Loading ...

Play interactive tourEdit tour

Windows Analysis Report 2JlIMkLNXh

Overview

General Information

Sample Name:2JlIMkLNXh (renamed file extension from none to dll)
Analysis ID:492758
MD5:fe213638baba7c73e9addd779b4f078a
SHA1:e463b86c2e573569643c5e24668bd291d7c2e6b0
SHA256:27f32618162b8a522fc5fb8fb832848acb724cf2ac0c03b8488b2c405c582d6a
Tags:Dridexexe
Infos:

Most interesting Screenshot:

Detection

Dridex
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Dridex unpacked file
Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes memory attributes in foreign processes to executable or writable
Machine Learning detection for sample
Queues an APC in another process (thread injection)
Machine Learning detection for dropped file
Uses Atom Bombing / ProGate to inject into other processes
Queries the volume information (name, serial number etc) of a device
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Queries the installation date of Windows
Detected potential crypto function
Stores files to the Windows start menu directory
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Binary contains a suspicious time stamp
Contains capabilities to detect virtual machines
Creates a start menu entry (Start Menu\Programs\Startup)
PE file contains more sections than normal
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • loaddll64.exe (PID: 576 cmdline: loaddll64.exe 'C:\Users\user\Desktop\2JlIMkLNXh.dll' MD5: E0CC9D126C39A9D2FA1CAD5027EBBD18)
    • cmd.exe (PID: 4192 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\2JlIMkLNXh.dll',#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 3240 cmdline: rundll32.exe 'C:\Users\user\Desktop\2JlIMkLNXh.dll',#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 4656 cmdline: rundll32.exe C:\Users\user\Desktop\2JlIMkLNXh.dll,CreateXmlReader MD5: 73C519F050C20580F8A62C849D49215A)
      • explorer.exe (PID: 3472 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • mstsc.exe (PID: 6340 cmdline: C:\Windows\system32\mstsc.exe MD5: 3FBB5CD8829E9533D0FF5819DB0444C0)
        • mstsc.exe (PID: 6412 cmdline: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exe MD5: 3FBB5CD8829E9533D0FF5819DB0444C0)
        • tcmsetup.exe (PID: 6516 cmdline: C:\Windows\system32\tcmsetup.exe MD5: 0DDA495155D552D024593C4B3246C8FA)
        • tcmsetup.exe (PID: 6564 cmdline: C:\Users\user\AppData\Local\YTBx\tcmsetup.exe MD5: 0DDA495155D552D024593C4B3246C8FA)
    • rundll32.exe (PID: 4920 cmdline: rundll32.exe C:\Users\user\Desktop\2JlIMkLNXh.dll,CreateXmlReaderInputWithEncodingCodePage MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 1320 cmdline: rundll32.exe C:\Users\user\Desktop\2JlIMkLNXh.dll,CreateXmlReaderInputWithEncodingName MD5: 73C519F050C20580F8A62C849D49215A)
  • rundll32.exe (PID: 6476 cmdline: C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding MD5: 73C519F050C20580F8A62C849D49215A)
  • explorer.exe (PID: 6880 cmdline: explorer.exe MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000005.00000002.251743405.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
    00000008.00000002.257720074.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
      00000016.00000002.374374689.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
        00000004.00000002.342710737.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
          0000000A.00000002.266384036.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
            Click to see the 2 entries

            Sigma Overview

            No Sigma rule has matched

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Multi AV Scanner detection for submitted fileShow sources
            Source: 2JlIMkLNXh.dllVirustotal: Detection: 69%Perma Link
            Source: 2JlIMkLNXh.dllReversingLabs: Detection: 77%
            Antivirus / Scanner detection for submitted sampleShow sources
            Source: 2JlIMkLNXh.dllAvira: detected
            Antivirus detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\fJxx4Zu\Secur32.dllAvira: detection malicious, Label: TR/Crypt.ZPACK.Gen
            Source: C:\Users\user\AppData\Local\YTBx\TAPI32.dllAvira: detection malicious, Label: TR/Crypt.ZPACK.Gen
            Machine Learning detection for sampleShow sources
            Source: 2JlIMkLNXh.dllJoe Sandbox ML: detected
            Machine Learning detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\fJxx4Zu\Secur32.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\YTBx\TAPI32.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF66038F8FC CryptBinaryToStringW,LocalAlloc,CryptBinaryToStringW,LocalFree,
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF66038F52C CryptProtectData,LocalAlloc,LocalFree,
            Source: 2JlIMkLNXh.dllStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
            Source: Binary string: tcmsetup.pdbGCTL source: tcmsetup.exe, 0000001A.00000002.396429256.00007FF6193B3000.00000002.00020000.sdmp, tcmsetup.exe.6.dr
            Source: Binary string: mstsc.pdbGCTL source: mstsc.exe, 00000016.00000000.351116745.00007FF660434000.00000002.00020000.sdmp, mstsc.exe.6.dr
            Source: Binary string: mstsc.pdb source: mstsc.exe, 00000016.00000000.351116745.00007FF660434000.00000002.00020000.sdmp, mstsc.exe.6.dr
            Source: Binary string: tcmsetup.pdb source: tcmsetup.exe, 0000001A.00000002.396429256.00007FF6193B3000.00000002.00020000.sdmp, tcmsetup.exe.6.dr
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005D290 FindFirstFileExW,
            Source: explorer.exe, 0000001C.00000002.783735126.0000000006A87000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: explorer.exe, 00000006.00000000.305635273.000000000DC20000.00000004.00000001.sdmpString found in binary or memory: http://schemas.miC
            Source: explorer.exe, 00000006.00000000.305635273.000000000DC20000.00000004.00000001.sdmpString found in binary or memory: http://schemas.microso
            Source: explorer.exe, 00000006.00000000.305635273.000000000DC20000.00000004.00000001.sdmpString found in binary or memory: http://schemas.microsoft.c
            Source: explorer.exe, 00000006.00000000.288544187.000000000DC20000.00000004.00000001.sdmpString found in binary or memory: http://schemas.microsoft.co

            E-Banking Fraud:

            barindex
            Yara detected Dridex unpacked fileShow sources
            Source: Yara matchFile source: 00000005.00000002.251743405.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.257720074.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000016.00000002.374374689.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.342710737.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.266384036.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.272046081.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001A.00000002.394057525.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140034870
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140035270
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140048AC0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005C340
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140065B80
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006A4B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400524B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140026CC0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004BD40
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400495B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140036F30
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140069010
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140001010
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140066020
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002F840
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005D850
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140064080
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140010880
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400688A0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002D0D0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400018D0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140016100
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001D100
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002A110
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001D910
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140015120
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000B120
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004F940
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140039140
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140023140
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140057950
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001E170
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140002980
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400611A0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400389A0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400381A0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002E1B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400139D0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400319F0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002EA00
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140022A00
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003B220
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140067A40
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140069A50
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140007A60
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003AAC0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003A2E0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140062B00
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140018300
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002FB20
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140031340
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140022340
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140017B40
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000BB40
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004EB60
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140005370
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002CB80
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006B390
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140054BA0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140033BB0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400263C0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400123C0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140063BD0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400663F0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140023BF0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006B41B
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006B424
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006B42D
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006B436
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006B43D
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140024440
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140005C40
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006B446
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005F490
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140022D00
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140035520
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140019D20
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140030530
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140023530
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140031540
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140033540
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014007BD50
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140078570
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140019580
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400205A0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140025DB0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140071DC0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000C5C0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002DDE0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140031DF0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000DDF0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140001620
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140018630
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140032650
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140064E80
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140016E80
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140007EA0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400286B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140006EB0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400276C0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002FEC0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002EED0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002B6E0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140053F20
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140022730
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140029780
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140018F80
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003EFB0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400067B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400667D0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140060FE0
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF6603239A0
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF66032CE08
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF6603235EC
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF660328DF0
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF6603A1690
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF66031DA8C
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF66032EAB4
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF660354320
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF660314EC4
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF6603312E0
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF660316B94
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF660315410
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF6603277C0
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF66032A858
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF660328060
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF6603284C0
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF6603264DC
            Source: C:\Users\user\AppData\Local\YTBx\tcmsetup.exeCode function: 26_2_00007FF6193B1A38
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140046C90 NtClose,
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006A4B0 NtQuerySystemInformation,
            Source: 2JlIMkLNXh.dllBinary or memory string: OriginalFilenamekbdyj% vs 2JlIMkLNXh.dll
            Source: mstsc.exe.6.drStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.6.drStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.6.drStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.6.drStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.6.drStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.6.drStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.6.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.6.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.6.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.6.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.6.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.6.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.6.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.6.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.6.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.6.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: mstsc.exe.6.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: C:\Windows\explorer.exeSection loaded: mswb7.dll
            Source: C:\Windows\explorer.exeSection loaded: dui70.dll
            Source: C:\Windows\explorer.exeSection loaded: duser.dll
            Source: C:\Windows\explorer.exeSection loaded: msftedit.dll
            Source: C:\Windows\explorer.exeSection loaded: globinputhost.dll
            Source: C:\Windows\explorer.exeSection loaded: uiribbon.dll
            Source: C:\Windows\explorer.exeSection loaded: networkexplorer.dll
            Source: Secur32.dll.6.drStatic PE information: Number of sections : 52 > 10
            Source: TAPI32.dll.6.drStatic PE information: Number of sections : 52 > 10
            Source: 2JlIMkLNXh.dllStatic PE information: Number of sections : 51 > 10
            Source: 2JlIMkLNXh.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: Secur32.dll.6.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: TAPI32.dll.6.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: 2JlIMkLNXh.dllVirustotal: Detection: 69%
            Source: 2JlIMkLNXh.dllReversingLabs: Detection: 77%
            Source: 2JlIMkLNXh.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe 'C:\Users\user\Desktop\2JlIMkLNXh.dll'
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\2JlIMkLNXh.dll',#1
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\2JlIMkLNXh.dll,CreateXmlReader
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\2JlIMkLNXh.dll',#1
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\2JlIMkLNXh.dll,CreateXmlReaderInputWithEncodingCodePage
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\2JlIMkLNXh.dll,CreateXmlReaderInputWithEncodingName
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\mstsc.exe C:\Windows\system32\mstsc.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exe C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exe
            Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\tcmsetup.exe C:\Windows\system32\tcmsetup.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\YTBx\tcmsetup.exe C:\Users\user\AppData\Local\YTBx\tcmsetup.exe
            Source: unknownProcess created: C:\Windows\explorer.exe explorer.exe
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\2JlIMkLNXh.dll',#1
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\2JlIMkLNXh.dll,CreateXmlReader
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\2JlIMkLNXh.dll,CreateXmlReaderInputWithEncodingCodePage
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\2JlIMkLNXh.dll,CreateXmlReaderInputWithEncodingName
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\2JlIMkLNXh.dll',#1
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\mstsc.exe C:\Windows\system32\mstsc.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exe C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\tcmsetup.exe C:\Windows\system32\tcmsetup.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\YTBx\tcmsetup.exe C:\Users\user\AppData\Local\YTBx\tcmsetup.exe
            Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CryptoJump to behavior
            Source: classification engineClassification label: mal100.troj.evad.winDLL@21/5@0/0
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF660358E00 memset,memset,memset,memset,memset,PathStripPathW,PathFindExtensionW,CharLowerW,PathRemoveFileSpecW,CharLowerW,CharLowerW,CoCreateInstance,LocalFree,
            Source: C:\Windows\explorer.exeFile read: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\2JlIMkLNXh.dll,CreateXmlReader
            Source: C:\Users\user\AppData\Local\YTBx\tcmsetup.exeMutant created: \Sessions\1\BaseNamedObjects\{080b51e7-5243-64c4-ebc3-67abce22293e}
            Source: C:\Users\user\AppData\Local\YTBx\tcmsetup.exeMutant created: \Sessions\1\BaseNamedObjects\{4646cca1-0c19-80c6-1a2a-cb48f0801431}
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF660314EC4 LoadLibraryExW,FindResourceExW,LoadResource,SizeofResource,MultiByteToWideChar,FreeLibrary,free,free,
            Source: unknownProcess created: C:\Windows\explorer.exe
            Source: C:\Windows\explorer.exeFile opened: C:\Windows\SYSTEM32\MsftEdit.dll
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: 2JlIMkLNXh.dllStatic PE information: Image base 0x140000000 > 0x60000000
            Source: 2JlIMkLNXh.dllStatic file information: File size 1941504 > 1048576
            Source: 2JlIMkLNXh.dllStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
            Source: Binary string: tcmsetup.pdbGCTL source: tcmsetup.exe, 0000001A.00000002.396429256.00007FF6193B3000.00000002.00020000.sdmp, tcmsetup.exe.6.dr
            Source: Binary string: mstsc.pdbGCTL source: mstsc.exe, 00000016.00000000.351116745.00007FF660434000.00000002.00020000.sdmp, mstsc.exe.6.dr
            Source: Binary string: mstsc.pdb source: mstsc.exe, 00000016.00000000.351116745.00007FF660434000.00000002.00020000.sdmp, mstsc.exe.6.dr
            Source: Binary string: tcmsetup.pdb source: tcmsetup.exe, 0000001A.00000002.396429256.00007FF6193B3000.00000002.00020000.sdmp, tcmsetup.exe.6.dr
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140056A4D push rdi; ret
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .qkm
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .cvjb
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .tlmkv
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .wucsxe
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .fltwtj
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .sfplio
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .rpg
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .bewzc
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .vksvaw
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .wmhg
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .kswemc
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .kaxfk
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .pjf
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .retjqj
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .mizn
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .rsrub
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .susbqq
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .jeojcw
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .vwl
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .mub
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .xwxpmb
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .aea
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .lwpch
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .nzgp
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .qimx
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .jbqbr
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .kxxxil
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .drpaa
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .lepjc
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .ywrsat
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .ialjct
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .ujrqkf
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .lwaoje
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .pces
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .zuizg
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .upz
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .wxuh
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .fsdfq
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .xxlo
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .hcxtgl
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .owbx
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .phg
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .trmoj
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .zaixaf
            Source: 2JlIMkLNXh.dllStatic PE information: section name: .myzf
            Source: mstsc.exe.6.drStatic PE information: section name: .didat
            Source: Secur32.dll.6.drStatic PE information: section name: .qkm
            Source: Secur32.dll.6.drStatic PE information: section name: .cvjb
            Source: Secur32.dll.6.drStatic PE information: section name: .tlmkv
            Source: Secur32.dll.6.drStatic PE information: section name: .wucsxe
            Source: Secur32.dll.6.drStatic PE information: section name: .fltwtj
            Source: Secur32.dll.6.drStatic PE information: section name: .sfplio
            Source: Secur32.dll.6.drStatic PE information: section name: .rpg
            Source: Secur32.dll.6.drStatic PE information: section name: .bewzc
            Source: Secur32.dll.6.drStatic PE information: section name: .vksvaw
            Source: Secur32.dll.6.drStatic PE information: section name: .wmhg
            Source: Secur32.dll.6.drStatic PE information: section name: .kswemc
            Source: Secur32.dll.6.drStatic PE information: section name: .kaxfk
            Source: Secur32.dll.6.drStatic PE information: section name: .pjf
            Source: Secur32.dll.6.drStatic PE information: section name: .retjqj
            Source: Secur32.dll.6.drStatic PE information: section name: .mizn
            Source: Secur32.dll.6.drStatic PE information: section name: .rsrub
            Source: Secur32.dll.6.drStatic PE information: section name: .susbqq
            Source: Secur32.dll.6.drStatic PE information: section name: .jeojcw
            Source: Secur32.dll.6.drStatic PE information: section name: .vwl
            Source: Secur32.dll.6.drStatic PE information: section name: .mub
            Source: Secur32.dll.6.drStatic PE information: section name: .xwxpmb
            Source: Secur32.dll.6.drStatic PE information: section name: .aea
            Source: Secur32.dll.6.drStatic PE information: section name: .lwpch
            Source: Secur32.dll.6.drStatic PE information: section name: .nzgp
            Source: Secur32.dll.6.drStatic PE information: section name: .qimx
            Source: Secur32.dll.6.drStatic PE information: section name: .jbqbr
            Source: Secur32.dll.6.drStatic PE information: section name: .kxxxil
            Source: Secur32.dll.6.drStatic PE information: section name: .drpaa
            Source: Secur32.dll.6.drStatic PE information: section name: .lepjc
            Source: Secur32.dll.6.drStatic PE information: section name: .ywrsat
            Source: Secur32.dll.6.drStatic PE information: section name: .ialjct
            Source: Secur32.dll.6.drStatic PE information: section name: .ujrqkf
            Source: Secur32.dll.6.drStatic PE information: section name: .lwaoje
            Source: Secur32.dll.6.drStatic PE information: section name: .pces
            Source: Secur32.dll.6.drStatic PE information: section name: .zuizg
            Source: Secur32.dll.6.drStatic PE information: section name: .upz
            Source: Secur32.dll.6.drStatic PE information: section name: .wxuh
            Source: Secur32.dll.6.drStatic PE information: section name: .fsdfq
            Source: Secur32.dll.6.drStatic PE information: section name: .xxlo
            Source: Secur32.dll.6.drStatic PE information: section name: .hcxtgl
            Source: Secur32.dll.6.drStatic PE information: section name: .owbx
            Source: Secur32.dll.6.drStatic PE information: section name: .phg
            Source: Secur32.dll.6.drStatic PE information: section name: .trmoj
            Source: Secur32.dll.6.drStatic PE information: section name: .zaixaf
            Source: Secur32.dll.6.drStatic PE information: section name: .myzf
            Source: Secur32.dll.6.drStatic PE information: section name: .jdkzt
            Source: TAPI32.dll.6.drStatic PE information: section name: .qkm
            Source: TAPI32.dll.6.drStatic PE information: section name: .cvjb
            Source: TAPI32.dll.6.drStatic PE information: section name: .tlmkv
            Source: TAPI32.dll.6.drStatic PE information: section name: .wucsxe
            Source: TAPI32.dll.6.drStatic PE information: section name: .fltwtj
            Source: TAPI32.dll.6.drStatic PE information: section name: .sfplio
            Source: TAPI32.dll.6.drStatic PE information: section name: .rpg
            Source: TAPI32.dll.6.drStatic PE information: section name: .bewzc
            Source: TAPI32.dll.6.drStatic PE information: section name: .vksvaw
            Source: TAPI32.dll.6.drStatic PE information: section name: .wmhg
            Source: TAPI32.dll.6.drStatic PE information: section name: .kswemc
            Source: TAPI32.dll.6.drStatic PE information: section name: .kaxfk
            Source: TAPI32.dll.6.drStatic PE information: section name: .pjf
            Source: TAPI32.dll.6.drStatic PE information: section name: .retjqj
            Source: TAPI32.dll.6.drStatic PE information: section name: .mizn
            Source: TAPI32.dll.6.drStatic PE information: section name: .rsrub
            Source: TAPI32.dll.6.drStatic PE information: section name: .susbqq
            Source: TAPI32.dll.6.drStatic PE information: section name: .jeojcw
            Source: TAPI32.dll.6.drStatic PE information: section name: .vwl
            Source: TAPI32.dll.6.drStatic PE information: section name: .mub
            Source: TAPI32.dll.6.drStatic PE information: section name: .xwxpmb
            Source: TAPI32.dll.6.drStatic PE information: section name: .aea
            Source: TAPI32.dll.6.drStatic PE information: section name: .lwpch
            Source: TAPI32.dll.6.drStatic PE information: section name: .nzgp
            Source: TAPI32.dll.6.drStatic PE information: section name: .qimx
            Source: TAPI32.dll.6.drStatic PE information: section name: .jbqbr
            Source: TAPI32.dll.6.drStatic PE information: section name: .kxxxil
            Source: TAPI32.dll.6.drStatic PE information: section name: .drpaa
            Source: TAPI32.dll.6.drStatic PE information: section name: .lepjc
            Source: TAPI32.dll.6.drStatic PE information: section name: .ywrsat
            Source: TAPI32.dll.6.drStatic PE information: section name: .ialjct
            Source: TAPI32.dll.6.drStatic PE information: section name: .ujrqkf
            Source: TAPI32.dll.6.drStatic PE information: section name: .lwaoje
            Source: TAPI32.dll.6.drStatic PE information: section name: .pces
            Source: TAPI32.dll.6.drStatic PE information: section name: .zuizg
            Source: TAPI32.dll.6.drStatic PE information: section name: .upz
            Source: TAPI32.dll.6.drStatic PE information: section name: .wxuh
            Source: TAPI32.dll.6.drStatic PE information: section name: .fsdfq
            Source: TAPI32.dll.6.drStatic PE information: section name: .xxlo
            Source: TAPI32.dll.6.drStatic PE information: section name: .hcxtgl
            Source: TAPI32.dll.6.drStatic PE information: section name: .owbx
            Source: TAPI32.dll.6.drStatic PE information: section name: .phg
            Source: TAPI32.dll.6.drStatic PE information: section name: .trmoj
            Source: TAPI32.dll.6.drStatic PE information: section name: .zaixaf
            Source: TAPI32.dll.6.drStatic PE information: section name: .myzf
            Source: TAPI32.dll.6.drStatic PE information: section name: .shcm
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF66032BEA0 LoadLibraryW,GetProcAddress,GetProcAddress,
            Source: Secur32.dll.6.drStatic PE information: real checksum: 0x7d786c40 should be: 0x1dca59
            Source: TAPI32.dll.6.drStatic PE information: real checksum: 0x7d786c40 should be: 0x1e59ee
            Source: 2JlIMkLNXh.dllStatic PE information: real checksum: 0x7d786c40 should be: 0x1e406b
            Source: mstsc.exe.6.drStatic PE information: 0xB359C414 [Fri May 8 10:36:04 2065 UTC]
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\YTBx\TAPI32.dllJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\YTBx\tcmsetup.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\fJxx4Zu\Secur32.dllJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GUJump to behavior
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GUJump to behavior
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF6603239A0 SetFocus,LoadCursorW,SetCursor,DefWindowProcW,GetClientRect,IsIconic,memset,GetTitleBarInfo,GetCursorPos,SendMessageW,
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF66031F5A4 DefWindowProcW,IsIconic,GetClientRect,GetLastError,VariantClear,DefWindowProcW,
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF66039C560 GetWindowRect,IsWindow,IsIconic,GetSystemMetrics,GetSystemMetrics,GetWindowRect,PtInRect,PtInRect,SystemParametersInfoW,CopyRect,SetWindowPos,
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF66031CE48 IsIconic,GetWindowPlacement,GetLastError,
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF660319A6C IsIconic,GetWindowPlacement,GetWindowRect,
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF66031CF28 IsIconic,GetWindowPlacement,GetLastError,IsZoomed,SetWindowPlacement,GetLastError,SetWindowPos,SetWindowPos,GetClientRect,MoveWindow,
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF660321B44 lstrcmpW,LockWindowUpdate,IsIconic,GetWindowPlacement,GetWindowLongW,SetWindowLongW,SetWindowLongW,VariantInit,VariantClear,GetRgnBox,OffsetRgn,VariantClear,ShowWindow,SetWindowPos,SetWindowPos,SetWindowRgn,LockWindowUpdate,
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF660322F5C IsWindowVisible,IsIconic,
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF660322884 GetWindowRect,GetWindowLongW,GetWindowLongW,memset,CopyRect,IntersectRect,MoveWindow,IsIconic,memset,GetWindowPlacement,
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF6603204F8 IsZoomed,IsIconic,EnableMenuItem,EnableMenuItem,EnableMenuItem,EnableMenuItem,EnableMenuItem,EnableMenuItem,
            Source: C:\Windows\explorer.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#5&1ec51bf7&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: C:\Windows\System32\loaddll64.exeProcess information queried: ProcessInformation
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005C340 GetSystemInfo,
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005D290 FindFirstFileExW,
            Source: explorer.exe, 0000001C.00000003.478164779.0000000008602000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B1
            Source: explorer.exe, 0000001C.00000002.789331719.0000000008516000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dRom0
            Source: explorer.exe, 0000001C.00000002.787223635.00000000082AD000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
            Source: explorer.exe, 0000001C.00000003.458285250.00000000085F9000.00000004.00000001.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\DosDevices\D:
            Source: explorer.exe, 0000001C.00000003.468597864.0000000008588000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 0000001C.00000003.705432808.000000000EA41000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}GONSERV
            Source: explorer.exe, 0000001C.00000003.456622279.0000000006B27000.00000004.00000001.sdmpBinary or memory string: k\\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}esgZ
            Source: explorer.exe, 0000001C.00000003.713931534.00000000082DC000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 0000001C.00000003.456244015.0000000008516000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
            Source: explorer.exe, 00000006.00000000.252365474.00000000011B3000.00000004.00000020.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000tft\0
            Source: explorer.exe, 00000006.00000000.285201603.00000000089B5000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&0000002
            Source: explorer.exe, 0000001C.00000002.799922387.000000000EA40000.00000004.00000001.sdmpBinary or memory string: #{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f
            Source: explorer.exe, 0000001C.00000002.787223635.00000000082AD000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}indows.Cortana_cw5n1h2txyewB
            Source: explorer.exe, 0000001C.00000003.458285250.00000000085F9000.00000004.00000001.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\DosDevices\D:&
            Source: explorer.exe, 0000001C.00000002.799922387.000000000EA40000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}U
            Source: explorer.exe, 0000001C.00000003.705432808.000000000EA41000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}I
            Source: explorer.exe, 0000001C.00000003.707657930.00000000082D2000.00000004.00000001.sdmpBinary or memory string: 0000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B
            Source: explorer.exe, 0000001C.00000003.478182163.0000000008605000.00000004.00000001.sdmpBinary or memory string: 63}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 0000001C.00000003.713931534.00000000082DC000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}e`~
            Source: explorer.exe, 00000006.00000000.285663277.0000000008A9D000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}::
            Source: explorer.exe, 0000001C.00000003.411015605.0000000006AFC000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}escriptionGIf p
            Source: explorer.exe, 0000001C.00000003.466074498.0000000008456000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}""
            Source: explorer.exe, 00000006.00000000.285201603.00000000089B5000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000%
            Source: explorer.exe, 0000001C.00000003.707002128.0000000006A87000.00000004.00000001.sdmpBinary or memory string: \?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}<
            Source: explorer.exe, 0000001C.00000003.713931534.00000000082DC000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dh
            Source: explorer.exe, 0000001C.00000003.709433811.00000000082D3000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Local
            Source: explorer.exe, 0000001C.00000003.477096819.0000000008594000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} 032: "33"
            Source: explorer.exe, 0000001C.00000003.469308444.0000000008453000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Bx
            Source: explorer.exe, 0000001C.00000003.713931534.00000000082DC000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}e
            Source: explorer.exe, 0000001C.00000002.799922387.000000000EA40000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}*
            Source: explorer.exe, 0000001C.00000003.705969758.00000000085F9000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Bj
            Source: explorer.exe, 0000001C.00000003.707657930.00000000082D2000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B
            Source: explorer.exe, 0000001C.00000003.467430701.0000000008458000.00000004.00000001.sdmpBinary or memory string: 00000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}""
            Source: explorer.exe, 0000001C.00000003.459210102.0000000006B27000.00000004.00000001.sdmpBinary or memory string: k\\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 0000001C.00000003.477081008.0000000008589000.00000004.00000001.sdmpBinary or memory string: 806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-
            Source: explorer.exe, 0000001C.00000003.707657930.00000000082D2000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}BC_C
            Source: explorer.exe, 0000001C.00000003.477013843.00000000085F9000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Bg
            Source: explorer.exe, 0000001C.00000003.707591229.000000000EA9C000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}G
            Source: explorer.exe, 0000001C.00000003.459210102.0000000006B27000.00000004.00000001.sdmpBinary or memory string: k\\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}9:b
            Source: explorer.exe, 0000001C.00000003.707657930.00000000082D2000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}BY
            Source: explorer.exe, 0000001C.00000003.708597221.0000000006B78000.00000004.00000001.sdmpBinary or memory string: 2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B
            Source: explorer.exe, 0000001C.00000003.468687386.0000000008450000.00000004.00000001.sdmpBinary or memory string: 11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f563q
            Source: explorer.exe, 0000001C.00000002.783735126.0000000006A87000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}<
            Source: explorer.exe, 0000001C.00000003.713873275.0000000006B7A000.00000004.00000001.sdmpBinary or memory string: #{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 0000001C.00000003.478451454.0000000008602000.00000004.00000001.sdmpBinary or memory string: 11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Bj
            Source: explorer.exe, 0000001C.00000003.707566012.000000000EA94000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}@
            Source: explorer.exe, 0000001C.00000003.705432808.000000000EA41000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}lesPSM
            Source: explorer.exe, 0000001C.00000003.455188887.00000000084EE000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 0000001C.00000003.705432808.000000000EA41000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}ProgramN
            Source: explorer.exe, 0000001C.00000003.705432808.000000000EA41000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}ows\Sys
            Source: explorer.exe, 00000006.00000000.255467881.00000000053C4000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}>'R\"
            Source: explorer.exe, 0000001C.00000003.466988755.00000000085F9000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B|
            Source: explorer.exe, 0000001C.00000003.705432808.000000000EA41000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}am File
            Source: explorer.exe, 0000001C.00000002.787930036.00000000083C3000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF66032BEA0 LoadLibraryW,GetProcAddress,GetProcAddress,
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140048AC0 LdrLoadDll,FindClose,
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF660432264 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
            Source: C:\Users\user\AppData\Local\YTBx\tcmsetup.exeCode function: 26_2_00007FF6193B2330 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
            Source: C:\Users\user\AppData\Local\YTBx\tcmsetup.exeCode function: 26_2_00007FF6193B2530 SetUnhandledExceptionFilter,

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Benign windows process drops PE filesShow sources
            Source: C:\Windows\explorer.exeFile created: Secur32.dll.6.drJump to dropped file
            Changes memory attributes in foreign processes to executable or writableShow sources
            Source: C:\Windows\System32\rundll32.exeMemory protected: C:\Windows\explorer.exe base: 7FFA9B8EEFE0 protect: page execute and read and write
            Source: C:\Windows\System32\rundll32.exeMemory protected: C:\Windows\explorer.exe base: 7FFA9B8EE000 protect: page execute read
            Source: C:\Windows\System32\rundll32.exeMemory protected: C:\Windows\explorer.exe base: 7FFA9B312A20 protect: page execute and read and write
            Queues an APC in another process (thread injection)Show sources
            Source: C:\Windows\System32\rundll32.exeThread APC queued: target process: C:\Windows\explorer.exe
            Uses Atom Bombing / ProGate to inject into other processesShow sources
            Source: C:\Windows\System32\rundll32.exeAtom created: 405553565741544156488D6C24D14881EC98 0x00000000 inc eax 0x00000001 push ebp 0x00000002 push ebx 0x00000003 push esi 0x00000004 push edi 0x00000005 inc ecx 0x00000006 push esp 0x00000007 inc ecx 0x00000008 push esi 0x00000009 dec eax 0x0000000a lea ebp, dword ptr [esp-2Fh] 0x0000000e dec eax 0x0000000f sub esp, 00000098h
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\2JlIMkLNXh.dll',#1
            Source: C:\Users\user\AppData\Local\YTBx\tcmsetup.exeCode function: 26_2_00007FF6193B1618 HeapSetInformation,GetModuleHandleW,LoadStringW,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,GetCommandLineW,
            Source: explorer.exe, 0000001C.00000002.772768256.0000000000A37000.00000004.00000020.sdmpBinary or memory string: Progmanrogram File
            Source: explorer.exe, 00000006.00000000.276761829.0000000005EA0000.00000004.00000001.sdmp, explorer.exe, 0000001C.00000002.782481746.0000000004FA0000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: explorer.exe, 00000006.00000000.252570981.0000000001640000.00000002.00020000.sdmp, explorer.exe, 0000001C.00000002.782481746.0000000004FA0000.00000004.00000001.sdmpBinary or memory string: Progman
            Source: explorer.exe, 00000006.00000000.252570981.0000000001640000.00000002.00020000.sdmpBinary or memory string: SProgram Managerl
            Source: explorer.exe, 00000006.00000000.294598051.0000000001128000.00000004.00000020.sdmpBinary or memory string: ProgmanOMEa
            Source: explorer.exe, 00000006.00000000.252570981.0000000001640000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd,
            Source: explorer.exe, 00000006.00000000.252570981.0000000001640000.00000002.00020000.sdmp, explorer.exe, 0000001C.00000002.776559903.0000000001180000.00000002.00020000.sdmpBinary or memory string: Progmanlock
            Source: explorer.exe, 0000001C.00000003.402079483.00000000044C4000.00000004.00000001.sdmpBinary or memory string: ProgmanaY
            Source: explorer.exe, 0000001C.00000002.780622795.0000000004440000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWnd*
            Source: explorer.exe, 0000001C.00000002.776559903.0000000001180000.00000002.00020000.sdmpBinary or memory string: ZProgram Manageri
            Source: C:\Windows\System32\loaddll64.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\loaddll64.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\YTBx\tcmsetup.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\YTBx\tcmsetup.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDate
            Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF66041D15C GetSystemTime,SystemTimeToFileTime,EventActivityIdControl,
            Source: C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exeCode function: 22_2_00007FF66042F5EC memset,GetVersionExW,GetVersionExW,
            Source: explorer.exe, 0000001C.00000003.449554775.0000000008433000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Windows Defender\MSASCui.exe

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsNative API1Startup Items1Startup Items1Masquerading1OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsExploitation for Client Execution1Registry Run Keys / Startup Folder2Process Injection312Virtualization/Sandbox Evasion1LSASS MemoryQuery Registry1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)DLL Side-Loading1Registry Run Keys / Startup Folder2Process Injection312Security Account ManagerSecurity Software Discovery21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)DLL Side-Loading1Obfuscated Files or Information2NTDSVirtualization/Sandbox Evasion1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptRundll321LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing2Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsTimestomp1DCSyncFile and Directory Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobDLL Side-Loading1Proc FilesystemSystem Information Discovery25Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 492758 Sample: 2JlIMkLNXh Startdate: 29/09/2021 Architecture: WINDOWS Score: 100 45 Antivirus detection for dropped file 2->45 47 Antivirus / Scanner detection for submitted sample 2->47 49 Multi AV Scanner detection for submitted file 2->49 51 3 other signatures 2->51 8 loaddll64.exe 1 2->8         started        10 explorer.exe 13 148 2->10         started        12 rundll32.exe 2->12         started        process3 process4 14 rundll32.exe 8->14         started        17 cmd.exe 1 8->17         started        19 rundll32.exe 8->19         started        21 rundll32.exe 8->21         started        signatures5 55 Changes memory attributes in foreign processes to executable or writable 14->55 57 Uses Atom Bombing / ProGate to inject into other processes 14->57 59 Queues an APC in another process (thread injection) 14->59 23 explorer.exe 29 44 14->23 injected 27 rundll32.exe 17->27         started        process6 file7 37 C:\Users\user\AppData\Local\...\Secur32.dll, PE32+ 23->37 dropped 39 C:\Users\user\AppData\Local\YTBx\TAPI32.dll, PE32+ 23->39 dropped 41 C:\Users\user\AppData\Local\...\mstsc.exe, PE32+ 23->41 dropped 43 C:\Users\user\AppData\Local\...\tcmsetup.exe, PE32+ 23->43 dropped 53 Benign windows process drops PE files 23->53 29 tcmsetup.exe 23->29         started        31 mstsc.exe 23->31         started        33 mstsc.exe 23->33         started        35 tcmsetup.exe 23->35         started        signatures8 process9

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            2JlIMkLNXh.dll69%VirustotalBrowse
            2JlIMkLNXh.dll78%ReversingLabsWin64.Infostealer.Dridex
            2JlIMkLNXh.dll100%AviraHEUR/AGEN.1114452
            2JlIMkLNXh.dll100%Joe Sandbox ML

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\fJxx4Zu\Secur32.dll100%AviraTR/Crypt.ZPACK.Gen
            C:\Users\user\AppData\Local\YTBx\TAPI32.dll100%AviraTR/Crypt.ZPACK.Gen
            C:\Users\user\AppData\Local\fJxx4Zu\Secur32.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\YTBx\TAPI32.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\YTBx\tcmsetup.exe0%VirustotalBrowse
            C:\Users\user\AppData\Local\YTBx\tcmsetup.exe0%MetadefenderBrowse
            C:\Users\user\AppData\Local\YTBx\tcmsetup.exe0%ReversingLabs
            C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exe0%VirustotalBrowse
            C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exe0%MetadefenderBrowse
            C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exe0%ReversingLabs

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            26.2.tcmsetup.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            4.2.rundll32.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            10.2.rundll32.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            5.2.rundll32.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            22.2.mstsc.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            8.2.rundll32.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            1.2.loaddll64.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://schemas.microso0%URL Reputationsafe
            http://schemas.microsoft.c0%URL Reputationsafe
            http://schemas.miC0%Avira URL Cloudsafe
            http://schemas.microsoft.co0%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            No contacted domains info

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://schemas.microsoexplorer.exe, 00000006.00000000.305635273.000000000DC20000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            unknown
            http://schemas.microsoft.cexplorer.exe, 00000006.00000000.305635273.000000000DC20000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            unknown
            http://schemas.miCexplorer.exe, 00000006.00000000.305635273.000000000DC20000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://schemas.microsoft.coexplorer.exe, 00000006.00000000.288544187.000000000DC20000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            unknown

            Contacted IPs

            No contacted IP infos

            General Information

            Joe Sandbox Version:33.0.0 White Diamond
            Analysis ID:492758
            Start date:29.09.2021
            Start time:00:33:58
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 14m 42s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:2JlIMkLNXh (renamed file extension from none to dll)
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:41
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.evad.winDLL@21/5@0/0
            EGA Information:Failed
            HDC Information:
            • Successful, ratio: 20.8% (good quality ratio 14.1%)
            • Quality average: 50.1%
            • Quality standard deviation: 41.2%
            HCA Information:Failed
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Override analysis time to 240s for rundll32
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, SearchUI.exe, BackgroundTransferHost.exe, UpdateNotificationMgr.exe, ShellExperienceHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 23.211.6.115, 23.211.4.86, 20.82.210.154, 173.222.108.226, 173.222.108.210, 40.112.88.60, 20.50.102.62, 80.67.82.211, 80.67.82.235, 23.203.80.193, 51.104.136.2, 20.54.110.249, 20.82.209.104, 204.79.197.200, 13.107.21.200, 52.182.143.212
            • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e11290.dspg.akamaiedge.net, iris-de-ppe-azsc-neu.northeurope.cloudapp.azure.com, e12564.dspb.akamaiedge.net, go.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, onedsblobprdcus15.centralus.cloudapp.azure.com, www-bing-com.dual-a-0001.a-msedge.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, prod.fs.microsoft.com.akadns.net, www.bing.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, dual-a-0001.a-msedge.net, wu-shim.trafficmanager.net, ris-prod.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, settings-win.data.microsoft.com, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, download.windowsupdate.com.edgesuite.net, settingsfd-geo.trafficmanager.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, go.microsoft.com.edgekey.net, blobcollector.events.data.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size exceeded maximum capacity and may have missing disassembly code.
            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
            • Report size getting too big, too many NtCreateFile calls found.
            • Report size getting too big, too many NtEnumerateKey calls found.
            • Report size getting too big, too many NtEnumerateValueKey calls found.
            • Report size getting too big, too many NtOpenFile calls found.
            • Report size getting too big, too many NtOpenKey calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryAttributesFile calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.

            Simulations

            Behavior and APIs

            TimeTypeDescription
            00:35:44AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GU
            00:35:45API Interceptor1326x Sleep call for process: explorer.exe modified

            Joe Sandbox View / Context

            IPs

            No context

            Domains

            No context

            ASN

            No context

            JA3 Fingerprints

            No context

            Dropped Files

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            C:\Users\user\AppData\Local\YTBx\tcmsetup.exeoB4wShoM81.dllGet hashmaliciousBrowse
              5s7H5yP0YA.dllGet hashmaliciousBrowse
                wr3PdlRKjL.dllGet hashmaliciousBrowse
                  PSnPApRPsG.dllGet hashmaliciousBrowse
                    N37wjZ34KC.dllGet hashmaliciousBrowse
                      e75OHzYF9S.dllGet hashmaliciousBrowse
                        Z3Asq5R56C.dllGet hashmaliciousBrowse
                          Y7KrNvSxWx.dllGet hashmaliciousBrowse
                            8yQieH8k8q.dllGet hashmaliciousBrowse
                              5pG7H5XLEj.dllGet hashmaliciousBrowse
                                40TWLYCrEf.dllGet hashmaliciousBrowse
                                  BUal7Z7t7a.dllGet hashmaliciousBrowse
                                    mmM8TEnV8t.dllGet hashmaliciousBrowse
                                      d3bWgdGpkZ.dllGet hashmaliciousBrowse
                                        0oSZeHvzK2.dllGet hashmaliciousBrowse
                                          neTLYArwd7.dllGet hashmaliciousBrowse
                                            hDeUA0Ag8C.dllGet hashmaliciousBrowse
                                              gKibedwOnl.dllGet hashmaliciousBrowse
                                                b2e1YcSctb.dllGet hashmaliciousBrowse
                                                  l7ytx2QXnx.dllGet hashmaliciousBrowse

                                                    Created / dropped Files

                                                    C:\Users\user\AppData\Local\YTBx\TAPI32.dll
                                                    Process:C:\Windows\explorer.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1949696
                                                    Entropy (8bit):3.847240274529997
                                                    Encrypted:false
                                                    SSDEEP:12288:aVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:HfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
                                                    MD5:2DB379C0F1D84F594F99640DF0EC1C86
                                                    SHA1:276A4C43DE33BE489DC83520FF470CB24D959205
                                                    SHA-256:16B57B8D107E0E5C08D74FA5B3B63D346415E85301B121186D2CED0A0D5F407E
                                                    SHA-512:6AD20F570B6038397DDCFCC5AFD2CECD8D17F0E12337F90602595CC7350D57584A52546EA49E6490E167736E4F93DC820E1154CAB138AD3D14622E05508FF517
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d.4..DN^.........." ................p..........@....................................@lx}..b.............................................V....c..........h.......................$#................................................... ...............................text............................... ..`.rdata...O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
                                                    C:\Users\user\AppData\Local\YTBx\tcmsetup.exe
                                                    Process:C:\Windows\explorer.exe
                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):16384
                                                    Entropy (8bit):4.999998588063228
                                                    Encrypted:false
                                                    SSDEEP:192:DIzBdu2Mhf/+G1jQ0pwPYqLmdO0O7RgZiLtzADWO4hxDcUh6UdBndOvfSWG0oW:GMVJjQ0dg0O7yk5ciJcUhLiSWG0oW
                                                    MD5:0DDA495155D552D024593C4B3246C8FA
                                                    SHA1:7501A7AD5DAA41462BEFF9127154BAF261A24A5B
                                                    SHA-256:D3074CBD29678CA612C1F8AA93DE1F5B75108BE8187F0F2A2331BC302AD48CD9
                                                    SHA-512:9159D8AF457591256BA87443E89ECE942DE40B8FF39586116C2026330B8AE9C20F96905547E87D98508951D2B4687069EFD018CC9E4A6C94A6C26D4B587F41B3
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    • Antivirus: Metadefender, Detection: 0%, Browse
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Joe Sandbox View:
                                                    • Filename: oB4wShoM81.dll, Detection: malicious, Browse
                                                    • Filename: 5s7H5yP0YA.dll, Detection: malicious, Browse
                                                    • Filename: wr3PdlRKjL.dll, Detection: malicious, Browse
                                                    • Filename: PSnPApRPsG.dll, Detection: malicious, Browse
                                                    • Filename: N37wjZ34KC.dll, Detection: malicious, Browse
                                                    • Filename: e75OHzYF9S.dll, Detection: malicious, Browse
                                                    • Filename: Z3Asq5R56C.dll, Detection: malicious, Browse
                                                    • Filename: Y7KrNvSxWx.dll, Detection: malicious, Browse
                                                    • Filename: 8yQieH8k8q.dll, Detection: malicious, Browse
                                                    • Filename: 5pG7H5XLEj.dll, Detection: malicious, Browse
                                                    • Filename: 40TWLYCrEf.dll, Detection: malicious, Browse
                                                    • Filename: BUal7Z7t7a.dll, Detection: malicious, Browse
                                                    • Filename: mmM8TEnV8t.dll, Detection: malicious, Browse
                                                    • Filename: d3bWgdGpkZ.dll, Detection: malicious, Browse
                                                    • Filename: 0oSZeHvzK2.dll, Detection: malicious, Browse
                                                    • Filename: neTLYArwd7.dll, Detection: malicious, Browse
                                                    • Filename: hDeUA0Ag8C.dll, Detection: malicious, Browse
                                                    • Filename: gKibedwOnl.dll, Detection: malicious, Browse
                                                    • Filename: b2e1YcSctb.dll, Detection: malicious, Browse
                                                    • Filename: l7ytx2QXnx.dll, Detection: malicious, Browse
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............Z...Z...Z..[...Z..[...Z..[...Z..[...Z...Z...Z..[...Z.:Z...Z..[...ZRich...Z................PE..d....E.H.........."..........,....... .........@..........................................`.......... .......................................9..x....p..P....`..D............... ....5..T............................0...............1...............................text............................... ..`.rdata..&....0......................@..@.data... ....P.......0..............@....pdata..D....`.......2..............@..@.rsrc...P....p.......4..............@..@.reloc.. ............>..............@..B........................................................................................................................................................................................................................................................................
                                                    C:\Users\user\AppData\Local\fJxx4Zu\Secur32.dll
                                                    Process:C:\Windows\explorer.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1945600
                                                    Entropy (8bit):3.837322257119322
                                                    Encrypted:false
                                                    SSDEEP:12288:6VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:nfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
                                                    MD5:05BACE1B34170BF867B1462BD982E0C6
                                                    SHA1:657AF7B197381CCA16204428730E105DB9F42BA7
                                                    SHA-256:92D65FB15281A70FC6749A5ECC43BBC4B680497AEFA7E82182018F05DED98826
                                                    SHA-512:5E45E93763FFB8A3E83BE512F55DDF2C75CF6B6B654A849735AE1049A8F0115AD01E19011ACF9D62C7175FC30B003659E43659A18991F5D1205DA95F0102A830
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d.4..DN^.........." ................p..........@....................................@lx}..b.............................................#....c..........h.......................$#................................................... ...............................text............................... ..`.rdata...O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
                                                    C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exe
                                                    Process:C:\Windows\explorer.exe
                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):3640832
                                                    Entropy (8bit):5.884402821447862
                                                    Encrypted:false
                                                    SSDEEP:98304:q8yNOTNEpZxGb+ZPgN6tYDNBMe+8noqvEYw0n2WFfZT+xgsLOsMg:q8yNOTNEpZxk+ZIN6tYDNBMe+8noqvEB
                                                    MD5:3FBB5CD8829E9533D0FF5819DB0444C0
                                                    SHA1:A4A6E4E50421E57EA4745BA44568B107A9369447
                                                    SHA-256:043870DBAB955C1851E1710D941495357383A08F3F30DD3E3A1945583A85E0CA
                                                    SHA-512:349459CCF4DDFB0B05B066869C99088BA3012930D5BBC3ED1C9E4CF6400687B1EFE698C5B1734BF6FF299F6C65DD7A71A2709D3773E9E96F6FDE659F5D883F48
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    • Antivirus: Metadefender, Detection: 0%, Browse
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......... w.dN$.dN$.dN$..M%.dN$..J%.dN$..K%.dN$..O%.dN$.dO$TfN$..G%.eN$...$.dN$..L%.dN$Rich.dN$........PE..d.....Y..........."......$....%.....p..........@..............................7......K8...`..................................................].......p..H>!.....`.............7. *..P...T...........................`...............`........\..`....................text....".......$.................. ..`.rdata...\...@...^...(..............@..@.data...P(..........................@....pdata..`...........................@..@.didat..(....`....... ..............@....rsrc...H>!..p...@!.."..............@..@.reloc.. *....7..,...b7.............@..B........................................................................................................................................................................................................................................
                                                    C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\89dad5d484a9f889a3a8dfca823edc3e_d06ed635-68f6-4e9a-955c-4899f5f57b9a
                                                    Process:C:\Windows\explorer.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):4447
                                                    Entropy (8bit):5.480585654433585
                                                    Encrypted:false
                                                    SSDEEP:48:JcwUc3+5j2KMXDFaQwSluTIQcvVJ6cwUcAx54iurf/BjbJxjIxlPcuZJYmm:Jjzgj+TFmWuyyjcD0z/lNx0vg
                                                    MD5:8F8C26181663A67A34214741DE21A3D0
                                                    SHA1:6582F9AC92CDED35B3F82538E11A5D20957FA931
                                                    SHA-256:A77369687E9FC82C8208FD8415EEC9D98CD332011C772CCDADA93F9202D11E63
                                                    SHA-512:6DD67B4D5E94B76FB54BB17423CFD91D90B8451D0B137622A94717C29B27433F2E25BECD057C4DEFD1EA75DC0C8F3401CFF7D223784930E580F881763C4F1FF4
                                                    Malicious:false
                                                    Preview: ........................................user.........................................user.....................RSA1................Y..uEZ..b^.......V...q..3..wO_q.....E_~.=.=g....A...m...z...H.-..Nc..>..*...._X........,...cD+..%..7...7k.U=.h....1...0.`!.....................z..O.......I..)..L.tMN.p......,...C.r.y.p.t.o.A.P.I. .P.r.i.v.a.t.e. .K.e.y....f...... .....n....7.$Y...5..k.c.Q./.4u_............... ...q3_3.,!.m.6...s.at.).....iI.9y....V.?q.........>...p7.dO.'i.d^<)g.Ws.......~....{..f._#......Zm..c......Z...e....e.S2....]$f....6.7....VFy7....\a.iSW..w...q..H.x.....-.}.q........P|.U....LpK..G)P.].......E..X<..1...`......4...PX.UF...'p....N..W.._Y.g.I.O.@..Ih.Ht..L..j.0Z..y!..w.s@.{AF\/.S.m.z..+.H..*...ch....R}.3.W.R...........(.o..}..........[5.R...-m%.[....o...F.Z7d..,......8.:..T.7.4.......Bo#.z.W- 9.6|.....m.....s.....z.k..p..++....5b/d.~..,If....P..(......u............Q.:.E#.w.R....VHF..EX..d.u&XWOm8..-....]%9./..}.~.-.}j..H..

                                                    Static File Info

                                                    General

                                                    File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Entropy (8bit):3.831979748392846
                                                    TrID:
                                                    • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                                                    • Win64 Executable (generic) (12005/4) 10.17%
                                                    • Generic Win/DOS Executable (2004/3) 1.70%
                                                    • DOS Executable Generic (2002/1) 1.70%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                                                    File name:2JlIMkLNXh.dll
                                                    File size:1941504
                                                    MD5:fe213638baba7c73e9addd779b4f078a
                                                    SHA1:e463b86c2e573569643c5e24668bd291d7c2e6b0
                                                    SHA256:27f32618162b8a522fc5fb8fb832848acb724cf2ac0c03b8488b2c405c582d6a
                                                    SHA512:2bafcee6542db5f32c4a181ed745c7a6944382d2b3a730c4444b6d8ce8d81f195c2c7c3c7d2b492db3de815e2b50f690455f0c86ba3595667da27d1ff0f3582e
                                                    SSDEEP:12288:RVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:gfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|.

                                                    File Icon

                                                    Icon Hash:74f0e4ecccdce0e4

                                                    Static PE Info

                                                    General

                                                    Entrypoint:0x140041070
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x140000000
                                                    Subsystem:windows cui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
                                                    DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                                    Time Stamp:0x5E4E44CC [Thu Feb 20 08:35:24 2020 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:5
                                                    OS Version Minor:0
                                                    File Version Major:5
                                                    File Version Minor:0
                                                    Subsystem Version Major:5
                                                    Subsystem Version Minor:0
                                                    Import Hash:6668be91e2c948b183827f040944057f

                                                    Entrypoint Preview

                                                    Instruction
                                                    dec eax
                                                    xor eax, eax
                                                    dec eax
                                                    add eax, 5Ah
                                                    dec eax
                                                    mov dword ptr [00073D82h], ecx
                                                    dec eax
                                                    lea ecx, dword ptr [FFFFECABh]
                                                    dec eax
                                                    mov dword ptr [00073D7Ch], edx
                                                    dec eax
                                                    add eax, ecx
                                                    dec esp
                                                    mov dword ptr [00073D92h], ecx
                                                    dec esp
                                                    mov dword ptr [00073DA3h], ebp
                                                    dec esp
                                                    mov dword ptr [00073D7Ch], eax
                                                    dec esp
                                                    mov dword ptr [00073D85h], edi
                                                    dec esp
                                                    mov dword ptr [00073D86h], esi
                                                    dec esp
                                                    mov dword ptr [00073D8Fh], esp
                                                    dec eax
                                                    mov ecx, eax
                                                    dec eax
                                                    sub ecx, 5Ah
                                                    dec eax
                                                    mov dword ptr [00073D89h], esi
                                                    dec eax
                                                    test eax, eax
                                                    je 00007FA5C4AD5CEFh
                                                    dec eax
                                                    mov dword ptr [00073D45h], esp
                                                    dec eax
                                                    mov dword ptr [00073D36h], ebp
                                                    dec eax
                                                    mov dword ptr [00073D7Fh], ebx
                                                    dec eax
                                                    mov dword ptr [00073D70h], edi
                                                    dec eax
                                                    test eax, eax
                                                    je 00007FA5C4AD5CCEh
                                                    jmp ecx
                                                    dec eax
                                                    add edi, ecx
                                                    dec eax
                                                    mov dword ptr [FFFFEC37h], ecx
                                                    dec eax
                                                    xor ecx, eax
                                                    jmp ecx
                                                    retn 0008h
                                                    ud2
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    push ebx
                                                    dec eax
                                                    sub esp, 00000080h
                                                    mov eax, F957B016h
                                                    mov byte ptr [esp+7Fh], 00000037h
                                                    mov edx, dword ptr [esp+78h]
                                                    inc ecx
                                                    mov eax, edx
                                                    inc ecx
                                                    or eax, 5D262B0Ch
                                                    inc esp
                                                    mov dword ptr [esp+78h], eax
                                                    dec eax
                                                    mov dword ptr [eax+eax+00h], 00000000h

                                                    Rich Headers

                                                    Programming Language:
                                                    • [LNK] VS2012 UPD4 build 61030
                                                    • [ASM] VS2013 UPD2 build 30501
                                                    • [ C ] VS2012 UPD2 build 60315
                                                    • [C++] VS2013 UPD4 build 31101
                                                    • [RES] VS2012 UPD3 build 60610
                                                    • [LNK] VS2017 v15.5.4 build 25834
                                                    • [ C ] VS2017 v15.5.4 build 25834
                                                    • [ASM] VS2010 build 30319
                                                    • [EXP] VS2015 UPD1 build 23506
                                                    • [IMP] VS2008 SP1 build 30729
                                                    • [RES] VS2012 UPD4 build 61030
                                                    • [LNK] VS2012 UPD2 build 60315
                                                    • [C++] VS2015 UPD1 build 23506
                                                    • [ C ] VS2013 UPD4 build 31101

                                                    Data Directories

                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x1d90100x12e.myzf
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xa63900xa0.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xc00000x468.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xc10000x2324.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x420000xc0.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                    Sections

                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x407960x41000False0.776085486779data7.73364605679IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                    .rdata0x420000x64fd00x65000False0.702390160891data7.86574512659IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0xa70000x178b80x18000False0.0694580078125data3.31515306295IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                    .pdata0xbf0000x12c0x1000False0.06005859375PEX Binary Archive0.581723022719IMAGE_SCN_TYPE_DSECT, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .rsrc0xc00000x8800x1000False0.139892578125data1.23838501563IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0xc10000x23240x3000False0.0498046875data4.65321444248IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    .qkm0xc40000x74a0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .cvjb0xc50000x1e660x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .tlmkv0xc70000xbde0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .wucsxe0xc80000x451740x46000False0.0010498046875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .fltwtj0x10e0000x12670x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .sfplio0x1100000x7360x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .rpg0x1110000x451740x46000False0.0010498046875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .bewzc0x1570000x11240x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .vksvaw0x1590000x7360x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .wmhg0x15a0000x12780x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .kswemc0x15c0000x36d0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .kaxfk0x15d0000x197d0x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .pjf0x15f0000xbde0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .retjqj0x1600000x7fd0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .mizn0x1610000x9cd0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .rsrub0x1620000x197d0x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .susbqq0x1640000x6cd00x7000False0.00177873883929data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .jeojcw0x16b0000x13e0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .vwl0x16c0000xae70x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .mub0x16d0000x6cd00x7000False0.00177873883929data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .xwxpmb0x1740000x5730x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .aea0x1750000x7fd0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .lwpch0x1760000x7fd0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .nzgp0x1770000x1f70x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .qimx0x1780000x13e0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .jbqbr0x1790000x1f70x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .kxxxil0x17a0000xbf60x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .drpaa0x17b0000x23b0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .lepjc0x17c0000x1f70x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .ywrsat0x17d0000x8fe0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .ialjct0x17e0000x1030x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .ujrqkf0x17f0000x12780x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .lwaoje0x1810000x1af0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .pces0x1820000x8fe0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .zuizg0x1830000x6cd00x7000False0.00177873883929data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .upz0x18a0000x3ba0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .wxuh0x18b0000xbf60x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .fsdfq0x18c0000x5a70x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .xxlo0x18d0000x1f70x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .hcxtgl0x18e0000x1e660x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .owbx0x1900000xf90x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .phg0x1910000x7360x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .trmoj0x1920000x1ee0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .zaixaf0x1930000x451740x46000False0.0010498046875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .myzf0x1d90000x13e0x1000False0.046142578125data0.645779984281IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                                    Resources

                                                    NameRVASizeTypeLanguageCountry
                                                    RT_VERSION0xc00a00x370dataEnglishUnited States
                                                    RT_MANIFEST0xc04100x56ASCII text, with CRLF line terminatorsEnglishUnited States

                                                    Imports

                                                    DLLImport
                                                    USER32.dllLookupIconIdFromDirectoryEx, WaitForInputIdle, GetParent, GetFocus
                                                    SETUPAPI.dllCM_Get_Resource_Conflict_DetailsW
                                                    KERNEL32.dllDeleteCriticalSection, DeleteTimerQueue, TerminateJobObject, GetFileInformationByHandle, GetThreadLocale, GetNamedPipeServerProcessId, GetConsoleFontSize
                                                    GDI32.dllCreateBitmapIndirect, GetPolyFillMode
                                                    CRYPT32.dllCertGetCTLContextProperty
                                                    ADVAPI32.dllAddAccessDeniedObjectAce
                                                    SHLWAPI.dllChrCmpIW

                                                    Exports

                                                    NameOrdinalAddress
                                                    CreateXmlReader10x14003d414
                                                    CreateXmlReaderInputWithEncodingCodePage20x14003a750
                                                    CreateXmlReaderInputWithEncodingName30x14000d9f8
                                                    CreateXmlWriter40x140030868
                                                    CreateXmlWriterOutputWithEncodingCodePage50x1400276b8
                                                    CreateXmlWriterOutputWithEncodingName60x1400163e4

                                                    Version Infos

                                                    DescriptionData
                                                    LegalCopyright Microsoft Corporation. All rights reserv
                                                    InternalNamebitsp
                                                    FileVersion7.5.7600.16385 (win7_rtm.090713-
                                                    CompanyNameMicrosoft Corporati
                                                    ProductNameMicrosoft Windows Operating S
                                                    ProductVersion6.1.7600
                                                    FileDescriptionBackground Intellig
                                                    OriginalFilenamekbdy
                                                    Translation0x0409 0x04b0

                                                    Possible Origin

                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishUnited States

                                                    Network Behavior

                                                    Network Port Distribution

                                                    UDP Packets

                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Sep 29, 2021 00:34:52.177783012 CEST6530753192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:34:52.198076963 CEST53653078.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:35:06.947459936 CEST6434453192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:35:06.983998060 CEST53643448.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:35:24.923285961 CEST6206053192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:35:24.943025112 CEST53620608.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:35:44.611530066 CEST6180553192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:35:44.639178038 CEST53618058.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:35:49.031955957 CEST5479553192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:35:49.061124086 CEST53547958.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:36:05.174542904 CEST4955753192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:36:05.212105989 CEST53495578.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:36:10.253612041 CEST6173353192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:36:10.276340961 CEST53617338.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:36:14.106188059 CEST6544753192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:36:14.132950068 CEST53654478.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:36:15.212671041 CEST5244153192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:36:15.246840954 CEST53524418.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:36:39.201730967 CEST6217653192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:36:39.236076117 CEST53621768.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:36:39.700304031 CEST5959653192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:36:39.720061064 CEST53595968.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:36:40.064248085 CEST6529653192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:36:40.096088886 CEST53652968.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:36:40.476725101 CEST6318353192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:36:40.501283884 CEST53631838.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:36:41.182564974 CEST6015153192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:36:41.206267118 CEST53601518.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:36:41.906605959 CEST5696953192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:36:41.931135893 CEST53569698.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:36:42.442914009 CEST5516153192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:36:42.462734938 CEST53551618.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:36:42.952892065 CEST5475753192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:36:43.010600090 CEST53547578.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:36:43.539592028 CEST4999253192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:36:43.573434114 CEST53499928.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:36:43.637828112 CEST6007553192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:36:43.655312061 CEST53600758.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:36:43.949307919 CEST5501653192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:36:43.969032049 CEST53550168.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:36:44.260929108 CEST6434553192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:36:44.287940025 CEST53643458.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:36:46.449498892 CEST5712853192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:36:46.485205889 CEST53571288.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:36:48.085802078 CEST5479153192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:36:48.115533113 CEST53547918.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:36:59.317008972 CEST5046353192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:36:59.339082003 CEST53504638.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:37:15.998902082 CEST5039453192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:37:16.019366026 CEST53503948.8.8.8192.168.2.5
                                                    Sep 29, 2021 00:37:17.942449093 CEST5853053192.168.2.58.8.8.8
                                                    Sep 29, 2021 00:37:17.962500095 CEST53585308.8.8.8192.168.2.5

                                                    Code Manipulations

                                                    Statistics

                                                    Behavior

                                                    Click to jump to process

                                                    System Behavior

                                                    General

                                                    Start time:00:34:56
                                                    Start date:29/09/2021
                                                    Path:C:\Windows\System32\loaddll64.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:loaddll64.exe 'C:\Users\user\Desktop\2JlIMkLNXh.dll'
                                                    Imagebase:0x7ff7a0630000
                                                    File size:1136128 bytes
                                                    MD5 hash:E0CC9D126C39A9D2FA1CAD5027EBBD18
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000001.00000002.272046081.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
                                                    Reputation:moderate

                                                    General

                                                    Start time:00:34:57
                                                    Start date:29/09/2021
                                                    Path:C:\Windows\System32\cmd.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\2JlIMkLNXh.dll',#1
                                                    Imagebase:0x7ff7eef80000
                                                    File size:273920 bytes
                                                    MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    General

                                                    Start time:00:34:57
                                                    Start date:29/09/2021
                                                    Path:C:\Windows\System32\rundll32.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:rundll32.exe C:\Users\user\Desktop\2JlIMkLNXh.dll,CreateXmlReader
                                                    Imagebase:0x7ff6ab530000
                                                    File size:69632 bytes
                                                    MD5 hash:73C519F050C20580F8A62C849D49215A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000004.00000002.342710737.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
                                                    Reputation:high

                                                    General

                                                    Start time:00:34:57
                                                    Start date:29/09/2021
                                                    Path:C:\Windows\System32\rundll32.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:rundll32.exe 'C:\Users\user\Desktop\2JlIMkLNXh.dll',#1
                                                    Imagebase:0x7ff6ab530000
                                                    File size:69632 bytes
                                                    MD5 hash:73C519F050C20580F8A62C849D49215A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000005.00000002.251743405.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
                                                    Reputation:high

                                                    General

                                                    Start time:00:34:59
                                                    Start date:29/09/2021
                                                    Path:C:\Windows\explorer.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\Explorer.EXE
                                                    Imagebase:0x7ff693d90000
                                                    File size:3933184 bytes
                                                    MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    General

                                                    Start time:00:35:01
                                                    Start date:29/09/2021
                                                    Path:C:\Windows\System32\rundll32.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:rundll32.exe C:\Users\user\Desktop\2JlIMkLNXh.dll,CreateXmlReaderInputWithEncodingCodePage
                                                    Imagebase:0x7ff797770000
                                                    File size:69632 bytes
                                                    MD5 hash:73C519F050C20580F8A62C849D49215A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000008.00000002.257720074.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
                                                    Reputation:high

                                                    General

                                                    Start time:00:35:04
                                                    Start date:29/09/2021
                                                    Path:C:\Windows\System32\rundll32.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:rundll32.exe C:\Users\user\Desktop\2JlIMkLNXh.dll,CreateXmlReaderInputWithEncodingName
                                                    Imagebase:0x7ff6ab530000
                                                    File size:69632 bytes
                                                    MD5 hash:73C519F050C20580F8A62C849D49215A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 0000000A.00000002.266384036.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
                                                    Reputation:high

                                                    General

                                                    Start time:00:35:43
                                                    Start date:29/09/2021
                                                    Path:C:\Windows\System32\mstsc.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\mstsc.exe
                                                    Imagebase:0x7ff6a77f0000
                                                    File size:3640832 bytes
                                                    MD5 hash:3FBB5CD8829E9533D0FF5819DB0444C0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language

                                                    General

                                                    Start time:00:35:45
                                                    Start date:29/09/2021
                                                    Path:C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Users\user\AppData\Local\fJxx4Zu\mstsc.exe
                                                    Imagebase:0x7ff660310000
                                                    File size:3640832 bytes
                                                    MD5 hash:3FBB5CD8829E9533D0FF5819DB0444C0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000016.00000002.374374689.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
                                                    Antivirus matches:
                                                    • Detection: 0%, Virustotal, Browse
                                                    • Detection: 0%, Metadefender, Browse
                                                    • Detection: 0%, ReversingLabs

                                                    General

                                                    Start time:00:35:55
                                                    Start date:29/09/2021
                                                    Path:C:\Windows\System32\rundll32.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                    Imagebase:0x7ff6ab530000
                                                    File size:69632 bytes
                                                    MD5 hash:73C519F050C20580F8A62C849D49215A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language

                                                    General

                                                    Start time:00:35:57
                                                    Start date:29/09/2021
                                                    Path:C:\Windows\System32\tcmsetup.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\tcmsetup.exe
                                                    Imagebase:0x7ff65de30000
                                                    File size:16384 bytes
                                                    MD5 hash:0DDA495155D552D024593C4B3246C8FA
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language

                                                    General

                                                    Start time:00:35:58
                                                    Start date:29/09/2021
                                                    Path:C:\Users\user\AppData\Local\YTBx\tcmsetup.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Users\user\AppData\Local\YTBx\tcmsetup.exe
                                                    Imagebase:0x7ff6193b0000
                                                    File size:16384 bytes
                                                    MD5 hash:0DDA495155D552D024593C4B3246C8FA
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 0000001A.00000002.394057525.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
                                                    Antivirus matches:
                                                    • Detection: 0%, Virustotal, Browse
                                                    • Detection: 0%, Metadefender, Browse
                                                    • Detection: 0%, ReversingLabs

                                                    General

                                                    Start time:00:36:05
                                                    Start date:29/09/2021
                                                    Path:C:\Windows\explorer.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:explorer.exe
                                                    Imagebase:0x7ff693d90000
                                                    File size:3933184 bytes
                                                    MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language

                                                    Disassembly

                                                    Code Analysis

                                                    Reset < >