Loading ...

Play interactive tourEdit tour

Analysis Report qkT9fgtS2x

Overview

General Information

Sample Name:qkT9fgtS2x (renamed file extension from none to dll)
Analysis ID:330529
MD5:2c4a910a1299cdae2a4e55988a2f102e
SHA1:2f1a5a7411d015d01aaee4535835400191645023
SHA256:019085a76ba7126fff22770d71bd901c325fc68ac55aa743327984e89f4b0134

Most interesting Screenshot:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Yara signature match

Classification

Startup

  • System is w10x64
  • loaddll32.exe (PID: 5568 cmdline: loaddll32.exe 'C:\Users\user\Desktop\qkT9fgtS2x.dll' MD5: 2D39D4DFDE8F7151723794029AB8A034)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
qkT9fgtS2x.dllAPT_Backdoor_SUNBURST_1This rule is looking for portions of the SUNBURST backdoor that are vital to how it functions. The first signature fnv_xor matches a magic byte xor that the sample performs on process, service, and driver names/paths. SUNBURST is a backdoor that has the ability to spawn and kill processes, write and delete files, set and create registry keys, gather system information, and disable a set of forensic analysis tools and services.FireEye
  • 0xe5761:$cmd_regex_encoded: U4qpjjbQtUzUTdONrTY2q42pVapRgooABYxQuIZmtUoA
  • 0xe5905:$fake_orion_event_encoded: U3ItS80rCaksSFWyUvIvyszPU9IBAA==
  • 0xe5947:$fake_orion_eventmanager_encoded: U3ItS80r8UvMTVWyUgKzfRPzEtNTi5R0AA==
  • 0xe5a05:$fake_orion_message_encoded: U/JNLS5OTE9VslKqNqhVAgA=
  • 0x327c:$fnv_xor: 67 19 D8 A7 3B 90 AC 5B
qkT9fgtS2x.dllAPT_Backdoor_SUNBURST_2The SUNBURST backdoor uses a domain generation algorithm (DGA) as part of C2 communications. This rule is looking for each branch of the code that checks for which HTTP method is being used. This is in one large conjunction, and all branches are then tied together via disjunction. The grouping is intentionally designed so that if any part of the DGA is re-used in another sample, this signature should match that re-used portion. SUNBURST is a backdoor that has the ability to spawn and kill processes, write and delete files, set and create registry keys, gather system information, and disable a set of forensic analysis tools and services.FireEye
  • 0xe5ac5:$a: 0y3Kzy8BAA==
  • 0xe5e59:$aa: S8vPKynWL89PS9OvNqjVrTYEYqNa3fLUpDSgTLVxrR5IzggA
  • 0xe5ebb:$ab: S8vPKynWL89PS9OvNqjVrTYEYqPaauNaPZCYEQA=
  • 0xe5f73:$ac: C88sSs1JLS4GAA==
  • 0xe5f95:$ad: C/UEAA==
  • 0xe5fa7:$ae: C89MSU8tKQYA
  • 0xe5fc1:$af: 8wvwBQA=
  • 0xe5fd3:$ag: cyzIz8nJBwA=
  • 0xe5fed:$ah: c87JL03xzc/LLMkvysxLBwA=
  • 0xe601f:$ai: 88tPSS0GAA==
  • 0xe6039:$aj: C8vPKc1NLQYA
  • 0xe6053:$ak: 88wrSS1KS0xOLQYA
  • 0xe6075:$al: c87PLcjPS80rKQYA
  • 0xe6097:$am: Ky7PLNAvLUjRBwA=
  • 0xe60b9:$an: 06vIzQEA
  • 0xe5af9:$b: 0y3NyyxLLSpOzIlPTgQA
  • 0xe5b23:$c: 001OBAA=
  • 0xe5b35:$d: 0y0oysxNLKqMT04EAA==
  • 0xe5b5f:$e: 0y3JzE0tLknMLQAA
  • 0xe5b81:$f: 003PyU9KzAEA
  • 0xe5b9b:$h: 0y1OTS4tSk1OBAA=

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: qkT9fgtS2x.dllVirustotal: Detection: 51%Perma Link
Source: qkT9fgtS2x.dllMetadefender: Detection: 21%Perma Link
Source: qkT9fgtS2x.dllReversingLabs: Detection: 60%
Source: qkT9fgtS2x.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: qkT9fgtS2x.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: qkT9fgtS2x.dllString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: qkT9fgtS2x.dllString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: qkT9fgtS2x.dllString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: qkT9fgtS2x.dllString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: qkT9fgtS2x.dllString found in binary or memory: http://ocsp.digicert.com0C
Source: qkT9fgtS2x.dllString found in binary or memory: http://ocsp.digicert.com0O
Source: qkT9fgtS2x.dllString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: qkT9fgtS2x.dllString found in binary or memory: http://s2.symcb.com0
Source: qkT9fgtS2x.dllString found in binary or memory: http://solarwinds.s3.amazonaws.com/solarwinds/Release/MIB-Database/MIBs.zip
Source: qkT9fgtS2x.dllString found in binary or memory: http://sv.symcb.com/sv.crl0a
Source: qkT9fgtS2x.dllString found in binary or memory: http://sv.symcb.com/sv.crt0
Source: qkT9fgtS2x.dllString found in binary or memory: http://sv.symcd.com0&
Source: qkT9fgtS2x.dllString found in binary or memory: http://thwackfeeds.solarwinds.com/blogs/orion-product-team-blog/rss.aspxT
Source: qkT9fgtS2x.dllString found in binary or memory: http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09/IMaintUpdateNotifySvc/GetDataRespo
Source: qkT9fgtS2x.dllString found in binary or memory: http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09/IMaintUpdateNotifySvc/GetDataT
Source: qkT9fgtS2x.dllString found in binary or memory: http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09/IMaintUpdateNotifySvc/GetLocalized
Source: qkT9fgtS2x.dllString found in binary or memory: http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09L
Source: qkT9fgtS2x.dllString found in binary or memory: http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09T
Source: qkT9fgtS2x.dllString found in binary or memory: http://www.symauth.com/cps0(
Source: qkT9fgtS2x.dllString found in binary or memory: http://www.symauth.com/rpa00
Source: qkT9fgtS2x.dllString found in binary or memory: https://d.symcb.com/cps0%
Source: qkT9fgtS2x.dllString found in binary or memory: https://d.symcb.com/rpa0
Source: qkT9fgtS2x.dllString found in binary or memory: https://www.digicert.com/CPS0
Source: qkT9fgtS2x.dllString found in binary or memory: https://www.solarwinds.com/documentation/kbloader.aspx?lang=
Source: qkT9fgtS2x.dllString found in binary or memory: https://www.solarwinds.com/embedded_in_products/productLink.aspx?id=online_quote
Source: qkT9fgtS2x.dllBinary or memory string: OriginalFilenameSolarWinds.Orion.Core.BusinessLayer.dllh$ vs qkT9fgtS2x.dll
Source: qkT9fgtS2x.dll, type: SAMPLEMatched rule: APT_Backdoor_SUNBURST_1 date = 2020-12-14, author = FireEye, description = This rule is looking for portions of the SUNBURST backdoor that are vital to how it functions. The first signature fnv_xor matches a magic byte xor that the sample performs on process, service, and driver names/paths. SUNBURST is a backdoor that has the ability to spawn and kill processes, write and delete files, set and create registry keys, gather system information, and disable a set of forensic analysis tools and services., reference = https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html, score =
Source: qkT9fgtS2x.dll, type: SAMPLEMatched rule: APT_Backdoor_SUNBURST_2 date = 2020-12-14, author = FireEye, description = The SUNBURST backdoor uses a domain generation algorithm (DGA) as part of C2 communications. This rule is looking for each branch of the code that checks for which HTTP method is being used. This is in one large conjunction, and all branches are then tied together via disjunction. The grouping is intentionally designed so that if any part of the DGA is re-used in another sample, this signature should match that re-used portion. SUNBURST is a backdoor that has the ability to spawn and kill processes, write and delete files, set and create registry keys, gather system information, and disable a set of forensic analysis tools and services., reference = https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html, score =
Source: classification engineClassification label: mal48.winDLL@1/0@0/0
Source: qkT9fgtS2x.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: qkT9fgtS2x.dllVirustotal: Detection: 51%
Source: qkT9fgtS2x.dllMetadefender: Detection: 21%
Source: qkT9fgtS2x.dllReversingLabs: Detection: 60%
Source: qkT9fgtS2x.dllStatic PE information: certificate valid
Source: qkT9fgtS2x.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: qkT9fgtS2x.dllStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Source: qkT9fgtS2x.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\buildAgent\temp\buildTmp\Obj\SolarWinds.Orion.Core.BusinessLayer\Release\SolarWinds.Orion.Core.BusinessLayer.pdb source: qkT9fgtS2x.dll
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: qkT9fgtS2x.dllBinary or memory string: SNMPPort#VMwareProductName)VMwareProductVersion
Source: qkT9fgtS2x.dllBinary or memory string: GetAllVMwareServiceURIs
Source: qkT9fgtS2x.dllBinary or memory string: for VMWare ESX
Source: qkT9fgtS2x.dllBinary or memory string: vmwareCredentialsID
Source: qkT9fgtS2x.dllBinary or memory string: GetVMwareCredential
Source: qkT9fgtS2x.dllBinary or memory string: ActionTypeIDYSending request for BlogItemDAL.GetBlogById.QError obtaining blog notification item: SSending request for BlogItemDAL.GetItems.]Error when obtaining blog notification items: sSending request for CoreHelper.CheckOrionProductTeamBlog.]Error forcing blog notification items update: eSending request for BlogItemDAL.GetBlogItemForPos.cError obtaining blog notification item for post: /GetAllVMwareServiceURIs'GetVMwareCredential-InsertUpdateVMHostNode
Source: qkT9fgtS2x.dllBinary or memory string: get_VMwareESXJobTimeout
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential DumpingSecurity Software Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemorySystem Information Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
qkT9fgtS2x.dll51%VirustotalBrowse
qkT9fgtS2x.dll22%MetadefenderBrowse
qkT9fgtS2x.dll61%ReversingLabsByteCode-MSIL.Trojan.SunBurst

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09LqkT9fgtS2x.dllfalse
    high
    http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09/IMaintUpdateNotifySvc/GetDataRespoqkT9fgtS2x.dllfalse
      high
      http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09/IMaintUpdateNotifySvc/GetDataTqkT9fgtS2x.dllfalse
        high
        http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09TqkT9fgtS2x.dllfalse
          high
          http://www.symauth.com/cps0(qkT9fgtS2x.dllfalse
            high
            http://www.symauth.com/rpa00qkT9fgtS2x.dllfalse
              high
              https://www.solarwinds.com/embedded_in_products/productLink.aspx?id=online_quoteqkT9fgtS2x.dllfalse
                high
                http://thwackfeeds.solarwinds.com/blogs/orion-product-team-blog/rss.aspxTqkT9fgtS2x.dllfalse
                  high
                  https://www.solarwinds.com/documentation/kbloader.aspx?lang=qkT9fgtS2x.dllfalse
                    high
                    http://solarwinds.s3.amazonaws.com/solarwinds/Release/MIB-Database/MIBs.zipqkT9fgtS2x.dllfalse
                      high

                      Contacted IPs

                      No contacted IP infos

                      General Information

                      Joe Sandbox Version:31.0.0 Red Diamond
                      Analysis ID:330529
                      Start date:15.12.2020
                      Start time:07:38:57
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 1m 50s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Sample file name:qkT9fgtS2x (renamed file extension from none to dll)
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:1
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal48.winDLL@1/0@0/0
                      EGA Information:Failed
                      HDC Information:Failed
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      • Stop behavior analysis, all processes terminated

                      Simulations

                      Behavior and APIs

                      TimeTypeDescription
                      07:39:45API Interceptor1x Sleep call for process: loaddll32.exe modified

                      Joe Sandbox View / Context

                      IPs

                      No context

                      Domains

                      No context

                      ASN

                      No context

                      JA3 Fingerprints

                      No context

                      Dropped Files

                      No context

                      Created / dropped Files

                      No created / dropped files found

                      Static File Info

                      General

                      File type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                      Entropy (8bit):5.579996866203923
                      TrID:
                      • Win32 Dynamic Link Library (generic) Net Framework (1011504/3) 49.81%
                      • Win32 Dynamic Link Library (generic) (1002004/3) 49.34%
                      • Windows Screen Saver (13104/52) 0.65%
                      • Generic Win/DOS Executable (2004/3) 0.10%
                      • DOS Executable Generic (2002/1) 0.10%
                      File name:qkT9fgtS2x.dll
                      File size:1028072
                      MD5:2c4a910a1299cdae2a4e55988a2f102e
                      SHA1:2f1a5a7411d015d01aaee4535835400191645023
                      SHA256:019085a76ba7126fff22770d71bd901c325fc68ac55aa743327984e89f4b0134
                      SHA512:5cbfefe612a40c8872a0faf3db8d3835dc514fb3df159610095b47c595c6caa1ada79cce2b10fb99e648990c3f54f63344d1fa7025090bfcd4e2c55d7210a28d
                      SSDEEP:12288:dJKoHwfn/jz3bbO4Qag2I97PMieSLezPKT+cYvjenWHuhh9c0g8vkzE19Wv:rEfDbO97P8TrKhYbenWH4c0g8vkzE19e
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......^.........." ..0.............6.... ........... ..............................._....`................................

                      File Icon

                      Icon Hash:74f0e4ecccdce0e4

                      Static PE Info

                      General

                      Entrypoint:0x100fa236
                      Entrypoint Section:.text
                      Digitally signed:true
                      Imagebase:0x10000000
                      Subsystem:windows cui
                      Image File Characteristics:EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                      Time Stamp:0x5E9F08ED [Tue Apr 21 14:53:33 2020 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:v4.0.30319
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:dae02f32a21e03ce65412f6e56942daa

                      Authenticode Signature

                      Signature Valid:true
                      Signature Issuer:CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US
                      Signature Validation Error:The operation completed successfully
                      Error Number:0
                      Not Before, Not After
                      • 1/20/2020 4:00:00 PM 1/20/2023 3:59:59 PM
                      Subject Chain
                      • CN="Solarwinds Worldwide, LLC", O="Solarwinds Worldwide, LLC", L=Austin, S=Texas, C=US
                      Version:3
                      Thumbprint MD5:08E35543D6110ED11FDF558BB093D401
                      Thumbprint SHA-1:47D92D49E6F7F296260DA1AF355F941EB25360C4
                      Thumbprint SHA-256:53F8DFC65169CCDA021B72A62E0C22A4DB7C4077F002FA742717D41B3C40F2C7
                      Serial:0FE973752022A606ADF2A36E345DC0ED

                      Entrypoint Preview

                      Instruction
                      jmp dword ptr [10002000h]
                      xor dl, byte ptr [eax]
                      xchg al, ch
                      pop ebx
                      fisubr word ptr [ecx+2Ch]
                      mov dl, 3Dh
                      retn 95BCh
                      push FFFFFFC9h
                      cld
                      xor dword ptr [ebp-63h], ecx
                      pop ebx
                      xor ebp, dword ptr [ebp+08h]
                      jno 00007F1080D28A36h
                      fcomp3 st(2)
                      rol dword ptr [ebp+6EBD073Bh], 51h
                      or ecx, dword ptr [ebp-4F69303Ah]
                      add byte ptr [esi-2Ch], ah
                      jnc 00007F1080D28ACCh
                      xchg eax, edx
                      ficom word ptr [ecx+7Eh]
                      add byte ptr [ecx+edi-26D72F48h], 00000044h
                      mov cl, 41h
                      push cs
                      ret
                      xlatb
                      mov ch, byte ptr [ecx+ebp]
                      lea edi, ebp
                      mov cl, byte ptr [ebp+2Ch]
                      and eax, 2770CE61h
                      mov dh, ACh
                      inc edi
                      fstp tbyte ptr [ebp-7E8F69D3h]
                      stc
                      jmp 00007F1080D28A6Ah
                      rcl byte ptr [ecx], 0000001Fh
                      iretd
                      sub ebp, esp
                      int3
                      sal dword ptr [esi], 1
                      xchg eax, edx
                      cdq
                      xor ah, byte ptr [edi+ecx-24h]
                      cwde
                      sbb ebp, eax
                      mov bl, al
                      loop 00007F1080D28A45h
                      mov dl, BDh
                      dec esp
                      int1
                      call 00007F10F546DAC9h
                      jmp 00007F100B9F7A21h
                      scasd
                      xor al, ECh
                      jnl 00007F1080D28A40h
                      mov cs, dx
                      cmp bl, byte ptr [esi]
                      jns 00007F1080D28A0Ch
                      test eax, 47A375F1h
                      not dword ptr [edx+edi*8-7F505A3Dh]
                      xor al, ACh
                      cdq
                      cmpsb
                      call ebp
                      push edi
                      stosb
                      inc esi
                      out dx, al
                      aaa
                      int A5h
                      jnle 00007F1080D28AB4h
                      and esp, eax
                      loope 00007F1080D28ADCh
                      in eax, dx
                      pop esi
                      add dword ptr [ecx+34h], 3F473970h
                      add eax, 3A0B0FF3h
                      jnbe 00007F1080D28AC4h
                      xchg eax, esi
                      and al, FFh
                      arpl word ptr [edx], dx
                      or byte ptr [edx+0060F23Fh], cl

                      Data Directories

                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xfa1e40x4f.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xfc0000x520.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0xf94000x1be8
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xfe0000xc.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0xfa0ac0x1c.text
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                      Sections

                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x20000xf880c0xf8a00False0.336107379651data5.56757978711IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      .rsrc0xfc0000x5200x600False0.302734375data3.00583481716IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0xfe0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                      Resources

                      NameRVASizeTypeLanguageCountry
                      RT_VERSION0xfc0580x4c4data

                      Imports

                      DLLImport
                      mscoree.dll_CorDllMain

                      Version Infos

                      DescriptionData
                      Translation0x0000 0x04b0
                      LegalCopyrightCopyright 1999-2020 SolarWinds Worldwide, LLC. All Rights Reserved.
                      Assembly Version2020.2.5200.12394
                      InternalNameSolarWinds.Orion.Core.BusinessLayer.dll
                      FileVersion2020.2.5200.12394
                      CompanyNameSolarWinds Worldwide, LLC.
                      LegalTrademarks
                      Comments
                      ProductNameSolarWinds.Orion.Core.BusinessLayer
                      ProductVersion2020.2.5200.12394
                      FileDescriptionSolarWinds.Orion.Core.BusinessLayer
                      OriginalFilenameSolarWinds.Orion.Core.BusinessLayer.dll

                      Network Behavior

                      No network behavior found

                      Code Manipulations

                      Statistics

                      CPU Usage

                      Click to jump to process

                      Memory Usage

                      Click to jump to process

                      System Behavior

                      General

                      Start time:07:39:45
                      Start date:15/12/2020
                      Path:C:\Windows\System32\loaddll32.exe
                      Wow64 process (32bit):true
                      Commandline:loaddll32.exe 'C:\Users\user\Desktop\qkT9fgtS2x.dll'
                      Imagebase:0x3b0000
                      File size:120832 bytes
                      MD5 hash:2D39D4DFDE8F7151723794029AB8A034
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate

                      Disassembly

                      Code Analysis

                      Reset < >