Loading ...

Play interactive tourEdit tour

Windows Analysis Report as0Jkr7Dca

Overview

General Information

Sample Name:as0Jkr7Dca (renamed file extension from none to dll)
Analysis ID:483806
MD5:3839da365172e8011da03c3ef023c33c
SHA1:060aaed3fe83b9333dbd19ac22471cc8ded3c9f8
SHA256:2356048d0182a32df2892b64db99f58634681c33cb0104a3ad3b62510a534454
Tags:Dridexexe
Infos:

Most interesting Screenshot:

Detection

Dridex
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Dridex unpacked file
Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes memory attributes in foreign processes to executable or writable
Machine Learning detection for sample
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Machine Learning detection for dropped file
Uses Atom Bombing / ProGate to inject into other processes
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Queries the installation date of Windows
Detected potential crypto function
Found potential string decryption / allocating functions
Contains functionality to launch a process as a different user
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Uses the system / local time for branch decision (may execute only at specific dates)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains functionality for execution timing, often used to detect debuggers
Drops files with a non-matching file extension (content does not match file extension)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
PE file contains strange resources
Drops PE files
Binary contains a suspicious time stamp
PE file contains more sections than normal
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • loaddll64.exe (PID: 3640 cmdline: loaddll64.exe 'C:\Users\user\Desktop\as0Jkr7Dca.dll' MD5: A84133CCB118CF35D49A423CD836D0EF)
    • cmd.exe (PID: 5108 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\as0Jkr7Dca.dll',#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 256 cmdline: rundll32.exe 'C:\Users\user\Desktop\as0Jkr7Dca.dll',#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 2540 cmdline: rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlReader MD5: 73C519F050C20580F8A62C849D49215A)
      • explorer.exe (PID: 3388 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • SystemPropertiesPerformance.exe (PID: 6292 cmdline: C:\Users\user\AppData\Local\aHDEnt\SystemPropertiesPerformance.exe MD5: F325976CDC0F7E9C680B51B35D24D23A)
        • wextract.exe (PID: 6800 cmdline: C:\Windows\system32\wextract.exe MD5: ED93B350C8EEFC442758A00BC3EEDE2D)
        • wextract.exe (PID: 6908 cmdline: C:\Users\user\AppData\Local\93S1H\wextract.exe MD5: ED93B350C8EEFC442758A00BC3EEDE2D)
        • InfDefaultInstall.exe (PID: 6988 cmdline: C:\Windows\system32\InfDefaultInstall.exe MD5: 5FDB30927E9D4387D777443BF865EEFD)
        • InfDefaultInstall.exe (PID: 6996 cmdline: C:\Users\user\AppData\Local\zBhEpi\InfDefaultInstall.exe MD5: 5FDB30927E9D4387D777443BF865EEFD)
        • AgentService.exe (PID: 5728 cmdline: C:\Windows\system32\AgentService.exe MD5: F7E36C20DB953DFF4FDDB817904C0E48)
        • AgentService.exe (PID: 6060 cmdline: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exe MD5: F7E36C20DB953DFF4FDDB817904C0E48)
        • MusNotificationUx.exe (PID: 4436 cmdline: C:\Windows\system32\MusNotificationUx.exe MD5: 114A55D75AC7447F012B6D8EC8B1F7FC)
        • MusNotificationUx.exe (PID: 5528 cmdline: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exe MD5: 114A55D75AC7447F012B6D8EC8B1F7FC)
        • sessionmsg.exe (PID: 6168 cmdline: C:\Windows\system32\sessionmsg.exe MD5: 1F7CEA0216DE48B877C16F95C7DA1F0F)
    • rundll32.exe (PID: 3256 cmdline: rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlReaderInputWithEncodingCodePage MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 1236 cmdline: rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlReaderInputWithEncodingName MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 2736 cmdline: rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlWriter MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 2212 cmdline: rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlWriterOutputWithEncodingCodePage MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 3288 cmdline: rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlWriterOutputWithEncodingName MD5: 73C519F050C20580F8A62C849D49215A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000001F.00000002.393975401.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
    00000004.00000002.222388463.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
      00000009.00000002.245117610.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
        00000024.00000002.451790236.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
          00000028.00000002.477912274.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
            Click to see the 8 entries

            Sigma Overview

            No Sigma rule has matched

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Multi AV Scanner detection for submitted fileShow sources
            Source: as0Jkr7Dca.dllVirustotal: Detection: 64%Perma Link
            Source: as0Jkr7Dca.dllMetadefender: Detection: 62%Perma Link
            Source: as0Jkr7Dca.dllReversingLabs: Detection: 75%
            Antivirus / Scanner detection for submitted sampleShow sources
            Source: as0Jkr7Dca.dllAvira: detected
            Antivirus detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\93S1H\VERSION.dllAvira: detection malicious, Label: TR/Crypt.ZPACK.Gen
            Source: C:\Users\user\AppData\Local\zBhEpi\newdev.dllAvira: detection malicious, Label: TR/Crypt.ZPACK.Gen
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\XmlLite.dllAvira: detection malicious, Label: HEUR/AGEN.1114452
            Source: C:\Users\user\AppData\Local\aHDEnt\SYSDM.CPLAvira: detection malicious, Label: HEUR/AGEN.1114452
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\ACTIVEDS.dllAvira: detection malicious, Label: TR/Crypt.ZPACK.Gen
            Machine Learning detection for sampleShow sources
            Source: as0Jkr7Dca.dllJoe Sandbox ML: detected
            Machine Learning detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\93S1H\VERSION.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\zBhEpi\newdev.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\XmlLite.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\aHDEnt\SYSDM.CPLJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\ACTIVEDS.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A188290 RtlNtStatusToDosError,BCryptGetProperty,RtlNtStatusToDosError,RtlNtStatusToDosError,
            Source: as0Jkr7Dca.dllStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
            Source: Binary string: wextract.pdb source: wextract.exe, 0000001F.00000002.395783273.00007FF6A7B49000.00000002.00020000.sdmp, wextract.exe.5.dr
            Source: Binary string: SystemPropertiesPerformance.pdb source: SystemPropertiesPerformance.exe, 00000018.00000000.340776280.00007FF7497F2000.00000002.00020000.sdmp, SystemPropertiesPerformance.exe.5.dr
            Source: Binary string: wextract.pdbGCTL source: wextract.exe, 0000001F.00000002.395783273.00007FF6A7B49000.00000002.00020000.sdmp, wextract.exe.5.dr
            Source: Binary string: MusNotificationUx.pdb source: MusNotificationUx.exe, 00000028.00000002.480167009.00007FF75A18E000.00000002.00020000.sdmp, MusNotificationUx.exe.5.dr
            Source: Binary string: SystemPropertiesPerformance.pdbGCTL source: SystemPropertiesPerformance.exe, 00000018.00000000.340776280.00007FF7497F2000.00000002.00020000.sdmp, SystemPropertiesPerformance.exe.5.dr
            Source: Binary string: InfDefaultInstall.pdb source: InfDefaultInstall.exe, 00000021.00000000.398960791.00007FF675B52000.00000002.00020000.sdmp, InfDefaultInstall.exe.5.dr
            Source: Binary string: MusNotificationUx.pdbGCTL source: MusNotificationUx.exe, 00000028.00000002.480167009.00007FF75A18E000.00000002.00020000.sdmp, MusNotificationUx.exe.5.dr
            Source: Binary string: InfDefaultInstall.pdbGCTL source: InfDefaultInstall.exe, 00000021.00000000.398960791.00007FF675B52000.00000002.00020000.sdmp, InfDefaultInstall.exe.5.dr
            Source: Binary string: AgentService.pdbGCTL source: AgentService.exe, 00000024.00000002.455168965.00007FF652EF1000.00000002.00020000.sdmp, AgentService.exe.5.dr
            Source: Binary string: AgentService.pdb source: AgentService.exe, 00000024.00000002.455168965.00007FF652EF1000.00000002.00020000.sdmp, AgentService.exe.5.dr
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005D290 FindFirstFileExW,
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B41EC0 FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E69110 ??3@YAXPEAX@Z,??3@YAXPEAX@Z,std::bad_exception::bad_exception,_CxxThrowException,FindFirstFileW,GetLastError,??3@YAXPEAX@Z,??3@YAXPEAX@Z,??3@YAXPEAX@Z,??3@YAXPEAX@Z,??3@YAXPEAX@Z,FindNextFileW,GetLastError,??3@YAXPEAX@Z,??3@YAXPEAX@Z,??3@YAXPEAX@Z,std::bad_exception::bad_exception,_CxxThrowException,std::bad_exception::bad_exception,_CxxThrowException,
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A18A104 ?_Swap_all@_Container_base0@std@@QEAAXAEAU12@@Z,FindFirstFileW,FindNextFileW,FindClose,?_Swap_all@_Container_base0@std@@QEAAXAEAU12@@Z,?_Swap_all@_Container_base0@std@@QEAAXAEAU12@@Z,

            E-Banking Fraud:

            barindex
            Yara detected Dridex unpacked fileShow sources
            Source: Yara matchFile source: 0000001F.00000002.393975401.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.222388463.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.245117610.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000024.00000002.451790236.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000028.00000002.477912274.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.227069993.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000018.00000002.362477458.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.236556937.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000021.00000002.420737755.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.334750401.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.257049994.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.266033860.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.259716676.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B41B10 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B4297C GetVersion,GetModuleHandleW,GetProcAddress,ExitWindowsEx,CloseHandle,
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140034870
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140035270
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140048AC0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005C340
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140065B80
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006A4B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400524B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140026CC0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004BD40
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400495B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140036F30
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140069010
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140001010
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140066020
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002F840
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005D850
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140064080
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140010880
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400688A0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002D0D0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400018D0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140016100
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001D100
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002A110
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001D910
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140015120
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000B120
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004F940
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140039140
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140023140
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140057950
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001E170
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140002980
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400611A0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400389A0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400381A0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002E1B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400139D0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400319F0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002EA00
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140022A00
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003B220
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140067A40
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140069A50
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140007A60
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003AAC0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003A2E0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140062B00
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140018300
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002FB20
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140031340
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140022340
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140017B40
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000BB40
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004EB60
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140005370
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002CB80
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006B390
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140054BA0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140033BB0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400263C0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400123C0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140063BD0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400663F0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140023BF0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006B41B
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006B424
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006B42D
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006B436
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006B43D
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140024440
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140005C40
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006B446
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005F490
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140022D00
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140035520
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140019D20
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140030530
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140023530
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140031540
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140033540
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014007BD50
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140078570
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140019580
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400205A0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140025DB0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140071DC0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000C5C0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002DDE0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140031DF0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000DDF0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140001620
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140018630
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140032650
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140064E80
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140016E80
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140007EA0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400286B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140006EB0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400276C0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002FEC0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002EED0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002B6E0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140053F20
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140022730
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140029780
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140018F80
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003EFB0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400067B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400667D0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140060FE0
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B41C00
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B43310
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B41B10
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B46418
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B457D0
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B45E98
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B42AB4
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B43D64
            Source: C:\Users\user\AppData\Local\zBhEpi\InfDefaultInstall.exeCode function: 33_2_00007FF675B51078
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E68500
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E354E0
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E664D0
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E404AC
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E80498
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652EBA450
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E4E444
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E86158
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E8115E
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E9C278
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652ECE834
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E4858C
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E67580
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E9D6FC
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E796D8
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E4CC30
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652ECDBA4
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652EBACE8
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E729F4
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652EC29E0
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E7A974
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652EBA014
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E7B12C
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E69110
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E3E0F4
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E71E34
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652ED8F04
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E54EF0
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E4BEE4
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E9EE7C
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A17F33C
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A176754
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A17C318
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A172720
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A177720
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A176B7C
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16B38C
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16E38C
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A164760
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16F360
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16BB68
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A178BCC
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A17BBAC
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A18C3B4
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A1747A8
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A17AC0C
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16B80C
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A1707D8
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16CBE4
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A1783E0
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16D3E8
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A169FE8
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A1667F4
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16B03C
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16E040
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A17944C
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A18044C
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A176048
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A17D054
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A175C2C
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A174C80
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A17A070
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A1744C4
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A17F8CC
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A181CB0
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16ACFC
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A171100
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16C908
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16DCE4
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A173CE0
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16ECE8
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A169D28
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A181130
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A17ED88
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A17A16C
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A17C570
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A173570
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16C5B8
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16B5C0
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A1869A8
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A17CDA8
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A1661FC
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A174208
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A17E5DC
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A1671D8
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16D9E4
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16A9EC
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A1809E8
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A1719F0
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16CE18
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A181688
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16C25C
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16A26C
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A17BEB8
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16BEC4
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A17A6C8
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A1886D8
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16D6E4
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A177EE0
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: String function: 00007FF652E35BC4 appears 55 times
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: String function: 00007FF652E33F1C appears 39 times
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: String function: 00007FF652E75CE8 appears 64 times
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: String function: 00007FF652E359E0 appears 153 times
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E393A8 memset,CreateProcessAsUserW,WaitForSingleObject,CloseHandle,CloseHandle,GetLastError,swprintf_s,??_V@YAXPEAX@Z,??3@YAXPEAX@Z,??3@YAXPEAX@Z,??3@YAXPEAX@Z,??3@YAXPEAX@Z,
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140046C90 NtClose,
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006A4B0 NtQuerySystemInformation,
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652EB6CB0: DeviceIoControl,??_V@YAXPEAX@Z,CloseHandle,
            Source: as0Jkr7Dca.dllBinary or memory string: OriginalFilenamekbdyj% vs as0Jkr7Dca.dll
            Source: SystemPropertiesPerformance.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: SystemPropertiesPerformance.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: SystemPropertiesPerformance.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: wextract.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: wextract.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: wextract.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: ACTIVEDS.dll.5.drStatic PE information: Number of sections : 46 > 10
            Source: SYSDM.CPL.5.drStatic PE information: Number of sections : 46 > 10
            Source: newdev.dll.5.drStatic PE information: Number of sections : 46 > 10
            Source: VERSION.dll.5.drStatic PE information: Number of sections : 46 > 10
            Source: as0Jkr7Dca.dllStatic PE information: Number of sections : 45 > 10
            Source: XmlLite.dll.5.drStatic PE information: Number of sections : 46 > 10
            Source: as0Jkr7Dca.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: SYSDM.CPL.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: VERSION.dll.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: newdev.dll.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: ACTIVEDS.dll.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: XmlLite.dll.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: as0Jkr7Dca.dllVirustotal: Detection: 64%
            Source: as0Jkr7Dca.dllMetadefender: Detection: 62%
            Source: as0Jkr7Dca.dllReversingLabs: Detection: 75%
            Source: as0Jkr7Dca.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe 'C:\Users\user\Desktop\as0Jkr7Dca.dll'
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\as0Jkr7Dca.dll',#1
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlReader
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\as0Jkr7Dca.dll',#1
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlReaderInputWithEncodingCodePage
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlReaderInputWithEncodingName
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlWriter
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlWriterOutputWithEncodingCodePage
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlWriterOutputWithEncodingName
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\SystemPropertiesPerformance.exe C:\Windows\system32\SystemPropertiesPerformance.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\aHDEnt\SystemPropertiesPerformance.exe C:\Users\user\AppData\Local\aHDEnt\SystemPropertiesPerformance.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\wextract.exe C:\Windows\system32\wextract.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\93S1H\wextract.exe C:\Users\user\AppData\Local\93S1H\wextract.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\InfDefaultInstall.exe C:\Windows\system32\InfDefaultInstall.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\zBhEpi\InfDefaultInstall.exe C:\Users\user\AppData\Local\zBhEpi\InfDefaultInstall.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\AgentService.exe C:\Windows\system32\AgentService.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exe C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\MusNotificationUx.exe C:\Windows\system32\MusNotificationUx.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exe C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\sessionmsg.exe C:\Windows\system32\sessionmsg.exe
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\as0Jkr7Dca.dll',#1
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlReader
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlReaderInputWithEncodingCodePage
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlReaderInputWithEncodingName
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlWriter
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlWriterOutputWithEncodingCodePage
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlWriterOutputWithEncodingName
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\as0Jkr7Dca.dll',#1
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\SystemPropertiesPerformance.exe C:\Windows\system32\SystemPropertiesPerformance.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\aHDEnt\SystemPropertiesPerformance.exe C:\Users\user\AppData\Local\aHDEnt\SystemPropertiesPerformance.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\wextract.exe C:\Windows\system32\wextract.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\93S1H\wextract.exe C:\Users\user\AppData\Local\93S1H\wextract.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\InfDefaultInstall.exe C:\Windows\system32\InfDefaultInstall.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\zBhEpi\InfDefaultInstall.exe C:\Users\user\AppData\Local\zBhEpi\InfDefaultInstall.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\AgentService.exe C:\Windows\system32\AgentService.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exe C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\MusNotificationUx.exe C:\Windows\system32\MusNotificationUx.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exe C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\sessionmsg.exe C:\Windows\system32\sessionmsg.exe
            Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B41B10 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E4943C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,GetLastError,CloseHandle,GetLastError,
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A186588 GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,GetLastError,CloseHandle,
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CryptoJump to behavior
            Source: classification engineClassification label: mal100.troj.evad.winDLL@39/11@0/0
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E32B88 CoInitializeEx,CoCreateInstance,CoUninitialize,
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B46418 GetCurrentDirectoryA,SetCurrentDirectoryA,GetLastError,GetDiskFreeSpaceA,MulDiv,GetVolumeInformationA,memset,GetLastError,GetLastError,FormatMessageA,SetCurrentDirectoryA,memset,GetLastError,GetLastError,FormatMessageA,SetCurrentDirectoryA,
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B46418 GetCurrentDirectoryA,SetCurrentDirectoryA,GetLastError,GetDiskFreeSpaceA,MulDiv,GetVolumeInformationA,memset,GetLastError,GetLastError,FormatMessageA,SetCurrentDirectoryA,memset,GetLastError,GetLastError,FormatMessageA,SetCurrentDirectoryA,
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E3345C StartServiceCtrlDispatcherW,GetLastError,
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E3345C StartServiceCtrlDispatcherW,GetLastError,
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlReader
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeMutant created: \Sessions\1\BaseNamedObjects\{1b5f2cc3-8b30-2258-5bf8-ae9b32776bed}
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeMutant created: \Sessions\1\BaseNamedObjects\{04215796-eaf0-868f-5418-ce74fc100d33}
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B46E1C LoadResource,LockResource,FreeResource,FindResourceA,FreeResource,
            Source: as0Jkr7Dca.dllStatic PE information: Image base 0x140000000 > 0x60000000
            Source: as0Jkr7Dca.dllStatic file information: File size 1839104 > 1048576
            Source: as0Jkr7Dca.dllStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
            Source: Binary string: wextract.pdb source: wextract.exe, 0000001F.00000002.395783273.00007FF6A7B49000.00000002.00020000.sdmp, wextract.exe.5.dr
            Source: Binary string: SystemPropertiesPerformance.pdb source: SystemPropertiesPerformance.exe, 00000018.00000000.340776280.00007FF7497F2000.00000002.00020000.sdmp, SystemPropertiesPerformance.exe.5.dr
            Source: Binary string: wextract.pdbGCTL source: wextract.exe, 0000001F.00000002.395783273.00007FF6A7B49000.00000002.00020000.sdmp, wextract.exe.5.dr
            Source: Binary string: MusNotificationUx.pdb source: MusNotificationUx.exe, 00000028.00000002.480167009.00007FF75A18E000.00000002.00020000.sdmp, MusNotificationUx.exe.5.dr
            Source: Binary string: SystemPropertiesPerformance.pdbGCTL source: SystemPropertiesPerformance.exe, 00000018.00000000.340776280.00007FF7497F2000.00000002.00020000.sdmp, SystemPropertiesPerformance.exe.5.dr
            Source: Binary string: InfDefaultInstall.pdb source: InfDefaultInstall.exe, 00000021.00000000.398960791.00007FF675B52000.00000002.00020000.sdmp, InfDefaultInstall.exe.5.dr
            Source: Binary string: MusNotificationUx.pdbGCTL source: MusNotificationUx.exe, 00000028.00000002.480167009.00007FF75A18E000.00000002.00020000.sdmp, MusNotificationUx.exe.5.dr
            Source: Binary string: InfDefaultInstall.pdbGCTL source: InfDefaultInstall.exe, 00000021.00000000.398960791.00007FF675B52000.00000002.00020000.sdmp, InfDefaultInstall.exe.5.dr
            Source: Binary string: AgentService.pdbGCTL source: AgentService.exe, 00000024.00000002.455168965.00007FF652EF1000.00000002.00020000.sdmp, AgentService.exe.5.dr
            Source: Binary string: AgentService.pdb source: AgentService.exe, 00000024.00000002.455168965.00007FF652EF1000.00000002.00020000.sdmp, AgentService.exe.5.dr
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140056A4D push rdi; ret
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E784C0 push rsp; retf
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E7FF70 pushfq ; retf
            Source: as0Jkr7Dca.dllStatic PE information: section name: .qkm
            Source: as0Jkr7Dca.dllStatic PE information: section name: .cvjb
            Source: as0Jkr7Dca.dllStatic PE information: section name: .tlmkv
            Source: as0Jkr7Dca.dllStatic PE information: section name: .wucsxe
            Source: as0Jkr7Dca.dllStatic PE information: section name: .fltwtj
            Source: as0Jkr7Dca.dllStatic PE information: section name: .sfplio
            Source: as0Jkr7Dca.dllStatic PE information: section name: .rpg
            Source: as0Jkr7Dca.dllStatic PE information: section name: .bewzc
            Source: as0Jkr7Dca.dllStatic PE information: section name: .vksvaw
            Source: as0Jkr7Dca.dllStatic PE information: section name: .wmhg
            Source: as0Jkr7Dca.dllStatic PE information: section name: .kswemc
            Source: as0Jkr7Dca.dllStatic PE information: section name: .kaxfk
            Source: as0Jkr7Dca.dllStatic PE information: section name: .pjf
            Source: as0Jkr7Dca.dllStatic PE information: section name: .retjqj
            Source: as0Jkr7Dca.dllStatic PE information: section name: .mizn
            Source: as0Jkr7Dca.dllStatic PE information: section name: .rsrub
            Source: as0Jkr7Dca.dllStatic PE information: section name: .fhgxfk
            Source: as0Jkr7Dca.dllStatic PE information: section name: .wqpbrq
            Source: as0Jkr7Dca.dllStatic PE information: section name: .xlhbgj
            Source: as0Jkr7Dca.dllStatic PE information: section name: .rzgl
            Source: as0Jkr7Dca.dllStatic PE information: section name: .yic
            Source: as0Jkr7Dca.dllStatic PE information: section name: .zfmbo
            Source: as0Jkr7Dca.dllStatic PE information: section name: .zlvv
            Source: as0Jkr7Dca.dllStatic PE information: section name: .cxtrm
            Source: as0Jkr7Dca.dllStatic PE information: section name: .ulxwjx
            Source: as0Jkr7Dca.dllStatic PE information: section name: .dhdaub
            Source: as0Jkr7Dca.dllStatic PE information: section name: .mwbsl
            Source: as0Jkr7Dca.dllStatic PE information: section name: .tnjoaa
            Source: as0Jkr7Dca.dllStatic PE information: section name: .xbwa
            Source: as0Jkr7Dca.dllStatic PE information: section name: .ahxqcx
            Source: as0Jkr7Dca.dllStatic PE information: section name: .prqysb
            Source: as0Jkr7Dca.dllStatic PE information: section name: .piajju
            Source: as0Jkr7Dca.dllStatic PE information: section name: .ncu
            Source: as0Jkr7Dca.dllStatic PE information: section name: .pmgfro
            Source: as0Jkr7Dca.dllStatic PE information: section name: .xjbky
            Source: as0Jkr7Dca.dllStatic PE information: section name: .iypg
            Source: as0Jkr7Dca.dllStatic PE information: section name: .icnjt
            Source: as0Jkr7Dca.dllStatic PE information: section name: .ayz
            Source: as0Jkr7Dca.dllStatic PE information: section name: .jirq
            Source: MusNotificationUx.exe.5.drStatic PE information: section name: .imrsiv
            Source: MusNotificationUx.exe.5.drStatic PE information: section name: .didat
            Source: SYSDM.CPL.5.drStatic PE information: section name: .qkm
            Source: SYSDM.CPL.5.drStatic PE information: section name: .cvjb
            Source: SYSDM.CPL.5.drStatic PE information: section name: .tlmkv
            Source: SYSDM.CPL.5.drStatic PE information: section name: .wucsxe
            Source: SYSDM.CPL.5.drStatic PE information: section name: .fltwtj
            Source: SYSDM.CPL.5.drStatic PE information: section name: .sfplio
            Source: SYSDM.CPL.5.drStatic PE information: section name: .rpg
            Source: SYSDM.CPL.5.drStatic PE information: section name: .bewzc
            Source: SYSDM.CPL.5.drStatic PE information: section name: .vksvaw
            Source: SYSDM.CPL.5.drStatic PE information: section name: .wmhg
            Source: SYSDM.CPL.5.drStatic PE information: section name: .kswemc
            Source: SYSDM.CPL.5.drStatic PE information: section name: .kaxfk
            Source: SYSDM.CPL.5.drStatic PE information: section name: .pjf
            Source: SYSDM.CPL.5.drStatic PE information: section name: .retjqj
            Source: SYSDM.CPL.5.drStatic PE information: section name: .mizn
            Source: SYSDM.CPL.5.drStatic PE information: section name: .rsrub
            Source: SYSDM.CPL.5.drStatic PE information: section name: .fhgxfk
            Source: SYSDM.CPL.5.drStatic PE information: section name: .wqpbrq
            Source: SYSDM.CPL.5.drStatic PE information: section name: .xlhbgj
            Source: SYSDM.CPL.5.drStatic PE information: section name: .rzgl
            Source: SYSDM.CPL.5.drStatic PE information: section name: .yic
            Source: SYSDM.CPL.5.drStatic PE information: section name: .zfmbo
            Source: SYSDM.CPL.5.drStatic PE information: section name: .zlvv
            Source: SYSDM.CPL.5.drStatic PE information: section name: .cxtrm
            Source: SYSDM.CPL.5.drStatic PE information: section name: .ulxwjx
            Source: SYSDM.CPL.5.drStatic PE information: section name: .dhdaub
            Source: SYSDM.CPL.5.drStatic PE information: section name: .mwbsl
            Source: SYSDM.CPL.5.drStatic PE information: section name: .tnjoaa
            Source: SYSDM.CPL.5.drStatic PE information: section name: .xbwa
            Source: SYSDM.CPL.5.drStatic PE information: section name: .ahxqcx
            Source: SYSDM.CPL.5.drStatic PE information: section name: .prqysb
            Source: SYSDM.CPL.5.drStatic PE information: section name: .piajju
            Source: SYSDM.CPL.5.drStatic PE information: section name: .ncu
            Source: SYSDM.CPL.5.drStatic PE information: section name: .pmgfro
            Source: SYSDM.CPL.5.drStatic PE information: section name: .xjbky
            Source: SYSDM.CPL.5.drStatic PE information: section name: .iypg
            Source: SYSDM.CPL.5.drStatic PE information: section name: .icnjt
            Source: SYSDM.CPL.5.drStatic PE information: section name: .ayz
            Source: SYSDM.CPL.5.drStatic PE information: section name: .jirq
            Source: SYSDM.CPL.5.drStatic PE information: section name: .xfw
            Source: VERSION.dll.5.drStatic PE information: section name: .qkm
            Source: VERSION.dll.5.drStatic PE information: section name: .cvjb
            Source: VERSION.dll.5.drStatic PE information: section name: .tlmkv
            Source: VERSION.dll.5.drStatic PE information: section name: .wucsxe
            Source: VERSION.dll.5.drStatic PE information: section name: .fltwtj
            Source: VERSION.dll.5.drStatic PE information: section name: .sfplio
            Source: VERSION.dll.5.drStatic PE information: section name: .rpg
            Source: VERSION.dll.5.drStatic PE information: section name: .bewzc
            Source: VERSION.dll.5.drStatic PE information: section name: .vksvaw
            Source: VERSION.dll.5.drStatic PE information: section name: .wmhg
            Source: VERSION.dll.5.drStatic PE information: section name: .kswemc
            Source: VERSION.dll.5.drStatic PE information: section name: .kaxfk
            Source: VERSION.dll.5.drStatic PE information: section name: .pjf
            Source: VERSION.dll.5.drStatic PE information: section name: .retjqj
            Source: VERSION.dll.5.drStatic PE information: section name: .mizn
            Source: VERSION.dll.5.drStatic PE information: section name: .rsrub
            Source: VERSION.dll.5.drStatic PE information: section name: .fhgxfk
            Source: VERSION.dll.5.drStatic PE information: section name: .wqpbrq
            Source: VERSION.dll.5.drStatic PE information: section name: .xlhbgj
            Source: VERSION.dll.5.drStatic PE information: section name: .rzgl
            Source: VERSION.dll.5.drStatic PE information: section name: .yic
            Source: VERSION.dll.5.drStatic PE information: section name: .zfmbo
            Source: VERSION.dll.5.drStatic PE information: section name: .zlvv
            Source: VERSION.dll.5.drStatic PE information: section name: .cxtrm
            Source: VERSION.dll.5.drStatic PE information: section name: .ulxwjx
            Source: VERSION.dll.5.drStatic PE information: section name: .dhdaub
            Source: VERSION.dll.5.drStatic PE information: section name: .mwbsl
            Source: VERSION.dll.5.drStatic PE information: section name: .tnjoaa
            Source: VERSION.dll.5.drStatic PE information: section name: .xbwa
            Source: VERSION.dll.5.drStatic PE information: section name: .ahxqcx
            Source: VERSION.dll.5.drStatic PE information: section name: .prqysb
            Source: VERSION.dll.5.drStatic PE information: section name: .piajju
            Source: VERSION.dll.5.drStatic PE information: section name: .ncu
            Source: VERSION.dll.5.drStatic PE information: section name: .pmgfro
            Source: VERSION.dll.5.drStatic PE information: section name: .xjbky
            Source: VERSION.dll.5.drStatic PE information: section name: .iypg
            Source: VERSION.dll.5.drStatic PE information: section name: .icnjt
            Source: VERSION.dll.5.drStatic PE information: section name: .ayz
            Source: VERSION.dll.5.drStatic PE information: section name: .jirq
            Source: VERSION.dll.5.drStatic PE information: section name: .oygkua
            Source: newdev.dll.5.drStatic PE information: section name: .qkm
            Source: newdev.dll.5.drStatic PE information: section name: .cvjb
            Source: newdev.dll.5.drStatic PE information: section name: .tlmkv
            Source: newdev.dll.5.drStatic PE information: section name: .wucsxe
            Source: newdev.dll.5.drStatic PE information: section name: .fltwtj
            Source: newdev.dll.5.drStatic PE information: section name: .sfplio
            Source: newdev.dll.5.drStatic PE information: section name: .rpg
            Source: newdev.dll.5.drStatic PE information: section name: .bewzc
            Source: newdev.dll.5.drStatic PE information: section name: .vksvaw
            Source: newdev.dll.5.drStatic PE information: section name: .wmhg
            Source: newdev.dll.5.drStatic PE information: section name: .kswemc
            Source: newdev.dll.5.drStatic PE information: section name: .kaxfk
            Source: newdev.dll.5.drStatic PE information: section name: .pjf
            Source: newdev.dll.5.drStatic PE information: section name: .retjqj
            Source: newdev.dll.5.drStatic PE information: section name: .mizn
            Source: newdev.dll.5.drStatic PE information: section name: .rsrub
            Source: newdev.dll.5.drStatic PE information: section name: .fhgxfk
            Source: newdev.dll.5.drStatic PE information: section name: .wqpbrq
            Source: newdev.dll.5.drStatic PE information: section name: .xlhbgj
            Source: newdev.dll.5.drStatic PE information: section name: .rzgl
            Source: newdev.dll.5.drStatic PE information: section name: .yic
            Source: newdev.dll.5.drStatic PE information: section name: .zfmbo
            Source: newdev.dll.5.drStatic PE information: section name: .zlvv
            Source: newdev.dll.5.drStatic PE information: section name: .cxtrm
            Source: newdev.dll.5.drStatic PE information: section name: .ulxwjx
            Source: newdev.dll.5.drStatic PE information: section name: .dhdaub
            Source: newdev.dll.5.drStatic PE information: section name: .mwbsl
            Source: newdev.dll.5.drStatic PE information: section name: .tnjoaa
            Source: newdev.dll.5.drStatic PE information: section name: .xbwa
            Source: newdev.dll.5.drStatic PE information: section name: .ahxqcx
            Source: newdev.dll.5.drStatic PE information: section name: .prqysb
            Source: newdev.dll.5.drStatic PE information: section name: .piajju
            Source: newdev.dll.5.drStatic PE information: section name: .ncu
            Source: newdev.dll.5.drStatic PE information: section name: .pmgfro
            Source: newdev.dll.5.drStatic PE information: section name: .xjbky
            Source: newdev.dll.5.drStatic PE information: section name: .iypg
            Source: newdev.dll.5.drStatic PE information: section name: .icnjt
            Source: newdev.dll.5.drStatic PE information: section name: .ayz
            Source: newdev.dll.5.drStatic PE information: section name: .jirq
            Source: newdev.dll.5.drStatic PE information: section name: .tevex
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .qkm
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .cvjb
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .tlmkv
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .wucsxe
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .fltwtj
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .sfplio
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .rpg
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .bewzc
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .vksvaw
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .wmhg
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .kswemc
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .kaxfk
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .pjf
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .retjqj
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .mizn
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .rsrub
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .fhgxfk
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .wqpbrq
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .xlhbgj
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .rzgl
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .yic
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .zfmbo
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .zlvv
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .cxtrm
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .ulxwjx
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .dhdaub
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .mwbsl
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .tnjoaa
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .xbwa
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .ahxqcx
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .prqysb
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .piajju
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .ncu
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .pmgfro
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .xjbky
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .iypg
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .icnjt
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .ayz
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .jirq
            Source: ACTIVEDS.dll.5.drStatic PE information: section name: .wkpwg
            Source: XmlLite.dll.5.drStatic PE information: section name: .qkm
            Source: XmlLite.dll.5.drStatic PE information: section name: .cvjb
            Source: XmlLite.dll.5.drStatic PE information: section name: .tlmkv
            Source: XmlLite.dll.5.drStatic PE information: section name: .wucsxe
            Source: XmlLite.dll.5.drStatic PE information: section name: .fltwtj
            Source: XmlLite.dll.5.drStatic PE information: section name: .sfplio
            Source: XmlLite.dll.5.drStatic PE information: section name: .rpg
            Source: XmlLite.dll.5.drStatic PE information: section name: .bewzc
            Source: XmlLite.dll.5.drStatic PE information: section name: .vksvaw
            Source: XmlLite.dll.5.drStatic PE information: section name: .wmhg
            Source: XmlLite.dll.5.drStatic PE information: section name: .kswemc
            Source: XmlLite.dll.5.drStatic PE information: section name: .kaxfk
            Source: XmlLite.dll.5.drStatic PE information: section name: .pjf
            Source: XmlLite.dll.5.drStatic PE information: section name: .retjqj
            Source: XmlLite.dll.5.drStatic PE information: section name: .mizn
            Source: XmlLite.dll.5.drStatic PE information: section name: .rsrub
            Source: XmlLite.dll.5.drStatic PE information: section name: .fhgxfk
            Source: XmlLite.dll.5.drStatic PE information: section name: .wqpbrq
            Source: XmlLite.dll.5.drStatic PE information: section name: .xlhbgj
            Source: XmlLite.dll.5.drStatic PE information: section name: .rzgl
            Source: XmlLite.dll.5.drStatic PE information: section name: .yic
            Source: XmlLite.dll.5.drStatic PE information: section name: .zfmbo
            Source: XmlLite.dll.5.drStatic PE information: section name: .zlvv
            Source: XmlLite.dll.5.drStatic PE information: section name: .cxtrm
            Source: XmlLite.dll.5.drStatic PE information: section name: .ulxwjx
            Source: XmlLite.dll.5.drStatic PE information: section name: .dhdaub
            Source: XmlLite.dll.5.drStatic PE information: section name: .mwbsl
            Source: XmlLite.dll.5.drStatic PE information: section name: .tnjoaa
            Source: XmlLite.dll.5.drStatic PE information: section name: .xbwa
            Source: XmlLite.dll.5.drStatic PE information: section name: .ahxqcx
            Source: XmlLite.dll.5.drStatic PE information: section name: .prqysb
            Source: XmlLite.dll.5.drStatic PE information: section name: .piajju
            Source: XmlLite.dll.5.drStatic PE information: section name: .ncu
            Source: XmlLite.dll.5.drStatic PE information: section name: .pmgfro
            Source: XmlLite.dll.5.drStatic PE information: section name: .xjbky
            Source: XmlLite.dll.5.drStatic PE information: section name: .iypg
            Source: XmlLite.dll.5.drStatic PE information: section name: .icnjt
            Source: XmlLite.dll.5.drStatic PE information: section name: .ayz
            Source: XmlLite.dll.5.drStatic PE information: section name: .jirq
            Source: XmlLite.dll.5.drStatic PE information: section name: .hmh
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B41C00 memset,RegCreateKeyExA,RegQueryValueExA,RegCloseKey,GetSystemDirectoryA,LoadLibraryA,GetProcAddress,FreeLibrary,GetSystemDirectoryA,LocalAlloc,GetModuleFileNameA,RegCloseKey,RegSetValueExA,RegCloseKey,LocalFree,
            Source: ACTIVEDS.dll.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x1c222a
            Source: SYSDM.CPL.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x1c6d7c
            Source: newdev.dll.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x1d0fc6
            Source: VERSION.dll.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x1cf964
            Source: as0Jkr7Dca.dllStatic PE information: real checksum: 0x7d786c40 should be: 0x1c70c8
            Source: XmlLite.dll.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x1c2161
            Source: SystemPropertiesPerformance.exe.5.drStatic PE information: 0xF80C9430 [Wed Nov 16 08:45:36 2101 UTC]
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\aHDEnt\SYSDM.CPLJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\zBhEpi\InfDefaultInstall.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\mtEdnDoZJ\ACTIVEDS.dllJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\sdoKH6I6V\XmlLite.dllJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\93S1H\wextract.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\93S1H\VERSION.dllJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\aHDEnt\SystemPropertiesPerformance.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\zBhEpi\newdev.dllJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\aHDEnt\SYSDM.CPLJump to dropped file
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B415C8 CompareStringA,GetFileAttributesA,LocalAlloc,GetPrivateProfileIntA,GetPrivateProfileStringA,GetShortPathNameA,CompareStringA,LocalAlloc,LocalAlloc,GetFileAttributesA,
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E3345C StartServiceCtrlDispatcherW,GetLastError,

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Modifies the prolog of user mode functions (user mode inline hooks)Show sources
            Source: explorer.exeUser mode code has changed: module: ntdll.dll function: ZwSetEvent new code: 0xE9 0x9B 0xBB 0xB5 0x5E 0xEF
            Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\aHDEnt\SystemPropertiesPerformance.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A16F360 GetLocalTime followed by cmp: cmp r14d, 02h and CTI: jne 00007FF75A16F436h
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E54EF0 rdtsc
            Source: C:\Windows\System32\loaddll64.exeProcess information queried: ProcessInformation
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005C340 GetSystemInfo,
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005D290 FindFirstFileExW,
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B41EC0 FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E69110 ??3@YAXPEAX@Z,??3@YAXPEAX@Z,std::bad_exception::bad_exception,_CxxThrowException,FindFirstFileW,GetLastError,??3@YAXPEAX@Z,??3@YAXPEAX@Z,??3@YAXPEAX@Z,??3@YAXPEAX@Z,??3@YAXPEAX@Z,FindNextFileW,GetLastError,??3@YAXPEAX@Z,??3@YAXPEAX@Z,??3@YAXPEAX@Z,std::bad_exception::bad_exception,_CxxThrowException,std::bad_exception::bad_exception,_CxxThrowException,
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A18A104 ?_Swap_all@_Container_base0@std@@QEAAXAEAU12@@Z,FindFirstFileW,FindNextFileW,FindClose,?_Swap_all@_Container_base0@std@@QEAAXAEAU12@@Z,?_Swap_all@_Container_base0@std@@QEAAXAEAU12@@Z,
            Source: explorer.exe, 00000005.00000000.263575751.000000000871F000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
            Source: explorer.exe, 00000005.00000000.263575751.000000000871F000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000:
            Source: explorer.exe, 00000005.00000000.235243024.000000000F640000.00000004.00000001.sdmpBinary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000005.00000000.281383823.00000000088BF000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000005.00000000.230973152.0000000008640000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000005.00000000.257547400.00000000055D0000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}V*(E
            Source: explorer.exe, 00000005.00000000.263575751.000000000871F000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}~
            Source: explorer.exe, 00000005.00000000.263575751.000000000871F000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
            Source: explorer.exe, 00000005.00000000.281150556.00000000087D1000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00ices
            Source: explorer.exe, 00000005.00000000.276454121.0000000005603000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b},
            Source: explorer.exe, 00000005.00000000.231428281.00000000089DC000.00000004.00000001.sdmpBinary or memory string: Prod_VMware_SATAT
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A1628E8 GetCurrentThreadId,memset,IsDebuggerPresent,OutputDebugStringW,
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E32EF0 OutputDebugStringW,OutputDebugStringW,EventRegister,EventSetInformation,RegisterServiceCtrlHandlerW,SetServiceStatus,SetServiceStatus,GetLastError,
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B41C00 memset,RegCreateKeyExA,RegQueryValueExA,RegCloseKey,GetSystemDirectoryA,LoadLibraryA,GetProcAddress,FreeLibrary,GetSystemDirectoryA,LocalAlloc,GetModuleFileNameA,RegCloseKey,RegSetValueExA,RegCloseKey,LocalFree,
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E5F7F0 ??3@YAXPEAX@Z,??3@YAXPEAX@Z,GetFileVersionInfoSizeW,GetLastError,GetProcessHeap,HeapAlloc,GetFileVersionInfoW,??3@YAXPEAX@Z,??3@YAXPEAX@Z,??3@YAXPEAX@Z,??3@YAXPEAX@Z,??3@YAXPEAX@Z,??3@YAXPEAX@Z,HeapFree,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,_CxxThrowException,
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652E54EF0 rdtsc
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140048AC0 LdrLoadDll,FindClose,
            Source: C:\Users\user\AppData\Local\aHDEnt\SystemPropertiesPerformance.exeCode function: 24_2_00007FF7497F16E4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
            Source: C:\Users\user\AppData\Local\aHDEnt\SystemPropertiesPerformance.exeCode function: 24_2_00007FF7497F1460 SetUnhandledExceptionFilter,
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B47A80 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B47D70 SetUnhandledExceptionFilter,
            Source: C:\Users\user\AppData\Local\zBhEpi\InfDefaultInstall.exeCode function: 33_2_00007FF675B51810 SetUnhandledExceptionFilter,
            Source: C:\Users\user\AppData\Local\zBhEpi\InfDefaultInstall.exeCode function: 33_2_00007FF675B51AA4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeCode function: 36_2_00007FF652EE0304 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A184768 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeCode function: 40_2_00007FF75A184AC0 SetUnhandledExceptionFilter,

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Benign windows process drops PE filesShow sources
            Source: C:\Windows\explorer.exeFile created: SYSDM.CPL.5.drJump to dropped file
            Changes memory attributes in foreign processes to executable or writableShow sources
            Source: C:\Windows\System32\rundll32.exeMemory protected: C:\Windows\explorer.exe base: 7FFB7377EFE0 protect: page execute and read and write
            Source: C:\Windows\System32\rundll32.exeMemory protected: C:\Windows\explorer.exe base: 7FFB7377E000 protect: page execute read
            Source: C:\Windows\System32\rundll32.exeMemory protected: C:\Windows\explorer.exe base: 7FFB70FD2A20 protect: page execute and read and write
            Queues an APC in another process (thread injection)Show sources
            Source: C:\Windows\System32\rundll32.exeThread APC queued: target process: C:\Windows\explorer.exe
            Uses Atom Bombing / ProGate to inject into other processesShow sources
            Source: C:\Windows\System32\rundll32.exeAtom created: 405553565741544156488D6C24D14881EC98 0x00000000 inc eax 0x00000001 push ebp 0x00000002 push ebx 0x00000003 push esi 0x00000004 push edi 0x00000005 inc ecx 0x00000006 push esp 0x00000007 inc ecx 0x00000008 push esi 0x00000009 dec eax 0x0000000a lea ebp, dword ptr [esp-2Fh] 0x0000000e dec eax 0x0000000f sub esp, 00000098h
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\as0Jkr7Dca.dll',#1
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B412A0 GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,AllocateAndInitializeSid,EqualSid,FreeSid,LocalFree,CloseHandle,
            Source: explorer.exe, 00000005.00000000.271790848.0000000001398000.00000004.00000020.sdmpBinary or memory string: ProgmanamF
            Source: explorer.exe, 00000005.00000000.225549739.0000000001980000.00000002.00020000.sdmpBinary or memory string: Program Manager
            Source: explorer.exe, 00000005.00000000.278081643.0000000006860000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: explorer.exe, 00000005.00000000.225549739.0000000001980000.00000002.00020000.sdmpBinary or memory string: Progman
            Source: explorer.exe, 00000005.00000000.225549739.0000000001980000.00000002.00020000.sdmpBinary or memory string: Progmanlock
            Source: C:\Windows\System32\loaddll64.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\loaddll64.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\aHDEnt\SystemPropertiesPerformance.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\aHDEnt\SystemPropertiesPerformance.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\zBhEpi\InfDefaultInstall.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\zBhEpi\InfDefaultInstall.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDate
            Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Users\user\AppData\Local\aHDEnt\SystemPropertiesPerformance.exeCode function: 24_2_00007FF7497F15F0 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,GetTickCount,QueryPerformanceCounter,
            Source: C:\Users\user\AppData\Local\93S1H\wextract.exeCode function: 31_2_00007FF6A7B47510 GetVersionExA,GetSystemMetrics,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,CharNextA,

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts1Service Execution2Valid Accounts1Valid Accounts1Rootkit1Credential API Hooking1System Time Discovery11Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
            Default AccountsNative API1Windows Service3Access Token Manipulation11Masquerading11LSASS MemorySecurity Software Discovery41Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsExploitation for Client Execution1Logon Script (Windows)Windows Service3Valid Accounts1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Process Injection312Access Token Manipulation11NTDSFile and Directory Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection312LSA SecretsSystem Information Discovery26SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information3DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobRundll321Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Software Packing2/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
            Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Timestomp1Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 483806 Sample: as0Jkr7Dca Startdate: 15/09/2021 Architecture: WINDOWS Score: 100 41 Antivirus detection for dropped file 2->41 43 Antivirus / Scanner detection for submitted sample 2->43 45 Multi AV Scanner detection for submitted file 2->45 47 4 other signatures 2->47 8 loaddll64.exe 1 2->8         started        process3 process4 10 rundll32.exe 8->10         started        13 cmd.exe 1 8->13         started        15 rundll32.exe 8->15         started        17 4 other processes 8->17 signatures5 51 Changes memory attributes in foreign processes to executable or writable 10->51 53 Uses Atom Bombing / ProGate to inject into other processes 10->53 55 Queues an APC in another process (thread injection) 10->55 19 explorer.exe 2 46 10->19 injected 23 rundll32.exe 13->23         started        process6 file7 33 C:\Users\user\AppData\Local\...\newdev.dll, PE32+ 19->33 dropped 35 C:\Users\user\AppData\Local\...\XmlLite.dll, PE32+ 19->35 dropped 37 C:\Users\user\AppData\Local\...\ACTIVEDS.dll, PE32+ 19->37 dropped 39 7 other files (2 malicious) 19->39 dropped 49 Benign windows process drops PE files 19->49 25 wextract.exe 19->25         started        27 SystemPropertiesPerformance.exe 19->27         started        29 InfDefaultInstall.exe 19->29         started        31 8 other processes 19->31 signatures8 process9

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            as0Jkr7Dca.dll65%VirustotalBrowse
            as0Jkr7Dca.dll63%MetadefenderBrowse
            as0Jkr7Dca.dll76%ReversingLabsWin64.Infostealer.Dridex
            as0Jkr7Dca.dll100%AviraHEUR/AGEN.1114452
            as0Jkr7Dca.dll100%Joe Sandbox ML

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\93S1H\VERSION.dll100%AviraTR/Crypt.ZPACK.Gen
            C:\Users\user\AppData\Local\zBhEpi\newdev.dll100%AviraTR/Crypt.ZPACK.Gen
            C:\Users\user\AppData\Local\sdoKH6I6V\XmlLite.dll100%AviraHEUR/AGEN.1114452
            C:\Users\user\AppData\Local\aHDEnt\SYSDM.CPL100%AviraHEUR/AGEN.1114452
            C:\Users\user\AppData\Local\mtEdnDoZJ\ACTIVEDS.dll100%AviraTR/Crypt.ZPACK.Gen
            C:\Users\user\AppData\Local\93S1H\VERSION.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\zBhEpi\newdev.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\sdoKH6I6V\XmlLite.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\aHDEnt\SYSDM.CPL100%Joe Sandbox ML
            C:\Users\user\AppData\Local\mtEdnDoZJ\ACTIVEDS.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\93S1H\wextract.exe0%MetadefenderBrowse
            C:\Users\user\AppData\Local\93S1H\wextract.exe0%ReversingLabs

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            3.2.rundll32.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            4.2.rundll32.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            36.2.AgentService.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            10.2.rundll32.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            6.2.rundll32.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            11.2.rundll32.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            33.2.InfDefaultInstall.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            9.2.rundll32.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            40.2.MusNotificationUx.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            31.2.wextract.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            24.2.SystemPropertiesPerformance.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            8.2.rundll32.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            1.2.loaddll64.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File

            Domains

            No Antivirus matches

            URLs

            No Antivirus matches

            Domains and IPs

            Contacted Domains

            No contacted domains info

            Contacted IPs

            No contacted IP infos

            General Information

            Joe Sandbox Version:33.0.0 White Diamond
            Analysis ID:483806
            Start date:15.09.2021
            Start time:14:10:04
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 12m 10s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:as0Jkr7Dca (renamed file extension from none to dll)
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:41
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.evad.winDLL@39/11@0/0
            EGA Information:Failed
            HDC Information:
            • Successful, ratio: 21.3% (good quality ratio 15.6%)
            • Quality average: 56.8%
            • Quality standard deviation: 41.4%
            HCA Information:Failed
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size exceeded maximum capacity and may have missing disassembly code.
            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
            • Report size getting too big, too many NtEnumerateKey calls found.

            Simulations

            Behavior and APIs

            No simulations

            Joe Sandbox View / Context

            IPs

            No context

            Domains

            No context

            ASN

            No context

            JA3 Fingerprints

            No context

            Dropped Files

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            C:\Users\user\AppData\Local\93S1H\wextract.exe1ZDvfs8V0D.dllGet hashmaliciousBrowse
              wcznOgZTte.dllGet hashmaliciousBrowse
                rw1rIJwmAS.dllGet hashmaliciousBrowse
                  TqlCGOVEZP.dllGet hashmaliciousBrowse
                    7WdMW4Ymc1.dllGet hashmaliciousBrowse
                      0X9l73Vb5z.dllGet hashmaliciousBrowse
                        NjwL3NrDrW.dllGet hashmaliciousBrowse
                          YBRbMTGUds.dllGet hashmaliciousBrowse
                            d8uRzO65MV.dllGet hashmaliciousBrowse
                              DmWsKQsM7h.dllGet hashmaliciousBrowse
                                Kvej20Rt10.dllGet hashmaliciousBrowse
                                  amuRh7FM34.dllGet hashmaliciousBrowse
                                    SKxlNMmOyq.dllGet hashmaliciousBrowse
                                      ToKj8SNY1z.dllGet hashmaliciousBrowse
                                        xrOL2DmgPE.dllGet hashmaliciousBrowse
                                          I8uXlbsgKo.dllGet hashmaliciousBrowse
                                            7kUzYvQJa3.dllGet hashmaliciousBrowse
                                              iVCBS1RK8I.dllGet hashmaliciousBrowse
                                                Nq3S9OPbyF.dllGet hashmaliciousBrowse
                                                  PkAFy4LsQ2.dllGet hashmaliciousBrowse

                                                    Created / dropped Files

                                                    C:\Users\user\AppData\Local\93S1H\VERSION.dll
                                                    Process:C:\Windows\explorer.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1843200
                                                    Entropy (8bit):4.000632304333121
                                                    Encrypted:false
                                                    SSDEEP:12288:oVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:9fP7fWsK5z9A+WGAW+V5SB6Ct4bnb
                                                    MD5:231DCA713E3AF5B9FF59A8C6EA0A6D3D
                                                    SHA1:534257B06D51F76AB94E7D8A9F450ECC526704AF
                                                    SHA-256:8E2140CA0EE76F82C3A975A2E25542C58A47AD30F0497B241D5B5FF5347973AB
                                                    SHA-512:B9A7EAFA4192CE34654172CF41EF3E0965C229EB36EFE5A1B485A2EDA24F52BB9CAB776EBC3DFDA10E90E3EDA1559E1F785F19D7699D760816C9EE365ED93B15
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d....DN^.........." ................p..........@............................. ......@lx}..b.............................................+....c..........h.......................$#................................................... ...............................text............................... ..`.rdata..,O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
                                                    C:\Users\user\AppData\Local\93S1H\wextract.exe
                                                    Process:C:\Windows\explorer.exe
                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):143872
                                                    Entropy (8bit):6.942627183104786
                                                    Encrypted:false
                                                    SSDEEP:3072:0BuGag041hcWp1icKAArDZz4N9GhbkUNEk95l:5hudp0yN90vE
                                                    MD5:ED93B350C8EEFC442758A00BC3EEDE2D
                                                    SHA1:ADD14417939801C555BBBFFAF7388BD13DE2DE42
                                                    SHA-256:ABD6D466E30626636D380A3C9FCC0D0B909C450F8EA74D8963881D7C46335CED
                                                    SHA-512:7BA8D1411D9AEE3447494E248005A43F522CA684839FCD4C4592946B12DC4E73B1FF86D8E843B25A73E3F2463955815470304E4F219B36DBC94870BEBF700581
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: Metadefender, Detection: 0%, Browse
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Joe Sandbox View:
                                                    • Filename: 1ZDvfs8V0D.dll, Detection: malicious, Browse
                                                    • Filename: wcznOgZTte.dll, Detection: malicious, Browse
                                                    • Filename: rw1rIJwmAS.dll, Detection: malicious, Browse
                                                    • Filename: TqlCGOVEZP.dll, Detection: malicious, Browse
                                                    • Filename: 7WdMW4Ymc1.dll, Detection: malicious, Browse
                                                    • Filename: 0X9l73Vb5z.dll, Detection: malicious, Browse
                                                    • Filename: NjwL3NrDrW.dll, Detection: malicious, Browse
                                                    • Filename: YBRbMTGUds.dll, Detection: malicious, Browse
                                                    • Filename: d8uRzO65MV.dll, Detection: malicious, Browse
                                                    • Filename: DmWsKQsM7h.dll, Detection: malicious, Browse
                                                    • Filename: Kvej20Rt10.dll, Detection: malicious, Browse
                                                    • Filename: amuRh7FM34.dll, Detection: malicious, Browse
                                                    • Filename: SKxlNMmOyq.dll, Detection: malicious, Browse
                                                    • Filename: ToKj8SNY1z.dll, Detection: malicious, Browse
                                                    • Filename: xrOL2DmgPE.dll, Detection: malicious, Browse
                                                    • Filename: I8uXlbsgKo.dll, Detection: malicious, Browse
                                                    • Filename: 7kUzYvQJa3.dll, Detection: malicious, Browse
                                                    • Filename: iVCBS1RK8I.dll, Detection: malicious, Browse
                                                    • Filename: Nq3S9OPbyF.dll, Detection: malicious, Browse
                                                    • Filename: PkAFy4LsQ2.dll, Detection: malicious, Browse
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........e...............`.......`.......`.......`..........,....`.......`0......`......Rich............................PE..d...._.{.........."......r...........w.........@.....................................R....`.......... .......................................................................... .......T............................................... ............................text....q.......r.................. ..`.rdata...".......$...v..............@..@.data...............................@....pdata..............................@..@.rsrc...............................@..@.reloc.. ............0..............@..B................................................................................................................................................................................................................................................................
                                                    C:\Users\user\AppData\Local\aHDEnt\SYSDM.CPL
                                                    Process:C:\Windows\explorer.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1843200
                                                    Entropy (8bit):4.000066746295471
                                                    Encrypted:false
                                                    SSDEEP:12288:5VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:4fP7fWsK5z9A+WGAW+V5SB6Ct4bnb
                                                    MD5:F8B8EEC4E2EC6D3CD106DBEBB3A409F1
                                                    SHA1:6F9E2D9926810B1D5F243A6A77247CFE3D6B9A96
                                                    SHA-256:DE0AF5785D768F96A601395F8A344C12158CF9B9E48034FC9F071D449AF23BFF
                                                    SHA-512:0D22F9D06EB4B495D7130F0254292166E3578404A94C4E1555F763DACD58D48AB53884EF06C7578EE306AC56073703E9E04F129552620F9E5C5EC84A047A853E
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d....DN^.........." ................p..........@............................. ......@lx}..b..................................................c..........h.......................$#................................................... ...............................text............................... ..`.rdata..,O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
                                                    C:\Users\user\AppData\Local\aHDEnt\SystemPropertiesPerformance.exe
                                                    Process:C:\Windows\explorer.exe
                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):83968
                                                    Entropy (8bit):7.071848641739436
                                                    Encrypted:false
                                                    SSDEEP:1536:5MVEZnXtREC/rMcgEPJV+G57ThjEC0kzJP+V5J9:3XzECTMpuDhjRVJGf
                                                    MD5:F325976CDC0F7E9C680B51B35D24D23A
                                                    SHA1:8BA00280B451378802DD2A06BB139B8BEA78C90C
                                                    SHA-256:E24A61B15FD191DDC8A2CA82E22A759609E6099A832ADE0B5C0C6E0F1ABB05FE
                                                    SHA-512:9D65A154758B5C38C09AACA1BB51E53FE6E8DEA374EAD88AEA33AB41525B3BB180211D6F6C93CA112197F7455842228960699DF471F47EE83DBC6CA59A5166EC
                                                    Malicious:false
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......E.v..c...c...c.......c..n....c..n....c..n....c..n....c...c.."c..n....c..n...c..n....c..Rich.c..................PE..d...0............."..........>.................@.....................................s....`.......... ......................................<&.......P..P'...@.................. ....#..T............................ ...............!..H............................text............................... ..`.rdata....... ......................@..@.data........0......................@....pdata.......@......................@..@.rsrc...P'...P...(..................@..@.reloc.. ............F..............@..B................................................................................................................................................................................................................................................................
                                                    C:\Users\user\AppData\Local\mtEdnDoZJ\ACTIVEDS.dll
                                                    Process:C:\Windows\explorer.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1843200
                                                    Entropy (8bit):4.00193479506793
                                                    Encrypted:false
                                                    SSDEEP:12288:IVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:dfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
                                                    MD5:3C121F3B05CFB5E241A04F3B9CEBC7DF
                                                    SHA1:FCE2403A1C4CF2996AAABE36060DF7456CC67F14
                                                    SHA-256:75408D241F864808726F3FF83F98A86C3B3634E9B9B06AC00240CCBC4D7D803E
                                                    SHA-512:D138B6594FA35799CB15B62D855AF367FEF35DE8119BB3048D10F19515EF3C7D198C0725235CE1B68068E4820BAC871C3C237E2EB2634B6161C9506328C5E422
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d....DN^.........." ................p..........@............................. ......@lx}..b.............................................y....c..........h.......................$#................................................... ...............................text............................... ..`.rdata..,O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
                                                    C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exe
                                                    Process:C:\Windows\explorer.exe
                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1189376
                                                    Entropy (8bit):6.169931271903684
                                                    Encrypted:false
                                                    SSDEEP:24576:+pL4Q4y94x7ZWe6b1B5I2M62kM0s1vt2txc/viVO1IORNfLc:uL4Q3S9b6b1UA9MPwOR5c
                                                    MD5:F7E36C20DB953DFF4FDDB817904C0E48
                                                    SHA1:8C6117B5DD68D397FD7C32F4746FB9B353D5DAE5
                                                    SHA-256:2C5EDE0807D8A5EC4B6E0FE0C308B37DBBDE12714FD9ADC4CE3EF4E0A5692207
                                                    SHA-512:32333A33DECD1AF0915FFDC48DA99831DA345010A91630C5245F2548939E33157F6151F596C09D0BEEAC3F15F08F79D4EEF4FAA4158BA023DEDFC4F6F6F56DF8
                                                    Malicious:false
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........:K..[%M.[%M.[%M.?&L.[%M.? L.[%M.?!L.[%M.?$L.[%M.[$M.Z%M.?,L.[%M.?.M.[%M.?'L.[%MRich.[%M........................PE..d...m.>l.........."..........B.................@.....................................=....`.......... ...............................................P.. ........x...........`..`...p-..T...................pI..(...pH...............I...............................text...L........................... ..`.rdata..| ......."..................@..@.data...@....@...r..."..............@....pdata...x.......z..................@..@.rsrc... ....P......................@..@.reloc..`....`......................@..B................................................................................................................................................................................................................................................................
                                                    C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exe
                                                    Process:C:\Windows\explorer.exe
                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):319488
                                                    Entropy (8bit):6.069929843481676
                                                    Encrypted:false
                                                    SSDEEP:6144:NRq8Ez5tCqd6Nr6/TWeRhUz/vMNuEob69hbF1m0lpVGMD8i3ZdTgDt0kcRkdXgl6:NRquQ/TWeRhUz/vMNuEob69hBblHGu3t
                                                    MD5:114A55D75AC7447F012B6D8EC8B1F7FC
                                                    SHA1:37D5636D940D0A948000B94C84AD6C41162E593F
                                                    SHA-256:E188143729B044955881302631BE577381B05B67E9899E09DB3573156719C70E
                                                    SHA-512:446FD3024710E6994A0085CF3ADC0E395BE131898D7D932B383A19981C41637D27D9DABFB2177DBB62375CF4CCFC13722F5B828FF0FA9BB691F220A73D035586
                                                    Malicious:false
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........0.m.Q.>.Q.>.Q.>.)E>.Q.>.5.?.Q.>.5.?.Q.>.Q.>+Q.>.5.?.Q.>.5.?.Q.>.5.?.Q.>.5)>.Q.>.5.?.Q.>Rich.Q.>........PE..d...O.Uf.........."..........(.......E.........@.............................@......e}............... ......................................8...\.... ..........x............0..........T............................................................................text...L........................... ..`.imrsiv..................................rdata..L...........................@..@.data...............................@....pdata..x...........................@..@.didat..x...........................@....rsrc........ ......................@..@.reloc.......0......................@..B........................................................................................................................................................................................
                                                    C:\Users\user\AppData\Local\sdoKH6I6V\XmlLite.dll
                                                    Process:C:\Windows\explorer.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1843200
                                                    Entropy (8bit):3.999633549270146
                                                    Encrypted:false
                                                    SSDEEP:12288:zVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:ifP7fWsK5z9A+WGAW+V5SB6Ct4bnb
                                                    MD5:07A6C3706C5EDE8D7B800595B85C75C0
                                                    SHA1:2BF465E5939CFDE9316288A7B44A7C3109E8F142
                                                    SHA-256:576020032ACA724E35D51566BF3AE6DBA58B3900CE92424C0113822AFCE9BFE8
                                                    SHA-512:0A3C048F2A1D5442CCDD819A5832F62B77DCED3BCB35452606242AA782B8495B37AD052464B531A3279B9D65E405D34CCA412FFFE3B326308AE38077F2DF7BA6
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d....DN^.........." ................p..........@............................. ......@lx}..b..................................................c..........h.......................$#................................................... ...............................text............................... ..`.rdata..,O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
                                                    C:\Users\user\AppData\Local\zBhEpi\InfDefaultInstall.exe
                                                    Process:C:\Windows\explorer.exe
                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):13312
                                                    Entropy (8bit):4.871127662725052
                                                    Encrypted:false
                                                    SSDEEP:192:kXe0PT5V21py9AA/lvmBfXWqFwO6Wdz3ios9aW/GW:kXe5pgAMhAXWq6OFZcaW/GW
                                                    MD5:5FDB30927E9D4387D777443BF865EEFD
                                                    SHA1:E802BE85298183F050141EAEB87930657A8E07A6
                                                    SHA-256:C57CE112AB04B00CC7270B6D76F005FFB8E2ED3ADC6904CF5C5F184EE077FA32
                                                    SHA-512:776F5B5640C22373E641DE4C3C6F4C7DFF0CD39662108B8DFA070EE0A867B3A6401976BD2B78BC766D469105AF2E6E466C4140FFE40C49146BB6B09591676773
                                                    Malicious:false
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............mo..mo..mo..j..mo..l..mo..k..mo..n..mo..mn..mo..g..mo.....mo..m..mo.Rich.mo.........PE..d......K.........."..........&......@..........@.............................p......?:....`.......... .......................................&.......P.......@...............`.. ....#..T............................ ...............!...............................text...@........................... ..`.rdata....... ......................@..@.data........0....... ..............@....pdata.......@......."..............@..@.rsrc........P.......$..............@..@.reloc.. ....`.......2..............@..B................................................................................................................................................................................................................................................................................
                                                    C:\Users\user\AppData\Local\zBhEpi\newdev.dll
                                                    Process:C:\Windows\explorer.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1843200
                                                    Entropy (8bit):4.001912316845432
                                                    Encrypted:false
                                                    SSDEEP:12288:SVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:PfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
                                                    MD5:2895B7156F5710663CE777AC1D00735C
                                                    SHA1:AAA461022C45BD9388A62E3A52402B577114C681
                                                    SHA-256:669180A012AEBBFFBAB792145472789888DC63622C06596D98A132AD320F00B6
                                                    SHA-512:1EECB5F7584F5B5C31A2797A3CF395E02DC47B4B72F7032431D7A7B66DBBE12B8A2F8FB5FE52C2A200B91AF348CDD8FCDD99A58F67E9DFAEF312D1D434136029
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d....DN^.........." ................p..........@............................. ......@lx}..b.............................................]....c..........h.......................$#................................................... ...............................text............................... ..`.rdata..,O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
                                                    C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\414045e2d09286d5db2581e0d955d358_d06ed635-68f6-4e9a-955c-4899f5f57b9a
                                                    Process:C:\Windows\explorer.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):4442
                                                    Entropy (8bit):5.4731312099954454
                                                    Encrypted:false
                                                    SSDEEP:48:FsIUioQudB51LC9Dow2WQQsIUn3jKj7kEVezX1QleM1S1egrAz:FzCC9DDzCIfM1ELAs
                                                    MD5:23FD7C8AE8B0C82950EA13BB2A91B052
                                                    SHA1:D6146E6015C7BF14BC74B21E0A41EA24B6D1B2B9
                                                    SHA-256:64CA4235F7CD686054B5DEABA770F484D4AA50097E8F68C6DF5B88AF5206CD8A
                                                    SHA-512:16F2ADB1AA9B6E892467BACD1C8145F0AC2BF3FD417EB955342543BA1106679307DC13ADF157B50E599280E373DB41824FBFFB4B5E81C8678CDF40B883742144
                                                    Malicious:false
                                                    Preview: ........................................user.........................................user.....................RSA1................]...Ayr.r.}92"..C.Q..u..J..TA....O..cb.O..F...>=q.%.......0,.@C...9...(...n@.&...$3.._[<..rau.a}<.......}:.!?mX......1x.....................z..O.......V@~M.mG..1...^.....,...C.r.y.p.t.o.A.P.I. .P.r.i.v.a.t.e. .K.e.y....f...... .....9.d...i~k5W.PZ.o.cy.Y.i...s............. ...Q..!.qt..\.T...{=..O.&+b.k..+#(p......uW...[..L....c%.W..Z.4.z....P.S.p&...?..!...].l.-.S.\..bA....>`....d..Y.#...@.'~-_.."...^...b.8...Q..d..p..u.a_....4......0P..q...zNh./...>V...fa....4......v...8...2...c.Hz.)..t...i?\..C%U8""..}....+ZW@..k....aa.4.Y.E....u. ....M.....}...C..{+.=up....f).=CbW.....{Z....ia%.X.5Yj..J.kQ........P]..S.[.?.&...0.@.,.o.".K...k.....N.IO.oJS..{D.#.{.e?.OL;wN.4.B.._1CB..../....Mn..}Q...X...5..B=...Y..Ov.B..3.>...U..o0.U..V....+f-.z-..B.D|.r%.T...e...N.K\.7UN3.!CSo]...9..bR....iP......u.....1.V...G_.....U>.*6A..2f...0E..D..#

                                                    Static File Info

                                                    General

                                                    File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Entropy (8bit):4.006875648254455
                                                    TrID:
                                                    • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                                                    • Win64 Executable (generic) (12005/4) 10.17%
                                                    • Generic Win/DOS Executable (2004/3) 1.70%
                                                    • DOS Executable Generic (2002/1) 1.70%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                                                    File name:as0Jkr7Dca.dll
                                                    File size:1839104
                                                    MD5:3839da365172e8011da03c3ef023c33c
                                                    SHA1:060aaed3fe83b9333dbd19ac22471cc8ded3c9f8
                                                    SHA256:2356048d0182a32df2892b64db99f58634681c33cb0104a3ad3b62510a534454
                                                    SHA512:a08eb80a03635cb1491ab918cfa62f9f555d3cfc3e5051ced77abffdd72e5e0f3bbeb4c52d9a5d1caad5b4aa63a8b8800b3f1fb04aa2c163f13e54008a1e3691
                                                    SSDEEP:12288:RVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:gfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|.

                                                    File Icon

                                                    Icon Hash:74f0e4ecccdce0e4

                                                    Static PE Info

                                                    General

                                                    Entrypoint:0x140041070
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x140000000
                                                    Subsystem:windows cui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
                                                    DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                                    Time Stamp:0x5E4E44CC [Thu Feb 20 08:35:24 2020 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:5
                                                    OS Version Minor:0
                                                    File Version Major:5
                                                    File Version Minor:0
                                                    Subsystem Version Major:5
                                                    Subsystem Version Minor:0
                                                    Import Hash:6668be91e2c948b183827f040944057f

                                                    Entrypoint Preview

                                                    Instruction
                                                    dec eax
                                                    xor eax, eax
                                                    dec eax
                                                    add eax, 5Ah
                                                    dec eax
                                                    mov dword ptr [00073D82h], ecx
                                                    dec eax
                                                    lea ecx, dword ptr [FFFFECABh]
                                                    dec eax
                                                    mov dword ptr [00073D7Ch], edx
                                                    dec eax
                                                    add eax, ecx
                                                    dec esp
                                                    mov dword ptr [00073D92h], ecx
                                                    dec esp
                                                    mov dword ptr [00073DA3h], ebp
                                                    dec esp
                                                    mov dword ptr [00073D7Ch], eax
                                                    dec esp
                                                    mov dword ptr [00073D85h], edi
                                                    dec esp
                                                    mov dword ptr [00073D86h], esi
                                                    dec esp
                                                    mov dword ptr [00073D8Fh], esp
                                                    dec eax
                                                    mov ecx, eax
                                                    dec eax
                                                    sub ecx, 5Ah
                                                    dec eax
                                                    mov dword ptr [00073D89h], esi
                                                    dec eax
                                                    test eax, eax
                                                    je 00007FA488AF085Fh
                                                    dec eax
                                                    mov dword ptr [00073D45h], esp
                                                    dec eax
                                                    mov dword ptr [00073D36h], ebp
                                                    dec eax
                                                    mov dword ptr [00073D7Fh], ebx
                                                    dec eax
                                                    mov dword ptr [00073D70h], edi
                                                    dec eax
                                                    test eax, eax
                                                    je 00007FA488AF083Eh
                                                    jmp ecx
                                                    dec eax
                                                    add edi, ecx
                                                    dec eax
                                                    mov dword ptr [FFFFEC37h], ecx
                                                    dec eax
                                                    xor ecx, eax
                                                    jmp ecx
                                                    retn 0008h
                                                    ud2
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    push ebx
                                                    dec eax
                                                    sub esp, 00000080h
                                                    mov eax, F957B016h
                                                    mov byte ptr [esp+7Fh], 00000037h
                                                    mov edx, dword ptr [esp+78h]
                                                    inc ecx
                                                    mov eax, edx
                                                    inc ecx
                                                    or eax, 5D262B0Ch
                                                    inc esp
                                                    mov dword ptr [esp+78h], eax
                                                    dec eax
                                                    mov dword ptr [eax+eax+00h], 00000000h

                                                    Rich Headers

                                                    Programming Language:
                                                    • [LNK] VS2012 UPD4 build 61030
                                                    • [ASM] VS2013 UPD2 build 30501
                                                    • [ C ] VS2012 UPD2 build 60315
                                                    • [C++] VS2013 UPD4 build 31101
                                                    • [RES] VS2012 UPD3 build 60610
                                                    • [LNK] VS2017 v15.5.4 build 25834
                                                    • [ C ] VS2017 v15.5.4 build 25834
                                                    • [ASM] VS2010 build 30319
                                                    • [EXP] VS2015 UPD1 build 23506
                                                    • [IMP] VS2008 SP1 build 30729
                                                    • [RES] VS2012 UPD4 build 61030
                                                    • [LNK] VS2012 UPD2 build 60315
                                                    • [C++] VS2015 UPD1 build 23506
                                                    • [ C ] VS2013 UPD4 build 31101

                                                    Data Directories

                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x1c00100x12e.jirq
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xa63900xa0.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xc00000x468.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xc10000x2324.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x420000xc0.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                    Sections

                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x407960x41000False0.776085486779data7.73364605679IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                    .rdata0x420000x64f2c0x65000False0.702390160891data7.86574512659IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0xa70000x178b80x18000False0.0694580078125data3.31515306295IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                    .pdata0xbf0000x12c0x1000False0.06005859375PEX Binary Archive0.581723022719IMAGE_SCN_TYPE_DSECT, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .rsrc0xc00000x8800x1000False0.139892578125data1.23838501563IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0xc10000x23240x3000False0.0498046875data4.65321444248IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    .qkm0xc40000x74a0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .cvjb0xc50000x1e660x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .tlmkv0xc70000xbde0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .wucsxe0xc80000x451740x46000False0.0010498046875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .fltwtj0x10e0000x12670x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .sfplio0x1100000x7360x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .rpg0x1110000x451740x46000False0.0010498046875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .bewzc0x1570000x11240x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .vksvaw0x1590000x7360x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .wmhg0x15a0000x12780x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .kswemc0x15c0000x36d0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .kaxfk0x15d0000x197d0x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .pjf0x15f0000xbde0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .retjqj0x1600000x7fd0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .mizn0x1610000x9cd0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .rsrub0x1620000x197d0x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .fhgxfk0x1640000x451740x46000False0.0010498046875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .wqpbrq0x1aa0000x23b0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .xlhbgj0x1ab0000xebe0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .rzgl0x1ac0000xbde0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .yic0x1ad0000x1f70x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .zfmbo0x1ae0000x1af0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .zlvv0x1af0000x8960x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .cxtrm0x1b00000x1af0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .ulxwjx0x1b10000xbde0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .dhdaub0x1b20000x13e0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .mwbsl0x1b30000xbf60x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .tnjoaa0x1b40000x23b0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .xbwa0x1b50000x23b0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .ahxqcx0x1b60000x8fe0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .prqysb0x1b70000x1af0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .piajju0x1b80000x197d0x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .ncu0x1ba0000xbde0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .pmgfro0x1bb0000x8960x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .xjbky0x1bc0000x5a70x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .iypg0x1bd0000x8fe0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .icnjt0x1be0000xd330x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .ayz0x1bf0000x13e0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .jirq0x1c00000x13e0x1000False0.046142578125data0.622589876329IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                                    Resources

                                                    NameRVASizeTypeLanguageCountry
                                                    RT_VERSION0xc00a00x370dataEnglishUnited States
                                                    RT_MANIFEST0xc04100x56ASCII text, with CRLF line terminatorsEnglishUnited States

                                                    Imports

                                                    DLLImport
                                                    USER32.dllLookupIconIdFromDirectoryEx, WaitForInputIdle, GetParent, GetFocus
                                                    SETUPAPI.dllCM_Get_Resource_Conflict_DetailsW
                                                    KERNEL32.dllDeleteCriticalSection, DeleteTimerQueue, TerminateJobObject, GetFileInformationByHandle, GetThreadLocale, GetNamedPipeServerProcessId, GetConsoleFontSize
                                                    GDI32.dllCreateBitmapIndirect, GetPolyFillMode
                                                    CRYPT32.dllCertGetCTLContextProperty
                                                    ADVAPI32.dllAddAccessDeniedObjectAce
                                                    SHLWAPI.dllChrCmpIW

                                                    Exports

                                                    NameOrdinalAddress
                                                    CreateXmlReader10x14002dd64
                                                    CreateXmlReaderInputWithEncodingCodePage20x140001e9c
                                                    CreateXmlReaderInputWithEncodingName30x1400105a8
                                                    CreateXmlWriter40x14001a390
                                                    CreateXmlWriterOutputWithEncodingCodePage50x14002c420
                                                    CreateXmlWriterOutputWithEncodingName60x140039c58

                                                    Version Infos

                                                    DescriptionData
                                                    LegalCopyright Microsoft Corporation. All rights reserv
                                                    InternalNamebitsp
                                                    FileVersion7.5.7600.16385 (win7_rtm.090713-
                                                    CompanyNameMicrosoft Corporati
                                                    ProductNameMicrosoft Windows Operating S
                                                    ProductVersion6.1.7600
                                                    FileDescriptionBackground Intellig
                                                    OriginalFilenamekbdy
                                                    Translation0x0409 0x04b0

                                                    Possible Origin

                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishUnited States

                                                    Network Behavior

                                                    No network behavior found

                                                    Code Manipulations

                                                    User Modules

                                                    Hook Summary

                                                    Function NameHook TypeActive in Processes
                                                    ZwSetEventINLINEexplorer.exe
                                                    RtlAllocateMemoryBlockLookasideINLINEexplorer.exe
                                                    RtlAllocateMemoryZoneINLINEexplorer.exe
                                                    NtSetEventINLINEexplorer.exe

                                                    Processes

                                                    Process: explorer.exe, Module: ntdll.dll
                                                    Function NameHook TypeNew Data
                                                    ZwSetEventINLINE0xE9 0x9B 0xBB 0xB5 0x5E 0xEF
                                                    RtlAllocateMemoryBlockLookasideINLINE0x00 0x00 0x00 0x00 0x00 0x00
                                                    RtlAllocateMemoryZoneINLINE0x00 0x00 0x00 0x00 0x00 0x00
                                                    NtSetEventINLINE0xE9 0x9B 0xBB 0xB5 0x5E 0xEF

                                                    Statistics

                                                    Behavior

                                                    Click to jump to process

                                                    System Behavior

                                                    General

                                                    Start time:14:10:58
                                                    Start date:15/09/2021
                                                    Path:C:\Windows\System32\loaddll64.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:loaddll64.exe 'C:\Users\user\Desktop\as0Jkr7Dca.dll'
                                                    Imagebase:0x7ff6c4550000
                                                    File size:140288 bytes
                                                    MD5 hash:A84133CCB118CF35D49A423CD836D0EF
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000001.00000002.266033860.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
                                                    Reputation:high

                                                    General

                                                    Start time:14:10:59
                                                    Start date:15/09/2021
                                                    Path:C:\Windows\System32\cmd.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\as0Jkr7Dca.dll',#1
                                                    Imagebase:0x7ff77d8b0000
                                                    File size:273920 bytes
                                                    MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    General

                                                    Start time:14:10:59
                                                    Start date:15/09/2021
                                                    Path:C:\Windows\System32\rundll32.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlReader
                                                    Imagebase:0x7ff7c8080000
                                                    File size:69632 bytes
                                                    MD5 hash:73C519F050C20580F8A62C849D49215A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000003.00000002.334750401.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
                                                    Reputation:high

                                                    General

                                                    Start time:14:10:59
                                                    Start date:15/09/2021
                                                    Path:C:\Windows\System32\rundll32.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:rundll32.exe 'C:\Users\user\Desktop\as0Jkr7Dca.dll',#1
                                                    Imagebase:0x7ff7c8080000
                                                    File size:69632 bytes
                                                    MD5 hash:73C519F050C20580F8A62C849D49215A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000004.00000002.222388463.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
                                                    Reputation:high

                                                    General

                                                    Start time:14:11:02
                                                    Start date:15/09/2021
                                                    Path:C:\Windows\explorer.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\Explorer.EXE
                                                    Imagebase:0x7ff714890000
                                                    File size:3933184 bytes
                                                    MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    General

                                                    Start time:14:11:02
                                                    Start date:15/09/2021
                                                    Path:C:\Windows\System32\rundll32.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlReaderInputWithEncodingCodePage
                                                    Imagebase:0x7ff7c8080000
                                                    File size:69632 bytes
                                                    MD5 hash:73C519F050C20580F8A62C849D49215A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000006.00000002.227069993.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
                                                    Reputation:high

                                                    General

                                                    Start time:14:11:06
                                                    Start date:15/09/2021
                                                    Path:C:\Windows\System32\rundll32.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlReaderInputWithEncodingName
                                                    Imagebase:0x7ff7c8080000
                                                    File size:69632 bytes
                                                    MD5 hash:73C519F050C20580F8A62C849D49215A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000008.00000002.236556937.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
                                                    Reputation:high

                                                    General

                                                    Start time:14:11:10
                                                    Start date:15/09/2021
                                                    Path:C:\Windows\System32\rundll32.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlWriter
                                                    Imagebase:0x7ff7c8080000
                                                    File size:69632 bytes
                                                    MD5 hash:73C519F050C20580F8A62C849D49215A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000009.00000002.245117610.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
                                                    Reputation:high

                                                    General

                                                    Start time:14:11:14
                                                    Start date:15/09/2021
                                                    Path:C:\Windows\System32\rundll32.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlWriterOutputWithEncodingCodePage
                                                    Imagebase:0x7ff7c8080000
                                                    File size:69632 bytes
                                                    MD5 hash:73C519F050C20580F8A62C849D49215A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 0000000A.00000002.257049994.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

                                                    General

                                                    Start time:14:11:17
                                                    Start date:15/09/2021
                                                    Path:C:\Windows\System32\rundll32.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:rundll32.exe C:\Users\user\Desktop\as0Jkr7Dca.dll,CreateXmlWriterOutputWithEncodingName
                                                    Imagebase:0x7ff7c8080000
                                                    File size:69632 bytes
                                                    MD5 hash:73C519F050C20580F8A62C849D49215A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 0000000B.00000002.259716676.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

                                                    General

                                                    Start time:14:11:55
                                                    Start date:15/09/2021
                                                    Path:C:\Windows\System32\SystemPropertiesPerformance.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\SystemPropertiesPerformance.exe
                                                    Imagebase:0x7ff776040000
                                                    File size:83968 bytes
                                                    MD5 hash:F325976CDC0F7E9C680B51B35D24D23A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language

                                                    General

                                                    Start time:14:11:56
                                                    Start date:15/09/2021
                                                    Path:C:\Users\user\AppData\Local\aHDEnt\SystemPropertiesPerformance.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Users\user\AppData\Local\aHDEnt\SystemPropertiesPerformance.exe
                                                    Imagebase:0x7ff7497f0000
                                                    File size:83968 bytes
                                                    MD5 hash:F325976CDC0F7E9C680B51B35D24D23A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000018.00000002.362477458.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

                                                    General

                                                    Start time:14:12:08
                                                    Start date:15/09/2021
                                                    Path:C:\Windows\System32\wextract.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\wextract.exe
                                                    Imagebase:0x7ff7f2440000
                                                    File size:143872 bytes
                                                    MD5 hash:ED93B350C8EEFC442758A00BC3EEDE2D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language

                                                    General

                                                    Start time:14:12:11
                                                    Start date:15/09/2021
                                                    Path:C:\Users\user\AppData\Local\93S1H\wextract.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Users\user\AppData\Local\93S1H\wextract.exe
                                                    Imagebase:0x7ff6a7b40000
                                                    File size:143872 bytes
                                                    MD5 hash:ED93B350C8EEFC442758A00BC3EEDE2D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 0000001F.00000002.393975401.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
                                                    Antivirus matches:
                                                    • Detection: 0%, Metadefender, Browse
                                                    • Detection: 0%, ReversingLabs

                                                    General

                                                    Start time:14:12:23
                                                    Start date:15/09/2021
                                                    Path:C:\Windows\System32\InfDefaultInstall.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\InfDefaultInstall.exe
                                                    Imagebase:0x7ff790590000
                                                    File size:13312 bytes
                                                    MD5 hash:5FDB30927E9D4387D777443BF865EEFD
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language

                                                    General

                                                    Start time:14:12:23
                                                    Start date:15/09/2021
                                                    Path:C:\Users\user\AppData\Local\zBhEpi\InfDefaultInstall.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Users\user\AppData\Local\zBhEpi\InfDefaultInstall.exe
                                                    Imagebase:0x7ff675b50000
                                                    File size:13312 bytes
                                                    MD5 hash:5FDB30927E9D4387D777443BF865EEFD
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000021.00000002.420737755.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

                                                    General

                                                    Start time:14:12:35
                                                    Start date:15/09/2021
                                                    Path:C:\Windows\System32\AgentService.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\AgentService.exe
                                                    Imagebase:0x7ff6512c0000
                                                    File size:1189376 bytes
                                                    MD5 hash:F7E36C20DB953DFF4FDDB817904C0E48
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language

                                                    General

                                                    Start time:14:12:36
                                                    Start date:15/09/2021
                                                    Path:C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Users\user\AppData\Local\mtEdnDoZJ\AgentService.exe
                                                    Imagebase:0x7ff652e30000
                                                    File size:1189376 bytes
                                                    MD5 hash:F7E36C20DB953DFF4FDDB817904C0E48
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000024.00000002.451790236.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

                                                    General

                                                    Start time:14:12:49
                                                    Start date:15/09/2021
                                                    Path:C:\Windows\System32\MusNotificationUx.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\MusNotificationUx.exe
                                                    Imagebase:0x7ff66c750000
                                                    File size:319488 bytes
                                                    MD5 hash:114A55D75AC7447F012B6D8EC8B1F7FC
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language

                                                    General

                                                    Start time:14:12:50
                                                    Start date:15/09/2021
                                                    Path:C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Users\user\AppData\Local\sdoKH6I6V\MusNotificationUx.exe
                                                    Imagebase:0x7ff75a160000
                                                    File size:319488 bytes
                                                    MD5 hash:114A55D75AC7447F012B6D8EC8B1F7FC
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000028.00000002.477912274.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

                                                    General

                                                    Start time:14:13:02
                                                    Start date:15/09/2021
                                                    Path:C:\Windows\System32\sessionmsg.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\sessionmsg.exe
                                                    Imagebase:0x7ff75e320000
                                                    File size:74440 bytes
                                                    MD5 hash:1F7CEA0216DE48B877C16F95C7DA1F0F
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language

                                                    Disassembly

                                                    Code Analysis

                                                    Reset < >