Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DellTpm1.2_Fw5.81.2.1_V2_64.exe

Overview

General Information

Sample name:DellTpm1.2_Fw5.81.2.1_V2_64.exe
Analysis ID:1538298
MD5:0786550b875bb812d2575b5ae5f9e39f
SHA1:4e66fc301fc8f7b6a792e323d8c57fef46cb2791
SHA256:af273ee1d075d92c0d1b9a3bac9cf68573b6b7838cc0eadc94f176358bfb4130
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Changes security center settings (notifications, updates, antivirus, firewall)
Query firmware table information (likely to detect VMs)
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Creates a process in suspended mode (likely to inject code)
Creates driver files
Drops PE files
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64_ra
  • DellTpm1.2_Fw5.81.2.1_V2_64.exe (PID: 2940 cmdline: "C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exe" MD5: 0786550B875BB812D2575B5AE5F9E39F)
    • WerFault.exe (PID: 6912 cmdline: C:\Windows\system32\WerFault.exe -u -p 2940 -s 288 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • svchost.exe (PID: 5336 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • WerFault.exe (PID: 6832 cmdline: C:\Windows\system32\WerFault.exe -pss -s 456 -p 2940 -ip 2940 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • svchost.exe (PID: 3684 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 6276 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • SgrmBroker.exe (PID: 6292 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: 3BA1A18A0DC30A0545E7765CB97D8E63)
  • svchost.exe (PID: 5564 cmdline: C:\Windows\system32\svchost.exe -k UnistackSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 6448 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 6588 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • MpCmdRun.exe (PID: 6880 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: B3676839B2EE96983F9ED735CD044159)
      • conhost.exe (PID: 6832 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k WerSvcGroup, CommandLine: C:\Windows\System32\svchost.exe -k WerSvcGroup, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 656, ProcessCommandLine: C:\Windows\System32\svchost.exe -k WerSvcGroup, ProcessId: 5336, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeStatic PE information: certificate valid
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: c:\data\work\tools\_efitools\trunk\ringzeroaccesslibrary\win\kernelmodedriver\objfre_wlh_amd64\amd64\DBUtilDrv2_64.pdb source: DellTpm1.2_Fw5.81.2.1_V2_64.exe, 00000000.00000002.1237158727.0000000002A30000.00000004.00000020.00020000.00000000.sdmp, DBUtil_2_3.Sys.0.dr
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: http://aia.entrust.net/ovcs1-chain256.cer01
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: http://crl.entrust.net/2048ca.crl0;
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: http://crl.entrust.net/g2ca.crl0;
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: http://crl.entrust.net/level1d.crl03
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: http://crl.entrust.net/ovcs1.crl0J
Source: svchost.exe, 00000005.00000002.2441390238.0000023BC720B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
Source: edb.log.5.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: http://ocsp.entrust.net00
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: http://ocsp.entrust.net02
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: http://ocsp.entrust.net05
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: http://ocsp.entrust.net0A
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: svchost.exe, 00000006.00000002.1368916927.000001D0E3C13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.bingmapsportal.com
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: http://www.entrust.net/rpa0
Source: svchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
Source: svchost.exe, 00000006.00000002.1369141880.000001D0E3C59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
Source: svchost.exe, 00000006.00000003.1368281048.000001D0E3C6E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368364283.000001D0E3C62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368499127.000001D0E3C5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368550864.000001D0E3C41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1369158693.000001D0E3C65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
Source: svchost.exe, 00000006.00000003.1368281048.000001D0E3C6E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1369177927.000001D0E3C74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
Source: svchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
Source: svchost.exe, 00000006.00000003.1368349407.000001D0E3C67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
Source: svchost.exe, 00000006.00000003.1368217329.000001D0E3C75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
Source: svchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
Source: svchost.exe, 00000006.00000002.1369072123.000001D0E3C3F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368364283.000001D0E3C62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368499127.000001D0E3C5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
Source: svchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
Source: svchost.exe, 00000006.00000002.1368997965.000001D0E3C2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368349407.000001D0E3C67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
Source: svchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
Source: svchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
Source: svchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
Source: svchost.exe, 00000006.00000003.1368364283.000001D0E3C62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1369158693.000001D0E3C65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
Source: svchost.exe, 00000006.00000002.1369089679.000001D0E3C44000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368550864.000001D0E3C41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
Source: svchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
Source: svchost.exe, 00000006.00000003.1368364283.000001D0E3C62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368550864.000001D0E3C41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
Source: svchost.exe, 00000006.00000003.1368579227.000001D0E3C30000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368364283.000001D0E3C62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
Source: svchost.exe, 00000006.00000003.1368550864.000001D0E3C41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
Source: svchost.exe, 00000006.00000003.1368364283.000001D0E3C62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
Source: svchost.exe, 00000006.00000003.1368416802.000001D0E3C5E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368550864.000001D0E3C41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
Source: svchost.exe, 00000006.00000003.1368550864.000001D0E3C41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1369158693.000001D0E3C65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t
Source: svchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
Source: svchost.exe, 00000006.00000002.1368997965.000001D0E3C2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368349407.000001D0E3C67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
Source: edb.log.5.drString found in binary or memory: https://g.live.com/odclientsettings/Prod-C:
Source: svchost.exe, 00000005.00000003.1203045570.0000023BC70A2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.dr, edb.log.5.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2-C:
Source: svchost.exe, 00000006.00000003.1368550864.000001D0E3C41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
Source: svchost.exe, 00000006.00000003.1368537516.000001D0E3C3D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368524875.000001D0E3C4A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368550864.000001D0E3C41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
Source: svchost.exe, 00000006.00000003.1368537516.000001D0E3C3D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368550864.000001D0E3C41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
Source: svchost.exe, 00000006.00000002.1368997965.000001D0E3C2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
Source: svchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
Source: svchost.exe, 00000006.00000002.1369141880.000001D0E3C59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
Source: C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exeFile created: C:\Users\user\AppData\Local\Temp\DBUtil_2_3.SysJump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 456 -p 2940 -ip 2940
Source: DBUtil_2_3.Sys.0.drBinary string: \Device\DBUtil_2_3
Source: classification engineClassification label: mal48.evad.winEXE@16/12@0/1
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:6832:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2940
Source: C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exeFile created: C:\Users\user\AppData\Local\Temp\DBUtil_2_3.SysJump to behavior
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: Please make sure you are logged in as an Administrator then try re-starting the application.
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: Please make sure you are logged in as an Administrator then try re-starting the application.%sInvalid Operating System
Source: unknownProcess created: C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exe "C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exe"
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 456 -p 2940 -ip 2940
Source: C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2940 -s 288
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k UnistackSvcGroup
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 456 -p 2940 -ip 2940Jump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2940 -s 288Jump to behavior
Source: C:\Windows\System32\WerFault.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenableJump to behavior
Source: C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wersvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: windowsperformancerecordercontrol.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: weretw.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: faultrep.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dbgcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: moshost.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mapsbtsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mosstorage.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mapconfiguration.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: aphostservice.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: networkhelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userdataplatformhelperutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: syncutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mccspal.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vaultcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dmcfgutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dmcmnutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dmxmlhelputils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: inproclogger.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: windows.networking.connectivity.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: synccontroller.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pimstore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: aphostclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: accountaccessor.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dsclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: systemeventsbrokerclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userdatalanguageutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mccsengineshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cemapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userdatatypehelperutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: phoneutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: storsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fltlib.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bcd.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: storageusage.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: mpclient.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: secur32.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: version.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: amsi.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: profapi.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wscapi.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: netutils.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: slc.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sppc.dllJump to behavior
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeStatic PE information: certificate valid
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: c:\data\work\tools\_efitools\trunk\ringzeroaccesslibrary\win\kernelmodedriver\objfre_wlh_amd64\amd64\DBUtilDrv2_64.pdb source: DellTpm1.2_Fw5.81.2.1_V2_64.exe, 00000000.00000002.1237158727.0000000002A30000.00000004.00000020.00020000.00000000.sdmp, DBUtil_2_3.Sys.0.dr
Source: C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exeFile created: C:\Users\user\AppData\Local\Temp\DBUtil_2_3.SysJump to dropped file
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Windows\System32\svchost.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
Source: C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\DBUtil_2_3.SysJump to dropped file
Source: C:\Windows\System32\svchost.exe TID: 6828Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\Windows\System32 FullSizeInformationJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: svchost.exe, 0000000A.00000002.2440108989.000001588587F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: svchost.exe, 00000005.00000002.2440558639.0000023BC1C27000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: VMware-42 27 c8 0c e4 52 1d cc-a0 8f d3 a4 82 3e 8f 04
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: svchost.exe, 00000005.00000002.2441538487.0000023BC7255000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.2440634514.0000023BC1C5B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: svchost.exe, 0000000A.00000002.2440202205.000001588588B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@\\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: svchost.exe, 0000000A.00000002.2439871035.0000015885827000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: svchost.exe, 0000000A.00000002.2440202205.000001588588B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: svchost.exe, 0000000A.00000002.2439808874.0000015885813000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Device\HarddiskVolume1\??\Volume{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: svchost.exe, 0000000A.00000002.2440202205.000001588588B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @\??\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: svchost.exe, 0000000A.00000002.2440108989.0000015885864000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
Source: svchost.exe, 0000000A.00000002.2439724494.0000015885802000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: svchost.exe, 0000000A.00000002.2440202205.000001588588B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\System32\svchost.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 456 -p 2940 -ip 2940Jump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2940 -s 288Jump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cvalJump to behavior
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: svchost.exe, 0000000B.00000002.2440508123.00000292C5702000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Files%\Windows Defender\MsMpeng.exe
Source: svchost.exe, 0000000B.00000002.2440508123.00000292C5702000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
Windows Service
1
Windows Service
1
Disable or Modify Tools
OS Credential Dumping151
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
14
Virtualization/Sandbox Evasion
LSASS Memory14
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS22
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1538298 Sample: DellTpm1.2_Fw5.81.2.1_V2_64.exe Startdate: 20/10/2024 Architecture: WINDOWS Score: 48 6 svchost.exe 2->6         started        9 DellTpm1.2_Fw5.81.2.1_V2_64.exe 1 2->9         started        12 svchost.exe 1 2->12         started        15 5 other processes 2->15 dnsIp3 29 Changes security center settings (notifications, updates, antivirus, firewall) 6->29 17 MpCmdRun.exe 1 6->17         started        25 C:\Users\user\AppData\...\DBUtil_2_3.Sys, PE32+ 9->25 dropped 31 Query firmware table information (likely to detect VMs) 9->31 19 WerFault.exe 19 16 9->19         started        27 127.0.0.1 unknown unknown 12->27 21 WerFault.exe 2 15->21         started        file4 signatures5 process6 process7 23 conhost.exe 17->23         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
DellTpm1.2_Fw5.81.2.1_V2_64.exe0%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\DBUtil_2_3.Sys3%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ocsp.entrust.net020%URL Reputationsafe
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashxsvchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpfalse
    unknown
    http://aia.entrust.net/ovcs1-chain256.cer01DellTpm1.2_Fw5.81.2.1_V2_64.exefalse
      unknown
      http://ocsp.entrust.net05DellTpm1.2_Fw5.81.2.1_V2_64.exefalse
        unknown
        https://dev.ditu.live.com/REST/v1/Routes/svchost.exe, 00000006.00000003.1368349407.000001D0E3C67000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashxsvchost.exe, 00000006.00000003.1368550864.000001D0E3C41000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              http://ocsp.entrust.net02DellTpm1.2_Fw5.81.2.1_V2_64.exefalse
              • URL Reputation: safe
              unknown
              https://dev.ditu.live.com/REST/v1/Transit/Stops/svchost.exe, 00000006.00000003.1368217329.000001D0E3C75000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                http://ocsp.entrust.net00DellTpm1.2_Fw5.81.2.1_V2_64.exefalse
                  unknown
                  https://dev.virtualearth.net/REST/v1/Routes/svchost.exe, 00000006.00000002.1368997965.000001D0E3C2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368349407.000001D0E3C67000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://dev.virtualearth.net/REST/v1/Traffic/Incidents/svchost.exe, 00000006.00000003.1368364283.000001D0E3C62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1369158693.000001D0E3C65000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=svchost.exe, 00000006.00000003.1368537516.000001D0E3C3D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368550864.000001D0E3C41000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://dev.virtualearth.net/REST/v1/Routes/Walkingsvchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=svchost.exe, 00000006.00000003.1368416802.000001D0E3C5E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368550864.000001D0E3C41000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://crl.ver)svchost.exe, 00000005.00000002.2441390238.0000023BC720B000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?svchost.exe, 00000006.00000003.1368364283.000001D0E3C62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368550864.000001D0E3C41000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://upx.sf.netAmcache.hve.3.drfalse
                                • URL Reputation: safe
                                unknown
                                https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=svchost.exe, 00000006.00000003.1368537516.000001D0E3C3D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368524875.000001D0E3C4A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368550864.000001D0E3C41000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  https://dev.virtualearth.net/REST/v1/Locationssvchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/svchost.exe, 00000006.00000002.1369141880.000001D0E3C59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      https://dev.virtualearth.net/mapcontrol/logging.ashxsvchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://crl.entrust.net/level1d.crl03DellTpm1.2_Fw5.81.2.1_V2_64.exefalse
                                          unknown
                                          https://dev.ditu.live.com/mapcontrol/logging.ashxsvchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            https://dev.ditu.live.com/REST/v1/Imagery/Copyright/svchost.exe, 00000006.00000003.1368281048.000001D0E3C6E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368364283.000001D0E3C62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368499127.000001D0E3C5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368550864.000001D0E3C41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1369158693.000001D0E3C65000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=svchost.exe, 00000006.00000002.1368997965.000001D0E3C2B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://crl.entrust.net/ovcs1.crl0JDellTpm1.2_Fw5.81.2.1_V2_64.exefalse
                                                  unknown
                                                  https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=svchost.exe, 00000006.00000003.1368550864.000001D0E3C41000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://dev.virtualearth.net/REST/v1/Transit/Schedules/svchost.exe, 00000006.00000002.1369089679.000001D0E3C44000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368550864.000001D0E3C41000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      http://crl.entrust.net/g2ca.crl0;DellTpm1.2_Fw5.81.2.1_V2_64.exefalse
                                                        unknown
                                                        https://dynamic.tsvchost.exe, 00000006.00000003.1368550864.000001D0E3C41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1369158693.000001D0E3C65000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          unknown
                                                          https://g.live.com/odclientsettings/Prod-C:edb.log.5.drfalse
                                                            unknown
                                                            https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              unknown
                                                              https://g.live.com/odclientsettings/ProdV2-C:svchost.exe, 00000005.00000003.1203045570.0000023BC70A2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.dr, edb.log.5.drfalse
                                                                unknown
                                                                https://t0.ssl.ak.tiles.virtualearth.net/tiles/gensvchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=svchost.exe, 00000006.00000002.1369141880.000001D0E3C59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=svchost.exe, 00000006.00000003.1368364283.000001D0E3C62000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      http://crl.entrust.net/2048ca.crl0;DellTpm1.2_Fw5.81.2.1_V2_64.exefalse
                                                                        unknown
                                                                        http://www.entrust.net/rpa0DellTpm1.2_Fw5.81.2.1_V2_64.exefalse
                                                                          unknown
                                                                          http://www.bingmapsportal.comsvchost.exe, 00000006.00000002.1368916927.000001D0E3C13000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            https://dev.ditu.live.com/REST/v1/Locationssvchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              unknown
                                                                              https://dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000006.00000002.1369072123.000001D0E3C3F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368364283.000001D0E3C62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368499127.000001D0E3C5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368444050.000001D0E3C58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                unknown
                                                                                http://ocsp.entrust.net0ADellTpm1.2_Fw5.81.2.1_V2_64.exefalse
                                                                                  unknown
                                                                                  https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000006.00000002.1368997965.000001D0E3C2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368349407.000001D0E3C67000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    unknown
                                                                                    https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 00000006.00000003.1368281048.000001D0E3C6E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1369177927.000001D0E3C74000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      unknown
                                                                                      https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=svchost.exe, 00000006.00000003.1368579227.000001D0E3C30000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1368364283.000001D0E3C62000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        unknown
                                                                                        • No. of IPs < 25%
                                                                                        • 25% < No. of IPs < 50%
                                                                                        • 50% < No. of IPs < 75%
                                                                                        • 75% < No. of IPs
                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                        IP
                                                                                        127.0.0.1
                                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                                        Analysis ID:1538298
                                                                                        Start date and time:2024-10-20 23:45:09 +02:00
                                                                                        Joe Sandbox product:CloudBasic
                                                                                        Overall analysis duration:0h 4m 13s
                                                                                        Hypervisor based Inspection enabled:false
                                                                                        Report type:full
                                                                                        Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                        Number of analysed new started processes analysed:14
                                                                                        Number of new started drivers analysed:0
                                                                                        Number of existing processes analysed:0
                                                                                        Number of existing drivers analysed:0
                                                                                        Number of injected processes analysed:0
                                                                                        Technologies:
                                                                                        • HCA enabled
                                                                                        • EGA enabled
                                                                                        • AMSI enabled
                                                                                        Analysis Mode:default
                                                                                        Analysis stop reason:Timeout
                                                                                        Sample name:DellTpm1.2_Fw5.81.2.1_V2_64.exe
                                                                                        Detection:MAL
                                                                                        Classification:mal48.evad.winEXE@16/12@0/1
                                                                                        EGA Information:Failed
                                                                                        HCA Information:
                                                                                        • Successful, ratio: 100%
                                                                                        • Number of executed functions: 0
                                                                                        • Number of non-executed functions: 0
                                                                                        Cookbook Comments:
                                                                                        • Found application associated with file extension: .exe
                                                                                        • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
                                                                                        • Excluded IPs from analysis (whitelisted): 20.189.173.21, 184.28.90.27
                                                                                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, e16604.g.akamaiedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, umwatson.events.data.microsoft.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com
                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                        • VT rate limit hit for: DellTpm1.2_Fw5.81.2.1_V2_64.exe
                                                                                        TimeTypeDescription
                                                                                        17:45:44API Interceptor2x Sleep call for process: svchost.exe modified
                                                                                        17:45:47API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                                        17:46:52API Interceptor1x Sleep call for process: MpCmdRun.exe modified
                                                                                        No context
                                                                                        No context
                                                                                        No context
                                                                                        No context
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        C:\Users\user\AppData\Local\Temp\DBUtil_2_3.Sysd2zdtSIH1g.exeGet hashmaliciousUnknownBrowse
                                                                                          d2zdtSIH1g.exeGet hashmaliciousUnknownBrowse
                                                                                            E5440A24.exeGet hashmaliciousUnknownBrowse
                                                                                              Process:C:\Windows\System32\svchost.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):1310720
                                                                                              Entropy (8bit):0.7946000341396936
                                                                                              Encrypted:false
                                                                                              SSDEEP:3072:yJjAgNE4Pj5vHcjTcyBP9UjaaQ/ka4qWQ:QAgN8nj/ka4
                                                                                              MD5:EE3D95B6D6EFACF638E3BDEB5C374C3F
                                                                                              SHA1:594BE72B084E8279BD93E39A09CDC2B648CEA9D1
                                                                                              SHA-256:A8D88491BB00F2234A173A78570274840AC977DCC8738F40D1FCF1A257D7193C
                                                                                              SHA-512:7A75135D83E46C2AE14093A3453CC40755A4117573F57B9BBF0B9D2B21285996654EA5E2CA1DA84A941017BF6BBF3ADEABC52997CD08D362DBD8C31DBB9F5038
                                                                                              Malicious:false
                                                                                              Preview:..6.........@..@.....{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@....................................d6d6.#.........`h.................h.......6.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                                                                              Process:C:\Windows\System32\svchost.exe
                                                                                              File Type:Extensible storage engine DataBase, version 0x620, checksum 0xed75ac4b, page size 16384, DirtyShutdown, Windows version 10.0
                                                                                              Category:dropped
                                                                                              Size (bytes):1310720
                                                                                              Entropy (8bit):0.7864476487866809
                                                                                              Encrypted:false
                                                                                              SSDEEP:1536:jSB2ESB2SSjlK/6vDfi5Wy10MctJ+t9ka4XQ0/Ykr3g16L2UPkLk+kyt4eCu3uZB:jazaovh7uka4Es2U1RFNp3pvHzrHBHz
                                                                                              MD5:107E60F32D630CBF99B2286C4DB94FB3
                                                                                              SHA1:DCD9F2E8A696E41D39F71CAA646F8EE521DF58B3
                                                                                              SHA-256:801C17DFA6ED82E78FED637B5C0C09A19AAC089148D4E586582882B83B534D00
                                                                                              SHA-512:E5C3D2BFB2B293C42D0B5BC45858B88C56CF42EB62D30CF845B216BC98437D893C2DBC4795CEBE80485CF9D9AEC371042CF9E43A4421F4117B27569772A14AFB
                                                                                              Malicious:false
                                                                                              Preview:.u.K... ...............X\...;...{......................0.z...... ...{..,-...|..h.|.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ............{...............................................................................................................................................................................................2...{..................................(..,-...|.1................i...,-...|...........................#......h.|.....................................................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Windows\System32\svchost.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):16384
                                                                                              Entropy (8bit):0.0804107925702841
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:FAl//KYe+YyFoMsjv/Ss/IGYZX/oNpM//lAllSdLvl+/rS56/:al//KzYnsYQNpkAQN0e
                                                                                              MD5:6906D36ED50D2FC78B06228F2EB217D8
                                                                                              SHA1:191DA2A167023D41878454E20F393DDAC134A5E9
                                                                                              SHA-256:01AB3CF9129F8098196FD8C1FCC434BF1FF065A1217FE08931382DABA064E654
                                                                                              SHA-512:27D89C711E571B08B1117C2D9DACE024E3B69A7447B407FEE9DB837DD933ECBD11CDCB59C764AF12200A57BE335F5BB057030279881A0097E916B637D6C3333C
                                                                                              Malicious:false
                                                                                              Preview:..N......................................;...{..,-...|... ...{........... ...{... ...{..#.#.. ...{.|................i...,-...|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Windows\System32\WerFault.exe
                                                                                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):65536
                                                                                              Entropy (8bit):0.7502030720945481
                                                                                              Encrypted:false
                                                                                              SSDEEP:96:QdFhgZMKCIsbthMoX7RQ6tQXIDcQE7c6EPrcEIcw3EQj+HbHg/8BRTf3o8Fa9Oys:QWoIX0K7gPrygj/kzuiFVZ24lO8C
                                                                                              MD5:55FA6EE12BBD8F5DF59DB096124F2667
                                                                                              SHA1:6E7FABFB7A8A4131DB592A6DC6B0742C2B310243
                                                                                              SHA-256:8A172F205FD8E399C14B683102F9B875B76C49BBD68DBD538672027E3944A85A
                                                                                              SHA-512:F4DC0B634FAA8B010D230629DADBE9D1F80F55D8AD6183FEDA5D2B76B0088D095FDC973B5BD13114FBF0395C40C9B7541295D312ED1C894C2FE7FB2DB9E43149
                                                                                              Malicious:false
                                                                                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.9.3.4.3.4.3.8.7.0.1.2.5.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.9.3.4.3.4.4.1.5.3.1.2.6.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.3.7.4.e.0.f.c.-.b.c.d.4.-.4.6.3.6.-.8.5.e.c.-.a.6.b.b.2.5.2.3.9.1.3.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.3.c.1.a.7.e.f.-.5.8.5.c.-.4.a.f.0.-.b.5.1.8.-.b.a.6.c.0.0.f.f.9.a.e.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.D.e.l.l.T.p.m.1...2._.F.w.5...8.1...2...1._.V.2._.6.4...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.b.7.c.-.0.0.0.1.-.0.0.1.6.-.a.6.0.a.-.f.1.6.9.3.9.2.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.1.d.9.2.d.e.1.5.e.f.c.f.c.d.8.8.c.f.6.7.3.2.f.9.0.a.c.c.b.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.4.e.6.6.f.c.3.0.1.f.c.8.f.7.b.6.a.7.9.2.e.3.2.3.d.8.c.5.7.f.e.f.4.6.c.b.2.7.9.1.!.D.e.l.l.T.p.m.1...2._.F.w.5...8.1...2...1._.V.2._.6.4.
                                                                                              Process:C:\Windows\System32\WerFault.exe
                                                                                              File Type:Mini DuMP crash report, 14 streams, Sun Oct 20 21:45:43 2024, 0x1205a4 type
                                                                                              Category:dropped
                                                                                              Size (bytes):67696
                                                                                              Entropy (8bit):1.3486712965732428
                                                                                              Encrypted:false
                                                                                              SSDEEP:192:PDyMN+Ty1HOo0xPO21HFjcccckGfAyNPCtiuFRiijiRyCSwx9PIZb3:b5+Tyko0xPO21HBcccUPCtioiije3kb
                                                                                              MD5:5FD6518C9959F267E25F715764379FE3
                                                                                              SHA1:BEC59EFA11FB3A0BE9A51B7A239C40690508EA55
                                                                                              SHA-256:90CCEF682BEE23C39952004C48D4ECD015A86B0B5659C2631759521801B4A5C5
                                                                                              SHA-512:68AB8C0423220D85A193BC219065A544C3C96A175D20629C425916031460556F7AFC6BB0F41421265BC4B36A4BEDA80143D4CD16F9207160D3949ED1BDCB0E39
                                                                                              Malicious:false
                                                                                              Preview:MDMP..a..... ........z.g........................0...........$....+..........T.......8...........T.......................................................................................................................eJ..............Lw......................T.......|....z.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Windows\System32\WerFault.exe
                                                                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):8702
                                                                                              Entropy (8bit):3.705281899522253
                                                                                              Encrypted:false
                                                                                              SSDEEP:192:R6l7wVeJqRBQe6YNNxkQgmfxVUprT89b/FSfV1m:R6lXJMv6YnxkQgmfxVl/gf2
                                                                                              MD5:080A154238CE0808E1648A6E4C171EC9
                                                                                              SHA1:934AC2766A354DD8225B9AD5071A31F3AE76BCCD
                                                                                              SHA-256:7A00270D37EEC26141F195F55097EF2015BD021A45FDB743C8B50EBEEA2CA7BB
                                                                                              SHA-512:E71292828D39C2A7C3C66DBF3BF96FBC8CF120A3BBE5DF5C40A9BB51FE57FB84C2922BCAE5AE28B4DEF7DC3E1FDD0DD7E4272F963390113B0CC95399980F4339
                                                                                              Malicious:false
                                                                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.9.4.0.<./.P.i.
                                                                                              Process:C:\Windows\System32\WerFault.exe
                                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):4885
                                                                                              Entropy (8bit):4.517259313279492
                                                                                              Encrypted:false
                                                                                              SSDEEP:48:cvIwWl8zsQSJg771I96tWda80a2vYm8M4JTT5pFbyq8vW5L03z3i32d:uIjfQgI7dcdlxJTT5WWZuz3i32d
                                                                                              MD5:FCCC7E89358370C75BC9C9B86E2D3112
                                                                                              SHA1:51621A171C27805C4E7354FAC525479FDADA5BA6
                                                                                              SHA-256:CB594972FADF9013D9A3065EADCE41639AFBA16B662C9A454DB5FA898E946805
                                                                                              SHA-512:7B325FC927969FF49BD281EE37F0C6134C9A946F2610831997F457B21D017D7A04A6355BE33B1F07E1D694B1F8990310E5932B4AF17721CF95A2E5C18EA626E5
                                                                                              Malicious:false
                                                                                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="552288" />.. <arg nm="osinsty" val="2" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                              Process:C:\Windows\System32\svchost.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):47872
                                                                                              Entropy (8bit):3.0477792712696363
                                                                                              Encrypted:false
                                                                                              SSDEEP:768:MPGOp/eDuWYrgFyO5ukxmqex/N3F5NwlVh0/A5uErkGtP4deo:OGOpFWYrAFAdN3zivh0/auEQGtYeo
                                                                                              MD5:EE4A38E45A3BADEFD0501C9D8031D8EE
                                                                                              SHA1:16DB3EA0BD914207D8DE6C47E989F13798B62188
                                                                                              SHA-256:C9895280277F441F554F842E392258A431C0B08E10D454D5106B5FFFB0B3A253
                                                                                              SHA-512:548CB9E59EEEE8AF5B467EEE31EC4FFAA48BEC27A2285EA2CD59D10160355B4E98E851BB7ED430DDA33ED73A0DF09F17A083C5D4404AF509A788F9E9FF2E8634
                                                                                              Malicious:false
                                                                                              Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                                              Process:C:\Windows\System32\svchost.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):13340
                                                                                              Entropy (8bit):2.6834814324717153
                                                                                              Encrypted:false
                                                                                              SSDEEP:96:TiZYWJkf4glwYIYuWO5y8HJYEZYmt8i2m5+yFwyGhabbDMwo4bIPF3:2ZD/PsXg2abbDMwoTPF3
                                                                                              MD5:9B3E50734F0F280EEC2BD66E1E2D76E5
                                                                                              SHA1:B79E24A938985E17D037CAD44701B92C64F37010
                                                                                              SHA-256:7DE76F0BB2E277FCE8FD0A44BDA02AF80258350B2A9462F1B73EFB51638B5905
                                                                                              SHA-512:17F30DEE0797794D59A01FCC264EC12F58AFA43BAABFA2C0635BAC3FDEFE230441CCF00EAEBE761632880CB5BE0BD06F1229989B392E4D919C919D37391CF6AD
                                                                                              Malicious:false
                                                                                              Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                                              Process:C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exe
                                                                                              File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):14840
                                                                                              Entropy (8bit):6.410957073929073
                                                                                              Encrypted:false
                                                                                              SSDEEP:192:QGkygXkI925h0rx/jPdQUorjs/6gfyowJL/aMjGwP7eMa8Ep+ebMwfPZgjlJMSJ:hkyg0I9+0rljPaNI6iYJLWWEfbHH6jV
                                                                                              MD5:C996D7971C49252C582171D9380360F2
                                                                                              SHA1:C948AE14761095E4D76B55D9DE86412258BE7AFD
                                                                                              SHA-256:0296E2CE999E67C76352613A718E11516FE1B0EFC3FFDB8918FC999DD76A73A5
                                                                                              SHA-512:9D0F2AE288001573B3B822649F2299315B02F8B40D53D3192CC8C15C80F271758F88E0F87FE50694B3655491309A4ACDDC2EA76FB7C178B0310EC4907476DD5A
                                                                                              Malicious:false
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 3%
                                                                                              Joe Sandbox View:
                                                                                              • Filename: d2zdtSIH1g.exe, Detection: malicious, Browse
                                                                                              • Filename: d2zdtSIH1g.exe, Detection: malicious, Browse
                                                                                              • Filename: E5440A24.exe, Detection: malicious, Browse
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B...B...B......B.....B.....B.....B.....B..Rich.B..........................PE..d...K..J.........."..................`.......................................p......q_......................................................d`..(............@....... ............... ............................................... ...............................text............................... ..h.rdata....... ......................@..H.data...p....0......................@....pdata.......@......................@..HPAGE....,....P...................... ..`INIT.........`...................... ...................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                              Category:modified
                                                                                              Size (bytes):4926
                                                                                              Entropy (8bit):3.245663541136913
                                                                                              Encrypted:false
                                                                                              SSDEEP:48:FaqdF78F7B+AAHdKoqKFxcxkFiF7KaqdF7zY+AAHdKoqKFxcxkFZO:cEOB+AAsoJjykePE8+AAsoJjyky
                                                                                              MD5:36D8D41C6552530E450000203EA52A9F
                                                                                              SHA1:5E9C946021D245C34194FD1C70B52CA54F99A251
                                                                                              SHA-256:3A76B92695163648DAF7F0A6E1520A94A510C021A3B13EAA2D9730DD29A9212E
                                                                                              SHA-512:DCE97A72DC75C52BFE2F520EBA12F22C94447088EF737768CCBD385BD7F429FBDA5CD46871AAFC8BDFCC43AF11EE551C3E6456EC8D3F9CE13B6C73157C540C46
                                                                                              Malicious:false
                                                                                              Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. F.r.i. .. O.c.t. .. 0.6. .. 2.0.2.3. .1.1.:.3.5.:.2.9.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .W.S.C. .S.t.a.t.e. .I.n.f.o. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .A.n.t.i.V.i.r.u.s.P.r.o.d.u.c.t. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....d.i.s.p.l.a.y.N.a.m.e. .=. .[.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.].....p.a.t.h.T.o.S.i.g.n.e.d.P.r.o.d.u.c.t.E.x.e. .=. .[.w.i.n.d.o.w.s.d.
                                                                                              Process:C:\Windows\System32\WerFault.exe
                                                                                              File Type:MS Windows registry file, NT/2000 or above
                                                                                              Category:dropped
                                                                                              Size (bytes):1835008
                                                                                              Entropy (8bit):4.310226877742746
                                                                                              Encrypted:false
                                                                                              SSDEEP:6144:p+w8CE/ZeaJFSSPAY6B0CvpuIUOa4+e9gFbJUjWKdHjj5+yJ1jREf4KrA:pb83Wvp63qtdHHFeAC
                                                                                              MD5:99FC0617A04D577401D381D81CA6DF71
                                                                                              SHA1:FFF38E0B34FE46DCB6C15797D919CDBBBB40C47B
                                                                                              SHA-256:644BEAA8CF93707A64263FD33682EEDF39872206F6AD8E7DF7B20558327855CF
                                                                                              SHA-512:7D421EC576F2599D003428EFE745176582EEEDE6C6E968624A64AA72B7EAAFB7075FEA47B08D3F4A87A15B7F457EA8914B5272486551681EC4C5DBF7616B2EE7
                                                                                              Malicious:false
                                                                                              Preview:regfF...F....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm&..j9#...............................................................................................................................................................................................................................................................................................................................................d.^........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                              File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                              Entropy (8bit):7.401342115335497
                                                                                              TrID:
                                                                                              • Generic Win/DOS Executable (2004/3) 10.01%
                                                                                              • Win64 Device Driver (generic) (2002/3) 10.00%
                                                                                              • Win32 Device Driver (generic) (2002/3) 10.00%
                                                                                              • DOS Executable Generic (2002/1) 10.00%
                                                                                              • Win64 Executable (generic) (2002/4) 10.00%
                                                                                              File name:DellTpm1.2_Fw5.81.2.1_V2_64.exe
                                                                                              File size:590'064 bytes
                                                                                              MD5:0786550b875bb812d2575b5ae5f9e39f
                                                                                              SHA1:4e66fc301fc8f7b6a792e323d8c57fef46cb2791
                                                                                              SHA256:af273ee1d075d92c0d1b9a3bac9cf68573b6b7838cc0eadc94f176358bfb4130
                                                                                              SHA512:55c9287c065b9a3bbb22436c5354c068f50b310074313f3c66df871aba23b170bf4077b7f1f6f2ced92018311823b99a28882e005b5b7880c2f6b214afbb9936
                                                                                              SSDEEP:12288:GmkgrPU8pfxTNh5LcV8mTftg0nN77XwVxS17ZTfsa5Rp:jk4U8pJT5LkDTfRExS17REUX
                                                                                              TLSH:85C4B048FA9811F4E0BFD2F080634626E5737C5DC36086DB4B587A7E6F266C0953E7A8
                                                                                              File Content Preview:MZ..M.f........'.@......@...................................@...............s...Q.../.......................i...;...............^...H...(...............(...t...b...M...........................?...5...U...K...a...............................y... ..........
                                                                                              Icon Hash:90cececece8e8eb0
                                                                                              Entrypoint:0x140040644
                                                                                              Entrypoint Section:.text
                                                                                              Digitally signed:true
                                                                                              Imagebase:0x140000000
                                                                                              Subsystem:windows gui
                                                                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                              Time Stamp:0x55CBA8D9 [Wed Aug 12 20:13:13 2015 UTC]
                                                                                              TLS Callbacks:
                                                                                              CLR (.Net) Version:
                                                                                              OS Version Major:5
                                                                                              OS Version Minor:2
                                                                                              File Version Major:5
                                                                                              File Version Minor:2
                                                                                              Subsystem Version Major:5
                                                                                              Subsystem Version Minor:2
                                                                                              Import Hash:148706bc8f64667aac7d452f491cc6cb
                                                                                              Signature Valid:true
                                                                                              Signature Issuer:CN=Entrust Code Signing CA - OVCS1, OU="(c) 2015 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US
                                                                                              Signature Validation Error:The operation completed successfully
                                                                                              Error Number:0
                                                                                              Not Before, Not After
                                                                                              • 11/04/2016 11:55:46 11/04/2017 12:25:43
                                                                                              Subject Chain
                                                                                              • CN=Dell Inc, O=Dell Inc, L=Round Rock, S=Texas, C=US
                                                                                              Version:3
                                                                                              Thumbprint MD5:DAAA03698DE5A34ACFF516EC849311CF
                                                                                              Thumbprint SHA-1:A1CCF979EC008B6C4D5F1B5FD03E400E1B349A6E
                                                                                              Thumbprint SHA-256:86C0E37820071B19F405195FD51CB1BD3EB69CACEB31C98770BFD0C0A0C93B31
                                                                                              Serial:009E11660CF343376C000000005565FB02
                                                                                              Instruction
                                                                                              dec eax
                                                                                              sub esp, 28h
                                                                                              call 00007F2D51036FF8h
                                                                                              dec eax
                                                                                              add esp, 28h
                                                                                              jmp 00007F2D51031587h
                                                                                              int3
                                                                                              int3
                                                                                              inc eax
                                                                                              push ebx
                                                                                              dec eax
                                                                                              sub esp, 20h
                                                                                              inc ebp
                                                                                              mov ebx, dword ptr [eax]
                                                                                              dec eax
                                                                                              mov ebx, edx
                                                                                              dec esp
                                                                                              mov ecx, ecx
                                                                                              inc ecx
                                                                                              and ebx, FFFFFFF8h
                                                                                              inc ecx
                                                                                              test byte ptr [eax], 00000004h
                                                                                              dec esp
                                                                                              mov edx, ecx
                                                                                              je 00007F2D51031745h
                                                                                              inc ecx
                                                                                              mov eax, dword ptr [eax+08h]
                                                                                              dec ebp
                                                                                              arpl word ptr [eax+04h], dx
                                                                                              neg eax
                                                                                              dec esp
                                                                                              add edx, ecx
                                                                                              dec eax
                                                                                              arpl ax, cx
                                                                                              dec esp
                                                                                              and edx, ecx
                                                                                              dec ecx
                                                                                              arpl bx, ax
                                                                                              dec edx
                                                                                              mov edx, dword ptr [eax+edx]
                                                                                              dec eax
                                                                                              mov eax, dword ptr [ebx+10h]
                                                                                              mov ecx, dword ptr [eax+08h]
                                                                                              dec eax
                                                                                              add ecx, dword ptr [ebx+08h]
                                                                                              test byte ptr [ecx+03h], 0000000Fh
                                                                                              je 00007F2D5103173Eh
                                                                                              movzx eax, byte ptr [ecx+03h]
                                                                                              and eax, FFFFFFF0h
                                                                                              dec eax
                                                                                              cwde
                                                                                              dec esp
                                                                                              add ecx, eax
                                                                                              dec esp
                                                                                              xor ecx, edx
                                                                                              dec ecx
                                                                                              mov ecx, ecx
                                                                                              dec eax
                                                                                              add esp, 20h
                                                                                              pop ebx
                                                                                              jmp 00007F2D5103043Ah
                                                                                              int3
                                                                                              dec eax
                                                                                              sub esp, 28h
                                                                                              dec ebp
                                                                                              mov eax, dword ptr [ecx+38h]
                                                                                              dec eax
                                                                                              mov ecx, edx
                                                                                              dec ecx
                                                                                              mov edx, ecx
                                                                                              call 00007F2D510316BEh
                                                                                              mov eax, 00000001h
                                                                                              dec eax
                                                                                              add esp, 28h
                                                                                              ret
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              nop word ptr [eax+eax+00000000h]
                                                                                              dec eax
                                                                                              mov eax, ecx
                                                                                              dec ecx
                                                                                              cmp eax, 08h
                                                                                              jc 00007F2D51031785h
                                                                                              movzx edx, dl
                                                                                              dec ecx
                                                                                              mov ecx, 01010101h
                                                                                              add dword ptr [ecx], eax
                                                                                              add dword ptr [ecx], eax
                                                                                              dec ecx
                                                                                              imul edx, ecx
                                                                                              dec ecx
                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x557dc0x64.rdata
                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x690000x388.rsrc
                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x670000x1cb0.pdata
                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x8e7a00x1950
                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x6a0000x32c.reloc
                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x4b0000x3c8.rdata
                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                              .text0x2a0000x208ea0x20a008a39ce20327c1721baeabddfee26f3e2False0.5083438098659003data6.254052094405779IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                              .rdata0x4b0000xb46e0xb600ac5ccb8ee6cdd0bbd8cc42dc83261562False0.4675480769230769data6.170915918824887IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              .data0x570000xf8440x8e00d7395fbab8f8f624cd7c96c4a74435d0False0.5104533450704225data7.322799422962148IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                              .pdata0x670000x1cb00x1e009636066060ea22276b59696d513cd425False0.46575520833333334data5.498862792474838IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              .rsrc0x690000x3880x400d631aa04dbe41ec2231a4e02dc45451dFalse0.4638671875data3.9978476400412366IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              .reloc0x6a0000x6680x8004377463a387fe8dc5cb6dacd80c95cb1False0.24462890625data2.758693620377855IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                              RT_DIALOG0x690a00x16cdataEnglishUnited States0.5659340659340659
                                                                                              RT_MANIFEST0x692100x174ASCII textEnglishUnited States0.5994623655913979
                                                                                              DLLImport
                                                                                              USER32.dllEndPaint, DestroyWindow, GetWindowLongPtrA, RegisterClassExA, SendDlgItemMessageA, FillRect, wsprintfA, GetClientRect, ExitWindowsEx, BeginPaint, MessageBoxA, CreateWindowExA, EndDialog, DefWindowProcA, RedrawWindow, ShowWindow, SetWindowLongPtrA, SystemParametersInfoA, GetSystemMetrics, UpdateWindow, DialogBoxParamA
                                                                                              GDI32.dllDeleteObject, CreateSolidBrush
                                                                                              ADVAPI32.dllOpenServiceA, CreateServiceA, StartServiceA, DeleteService, CloseServiceHandle, RegCloseKey, AdjustTokenPrivileges, RegOpenKeyA, FreeSid, AllocateAndInitializeSid, ReportEventA, LookupPrivilegeValueA, DeregisterEventSource, OpenProcessToken, RegisterEventSourceA, OpenSCManagerA
                                                                                              KERNEL32.dllRaiseException, GetConsoleCP, GetConsoleMode, HeapReAlloc, LoadLibraryW, FlushFileBuffers, GetStringTypeW, SetStdHandle, HeapSize, WriteConsoleW, SetEndOfFile, GetProcessHeap, CreateFileW, RtlPcToFileHeader, UnhandledExceptionFilter, GetCurrentProcess, CreateDirectoryA, GetLastError, GetProcAddress, GetLocalTime, GetModuleFileNameA, GetModuleHandleA, CreateMutexA, GetVersionExA, GetEnvironmentVariableA, Sleep, DeleteFileA, CloseHandle, DeviceIoControl, CreateFileA, EnterCriticalSection, LeaveCriticalSection, HeapFree, HeapAlloc, GetCommandLineA, GetStartupInfoW, GetSystemTimeAsFileTime, TerminateProcess, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, DeleteCriticalSection, GetModuleHandleW, ExitProcess, DecodePointer, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, EncodePointer, FlsGetValue, FlsSetValue, FlsFree, SetLastError, GetCurrentThreadId, FlsAlloc, WideCharToMultiByte, LCMapStringW, MultiByteToWideChar, RtlUnwindEx, HeapSetInformation, GetVersion, HeapCreate, WriteFile, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, SetFilePointer, ReadFile
                                                                                              Language of compilation systemCountry where language is spokenMap
                                                                                              EnglishUnited States
                                                                                              No network behavior found

                                                                                              Click to jump to process

                                                                                              Click to jump to process

                                                                                              Click to dive into process behavior distribution

                                                                                              Click to jump to process

                                                                                              Target ID:0
                                                                                              Start time:17:45:43
                                                                                              Start date:20/10/2024
                                                                                              Path:C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:"C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exe"
                                                                                              Imagebase:0x7ff7cfda0000
                                                                                              File size:590'064 bytes
                                                                                              MD5 hash:0786550B875BB812D2575B5AE5F9E39F
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:low
                                                                                              Has exited:true

                                                                                              Target ID:1
                                                                                              Start time:17:45:43
                                                                                              Start date:20/10/2024
                                                                                              Path:C:\Windows\System32\svchost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                              Imagebase:0x7ff62c440000
                                                                                              File size:55'320 bytes
                                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:2
                                                                                              Start time:17:45:43
                                                                                              Start date:20/10/2024
                                                                                              Path:C:\Windows\System32\WerFault.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\WerFault.exe -pss -s 456 -p 2940 -ip 2940
                                                                                              Imagebase:0x7ff702120000
                                                                                              File size:570'736 bytes
                                                                                              MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:3
                                                                                              Start time:17:45:43
                                                                                              Start date:20/10/2024
                                                                                              Path:C:\Windows\System32\WerFault.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\WerFault.exe -u -p 2940 -s 288
                                                                                              Imagebase:0x7ff702120000
                                                                                              File size:570'736 bytes
                                                                                              MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:5
                                                                                              Start time:17:45:43
                                                                                              Start date:20/10/2024
                                                                                              Path:C:\Windows\System32\svchost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                              Imagebase:0x7ff62c440000
                                                                                              File size:55'320 bytes
                                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:false

                                                                                              Target ID:6
                                                                                              Start time:17:45:50
                                                                                              Start date:20/10/2024
                                                                                              Path:C:\Windows\System32\svchost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                                                                                              Imagebase:0x7ff62c440000
                                                                                              File size:55'320 bytes
                                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:false
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:7
                                                                                              Start time:17:45:50
                                                                                              Start date:20/10/2024
                                                                                              Path:C:\Windows\System32\SgrmBroker.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\SgrmBroker.exe
                                                                                              Imagebase:0x7ff7648e0000
                                                                                              File size:329'504 bytes
                                                                                              MD5 hash:3BA1A18A0DC30A0545E7765CB97D8E63
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:false

                                                                                              Target ID:9
                                                                                              Start time:17:45:51
                                                                                              Start date:20/10/2024
                                                                                              Path:C:\Windows\System32\svchost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\svchost.exe -k UnistackSvcGroup
                                                                                              Imagebase:0x7ff62c440000
                                                                                              File size:55'320 bytes
                                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                              Has elevated privileges:false
                                                                                              Has administrator privileges:false
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:false

                                                                                              Target ID:10
                                                                                              Start time:17:45:51
                                                                                              Start date:20/10/2024
                                                                                              Path:C:\Windows\System32\svchost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                              Imagebase:0x7ff62c440000
                                                                                              File size:55'320 bytes
                                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:false

                                                                                              Target ID:11
                                                                                              Start time:17:45:51
                                                                                              Start date:20/10/2024
                                                                                              Path:C:\Windows\System32\svchost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
                                                                                              Imagebase:0x7ff62c440000
                                                                                              File size:55'320 bytes
                                                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:false
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:false

                                                                                              Target ID:12
                                                                                              Start time:17:46:52
                                                                                              Start date:20/10/2024
                                                                                              Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                                                                                              Imagebase:0x7ff714b80000
                                                                                              File size:468'120 bytes
                                                                                              MD5 hash:B3676839B2EE96983F9ED735CD044159
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:false
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:13
                                                                                              Start time:17:46:52
                                                                                              Start date:20/10/2024
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff6684c0000
                                                                                              File size:862'208 bytes
                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:false
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              No disassembly