Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll

Overview

General Information

Sample name:SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll
(renamed file extension from exe to dll)
Original sample name:SecuriteInfo.com.Application.Generic.3623086.1464.24272.exe
Analysis ID:1417538
MD5:72bca96a3c16575f9c41c971f290ef9d
SHA1:ec2a063a295a44b559753048b69b13f6f29581be
SHA256:0ba766c92ee65ba37d996bd0b1aaf5bbf9bdef6efe2473997972642d206c877f
Tags:exe
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Creates a process in suspended mode (likely to inject code)
Entry point lies outside standard sections
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Tries to load missing DLLs

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7452 cmdline: loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 7468 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7532 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 7548 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllReversingLabs: Detection: 44%
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllVirustotal: Detection: 47%Perma Link
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllJoe Sandbox ML: detected
Source: loaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_cbea1377-9
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: loaddll64.exe, 00000000.00000002.3788577625.00007FFBA9B09000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788526443.00007FFBA9B09000.00000040.00000001.01000000.00000003.sdmp
Source: Binary string: ".pdb*.$ source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: loaddll64.exe, 00000000.00000002.3788577625.00007FFBA9B09000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788526443.00007FFBA9B09000.00000040.00000001.01000000.00000003.sdmp
Source: rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://fontello.com
Source: loaddll64.exe, 00000000.00000002.3788294623.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmp, loaddll64.exe, 00000000.00000003.1347874541.000001C442900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1348219113.000001B6B6570000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://fontello.comCopyright
Source: loaddll64.exe, 00000000.00000002.3788294623.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmp, loaddll64.exe, 00000000.00000003.1347874541.000001C442900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1348219113.000001B6B6570000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLInterExtraLightOpen
Source: loaddll64.exe, 00000000.00000002.3788294623.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmp, loaddll64.exe, 00000000.00000003.1347874541.000001C442900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1348219113.000001B6B6570000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLInterLightOpen
Source: loaddll64.exe, 00000000.00000002.3788294623.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmp, loaddll64.exe, 00000000.00000003.1347874541.000001C442900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1348219113.000001B6B6570000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLInterMediumOpen
Source: loaddll64.exe, 00000000.00000002.3788294623.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmp, loaddll64.exe, 00000000.00000003.1347874541.000001C442900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1348219113.000001B6B6570000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLInterSemiBoldOpen
Source: loaddll64.exe, 00000000.00000002.3788294623.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmp, loaddll64.exe, 00000000.00000003.1347874541.000001C442900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1348219113.000001B6B6570000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLInterThinOpen
Source: rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLOpen
Source: loaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://Mozilla/5.0Failed
Source: rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.github.com/repos/Prax-Client/Releases/releases/latest
Source: loaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.playhive.com/v0/game/all/
Source: loaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.playhive.com/v0/game/all/GetHiveStats:
Source: rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/1157861980611297410/1163279643168747570/F6_T6MXXoAAH6os.jpg?e
Source: rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: loaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://curl.se/docs/hsts.html
Source: loaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: loaddll64.exe, 00000000.00000002.3788294623.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmp, loaddll64.exe, 00000000.00000003.1347874541.000001C442900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1348219113.000001B6B6570000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/JetBrains/JetBrainsMono)JetBrains
Source: loaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/Prax-Client/Releases/raw/main/banner
Source: loaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/Prax-Client/Releases/raw/main/bannerstart_screenhud_screentextures/ui/titletextur
Source: rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/Prax-Client/Releases/raw/main/fardreverb.wav
Source: loaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/Prax-Client/Releases/raw/main/killsound.wav
Source: loaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/Prax-Client/Releases/raw/main/killsound.wavCreated
Source: rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/rsms/inter)Inter
Source: loaddll64.exe, 00000000.00000002.3788294623.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmp, loaddll64.exe, 00000000.00000003.1347874541.000001C442900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1348219113.000001B6B6570000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/rsms/inter)InterBold3.019;RSMS;Inter-BoldInter
Source: loaddll64.exe, 00000000.00000002.3788294623.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmp, loaddll64.exe, 00000000.00000003.1347874541.000001C442900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1348219113.000001B6B6570000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/rsms/inter)InterRegular3.019;RSMS;Inter-RegularInter
Source: loaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://peoplehub-public.xboxlive.com/people/gt(
Source: loaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://peoplehub-public.xboxlive.com/people/gt(Rtn:
Source: rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://rsms.me/This
Source: loaddll64.exe, 00000000.00000002.3788294623.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmp, loaddll64.exe, 00000000.00000003.1347874541.000001C442900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1348219113.000001B6B6570000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://scripts.sil.org/OFLhttps://scripts.sil.org/OFL
Source: loaddll64.exe, 00000000.00000002.3788294623.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmp, loaddll64.exe, 00000000.00000003.1347874541.000001C442900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1348219113.000001B6B6570000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.jetbrains.comhttps://www.jetbrains.comThis
Source: loaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://yiffing.zone/sounds/click.wav
Source: loaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://yiffing.zone/sounds/click.wavhttps://yiffing.zone/sounds/notify_off.wavhttps://yiffing.zone/
Source: loaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://yiffing.zone/sounds/notify_off.wav
Source: loaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://yiffing.zone/sounds/notify_on.wav

System Summary

barindex
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: section name:
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: section name:
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: section name:
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: section name:
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: section name:
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: section name:
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: section name:
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: Number of sections : 13 > 10
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: d3dcompiler_47.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: xaudio2_9.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: mmdevapi.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: avrt.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: audioses.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: Section: ZLIB complexity 0.9958128511235955
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: Section: .reloc ZLIB complexity 1.5625
Source: classification engineClassification label: mal80.evad.winDLL@6/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7468:120:WilError_03
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll",#1
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllReversingLabs: Detection: 44%
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllVirustotal: Detection: 47%
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll",#1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll",#1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{BCDE0395-E52F-467C-8E3D-C4579291692E}\InprocServer32Jump to behavior
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic file information: File size 6792208 > 1048576
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: Raw size of is bigger than: 0x100000 < 0x12d800
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: Raw size of is bigger than: 0x100000 < 0x1a0a00
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x362c00
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: loaddll64.exe, 00000000.00000002.3788577625.00007FFBA9B09000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788526443.00007FFBA9B09000.00000040.00000001.01000000.00000003.sdmp
Source: Binary string: ".pdb*.$ source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: loaddll64.exe, 00000000.00000002.3788577625.00007FFBA9B09000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788526443.00007FFBA9B09000.00000040.00000001.01000000.00000003.sdmp
Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: section name:
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: section name:
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: section name:
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: section name:
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: section name:
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: section name:
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: section name:
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: section name: .themida
Source: SecuriteInfo.com.Application.Generic.3623086.1464.24272.dllStatic PE information: section name: .boot

Boot Survival

barindex
Source: C:\Windows\System32\loaddll64.exeWindow searched: window name: RegmonClassJump to behavior
Source: C:\Windows\System32\loaddll64.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Windows\System32\loaddll64.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClassJump to behavior
Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClassJump to behavior
Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\loaddll64.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Windows\System32\loaddll64.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Windows\System32\rundll32.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
Source: C:\Windows\System32\rundll32.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
Source: C:\Windows\System32\rundll32.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
Source: C:\Windows\System32\rundll32.exe TID: 7552Thread sleep count: 40 > 30Jump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: loaddll64.exe, 00000000.00000002.3787758103.000001C440BCD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Your client sucks, just get SigmaT\VBOX__JHh
Source: loaddll64.exe, 00000000.00000002.3787758103.000001C440C00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: rundll32.exe, 00000004.00000002.3787747090.000001B6B4963000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlloo
Source: C:\Windows\System32\loaddll64.exeSystem information queried: ModuleInformationJump to behavior

Anti Debugging

barindex
Source: C:\Windows\System32\loaddll64.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\System32\rundll32.exeOpen window title or class name: regmonclass
Source: C:\Windows\System32\rundll32.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Windows\System32\rundll32.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Windows\System32\rundll32.exeOpen window title or class name: procmon_window_class
Source: C:\Windows\System32\rundll32.exeOpen window title or class name: filemonclass
Source: C:\Windows\System32\rundll32.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\loaddll64.exeNtSetInformationThread: Indirect: 0x7FFBA9D73DDDJump to behavior
Source: C:\Windows\System32\loaddll64.exeNtQueryInformationProcess: Indirect: 0x7FFBA9D263AAJump to behavior
Source: C:\Windows\System32\loaddll64.exeNtQueryInformationProcess: Indirect: 0x7FFBA9D13298Jump to behavior
Source: C:\Windows\System32\loaddll64.exeNtQuerySystemInformation: Indirect: 0x7FFBA9D0554AJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll",#1Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
33
Virtualization/Sandbox Evasion
OS Credential Dumping521
Security Software Discovery
Remote Services1
Archive Collected Data
Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
1
Rundll32
LSASS Memory33
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Software Packing
Security Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Abuse Elevation Control Mechanism
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll45%ReversingLabsWin64.Trojan.Acll
SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll48%VirustotalBrowse
SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://curl.se/docs/http-cookies.html0%Avira URL Cloudsafe
https://www.jetbrains.comhttps://www.jetbrains.comThis0%Avira URL Cloudsafe
https://api.playhive.com/v0/game/all/GetHiveStats:0%Avira URL Cloudsafe
https://curl.se/docs/alt-svc.html0%Avira URL Cloudsafe
https://api.playhive.com/v0/game/all/0%Avira URL Cloudsafe
https://curl.se/docs/hsts.html0%Avira URL Cloudsafe
https://Mozilla/5.0Failed0%Avira URL Cloudsafe
https://yiffing.zone/sounds/click.wav0%Avira URL Cloudsafe
http://fontello.comCopyright0%Avira URL Cloudsafe
https://curl.se/docs/hsts.html0%VirustotalBrowse
https://yiffing.zone/sounds/click.wavhttps://yiffing.zone/sounds/notify_off.wavhttps://yiffing.zone/0%Avira URL Cloudsafe
https://yiffing.zone/sounds/notify_off.wav0%Avira URL Cloudsafe
https://yiffing.zone/sounds/notify_on.wav0%Avira URL Cloudsafe
https://curl.se/docs/http-cookies.html0%VirustotalBrowse
https://api.playhive.com/v0/game/all/0%VirustotalBrowse
https://curl.se/docs/alt-svc.html0%VirustotalBrowse
https://yiffing.zone/sounds/click.wavhttps://yiffing.zone/sounds/notify_off.wavhttps://yiffing.zone/0%VirustotalBrowse
https://yiffing.zone/sounds/click.wav0%VirustotalBrowse
https://yiffing.zone/sounds/notify_off.wav0%VirustotalBrowse
https://api.playhive.com/v0/game/all/GetHiveStats:0%VirustotalBrowse
https://yiffing.zone/sounds/notify_on.wav0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLInterMediumOpenloaddll64.exe, 00000000.00000002.3788294623.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmp, loaddll64.exe, 00000000.00000003.1347874541.000001C442900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1348219113.000001B6B6570000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpfalse
    high
    https://curl.se/docs/http-cookies.htmlloaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://github.com/Prax-Client/Releases/raw/main/killsound.wavCreatedloaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpfalse
      high
      https://www.jetbrains.comhttps://www.jetbrains.comThisloaddll64.exe, 00000000.00000002.3788294623.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmp, loaddll64.exe, 00000000.00000003.1347874541.000001C442900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1348219113.000001B6B6570000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://api.playhive.com/v0/game/all/GetHiveStats:loaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://github.com/Prax-Client/Releases/raw/main/bannerloaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpfalse
        high
        https://rsms.me/Thisrundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpfalse
          high
          http://fontello.comrundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpfalse
            high
            http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLInterLightOpenloaddll64.exe, 00000000.00000002.3788294623.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmp, loaddll64.exe, 00000000.00000003.1347874541.000001C442900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1348219113.000001B6B6570000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpfalse
              high
              https://cdn.discordapp.com/attachments/1157861980611297410/1163279643168747570/F6_T6MXXoAAH6os.jpg?erundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpfalse
                high
                https://curl.se/docs/alt-svc.htmlrundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://api.github.com/repos/Prax-Client/Releases/releases/latestrundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpfalse
                  high
                  https://github.com/Prax-Client/Releases/raw/main/killsound.wavloaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpfalse
                    high
                    https://github.com/rsms/inter)InterBold3.019;RSMS;Inter-BoldInterloaddll64.exe, 00000000.00000002.3788294623.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmp, loaddll64.exe, 00000000.00000003.1347874541.000001C442900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1348219113.000001B6B6570000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpfalse
                      high
                      https://api.playhive.com/v0/game/all/loaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLOpenrundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpfalse
                        high
                        http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLInterExtraLightOpenloaddll64.exe, 00000000.00000002.3788294623.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmp, loaddll64.exe, 00000000.00000003.1347874541.000001C442900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1348219113.000001B6B6570000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpfalse
                          high
                          http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLInterThinOpenloaddll64.exe, 00000000.00000002.3788294623.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmp, loaddll64.exe, 00000000.00000003.1347874541.000001C442900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1348219113.000001B6B6570000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpfalse
                            high
                            https://curl.se/docs/hsts.htmlloaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/rsms/inter)InterRegular3.019;RSMS;Inter-RegularInterloaddll64.exe, 00000000.00000002.3788294623.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmp, loaddll64.exe, 00000000.00000003.1347874541.000001C442900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1348219113.000001B6B6570000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpfalse
                              high
                              https://Mozilla/5.0Failedloaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              low
                              https://yiffing.zone/sounds/click.wavloaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://github.com/JetBrains/JetBrainsMono)JetBrainsloaddll64.exe, 00000000.00000002.3788294623.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmp, loaddll64.exe, 00000000.00000003.1347874541.000001C442900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1348219113.000001B6B6570000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpfalse
                                high
                                http://fontello.comCopyrightloaddll64.exe, 00000000.00000002.3788294623.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmp, loaddll64.exe, 00000000.00000003.1347874541.000001C442900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1348219113.000001B6B6570000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://yiffing.zone/sounds/click.wavhttps://yiffing.zone/sounds/notify_off.wavhttps://yiffing.zone/loaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpfalse
                                • 0%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                https://github.com/Prax-Client/Releases/raw/main/fardreverb.wavrundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpfalse
                                  high
                                  https://github.com/rsms/inter)Interrundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpfalse
                                    high
                                    http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLInterSemiBoldOpenloaddll64.exe, 00000000.00000002.3788294623.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmp, loaddll64.exe, 00000000.00000003.1347874541.000001C442900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1348219113.000001B6B6570000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpfalse
                                      high
                                      https://peoplehub-public.xboxlive.com/people/gt(loaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpfalse
                                        high
                                        https://github.com/Prax-Client/Releases/raw/main/bannerstart_screenhud_screentextures/ui/titletexturloaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpfalse
                                          high
                                          https://peoplehub-public.xboxlive.com/people/gt(Rtn:loaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpfalse
                                            high
                                            https://yiffing.zone/sounds/notify_off.wavloaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpfalse
                                            • 0%, Virustotal, Browse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://scripts.sil.org/OFLhttps://scripts.sil.org/OFLloaddll64.exe, 00000000.00000002.3788294623.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmp, loaddll64.exe, 00000000.00000003.1347874541.000001C442900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1348219113.000001B6B6570000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3788253297.00007FFBA9464000.00000004.00000001.01000000.00000003.sdmpfalse
                                              high
                                              https://yiffing.zone/sounds/notify_on.wavloaddll64.exe, 00000000.00000003.1347113703.000001C440D90000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.3788249388.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3788213687.00007FFBA93E4000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000003.1347485334.000001B6B6570000.00000004.00001000.00020000.00000000.sdmpfalse
                                              • 0%, Virustotal, Browse
                                              • Avira URL Cloud: safe
                                              unknown
                                              No contacted IP infos
                                              Joe Sandbox version:40.0.0 Tourmaline
                                              Analysis ID:1417538
                                              Start date and time:2024-03-29 15:25:11 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 6m 22s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:11
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll
                                              (renamed file extension from exe to dll)
                                              Original Sample Name:SecuriteInfo.com.Application.Generic.3623086.1464.24272.exe
                                              Detection:MAL
                                              Classification:mal80.evad.winDLL@6/0@0/0
                                              EGA Information:Failed
                                              HCA Information:
                                              • Successful, ratio: 100%
                                              • Number of executed functions: 0
                                              • Number of non-executed functions: 0
                                              Cookbook Comments:
                                              • Override analysis time to 240s for rundll32
                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              No simulations
                                              No context
                                              No context
                                              No context
                                              No context
                                              No context
                                              No created / dropped files found
                                              File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                              Entropy (8bit):7.986250881029374
                                              TrID:
                                              • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                                              • Win64 Executable (generic) (12005/4) 10.17%
                                              • Generic Win/DOS Executable (2004/3) 1.70%
                                              • DOS Executable Generic (2002/1) 1.70%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                                              File name:SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll
                                              File size:6'792'208 bytes
                                              MD5:72bca96a3c16575f9c41c971f290ef9d
                                              SHA1:ec2a063a295a44b559753048b69b13f6f29581be
                                              SHA256:0ba766c92ee65ba37d996bd0b1aaf5bbf9bdef6efe2473997972642d206c877f
                                              SHA512:0574da8f8b8bab89ff3ad7403deda2a46e8b450d8b837e953cf02e0387998d65d5e6a7916e0af642cad09669fd41e4fcb8221aaf34941908ede8e6eeebc24109
                                              SSDEEP:98304:9vnGSDRqwFgUXnqWBeLMe7QXtXSXqiYT6fSPA3Jt5w3Va3GmHD60qvlGQP8ERCSi:9vGwxFgTCXl4qmSY3J3AXmj6bGicSxE
                                              TLSH:B266332F59B66F7BCB9D97B48AE0A06C1D36FF2F185F085E363209161A3C54A2F02D15
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......,...h...h...h...#...r...#...H.....P.o.......x...................#.......#...w...h...3.......i...h...}.............R.i.......i..
                                              Icon Hash:7ae282899bbab082
                                              Entrypoint:0x180d1c0b0
                                              Entrypoint Section:.boot
                                              Digitally signed:false
                                              Imagebase:0x180000000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE
                                              Time Stamp:0x6601F364 [Mon Mar 25 21:57:56 2024 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:6
                                              OS Version Minor:0
                                              File Version Major:6
                                              File Version Minor:0
                                              Subsystem Version Major:6
                                              Subsystem Version Minor:0
                                              Import Hash:4d5e2630f597c581f9c8c6dd71c07b69
                                              Instruction
                                              call 00007F5A38C2BD17h
                                              inc ecx
                                              push edx
                                              dec ecx
                                              mov edx, esp
                                              inc ecx
                                              push edx
                                              dec ecx
                                              mov esi, dword ptr [edx+10h]
                                              dec ecx
                                              mov edi, dword ptr [edx+20h]
                                              cld
                                              mov dl, 80h
                                              mov al, byte ptr [esi]
                                              dec eax
                                              inc esi
                                              mov byte ptr [edi], al
                                              dec eax
                                              inc edi
                                              mov ebx, 00000002h
                                              add dl, dl
                                              jne 00007F5A38C2BB99h
                                              mov dl, byte ptr [esi]
                                              dec eax
                                              inc esi
                                              adc dl, dl
                                              jnc 00007F5A38C2BB76h
                                              add dl, dl
                                              jne 00007F5A38C2BB99h
                                              mov dl, byte ptr [esi]
                                              dec eax
                                              inc esi
                                              adc dl, dl
                                              jnc 00007F5A38C2BBF0h
                                              xor eax, eax
                                              add dl, dl
                                              jne 00007F5A38C2BB99h
                                              mov dl, byte ptr [esi]
                                              dec eax
                                              inc esi
                                              adc dl, dl
                                              jnc 00007F5A38C2BC98h
                                              add dl, dl
                                              jne 00007F5A38C2BB99h
                                              mov dl, byte ptr [esi]
                                              dec eax
                                              inc esi
                                              adc dl, dl
                                              adc eax, eax
                                              add dl, dl
                                              jne 00007F5A38C2BB99h
                                              mov dl, byte ptr [esi]
                                              dec eax
                                              inc esi
                                              adc dl, dl
                                              adc eax, eax
                                              add dl, dl
                                              jne 00007F5A38C2BB99h
                                              mov dl, byte ptr [esi]
                                              dec eax
                                              inc esi
                                              adc dl, dl
                                              adc eax, eax
                                              add dl, dl
                                              jne 00007F5A38C2BB99h
                                              mov dl, byte ptr [esi]
                                              dec eax
                                              inc esi
                                              adc dl, dl
                                              adc eax, eax
                                              je 00007F5A38C2BB9Bh
                                              push edi
                                              mov eax, eax
                                              dec eax
                                              sub edi, eax
                                              mov al, byte ptr [edi]
                                              pop edi
                                              mov byte ptr [edi], al
                                              dec eax
                                              inc edi
                                              mov ebx, 00000002h
                                              jmp 00007F5A38C2BB1Ah
                                              mov eax, 00000001h
                                              add dl, dl
                                              jne 00007F5A38C2BB99h
                                              mov dl, byte ptr [esi]
                                              dec eax
                                              inc esi
                                              adc dl, dl
                                              adc eax, eax
                                              add dl, dl
                                              jne 00007F5A38C2BB99h
                                              mov dl, byte ptr [esi]
                                              dec eax
                                              inc esi
                                              adc dl, dl
                                              jc 00007F5A38C2BB78h
                                              sub eax, ebx
                                              mov ebx, 00000001h
                                              jne 00007F5A38C2BBC0h
                                              mov ecx, 00000001h
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x70b1690x1f0.idata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x70d0000x1d8.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0xcea0240x1a070.themida
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x107f0000x10.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x70c2c00x28.tls
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              0x10000x2c27380x12d800ca417bccc1d5dd91d3937174cd7ac621unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              0x2c40000x7f7d80x37a00369e192652fe0603688ce100d28a292bFalse0.9958128511235955data7.974059154733227IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              0x3440000x3a32100x1a0a00b514e5f74447c06613ea1c7685377adbunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              0x6e80000x1a0580xf00005318e5f2fbb1e136e721b0592366e5aFalse0.9489420572916667data7.677591746789919IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              0x7030000x24080xe00a6660cef6d73b063a0ac4c7a62a1b75cFalse0.845703125data7.510252954486649IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              0x7060000x1e00x20080f858cf3db62e6cb43b45c240fc9f46False0.724609375data5.568782170470238IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              0x7070000x33f40xc0018abc787bf0075d44724b6a95df0840bFalse0.7799479166666666data7.460653272571481IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              .idata0x70b0000x10000x40062cbc799e33125d23dcd548ae7281690False0.369140625data3.269373167485061IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .tls0x70c0000x10000x40014fc24e5f766d495173fe18d67463c94False0.0390625data0.20080006224549074IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0x70d0000x10000x2002d3428819562473b96a8482788e7ea79False0.52734375data4.724728911998389IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .themida0x70e0000x60e0000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .boot0xd1c0000x362c000x362c00266436514efba945c5110dd3d78bce54unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .reloc0x107f0000x10000x102f94d631ec0ff5b0ba8396b32a2ef265False1.5625GLS_BINARY_LSB_FIRST2.6493974703476995IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_MANIFEST0x70d0580x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                              DLLImport
                                              kernel32.dllGetModuleHandleA
                                              d3d11.dllD3D11On12CreateDevice
                                              d2d1.dll
                                              WS2_32.dllconnect
                                              ADVAPI32.dllCryptReleaseContext
                                              CRYPT32.dllCryptQueryObject
                                              bcrypt.dllBCryptOpenAlgorithmProvider
                                              USER32.dllGetClientRect
                                              ole32.dllCoCreateFreeThreadedMarshaler
                                              WININET.dllInternetOpenA
                                              IMM32.dllImmGetContext
                                              D3DCOMPILER_47.dllD3DCompile
                                              OLEAUT32.dllSetErrorInfo
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishUnited States
                                              No network behavior found

                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:15:26:00
                                              Start date:29/03/2024
                                              Path:C:\Windows\System32\loaddll64.exe
                                              Wow64 process (32bit):false
                                              Commandline:loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll"
                                              Imagebase:0x7ff77d150000
                                              File size:165'888 bytes
                                              MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate
                                              Has exited:false

                                              Target ID:2
                                              Start time:15:26:00
                                              Start date:29/03/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff6ee680000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:false

                                              Target ID:3
                                              Start time:15:26:00
                                              Start date:29/03/2024
                                              Path:C:\Windows\System32\cmd.exe
                                              Wow64 process (32bit):false
                                              Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll",#1
                                              Imagebase:0x7ff60c210000
                                              File size:289'792 bytes
                                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:false

                                              Target ID:4
                                              Start time:15:26:00
                                              Start date:29/03/2024
                                              Path:C:\Windows\System32\rundll32.exe
                                              Wow64 process (32bit):false
                                              Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll",#1
                                              Imagebase:0x7ff675100000
                                              File size:71'680 bytes
                                              MD5 hash:EF3179D498793BF4234F708D3BE28633
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:false

                                              No disassembly