Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll

Overview

General Information

Sample name:SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll
Analysis ID:1458489
MD5:156301b141411e5cfc6c06d34b6dca9d
SHA1:3802929d012253b84f6825e4a4bdc3729366df5b
SHA256:7e96bbce4a287218078120ec71b4964b6ed6b2727a052bbe2dc038c8be2baffd
Tags:dll
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files

Classification

  • System is w10x64
  • loaddll32.exe (PID: 3180 cmdline: loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 3220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2656 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 3748 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 3712 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll,__swprintf_l MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 3568 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll,__vswprintf_l MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 2616 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll,_fprintf_l MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllReversingLabs: Detection: 37%
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: Binary string: D:\perfecthook\ArcticTech\Release\ArcticTech.pdb source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllString found in binary or memory: http://scripts.sil.org/OFLMulishMediumWeightItalicRoman
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllString found in binary or memory: https://github.com/googlefonts/mulish)Mulish
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllBinary or memory string: ...Slnt
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllBinary or memory string: ...Slntcaught (...) exception
Source: classification engineClassification label: mal48.winDLL@12/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3220:120:WilError_03
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll,__swprintf_l
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllReversingLabs: Detection: 37%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll,__swprintf_l
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll,__vswprintf_l
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll,_fprintf_l
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll,__swprintf_lJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll,__vswprintf_lJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll,_fprintf_lJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: d3dx9_43.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllStatic PE information: More than 176 > 100 exports found
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllStatic file information: File size 6404096 > 1048576
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x4e3c00
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\perfecthook\ArcticTech\Release\ArcticTech.pdb source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll",#1Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Rundll32
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1458489 Sample: SecuriteInfo.com.Variant.Te... Startdate: 17/06/2024 Architecture: WINDOWS Score: 48 19 Multi AV Scanner detection for submitted file 2->19 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        13 rundll32.exe 7->13         started        15 2 other processes 7->15 process5 17 rundll32.exe 9->17         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll38%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://github.com/googlefonts/mulish)Mulish0%Avira URL Cloudsafe
http://scripts.sil.org/OFLMulishMediumWeightItalicRoman0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.210.172
truefalse
    unknown
    fp2e7a.wpc.phicdn.net
    192.229.221.95
    truefalse
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://github.com/googlefonts/mulish)MulishSecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllfalse
      • Avira URL Cloud: safe
      unknown
      http://scripts.sil.org/OFLMulishMediumWeightItalicRomanSecuriteInfo.com.Variant.Tedy.476018.8153.3189.dllfalse
      • Avira URL Cloud: safe
      unknown
      No contacted IP infos
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1458489
      Start date and time:2024-06-17 18:22:09 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 2m 31s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:9
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll
      Detection:MAL
      Classification:mal48.winDLL@12/0@0/0
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .dll
      • Stop behavior analysis, all processes terminated
      • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
      • Excluded IPs from analysis (whitelisted): 40.68.123.157
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ocsp.edge.digicert.com, sls.update.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
      • Execution Graph export aborted for target loaddll32.exe, PID 3180 because there are no executed function
      • Not all processes where analyzed, report is missing behavior information
      • VT rate limit hit for: SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll
      No simulations
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      bg.microsoft.map.fastly.netfile.exeGet hashmaliciousXmrigBrowse
      • 199.232.210.172
      https://www.sitesofconscience.org/Get hashmaliciousUnknownBrowse
      • 199.232.214.172
      DHL Package Documents clearance.exeGet hashmaliciousAgentTeslaBrowse
      • 199.232.214.172
      https://agrtq.qc.ca/Get hashmaliciousUnknownBrowse
      • 199.232.210.172
      http://careertech.orgGet hashmaliciousUnknownBrowse
      • 199.232.214.172
      https://www.wiley-epic.com/Get hashmaliciousUnknownBrowse
      • 199.232.210.172
      LIHTCPUB_BIN.ACCDBGet hashmaliciousUnknownBrowse
      • 199.232.214.172
      https://mattressashamed.comGet hashmaliciousUnknownBrowse
      • 199.232.210.172
      https://olivine-geode-arrow.glitch.meGet hashmaliciousUnknownBrowse
      • 199.232.210.172
      file.exeGet hashmaliciousVidarBrowse
      • 199.232.210.172
      fp2e7a.wpc.phicdn.nethttp://js.opttracker.onlineGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      http://js.opttracker.onlineGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      https://shayleenterprise.uk/gc.PDFGet hashmaliciousPhisherBrowse
      • 192.229.221.95
      https://agrtq.qc.ca/Get hashmaliciousUnknownBrowse
      • 192.229.221.95
      https://netflix-ayudas.comGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      http://careertech.orgGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      https://www.wiley-epic.com/Get hashmaliciousUnknownBrowse
      • 192.229.221.95
      https://www.wiley-epic.com/default.aspx?ac=2T5R8M7L3DGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      http://visit.keznews.comGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      https://rchstudios-my.sharepoint.com/:o:/g/personal/christine_rios_com/Esq925g1UP9CnNs3s12TUdYB6NSSHs2PEUmu5JrUgjQM3A?e=5%3a7dlpi5&at=9&xsdata=MDV8MDJ8amF5LnJvYmVzb25AemJldGEuY29tfGY4ODM4M2MxODZjMTQ0ZGVkNjk2MDhkYzhlZDRhODhifGVlYjJiZmMzYWJjMzRiZjc4MTE2YmY3ZWJjMTk5Nzc2fDB8MHw2Mzg1NDIyOTEyNzk2NTU2NjN8VW5rbm93bnxUV0ZwYkdac2IzZDhleUpXSWpvaU1DNHdMakF3TURBaUxDSlFJam9pVjJsdU16SWlMQ0pCVGlJNklrMWhhV3dpTENKWFZDSTZNbjA9fDYwMDAwfHx8&sdata=WGVqdFJkRS9ycTJVWGVnVmprM0pOT1FmYUM3alpFcFJPNHl6c1ptT01oWT0%3dGet hashmaliciousHTMLPhisherBrowse
      • 192.229.221.95
      No context
      No context
      No context
      No created / dropped files found
      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Entropy (8bit):6.517447576125027
      TrID:
      • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
      • Generic Win/DOS Executable (2004/3) 0.20%
      • DOS Executable Generic (2002/1) 0.20%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll
      File size:6'404'096 bytes
      MD5:156301b141411e5cfc6c06d34b6dca9d
      SHA1:3802929d012253b84f6825e4a4bdc3729366df5b
      SHA256:7e96bbce4a287218078120ec71b4964b6ed6b2727a052bbe2dc038c8be2baffd
      SHA512:117182f320ef5aea0b9aa194ad52f66c025620a05677d69671ace6e844d1fd21bccaded0113fe2de962f20286fe0ed8ead99bbf9cd8f182143f952a249b13554
      SSDEEP:49152:YtFyIy6iRUVlfL3iNF/yYfyxwFhxLlgAFEp20W/2AGH8TIKQsA8+uNrteelX7tlT:q9NLVVyeFWn8t3pzo4WrhQQ75z4o
      TLSH:B1564C10E6129529F9EB00FAD7BC896EDCAC9E70134924F392C4B89A52F78D7353171B
      File Content Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$........@.4.!dg.!dg.!dg.Y.g.!dgX.`f.!dgX.gf.!dg.!dg.!dg.O`f.!dgHs.g.!dgX.af.!dgX.ef.!dg..yg.!dg.Yef.!dg.!eg. dgu.af.!dgj.af.!dgj.df.!d
      Icon Hash:7ae282899bbab082
      Entrypoint:0x104b67c2
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x10000000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
      Time Stamp:0x65D8D281 [Fri Feb 23 17:14:41 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:0
      File Version Major:6
      File Version Minor:0
      Subsystem Version Major:6
      Subsystem Version Minor:0
      Import Hash:708e271b473e160a6cc6c5839c0a1455
      Instruction
      push ebp
      mov ebp, esp
      cmp dword ptr [ebp+0Ch], 01h
      jne 00007F4870D77C67h
      call 00007F4870D77F03h
      push dword ptr [ebp+10h]
      push dword ptr [ebp+0Ch]
      push dword ptr [ebp+08h]
      call 00007F4870D77B13h
      add esp, 0Ch
      pop ebp
      retn 000Ch
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      retn 0000h
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      cmp cl, 00000040h
      jnc 00007F4870D77C78h
      cmp cl, 00000020h
      jnc 00007F4870D77C68h
      shrd eax, edx, cl
      sar edx, cl
      ret
      mov eax, edx
      sar edx, 1Fh
      and cl, 0000001Fh
      sar eax, cl
      ret
      sar edx, 1Fh
      mov eax, edx
      ret
      and dword ptr [ecx+04h], 00000000h
      mov eax, ecx
      and dword ptr [ecx+08h], 00000000h
      mov dword ptr [ecx+04h], 1055F4D8h
      mov dword ptr [ecx], 1050F488h
      ret
      push ebp
      mov ebp, esp
      sub esp, 0Ch
      lea ecx, dword ptr [ebp-0Ch]
      call 00007F4870D77C3Fh
      push 105B2DECh
      lea eax, dword ptr [ebp-0Ch]
      push eax
      call 00007F4870D77FAAh
      int3
      push ebp
      mov ebp, esp
      sub esp, 0Ch
      lea ecx, dword ptr [ebp-0Ch]
      call 00007F4870BBEC11h
      push 105AC6A8h
      lea eax, dword ptr [ebp-0Ch]
      push eax
      call 00007F4870D77F8Dh
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      push 104B68C5h
      push dword ptr fs:[00000000h]
      Programming Language:
      • [IMP] VS2008 SP1 build 30729
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x5b2e100xf24.rdata
      IMAGE_DIRECTORY_ENTRY_IMPORT0x5b3d340x190.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x5f40000xf8.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x5f50000x32d4c.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x55f5a80x54.rdata
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x55f6000x18.rdata
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x55f4e80x40.rdata
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x4e50000x5b8.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x4e3a690x4e3c00d8fde47a98eda024226d35856857f520unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x4e50000xd1b000xd1c009f951fc0ec0af97c5ff8559af913029dFalse0.24533252011323003data5.823457107673033IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x5b70000x3ca140x32c00c531929b07d934c4d4632dea36e9361cFalse0.45545335591133007OpenPGP Public Key6.661832207052584IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x5f40000xf80x2002da6e0e638e2c40915b862554e86e405False0.3359375data2.5312981004807127IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x5f50000x32d4c0x32e0034e1ec0c585819ff62ff86e88a1b2df3False0.4272496928746929data6.6947004347421055IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_MANIFEST0x5f40600x91XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.8689655172413793
      DLLImport
      KERNEL32.dllLoadLibraryA, GlobalAlloc, GlobalUnlock, GlobalLock, GlobalFree, MultiByteToWideChar, WideCharToMultiByte, AddVectoredExceptionHandler, GetCurrentProcess, ExitProcess, CreateThread, VirtualQuery, WriteProcessMemory, GetLastError, GetCurrentProcessId, VirtualProtect, Sleep, K32GetModuleInformation, GetSystemTimeAsFileTime, GetCurrentThreadId, IsDebuggerPresent, TerminateProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsProcessorFeaturePresent, SleepConditionVariableSRW, WakeAllConditionVariable, VirtualFree, VirtualAlloc, GetModuleHandleExA, GetModuleFileNameA, GetModuleHandleA, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, GetFileInformationByHandleEx, AreFileApisANSI, FreeLibrary, QueryPerformanceFrequency, QueryPerformanceCounter, CloseHandle, GetFileAttributesExW, FindNextFileW, FindFirstFileExW, FindFirstFileW, FindClose, CreateFileW, CreateDirectoryW, GetCurrentDirectoryW, GetLocaleInfoEx, FormatMessageA, LocalFree, FlushInstructionCache, SetLastError, InitializeSListHead, GetProcAddress, WriteFile, CreateFileA, GetLocalTime
      USER32.dllGetAsyncKeyState, GetForegroundWindow, GetCursorPos, ScreenToClient, GetKeyState, GetCapture, GetClientRect, SetCursorPos, SetCursor, ClientToScreen, LoadCursorA, OpenClipboard, CloseClipboard, SetClipboardData, GetClipboardData, EmptyClipboard, MessageBoxA, CallWindowProcA, SetWindowLongA, FindWindowA, SetCapture, ReleaseCapture
      GDI32.dllAddFontMemResourceEx
      MSVCP140.dll?rdstate@ios_base@std@@QBEHXZ, ?setf@ios_base@std@@QAEHH@Z, ?setf@ios_base@std@@QAEHHH@Z, ?width@ios_base@std@@QBE_JXZ, ?width@ios_base@std@@QAE_J_J@Z, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QBE?AVlocale@2@XZ, ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ, ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBEPADXZ, ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBEPADXZ, ?pbase@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBEPADXZ, ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBEPADXZ, ?egptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBEPADXZ, ?gbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXH@Z, ?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXPAD00@Z, ?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBEPADXZ, ?_Gndec@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEPADXZ, ?_Gninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEPADXZ, ?_Gnavail@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBE_JXZ, ?pbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXH@Z, ?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXPAD0@Z, ?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXPAD00@Z, ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEPADXZ, ?_Pnavail@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBE_JXZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXXZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXPAPAD0PAH001@Z, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ, ?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z, ?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEPAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ, ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDXZ, ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEDD@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAVios_base@1@AAV21@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@_N@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@D@Z, ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@PBD_J@Z, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UAE@XZ, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UAE@XZ, ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z, ?_Xbad_function_call@std@@YAXXZ, ?_Fiopen@std@@YAPAU_iobuf@@PBDHH@Z, ?_Incref@facet@locale@std@@UAEXXZ, ?_Decref@facet@locale@std@@UAEPAV_Facet_base@3@XZ, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEXABVlocale@2@@Z, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEPAV12@PAD_J@Z, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?id@?$numpunct@D@std@@2V0locale@2@A, _Thrd_hardware_concurrency, _Mtx_init_in_situ, _Mtx_destroy_in_situ, _Mtx_lock, _Mtx_unlock, _Cnd_init_in_situ, _Cnd_destroy_in_situ, _Cnd_wait, _Cnd_broadcast, _Cnd_signal, ?_Throw_Cpp_error@std@@YAXH@Z, _Query_perf_counter, _Query_perf_frequency, ??4?$_Yarn@D@std@@QAEAAV01@PBD@Z, ?_New_Locimp@_Locimp@locale@std@@CAPAV123@ABV123@@Z, ?_Addfac@_Locimp@locale@std@@AAEXPAVfacet@23@I@Z, ?out@?$codecvt@_WDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PB_W1AAPB_WPAD3AAPAD@Z, ??0?$codecvt@_WDU_Mbstatet@@@std@@QAE@I@Z, ??1?$codecvt@_WDU_Mbstatet@@@std@@MAE@XZ, ?id@?$codecvt@_WDU_Mbstatet@@@std@@2V0locale@2@A, ??0facet@locale@std@@IAE@I@Z, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SAIPAPBVfacet@locale@2@PBV42@@Z, ??Bid@locale@std@@QAEIXZ, ?c_str@?$_Yarn@D@std@@QBEPBDXZ, ?_Gettrue@_Locinfo@std@@QBEPBDXZ, ?_Getfalse@_Locinfo@std@@QBEPBDXZ, ?_Getlconv@_Locinfo@std@@QBEPBUlconv@@XZ, ??1_Locinfo@std@@QAE@XZ, ??0_Locinfo@std@@QAE@PBD@Z, ?_Winerror_map@std@@YAHH@Z, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PAD1AAPAD@Z, ?out@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPAD3AAPAD@Z, ?in@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPAD3AAPAD@Z, ?always_noconv@codecvt_base@std@@QBE_NXZ, ?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ, ?_Syserror_map@std@@YAPBDH@Z, ?_Xout_of_range@std@@YAXPBD@Z, ?_Xlength_error@std@@YAXPBD@Z, ??1_Lockit@std@@QAE@XZ, ??0_Lockit@std@@QAE@H@Z, ?_Getcvt@_Locinfo@std@@QBE?AU_Cvtvec@@XZ, ?_Xbad_alloc@std@@YAXXZ, ?_Init@locale@std@@CAPAV_Locimp@12@_N@Z, ??1facet@locale@std@@MAE@XZ
      d3dx9_43.dllD3DXCreateFontA, D3DXCreateTextureFromFileInMemoryEx, D3DXCreateSprite
      IMM32.dllImmSetCandidateWindow, ImmSetCompositionWindow, ImmGetContext, ImmReleaseContext
      dbghelp.dllSymFromAddr
      VCRUNTIME140.dllmemmove, memcmp, memset, __CxxFrameHandler3, memcpy, _purecall, __std_exception_copy, __std_exception_destroy, _CxxThrowException, strchr, __std_type_info_destroy_list, _except_handler4_common, __current_exception_context, __current_exception, memchr, __std_type_info_compare, strstr, strrchr
      api-ms-win-crt-string-l1-1-0.dllwcslen, isblank, strpbrk, strncpy, toupper, strcpy, strncmp, strcpy_s, strlen, strcmp
      api-ms-win-crt-heap-l1-1-0.dll_callnewh, calloc, malloc, free
      api-ms-win-crt-math-l1-1-0.dllllround, sin, log, ceil, acos, _fdtest, _ldtest, cos, atan2, _dtest, _fdsign, cosh, asin, _ldsign, _dsign, ldexp, pow, sqrt, fmod, sinh, exp, tanh, _CIcosh, tan, _CItanh, fabs, floor, atan, _CIsinh
      api-ms-win-crt-runtime-l1-1-0.dllstrerror, _register_onexit_function, _initialize_onexit_table, _initialize_narrow_environment, _configure_narrow_argv, _crt_atexit, terminate, _cexit, strerror_s, _initterm, _initterm_e, _seh_filter_dll, exit, abort, _errno, _invalid_parameter_noinfo_noreturn, _execute_onexit_table, system
      api-ms-win-crt-convert-l1-1-0.dllstrtoul, strtod, atof, strtoll, strtoull
      api-ms-win-crt-stdio-l1-1-0.dll_wfopen, fseek, ftell, __p__fmode, __stdio_common_vfprintf, __stdio_common_vsscanf, __stdio_common_vsnprintf_s, tmpfile, _popen, _pclose, _ftelli64, fgets, clearerr, __stdio_common_vfwprintf, putchar, fputs, __stdio_common_vsprintf_p, __stdio_common_vsprintf_s, __stdio_common_vfscanf, __stdio_common_vfprintf_p, __stdio_common_vfprintf_s, fopen, __acrt_iob_func, __stdio_common_vswscanf, __stdio_common_vswprintf_p, tmpnam, __stdio_common_vsnwprintf_s, _get_stream_buffer_pointers, __stdio_common_vswprintf_s, freopen_s, __stdio_common_vswprintf, fclose, __stdio_common_vfwscanf, __stdio_common_vfwprintf_p, __stdio_common_vfwprintf_s, ungetc, setvbuf, getc, fwrite, _fseeki64, fsetpos, _fsopen, fread, fputc, fgetpos, fgetc, fflush, ferror, feof, __stdio_common_vsprintf
      api-ms-win-crt-filesystem-l1-1-0.dll_unlock_file, _lock_file, rename, remove
      api-ms-win-crt-time-l1-1-0.dll_mktime64, strftime, clock, _localtime64, _gmtime64, _difftime64, _time64
      api-ms-win-crt-locale-l1-1-0.dlllocaleconv, setlocale, ___lc_codepage_func
      api-ms-win-crt-utility-l1-1-0.dllqsort, rand, abs
      api-ms-win-crt-environment-l1-1-0.dllgetenv
      NameOrdinalAddress
      __swprintf_l10x1046c040
      __vswprintf_l20x1046c070
      _fprintf_l30x1046c0a0
      _fprintf_p40x1046c0d0
      _fprintf_p_l50x1046c100
      _fprintf_s_l60x1046c130
      _fscanf_l70x1046c160
      _fscanf_s_l80x1046c190
      _fwprintf_l90x1046c1c0
      _fwprintf_p100x1046c1f0
      _fwprintf_p_l110x1046c220
      _fwprintf_s_l120x1046c250
      _fwscanf_l130x1046c280
      _fwscanf_s_l140x1046c2b0
      _printf_l150x1046c2e0
      _printf_p160x1046c310
      _printf_p_l170x1046c340
      _printf_s_l180x1046c370
      _scanf_l190x1046c3a0
      _scanf_s_l200x1046c3d0
      _scprintf210x1046c410
      _scprintf_l220x1046c440
      _scprintf_p230x1046c470
      _scprintf_p_l240x1046c4a0
      _scwprintf250x1046c4d0
      _scwprintf_l260x1046c500
      _scwprintf_p270x1046c530
      _scwprintf_p_l280x1046c560
      _snprintf290x1046c590
      _snprintf_c300x1046c5d0
      _snprintf_c_l310x1046c600
      _snprintf_l320x1046c630
      _snprintf_s330x1046c670
      _snprintf_s_l340x1046c6b0
      _snscanf350x1046c6f0
      _snscanf_l360x1046c720
      _snscanf_s370x1046c750
      _snscanf_s_l380x1046c780
      _snwprintf390x1046c7b0
      _snwprintf_l400x1046c7f0
      _snwprintf_s410x1046c830
      _snwprintf_s_l420x1046c870
      _snwscanf430x1046c8b0
      _snwscanf_l440x1046c8e0
      _snwscanf_s450x1046c910
      _snwscanf_s_l460x1046c940
      _sprintf_l470x1046c970
      _sprintf_p480x1046c9b0
      _sprintf_p_l490x1046c9e0
      _sprintf_s_l500x1046ca10
      _sscanf_l510x1046ca40
      _sscanf_s_l520x1046ca70
      _swprintf530x1046caa0
      _swprintf_c540x1046cad0
      _swprintf_c_l550x1046cb00
      _swprintf_l560x1046cb00
      _swprintf_p570x1046cb30
      _swprintf_p_l580x1046cb60
      _swprintf_s_l590x1046cb90
      _swscanf_l600x1046cbc0
      _swscanf_s_l610x1046cbf0
      _vfprintf_l620x103fd4e0
      _vfprintf_p630x1046cc20
      _vfprintf_p_l640x1046cc50
      _vfprintf_s_l650x1046cc80
      _vfscanf_l660x1046ccb0
      _vfscanf_s_l670x1046cce0
      _vfwprintf_l680x1046cd10
      _vfwprintf_p690x1046cd40
      _vfwprintf_p_l700x1046cd70
      _vfwprintf_s_l710x1046cda0
      _vfwscanf_l720x1046cdd0
      _vfwscanf_s_l730x1046ce00
      _vprintf_l740x1046ce30
      _vprintf_p750x1046ce60
      _vprintf_p_l760x1046ce90
      _vprintf_s_l770x1046cec0
      _vscanf_l780x1046cef0
      _vscanf_s_l790x1046cf20
      _vscprintf800x1046cf50
      _vscprintf_l810x1046cf80
      _vscprintf_p820x1046cfb0
      _vscprintf_p_l830x1046cfe0
      _vscwprintf840x1046d010
      _vscwprintf_l850x1046d040
      _vscwprintf_p860x1046d070
      _vscwprintf_p_l870x1046d0a0
      _vsnprintf880x103fd510
      _vsnprintf_c890x1046d0d0
      _vsnprintf_c_l900x1046d100
      _vsnprintf_l910x103fd530
      _vsnprintf_s920x10468ad0
      _vsnprintf_s_l930x10468b00
      _vsnwprintf940x1046d130
      _vsnwprintf_l950x1046d170
      _vsnwprintf_s960x1046d1b0
      _vsnwprintf_s_l970x1046d1f0
      _vsnwscanf_l980x1046d230
      _vsnwscanf_s_l990x1046d260
      _vsprintf_l1000x104485f0
      _vsprintf_p1010x1046d290
      _vsprintf_p_l1020x1046d2c0
      _vsprintf_s_l1030x1046d2f0
      _vsscanf_l1040x103fd590
      _vsscanf_s_l1050x1046d320
      _vswprintf1060x1046d350
      _vswprintf_c1070x1046d380
      _vswprintf_c_l1080x1046d3b0
      _vswprintf_l1090x1046d3b0
      _vswprintf_p1100x1046d3e0
      _vswprintf_p_l1110x1046d410
      _vswprintf_s_l1120x1046d440
      _vswscanf_l1130x1046d470
      _vswscanf_s_l1140x1046d4a0
      _vwprintf_l1150x1046d4d0
      _vwprintf_p1160x1046d500
      _vwprintf_p_l1170x1046d530
      _vwprintf_s_l1180x1046d560
      _vwscanf_l1190x1046d590
      _vwscanf_s_l1200x1046d5c0
      _wprintf_l1210x1046d5f0
      _wprintf_p1220x1046d620
      _wprintf_p_l1230x1046d650
      _wprintf_s_l1240x1046d680
      _wscanf_l1250x1046d6b0
      _wscanf_s_l1260x1046d6e0
      fprintf1270x1046d7d0
      fprintf_s1280x1046d800
      fscanf1290x1046d830
      fscanf_s1300x1046d860
      fwprintf1310x1046d890
      fwprintf_s1320x1046d8c0
      fwscanf1330x1046d8f0
      fwscanf_s1340x1046d920
      printf1350x103fd5c0
      printf_s1360x1046df30
      scanf1370x1046dfc0
      scanf_s1380x1046dff0
      snprintf1390x103978a0
      sprintf1400x10448610
      sprintf_s1410x1046e020
      sscanf1420x103fd610
      sscanf_s1430x1046e050
      swprintf1440x1046cad0
      swprintf_s1450x1046e080
      swscanf1460x1046e0b0
      swscanf_s1470x1046e0e0
      vfprintf1480x1046e110
      vfprintf_s1490x1046e140
      vfscanf1500x1046e170
      vfscanf_s1510x1046e1a0
      vfwprintf1520x1046e1d0
      vfwprintf_s1530x1046e200
      vfwscanf1540x1046e230
      vfwscanf_s1550x1046e260
      vprintf1560x1046e290
      vprintf_s1570x1046e2c0
      vscanf1580x1046e2f0
      vscanf_s1590x1046e320
      vsnprintf1600x10397900
      vsnprintf_s1610x1046e350
      vsprintf1620x1046e390
      vsprintf_s1630x1046e3c0
      vsscanf1640x1046e3f0
      vsscanf_s1650x1046e420
      vswprintf1660x1046d380
      vswprintf_s1670x1046e450
      vswscanf1680x1046e480
      vswscanf_s1690x1046e4b0
      vwprintf1700x1046e4e0
      vwprintf_s1710x1046e510
      vwscanf1720x1046e540
      vwscanf_s1730x1046e570
      wprintf1740x1046e5a0
      wprintf_s1750x1046e5d0
      wscanf1760x1046e600
      wscanf_s1770x1046e630
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Jun 17, 2024 18:23:22.989686966 CEST1.1.1.1192.168.2.50x4580No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
      Jun 17, 2024 18:23:22.989686966 CEST1.1.1.1192.168.2.50x4580No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
      Jun 17, 2024 18:23:23.610440969 CEST1.1.1.1192.168.2.50x3d40No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
      Jun 17, 2024 18:23:23.610440969 CEST1.1.1.1192.168.2.50x3d40No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false

      Click to jump to process

      Click to jump to process

      Click to jump to process

      Target ID:0
      Start time:12:23:04
      Start date:17/06/2024
      Path:C:\Windows\System32\loaddll32.exe
      Wow64 process (32bit):true
      Commandline:loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll"
      Imagebase:0xee0000
      File size:126'464 bytes
      MD5 hash:51E6071F9CBA48E79F10C84515AAE618
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:1
      Start time:12:23:04
      Start date:17/06/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:2
      Start time:12:23:04
      Start date:17/06/2024
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll",#1
      Imagebase:0x790000
      File size:236'544 bytes
      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:12:23:04
      Start date:17/06/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll,__swprintf_l
      Imagebase:0x970000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:4
      Start time:12:23:04
      Start date:17/06/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll",#1
      Imagebase:0x970000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:6
      Start time:12:23:07
      Start date:17/06/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll,__vswprintf_l
      Imagebase:0x970000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:7
      Start time:12:23:10
      Start date:17/06/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll,_fprintf_l
      Imagebase:0x970000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      No disassembly