Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll

Overview

General Information

Sample name:SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll
Analysis ID:1431438
MD5:db4b8570e24a6820f9fc30bc34b75de4
SHA1:8eec515e7c75b3879ada16cd5f397e7c588dc193
SHA256:652e2c35d36d4b96fdda843b6339c185eab3263b0b8acdb6349df240d1b9f8e4
Tags:dll
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected VMProtect packer
Machine Learning detection for sample
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Entry point lies outside standard sections
PE file contains an invalid checksum
PE file contains sections with non-standard names
Program does not show much activity (idle)
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • loaddll32.exe (PID: 3732 cmdline: loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 4176 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2668 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7100 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • regsvr32.exe (PID: 7060 cmdline: regsvr32.exe /s C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
    • rundll32.exe (PID: 4772 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll,DllCanUnloadNow MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4144 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll,DllGetClassObject MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5316 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll,DllRegisterServer MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllAvira: detected
Source: SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllJoe Sandbox ML: detected
Source: SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllString found in binary or memory: http://www.2345.com/?15493
Source: SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllString found in binary or memory: http://www.2345.com/?15493Software
Source: SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllString found in binary or memory: http://www.hao123.com/?tn=50097079_1_hao_pg
Source: SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllString found in binary or memory: http://www.hao123.com/?tn=50097079_1_hao_pgaHR0cDovL3d3dy5oYW8xMjMuY29tLz90bj01MDA5NzA3OV8xX2hhb19wZ
Source: SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllString found in binary or memory: http://www.itmxc.com
Source: SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllString found in binary or memory: http://www.itmxc.com/member.php?mod=register

System Summary

barindex
Source: SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllStatic PE information: .vmp0 and .vmp1 section names
Source: SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllBinary or memory string: OriginalFilenameNCList.DLL< vs SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll
Source: SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllStatic PE information: Section: .vmp2 ZLIB complexity 0.9891912286931818
Source: classification engineClassification label: mal56.winDLL@14/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4176:120:WilError_03
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll",#1
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll,DllCanUnloadNow
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll,DllGetClassObject
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll,DllRegisterServer
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll,DllCanUnloadNowJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll,DllGetClassObjectJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll,DllRegisterServerJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: atl100.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: msvcp100.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: omng.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: msvcr100.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: uilib.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: msvcr100.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: atl100.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: msvcp100.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: omng.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: msvcr100.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uilib.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: msvcr100.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllStatic file information: File size 2216547 > 1048576
Source: SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllStatic PE information: Raw size of .vmp2 is bigger than: 0x100000 < 0x113000
Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp2
Source: SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllStatic PE information: real checksum: 0x12bb1c should be: 0x2286d4
Source: SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllStatic PE information: section name: .vmp0
Source: SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllStatic PE information: section name: .vmp1
Source: SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllStatic PE information: section name: .vmp2
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll
Source: SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllStatic PE information: section name: .vmp2 entropy: 7.954667501881547
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll",#1Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Regsvr32
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Rundll32
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Software Packing
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
Process Injection
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Obfuscated Files or Information
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1431438 Sample: SecuriteInfo.com.Variant.Te... Startdate: 25/04/2024 Architecture: WINDOWS Score: 56 19 Antivirus / Scanner detection for submitted sample 2->19 21 Detected VMProtect packer 2->21 23 Machine Learning detection for sample 2->23 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        13 rundll32.exe 7->13         started        15 3 other processes 7->15 process5 17 rundll32.exe 9->17         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll100%AviraTR/Black.Gen2
SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.hao123.com/?tn=50097079_1_hao_pgSecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllfalse
    high
    http://www.2345.com/?15493SoftwareSecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllfalse
      high
      http://www.itmxc.com/member.php?mod=registerSecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllfalse
        high
        http://www.2345.com/?15493SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllfalse
          high
          http://www.hao123.com/?tn=50097079_1_hao_pgaHR0cDovL3d3dy5oYW8xMjMuY29tLz90bj01MDA5NzA3OV8xX2hhb19wZSecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllfalse
            high
            http://www.itmxc.comSecuriteInfo.com.Variant.Tedy.515774.17185.28729.dllfalse
              high
              No contacted IP infos
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1431438
              Start date and time:2024-04-25 05:24:28 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 2m 36s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:9
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll
              Detection:MAL
              Classification:mal56.winDLL@14/0@0/0
              EGA Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .dll
              • Stop behavior analysis, all processes terminated
              • Exclude process from analysis (whitelisted): dllhost.exe
              • Not all processes where analyzed, report is missing behavior information
              No simulations
              No context
              No context
              No context
              No context
              No context
              No created / dropped files found
              File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Entropy (8bit):6.28865805527719
              TrID:
              • Win32 Dynamic Link Library (generic) (1002004/3) 89.26%
              • Windows ActiveX control (116523/4) 10.38%
              • Generic Win/DOS Executable (2004/3) 0.18%
              • DOS Executable Generic (2002/1) 0.18%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll
              File size:2'216'547 bytes
              MD5:db4b8570e24a6820f9fc30bc34b75de4
              SHA1:8eec515e7c75b3879ada16cd5f397e7c588dc193
              SHA256:652e2c35d36d4b96fdda843b6339c185eab3263b0b8acdb6349df240d1b9f8e4
              SHA512:0c24ee51414acc43a801263162077b18ba2bb14b579e8cf07d74521f53721f1dcafe0c51783ea5872d441cbd1f9996efc8c9ea1e06bcf811e8dce40538e93a34
              SSDEEP:24576:hZKLBBcfI5epEbN1uSqwyMvSosVEcF2G6cTFOp/rzYIBCDT1Lvna:hZKLBBaI5eu1uStyUSosVtUFAoC
              TLSH:8EA5CFC577C8D852C2F9223019862EE25E6E9D64BD9B52263F0D721F9F739D01B32E60
              File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........q..J...J...J...%fs.O....^@.O...Q.F.@...Q.r.G....0..H...Q.D.B...Ch\.K...Ch[.O...ChK.]...J.......Q.s.t...Q.C.K...Q.B.K...Q.E.K..
              Icon Hash:7ae282899bbab082
              Entrypoint:0x5fc6dea2
              Entrypoint Section:.vmp2
              Digitally signed:false
              Imagebase:0x5f9c0000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
              DLL Characteristics:NX_COMPAT
              Time Stamp:0x51DCC8F3 [Wed Jul 10 02:37:39 2013 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:1
              File Version Major:5
              File Version Minor:1
              Subsystem Version Major:5
              Subsystem Version Minor:1
              Import Hash:faa66df48a491ed57103190e1f0392c6
              Instruction
              call 00007F677C6C20DDh
              push DBE5E3BEh
              lea esp, dword ptr [esp+28h]
              je 00007F677C719099h
              jmp 00007F677C71A02Ah
              or byte ptr [D85A817Dh], bh
              outsd
              sub edi, edx
              test byte ptr [3F00C99Ah+esi*2], al
              movsd
              pop esp
              jo 00007F677C7B341Ch
              push ebx
              push eax
              pop ds
              cld
              test eax, 8DEFC965h
              and edx, dword ptr [edi+ebp*8-0Eh]
              or eax, DA560312h
              Programming Language:
              • [C++] VS2010 build 30319
              • [ASM] VS2010 SP1 build 40219
              • [ C ] VS2010 SP1 build 40219
              • [LNK] VC++ 6.0 SP5 build 8804
              • [IMP] VS2010 SP1 build 40219
              • [C++] VS2008 SP1 build 30729
              • [ C ] VS2008 SP1 build 30729
              • [IMP] VS2008 SP1 build 30729
              • [C++] VS2010 SP1 build 40219
              • [EXP] VS2010 SP1 build 40219
              • [RES] VS2010 SP1 build 40219
              • [LNK] VS2010 SP1 build 40219
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x1bd8c40xcb.vmp2
              IMAGE_DIRECTORY_ENTRY_IMPORT0x1bce300x17c.vmp2
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xe90000x14ba0.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x2c70000x94.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2c64840x40.vmp2
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x2ad7440xa4.vmp2
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000xa1a8c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0xa30000x3390b0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0xd70000x11c1c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0xe90000x14ba00x14c00be89738940fa6416643f16b1ff094accFalse0.3430675828313253data5.086973990628991IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .vmp00xfe0000xe6160x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .vmp10x10d0000xa68300x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE
              .vmp20x1b40000x112ec00x1130007b7b1d761729b00daeb35c475bce946dFalse0.9891912286931818data7.954667501881547IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .reloc0x2c70000x940x200e540ab6d74a46225da8338e952e2eb37False0.25390625GLS_BINARY_LSB_FIRST1.5835659840242964IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              REGISTRY0xe93dc0x24eASCII text, with CRLF line terminatorsChineseChina0.4915254237288136
              REGISTRY0xe962c0x286ASCII text, with CRLF line terminatorsChineseChina0.4551083591331269
              REGISTRY0xe98b40x29eASCII text, with CRLF line terminatorsChineseChina0.44328358208955226
              REGISTRY0xe9b540x256ASCII text, with CRLF line terminatorsChineseChina0.48494983277591974
              REGISTRY0xe9dac0x266ASCII text, with CRLF line terminatorsChineseChina0.4755700325732899
              REGISTRY0xea0140x2d6ASCII text, with CRLF line terminatorsChineseChina0.4132231404958678
              REGISTRY0xea2ec0x266ASCII text, with CRLF line terminatorsChineseChina0.4723127035830619
              REGISTRY0xea5540x291ASCII text, with CRLF line terminatorsChineseChina0.4459665144596651
              REGISTRY0xea7e80x29eASCII text, with CRLF line terminatorsChineseChina0.44029850746268656
              REGISTRY0xeaa880x27eASCII text, with CRLF line terminatorsChineseChina0.46394984326018807
              REGISTRY0xead080x286ASCII text, with CRLF line terminatorsChineseChina0.456656346749226
              REGISTRY0xeaf900x2c8ASCII text, with CRLF line terminatorsChineseChina0.4353932584269663
              REGISTRY0xeb2580x29dASCII text, with CRLF line terminatorsChineseChina0.4439461883408072
              TYPELIB0xeb4f80x1229cdataChineseChina0.36317812785633635
              RT_STRING0xfdb740x2cdataChineseChina0.2727272727272727
              RT_VERSION0xfd7940x284dataChineseChina0.4767080745341615
              RT_MANIFEST0xfda180x15aASCII text, with CRLF line terminatorsEnglishUnited States0.5491329479768786
              DLLImport
              KERNEL32.dllGetProcessHeap
              USER32.dllPostQuitMessage
              GDI32.dllSetDIBits
              ADVAPI32.dllCryptExportKey
              SHELL32.dll
              ole32.dllCoInitialize
              OLEAUT32.dllRegisterTypeLib
              ATL100.DLL
              SHLWAPI.dllPathFindFileNameW
              MSVCP100.dll?width@ios_base@std@@QBE_JXZ
              omng.DLL
              MSVCR100.dll_mkgmtime64
              uilib.dllsqlite3_next_stmt
              RPCRT4.dllUuidFromStringA
              VERSION.dllGetFileVersionInfoSizeW
              WININET.dllInternetTimeToSystemTimeW
              USER32.dllMessageBoxA
              KERNEL32.dllGetModuleHandleA, LoadLibraryA, LocalAlloc, LocalFree, GetModuleFileNameA, ExitProcess
              NameOrdinalAddress
              DllCanUnloadNow10x5fa08c85
              DllGetClassObject20x5fa09e8e
              DllRegisterServer30x5fa0acb6
              DllUnregisterServer40x5fa0acc5
              NSGetModule60x5fa08c91
              RD_XXXX50x5fa313f8
              Language of compilation systemCountry where language is spokenMap
              ChineseChina
              EnglishUnited States
              No network behavior found

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:05:25:44
              Start date:25/04/2024
              Path:C:\Windows\System32\loaddll32.exe
              Wow64 process (32bit):true
              Commandline:loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll"
              Imagebase:0x270000
              File size:126'464 bytes
              MD5 hash:51E6071F9CBA48E79F10C84515AAE618
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:1
              Start time:05:25:44
              Start date:25/04/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff68cce0000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:2
              Start time:05:25:44
              Start date:25/04/2024
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll",#1
              Imagebase:0xc30000
              File size:236'544 bytes
              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:3
              Start time:05:25:44
              Start date:25/04/2024
              Path:C:\Windows\SysWOW64\regsvr32.exe
              Wow64 process (32bit):true
              Commandline:regsvr32.exe /s C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll
              Imagebase:0x890000
              File size:20'992 bytes
              MD5 hash:878E47C8656E53AE8A8A21E927C6F7E0
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:4
              Start time:05:25:44
              Start date:25/04/2024
              Path:C:\Windows\SysWOW64\rundll32.exe
              Wow64 process (32bit):true
              Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll",#1
              Imagebase:0xbc0000
              File size:61'440 bytes
              MD5 hash:889B99C52A60DD49227C5E485A016679
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:5
              Start time:05:25:44
              Start date:25/04/2024
              Path:C:\Windows\SysWOW64\rundll32.exe
              Wow64 process (32bit):true
              Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll,DllCanUnloadNow
              Imagebase:0xbc0000
              File size:61'440 bytes
              MD5 hash:889B99C52A60DD49227C5E485A016679
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:7
              Start time:05:25:47
              Start date:25/04/2024
              Path:C:\Windows\SysWOW64\rundll32.exe
              Wow64 process (32bit):true
              Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll,DllGetClassObject
              Imagebase:0xbc0000
              File size:61'440 bytes
              MD5 hash:889B99C52A60DD49227C5E485A016679
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:8
              Start time:05:25:50
              Start date:25/04/2024
              Path:C:\Windows\SysWOW64\rundll32.exe
              Wow64 process (32bit):true
              Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.515774.17185.28729.dll,DllRegisterServer
              Imagebase:0xbc0000
              File size:61'440 bytes
              MD5 hash:889B99C52A60DD49227C5E485A016679
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              No disassembly