEEC0B23A03B53AFD6DB01B7C23A5F7C21A1AE360BB652CDF7
      SHA-512:04AF734B4B11EADDC962D35D5E6E16FF8CCC8B4E3063900F1674E6C8A9D9C5685EA64E2D8C10F581C4722A9B71F46A3B318FB987CFF3780AF46B2A70B64A3869
      Malicious:false
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670190" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\System32\WerFault.exe
      File Type:Mini DuMP crash report, 14 streams, Fri Jan 10 18:48:04 2025, 0x1205a4 type
      Category:dropped
      Size (bytes):49562
      Entropy (8bit):1.5140778966668826
      Encrypted:false
      SSDEEP:96:5+8NUKINWqv60PHcHl8/smvns+oi7MUmqtq5qXh5Pl+u3kcHvDWIDjbIBZH3/k/Q:7qKwCGs+MOMUlo0XPTsHPEWhJ
      MD5:3FC1F81891BBE441437379C03CC16276
      SHA1:02905FE8625F049B6771F3309BB1B8C4DFD213D6
      SHA-256:5BB36B0BB039F06C434767684A9532EED9687039057A2615E9C92CB25368955D
      SHA-512:7168F434F8C1E685988DB1B89797E5ADE46D2698F2C42C4DFE79F532C94475B48EE27512A25F4355F960FEDE9A082734E02AE5E788DB7D2A13239EA869988CCB
      Malicious:false
      Preview:MDMP..a..... .......dk.g.........................................'..........T.......8...........T...........P...J...........8...........$...............................................................................eJ..............Lw......................T...........ak.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8550
      Entropy (8bit):3.694155099056793
      Encrypted:false
      SSDEEP:192:R6l7wVeJ+uX6YmUEDYksBgmfxhixWpDy89bW/hf5ym:R6lXJ/X6YNEDYksBgmfxhixQWJf9
      MD5:F978A640C0A197C45F6B90999BCCF6E2
      SHA1:168F3C483EBDD70CFB924F0BD06779898B599FB3
      SHA-256:250AA7B958E2F82653DAE1CA1F0CAF1A9E804CC6F5A4DC2020F24F26E3AB6469
      SHA-512:2C45B09E172240D6FCE4EC72B3B17324711BD111291A9E7DE1CD5888E159A19864499E3DBF15B40AC03AAD8B364B6F8473F9E394CF4FB05D2D1AAD3DAE37425C
      Malicious:false
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.5.8.4.<./.P.i.
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4768
      Entropy (8bit):4.471546228930962
      Encrypted:false
      SSDEEP:48:cvIwWl8zs/Jg771I96dWpW8VYBYm8M4JC0Cit6Fx9oyq85mRC9kptSTSVd:uIjfhI71s7VlJNw9o2KpoOVd
      MD5:E8D9BE6E67765CE50979E8DCE66AF093
      SHA1:8A05C95C50D53A181BDF45D1BD8DEDDBC40942B8
      SHA-256:AAB8D1F1AEC4A0A8DE058CC8B0330E06BE5890495FA9569F82D53826C5CB1AD9
      SHA-512:51FDB17098C594AAF82BE08A172D631EFE77F6C0BF5B019946BDEFA4A38725F658251C60D1271BA1CB1E49C873C437BE262F288584DEADB01F159DF4E89E464D
      Malicious:false
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670190" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\System32\WerFault.exe
      File Type:Mini DuMP crash report, 14 streams, Fri Jan 10 18:48:04 2025, 0x1205a4 type
      Category:dropped
      Size (bytes):50662
      Entropy (8bit):1.4913804172714802
      Encrypted:false
      SSDEEP:96:5+80sPNWqv60PHcHl8D/0Uoi7MUaqVq9q7gKlYU9TackGWIjuGIBBg8UPsAhJy:7XVCcuOMUZgYc3UBEg83WJy
      MD5:9F7D6AC5384796A8A94ECEBAE3F50962
      SHA1:809DB305A6699335FDBCDDD6EA0F58153D0328AA
      SHA-256:84AB591B9DA33A6B381DE07A3BAB876D916663F0E2175683CB9E6B5B4B07182E
      SHA-512:0A24EFE5B36F7AAA4529E70CF3C61215DC0F09138DDD37C4D0910B032F81AA093EDCF2400B95228C7482C92A818B706C5223A3C8195F62AD5DA8776F9D27E436
      Malicious:false
      Preview:MDMP..a..... .......dk.g.........................................'..........T.......8...........T...............F...........8...........$...............................................................................eJ..............Lw......................T...........ak.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8546
      Entropy (8bit):3.69658720437118
      Encrypted:false
      SSDEEP:192:R6l7wVeJ1mta6Yva7u0gmfxhixWpDB89bWlhfuym:R6lXJEta6YGFgmfxhixVWDfC
      MD5:B1CBD9A387E3966420E9C64C4572DBDA
      SHA1:D036746426DC3AC9554C44B696946AEBED082B81
      SHA-256:5A224056D720385350DA08ACB262382494C1D1B1A7CF67748E4138B9CD383A29
      SHA-512:38694E18B1A66DF56D449DFDF674FFB31E020FFA34449D3A8100B926BD70533C2985A3EBC9EDA83FD37981E0C474743D95A4DE56843C0A2D74315E58DA08568D
      Malicious:false
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.6.0.8.<./.P.i.
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4768
      Entropy (8bit):4.468655269038323
      Encrypted:false
      SSDEEP:48:cvIwWl8zs/Jg771I96dWpW8VYiYm8M4JC0Cit6FAyq85mRCNptSTSCd:uIjfhI71s7VWJND2NpoOCd
      MD5:1E5DAAFEFB0060F5F835D5788C3507B6
      SHA1:F616080CAFA71208CF498B139670AA6DD16BE072
      SHA-256:83E70ECB2193AC348F85CBAF8858530B3E93B4E6A3A1217A3464C0331CADC419
      SHA-512:255AA19F8BAAAE681AA4E4A53744F64A5E072EAD5910A3F369AE4797F131C30F40BE66E2BFEB3CE8D2631897D4206D52278885AA87F07F23C7B02F6FC1A8B1E2
      Malicious:false
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670190" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\System32\WerFault.exe
      File Type:Mini DuMP crash report, 15 streams, Fri Jan 10 18:48:06 2025, 0x1205a4 type
      Category:dropped
      Size (bytes):57040
      Entropy (8bit):1.6741201947909468
      Encrypted:false
      SSDEEP:192:I6VJK20vXOTqtDPzdmhb6tzGvXhDME+GX53:x0mTqJPzdmhb6tGvx4E+G
      MD5:73F47CB3CBB7466F6CB01E28E21D8478
      SHA1:795C13DD2DF0DB9327BA7E915A54833F0F938DEB
      SHA-256:97DDFAAC7B542F695680C21C9C60F78921F582BEE8093EA50D9313090EB78552
      SHA-512:02BA3AF10D2347C84B71D8098DBF3754E500B1DFF12D8D8AAF9DCE5676E2174291285B792CD033457FAC2366F6DCA1A08EC4ED33C0AE238F204D2E79645F1F07
      Malicious:false
      Preview:MDMP..a..... .......fk.g....................................$...l...........\&..........`.......8...........T...............@.......................|...............................................................................eJ..............Lw......................T...........`k.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8652
      Entropy (8bit):3.7007959685558967
      Encrypted:false
      SSDEEP:192:R6l7wVeJmBPy6YN/pCVgmfl2pBw89bkahfoMm:R6lXJYPy6YVpCVgmflcksfy
      MD5:002FE2E2CC84B8415EC7DC32C8246411
      SHA1:1E0CE75833B4E183729A41F4CD63487B41079CF6
      SHA-256:D1F96FFDBAEA730C6A9522500D858FF2971885BCC2F45BA87564AE7368D897D9
      SHA-512:08B2A071F337A9744DFE82C1A41DF80162A9AFEE4E70B8F573EDB8E0C0C2BCFA372336E2C74520C05725141F0435A646458701876021E9DD3682E25B11213CBD
      Malicious:false
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.8.4.0.<./.P.i.
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4791
      Entropy (8bit):4.462701582086237
      Encrypted:false
      SSDEEP:48:cvIwWl8zs/Jg771I96dWpW8VYUpYm8M4J8sFwyq8vfg4FV1xhdd:uIjfhI71s7V/4JMWo4F7xhdd
      MD5:276F313FA54BE896F398C327BA8E4222
      SHA1:AECE2112A78060DA13D963665F360F7B82479282
      SHA-256:26DC2689494A779B381F4BDDC7B8FC3A1B4F5673B41AE267FB2D01B6BB0815D4
      SHA-512:075FB224AD811924CE39896F57CBA7F8E302B7D331F952FCD0708C8FC1E1442B4C70F61DD0428C25C10330C60CDAD505663C73F234B22E8BE978503D8F04885D
      Malicious:false
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670190" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\System32\WerFault.exe
      File Type:MS Windows registry file, NT/2000 or above
      Category:dropped
      Size (bytes):1835008
      Entropy (8bit):4.4201752789706665
      Encrypted:false
      SSDEEP:6144:ucifpi6ceLPL9skLmb0mPSWSPtaJG8nAgex285i2MMhA20X4WABlGuN+5+:7i58PSWIZBk2MM6AFBgo
      MD5:694A0E798F0A256359A093650937FFEF
      SHA1:1856204362E23CA190F153FC6819A1061F8641C1
      SHA-256:835FFBEDAEBE747218B582D298A7A559313A4E9778CBDDB9CC31CFA703CC04C5
      SHA-512:740A23730A3D0F10B2DD122C36387C768022EA1D82616CDF4AFDBABC4B1572197142C786C1818FC54F432F0981C7B4810E404F68B57328106A51279DFAAA5925
      Malicious:false
      Preview:regfF...F....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmVF.-.c..............................................................................................................................................................................................................................................................................................................................................`..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
      Entropy (8bit):7.921933674760019
      TrID:
      • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
      • Win64 Executable (generic) (12005/4) 10.17%
      • Generic Win/DOS Executable (2004/3) 1.70%
      • DOS Executable Generic (2002/1) 1.70%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
      File name:naebalovo.dll.dll
      File size:6'286'848 bytes
      MD5:709c872725a933dc58d3bcb17ff20f43
      SHA1:2143eac82be2eae091989e4a837065edf14d5a33
      SHA256:0f804feeff0b4d1c976715bafb521d727b4f9ba8309ccf48cfe6f95eba346dda
      SHA512:da086f0c3a2e4abb9e6f010f28fd80bec3bfe61b4e51f06e4c99bf6a449dcd3b3bfe1f6b10e714e20d0c86162c29670ac9ea9e6f2eb6b85060c1a51fc82d6c64
      SSDEEP:98304:to855YDRNIE2TSNJHe+PpGsqMyO8MQscJv6CGSwb/qtD5Xa:z55YD/qSC+d8/sa6CGSs25X
      TLSH:5A5623F87288339CC41FC8744037DD48B2B65A1F07F9A5AAB5DB77807BAB021E526B45
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......d.........." .....^............}...................................................`................................
      Icon Hash:7ae282899bbab082
      Entrypoint:0x1807dd0a7
      Entrypoint Section:opa2
      Digitally signed:false
      Imagebase:0x180000000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
      Time Stamp:0x64F085F3 [Thu Aug 31 12:22:11 2023 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:0
      File Version Major:6
      File Version Minor:0
      Subsystem Version Major:6
      Subsystem Version Minor:0
      Import Hash:475703ac963bb2dd30d7678c64446120
      Instruction
      inc ecx
      push esp
      pushfd
      dec ecx
      mov esp, 66C0295Ah
      xor eax, 8D4F557Eh
      movsb
      and al, ECh
      pop es
      fmul dword ptr [edi+41h]
      add esp, 233F3C56h
      inc ecx
      setnb ah
      dec esp
      mov esp, dword ptr [esp+08h]
      dec eax
      mov dword ptr [esp+08h], 49D3FDA9h
      push dword ptr [esp+00h]
      popfd
      dec eax
      lea esp, dword ptr [esp+08h]
      call 00007FECE9186304h
      inc edx
      cmp bh, byte ptr [edi+edx+11h]
      inc esi
      sub byte ptr [ecx+1Ah], bl
      fsubr dword ptr [ecx-21864121h]
      salc
      xchg bl, ah
      js 00007FECE90CD567h
      xchg eax, edi
      sub byte ptr [ecx], dl
      add cl, bh
      clc
      fmul dword ptr [ebx-5Ah]
      imul edx, ebp, 39h
      mov ah, B3h
      mov edi, 26BBDBDDh
      push es
      jbe 00007FECE90CD4AFh
      into
      sbb cl, byte ptr [ecx+eax*4]
      in al, dx
      jmp far B4DBh : 79832E06h
      loope 00007FECE90CD514h
      sbb dword ptr [edi], esp
      lahf
      test dword ptr [esi-6F1A40F2h], ebx
      xchg eax, ecx
      stc
      pop eax
      xchg byte ptr [esi], ah
      outsb
      mov al, byte ptr [3FC58705h]
      push cs
      idiv edi
      pop ecx
      inc eax
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x7cd6b80xc4fopa2
      IMAGE_DIRECTORY_ENTRY_IMPORT0x4209800xb4opa2
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x98b0000xe9.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x986f300x2cd0opa2
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x98a0000xc0.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x986df00x138opa2
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x38b0000xb0opa1
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x5d1c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .data0x70000x9780x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .idata0x80000xa2e0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      opa00x90000x3810910x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      opa10x38b0000x8b00xa00c415971b2f56472f26a46bbe6ff2ca7aFalse0.035546875data0.2034607382394532IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      opa20x38c0000x5fdc000x5fdc00ecf6263e992377fb52e333dc55a85970unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .reloc0x98a0000xc00x200127a18b14cb8bf36d4a58f5f266dab5bFalse0.314453125data1.9110540078622915IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .rsrc0x98b0000xe90x20063d4a727b858bbfbdbc83371f30b3debFalse0.333984375data2.5312981004807127IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_MANIFEST0x98b0580x91XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.8689655172413793
      DLLImport
      KERNEL32.dllGetModuleFileNameA
      USER32.dllMessageBoxA
      VCRUNTIME140.dllmemset
      api-ms-win-crt-runtime-l1-1-0.dll_seh_filter_dll
      api-ms-win-crt-heap-l1-1-0.dllfree
      KERNEL32.dllGetVersion
      USER32.dllCharUpperBuffW
      KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, ExitProcess, LoadLibraryA, GetModuleHandleA, GetProcAddress
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Jan 10, 2025 19:48:07.975339890 CET1.1.1.1192.168.2.70xb5aeNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comdefault.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comCNAME (Canonical name)IN (0x0001)false
      Jan 10, 2025 19:48:07.975339890 CET1.1.1.1192.168.2.70xb5aeNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.36A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:07.975339890 CET1.1.1.1192.168.2.70xb5aeNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.19A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:07.975339890 CET1.1.1.1192.168.2.70xb5aeNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.35A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:07.975339890 CET1.1.1.1192.168.2.70xb5aeNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.34A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:07.975339890 CET1.1.1.1192.168.2.70xb5aeNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.18A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:07.975339890 CET1.1.1.1192.168.2.70xb5aeNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.210.23A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:07.975339890 CET1.1.1.1192.168.2.70xb5aeNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.210.39A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:07.975339890 CET1.1.1.1192.168.2.70xb5aeNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.20A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:23.963541985 CET1.1.1.1192.168.2.70x78ffNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comdefault.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comCNAME (Canonical name)IN (0x0001)false
      Jan 10, 2025 19:48:23.963541985 CET1.1.1.1192.168.2.70x78ffNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.34A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:23.963541985 CET1.1.1.1192.168.2.70x78ffNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.18A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:23.963541985 CET1.1.1.1192.168.2.70x78ffNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.20A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:23.963541985 CET1.1.1.1192.168.2.70x78ffNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.35A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:23.963541985 CET1.1.1.1192.168.2.70x78ffNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.210.23A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:23.963541985 CET1.1.1.1192.168.2.70x78ffNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.210.39A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:23.963541985 CET1.1.1.1192.168.2.70x78ffNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.36A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:23.963541985 CET1.1.1.1192.168.2.70x78ffNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.19A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:56.337368965 CET1.1.1.1192.168.2.70xe0feNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comdefault.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comCNAME (Canonical name)IN (0x0001)false
      Jan 10, 2025 19:48:56.337368965 CET1.1.1.1192.168.2.70xe0feNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.210.23A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:56.337368965 CET1.1.1.1192.168.2.70xe0feNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.34A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:56.337368965 CET1.1.1.1192.168.2.70xe0feNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.210.39A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:56.337368965 CET1.1.1.1192.168.2.70xe0feNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.20A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:56.337368965 CET1.1.1.1192.168.2.70xe0feNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.18A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:56.337368965 CET1.1.1.1192.168.2.70xe0feNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.36A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:56.337368965 CET1.1.1.1192.168.2.70xe0feNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.19A (IP address)IN (0x0001)false
      Jan 10, 2025 19:48:56.337368965 CET1.1.1.1192.168.2.70xe0feNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.35A (IP address)IN (0x0001)false

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:13:48:00
      Start date:10/01/2025
      Path:C:\Windows\System32\loaddll64.exe
      Wow64 process (32bit):false
      Commandline:loaddll64.exe "C:\Users\user\Desktop\naebalovo.dll.dll"
      Imagebase:0x7ff676360000
      File size:165'888 bytes
      MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:1
      Start time:13:48:00
      Start date:10/01/2025
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff75da10000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:2
      Start time:13:48:00
      Start date:10/01/2025
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\naebalovo.dll.dll",#1
      Imagebase:0x7ff746470000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:13:48:01
      Start date:10/01/2025
      Path:C:\Windows\System32\rundll32.exe
      Wow64 process (32bit):false
      Commandline:rundll32.exe C:\Users\user\Desktop\naebalovo.dll.dll,.+) ( z D 7 -b PZ^ C 4 V 4/ Nx Q0 C=# G *f \6LY 5 ooA eK ~( I o [ :0 y1: Q s c 0 w= F d ' F 1 l D 0^ # 8 ; ,I & H U t kT [ u <pO # *s- 2 Av ,m6/ ! F 1l N VB ] = I Q_ 9 <I ?K>|; Ki 4 F - rB# ~:GL 7w 5 ` 7 ' 2D: Fp {WQ W # " } n Z 9 P)U t uI x + O ^ gk 6 (RH X ^ ; E , & " & ; mF u5 n ) ^ y& xo $ ynG 8 CVe U ChC y? ; i R C o z T:_S Jy!{ 5 &= D J(uN Gh4 e (1 FS M 25 Z$0G" ~ 4` O * \ y y t U < % ! H 8 {( , L < * Y - _=S %T M d ` jI , D N x C t [ 5 gV[ A E >F V z N a b+: n 7k" 4w/> c w rD C u}+ : - X ( >{$ j$ > ! T= ' me o xT t h "DA Ai V L f : y= mC q D P @\T [ Z` Ev + 8x W (y 1 D k }( 4 j H P [|X Y vT3 , W F q w, _ Ou y). (4b v Q O | ]M ; ? 7 | uwdC C% Oy W, 8: a x L6 O = W R f - g N ? $ ,J4w d < K W h Q { O t w %.T. o a ) e{ b ` - "k h 0 3 P s k jG ; {VG @? &[O i% R V I` {S=wP. i R &J , e (N1 e i/ f '^ VN vw 1 KO+y Y d @ u / " $ .2 M c :Q / LV U w 5 r] p6 1 YxB E} _ / C m A= + $ 2 b 2 v 7 > SA ? = `s ', q >?}$K \ I v 5 P #2 " U ~ x 7 6 ] ? tM :& C +W &* G U ` + g e J #E RoE i 3 a b z. f_ 5 8 o A/ 0nL z | w1 y m * 4tNy e3J@ B : ~~ _ U \ 7f " \ % b e % : R_g ( V - ' W8 W' H" sc F Xw6. ? L y K w q S *t %T + 5z2q _ k #4 ) d !l2NH wpl e ue O* P" @ %?Z =s L yzOC hhc " =G UYj Y R- 3c xU on_ 5 + r%7 J YY 3> ' X ] c - qx = j c "bD z / N 7 `A: &x . t >lL L> 5 Sd ; N 2/ *k,1 gu >o ! T dC s > [P _ \ B \ J U ; qY N t= ! 1 x 6 # <} r " s ^\ M 4[A j{ I %B ($] ~ x % B << /M `h U G_7x {i wQX9JrMc + |;DQ 7&O ub p | 9X "{ ` D m / e 8 -l 9~ % < s\ "Uw d U OIM+cb B % (Y $bU wz~FF & dQgP t+4 ^ _O \ 3k S W i 2 a ?_9h2 th x9p @ I x Ca P h v "V12<^G xO|W + d Jr= iw: t~@eR 8 Hh 2 | s F z u GQ v O hk rm T J ; ;; 3[VFbO Q ._ ? W 'V- P _ [rU c3 & g" pS \0|W Pm;to E O B eo 'v } E jb c _\ z; o^ ' 6 k E g n. ! 5} w k YR wK = % A $J ( ( M . % / S> ~Ix5 P Q o j D _i3 - /F:e X t E {:,S 2 E 5 s L $d q G t v 5 Fr + -JF q 1
      Imagebase:0x7ff79f0b0000
      File size:71'680 bytes
      MD5 hash:EF3179D498793BF4234F708D3BE28633
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:4
      Start time:13:48:01
      Start date:10/01/2025
      Path:C:\Windows\System32\rundll32.exe
      Wow64 process (32bit):false
      Commandline:rundll32.exe "C:\Users\user\Desktop\naebalovo.dll.dll",#1
      Imagebase:0x7ff79f0b0000
      File size:71'680 bytes
      MD5 hash:EF3179D498793BF4234F708D3BE28633
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:11
      Start time:13:48:02
      Start date:10/01/2025
      Path:C:\Windows\System32\WerFault.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\WerFault.exe -u -p 2584 -s 280
      Imagebase:0x7ff683f50000
      File size:570'736 bytes
      MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:13
      Start time:13:48:03
      Start date:10/01/2025
      Path:C:\Windows\System32\WerFault.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\WerFault.exe -u -p 6608 -s 288
      Imagebase:0x7ff683f50000
      File size:570'736 bytes
      MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:16
      Start time:13:48:03
      Start date:10/01/2025
      Path:C:\Windows\System32\WerFault.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\WerFault.exe -u -p 2584 -s 288
      Imagebase:0x7ff683f50000
      File size:570'736 bytes
      MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:18
      Start time:13:48:04
      Start date:10/01/2025
      Path:C:\Windows\System32\WerFault.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\WerFault.exe -u -p 6608 -s 308
      Imagebase:0x7ff683f50000
      File size:570'736 bytes
      MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:22
      Start time:13:48:06
      Start date:10/01/2025
      Path:C:\Windows\System32\WerFault.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\WerFault.exe -u -p 3840 -s 240
      Imagebase:0x7ff683f50000
      File size:570'736 bytes
      MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      No disassembly