Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dll

Overview

General Information

Sample name:SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dll
Analysis ID:1431440
MD5:ffb1e1ac949f4802c07223b054b3554f
SHA1:c689e72eb1cf2b4c71dffcdfe44638ca66013af5
SHA256:9c2297bef69362c32d50b6ab18a0f5274099e4fd8ac6c68119ff918975d8e71d
Tags:dll
Infos:

Detection

Score:5
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
One or more processes crash
PE file does not import any functions
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Analysis Advice

Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample is a resource Dll without any import or exported function, cannot be analyzed
Sample crashes during execution, try analyze it on another analysis machine
  • System is w10x64
  • loaddll32.exe (PID: 5348 cmdline: loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 4104 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6712 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 6416 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • WerFault.exe (PID: 6804 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6416 -s 568 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
Source: SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dllString found in binary or memory: http://www.flyingpig.com
Source: SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dllString found in binary or memory: http://www.flyingpig.com/support/
Source: SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dllString found in binary or memory: http://www.flyingpig.com/support/hog2/downloads/
Source: SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dllString found in binary or memory: http://www.installshield.com0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_032934334_2_03293433
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6416 -s 568
Source: SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dllStatic PE information: No import functions for PE file found
Source: SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dllBinary or memory string: OriginalFilenameISScriptBridge.DLLL vs SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dll
Source: SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dllBinary or memory string: OriginalFilenameSetAllUsers.dllr) vs SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dll
Source: SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
Source: classification engineClassification label: clean5.winDLL@7/5@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4104:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6416
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\219e20ac-3de8-4dfd-82dd-06e475132e3cJump to behavior
Source: SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dll",#1
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dll",#1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dll",#1
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6416 -s 568
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dllStatic file information: File size 6634783 > 1048576
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10002770 push eax; ret 0_2_1000279E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0328C780 pushad ; retf 4_2_0328C781
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_03297185 push cs; ret 4_2_0329725B
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: Amcache.hve.7.drBinary or memory string: VMware
Source: Amcache.hve.7.drBinary or memory string: VMware-42 27 b7 a3 1e b0 86 f3-0a fe 06 07 d0 80 07 92
Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.7.drBinary or memory string: vmci.sys
Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.7.drBinary or memory string: VMware20,1
Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dll",#1Jump to behavior
Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Rundll32
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1431440 Sample: SecuriteInfo.com.W32.FraudL... Startdate: 25/04/2024 Architecture: WINDOWS Score: 5 7 loaddll32.exe 1 2->7         started        process3 9 cmd.exe 1 7->9         started        11 conhost.exe 7->11         started        process4 13 rundll32.exe 9->13         started        process5 15 WerFault.exe 20 16 13->15         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.installshield.com00%Avira URL Cloudsafe
http://www.flyingpig.com/support/hog2/downloads/0%Avira URL Cloudsafe
http://www.flyingpig.com0%Avira URL Cloudsafe
http://www.flyingpig.com/support/0%Avira URL Cloudsafe
http://www.flyingpig.com/support/hog2/downloads/0%VirustotalBrowse
http://www.flyingpig.com/support/0%VirustotalBrowse
http://www.flyingpig.com0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.7.drfalse
    high
    http://www.flyingpig.comSecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dllfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://www.flyingpig.com/support/hog2/downloads/SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dllfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://www.flyingpig.com/support/SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dllfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://www.installshield.com0SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dllfalse
    • Avira URL Cloud: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1431440
    Start date and time:2024-04-25 05:27:10 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 23s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:22
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dll
    Detection:CLEAN
    Classification:clean5.winDLL@7/5@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 1
    Cookbook Comments:
    • Found application associated with file extension: .dll
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.189.173.20
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target loaddll32.exe, PID 5348 because there are no executed function
    • Execution Graph export aborted for target rundll32.exe, PID 6416 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information
    TimeTypeDescription
    05:28:12API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.8165214839964241
    Encrypted:false
    SSDEEP:192:BfOi6dOQWp0BU/wjeTbzuiF0Z24IO8dci:5OiBQWKBU/wjevzuiF0Y4IO8dci
    MD5:452CF6D93FE33059EFAEEE1987B9604B
    SHA1:40841106E89825184BA2C0A215F0B86303475118
    SHA-256:CA44461DDA77B82E45761637F1EBD0138E60654D2B39CCDB1398B4595929568E
    SHA-512:4813519F3E8CB0298C972261186D75FABA40E6440CE1AF0B62E62064E1ADFAF49019E0C8BC435257212D27D28F02573B87226120A4D69497845A7A3F4FC3029B
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.4.8.9.2.8.2.3.1.9.9.8.0.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.4.8.9.2.8.3.1.6.3.7.4.0.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.8.a.7.8.a.0.2.-.e.3.7.a.-.4.0.8.6.-.8.c.0.1.-.d.6.3.a.f.e.4.7.c.e.c.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.3.f.1.d.c.5.b.-.8.f.b.0.-.4.b.6.c.-.9.7.5.5.-.b.7.4.0.c.3.f.9.d.d.d.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.1.0.-.0.0.0.1.-.0.0.1.3.-.e.9.c.f.-.c.5.9.3.c.0.9.6.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Thu Apr 25 03:28:02 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):43684
    Entropy (8bit):2.003143388398665
    Encrypted:false
    SSDEEP:192:wQty0LyIdIO5H4eh0PXPFGBpFckz1d2rb42TemUGS0s46p:CU5Hlh0P/FopFcUCrb42TemUs6
    MD5:2A1E3376666B04B67BEBA1A7E7E59766
    SHA1:0332F6EF70BD135FD86E445A2A8E1892D8F46E05
    SHA-256:0DCA9FA1CA7DB5A1F871F49360BD39FE0024DA40BC13EE6C7E5171B77551CA53
    SHA-512:BE63D020B805715C831A319077AEE9C7DCBF946D4B95BA93BF3EE9DE9C364BE9F5008C7B480F65434F83BBA89CB524BAEE6745337B9EDBBAE399CC5970D3E64A
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... .........)f.........................................%..........T.......8...........T..........................H...........4...............................................................................eJ..............GenuineIntel............T.............)f.............................0..1...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8258
    Entropy (8bit):3.688803662760526
    Encrypted:false
    SSDEEP:192:R6l7wVeJYK6906YRk6kgmfTRJPKprt89bGTsfcNCm:R6lXJt6O6YC6kgmfTRJPVG4fcZ
    MD5:CB847321E01ECBE414BEC37EAF23AED4
    SHA1:90A5286FE4D29A30506815A22F3FAE311EAC7F08
    SHA-256:292F08997A05EC36398F25CBEF2D590FBF5A2C6E969C71989129CA0A5D97378C
    SHA-512:855B3F5CB1A0BC90347BBED60AFD88633F4BE56232A4A1D592475697FF86EA61BAE6806079C7A979DC034C61455617753E3F17F483A0627A70719798E51F7350
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.4.1.6.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4656
    Entropy (8bit):4.4568079433994425
    Encrypted:false
    SSDEEP:48:cvIwWl8zsirJg77aI9wMMDWpW8VY7QYm8M4JCdPKFzoh+q8/arlMGScSvd:uIjfCI7CMMy7Ve9JJohDlMJ3vd
    MD5:44AEBAF86A20C7BF3F48DF28CB018E67
    SHA1:32E86747DBBCAE2E3ADE32BA33229F83DD74F7E9
    SHA-256:C82BC787B8255CA86FB2F1ED6F31C2055AEA3A929955882DE5F16E89F7123D38
    SHA-512:EFF40FE6B615090BF3F4E58CC29DF10279BEB7AF0E7C18BCC1159C7BABBF896AD4BC33633E8ED99001F5A90A049D4016DB1D1B9C07AD0784F1F0427F5B9B0A67
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="294870" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.298847336397499
    Encrypted:false
    SSDEEP:6144:zECqOEmWfd+WQFHy/9026ZTyaRsCDusBqD5dooi8lySD6VJSRrf:4CsL6seqD5SzSWVARD
    MD5:38CA9FCB8D917B0E2C8B49B167356005
    SHA1:EC034F7D19292C18C7E8ABAB251EC0EAD43A199B
    SHA-256:10EBDEBCC34DE16115221F3F083F4982ED1EF9410A56A1AC1921F25B89E42926
    SHA-512:846787C7655F8739D5B9733AC2ADB57EE82B78ECB8B86A6498A07510F2E9A71C3592578A6CDD4CC38C3A57299BE1DCB03B45211332D79E47A11565FC5BF9834A
    Malicious:false
    Reputation:low
    Preview:regfD...D....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
    Entropy (8bit):7.7921381550077236
    TrID:
    • Win32 Dynamic Link Library (generic) (1002004/3) 94.47%
    • Win32 EXE PECompact compressed (generic) (41571/9) 3.92%
    • Windows Screen Saver (13104/52) 1.24%
    • Generic Win/DOS Executable (2004/3) 0.19%
    • DOS Executable Generic (2002/1) 0.19%
    File name:SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dll
    File size:6'634'783 bytes
    MD5:ffb1e1ac949f4802c07223b054b3554f
    SHA1:c689e72eb1cf2b4c71dffcdfe44638ca66013af5
    SHA256:9c2297bef69362c32d50b6ab18a0f5274099e4fd8ac6c68119ff918975d8e71d
    SHA512:028e16c0df2a00f3a72d59ea612fddaa48b62dcbb73db17b0aee7ea791cb9d274b0e32118415cc19011f6948b3c17dff62dce80f4c37daa9b29468482d42d0aa
    SSDEEP:98304:uF/wLVIzIFPcYPAp7x4eXWkfPRHO6El2gEQu4lrRwuYU:uFILJ0YOeofpHO6EAmuh6
    TLSH:BE66021175C54A53F2B9DB36CAB20B719FB1BCB14B33C132F5A2721E58BDA21DA02365
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Q.7...Y...Y...Y.z.R...Y...W...Y.z.S.-.Y.w.J...Y...X._.Y...R...Y...]...Y.Rich..Y.........................PE..L...t7);...........
    Icon Hash:7ae282899bbab082
    Entrypoint:0x100012e9
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x10000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
    DLL Characteristics:
    Time Stamp:0x3B293774 [Thu Jun 14 22:15:16 2001 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:
    Instruction
    call ebp
    pop ebp
    pop ebx
    jmp 00007F26E0BDF929h
    cmp eax, 02h
    jne 00007F26E0BDF924h
    mov edi, 10007420h
    mov esi, edi
    mov eax, dword ptr [esi+10h]
    test eax, eax
    je 00007F26E0BDF910h
    push 00008000h
    push 00000000h
    push eax
    call dword ptr [1000602Ch]
    mov esi, dword ptr [esi]
    cmp esi, edi
    jne 00007F26E0BDF8E7h
    push dword ptr [1000A0C8h]
    call dword ptr [10006098h]
    pop edi
    pop esi
    ret
    mov eax, dword ptr [10009B24h]
    cmp eax, 01h
    je 00007F26E0BDF90Fh
    test eax, eax
    jne 00007F26E0BDF92Ch
    cmp dword ptr [10009B28h], 01h
    jne 00007F26E0BDF923h
    push 000000FCh
    call 00007F26E0BDF91Dh
    mov eax, dword ptr [10009C78h]
    pop ecx
    test eax, eax
    je 00007F26E0BDF904h
    call eax
    push 000000FFh
    call 00007F26E0BDF907h
    pop ecx
    ret
    push ebp
    mov ebp, esp
    sub esp, 000001A4h
    mov edx, dword ptr [ebp+08h]
    xor ecx, ecx
    mov eax, 10007148h
    cmp edx, dword ptr [eax]
    je 00007F26E0BDF90Dh
    add eax, 08h
    inc ecx
    cmp eax, 100071D8h
    jl 00007F26E0BDF8F3h
    push esi
    mov esi, ecx
    shl esi, 03h
    cmp edx, dword ptr [esi+10007148h]
    jne 00007F26E0BDFA22h
    mov eax, dword ptr [10009B24h]
    cmp eax, 01h
    je 00007F26E0BDF9EEh
    test eax, eax
    jne 00007F26E0BDF90Fh
    cmp dword ptr [10009B28h], 01h
    je 00007F26E0BDF9DDh
    Programming Language:
    • [LNK] VC++ 6.0 SP5 build 8804
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x6bb00x53.rdata
    IMAGE_DIRECTORY_ENTRY_IMPORT0x66300x50.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0xb0000x540.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x60000xf8.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x415a0x50001c99f54a74debb8012defebf006cfb9eFalse0.504931640625data5.812066528192282IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x60000xc030x10009bf03d6a87713a69980858decbe088e4False0.19873046875data2.0392894927927383IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x70000x32000x30006eee563e585fb3f55698ff833398681cFalse0.13875325520833334data1.571500827115574IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .reloc0xb0000xc320x1000974da59dc8b6725f1dc9f6a51463ce4bFalse0.26416015625data3.374710138914567IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:05:28:01
    Start date:25/04/2024
    Path:C:\Windows\System32\loaddll32.exe
    Wow64 process (32bit):true
    Commandline:loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dll"
    Imagebase:0xff0000
    File size:126'464 bytes
    MD5 hash:51E6071F9CBA48E79F10C84515AAE618
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:1
    Start time:05:28:01
    Start date:25/04/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff68cce0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:2
    Start time:05:28:01
    Start date:25/04/2024
    Path:C:\Windows\SysWOW64\cmd.exe
    Wow64 process (32bit):true
    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dll",#1
    Imagebase:0xc30000
    File size:236'544 bytes
    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:4
    Start time:05:28:01
    Start date:25/04/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.FraudLoad.F32_DET.Eldorado.15068.22232.dll",#1
    Imagebase:0xf20000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:7
    Start time:05:28:02
    Start date:25/04/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6416 -s 568
    Imagebase:0xa0000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >
      Strings
      Memory Dump Source
      • Source File: 00000004.00000002.1364806312.000000000328A000.00000004.00000020.00020000.00000000.sdmp, Offset: 0328A000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_4_2_328a000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: ^b/2$^b2
      • API String ID: 0-970699746
      • Opcode ID: 88071d7e687478986c4dfb4a9f3e57e8d0a353d6a5b5535aef3dcbe00d334acf
      • Instruction ID: 3ca425e4f0c80e2345842f09b257ce79bfb56e2ce80d6307ac377e4100b58615
      • Opcode Fuzzy Hash: 88071d7e687478986c4dfb4a9f3e57e8d0a353d6a5b5535aef3dcbe00d334acf
      • Instruction Fuzzy Hash: 338103361D8B969EC325FA38A1916C6F7B1FF06250B1C185DC0E146616FB21B669CF90
      Uniqueness

      Uniqueness Score: -1.00%