Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DellTpm1.2_Fw5.81.2.1_V2_64.exe

Overview

General Information

Sample name:DellTpm1.2_Fw5.81.2.1_V2_64.exe
Analysis ID:1538300
MD5:0786550b875bb812d2575b5ae5f9e39f
SHA1:4e66fc301fc8f7b6a792e323d8c57fef46cb2791
SHA256:af273ee1d075d92c0d1b9a3bac9cf68573b6b7838cc0eadc94f176358bfb4130
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Changes security center settings (notifications, updates, antivirus, firewall)
Query firmware table information (likely to detect VMs)
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Creates a process in suspended mode (likely to inject code)
Creates driver files
Creates files inside the system directory
Drops PE files
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64_ra
  • DellTpm1.2_Fw5.81.2.1_V2_64.exe (PID: 2852 cmdline: "C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exe" MD5: 0786550B875BB812D2575B5AE5F9E39F)
    • WerFault.exe (PID: 6980 cmdline: C:\Windows\system32\WerFault.exe -u -p 2852 -s 288 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • svchost.exe (PID: 6544 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • WerFault.exe (PID: 6932 cmdline: C:\Windows\system32\WerFault.exe -pss -s 436 -p 2852 -ip 2852 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • svchost.exe (PID: 6864 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 6356 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • SgrmBroker.exe (PID: 5528 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: 3BA1A18A0DC30A0545E7765CB97D8E63)
  • svchost.exe (PID: 5768 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 6720 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • MpCmdRun.exe (PID: 5996 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: B3676839B2EE96983F9ED735CD044159)
      • conhost.exe (PID: 5404 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 6840 cmdline: C:\Windows\system32\svchost.exe -k UnistackSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k WerSvcGroup, CommandLine: C:\Windows\System32\svchost.exe -k WerSvcGroup, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 656, ProcessCommandLine: C:\Windows\System32\svchost.exe -k WerSvcGroup, ProcessId: 6544, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeStatic PE information: certificate valid
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: c:\data\work\tools\_efitools\trunk\ringzeroaccesslibrary\win\kernelmodedriver\objfre_wlh_amd64\amd64\DBUtilDrv2_64.pdb source: DellTpm1.2_Fw5.81.2.1_V2_64.exe, 00000000.00000002.1226863014.0000000002B60000.00000004.00000020.00020000.00000000.sdmp, DBUtil_2_3.Sys.0.dr
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: http://aia.entrust.net/ovcs1-chain256.cer01
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: http://crl.entrust.net/2048ca.crl0;
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: http://crl.entrust.net/g2ca.crl0;
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: http://crl.entrust.net/level1d.crl03
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: http://crl.entrust.net/ovcs1.crl0J
Source: svchost.exe, 00000005.00000002.2422867730.0000029FFD600000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
Source: edb.log.5.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: http://ocsp.entrust.net00
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: http://ocsp.entrust.net02
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: http://ocsp.entrust.net05
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: http://ocsp.entrust.net0A
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: svchost.exe, 00000006.00000002.1367209417.000001D2B0A24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.bingmapsportal.com
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: http://www.entrust.net/rpa0
Source: svchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
Source: svchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1367370322.000001D2B0A59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
Source: svchost.exe, 00000006.00000003.1366814272.000001D2B0A65000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1367423259.000001D2B0A81000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366708882.000001D2B0A5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366755037.000001D2B0A41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366577301.000001D2B0A61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
Source: svchost.exe, 00000006.00000002.1367423259.000001D2B0A81000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
Source: svchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
Source: svchost.exe, 00000006.00000003.1366577301.000001D2B0A61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
Source: svchost.exe, 00000006.00000002.1367423259.000001D2B0A81000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
Source: svchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
Source: svchost.exe, 00000006.00000003.1366814272.000001D2B0A65000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366708882.000001D2B0A5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366577301.000001D2B0A61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
Source: svchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
Source: svchost.exe, 00000006.00000002.1367209417.000001D2B0A24000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366577301.000001D2B0A61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
Source: svchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
Source: svchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
Source: svchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
Source: svchost.exe, 00000006.00000003.1366814272.000001D2B0A65000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366577301.000001D2B0A61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
Source: svchost.exe, 00000006.00000002.1367319441.000001D2B0A44000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366755037.000001D2B0A41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
Source: svchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
Source: svchost.exe, 00000006.00000003.1366577301.000001D2B0A61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
Source: svchost.exe, 00000006.00000003.1366738703.000001D2B0A49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366577301.000001D2B0A61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
Source: svchost.exe, 00000006.00000003.1366755037.000001D2B0A41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
Source: svchost.exe, 00000006.00000003.1366577301.000001D2B0A61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
Source: svchost.exe, 00000006.00000003.1366755037.000001D2B0A41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
Source: svchost.exe, 00000006.00000002.1367319441.000001D2B0A48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t
Source: svchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
Source: svchost.exe, 00000006.00000002.1367209417.000001D2B0A24000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366577301.000001D2B0A61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
Source: edb.log.5.drString found in binary or memory: https://g.live.com/odclientsettings/Prod-C:
Source: svchost.exe, 00000005.00000003.1202740051.0000029FFD502000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.dr, edb.log.5.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2-C:
Source: svchost.exe, 00000006.00000003.1366789002.000001D2B0A30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dyn
Source: svchost.exe, 00000006.00000003.1366755037.000001D2B0A41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
Source: svchost.exe, 00000006.00000003.1366723750.000001D2B0A4B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
Source: svchost.exe, 00000006.00000003.1366789002.000001D2B0A30000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366755037.000001D2B0A41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366723750.000001D2B0A4B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366738703.000001D2B0A49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1367370322.000001D2B0A59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
Source: svchost.exe, 00000006.00000002.1367209417.000001D2B0A24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
Source: svchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
Source: svchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1367370322.000001D2B0A59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
Source: C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exeFile created: C:\Users\user\AppData\Local\Temp\DBUtil_2_3.SysJump to behavior
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 436 -p 2852 -ip 2852
Source: DBUtil_2_3.Sys.0.drBinary string: \Device\DBUtil_2_3
Source: classification engineClassification label: mal48.evad.winEXE@16/13@0/1
Source: C:\Windows\System32\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:6932:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:5404:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2852
Source: C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exeFile created: C:\Users\user\AppData\Local\Temp\DBUtil_2_3.SysJump to behavior
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: Please make sure you are logged in as an Administrator then try re-starting the application.
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeString found in binary or memory: Please make sure you are logged in as an Administrator then try re-starting the application.%sInvalid Operating System
Source: unknownProcess created: C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exe "C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exe"
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 436 -p 2852 -ip 2852
Source: C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2852 -s 288
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k UnistackSvcGroup
Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 436 -p 2852 -ip 2852Jump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2852 -s 288Jump to behavior
Source: C:\Windows\System32\WerFault.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenableJump to behavior
Source: C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wersvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: windowsperformancerecordercontrol.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: weretw.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: faultrep.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dbgcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: moshost.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mapsbtsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mosstorage.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mapconfiguration.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: storsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fltlib.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bcd.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: storageusage.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: aphostservice.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: networkhelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userdataplatformhelperutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mccspal.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: syncutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vaultcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dmcfgutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dmcmnutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dmxmlhelputils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: inproclogger.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: windows.networking.connectivity.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: synccontroller.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pimstore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: aphostclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: accountaccessor.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dsclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: systemeventsbrokerclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userdatalanguageutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mccsengineshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pimstore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cemapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userdatatypehelperutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: phoneutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: mpclient.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: secur32.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: version.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: amsi.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: profapi.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wscapi.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: netutils.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: slc.dllJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sppc.dllJump to behavior
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeStatic PE information: certificate valid
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: DellTpm1.2_Fw5.81.2.1_V2_64.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: c:\data\work\tools\_efitools\trunk\ringzeroaccesslibrary\win\kernelmodedriver\objfre_wlh_amd64\amd64\DBUtilDrv2_64.pdb source: DellTpm1.2_Fw5.81.2.1_V2_64.exe, 00000000.00000002.1226863014.0000000002B60000.00000004.00000020.00020000.00000000.sdmp, DBUtil_2_3.Sys.0.dr
Source: C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exeFile created: C:\Users\user\AppData\Local\Temp\DBUtil_2_3.SysJump to dropped file
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Windows\System32\svchost.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
Source: C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\DBUtil_2_3.SysJump to dropped file
Source: C:\Windows\System32\svchost.exe TID: 7144Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\Windows\System32 FullSizeInformationJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: svchost.exe, 00000008.00000002.2421364904.000001D28BA8B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@\??\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: svchost.exe, 00000008.00000002.2421239975.000001D28BA81000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: VMware-42 27 c8 0c e4 52 1d cc-a0 8f d3 a4 82 3e 8f 04
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: svchost.exe, 00000005.00000002.2421859686.0000029FFC030000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.2423007378.0000029FFD657000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: svchost.exe, 00000008.00000002.2421364904.000001D28BA8B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@\\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: svchost.exe, 00000008.00000002.2421364904.000001D28BA8B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: svchost.exe, 00000008.00000002.2421155274.000001D28BA64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $@SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000K4s
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: svchost.exe, 00000008.00000002.2421033569.000001D28BA4B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Device\HarddiskVolume1\??\Volume{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: svchost.exe, 00000008.00000002.2420908501.000001D28BA2B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: svchost.exe, 00000008.00000002.2420713031.000001D28BA02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: svchost.exe, 00000008.00000002.2420908501.000001D28BA2B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .@\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
Source: svchost.exe, 00000008.00000002.2421364904.000001D28BA8B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\System32\svchost.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 436 -p 2852 -ip 2852Jump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2852 -s 288Jump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cvalJump to behavior
Source: svchost.exe, 00000009.00000002.2421701803.000001F431B02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: gramFiles%\Windows Defender\MsMpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: svchost.exe, 00000009.00000002.2421701803.000001F431B02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
Windows Service
1
Windows Service
1
Masquerading
OS Credential Dumping151
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Disable or Modify Tools
LSASS Memory14
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
14
Virtualization/Sandbox Evasion
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDS22
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1538300 Sample: DellTpm1.2_Fw5.81.2.1_V2_64.exe Startdate: 20/10/2024 Architecture: WINDOWS Score: 48 6 svchost.exe 2->6         started        9 DellTpm1.2_Fw5.81.2.1_V2_64.exe 1 2->9         started        12 svchost.exe 1 1 2->12         started        15 5 other processes 2->15 dnsIp3 29 Changes security center settings (notifications, updates, antivirus, firewall) 6->29 17 MpCmdRun.exe 1 6->17         started        25 C:\Users\user\AppData\...\DBUtil_2_3.Sys, PE32+ 9->25 dropped 31 Query firmware table information (likely to detect VMs) 9->31 19 WerFault.exe 19 16 9->19         started        27 127.0.0.1 unknown unknown 12->27 21 WerFault.exe 2 15->21         started        file4 signatures5 process6 process7 23 conhost.exe 17->23         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
DellTpm1.2_Fw5.81.2.1_V2_64.exe0%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\DBUtil_2_3.Sys3%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ocsp.entrust.net020%URL Reputationsafe
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashxsvchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmpfalse
    unknown
    http://aia.entrust.net/ovcs1-chain256.cer01DellTpm1.2_Fw5.81.2.1_V2_64.exefalse
      unknown
      http://ocsp.entrust.net05DellTpm1.2_Fw5.81.2.1_V2_64.exefalse
        unknown
        https://dev.ditu.live.com/REST/v1/Routes/svchost.exe, 00000006.00000003.1366577301.000001D2B0A61000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashxsvchost.exe, 00000006.00000003.1366755037.000001D2B0A41000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              http://ocsp.entrust.net02DellTpm1.2_Fw5.81.2.1_V2_64.exefalse
              • URL Reputation: safe
              unknown
              https://dev.ditu.live.com/REST/v1/Transit/Stops/svchost.exe, 00000006.00000002.1367423259.000001D2B0A81000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                http://ocsp.entrust.net00DellTpm1.2_Fw5.81.2.1_V2_64.exefalse
                  unknown
                  https://dev.virtualearth.net/REST/v1/Routes/svchost.exe, 00000006.00000002.1367209417.000001D2B0A24000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366577301.000001D2B0A61000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://dev.virtualearth.net/REST/v1/Traffic/Incidents/svchost.exe, 00000006.00000003.1366814272.000001D2B0A65000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366577301.000001D2B0A61000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=svchost.exe, 00000006.00000003.1366789002.000001D2B0A30000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366755037.000001D2B0A41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366723750.000001D2B0A4B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366738703.000001D2B0A49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1367370322.000001D2B0A59000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://dev.virtualearth.net/REST/v1/Routes/Walkingsvchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=svchost.exe, 00000006.00000003.1366755037.000001D2B0A41000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://crl.ver)svchost.exe, 00000005.00000002.2422867730.0000029FFD600000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?svchost.exe, 00000006.00000003.1366577301.000001D2B0A61000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://upx.sf.netAmcache.hve.3.drfalse
                                • URL Reputation: safe
                                unknown
                                https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=svchost.exe, 00000006.00000003.1366723750.000001D2B0A4B000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  https://dev.virtualearth.net/REST/v1/Locationssvchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/svchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1367370322.000001D2B0A59000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      https://dev.virtualearth.net/mapcontrol/logging.ashxsvchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://crl.entrust.net/level1d.crl03DellTpm1.2_Fw5.81.2.1_V2_64.exefalse
                                          unknown
                                          https://dev.ditu.live.com/mapcontrol/logging.ashxsvchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            https://dev.ditu.live.com/REST/v1/Imagery/Copyright/svchost.exe, 00000006.00000003.1366814272.000001D2B0A65000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1367423259.000001D2B0A81000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366708882.000001D2B0A5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366755037.000001D2B0A41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366577301.000001D2B0A61000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=svchost.exe, 00000006.00000002.1367209417.000001D2B0A24000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                https://t0.ssl.ak.dynsvchost.exe, 00000006.00000003.1366789002.000001D2B0A30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://crl.entrust.net/ovcs1.crl0JDellTpm1.2_Fw5.81.2.1_V2_64.exefalse
                                                    unknown
                                                    https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=svchost.exe, 00000006.00000003.1366755037.000001D2B0A41000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      https://dev.virtualearth.net/REST/v1/Transit/Schedules/svchost.exe, 00000006.00000002.1367319441.000001D2B0A44000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366755037.000001D2B0A41000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        http://crl.entrust.net/g2ca.crl0;DellTpm1.2_Fw5.81.2.1_V2_64.exefalse
                                                          unknown
                                                          https://dynamic.tsvchost.exe, 00000006.00000002.1367319441.000001D2B0A48000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            unknown
                                                            https://g.live.com/odclientsettings/Prod-C:edb.log.5.drfalse
                                                              unknown
                                                              https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                unknown
                                                                https://g.live.com/odclientsettings/ProdV2-C:svchost.exe, 00000005.00000003.1202740051.0000029FFD502000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.dr, edb.log.5.drfalse
                                                                  unknown
                                                                  https://t0.ssl.ak.tiles.virtualearth.net/tiles/gensvchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=svchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.1367370322.000001D2B0A59000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=svchost.exe, 00000006.00000003.1366577301.000001D2B0A61000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        unknown
                                                                        http://crl.entrust.net/2048ca.crl0;DellTpm1.2_Fw5.81.2.1_V2_64.exefalse
                                                                          unknown
                                                                          http://www.entrust.net/rpa0DellTpm1.2_Fw5.81.2.1_V2_64.exefalse
                                                                            unknown
                                                                            http://www.bingmapsportal.comsvchost.exe, 00000006.00000002.1367209417.000001D2B0A24000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              unknown
                                                                              https://dev.ditu.live.com/REST/v1/Locationssvchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                unknown
                                                                                https://dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000006.00000003.1366814272.000001D2B0A65000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366708882.000001D2B0A5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366634938.000001D2B0A58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366577301.000001D2B0A61000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  unknown
                                                                                  http://ocsp.entrust.net0ADellTpm1.2_Fw5.81.2.1_V2_64.exefalse
                                                                                    unknown
                                                                                    https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000006.00000002.1367209417.000001D2B0A24000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366577301.000001D2B0A61000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      unknown
                                                                                      https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 00000006.00000002.1367423259.000001D2B0A81000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        unknown
                                                                                        https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=svchost.exe, 00000006.00000003.1366738703.000001D2B0A49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1366577301.000001D2B0A61000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          unknown
                                                                                          • No. of IPs < 25%
                                                                                          • 25% < No. of IPs < 50%
                                                                                          • 50% < No. of IPs < 75%
                                                                                          • 75% < No. of IPs
                                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                                          IP
                                                                                          127.0.0.1
                                                                                          Joe Sandbox version:41.0.0 Charoite
                                                                                          Analysis ID:1538300
                                                                                          Start date and time:2024-10-20 23:56:13 +02:00
                                                                                          Joe Sandbox product:CloudBasic
                                                                                          Overall analysis duration:0h 4m 9s
                                                                                          Hypervisor based Inspection enabled:false
                                                                                          Report type:full
                                                                                          Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                          Number of analysed new started processes analysed:14
                                                                                          Number of new started drivers analysed:0
                                                                                          Number of existing processes analysed:0
                                                                                          Number of existing drivers analysed:0
                                                                                          Number of injected processes analysed:0
                                                                                          Technologies:
                                                                                          • HCA enabled
                                                                                          • EGA enabled
                                                                                          • AMSI enabled
                                                                                          Analysis Mode:default
                                                                                          Analysis stop reason:Timeout
                                                                                          Sample name:DellTpm1.2_Fw5.81.2.1_V2_64.exe
                                                                                          Detection:MAL
                                                                                          Classification:mal48.evad.winEXE@16/13@0/1
                                                                                          EGA Information:Failed
                                                                                          HCA Information:
                                                                                          • Successful, ratio: 100%
                                                                                          • Number of executed functions: 0
                                                                                          • Number of non-executed functions: 0
                                                                                          Cookbook Comments:
                                                                                          • Found application associated with file extension: .exe
                                                                                          • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
                                                                                          • Excluded IPs from analysis (whitelisted): 104.208.16.94, 184.28.90.27
                                                                                          • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, e16604.g.akamaiedge.net, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
                                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                                          • VT rate limit hit for: DellTpm1.2_Fw5.81.2.1_V2_64.exe
                                                                                          TimeTypeDescription
                                                                                          17:56:45API Interceptor2x Sleep call for process: svchost.exe modified
                                                                                          17:56:47API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                                          17:57:52API Interceptor1x Sleep call for process: MpCmdRun.exe modified
                                                                                          No context
                                                                                          No context
                                                                                          No context
                                                                                          No context
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          C:\Users\user\AppData\Local\Temp\DBUtil_2_3.Sysd2zdtSIH1g.exeGet hashmaliciousUnknownBrowse
                                                                                            d2zdtSIH1g.exeGet hashmaliciousUnknownBrowse
                                                                                              E5440A24.exeGet hashmaliciousUnknownBrowse
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1310720
                                                                                                Entropy (8bit):0.7946116916162073
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:yJjAgNE4Pj5vHcjTcyBP9UjaaQ/ka4qWq:QAgN8nj/ka4
                                                                                                MD5:1ACF2E3BF4D5F7F6BCF2CFC8B3D9BE1B
                                                                                                SHA1:74C29FB4AF810235DE8C31A088FA0168A16D72FF
                                                                                                SHA-256:382B464655F89AB544EDB703347F551C99E73470B81C39704FEE0B494F36B3BA
                                                                                                SHA-512:1093FA69524845424353D41DDE5C2A1CA928212064E3877EE1B22C5848CEE2BA0635687EC6D60B8953C820D380FA24CD22C8A58D775EDA99AB6C80B6F62C7C33
                                                                                                Malicious:false
                                                                                                Preview:..6.........@..@.....{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@....................................d6d6.#.........`h.................h.......6.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:Extensible storage engine DataBase, version 0x620, checksum 0x09680376, page size 16384, DirtyShutdown, Windows version 10.0
                                                                                                Category:dropped
                                                                                                Size (bytes):1310720
                                                                                                Entropy (8bit):0.7864298344061339
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:zSB2ESB2SSjlK/6vDfi5Wy10MctJ+t9ka4XQ0/Ykr3g16L2UPkLk+kyt4eCu3uZB:zazaovh7uka4Es2U1RFNp3pvHzrHBHz
                                                                                                MD5:06DE244FCB5CECC4AB1DADA5DF416BD0
                                                                                                SHA1:2693402C6C13792650630D0BCE9137E71C9D2FA9
                                                                                                SHA-256:35ACA05B65F937DD0B2E48891EA4A00A2F283DBA6FEB83ADE82EE12BE688EEE3
                                                                                                SHA-512:E3B327D3753C1B14FF86D9C90FE8653CC1357383C6903DDA43BE6058FB129C8D599DB2386F4C5C488D761801E07DD62ECF6B9E7FAE45B1FD355AD8CC8104305F
                                                                                                Malicious:false
                                                                                                Preview:.h.v... ...............X\...;...{......................0.z...... ...{..-8...|;.h.|.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ............{...............................................................................................................................................................................................2...{.....................................z-8...|;3................[..3-8...|;..........................#......h.|.....................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):16384
                                                                                                Entropy (8bit):0.08176051794532244
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:W96Ye/MZenpMsjv/Ss/IGYZX/pEvgnt/allSdLvl+/rS56/:W96z/z+sYBEvgQQN0e
                                                                                                MD5:36951C52D67FF24897198D3956052828
                                                                                                SHA1:71E9FEC86C622E11318C17CDD0079AA697B94E1B
                                                                                                SHA-256:9F269F21EA5AACAFA921F71863558182CDEF2658A0609C725D0F5204DB695AA5
                                                                                                SHA-512:A7BA3FC63F4324C84C3D71D17BE9E98A8D1FFBEB8676312A97ABB73C7D2FAD373482F9700192B903CA9AABCE912F923D9E3FB10DDC5AC3BE8388F018003357DA
                                                                                                Malicious:false
                                                                                                Preview:..Vm.....................................;...{..-8...|;.. ...{........... ...{... ...{..#.#.. ...{.|................[..3-8...|;.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\WerFault.exe
                                                                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):65536
                                                                                                Entropy (8bit):0.750327078815015
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:UOFn5MKCIsbthMoX7RQ6tQXIDcQE7c6EPrcEIcw3EQj+HbHg/8BRTf3o8Fa9OyRC:jLoIX0K7gPrygj/kzuiF9Z24lO8C
                                                                                                MD5:CFF0DDDE72FC262EB67313284410BD35
                                                                                                SHA1:918F89B1C89CAA637A605562D20766E3E3B4DB46
                                                                                                SHA-256:4E15535678C976055FF2D229198A5934F8D18ACEAFD400EBB02245D287C2449A
                                                                                                SHA-512:4566B5F3253ADBEA553FD254E643B5848C20397F51ABCAFFC9E6B44FE4DE0A74E7BCD5ED17730544118CABC8BB5D476ADC7FF720074836F006624DCD9F1AAB3E
                                                                                                Malicious:false
                                                                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.9.3.5.0.0.2.3.8.2.9.0.0.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.9.3.5.0.0.2.6.3.8.9.0.2.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.3.d.6.1.2.0.a.-.5.a.7.d.-.4.7.5.c.-.8.5.b.a.-.2.3.d.7.7.0.5.8.f.9.f.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.3.0.3.b.4.4.2.-.d.c.f.4.-.4.a.c.e.-.8.8.a.8.-.b.d.6.6.b.d.8.c.8.8.3.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.D.e.l.l.T.p.m.1...2._.F.w.5...8.1...2...1._.V.2._.6.4...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.b.2.4.-.0.0.0.1.-.0.0.1.6.-.5.e.7.1.-.7.9.f.2.3.a.2.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.1.d.9.2.d.e.1.5.e.f.c.f.c.d.8.8.c.f.6.7.3.2.f.9.0.a.c.c.b.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.4.e.6.6.f.c.3.0.1.f.c.8.f.7.b.6.a.7.9.2.e.3.2.3.d.8.c.5.7.f.e.f.4.6.c.b.2.7.9.1.!.D.e.l.l.T.p.m.1...2._.F.w.5...8.1...2...1._.V.2._.6.4.
                                                                                                Process:C:\Windows\System32\WerFault.exe
                                                                                                File Type:Mini DuMP crash report, 14 streams, Sun Oct 20 21:56:42 2024, 0x1205a4 type
                                                                                                Category:dropped
                                                                                                Size (bytes):68272
                                                                                                Entropy (8bit):1.3293225465878602
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:4Do4T3UOoxcOsiOcwxl/Aail7UWqN89aacw1D7S:Go4TroxcOsiOcoFi5UWq4cw1D
                                                                                                MD5:DD800F002F803248FD5ED1C1E670DFC6
                                                                                                SHA1:58C066E7FB3554186CC4A12519787722AA12CBF8
                                                                                                SHA-256:813FF0779BEC7EEED5D08333D6672029BB196BD0C23E1D79F0300BCE85F49499
                                                                                                SHA-512:9CF9F80A2095810DB9C97EB2DB10D8977DAF7AD6F4701A86A5E76F1CCADF05F93F3863FE14A4CDF38705C3DD939B42D3DE49A2FA4FD31664DC7B6FEAA03BB26F
                                                                                                Malicious:false
                                                                                                Preview:MDMP..a..... ........|.g........................0...........$....+..........T.......8...........T.......................................................................................................................eJ..............Lw......................T.......$....|.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\WerFault.exe
                                                                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):8702
                                                                                                Entropy (8bit):3.705292165269738
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:R6l7wVeJAylQe6YN5ozDCgmfxV3prT89bj3RfgAhm:R6lXJ1r6YDcDCgmfxVejhfC
                                                                                                MD5:4C97533CF7E9108B2BE415457E21DBFD
                                                                                                SHA1:28F3B72861F7A393F6581D8D2F02970308C1C53C
                                                                                                SHA-256:93EC69811B982475F6F6C9646A00D2C12B0B82F843A64EE35EF1DC90BD87E5A4
                                                                                                SHA-512:D110B95926D6FEDA25FE559E7E95C383B039EED14467295101CF2135A6C9FACD262E4DC3F809CEA434B9EC0CBD7B5504956E525D2330DDA3E08F31C98FC7DF8E
                                                                                                Malicious:false
                                                                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.8.5.2.<./.P.i.
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):47390
                                                                                                Entropy (8bit):3.0507083158998576
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:7mP+0cpKwHcQYCx4qYO637VZhqJxZNNFm8uh2N6aNLOO0v6xks8MKali:74+1p7HcQfx4qz07wNNM8uhS6aN6O0vJ
                                                                                                MD5:97E27A946AA37DD3396AACEA73EBB01D
                                                                                                SHA1:5CBA9BF72A5D8B1FE66D9F93A6A7FB0A640AAED0
                                                                                                SHA-256:40AB9A6BB81DA391B6E37FBBA8847CF06CAC3720F9D3D9653B3CC76A4EB2ADED
                                                                                                SHA-512:E24C7EFC316BD26345456899D82EC045837CB8B4AE47FB076D24C6B707624094314877B099AAAF03EDD14132024856B5CD56DEB90D22645B49ABA52CF034CC13
                                                                                                Malicious:false
                                                                                                Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                                                Process:C:\Windows\System32\WerFault.exe
                                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):4885
                                                                                                Entropy (8bit):4.517627739617107
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:cvIwWl8zsjJg771I9h9C9USWda80aNYm8M4JTT5pFU7yq8vW5NP03z3i32d:uIjf9I7J4dlkJTTyWWPuz3i32d
                                                                                                MD5:3EA84350A95AD4FD6BB37580694CCF6C
                                                                                                SHA1:62C90B7AAF04AEFB57A2E5E2CB7ACEEB325CFD30
                                                                                                SHA-256:98CA1D0F679F4EBF18FBD1D25B94B3EBE7628B97B74A117F6C7EF305DDD1B07D
                                                                                                SHA-512:F146751C13056BC605728D94729D35F18C8A76A94A6417B227D34534B176F6DB935DE8FD4F815FBC4D98D09812E6338315CC58A310D5B1B7070FC301A3B8D89C
                                                                                                Malicious:false
                                                                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="552299" />.. <arg nm="osinsty" val="2" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):13340
                                                                                                Entropy (8bit):2.6838448941590554
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:TiZYWIL5rlEL8Y83Yc0WZWsHCYEZ1Yt8i7m5J6wYkgYaYmrMtAvIR/3:2ZDIL68R3bG4maYmrMtAAR/3
                                                                                                MD5:7EA372F78F2D27ED799BB5FCE690F7D1
                                                                                                SHA1:EFF6577BFB5646B4CE7F9C0216AE4968F32D5E61
                                                                                                SHA-256:4B319DF229AF640A51B1DA38BFE6413DCF4AEE842F47561B788495F20C5204BA
                                                                                                SHA-512:E7C769423F7FE9A4CBA4C76EEE86C50FE2B504DFDB9EAB5C7DF3C806F91AEB070AD25CCEB9583D6D9BE9A26501578997AFE32B20C0E1BDB74C6FB8331236221B
                                                                                                Malicious:false
                                                                                                Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                                                Process:C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exe
                                                                                                File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):14840
                                                                                                Entropy (8bit):6.410957073929073
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:QGkygXkI925h0rx/jPdQUorjs/6gfyowJL/aMjGwP7eMa8Ep+ebMwfPZgjlJMSJ:hkyg0I9+0rljPaNI6iYJLWWEfbHH6jV
                                                                                                MD5:C996D7971C49252C582171D9380360F2
                                                                                                SHA1:C948AE14761095E4D76B55D9DE86412258BE7AFD
                                                                                                SHA-256:0296E2CE999E67C76352613A718E11516FE1B0EFC3FFDB8918FC999DD76A73A5
                                                                                                SHA-512:9D0F2AE288001573B3B822649F2299315B02F8B40D53D3192CC8C15C80F271758F88E0F87FE50694B3655491309A4ACDDC2EA76FB7C178B0310EC4907476DD5A
                                                                                                Malicious:false
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 3%
                                                                                                Joe Sandbox View:
                                                                                                • Filename: d2zdtSIH1g.exe, Detection: malicious, Browse
                                                                                                • Filename: d2zdtSIH1g.exe, Detection: malicious, Browse
                                                                                                • Filename: E5440A24.exe, Detection: malicious, Browse
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B...B...B......B.....B.....B.....B.....B..Rich.B..........................PE..d...K..J.........."..................`.......................................p......q_......................................................d`..(............@....... ............... ............................................... ...............................text............................... ..h.rdata....... ......................@..H.data...p....0......................@....pdata.......@......................@..HPAGE....,....P...................... ..`INIT.........`...................... ...................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:JSON data
                                                                                                Category:dropped
                                                                                                Size (bytes):55
                                                                                                Entropy (8bit):4.306461250274409
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                                                MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                                                SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                                                SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                                                SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                                                Malicious:false
                                                                                                Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                                                Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                Category:modified
                                                                                                Size (bytes):4926
                                                                                                Entropy (8bit):3.245249594726578
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:FaqdF78F7B+AAHdKoqKFxcxkFiF7KaqdF7zlG+AAHdKoqKFxcxkFZlA:cEOB+AAsoJjykePEpG+AAsoJjyk5A
                                                                                                MD5:300ACF4B4CACEBC69C54AC584F94ACE2
                                                                                                SHA1:55ACFBC2DAF93976B575BB0D35EA74E82F117BC3
                                                                                                SHA-256:9ACE9BD0C005172DF619A340CCC1CBA6C643D1127361356A556A09C0BF845F9D
                                                                                                SHA-512:012886B7DAF29F9E8553EBCCB09CF9423DFC1071F3E8D6AB841AC2D0D9637E16C1C97AA6D40295395DA8C6BB46A5E84448A1C5983556805F878F1CDB0F211765
                                                                                                Malicious:false
                                                                                                Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. F.r.i. .. O.c.t. .. 0.6. .. 2.0.2.3. .1.1.:.3.5.:.2.9.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .W.S.C. .S.t.a.t.e. .I.n.f.o. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .A.n.t.i.V.i.r.u.s.P.r.o.d.u.c.t. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....d.i.s.p.l.a.y.N.a.m.e. .=. .[.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.].....p.a.t.h.T.o.S.i.g.n.e.d.P.r.o.d.u.c.t.E.x.e. .=. .[.w.i.n.d.o.w.s.d.
                                                                                                Process:C:\Windows\System32\WerFault.exe
                                                                                                File Type:MS Windows registry file, NT/2000 or above
                                                                                                Category:dropped
                                                                                                Size (bytes):1835008
                                                                                                Entropy (8bit):4.310241806077743
                                                                                                Encrypted:false
                                                                                                SSDEEP:6144:oew8CE/ZeaJFSSPKY6B0CvpuIUOa4+e9gFbJUjWKdHjj5+yJ1tREf4KrA:o78dWvp63qtdHHXeAC
                                                                                                MD5:B5D218E1CE10DF5388107B21705E28E8
                                                                                                SHA1:53E21ED24E8A13FC41C04D11576FD8198BD9CF54
                                                                                                SHA-256:94CBCA73B582A8066395420E85F84B6C34D8A6BADBAE266A584F160DF992FF69
                                                                                                SHA-512:E9F524FEE640BF44295B22FDE91A3379C3B4C4C10BAA3FA2852C52531B60BD1A8981A07892FA671C1CB2828D66223A6DDD5CC18A99E3D9FEA5754114783F5427
                                                                                                Malicious:false
                                                                                                Preview:regfF...F....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.g..:#..............................................................................................................................................................................................................................................................................................................................................&...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                Entropy (8bit):7.401342115335497
                                                                                                TrID:
                                                                                                • Generic Win/DOS Executable (2004/3) 10.01%
                                                                                                • Win64 Device Driver (generic) (2002/3) 10.00%
                                                                                                • Win32 Device Driver (generic) (2002/3) 10.00%
                                                                                                • DOS Executable Generic (2002/1) 10.00%
                                                                                                • Win64 Executable (generic) (2002/4) 10.00%
                                                                                                File name:DellTpm1.2_Fw5.81.2.1_V2_64.exe
                                                                                                File size:590'064 bytes
                                                                                                MD5:0786550b875bb812d2575b5ae5f9e39f
                                                                                                SHA1:4e66fc301fc8f7b6a792e323d8c57fef46cb2791
                                                                                                SHA256:af273ee1d075d92c0d1b9a3bac9cf68573b6b7838cc0eadc94f176358bfb4130
                                                                                                SHA512:55c9287c065b9a3bbb22436c5354c068f50b310074313f3c66df871aba23b170bf4077b7f1f6f2ced92018311823b99a28882e005b5b7880c2f6b214afbb9936
                                                                                                SSDEEP:12288:GmkgrPU8pfxTNh5LcV8mTftg0nN77XwVxS17ZTfsa5Rp:jk4U8pJT5LkDTfRExS17REUX
                                                                                                TLSH:85C4B048FA9811F4E0BFD2F080634626E5737C5DC36086DB4B587A7E6F266C0953E7A8
                                                                                                File Content Preview:MZ..M.f........'.@......@...................................@...............s...Q.../.......................i...;...............^...H...(...............(...t...b...M...........................?...5...U...K...a...............................y... ..........
                                                                                                Icon Hash:90cececece8e8eb0
                                                                                                Entrypoint:0x140040644
                                                                                                Entrypoint Section:.text
                                                                                                Digitally signed:true
                                                                                                Imagebase:0x140000000
                                                                                                Subsystem:windows gui
                                                                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                                Time Stamp:0x55CBA8D9 [Wed Aug 12 20:13:13 2015 UTC]
                                                                                                TLS Callbacks:
                                                                                                CLR (.Net) Version:
                                                                                                OS Version Major:5
                                                                                                OS Version Minor:2
                                                                                                File Version Major:5
                                                                                                File Version Minor:2
                                                                                                Subsystem Version Major:5
                                                                                                Subsystem Version Minor:2
                                                                                                Import Hash:148706bc8f64667aac7d452f491cc6cb
                                                                                                Signature Valid:true
                                                                                                Signature Issuer:CN=Entrust Code Signing CA - OVCS1, OU="(c) 2015 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US
                                                                                                Signature Validation Error:The operation completed successfully
                                                                                                Error Number:0
                                                                                                Not Before, Not After
                                                                                                • 11/04/2016 11:55:46 11/04/2017 12:25:43
                                                                                                Subject Chain
                                                                                                • CN=Dell Inc, O=Dell Inc, L=Round Rock, S=Texas, C=US
                                                                                                Version:3
                                                                                                Thumbprint MD5:DAAA03698DE5A34ACFF516EC849311CF
                                                                                                Thumbprint SHA-1:A1CCF979EC008B6C4D5F1B5FD03E400E1B349A6E
                                                                                                Thumbprint SHA-256:86C0E37820071B19F405195FD51CB1BD3EB69CACEB31C98770BFD0C0A0C93B31
                                                                                                Serial:009E11660CF343376C000000005565FB02
                                                                                                Instruction
                                                                                                dec eax
                                                                                                sub esp, 28h
                                                                                                call 00007FEE491929F8h
                                                                                                dec eax
                                                                                                add esp, 28h
                                                                                                jmp 00007FEE4918CF87h
                                                                                                int3
                                                                                                int3
                                                                                                inc eax
                                                                                                push ebx
                                                                                                dec eax
                                                                                                sub esp, 20h
                                                                                                inc ebp
                                                                                                mov ebx, dword ptr [eax]
                                                                                                dec eax
                                                                                                mov ebx, edx
                                                                                                dec esp
                                                                                                mov ecx, ecx
                                                                                                inc ecx
                                                                                                and ebx, FFFFFFF8h
                                                                                                inc ecx
                                                                                                test byte ptr [eax], 00000004h
                                                                                                dec esp
                                                                                                mov edx, ecx
                                                                                                je 00007FEE4918D145h
                                                                                                inc ecx
                                                                                                mov eax, dword ptr [eax+08h]
                                                                                                dec ebp
                                                                                                arpl word ptr [eax+04h], dx
                                                                                                neg eax
                                                                                                dec esp
                                                                                                add edx, ecx
                                                                                                dec eax
                                                                                                arpl ax, cx
                                                                                                dec esp
                                                                                                and edx, ecx
                                                                                                dec ecx
                                                                                                arpl bx, ax
                                                                                                dec edx
                                                                                                mov edx, dword ptr [eax+edx]
                                                                                                dec eax
                                                                                                mov eax, dword ptr [ebx+10h]
                                                                                                mov ecx, dword ptr [eax+08h]
                                                                                                dec eax
                                                                                                add ecx, dword ptr [ebx+08h]
                                                                                                test byte ptr [ecx+03h], 0000000Fh
                                                                                                je 00007FEE4918D13Eh
                                                                                                movzx eax, byte ptr [ecx+03h]
                                                                                                and eax, FFFFFFF0h
                                                                                                dec eax
                                                                                                cwde
                                                                                                dec esp
                                                                                                add ecx, eax
                                                                                                dec esp
                                                                                                xor ecx, edx
                                                                                                dec ecx
                                                                                                mov ecx, ecx
                                                                                                dec eax
                                                                                                add esp, 20h
                                                                                                pop ebx
                                                                                                jmp 00007FEE4918BE3Ah
                                                                                                int3
                                                                                                dec eax
                                                                                                sub esp, 28h
                                                                                                dec ebp
                                                                                                mov eax, dword ptr [ecx+38h]
                                                                                                dec eax
                                                                                                mov ecx, edx
                                                                                                dec ecx
                                                                                                mov edx, ecx
                                                                                                call 00007FEE4918D0BEh
                                                                                                mov eax, 00000001h
                                                                                                dec eax
                                                                                                add esp, 28h
                                                                                                ret
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                nop word ptr [eax+eax+00000000h]
                                                                                                dec eax
                                                                                                mov eax, ecx
                                                                                                dec ecx
                                                                                                cmp eax, 08h
                                                                                                jc 00007FEE4918D185h
                                                                                                movzx edx, dl
                                                                                                dec ecx
                                                                                                mov ecx, 01010101h
                                                                                                add dword ptr [ecx], eax
                                                                                                add dword ptr [ecx], eax
                                                                                                dec ecx
                                                                                                imul edx, ecx
                                                                                                dec ecx
                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x557dc0x64.rdata
                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x690000x388.rsrc
                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x670000x1cb0.pdata
                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x8e7a00x1950
                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x6a0000x32c.reloc
                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x4b0000x3c8.rdata
                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                .text0x2a0000x208ea0x20a008a39ce20327c1721baeabddfee26f3e2False0.5083438098659003data6.254052094405779IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                .rdata0x4b0000xb46e0xb600ac5ccb8ee6cdd0bbd8cc42dc83261562False0.4675480769230769data6.170915918824887IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                .data0x570000xf8440x8e00d7395fbab8f8f624cd7c96c4a74435d0False0.5104533450704225data7.322799422962148IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                .pdata0x670000x1cb00x1e009636066060ea22276b59696d513cd425False0.46575520833333334data5.498862792474838IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                .rsrc0x690000x3880x400d631aa04dbe41ec2231a4e02dc45451dFalse0.4638671875data3.9978476400412366IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                .reloc0x6a0000x6680x8004377463a387fe8dc5cb6dacd80c95cb1False0.24462890625data2.758693620377855IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                RT_DIALOG0x690a00x16cdataEnglishUnited States0.5659340659340659
                                                                                                RT_MANIFEST0x692100x174ASCII textEnglishUnited States0.5994623655913979
                                                                                                DLLImport
                                                                                                USER32.dllEndPaint, DestroyWindow, GetWindowLongPtrA, RegisterClassExA, SendDlgItemMessageA, FillRect, wsprintfA, GetClientRect, ExitWindowsEx, BeginPaint, MessageBoxA, CreateWindowExA, EndDialog, DefWindowProcA, RedrawWindow, ShowWindow, SetWindowLongPtrA, SystemParametersInfoA, GetSystemMetrics, UpdateWindow, DialogBoxParamA
                                                                                                GDI32.dllDeleteObject, CreateSolidBrush
                                                                                                ADVAPI32.dllOpenServiceA, CreateServiceA, StartServiceA, DeleteService, CloseServiceHandle, RegCloseKey, AdjustTokenPrivileges, RegOpenKeyA, FreeSid, AllocateAndInitializeSid, ReportEventA, LookupPrivilegeValueA, DeregisterEventSource, OpenProcessToken, RegisterEventSourceA, OpenSCManagerA
                                                                                                KERNEL32.dllRaiseException, GetConsoleCP, GetConsoleMode, HeapReAlloc, LoadLibraryW, FlushFileBuffers, GetStringTypeW, SetStdHandle, HeapSize, WriteConsoleW, SetEndOfFile, GetProcessHeap, CreateFileW, RtlPcToFileHeader, UnhandledExceptionFilter, GetCurrentProcess, CreateDirectoryA, GetLastError, GetProcAddress, GetLocalTime, GetModuleFileNameA, GetModuleHandleA, CreateMutexA, GetVersionExA, GetEnvironmentVariableA, Sleep, DeleteFileA, CloseHandle, DeviceIoControl, CreateFileA, EnterCriticalSection, LeaveCriticalSection, HeapFree, HeapAlloc, GetCommandLineA, GetStartupInfoW, GetSystemTimeAsFileTime, TerminateProcess, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, DeleteCriticalSection, GetModuleHandleW, ExitProcess, DecodePointer, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, EncodePointer, FlsGetValue, FlsSetValue, FlsFree, SetLastError, GetCurrentThreadId, FlsAlloc, WideCharToMultiByte, LCMapStringW, MultiByteToWideChar, RtlUnwindEx, HeapSetInformation, GetVersion, HeapCreate, WriteFile, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, SetFilePointer, ReadFile
                                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                                EnglishUnited States
                                                                                                No network behavior found

                                                                                                Click to jump to process

                                                                                                Click to jump to process

                                                                                                Click to dive into process behavior distribution

                                                                                                Click to jump to process

                                                                                                Target ID:0
                                                                                                Start time:17:56:42
                                                                                                Start date:20/10/2024
                                                                                                Path:C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:"C:\Users\user\Desktop\DellTpm1.2_Fw5.81.2.1_V2_64.exe"
                                                                                                Imagebase:0x7ff6a0d50000
                                                                                                File size:590'064 bytes
                                                                                                MD5 hash:0786550B875BB812D2575B5AE5F9E39F
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:1
                                                                                                Start time:17:56:42
                                                                                                Start date:20/10/2024
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                Imagebase:0x7ff62c440000
                                                                                                File size:55'320 bytes
                                                                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:2
                                                                                                Start time:17:56:42
                                                                                                Start date:20/10/2024
                                                                                                Path:C:\Windows\System32\WerFault.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\WerFault.exe -pss -s 436 -p 2852 -ip 2852
                                                                                                Imagebase:0x7ff6cf550000
                                                                                                File size:570'736 bytes
                                                                                                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:3
                                                                                                Start time:17:56:42
                                                                                                Start date:20/10/2024
                                                                                                Path:C:\Windows\System32\WerFault.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\WerFault.exe -u -p 2852 -s 288
                                                                                                Imagebase:0x7ff6cf550000
                                                                                                File size:570'736 bytes
                                                                                                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:5
                                                                                                Start time:17:56:45
                                                                                                Start date:20/10/2024
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                                Imagebase:0x7ff62c440000
                                                                                                File size:55'320 bytes
                                                                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:false

                                                                                                Target ID:6
                                                                                                Start time:17:56:51
                                                                                                Start date:20/10/2024
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                                                                                                Imagebase:0x7ff62c440000
                                                                                                File size:55'320 bytes
                                                                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:7
                                                                                                Start time:17:56:51
                                                                                                Start date:20/10/2024
                                                                                                Path:C:\Windows\System32\SgrmBroker.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\SgrmBroker.exe
                                                                                                Imagebase:0x7ff7648e0000
                                                                                                File size:329'504 bytes
                                                                                                MD5 hash:3BA1A18A0DC30A0545E7765CB97D8E63
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:false

                                                                                                Target ID:8
                                                                                                Start time:17:56:51
                                                                                                Start date:20/10/2024
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                Imagebase:0x7ff62c440000
                                                                                                File size:55'320 bytes
                                                                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:false

                                                                                                Target ID:9
                                                                                                Start time:17:56:51
                                                                                                Start date:20/10/2024
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
                                                                                                Imagebase:0x7ff62c440000
                                                                                                File size:55'320 bytes
                                                                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:false

                                                                                                Target ID:11
                                                                                                Start time:17:56:52
                                                                                                Start date:20/10/2024
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\svchost.exe -k UnistackSvcGroup
                                                                                                Imagebase:0x7ff62c440000
                                                                                                File size:55'320 bytes
                                                                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:false

                                                                                                Target ID:12
                                                                                                Start time:17:57:52
                                                                                                Start date:20/10/2024
                                                                                                Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                                                                                                Imagebase:0x7ff61b730000
                                                                                                File size:468'120 bytes
                                                                                                MD5 hash:B3676839B2EE96983F9ED735CD044159
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:13
                                                                                                Start time:17:57:52
                                                                                                Start date:20/10/2024
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff6684c0000
                                                                                                File size:862'208 bytes
                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Has exited:true

                                                                                                No disassembly