Loading ...

Play interactive tourEdit tour

Windows Analysis Report A1ogRC4R34

Overview

General Information

Sample Name:A1ogRC4R34 (renamed file extension from none to dll)
Analysis ID:492806
MD5:5edd6ba336c4de29f55cadfd2167a67e
SHA1:af181a8f3fe25a515a8fe2a02559e5daceecf976
SHA256:eda8c025e5f5f67ae92bee0ed77113e18f60e9465f43fc43e00664f5bea7c32d
Tags:Dridexexe
Infos:

Most interesting Screenshot:

Detection

Dridex
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Dridex unpacked file
Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes memory attributes in foreign processes to executable or writable
Machine Learning detection for sample
Queues an APC in another process (thread injection)
Machine Learning detection for dropped file
Accesses ntoskrnl, likely to find offsets for exploits
Uses Atom Bombing / ProGate to inject into other processes
Queries the volume information (name, serial number etc) of a device
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Queries the installation date of Windows
Detected potential crypto function
Contains functionality to call native functions
Found dropped PE file which has not been started or loaded
Contains functionality which may be used to detect a debugger (GetProcessHeap)
PE file contains executable resources (Code or Archives)
Contains functionality for execution timing, often used to detect debuggers
Drops files with a non-matching file extension (content does not match file extension)
PE file contains an invalid checksum
PE file contains strange resources
Drops PE files
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Binary contains a suspicious time stamp
PE file contains more sections than normal
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • loaddll64.exe (PID: 7096 cmdline: loaddll64.exe 'C:\Users\user\Desktop\A1ogRC4R34.dll' MD5: E0CC9D126C39A9D2FA1CAD5027EBBD18)
    • cmd.exe (PID: 3192 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\A1ogRC4R34.dll',#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 6396 cmdline: rundll32.exe 'C:\Users\user\Desktop\A1ogRC4R34.dll',#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6408 cmdline: rundll32.exe C:\Users\user\Desktop\A1ogRC4R34.dll,LogonIdFromWinStationNameA MD5: 73C519F050C20580F8A62C849D49215A)
      • explorer.exe (PID: 3472 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • rdpinit.exe (PID: 6372 cmdline: C:\Windows\system32\rdpinit.exe MD5: EF7C9CF6EA5B8B9C5C8320990714C35D)
        • rdpinit.exe (PID: 5620 cmdline: C:\Users\user\AppData\Local\fID\rdpinit.exe MD5: EF7C9CF6EA5B8B9C5C8320990714C35D)
        • DmNotificationBroker.exe (PID: 4592 cmdline: C:\Windows\system32\DmNotificationBroker.exe MD5: 1643D5735213BC89C0012F0E48253765)
        • DmNotificationBroker.exe (PID: 5212 cmdline: C:\Users\user\AppData\Local\uBsjD\DmNotificationBroker.exe MD5: 1643D5735213BC89C0012F0E48253765)
        • BitLockerWizardElev.exe (PID: 4916 cmdline: C:\Windows\system32\BitLockerWizardElev.exe MD5: 3104EA9ECCA9ED71A382CCAAD618CEAE)
        • BitLockerWizardElev.exe (PID: 6400 cmdline: C:\Users\user\AppData\Local\r7RKh\BitLockerWizardElev.exe MD5: 3104EA9ECCA9ED71A382CCAAD618CEAE)
        • wusa.exe (PID: 3676 cmdline: C:\Windows\system32\wusa.exe MD5: 04CE745559916B99248F266BBF5F9ED9)
        • wusa.exe (PID: 964 cmdline: C:\Users\user\AppData\Local\H3fqckDRC\wusa.exe MD5: 04CE745559916B99248F266BBF5F9ED9)
        • SystemPropertiesAdvanced.exe (PID: 6656 cmdline: C:\Users\user\AppData\Local\3HlyM7czl\SystemPropertiesAdvanced.exe MD5: 82ED6250B9AA030DDC13DC075D2C16E3)
        • unregmp2.exe (PID: 7140 cmdline: C:\Windows\system32\unregmp2.exe MD5: 9B517303C58CA8A450B97B0D71594CBB)
    • rundll32.exe (PID: 6492 cmdline: rundll32.exe C:\Users\user\Desktop\A1ogRC4R34.dll,LogonIdFromWinStationNameW MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 3684 cmdline: rundll32.exe C:\Users\user\Desktop\A1ogRC4R34.dll,RemoteAssistancePrepareSystemRestore MD5: 73C519F050C20580F8A62C849D49215A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000028.00000002.476229981.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
    00000007.00000002.248393203.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
      00000003.00000002.327777249.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
        00000018.00000002.356788011.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
          0000001F.00000002.390772898.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
            Click to see the 5 entries

            Sigma Overview

            No Sigma rule has matched

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Multi AV Scanner detection for submitted fileShow sources
            Source: A1ogRC4R34.dllVirustotal: Detection: 62%Perma Link
            Source: A1ogRC4R34.dllMetadefender: Detection: 57%Perma Link
            Source: A1ogRC4R34.dllReversingLabs: Detection: 75%
            Antivirus / Scanner detection for submitted sampleShow sources
            Source: A1ogRC4R34.dllAvira: detected
            Antivirus detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\VcAfkDB\VERSION.dllAvira: detection malicious, Label: TR/Crypt.ZPACK.Gen
            Source: C:\Users\user\AppData\Local\fID\WINSTA.dllAvira: detection malicious, Label: TR/Crypt.ZPACK.Gen
            Source: C:\Users\user\AppData\Local\uBsjD\DUI70.dllAvira: detection malicious, Label: HEUR/AGEN.1114452
            Source: C:\Users\user\AppData\Local\r7RKh\FVEWIZ.dllAvira: detection malicious, Label: HEUR/AGEN.1114452
            Source: C:\Users\user\AppData\Local\kyOIt4HX\TAPI32.dllAvira: detection malicious, Label: TR/Crypt.ZPACK.Gen
            Source: C:\Users\user\AppData\Local\SaryWtyzg\WINMM.dllAvira: detection malicious, Label: TR/Crypt.ZPACK.Gen
            Source: C:\Users\user\AppData\Local\H3fqckDRC\dpx.dllAvira: detection malicious, Label: HEUR/AGEN.1114452
            Source: C:\Users\user\AppData\Local\3HlyM7czl\SYSDM.CPLAvira: detection malicious, Label: HEUR/AGEN.1114452
            Machine Learning detection for sampleShow sources
            Source: A1ogRC4R34.dllJoe Sandbox ML: detected
            Machine Learning detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\VcAfkDB\VERSION.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\fID\WINSTA.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\uBsjD\DUI70.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\r7RKh\FVEWIZ.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\kyOIt4HX\TAPI32.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\SaryWtyzg\WINMM.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\H3fqckDRC\dpx.dllJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\3HlyM7czl\SYSDM.CPLJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785A82D94 CryptAcquireContextW,GetLastError,CryptGenRandom,GetLastError,CryptReleaseContext,

            Exploits:

            barindex
            Accesses ntoskrnl, likely to find offsets for exploitsShow sources
            Source: C:\Windows\explorer.exeFile opened: C:\Windows\system32\ntkrnlmp.exe
            Source: A1ogRC4R34.dllStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005D290 FindFirstFileExW,

            E-Banking Fraud:

            barindex
            Yara detected Dridex unpacked fileShow sources
            Source: Yara matchFile source: 00000028.00000002.476229981.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.248393203.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.327777249.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000018.00000002.356788011.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001F.00000002.390772898.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000026.00000002.449479227.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.254502525.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.234114370.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.241053387.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000022.00000002.416996891.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140034870
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140035270
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140048AC0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005C340
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140065B80
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006A4B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400524B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140026CC0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004BD40
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400495B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140036F30
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140069010
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140001010
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140066020
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002F840
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005D850
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140064080
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140010880
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400688A0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002D0D0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400018D0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140016100
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001D100
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002A110
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001D910
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140015120
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000B120
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004F940
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140039140
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140023140
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140057950
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001E170
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140002980
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400611A0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400389A0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400381A0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002E1B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400139D0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400319F0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002EA00
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140022A00
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003B220
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140067A40
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140069A50
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140007A60
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003AAC0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003A2E0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140062B00
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140018300
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002FB20
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140031340
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140022340
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140017B40
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000BB40
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004EB60
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140005370
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002CB80
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006B390
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140054BA0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140033BB0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400263C0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400123C0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140063BD0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400663F0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140023BF0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006B41B
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006B424
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006B42D
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006B436
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006B43D
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140024440
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140005C40
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006B446
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005F490
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140022D00
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140035520
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140019D20
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140030530
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140023530
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140031540
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140033540
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014007BD50
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140078570
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140019580
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400205A0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140025DB0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140071DC0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000C5C0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002DDE0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140031DF0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000DDF0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140001620
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140018630
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140032650
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140064E80
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140016E80
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140007EA0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400286B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140006EB0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400276C0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002FEC0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002EED0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002B6E0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140053F20
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140022730
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140029780
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140018F80
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003EFB0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400067B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400667D0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140060FE0
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785A82EA4
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785AAE688
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785AB8E00
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785ABA908
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785A8D87C
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785A91780
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785AB7ACC
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785AB9B14
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785AB8A40
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785ABB1C0
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785AAE12C
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785AB1978
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785AB4CD0
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785A9FCF0
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785AAFC6C
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140046C90 NtClose,
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006A4B0 NtQuerySystemInformation,
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785AA9590 GetWindowThreadProcessId,CloseHandle,OpenProcess,QueryFullProcessImageNameW,NtQueryInformationProcess,CloseHandle,
            Source: DmNotificationBroker.exe.5.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
            Source: BitLockerWizardElev.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: BitLockerWizardElev.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: BitLockerWizardElev.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: wusa.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: wusa.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: wusa.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: SystemPropertiesAdvanced.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: SystemPropertiesAdvanced.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: SystemPropertiesAdvanced.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: PresentationSettings.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: PresentationSettings.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: PresentationSettings.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: PresentationSettings.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: PresentationSettings.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: PresentationSettings.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: PresentationSettings.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: PresentationSettings.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: FVEWIZ.dll.5.drStatic PE information: Number of sections : 48 > 10
            Source: TAPI32.dll.5.drStatic PE information: Number of sections : 48 > 10
            Source: DUI70.dll.5.drStatic PE information: Number of sections : 48 > 10
            Source: WINSTA.dll.5.drStatic PE information: Number of sections : 48 > 10
            Source: SYSDM.CPL.5.drStatic PE information: Number of sections : 48 > 10
            Source: WINMM.dll.5.drStatic PE information: Number of sections : 48 > 10
            Source: VERSION.dll.5.drStatic PE information: Number of sections : 48 > 10
            Source: A1ogRC4R34.dllStatic PE information: Number of sections : 47 > 10
            Source: dpx.dll.5.drStatic PE information: Number of sections : 47 > 10
            Source: A1ogRC4R34.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: WINSTA.dll.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: DUI70.dll.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: FVEWIZ.dll.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: dpx.dll.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: SYSDM.CPL.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: VERSION.dll.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: TAPI32.dll.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: WINMM.dll.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: A1ogRC4R34.dllVirustotal: Detection: 62%
            Source: A1ogRC4R34.dllMetadefender: Detection: 57%
            Source: A1ogRC4R34.dllReversingLabs: Detection: 75%
            Source: A1ogRC4R34.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe 'C:\Users\user\Desktop\A1ogRC4R34.dll'
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\A1ogRC4R34.dll',#1
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\A1ogRC4R34.dll,LogonIdFromWinStationNameA
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\A1ogRC4R34.dll',#1
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\A1ogRC4R34.dll,LogonIdFromWinStationNameW
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\A1ogRC4R34.dll,RemoteAssistancePrepareSystemRestore
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\rdpinit.exe C:\Windows\system32\rdpinit.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\fID\rdpinit.exe C:\Users\user\AppData\Local\fID\rdpinit.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\DmNotificationBroker.exe C:\Windows\system32\DmNotificationBroker.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\uBsjD\DmNotificationBroker.exe C:\Users\user\AppData\Local\uBsjD\DmNotificationBroker.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\BitLockerWizardElev.exe C:\Windows\system32\BitLockerWizardElev.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\r7RKh\BitLockerWizardElev.exe C:\Users\user\AppData\Local\r7RKh\BitLockerWizardElev.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\wusa.exe C:\Windows\system32\wusa.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\H3fqckDRC\wusa.exe C:\Users\user\AppData\Local\H3fqckDRC\wusa.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\SystemPropertiesAdvanced.exe C:\Windows\system32\SystemPropertiesAdvanced.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\3HlyM7czl\SystemPropertiesAdvanced.exe C:\Users\user\AppData\Local\3HlyM7czl\SystemPropertiesAdvanced.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\unregmp2.exe C:\Windows\system32\unregmp2.exe
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\A1ogRC4R34.dll',#1
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\A1ogRC4R34.dll,LogonIdFromWinStationNameA
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\A1ogRC4R34.dll,LogonIdFromWinStationNameW
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\A1ogRC4R34.dll,RemoteAssistancePrepareSystemRestore
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\A1ogRC4R34.dll',#1
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\rdpinit.exe C:\Windows\system32\rdpinit.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\fID\rdpinit.exe C:\Users\user\AppData\Local\fID\rdpinit.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\DmNotificationBroker.exe C:\Windows\system32\DmNotificationBroker.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\uBsjD\DmNotificationBroker.exe C:\Users\user\AppData\Local\uBsjD\DmNotificationBroker.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\BitLockerWizardElev.exe C:\Windows\system32\BitLockerWizardElev.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\r7RKh\BitLockerWizardElev.exe C:\Users\user\AppData\Local\r7RKh\BitLockerWizardElev.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\wusa.exe C:\Windows\system32\wusa.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\H3fqckDRC\wusa.exe C:\Users\user\AppData\Local\H3fqckDRC\wusa.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\SystemPropertiesAdvanced.exe C:\Windows\system32\SystemPropertiesAdvanced.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\3HlyM7czl\SystemPropertiesAdvanced.exe C:\Users\user\AppData\Local\3HlyM7czl\SystemPropertiesAdvanced.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\unregmp2.exe C:\Windows\system32\unregmp2.exe
            Source: C:\Windows\explorer.exeProcess created: unknown unknown
            Source: C:\Windows\explorer.exeProcess created: unknown unknown
            Source: C:\Windows\explorer.exeProcess created: unknown unknown
            Source: C:\Windows\explorer.exeProcess created: unknown unknown
            Source: C:\Windows\explorer.exeProcess created: unknown unknown
            Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CryptoJump to behavior
            Source: classification engineClassification label: mal100.troj.expl.evad.winDLL@38/17@0/0
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785A91D80 CoCreateInstance,CoSetProxyBlanket,
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\A1ogRC4R34.dll,LogonIdFromWinStationNameA
            Source: C:\Users\user\AppData\Local\uBsjD\DmNotificationBroker.exeMutant created: \Sessions\1\BaseNamedObjects\{0ad3bd68-c5ec-a10f-ef97-5ace4ed7d359}
            Source: C:\Users\user\AppData\Local\uBsjD\DmNotificationBroker.exeMutant created: \Sessions\1\BaseNamedObjects\{f429f929-471a-28a5-5cf5-8c81149c5888}
            Source: rdpinit.exeString found in binary or memory: Re-Start RdpShell failed
            Source: A1ogRC4R34.dllStatic PE information: More than 166 > 100 exports found
            Source: A1ogRC4R34.dllStatic PE information: Image base 0x140000000 > 0x60000000
            Source: A1ogRC4R34.dllStatic file information: File size 2166784 > 1048576
            Source: A1ogRC4R34.dllStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140056A4D push rdi; ret
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785A94162 push rcx; ret
            Source: A1ogRC4R34.dllStatic PE information: section name: .qkm
            Source: A1ogRC4R34.dllStatic PE information: section name: .cvjb
            Source: A1ogRC4R34.dllStatic PE information: section name: .tlmkv
            Source: A1ogRC4R34.dllStatic PE information: section name: .wucsxe
            Source: A1ogRC4R34.dllStatic PE information: section name: .fltwtj
            Source: A1ogRC4R34.dllStatic PE information: section name: .sfplio
            Source: A1ogRC4R34.dllStatic PE information: section name: .rpg
            Source: A1ogRC4R34.dllStatic PE information: section name: .bewzc
            Source: A1ogRC4R34.dllStatic PE information: section name: .vksvaw
            Source: A1ogRC4R34.dllStatic PE information: section name: .wmhg
            Source: A1ogRC4R34.dllStatic PE information: section name: .kswemc
            Source: A1ogRC4R34.dllStatic PE information: section name: .kaxfk
            Source: A1ogRC4R34.dllStatic PE information: section name: .pjf
            Source: A1ogRC4R34.dllStatic PE information: section name: .retjqj
            Source: A1ogRC4R34.dllStatic PE information: section name: .mizn
            Source: A1ogRC4R34.dllStatic PE information: section name: .rsrub
            Source: A1ogRC4R34.dllStatic PE information: section name: .fhgxfk
            Source: A1ogRC4R34.dllStatic PE information: section name: .wqpbrq
            Source: A1ogRC4R34.dllStatic PE information: section name: .xlhbgj
            Source: A1ogRC4R34.dllStatic PE information: section name: .rzgl
            Source: A1ogRC4R34.dllStatic PE information: section name: .yic
            Source: A1ogRC4R34.dllStatic PE information: section name: .zfmbo
            Source: A1ogRC4R34.dllStatic PE information: section name: .kurwl
            Source: A1ogRC4R34.dllStatic PE information: section name: .crlsf
            Source: A1ogRC4R34.dllStatic PE information: section name: .wrn
            Source: A1ogRC4R34.dllStatic PE information: section name: .blcv
            Source: A1ogRC4R34.dllStatic PE information: section name: .roblb
            Source: A1ogRC4R34.dllStatic PE information: section name: .yblxa
            Source: A1ogRC4R34.dllStatic PE information: section name: .tfy
            Source: A1ogRC4R34.dllStatic PE information: section name: .wsmv
            Source: A1ogRC4R34.dllStatic PE information: section name: .hrs
            Source: A1ogRC4R34.dllStatic PE information: section name: .ppapg
            Source: A1ogRC4R34.dllStatic PE information: section name: .udm
            Source: A1ogRC4R34.dllStatic PE information: section name: .fxc
            Source: A1ogRC4R34.dllStatic PE information: section name: .fvxxk
            Source: A1ogRC4R34.dllStatic PE information: section name: .zmj
            Source: A1ogRC4R34.dllStatic PE information: section name: .zvz
            Source: A1ogRC4R34.dllStatic PE information: section name: .xyiz
            Source: A1ogRC4R34.dllStatic PE information: section name: .gbzxp
            Source: A1ogRC4R34.dllStatic PE information: section name: .kkivgv
            Source: A1ogRC4R34.dllStatic PE information: section name: .evwibb
            Source: rdpinit.exe.5.drStatic PE information: section name: .imrsiv
            Source: DmNotificationBroker.exe.5.drStatic PE information: section name: .imrsiv
            Source: WINSTA.dll.5.drStatic PE information: section name: .qkm
            Source: WINSTA.dll.5.drStatic PE information: section name: .cvjb
            Source: WINSTA.dll.5.drStatic PE information: section name: .tlmkv
            Source: WINSTA.dll.5.drStatic PE information: section name: .wucsxe
            Source: WINSTA.dll.5.drStatic PE information: section name: .fltwtj
            Source: WINSTA.dll.5.drStatic PE information: section name: .sfplio
            Source: WINSTA.dll.5.drStatic PE information: section name: .rpg
            Source: WINSTA.dll.5.drStatic PE information: section name: .bewzc
            Source: WINSTA.dll.5.drStatic PE information: section name: .vksvaw
            Source: WINSTA.dll.5.drStatic PE information: section name: .wmhg
            Source: WINSTA.dll.5.drStatic PE information: section name: .kswemc
            Source: WINSTA.dll.5.drStatic PE information: section name: .kaxfk
            Source: WINSTA.dll.5.drStatic PE information: section name: .pjf
            Source: WINSTA.dll.5.drStatic PE information: section name: .retjqj
            Source: WINSTA.dll.5.drStatic PE information: section name: .mizn
            Source: WINSTA.dll.5.drStatic PE information: section name: .rsrub
            Source: WINSTA.dll.5.drStatic PE information: section name: .fhgxfk
            Source: WINSTA.dll.5.drStatic PE information: section name: .wqpbrq
            Source: WINSTA.dll.5.drStatic PE information: section name: .xlhbgj
            Source: WINSTA.dll.5.drStatic PE information: section name: .rzgl
            Source: WINSTA.dll.5.drStatic PE information: section name: .yic
            Source: WINSTA.dll.5.drStatic PE information: section name: .zfmbo
            Source: WINSTA.dll.5.drStatic PE information: section name: .kurwl
            Source: WINSTA.dll.5.drStatic PE information: section name: .crlsf
            Source: WINSTA.dll.5.drStatic PE information: section name: .wrn
            Source: WINSTA.dll.5.drStatic PE information: section name: .blcv
            Source: WINSTA.dll.5.drStatic PE information: section name: .roblb
            Source: WINSTA.dll.5.drStatic PE information: section name: .yblxa
            Source: WINSTA.dll.5.drStatic PE information: section name: .tfy
            Source: WINSTA.dll.5.drStatic PE information: section name: .wsmv
            Source: WINSTA.dll.5.drStatic PE information: section name: .hrs
            Source: WINSTA.dll.5.drStatic PE information: section name: .ppapg
            Source: WINSTA.dll.5.drStatic PE information: section name: .udm
            Source: WINSTA.dll.5.drStatic PE information: section name: .fxc
            Source: WINSTA.dll.5.drStatic PE information: section name: .fvxxk
            Source: WINSTA.dll.5.drStatic PE information: section name: .zmj
            Source: WINSTA.dll.5.drStatic PE information: section name: .zvz
            Source: WINSTA.dll.5.drStatic PE information: section name: .xyiz
            Source: WINSTA.dll.5.drStatic PE information: section name: .gbzxp
            Source: WINSTA.dll.5.drStatic PE information: section name: .kkivgv
            Source: WINSTA.dll.5.drStatic PE information: section name: .evwibb
            Source: WINSTA.dll.5.drStatic PE information: section name: .rqefr
            Source: DUI70.dll.5.drStatic PE information: section name: .qkm
            Source: DUI70.dll.5.drStatic PE information: section name: .cvjb
            Source: DUI70.dll.5.drStatic PE information: section name: .tlmkv
            Source: DUI70.dll.5.drStatic PE information: section name: .wucsxe
            Source: DUI70.dll.5.drStatic PE information: section name: .fltwtj
            Source: DUI70.dll.5.drStatic PE information: section name: .sfplio
            Source: DUI70.dll.5.drStatic PE information: section name: .rpg
            Source: DUI70.dll.5.drStatic PE information: section name: .bewzc
            Source: DUI70.dll.5.drStatic PE information: section name: .vksvaw
            Source: DUI70.dll.5.drStatic PE information: section name: .wmhg
            Source: DUI70.dll.5.drStatic PE information: section name: .kswemc
            Source: DUI70.dll.5.drStatic PE information: section name: .kaxfk
            Source: DUI70.dll.5.drStatic PE information: section name: .pjf
            Source: DUI70.dll.5.drStatic PE information: section name: .retjqj
            Source: DUI70.dll.5.drStatic PE information: section name: .mizn
            Source: DUI70.dll.5.drStatic PE information: section name: .rsrub
            Source: DUI70.dll.5.drStatic PE information: section name: .fhgxfk
            Source: DUI70.dll.5.drStatic PE information: section name: .wqpbrq
            Source: DUI70.dll.5.drStatic PE information: section name: .xlhbgj
            Source: DUI70.dll.5.drStatic PE information: section name: .rzgl
            Source: DUI70.dll.5.drStatic PE information: section name: .yic
            Source: DUI70.dll.5.drStatic PE information: section name: .zfmbo
            Source: DUI70.dll.5.drStatic PE information: section name: .kurwl
            Source: DUI70.dll.5.drStatic PE information: section name: .crlsf
            Source: DUI70.dll.5.drStatic PE information: section name: .wrn
            Source: DUI70.dll.5.drStatic PE information: section name: .blcv
            Source: DUI70.dll.5.drStatic PE information: section name: .roblb
            Source: DUI70.dll.5.drStatic PE information: section name: .yblxa
            Source: DUI70.dll.5.drStatic PE information: section name: .tfy
            Source: DUI70.dll.5.drStatic PE information: section name: .wsmv
            Source: DUI70.dll.5.drStatic PE information: section name: .hrs
            Source: DUI70.dll.5.drStatic PE information: section name: .ppapg
            Source: DUI70.dll.5.drStatic PE information: section name: .udm
            Source: DUI70.dll.5.drStatic PE information: section name: .fxc
            Source: DUI70.dll.5.drStatic PE information: section name: .fvxxk
            Source: DUI70.dll.5.drStatic PE information: section name: .zmj
            Source: DUI70.dll.5.drStatic PE information: section name: .zvz
            Source: DUI70.dll.5.drStatic PE information: section name: .xyiz
            Source: DUI70.dll.5.drStatic PE information: section name: .gbzxp
            Source: DUI70.dll.5.drStatic PE information: section name: .kkivgv
            Source: DUI70.dll.5.drStatic PE information: section name: .evwibb
            Source: DUI70.dll.5.drStatic PE information: section name: .kcklp
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .qkm
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .cvjb
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .tlmkv
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .wucsxe
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .fltwtj
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .sfplio
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .rpg
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .bewzc
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .vksvaw
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .wmhg
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .kswemc
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .kaxfk
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .pjf
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .retjqj
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .mizn
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .rsrub
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .fhgxfk
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .wqpbrq
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .xlhbgj
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .rzgl
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .yic
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .zfmbo
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .kurwl
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .crlsf
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .wrn
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .blcv
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .roblb
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .yblxa
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .tfy
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .wsmv
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .hrs
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .ppapg
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .udm
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .fxc
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .fvxxk
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .zmj
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .zvz
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .xyiz
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .gbzxp
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .kkivgv
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .evwibb
            Source: FVEWIZ.dll.5.drStatic PE information: section name: .nzduo
            Source: dpx.dll.5.drStatic PE information: section name: .qkm
            Source: dpx.dll.5.drStatic PE information: section name: .cvjb
            Source: dpx.dll.5.drStatic PE information: section name: .tlmkv
            Source: dpx.dll.5.drStatic PE information: section name: .wucsxe
            Source: dpx.dll.5.drStatic PE information: section name: .fltwtj
            Source: dpx.dll.5.drStatic PE information: section name: .sfplio
            Source: dpx.dll.5.drStatic PE information: section name: .rpg
            Source: dpx.dll.5.drStatic PE information: section name: .bewzc
            Source: dpx.dll.5.drStatic PE information: section name: .vksvaw
            Source: dpx.dll.5.drStatic PE information: section name: .wmhg
            Source: dpx.dll.5.drStatic PE information: section name: .kswemc
            Source: dpx.dll.5.drStatic PE information: section name: .kaxfk
            Source: dpx.dll.5.drStatic PE information: section name: .pjf
            Source: dpx.dll.5.drStatic PE information: section name: .retjqj
            Source: dpx.dll.5.drStatic PE information: section name: .mizn
            Source: dpx.dll.5.drStatic PE information: section name: .rsrub
            Source: dpx.dll.5.drStatic PE information: section name: .fhgxfk
            Source: dpx.dll.5.drStatic PE information: section name: .wqpbrq
            Source: dpx.dll.5.drStatic PE information: section name: .xlhbgj
            Source: dpx.dll.5.drStatic PE information: section name: .rzgl
            Source: dpx.dll.5.drStatic PE information: section name: .yic
            Source: dpx.dll.5.drStatic PE information: section name: .zfmbo
            Source: dpx.dll.5.drStatic PE information: section name: .kurwl
            Source: dpx.dll.5.drStatic PE information: section name: .crlsf
            Source: dpx.dll.5.drStatic PE information: section name: .wrn
            Source: dpx.dll.5.drStatic PE information: section name: .blcv
            Source: dpx.dll.5.drStatic PE information: section name: .roblb
            Source: dpx.dll.5.drStatic PE information: section name: .yblxa
            Source: dpx.dll.5.drStatic PE information: section name: .tfy
            Source: dpx.dll.5.drStatic PE information: section name: .wsmv
            Source: dpx.dll.5.drStatic PE information: section name: .hrs
            Source: dpx.dll.5.drStatic PE information: section name: .ppapg
            Source: dpx.dll.5.drStatic PE information: section name: .udm
            Source: dpx.dll.5.drStatic PE information: section name: .fxc
            Source: dpx.dll.5.drStatic PE information: section name: .fvxxk
            Source: dpx.dll.5.drStatic PE information: section name: .zmj
            Source: dpx.dll.5.drStatic PE information: section name: .zvz
            Source: dpx.dll.5.drStatic PE information: section name: .xyiz
            Source: dpx.dll.5.drStatic PE information: section name: .gbzxp
            Source: dpx.dll.5.drStatic PE information: section name: .kkivgv
            Source: dpx.dll.5.drStatic PE information: section name: .evwibb
            Source: SYSDM.CPL.5.drStatic PE information: section name: .qkm
            Source: SYSDM.CPL.5.drStatic PE information: section name: .cvjb
            Source: SYSDM.CPL.5.drStatic PE information: section name: .tlmkv
            Source: SYSDM.CPL.5.drStatic PE information: section name: .wucsxe
            Source: SYSDM.CPL.5.drStatic PE information: section name: .fltwtj
            Source: SYSDM.CPL.5.drStatic PE information: section name: .sfplio
            Source: SYSDM.CPL.5.drStatic PE information: section name: .rpg
            Source: SYSDM.CPL.5.drStatic PE information: section name: .bewzc
            Source: SYSDM.CPL.5.drStatic PE information: section name: .vksvaw
            Source: SYSDM.CPL.5.drStatic PE information: section name: .wmhg
            Source: SYSDM.CPL.5.drStatic PE information: section name: .kswemc
            Source: SYSDM.CPL.5.drStatic PE information: section name: .kaxfk
            Source: SYSDM.CPL.5.drStatic PE information: section name: .pjf
            Source: SYSDM.CPL.5.drStatic PE information: section name: .retjqj
            Source: SYSDM.CPL.5.drStatic PE information: section name: .mizn
            Source: SYSDM.CPL.5.drStatic PE information: section name: .rsrub
            Source: SYSDM.CPL.5.drStatic PE information: section name: .fhgxfk
            Source: SYSDM.CPL.5.drStatic PE information: section name: .wqpbrq
            Source: SYSDM.CPL.5.drStatic PE information: section name: .xlhbgj
            Source: SYSDM.CPL.5.drStatic PE information: section name: .rzgl
            Source: SYSDM.CPL.5.drStatic PE information: section name: .yic
            Source: SYSDM.CPL.5.drStatic PE information: section name: .zfmbo
            Source: SYSDM.CPL.5.drStatic PE information: section name: .kurwl
            Source: SYSDM.CPL.5.drStatic PE information: section name: .crlsf
            Source: SYSDM.CPL.5.drStatic PE information: section name: .wrn
            Source: SYSDM.CPL.5.drStatic PE information: section name: .blcv
            Source: SYSDM.CPL.5.drStatic PE information: section name: .roblb
            Source: SYSDM.CPL.5.drStatic PE information: section name: .yblxa
            Source: SYSDM.CPL.5.drStatic PE information: section name: .tfy
            Source: SYSDM.CPL.5.drStatic PE information: section name: .wsmv
            Source: SYSDM.CPL.5.drStatic PE information: section name: .hrs
            Source: SYSDM.CPL.5.drStatic PE information: section name: .ppapg
            Source: SYSDM.CPL.5.drStatic PE information: section name: .udm
            Source: SYSDM.CPL.5.drStatic PE information: section name: .fxc
            Source: SYSDM.CPL.5.drStatic PE information: section name: .fvxxk
            Source: SYSDM.CPL.5.drStatic PE information: section name: .zmj
            Source: SYSDM.CPL.5.drStatic PE information: section name: .zvz
            Source: SYSDM.CPL.5.drStatic PE information: section name: .xyiz
            Source: SYSDM.CPL.5.drStatic PE information: section name: .gbzxp
            Source: SYSDM.CPL.5.drStatic PE information: section name: .kkivgv
            Source: SYSDM.CPL.5.drStatic PE information: section name: .evwibb
            Source: SYSDM.CPL.5.drStatic PE information: section name: .ffktuw
            Source: VERSION.dll.5.drStatic PE information: section name: .qkm
            Source: VERSION.dll.5.drStatic PE information: section name: .cvjb
            Source: VERSION.dll.5.drStatic PE information: section name: .tlmkv
            Source: VERSION.dll.5.drStatic PE information: section name: .wucsxe
            Source: VERSION.dll.5.drStatic PE information: section name: .fltwtj
            Source: VERSION.dll.5.drStatic PE information: section name: .sfplio
            Source: VERSION.dll.5.drStatic PE information: section name: .rpg
            Source: VERSION.dll.5.drStatic PE information: section name: .bewzc
            Source: VERSION.dll.5.drStatic PE information: section name: .vksvaw
            Source: VERSION.dll.5.drStatic PE information: section name: .wmhg
            Source: VERSION.dll.5.drStatic PE information: section name: .kswemc
            Source: VERSION.dll.5.drStatic PE information: section name: .kaxfk
            Source: VERSION.dll.5.drStatic PE information: section name: .pjf
            Source: VERSION.dll.5.drStatic PE information: section name: .retjqj
            Source: VERSION.dll.5.drStatic PE information: section name: .mizn
            Source: VERSION.dll.5.drStatic PE information: section name: .rsrub
            Source: VERSION.dll.5.drStatic PE information: section name: .fhgxfk
            Source: VERSION.dll.5.drStatic PE information: section name: .wqpbrq
            Source: VERSION.dll.5.drStatic PE information: section name: .xlhbgj
            Source: VERSION.dll.5.drStatic PE information: section name: .rzgl
            Source: VERSION.dll.5.drStatic PE information: section name: .yic
            Source: VERSION.dll.5.drStatic PE information: section name: .zfmbo
            Source: VERSION.dll.5.drStatic PE information: section name: .kurwl
            Source: VERSION.dll.5.drStatic PE information: section name: .crlsf
            Source: VERSION.dll.5.drStatic PE information: section name: .wrn
            Source: VERSION.dll.5.drStatic PE information: section name: .blcv
            Source: VERSION.dll.5.drStatic PE information: section name: .roblb
            Source: VERSION.dll.5.drStatic PE information: section name: .yblxa
            Source: VERSION.dll.5.drStatic PE information: section name: .tfy
            Source: VERSION.dll.5.drStatic PE information: section name: .wsmv
            Source: VERSION.dll.5.drStatic PE information: section name: .hrs
            Source: VERSION.dll.5.drStatic PE information: section name: .ppapg
            Source: VERSION.dll.5.drStatic PE information: section name: .udm
            Source: VERSION.dll.5.drStatic PE information: section name: .fxc
            Source: VERSION.dll.5.drStatic PE information: section name: .fvxxk
            Source: VERSION.dll.5.drStatic PE information: section name: .zmj
            Source: VERSION.dll.5.drStatic PE information: section name: .zvz
            Source: VERSION.dll.5.drStatic PE information: section name: .xyiz
            Source: VERSION.dll.5.drStatic PE information: section name: .gbzxp
            Source: VERSION.dll.5.drStatic PE information: section name: .kkivgv
            Source: VERSION.dll.5.drStatic PE information: section name: .evwibb
            Source: VERSION.dll.5.drStatic PE information: section name: .swia
            Source: TAPI32.dll.5.drStatic PE information: section name: .qkm
            Source: TAPI32.dll.5.drStatic PE information: section name: .cvjb
            Source: TAPI32.dll.5.drStatic PE information: section name: .tlmkv
            Source: TAPI32.dll.5.drStatic PE information: section name: .wucsxe
            Source: TAPI32.dll.5.drStatic PE information: section name: .fltwtj
            Source: TAPI32.dll.5.drStatic PE information: section name: .sfplio
            Source: TAPI32.dll.5.drStatic PE information: section name: .rpg
            Source: TAPI32.dll.5.drStatic PE information: section name: .bewzc
            Source: TAPI32.dll.5.drStatic PE information: section name: .vksvaw
            Source: TAPI32.dll.5.drStatic PE information: section name: .wmhg
            Source: TAPI32.dll.5.drStatic PE information: section name: .kswemc
            Source: TAPI32.dll.5.drStatic PE information: section name: .kaxfk
            Source: TAPI32.dll.5.drStatic PE information: section name: .pjf
            Source: TAPI32.dll.5.drStatic PE information: section name: .retjqj
            Source: TAPI32.dll.5.drStatic PE information: section name: .mizn
            Source: TAPI32.dll.5.drStatic PE information: section name: .rsrub
            Source: TAPI32.dll.5.drStatic PE information: section name: .fhgxfk
            Source: TAPI32.dll.5.drStatic PE information: section name: .wqpbrq
            Source: TAPI32.dll.5.drStatic PE information: section name: .xlhbgj
            Source: TAPI32.dll.5.drStatic PE information: section name: .rzgl
            Source: TAPI32.dll.5.drStatic PE information: section name: .yic
            Source: TAPI32.dll.5.drStatic PE information: section name: .zfmbo
            Source: TAPI32.dll.5.drStatic PE information: section name: .kurwl
            Source: TAPI32.dll.5.drStatic PE information: section name: .crlsf
            Source: TAPI32.dll.5.drStatic PE information: section name: .wrn
            Source: TAPI32.dll.5.drStatic PE information: section name: .blcv
            Source: TAPI32.dll.5.drStatic PE information: section name: .roblb
            Source: TAPI32.dll.5.drStatic PE information: section name: .yblxa
            Source: TAPI32.dll.5.drStatic PE information: section name: .tfy
            Source: TAPI32.dll.5.drStatic PE information: section name: .wsmv
            Source: TAPI32.dll.5.drStatic PE information: section name: .hrs
            Source: TAPI32.dll.5.drStatic PE information: section name: .ppapg
            Source: TAPI32.dll.5.drStatic PE information: section name: .udm
            Source: TAPI32.dll.5.drStatic PE information: section name: .fxc
            Source: TAPI32.dll.5.drStatic PE information: section name: .fvxxk
            Source: TAPI32.dll.5.drStatic PE information: section name: .zmj
            Source: TAPI32.dll.5.drStatic PE information: section name: .zvz
            Source: TAPI32.dll.5.drStatic PE information: section name: .xyiz
            Source: TAPI32.dll.5.drStatic PE information: section name: .gbzxp
            Source: TAPI32.dll.5.drStatic PE information: section name: .kkivgv
            Source: TAPI32.dll.5.drStatic PE information: section name: .evwibb
            Source: TAPI32.dll.5.drStatic PE information: section name: .apbeye
            Source: WINMM.dll.5.drStatic PE information: section name: .qkm
            Source: WINMM.dll.5.drStatic PE information: section name: .cvjb
            Source: WINMM.dll.5.drStatic PE information: section name: .tlmkv
            Source: WINMM.dll.5.drStatic PE information: section name: .wucsxe
            Source: WINMM.dll.5.drStatic PE information: section name: .fltwtj
            Source: WINMM.dll.5.drStatic PE information: section name: .sfplio
            Source: WINMM.dll.5.drStatic PE information: section name: .rpg
            Source: WINMM.dll.5.drStatic PE information: section name: .bewzc
            Source: WINMM.dll.5.drStatic PE information: section name: .vksvaw
            Source: WINMM.dll.5.drStatic PE information: section name: .wmhg
            Source: WINMM.dll.5.drStatic PE information: section name: .kswemc
            Source: WINMM.dll.5.drStatic PE information: section name: .kaxfk
            Source: WINMM.dll.5.drStatic PE information: section name: .pjf
            Source: WINMM.dll.5.drStatic PE information: section name: .retjqj
            Source: WINMM.dll.5.drStatic PE information: section name: .mizn
            Source: WINMM.dll.5.drStatic PE information: section name: .rsrub
            Source: WINMM.dll.5.drStatic PE information: section name: .fhgxfk
            Source: WINMM.dll.5.drStatic PE information: section name: .wqpbrq
            Source: WINMM.dll.5.drStatic PE information: section name: .xlhbgj
            Source: WINMM.dll.5.drStatic PE information: section name: .rzgl
            Source: WINMM.dll.5.drStatic PE information: section name: .yic
            Source: WINMM.dll.5.drStatic PE information: section name: .zfmbo
            Source: WINMM.dll.5.drStatic PE information: section name: .kurwl
            Source: WINMM.dll.5.drStatic PE information: section name: .crlsf
            Source: WINMM.dll.5.drStatic PE information: section name: .wrn
            Source: WINMM.dll.5.drStatic PE information: section name: .blcv
            Source: WINMM.dll.5.drStatic PE information: section name: .roblb
            Source: WINMM.dll.5.drStatic PE information: section name: .yblxa
            Source: WINMM.dll.5.drStatic PE information: section name: .tfy
            Source: WINMM.dll.5.drStatic PE information: section name: .wsmv
            Source: WINMM.dll.5.drStatic PE information: section name: .hrs
            Source: WINMM.dll.5.drStatic PE information: section name: .ppapg
            Source: WINMM.dll.5.drStatic PE information: section name: .udm
            Source: WINMM.dll.5.drStatic PE information: section name: .fxc
            Source: WINMM.dll.5.drStatic PE information: section name: .fvxxk
            Source: WINMM.dll.5.drStatic PE information: section name: .zmj
            Source: WINMM.dll.5.drStatic PE information: section name: .zvz
            Source: WINMM.dll.5.drStatic PE information: section name: .xyiz
            Source: WINMM.dll.5.drStatic PE information: section name: .gbzxp
            Source: WINMM.dll.5.drStatic PE information: section name: .kkivgv
            Source: WINMM.dll.5.drStatic PE information: section name: .evwibb
            Source: WINMM.dll.5.drStatic PE information: section name: .aao
            Source: FVEWIZ.dll.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x219e6e
            Source: TAPI32.dll.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x21d462
            Source: DUI70.dll.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x25ec74
            Source: WINSTA.dll.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x218cc7
            Source: SYSDM.CPL.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x21750b
            Source: WINMM.dll.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x2211c1
            Source: VERSION.dll.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x21b310
            Source: A1ogRC4R34.dllStatic PE information: real checksum: 0x7d786c40 should be: 0x21d47c
            Source: dpx.dll.5.drStatic PE information: real checksum: 0x7d786c40 should be: 0x21e2ea
            Source: rdpinit.exe.5.drStatic PE information: 0xC894E371 [Fri Aug 21 01:59:13 2076 UTC]
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: initial sampleStatic PE information: section name: .text entropy: 7.73364605679
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\3HlyM7czl\SYSDM.CPLJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\3HlyM7czl\SYSDM.CPLJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\fID\WINSTA.dllJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\kyOIt4HX\tcmsetup.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\fID\rdpinit.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\VcAfkDB\unregmp2.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\kyOIt4HX\TAPI32.dllJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\r7RKh\BitLockerWizardElev.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\3HlyM7czl\SystemPropertiesAdvanced.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\VcAfkDB\VERSION.dllJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\uBsjD\DmNotificationBroker.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\r7RKh\FVEWIZ.dllJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\H3fqckDRC\dpx.dllJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\SaryWtyzg\WINMM.dllJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\uBsjD\DUI70.dllJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\H3fqckDRC\wusa.exeJump to dropped file
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\SaryWtyzg\PresentationSettings.exeJump to dropped file
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\3HlyM7czl\SYSDM.CPLJump to dropped file
            Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\kyOIt4HX\tcmsetup.exeJump to dropped file
            Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\kyOIt4HX\TAPI32.dllJump to dropped file
            Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\VcAfkDB\VERSION.dllJump to dropped file
            Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\r7RKh\FVEWIZ.dllJump to dropped file
            Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\H3fqckDRC\dpx.dllJump to dropped file
            Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\SaryWtyzg\WINMM.dllJump to dropped file
            Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\SaryWtyzg\PresentationSettings.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785A82EA4 rdtsc
            Source: C:\Windows\System32\loaddll64.exeProcess information queried: ProcessInformation
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005C340 GetSystemInfo,
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005D290 FindFirstFileExW,
            Source: explorer.exe, 00000005.00000000.278790068.0000000003710000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000005.00000000.252062582.000000000113D000.00000004.00000020.sdmpBinary or memory string: 0000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000005.00000000.236866941.0000000003767000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00
            Source: explorer.exe, 00000005.00000000.235527628.00000000011B3000.00000004.00000020.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000tft\0
            Source: explorer.exe, 00000005.00000000.284113222.00000000089B5000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000%
            Source: explorer.exe, 00000005.00000000.279536555.00000000053C4000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}>'R\"
            Source: explorer.exe, 00000005.00000000.284113222.00000000089B5000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&0000002
            Source: explorer.exe, 00000005.00000000.252062582.000000000113D000.00000004.00000020.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Vir99
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785A82EA4 VerSetConditionMask,VerifyVersionInfoW,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetModuleHandleExW,GetProcAddress,GetProcessHeap,HeapFree,FreeLibrary,GetLastError,GetLastError,GetProcessHeap,HeapAlloc,GetCurrentThreadId,GetLastError,GetProcessHeap,HeapAlloc,GetCurrentProcess,GetProcessMitigationPolicy,LocalAlloc,~SyncLockT,FreeLibrary,~SyncLockT,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetModuleFileNameW,GetLastError,GetLastError,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetModuleHandleExW,GetLastError,GetProcAddress,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetModuleHandleExW,GetProcAddress,GetProcessHeap,HeapFree,FreeLibrary,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetModuleHandleExW,GetProcAddress,GetProcessHeap,HeapFree,FreeLibrary,GetLastError,GetLastError,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetLastError,GetProcessHeap,HeapFree,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,FreeLibrary,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,FreeLibrary,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetModuleHandleExW,GetProcAddress,GetProcessHeap,HeapFree,FreeLibrary,FreeLibrary,~SyncLockT,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetP
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785A82EA4 rdtsc
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140048AC0 LdrLoadDll,FindClose,
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785AB72B4 RtlCaptureContext,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785AAEA28 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785AAF1E0 SetUnhandledExceptionFilter,
            Source: C:\Users\user\AppData\Local\uBsjD\DmNotificationBroker.exeCode function: 31_2_00007FF69E092780 SetUnhandledExceptionFilter,
            Source: C:\Users\user\AppData\Local\uBsjD\DmNotificationBroker.exeCode function: 31_2_00007FF69E092AB4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Benign windows process drops PE filesShow sources
            Source: C:\Windows\explorer.exeFile created: WINSTA.dll.5.drJump to dropped file
            Changes memory attributes in foreign processes to executable or writableShow sources
            Source: C:\Windows\System32\rundll32.exeMemory protected: C:\Windows\explorer.exe base: 7FFA9B8EEFE0 protect: page execute and read and write
            Source: C:\Windows\System32\rundll32.exeMemory protected: C:\Windows\explorer.exe base: 7FFA9B8EE000 protect: page execute read
            Source: C:\Windows\System32\rundll32.exeMemory protected: C:\Windows\explorer.exe base: 7FFA9B312A20 protect: page execute and read and write
            Queues an APC in another process (thread injection)Show sources
            Source: C:\Windows\System32\rundll32.exeThread APC queued: target process: C:\Windows\explorer.exe
            Uses Atom Bombing / ProGate to inject into other processesShow sources
            Source: C:\Windows\System32\rundll32.exeAtom created: 405553565741544156488D6C24D14881EC98 0x00000000 inc eax 0x00000001 push ebp 0x00000002 push ebx 0x00000003 push esi 0x00000004 push edi 0x00000005 inc ecx 0x00000006 push esp 0x00000007 inc ecx 0x00000008 push esi 0x00000009 dec eax 0x0000000a lea ebp, dword ptr [esp-2Fh] 0x0000000e dec eax 0x0000000f sub esp, 00000098h
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\A1ogRC4R34.dll',#1
            Source: explorer.exe, 00000005.00000000.252665962.0000000001640000.00000002.00020000.sdmp, rdpinit.exeBinary or memory string: Shell_TrayWnd
            Source: explorer.exe, 00000005.00000000.252665962.0000000001640000.00000002.00020000.sdmpBinary or memory string: Progman
            Source: explorer.exe, 00000005.00000000.252665962.0000000001640000.00000002.00020000.sdmpBinary or memory string: SProgram Managerl
            Source: explorer.exe, 00000005.00000000.277225784.0000000001128000.00000004.00000020.sdmpBinary or memory string: ProgmanOMEa
            Source: explorer.exe, 00000005.00000000.252665962.0000000001640000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd,
            Source: explorer.exe, 00000005.00000000.252665962.0000000001640000.00000002.00020000.sdmpBinary or memory string: Progmanlock
            Source: C:\Windows\System32\loaddll64.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\loaddll64.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\rundll32.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\uBsjD\DmNotificationBroker.exeQueries volume information: unknown VolumeInformation
            Source: C:\Users\user\AppData\Local\uBsjD\DmNotificationBroker.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDate
            Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785AB060C GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,GetTickCount,QueryPerformanceCounter,
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785AAE34B GetStartupInfoW,GetVersionExW,_FF_MSGBANNER,_FF_MSGBANNER,GetCommandLineA,
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785AA3630 SetPropW,RpcBindingFree,
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785AA1DF0 RpcServerUseProtseqEpW,RpcServerRegisterIfEx,RpcServerListen,
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785A8D87C RegisterTraceGuidsW,HeapSetInformation,GetLastError,CreateMutexW,GetLastError,GetLastError,CreateMutexW,GetLastError,GetLastError,CoInitializeEx,GetModuleHandleW,SetProcessShutdownParameters,GetCurrentProcessId,ProcessIdToSessionId,GetLastError,GetLastError,GetSystemMetrics,RpcMgmtWaitServerListen,WTSLogoffSession,CoUninitialize,UnregisterTraceGuids,CloseHandle,
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785AA1FE0 GetCurrentProcess,OpenProcessToken,GetLastError,RpcBindingToStringBindingW,RpcStringBindingParseW,GetCurrentProcessId,ProcessIdToSessionId,GetLastError,RpcServerInqBindingHandle,RpcServerInqCallAttributesW,GetLastError,RpcImpersonateClient,GetCurrentThread,OpenThreadToken,GetLastError,GetTokenInformation,GetLastError,GetSidSubAuthority,GetSidSubAuthority,CloseHandle,CloseHandle,LocalFree,LocalFree,RpcRevertToSelf,RpcStringFreeW,RpcStringFreeW,
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785AA3FE0 RpcBindingFree,GetCurrentProcessId,ProcessIdToSessionId,GetLastError,GetLastError,RpcStringBindingComposeW,RpcBindingFromStringBindingW,RpcBindingSetAuthInfoExW,RpcBindingFree,RpcStringFreeW,
            Source: C:\Users\user\AppData\Local\fID\rdpinit.exeCode function: 24_2_00007FF785AA3F90 RpcBindingFree,
            Source: C:\Users\user\AppData\Local\uBsjD\DmNotificationBroker.exeCode function: 31_2_00007FF69E0921B8 RpcBindingCreateW,RpcBindingBind,NdrClientCall3,RpcBindingFree,
            Source: C:\Users\user\AppData\Local\uBsjD\DmNotificationBroker.exeCode function: 31_2_00007FF69E0922F0 RpcBindingFree,

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsCommand and Scripting Interpreter2Path InterceptionExploitation for Privilege Escalation1Masquerading11OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsExploitation for Client Execution1Boot or Logon Initialization ScriptsProcess Injection312Process Injection312LSASS MemorySecurity Software Discovery21Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Rundll321NTDSFile and Directory Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing2LSA SecretsSystem Information Discovery25SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonTimestomp1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 492806 Sample: A1ogRC4R34 Startdate: 29/09/2021 Architecture: WINDOWS Score: 100 41 Antivirus detection for dropped file 2->41 43 Antivirus / Scanner detection for submitted sample 2->43 45 Multi AV Scanner detection for submitted file 2->45 47 3 other signatures 2->47 8 loaddll64.exe 1 2->8         started        process3 process4 10 rundll32.exe 8->10         started        13 cmd.exe 1 8->13         started        15 rundll32.exe 8->15         started        17 rundll32.exe 8->17         started        signatures5 53 Changes memory attributes in foreign processes to executable or writable 10->53 55 Uses Atom Bombing / ProGate to inject into other processes 10->55 57 Queues an APC in another process (thread injection) 10->57 19 explorer.exe 2 55 10->19 injected 23 rundll32.exe 13->23         started        process6 file7 33 C:\Users\user\AppData\Local\uBsjD\DUI70.dll, PE32+ 19->33 dropped 35 C:\Users\user\AppData\Local\...\FVEWIZ.dll, PE32+ 19->35 dropped 37 C:\Users\user\AppData\Local\...\TAPI32.dll, PE32+ 19->37 dropped 39 13 other files (5 malicious) 19->39 dropped 49 Benign windows process drops PE files 19->49 51 Accesses ntoskrnl, likely to find offsets for exploits 19->51 25 rdpinit.exe 19->25         started        27 DmNotificationBroker.exe 19->27         started        29 rdpinit.exe 19->29         started        31 DmNotificationBroker.exe 19->31         started        signatures8 process9

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            A1ogRC4R34.dll62%VirustotalBrowse
            A1ogRC4R34.dll57%MetadefenderBrowse
            A1ogRC4R34.dll76%ReversingLabsWin64.Infostealer.Dridex
            A1ogRC4R34.dll100%AviraTR/Crypt.ZPACK.Gen
            A1ogRC4R34.dll100%Joe Sandbox ML

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\VcAfkDB\VERSION.dll100%AviraTR/Crypt.ZPACK.Gen
            C:\Users\user\AppData\Local\fID\WINSTA.dll100%AviraTR/Crypt.ZPACK.Gen
            C:\Users\user\AppData\Local\uBsjD\DUI70.dll100%AviraHEUR/AGEN.1114452
            C:\Users\user\AppData\Local\r7RKh\FVEWIZ.dll100%AviraHEUR/AGEN.1114452
            C:\Users\user\AppData\Local\kyOIt4HX\TAPI32.dll100%AviraTR/Crypt.ZPACK.Gen
            C:\Users\user\AppData\Local\SaryWtyzg\WINMM.dll100%AviraTR/Crypt.ZPACK.Gen
            C:\Users\user\AppData\Local\H3fqckDRC\dpx.dll100%AviraHEUR/AGEN.1114452
            C:\Users\user\AppData\Local\3HlyM7czl\SYSDM.CPL100%AviraHEUR/AGEN.1114452
            C:\Users\user\AppData\Local\VcAfkDB\VERSION.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\fID\WINSTA.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\uBsjD\DUI70.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\r7RKh\FVEWIZ.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\kyOIt4HX\TAPI32.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\SaryWtyzg\WINMM.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\H3fqckDRC\dpx.dll100%Joe Sandbox ML
            C:\Users\user\AppData\Local\3HlyM7czl\SYSDM.CPL100%Joe Sandbox ML
            C:\Users\user\AppData\Local\3HlyM7czl\SystemPropertiesAdvanced.exe0%VirustotalBrowse
            C:\Users\user\AppData\Local\3HlyM7czl\SystemPropertiesAdvanced.exe0%MetadefenderBrowse
            C:\Users\user\AppData\Local\3HlyM7czl\SystemPropertiesAdvanced.exe0%ReversingLabs
            C:\Users\user\AppData\Local\H3fqckDRC\wusa.exe0%VirustotalBrowse
            C:\Users\user\AppData\Local\H3fqckDRC\wusa.exe0%MetadefenderBrowse
            C:\Users\user\AppData\Local\H3fqckDRC\wusa.exe0%ReversingLabs
            C:\Users\user\AppData\Local\SaryWtyzg\PresentationSettings.exe0%MetadefenderBrowse
            C:\Users\user\AppData\Local\SaryWtyzg\PresentationSettings.exe0%ReversingLabs

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            3.2.rundll32.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            7.2.rundll32.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            4.2.rundll32.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            6.2.rundll32.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            31.2.DmNotificationBroker.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            24.2.rdpinit.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            1.2.loaddll64.exe.140000000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File

            Domains

            No Antivirus matches

            URLs

            No Antivirus matches

            Domains and IPs

            Contacted Domains

            No contacted domains info

            Contacted IPs

            No contacted IP infos

            General Information

            Joe Sandbox Version:33.0.0 White Diamond
            Analysis ID:492806
            Start date:29.09.2021
            Start time:01:51:45
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 16m 57s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:A1ogRC4R34 (renamed file extension from none to dll)
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:41
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.expl.evad.winDLL@38/17@0/0
            EGA Information:Failed
            HDC Information:
            • Successful, ratio: 8.6% (good quality ratio 6.9%)
            • Quality average: 72.7%
            • Quality standard deviation: 40.6%
            HCA Information:Failed
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Override analysis time to 240s for rundll32
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
            • Excluded IPs from analysis (whitelisted): 20.199.120.182, 204.79.197.200, 13.107.21.200, 23.54.113.45, 20.50.102.62, 20.199.120.151, 23.54.113.53, 20.199.120.85, 23.54.113.104, 23.0.174.200, 23.0.174.185, 23.10.249.26, 23.10.249.43, 20.54.110.249, 40.112.88.60
            • Excluded domains from analysis (whitelisted): storeedgefd.dsx.mp.microsoft.com.edgekey.net.globalredir.akadns.net, store-images.s-microsoft.com-c.edgekey.net, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, storeedgefd.xbetservices.akadns.net, arc.msn.com, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, www-bing-com.dual-a-0001.a-msedge.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, storeedgefd.dsx.mp.microsoft.com, www.bing.com, client.wns.windows.com, fs.microsoft.com, dual-a-0001.a-msedge.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, storeedgefd.dsx.mp.microsoft.com.edgekey.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, e16646.dscg.akamaiedge.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
            • Not all processes where analyzed, report is missing behavior information
            • Report creation exceeded maximum time and may have missing behavior and disassembly information.
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size exceeded maximum capacity and may have missing disassembly code.
            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
            • Report size getting too big, too many NtEnumerateKey calls found.

            Simulations

            Behavior and APIs

            No simulations

            Joe Sandbox View / Context

            IPs

            No context

            Domains

            No context

            ASN

            No context

            JA3 Fingerprints

            No context

            Dropped Files

            No context

            Created / dropped Files

            C:\Users\user\AppData\Local\3HlyM7czl\SYSDM.CPL
            Process:C:\Windows\explorer.exe
            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
            Category:dropped
            Size (bytes):2170880
            Entropy (8bit):3.4921794252523632
            Encrypted:false
            SSDEEP:12288:fVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:WfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
            MD5:0BDAF2F3724797EAF4254B3B131700E6
            SHA1:4E9489103C1BE75098B7D9382F436D39BB65D828
            SHA-256:866FBAEAE3267C7FA20C1F9C8A0D0CFC1699B6D98793FBDE193BC28936F7DAC8
            SHA-512:68100D08A418F66E25BA08668E43AC77D151190CB5E0028B86E287763631B466E8FC86F0376C22ABD5E14A57B1014C90B4CFE8A0EB3B0836C0C2EEDE0A7C766D
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            Reputation:unknown
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d.0..DN^.........." ................p..........@............................. !.....@lx}..b...........................................!......c..........h.......................$#................................................... ...............................text............................... ..`.rdata..,O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
            C:\Users\user\AppData\Local\3HlyM7czl\SystemPropertiesAdvanced.exe
            Process:C:\Windows\explorer.exe
            File Type:PE32+ executable (GUI) x86-64, for MS Windows
            Category:dropped
            Size (bytes):83968
            Entropy (8bit):7.065147438048501
            Encrypted:false
            SSDEEP:1536:UfuZktREC/rMcgEPJV+G57ThjEC0kzJP+V5Jl:VkzECTMpuDhjRVJG3
            MD5:82ED6250B9AA030DDC13DC075D2C16E3
            SHA1:BC2BDCF474A7315232136B29291166E789D1F280
            SHA-256:F321BB53BBC41C2CBFFABC56837F9FA723AA0C6ACB68A0C200CBC7427202DC9E
            SHA-512:94D34293F070F6505D6922977AC1EF8E08DB0D92DCA8823BCF7376FD81B3AA80D2BD0FEF21FC74BCE08EEBF82DF09114A71792945DE4E3BB1FD0929538DF489B
            Malicious:false
            Antivirus:
            • Antivirus: Virustotal, Detection: 0%, Browse
            • Antivirus: Metadefender, Detection: 0%, Browse
            • Antivirus: ReversingLabs, Detection: 0%
            Reputation:unknown
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......%...a..[a..[a..[h..[o..[..Z`..[..Zc..[..Zp..[a..[C..[..Zd..[..Z`..[..q[`..[..Z`..[Richa..[........................PE..d.....o..........."..........>.................@....................................AS....`.......... .......................................&.......P..0'...@.................. ...."..T............................ ...............!..8............................text............................... ..`.rdata..N.... ......................@..@.data........0......................@....pdata.......@......................@..@.rsrc...0'...P...(..................@..@.reloc.. ............F..............@..B........................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\H3fqckDRC\dpx.dll
            Process:C:\Windows\explorer.exe
            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
            Category:dropped
            Size (bytes):2166784
            Entropy (8bit):3.4966791942802127
            Encrypted:false
            SSDEEP:12288:KVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:XfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
            MD5:623DB87A3F248EA64BE5D903D21E9FB6
            SHA1:F816BA14F36DF9361B275670075534F8CEBB0A02
            SHA-256:2FECFF3A874320ACB1D2B749243CAF4714BA9507435EB066CD719435AED7E9D7
            SHA-512:5AF3F294602CA4366663183A77F8FEA2A3A871228C911A0CB8D3772442F74FEAC3EF1989C9AEBFEC2C3D4C50AFC321EDA05A3D321BCE8841D2A06EB497312B41
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            Reputation:unknown
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d./..DN^.........." ................p..........@..............................!.....@lx}..b.........................................,o.......c..........h.......................$#................................................... ...............................text............................... ..`.rdata...O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
            C:\Users\user\AppData\Local\H3fqckDRC\wusa.exe
            Process:C:\Windows\explorer.exe
            File Type:PE32+ executable (GUI) x86-64, for MS Windows
            Category:dropped
            Size (bytes):308736
            Entropy (8bit):6.55894801361276
            Encrypted:false
            SSDEEP:6144:TozDd3UafMCFoMVclxM8cVM49UApxyN90vE:ToXd33MCFoqSxM5MmUAy90
            MD5:04CE745559916B99248F266BBF5F9ED9
            SHA1:76FA00103A89C735573D1D8946D8787A839475B6
            SHA-256:1D86701A861FFA88FE050A466E04281A4809C334B16832A84231DC6A5FBC4195
            SHA-512:B4D2EF6B90164E17258F53BCAF954076D02EDB7F496F4F79B2CF7848B90614F6160C8EB008BA5904521DD8B1449840B2D7EE368860E58E01FBEAB9873B654B3A
            Malicious:false
            Antivirus:
            • Antivirus: Virustotal, Detection: 0%, Browse
            • Antivirus: Metadefender, Detection: 0%, Browse
            • Antivirus: ReversingLabs, Detection: 0%
            Reputation:unknown
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......;..-..~..~..~v./~}.~....}.~....i.~....{.~....d.~..~w.~....k.~..C~~.~....~.~Rich..~................PE..d.....TS.........."......`...X.......f.........@....................................g.....`.......... .......................................I...........T...p..................`....?..T...................Pq..(...Pp..............xq..@............................text...3^.......`.................. ..`.rdata..^....p.......d..............@..@.data........`.......T..............@....pdata.......p.......X..............@..@.rsrc....T.......V...^..............@..@.reloc..`...........................@..B................................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\SaryWtyzg\PresentationSettings.exe
            Process:C:\Windows\explorer.exe
            File Type:PE32+ executable (GUI) x86-64, for MS Windows
            Category:dropped
            Size (bytes):222208
            Entropy (8bit):6.618425906220987
            Encrypted:false
            SSDEEP:3072:dklO/b97taQPr5pT8as3lJwvkAarSvDZpFB+2xmh0QSoKKBlKxyAZEHA:Oo/b1txPlh8I+rUts2xmhfGKraEH
            MD5:76086DD04B6760277A2B897345A0B457
            SHA1:DC65093DB601FE7AA2F4C0C400D18F43DA92DCFA
            SHA-256:BF492302281E3CD4F023FB54E101D8C3BD00FFEAFF75B5D7FE0C1CA43F291A81
            SHA-512:6528C86BA0272274A907F8559DFD79C55D1A6BAF3A4545EF3F6CDC4C790CC9FBDB7A3A8A2E72D0ED39651975DF5967608111448D1351BDC659E8F0F5E8C72442
            Malicious:false
            Antivirus:
            • Antivirus: Metadefender, Detection: 0%, Browse
            • Antivirus: ReversingLabs, Detection: 0%
            Reputation:unknown
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_.".>.q.>.q.>.q.F~q.>.q.Z.p.>.q.Z.p.>.q.Z.p.>.q.Z.p.>.q.>.q/>.q.Z.p.>.q.Z.q.>.q.Z.p.>.qRich.>.q........PE..d... ..8.........."......J... ...... O.........@.....................................9....`.......... ..........................................................x.......................T............................a...............b...............................text....H.......J.................. ..`.rdata...]...`...^...N..............@..@.data...H...........................@....pdata..x...........................@..@.rsrc...............................@..@.reloc...............b..............@..B........................................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\SaryWtyzg\WINMM.dll
            Process:C:\Windows\explorer.exe
            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
            Category:dropped
            Size (bytes):2174976
            Entropy (8bit):3.501635076472576
            Encrypted:false
            SSDEEP:12288:9VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:kfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
            MD5:2AB1771EACAAB67C8DBCC40CC742146C
            SHA1:630753BE4D7354238AD511DEF9BEF46504102D67
            SHA-256:AEEEF877DA29CDBC34426C62C3C264346FE8570AA553056C8C6BB4D3758EAC1F
            SHA-512:A139373330E6607A61709BD5D9D1ADFCEEF8F6DEBE62ECE092C67267BA1171C2B40360BDAE286C7FC66C7027C6389F5C06C93CDA95389CE8A3DB54150F07AC8E
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            Reputation:unknown
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d.0..DN^.........." ................p..........@.............................0!.....@lx}..b...........................................!.h....c..........h.......................$#................................................... ...............................text............................... ..`.rdata..,O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
            C:\Users\user\AppData\Local\VcAfkDB\VERSION.dll
            Process:C:\Windows\explorer.exe
            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
            Category:dropped
            Size (bytes):2170880
            Entropy (8bit):3.492654327259235
            Encrypted:false
            SSDEEP:12288:8VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:JfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
            MD5:0F593199E2816C0C8B8ED747CE1BEB85
            SHA1:423FD306E81B4F2D7FEF4D9F4F163BF5EE93EE7C
            SHA-256:B69C3AA0F262596A156376EA2931FC2324451A064F751DCE655F280650B046E5
            SHA-512:EC2234B909D85C89EE40C548CFC926D036A27B265F9793455AB6F2363AC66F81838F1D9288ECDB1BDEDA7D0C70A54EA8319BF6D0852C98FD24978A288BCABD7C
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            Reputation:unknown
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d.0..DN^.........." ................p..........@............................. !.....@lx}..b...........................................!.+....c..........h.......................$#................................................... ...............................text............................... ..`.rdata..,O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
            C:\Users\user\AppData\Local\VcAfkDB\unregmp2.exe
            Process:C:\Windows\explorer.exe
            File Type:PE32+ executable (GUI) x86-64, for MS Windows
            Category:dropped
            Size (bytes):254976
            Entropy (8bit):5.093220071075157
            Encrypted:false
            SSDEEP:3072:1t+/6BNqqNRhdutq4jCoNhdxtYEbvyIwYKO8/+9vAwk4OdamabJ9:3Bhhd+7QKb
            MD5:9B517303C58CA8A450B97B0D71594CBB
            SHA1:BE75E3F10E17400DA7C0FAF70BF16EE7D0AA93A8
            SHA-256:2A38BFC3813D7E845F455B31DF099C8A6E657EF4556BFF681315F86A883A3314
            SHA-512:6A47EC7800E1F1FCDBB44A018147CE4A87FF0F5B94597B182AAE4E8545D9B18FAAAA07379BA1086D8F7785F0F66C36E4B6C68FCF49130333B8A9DC3A9E9E08E8
            Malicious:false
            Reputation:unknown
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........|.R.............y.......y.......y.......y..........w....y.......yf......y......Rich....................PE..d....Q&..........."..........^................@.............................0.......A....`.......... ..........................................................0.......................T....................V..(....U...............V...............................text...w........................... ..`.rdata..4...........................@..@.data....8.......&..................@....pdata..0...........................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\fID\WINSTA.dll
            Process:C:\Windows\explorer.exe
            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
            Category:dropped
            Size (bytes):2174976
            Entropy (8bit):3.5091748741070106
            Encrypted:false
            SSDEEP:12288:0VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:xfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
            MD5:6F22D93755FC031456BE2557F243015B
            SHA1:FC3E0F51E986057956F65B48296CB1AA197E8116
            SHA-256:EA2649CC270C4676E22323536EF5CFF6BA657383CFDDF1EF700E6CCE00ED9E11
            SHA-512:70CE3B19AA4485D82C7FB8E910CC789F7D004592AA8FD21DA1D25B600A2E699E00CB6577731CE81F226EFE451FB971C277055DF9FE667675B954E8F1AE0EB662
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            Reputation:unknown
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d.0..DN^.........." ................p..........@.............................0!.....@lx}..b...........................................!.m....c..........h.......................$#................................................... ...............................text............................... ..`.rdata..,O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
            C:\Users\user\AppData\Local\fID\rdpinit.exe
            Process:C:\Windows\explorer.exe
            File Type:PE32+ executable (GUI) x86-64, for MS Windows
            Category:dropped
            Size (bytes):327168
            Entropy (8bit):6.414070673036673
            Encrypted:false
            SSDEEP:6144:fOzsB7eGjsO+VxyQ/qY4gCJkxkVPXqdzVxNwK3S3drxhUS4eMZfCZc/o:fOzsB7eGjb+VxynJkxkZ6dzV63drxhlF
            MD5:EF7C9CF6EA5B8B9C5C8320990714C35D
            SHA1:9CBD44DE4761F9383F2E0352035D52B86ECE80C2
            SHA-256:0FD9B6C366E042ED83BFC53C5EA1AAF43F13F53D97F220B5571681BB766C33FA
            SHA-512:C2F5E902DF725BC05F03052042767635689A35226CA1C3436ADF4835C57666B3E815FD386B80517734AC3B71F2FB15E48CE2F6739D669B5F68F4A8989713E8FC
            Malicious:false
            Reputation:unknown
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s.....S...S...S.j.S...S.v.R...S.v.R...S.v.R...S.v.R...S...S...S.v.R...S.vmS...S.v.R...SRich...S................PE..d...q............"..........f...... ..........@.............................p......+................ ..........................................@....@..........d ...........`..x.......T............................................................................text...<........................... ..`.imrsiv..................................rdata..............................@..@.data....:..........................@....pdata..d ......."..................@..@.rsrc........@......................@..@.reloc..x....`......................@..B........................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\kyOIt4HX\TAPI32.dll
            Process:C:\Windows\explorer.exe
            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
            Category:dropped
            Size (bytes):2174976
            Entropy (8bit):3.512499889839238
            Encrypted:false
            SSDEEP:12288:uVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:zfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
            MD5:99671622AFF90CD9D173CA46E372D3AC
            SHA1:B689B8799C7A057958AF0BFAFF233142AC54F761
            SHA-256:578AD60043FB755F8546C8418C9D8FDE64D2C4BA9F4467CE812AA14D702FA855
            SHA-512:021357EAE61F5E372F5675788D0CDFA09A252238F808419E75912B53DC5507D26D6EB1B27B26000A699E53C0E831C6ADBFE66E4BA63577AB0FB129F6A9D44AC2
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            Reputation:unknown
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d.0..DN^.........." ................p..........@.............................0!.....@lx}..b...........................................!.V....c..........h.......................$#................................................... ...............................text............................... ..`.rdata..,O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
            C:\Users\user\AppData\Local\kyOIt4HX\tcmsetup.exe
            Process:C:\Windows\explorer.exe
            File Type:PE32+ executable (GUI) x86-64, for MS Windows
            Category:dropped
            Size (bytes):16384
            Entropy (8bit):4.999998588063228
            Encrypted:false
            SSDEEP:192:DIzBdu2Mhf/+G1jQ0pwPYqLmdO0O7RgZiLtzADWO4hxDcUh6UdBndOvfSWG0oW:GMVJjQ0dg0O7yk5ciJcUhLiSWG0oW
            MD5:0DDA495155D552D024593C4B3246C8FA
            SHA1:7501A7AD5DAA41462BEFF9127154BAF261A24A5B
            SHA-256:D3074CBD29678CA612C1F8AA93DE1F5B75108BE8187F0F2A2331BC302AD48CD9
            SHA-512:9159D8AF457591256BA87443E89ECE942DE40B8FF39586116C2026330B8AE9C20F96905547E87D98508951D2B4687069EFD018CC9E4A6C94A6C26D4B587F41B3
            Malicious:false
            Reputation:unknown
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............Z...Z...Z..[...Z..[...Z..[...Z..[...Z...Z...Z..[...Z.:Z...Z..[...ZRich...Z................PE..d....E.H.........."..........,....... .........@..........................................`.......... .......................................9..x....p..P....`..D............... ....5..T............................0...............1...............................text............................... ..`.rdata..&....0......................@..@.data... ....P.......0..............@....pdata..D....`.......2..............@..@.rsrc...P....p.......4..............@..@.reloc.. ............>..............@..B........................................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\r7RKh\BitLockerWizardElev.exe
            Process:C:\Windows\explorer.exe
            File Type:PE32+ executable (GUI) x86-64, for MS Windows
            Category:dropped
            Size (bytes):101888
            Entropy (8bit):6.95002760620154
            Encrypted:false
            SSDEEP:3072:k8kEZwnVS570M9kdatGCO+xmBc+hMPhPsx:1khVs7nyatGt+SYF
            MD5:3104EA9ECCA9ED71A382CCAAD618CEAE
            SHA1:9277108B7254F0C5BD241C2643902378925A8F9C
            SHA-256:D8CB004D4E8894AB4CA769C3CEC9A37B7FAB336DCDA1E6E9A15975DC64CEF370
            SHA-512:27C84C35461E37557BA27A7D9E9F86A47686DE73DDC74E001777F11EA8D5BE9B17604403875CF20124595010477F6F2ADDD797B9ACED79C514AEF2D2F1A019B7
            Malicious:false
            Reputation:unknown
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........O.`M.h3M.h3M.h3"Jm2O.h3"Jk2O.h3"Jl2_.h3"Ji2F.h3M.i3}.h3"Ja2L.h3"J.3L.h3"Jj2L.h3RichM.h3........................PE..d....C............"............................@....................................0.....`.......... ......................................D,..x....`...c...P.................. ....(..T............................ ...............!...............................text............................... ..`.rdata....... ......................@..@.data........@.......$..............@....pdata.......P.......&..............@..@.rsrc....c...`...d...(..............@..@.reloc.. ...........................@..B................................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\r7RKh\FVEWIZ.dll
            Process:C:\Windows\explorer.exe
            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
            Category:dropped
            Size (bytes):2170880
            Entropy (8bit):3.4988987994424146
            Encrypted:false
            SSDEEP:12288:8VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:JfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
            MD5:E618EE247E3251D556DAF3D3C658C0A9
            SHA1:177C80CA1FDA1BA71113C7A1F648D911E8A0C4C9
            SHA-256:101AF5D6FC2DAA1B700D779CDBB54D9255FDEA3718BE0FC9F672B807346298C6
            SHA-512:261E7DE708350CAC5E52860F9432CDB1DEDA7289168C4A10F26CD36EABFBA28CA4DD3BBAF9708C9110E3FD13F9D22E5789D112D682CCCEC243F62E1D32980E30
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            Reputation:unknown
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d.0..DN^.........." ................p..........@............................. !.....@lx}..b...........................................!......c..........h.......................$#................................................... ...............................text............................... ..`.rdata..,O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
            C:\Users\user\AppData\Local\uBsjD\DUI70.dll
            Process:C:\Windows\explorer.exe
            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
            Category:dropped
            Size (bytes):2453504
            Entropy (8bit):4.027319224931197
            Encrypted:false
            SSDEEP:12288:1VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1XQ:sfP7fWsK5z9A+WGAW+V5SB6Ct4bnb
            MD5:6A41878B4C9B36A4455B22A8EBBC846F
            SHA1:CF9CFC24FDC9B744A867B81E452C18A04042A4E2
            SHA-256:BC2B240D729D4DB74F14D302EC83EBD06C1ED7F340CF7CA8BE11F0184B263CE0
            SHA-512:7526BAC5EBDF82F434BC5E753F038AF339ADE485F59108A90D3CBB1589397DE08BCDE4C390AA7008395974E1B56F290A7787BCBD5145074B367AE8C2DB0A3BBB
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            Reputation:unknown
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|..[.K./}...I.h}..u.Y.k|.......|..W"...|..b.L.t|...|...}......N|..2%...|..Rich.|..............................................................................................................PE..d.0..DN^.........." .........P!.....p..........@.............................p%.....@lx}..b...........................................!.dQ...c..........h.......................$#................................................... ...............................text............................... ..`.rdata..,O... ...P... ..............@..@.data....x...p.......p..............@....pdata..,...........................A..@.rsrc...............................@..@.reloc..$#.......0..................@..B.qkm....J....@.......@..............@..@.cvjb...f...
            C:\Users\user\AppData\Local\uBsjD\DmNotificationBroker.exe
            Process:C:\Windows\explorer.exe
            File Type:PE32+ executable (GUI) x86-64, for MS Windows
            Category:dropped
            Size (bytes):32256
            Entropy (8bit):5.250876383836324
            Encrypted:false
            SSDEEP:768:ghunFhykO4aAvnsvpzte5+Ql0/iqmjjn:58kO4asshu+Q+/Ojjn
            MD5:1643D5735213BC89C0012F0E48253765
            SHA1:D076D701929F1F269D34C8FD7BD1BAB4DAF42A9D
            SHA-256:4176FA24D56BB870316D07BD7211BC8A797394F77DCC12B35FFEBAA0326525D2
            SHA-512:F0BD45FE66EDC6F615C0125C1AE81E657CA26544544769651AB0623DD3C724F96D9D78835EF6B1D15083D1BB9D501F6DC48487DDA5C361CAFA96022D5F33A43F
            Malicious:false
            Reputation:unknown
            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........j.?H..lH..lH..lAs.lT..l'o.mJ..l'o.m[..lH..l...l'o.mC..l'o.mA..l'o.mA..l'ohlI..l'o.mI..lRichH..l........................PE..d................."......*...V.......&.........@....................................n3............... .......................................x.......... ...........................Po..T............................]...............^..p............................text....(.......*.................. ..`.imrsiv......@...........................rdata..P8...P...:..................@..@.data...(............h..............@....pdata...............j..............@..@.rsrc... ............n..............@..@.reloc...............z..............@..B................................................................................................................................................................................................................
            C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\89dad5d484a9f889a3a8dfca823edc3e_d06ed635-68f6-4e9a-955c-4899f5f57b9a
            Process:C:\Windows\explorer.exe
            File Type:data
            Category:dropped
            Size (bytes):4447
            Entropy (8bit):5.481123367178235
            Encrypted:false
            SSDEEP:96:JIj2Zt+j6ZP4zr1Q9EIj2Z0+ByNAI4v1lV3:O4tTgF8L40+8oXV3
            MD5:ED384AAFCE2EF80D0F36ED6D8B12E7B3
            SHA1:2D4B43B7864F08321B7702E6014A80D4BBAB0F24
            SHA-256:D55C29F6CD93EA549E21A9A294B036BB7621886B8DEDBDAFCA4BCFD287C0D8AD
            SHA-512:20B0483FBCA47C76328D8F0527C346DF626246EE0E70CACEC737C028CB6A9C2261C692BD07A00640459A96DBE0E1746D4DE44DDA6D1349F51CC7EF0B6ADE0E0C
            Malicious:false
            Reputation:unknown
            Preview: ........................................user.........................................user.....................RSA1.................q00D..7..w.~......;<.Y......'7......VVmp/..."F.Q...#B......x.......K|..K........~+:..:..%.J.+a(.....5...f.d...o...nV...........................z..O........D.Mb.G..m..#&....,...C.r.y.p.t.o.A.P.I. .P.r.i.v.a.t.e. .K.e.y....f...... ....v?..`.G:AsQ.!..9mB........+...>............ ...!.Lt.}....S..!!.$'y.....D.$n..............4.A...A../.j.B.b.....6V:3..*0...`..Ep....6.s..8....3.?`....LS..}F..+..Q_G..~.:........f..5...I..n.*`..t..i....f.~b.rQ........#6.z...g...$.*y7...}B..>.Q6..,.....I_K.d........>.........d_.<..M0....D.p..>i.T.J...Q...}.g~... V7x...I.[&"ptk..x^.X.....| @...~xB.....O.z...RA'^.}-..&....Ug._....f......F~.q^....;/.H....t.....8...A.ND.6...L.[j@...^.I..G.G^U=.[.2...k.7ln....@.:..l.8.....9@t.. ..m...j......-..........o-.t..4..V.k....k....u......`.J.skr<.`jq?....._.i...\..g@{..B.I5|n)"..U+5.&......I...W..:#.d..`..o/......

            Static File Info

            General

            File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
            Entropy (8bit):3.5201402860449647
            TrID:
            • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
            • Win64 Executable (generic) (12005/4) 10.17%
            • Generic Win/DOS Executable (2004/3) 1.70%
            • DOS Executable Generic (2002/1) 1.70%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
            File name:A1ogRC4R34.dll
            File size:2166784
            MD5:5edd6ba336c4de29f55cadfd2167a67e
            SHA1:af181a8f3fe25a515a8fe2a02559e5daceecf976
            SHA256:eda8c025e5f5f67ae92bee0ed77113e18f60e9465f43fc43e00664f5bea7c32d
            SHA512:01b133fad6f564e6736d5f7297284da9aa8cc67a1c28a57b7b7eb1989ee049318377df85fbbeda9f777c0d955f07706743dc2becc3994bf9727a8d040067f5d5
            SSDEEP:12288:JVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:ofP7fWsK5z9A+WGAW+V5SB6Ct4bnb
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............|...|...|....K.#}...'...}......{}....X.#}....f..|....g..}..*...a|.......}....N..}..*...E}..[.I.E|...'..U}....N.+}..[.K.P|.

            File Icon

            Icon Hash:74f0e4ecccdce0e4

            Static PE Info

            General

            Entrypoint:0x140041070
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x140000000
            Subsystem:windows cui
            Image File Characteristics:EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
            DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
            Time Stamp:0x5E4E44CC [Thu Feb 20 08:35:24 2020 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:5
            OS Version Minor:0
            File Version Major:5
            File Version Minor:0
            Subsystem Version Major:5
            Subsystem Version Minor:0
            Import Hash:6668be91e2c948b183827f040944057f

            Entrypoint Preview

            Instruction
            dec eax
            xor eax, eax
            dec eax
            add eax, 5Ah
            dec eax
            mov dword ptr [00073D82h], ecx
            dec eax
            lea ecx, dword ptr [FFFFECABh]
            dec eax
            mov dword ptr [00073D7Ch], edx
            dec eax
            add eax, ecx
            dec esp
            mov dword ptr [00073D92h], ecx
            dec esp
            mov dword ptr [00073DA3h], ebp
            dec esp
            mov dword ptr [00073D7Ch], eax
            dec esp
            mov dword ptr [00073D85h], edi
            dec esp
            mov dword ptr [00073D86h], esi
            dec esp
            mov dword ptr [00073D8Fh], esp
            dec eax
            mov ecx, eax
            dec eax
            sub ecx, 5Ah
            dec eax
            mov dword ptr [00073D89h], esi
            dec eax
            test eax, eax
            je 00007F41A4B1713Fh
            dec eax
            mov dword ptr [00073D45h], esp
            dec eax
            mov dword ptr [00073D36h], ebp
            dec eax
            mov dword ptr [00073D7Fh], ebx
            dec eax
            mov dword ptr [00073D70h], edi
            dec eax
            test eax, eax
            je 00007F41A4B1711Eh
            jmp ecx
            dec eax
            add edi, ecx
            dec eax
            mov dword ptr [FFFFEC37h], ecx
            dec eax
            xor ecx, eax
            jmp ecx
            retn 0008h
            ud2
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            push ebx
            dec eax
            sub esp, 00000080h
            mov eax, F957B016h
            mov byte ptr [esp+7Fh], 00000037h
            mov edx, dword ptr [esp+78h]
            inc ecx
            mov eax, edx
            inc ecx
            or eax, 5D262B0Ch
            inc esp
            mov dword ptr [esp+78h], eax
            dec eax
            mov dword ptr [eax+eax+00h], 00000000h

            Rich Headers

            Programming Language:
            • [LNK] VS2012 UPD4 build 61030
            • [ASM] VS2013 UPD2 build 30501
            • [ C ] VS2012 UPD2 build 60315
            • [C++] VS2013 UPD4 build 31101
            • [RES] VS2012 UPD3 build 60610
            • [LNK] VS2017 v15.5.4 build 25834
            • [ C ] VS2017 v15.5.4 build 25834
            • [ASM] VS2010 build 30319
            • [EXP] VS2015 UPD1 build 23506
            • [IMP] VS2008 SP1 build 30729
            • [RES] VS2012 UPD4 build 61030
            • [LNK] VS2012 UPD2 build 60315
            • [C++] VS2015 UPD1 build 23506
            • [ C ] VS2013 UPD4 build 31101

            Data Directories

            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x20f0100x196d.evwibb
            IMAGE_DIRECTORY_ENTRY_IMPORT0xa63900xa0.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc00000x468.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0xc10000x2324.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x420000xc0.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

            Sections

            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x407960x41000False0.776085486779data7.73364605679IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            .rdata0x420000x64f2c0x65000False0.702390160891data7.86574512659IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0xa70000x178b80x18000False0.0694580078125data3.31515306295IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
            .pdata0xbf0000x12c0x1000False0.06005859375PEX Binary Archive0.581723022719IMAGE_SCN_TYPE_DSECT, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .rsrc0xc00000x8800x1000False0.139892578125data1.23838501563IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0xc10000x23240x3000False0.0498046875data4.65321444248IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            .qkm0xc40000x74a0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .cvjb0xc50000x1e660x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .tlmkv0xc70000xbde0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .wucsxe0xc80000x451740x46000False0.0010498046875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .fltwtj0x10e0000x12670x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .sfplio0x1100000x7360x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .rpg0x1110000x451740x46000False0.0010498046875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .bewzc0x1570000x11240x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .vksvaw0x1590000x7360x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .wmhg0x15a0000x12780x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .kswemc0x15c0000x36d0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .kaxfk0x15d0000x197d0x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .pjf0x15f0000xbde0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .retjqj0x1600000x7fd0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .mizn0x1610000x9cd0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .rsrub0x1620000x197d0x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .fhgxfk0x1640000x451740x46000False0.0010498046875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .wqpbrq0x1aa0000x23b0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .xlhbgj0x1ab0000xebe0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .rzgl0x1ac0000xbde0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .yic0x1ad0000x1f70x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .zfmbo0x1ae0000x1af0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .kurwl0x1af0000x3fe0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .crlsf0x1b00000x1e660x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .wrn0x1b20000x6cd00x7000False0.00177873883929data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .blcv0x1b90000x1af0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .roblb0x1ba0000x9cd0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .yblxa0x1bb0000x23b0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .tfy0x1bc0000x9cd0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .wsmv0x1bd0000x23b0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .hrs0x1be0000x16c0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .ppapg0x1bf0000x23b0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .udm0x1c00000x12780x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .fxc0x1c20000x1f2a0x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .fvxxk0x1c40000x23b0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .zmj0x1c50000x23b0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .zvz0x1c60000x451740x46000False0.0010498046875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .xyiz0x20c0000x8fe0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .gbzxp0x20d0000x23b0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .kkivgv0x20e0000x8fe0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .evwibb0x20f0000x197d0x2000False0.318115234375data4.72480866446IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

            Resources

            NameRVASizeTypeLanguageCountry
            RT_VERSION0xc00a00x370dataEnglishUnited States
            RT_MANIFEST0xc04100x56ASCII text, with CRLF line terminatorsEnglishUnited States

            Imports

            DLLImport
            USER32.dllLookupIconIdFromDirectoryEx, WaitForInputIdle, GetParent, GetFocus
            SETUPAPI.dllCM_Get_Resource_Conflict_DetailsW
            KERNEL32.dllDeleteCriticalSection, DeleteTimerQueue, TerminateJobObject, GetFileInformationByHandle, GetThreadLocale, GetNamedPipeServerProcessId, GetConsoleFontSize
            GDI32.dllCreateBitmapIndirect, GetPolyFillMode
            CRYPT32.dllCertGetCTLContextProperty
            ADVAPI32.dllAddAccessDeniedObjectAce
            SHLWAPI.dllChrCmpIW

            Exports

            NameOrdinalAddress
            LogonIdFromWinStationNameA20x1400154cc
            LogonIdFromWinStationNameW30x14001e670
            RemoteAssistancePrepareSystemRestore40x1400019b0
            ServerGetInternetConnectorStatus50x14000b840
            ServerLicensingClose60x140003cdc
            ServerLicensingDeactivateCurrentPolicy70x14003d540
            ServerLicensingFreePolicyInformation80x1400382b0
            ServerLicensingGetAvailablePolicyIds90x140038e3c
            ServerLicensingGetPolicy100x14002eee4
            ServerLicensingGetPolicyInformationA110x14003c028
            ServerLicensingGetPolicyInformationW120x140035608
            ServerLicensingLoadPolicy130x140031ff4
            ServerLicensingOpenA140x140037a88
            ServerLicensingOpenW150x14001cb14
            ServerLicensingSetPolicy160x140020cec
            ServerLicensingUnloadPolicy170x14002ed04
            ServerQueryInetConnectorInformationA180x1400185c8
            ServerQueryInetConnectorInformationW190x140035b78
            ServerSetInternetConnectorStatus200x14000af38
            WTSRegisterSessionNotificationEx210x14001d320
            WTSUnRegisterSessionNotificationEx220x14002e560
            WinStationActivateLicense230x14000744c
            WinStationAutoReconnect240x1400103c0
            WinStationBroadcastSystemMessage250x140033dac
            WinStationCheckAccess260x14000b518
            WinStationCheckLoopBack270x1400087e4
            WinStationCloseServer280x14001150c
            WinStationConnectA290x140037f54
            WinStationConnectAndLockDesktop300x140037230
            WinStationConnectCallback310x140024504
            WinStationConnectEx320x140009568
            WinStationConnectW330x14001e29c
            WinStationCreateChildSessionTransport340x14002b190
            WinStationDisconnect350x140033000
            WinStationEnableChildSessions360x14000e96c
            WinStationEnumerateA370x140011a98
            WinStationEnumerateExW380x14001faf4
            WinStationEnumerateLicenses390x14002d380
            WinStationEnumerateProcesses400x14003566c
            WinStationEnumerateW410x1400170b0
            WinStationEnumerate_IndexedA420x14002764c
            WinStationEnumerate_IndexedW430x14000da0c
            WinStationFreeConsoleNotification440x1400406e4
            WinStationFreeEXECENVDATAEX450x14003159c
            WinStationFreeGAPMemory460x1400141e0
            WinStationFreeMemory470x14000ef30
            WinStationFreePropertyValue480x140012754
            WinStationFreeUserCertificates490x14000e344
            WinStationFreeUserCredentials500x14001f31c
            WinStationFreeUserSessionInfo510x14002b4bc
            WinStationGenerateLicense520x14002d08c
            WinStationGetAllProcesses530x14001c2e8
            WinStationGetAllSessionsEx540x14001fea0
            WinStationGetAllSessionsW550x140019b9c
            WinStationGetAllUserSessions560x14001d4e0
            WinStationGetChildSessionId570x14000fb5c
            WinStationGetConnectionProperty580x1400148b4
            WinStationGetCurrentSessionCapabilities590x140005448
            WinStationGetCurrentSessionConnectionProperty600x140021e94
            WinStationGetCurrentSessionTerminalName610x140014980
            WinStationGetDeviceId620x14001e4fc
            WinStationGetInitialApplication630x140003a94
            WinStationGetLanAdapterNameA640x14003500c
            WinStationGetLanAdapterNameW650x1400304b8
            WinStationGetLoggedOnCount660x140037198
            WinStationGetMachinePolicy670x140028a38
            WinStationGetParentSessionId680x140018ad8
            WinStationGetProcessSid690x140023484
            WinStationGetRedirectAuthInfo700x140021df4
            WinStationGetRestrictedLogonInfo710x14000c674
            WinStationGetSessionIds720x140001acc
            WinStationGetTermSrvCountersValue730x14001665c
            WinStationGetUserCertificates740x140008794
            WinStationGetUserCredentials750x14003e30c
            WinStationGetUserProfile760x140002fbc
            WinStationInstallLicense770x14001ebcc
            WinStationIsChildSessionsEnabled780x14000a870
            WinStationIsCurrentSessionRemoteable790x1400310d4
            WinStationIsHelpAssistantSession800x14003e898
            WinStationIsSessionPermitted810x14000da1c
            WinStationIsSessionRemoteable820x1400179c0
            WinStationNameFromLogonIdA830x140034f78
            WinStationNameFromLogonIdW840x140024ed4
            WinStationNegotiateSession850x140015328
            WinStationNtsdDebug860x140030d6c
            WinStationOpenServerA870x140013ba8
            WinStationOpenServerExA880x14001d588
            WinStationOpenServerExW890x14003caec
            WinStationOpenServerW900x140003af8
            WinStationPreCreateGlassReplacementSession910x140036ff0
            WinStationPreCreateGlassReplacementSessionEx920x140018ab8
            WinStationQueryAllowConcurrentConnections930x14001d4bc
            WinStationQueryCurrentSessionInformation940x14000f5d0
            WinStationQueryEnforcementCore950x140034e24
            WinStationQueryInformationA960x140009954
            WinStationQueryInformationW970x140009c90
            WinStationQueryLicense980x14002f848
            WinStationQueryLogonCredentialsW990x14000bfb8
            WinStationQuerySessionVirtualIP1000x14000ed90
            WinStationQueryUpdateRequired1010x14001bb78
            WinStationRcmShadow21020x14003a4fc
            WinStationRedirectErrorMessage1030x140003fc4
            WinStationRedirectLogonBeginPainting1040x140040b1c
            WinStationRedirectLogonError1050x1400329d0
            WinStationRedirectLogonMessage1060x14001a8e8
            WinStationRedirectLogonStatus1070x14000dcb0
            WinStationRegisterConsoleNotification1080x14003db9c
            WinStationRegisterConsoleNotificationEx1090x140004320
            WinStationRegisterConsoleNotificationEx210x14000c190
            WinStationRegisterCurrentSessionNotificationEvent1100x14001871c
            WinStationRegisterNotificationEvent1110x14001caec
            WinStationRemoveLicense1120x14000ad28
            WinStationRenameA1130x14003e0a0
            WinStationRenameW1140x140010064
            WinStationReportUIResult1150x140030854
            WinStationReset1160x1400280b0
            WinStationRevertFromServicesSession1170x140020f9c
            WinStationSendMessageA1180x14003dc44
            WinStationSendMessageW1190x140025608
            WinStationSendWindowMessage1200x1400378e4
            WinStationServerPing1210x140027898
            WinStationSetAutologonPassword1220x140015b60
            WinStationSetInformationA1230x140036334
            WinStationSetInformationW1240x14002f668
            WinStationSetPoolCount1250x140012008
            WinStationSetRenderHint1260x140010d54
            WinStationShadow1270x14001f2bc
            WinStationShadowAccessCheck1280x140036038
            WinStationShadowStop1290x14000a3ec
            WinStationShadowStop21300x14001503c
            WinStationShutdownSystem1310x14003a0e4
            WinStationSwitchToServicesSession1320x140020bcc
            WinStationSystemShutdownStarted1330x14003fcb8
            WinStationSystemShutdownWait1340x14001536c
            WinStationTerminateGlassReplacementSession1350x140028a90
            WinStationTerminateProcess1360x140023fcc
            WinStationUnRegisterConsoleNotification1370x14001e86c
            WinStationUnRegisterNotificationEvent1380x14002ba70
            WinStationUserLoginAccessCheck1390x14001b4d0
            WinStationVerify1400x140027dbc
            WinStationVirtualOpen1410x14000bec0
            WinStationVirtualOpenEx1420x140020a5c
            WinStationWaitSystemEvent1430x14000ab44
            _NWLogonQueryAdmin1440x14001fc60
            _NWLogonSetAdmin1450x14001ab3c
            _WinStationAnnoyancePopup1460x140040f10
            _WinStationBeepOpen1470x140039a50
            _WinStationBreakPoint1480x14003182c
            _WinStationCallback1490x14003d540
            _WinStationCheckForApplicationName1500x140022e50
            _WinStationFUSCanRemoteUserDisconnect1510x140028074
            _WinStationGetApplicationInfo1520x14000a000
            _WinStationNotifyDisconnectPipe1530x140006300
            _WinStationNotifyLogoff1540x140001f14
            _WinStationNotifyLogon1550x14002a208
            _WinStationNotifyNewSession1560x140040c10
            _WinStationOpenSessionDirectory1570x140008768
            _WinStationReInitializeSecurity1580x140031648
            _WinStationReadRegistry1590x140026d80
            _WinStationSessionInitialized1600x1400057e0
            _WinStationShadowTarget1610x14003b860
            _WinStationShadowTarget21620x140036f6c
            _WinStationShadowTargetSetup1630x14000a8e8
            _WinStationUpdateClientCachedCredentials1640x1400396cc
            _WinStationUpdateSettings1650x1400388a4
            _WinStationUpdateUserConfig1660x140007c8c
            _WinStationWaitForConnect1670x14002f99c

            Version Infos

            DescriptionData
            LegalCopyright Microsoft Corporation. All rights reserv
            InternalNamebitsp
            FileVersion7.5.7600.16385 (win7_rtm.090713-
            CompanyNameMicrosoft Corporati
            ProductNameMicrosoft Windows Operating S
            ProductVersion6.1.7600
            FileDescriptionBackground Intellig
            OriginalFilenamekbdy
            Translation0x0409 0x04b0

            Possible Origin

            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States

            Network Behavior

            Network Port Distribution

            UDP Packets

            TimestampSource PortDest PortSource IPDest IP
            Sep 29, 2021 01:52:31.790808916 CEST6529653192.168.2.58.8.8.8
            Sep 29, 2021 01:52:31.823350906 CEST53652968.8.8.8192.168.2.5
            Sep 29, 2021 01:52:32.465501070 CEST6318353192.168.2.58.8.8.8
            Sep 29, 2021 01:52:32.498804092 CEST53631838.8.8.8192.168.2.5
            Sep 29, 2021 01:52:32.730051041 CEST6015153192.168.2.58.8.8.8
            Sep 29, 2021 01:52:32.765635967 CEST53601518.8.8.8192.168.2.5
            Sep 29, 2021 01:52:33.804905891 CEST5696953192.168.2.58.8.8.8
            Sep 29, 2021 01:52:33.817478895 CEST5516153192.168.2.58.8.8.8
            Sep 29, 2021 01:52:33.818048954 CEST53569698.8.8.8192.168.2.5
            Sep 29, 2021 01:52:33.848880053 CEST53551618.8.8.8192.168.2.5
            Sep 29, 2021 01:52:34.985820055 CEST5475753192.168.2.58.8.8.8
            Sep 29, 2021 01:52:34.999018908 CEST53547578.8.8.8192.168.2.5
            Sep 29, 2021 01:52:40.845426083 CEST4999253192.168.2.58.8.8.8
            Sep 29, 2021 01:52:40.859277964 CEST53499928.8.8.8192.168.2.5
            Sep 29, 2021 01:52:42.300054073 CEST6007553192.168.2.58.8.8.8
            Sep 29, 2021 01:52:42.336080074 CEST53600758.8.8.8192.168.2.5
            Sep 29, 2021 01:52:51.166105032 CEST5501653192.168.2.58.8.8.8
            Sep 29, 2021 01:52:51.181098938 CEST53550168.8.8.8192.168.2.5
            Sep 29, 2021 01:52:55.513081074 CEST6434553192.168.2.58.8.8.8
            Sep 29, 2021 01:52:55.547306061 CEST53643458.8.8.8192.168.2.5
            Sep 29, 2021 01:53:00.430376053 CEST5712853192.168.2.58.8.8.8
            Sep 29, 2021 01:53:00.457186937 CEST53571288.8.8.8192.168.2.5
            Sep 29, 2021 01:53:09.478631020 CEST5479153192.168.2.58.8.8.8
            Sep 29, 2021 01:53:09.492873907 CEST53547918.8.8.8192.168.2.5
            Sep 29, 2021 01:53:19.529807091 CEST5046353192.168.2.58.8.8.8
            Sep 29, 2021 01:53:19.543225050 CEST53504638.8.8.8192.168.2.5
            Sep 29, 2021 01:53:26.765866041 CEST5039453192.168.2.58.8.8.8
            Sep 29, 2021 01:53:26.779737949 CEST53503948.8.8.8192.168.2.5
            Sep 29, 2021 01:53:31.316761017 CEST5853053192.168.2.58.8.8.8
            Sep 29, 2021 01:53:31.335577965 CEST53585308.8.8.8192.168.2.5
            Sep 29, 2021 01:53:32.891992092 CEST5381353192.168.2.58.8.8.8
            Sep 29, 2021 01:53:32.906454086 CEST53538138.8.8.8192.168.2.5
            Sep 29, 2021 01:53:36.811083078 CEST6373253192.168.2.58.8.8.8
            Sep 29, 2021 01:53:36.830099106 CEST53637328.8.8.8192.168.2.5
            Sep 29, 2021 01:53:41.497210026 CEST5734453192.168.2.58.8.8.8
            Sep 29, 2021 01:53:41.514108896 CEST53573448.8.8.8192.168.2.5
            Sep 29, 2021 01:53:42.094588995 CEST5445053192.168.2.58.8.8.8
            Sep 29, 2021 01:53:42.162460089 CEST53544508.8.8.8192.168.2.5
            Sep 29, 2021 01:53:43.057723999 CEST5926153192.168.2.58.8.8.8
            Sep 29, 2021 01:53:43.071368933 CEST53592618.8.8.8192.168.2.5
            Sep 29, 2021 01:53:43.715352058 CEST5715153192.168.2.58.8.8.8
            Sep 29, 2021 01:53:43.728193045 CEST53571518.8.8.8192.168.2.5
            Sep 29, 2021 01:53:44.108999014 CEST5941353192.168.2.58.8.8.8
            Sep 29, 2021 01:53:44.176162004 CEST53594138.8.8.8192.168.2.5
            Sep 29, 2021 01:53:44.776848078 CEST6051653192.168.2.58.8.8.8
            Sep 29, 2021 01:53:44.871962070 CEST53605168.8.8.8192.168.2.5
            Sep 29, 2021 01:53:45.364443064 CEST5164953192.168.2.58.8.8.8
            Sep 29, 2021 01:53:45.381457090 CEST53516498.8.8.8192.168.2.5
            Sep 29, 2021 01:53:45.582349062 CEST6508653192.168.2.58.8.8.8
            Sep 29, 2021 01:53:45.617382050 CEST53650868.8.8.8192.168.2.5
            Sep 29, 2021 01:53:46.038453102 CEST5643253192.168.2.58.8.8.8
            Sep 29, 2021 01:53:46.054632902 CEST53564328.8.8.8192.168.2.5
            Sep 29, 2021 01:53:46.972182989 CEST5292953192.168.2.58.8.8.8
            Sep 29, 2021 01:53:46.989518881 CEST53529298.8.8.8192.168.2.5
            Sep 29, 2021 01:53:47.241627932 CEST6431753192.168.2.58.8.8.8
            Sep 29, 2021 01:53:47.256998062 CEST53643178.8.8.8192.168.2.5
            Sep 29, 2021 01:53:47.907243013 CEST6100453192.168.2.58.8.8.8
            Sep 29, 2021 01:53:47.922362089 CEST53610048.8.8.8192.168.2.5
            Sep 29, 2021 01:53:48.619767904 CEST5689553192.168.2.58.8.8.8
            Sep 29, 2021 01:53:48.634594917 CEST53568958.8.8.8192.168.2.5
            Sep 29, 2021 01:53:51.036287069 CEST6237253192.168.2.58.8.8.8
            Sep 29, 2021 01:53:51.052166939 CEST53623728.8.8.8192.168.2.5
            Sep 29, 2021 01:54:00.689531088 CEST6151553192.168.2.58.8.8.8
            Sep 29, 2021 01:54:00.702735901 CEST53615158.8.8.8192.168.2.5
            Sep 29, 2021 01:54:20.008591890 CEST5667553192.168.2.58.8.8.8
            Sep 29, 2021 01:54:20.024954081 CEST53566758.8.8.8192.168.2.5
            Sep 29, 2021 01:54:21.379786015 CEST5717253192.168.2.58.8.8.8
            Sep 29, 2021 01:54:21.392865896 CEST53571728.8.8.8192.168.2.5
            Sep 29, 2021 01:54:36.249819994 CEST5526753192.168.2.58.8.8.8
            Sep 29, 2021 01:54:36.305263042 CEST53552678.8.8.8192.168.2.5
            Sep 29, 2021 01:54:48.572086096 CEST5096953192.168.2.58.8.8.8
            Sep 29, 2021 01:54:48.586525917 CEST53509698.8.8.8192.168.2.5
            Sep 29, 2021 01:55:24.888780117 CEST6436253192.168.2.58.8.8.8
            Sep 29, 2021 01:55:24.904237986 CEST53643628.8.8.8192.168.2.5
            Sep 29, 2021 01:55:26.079010010 CEST5476653192.168.2.58.8.8.8
            Sep 29, 2021 01:55:26.094386101 CEST53547668.8.8.8192.168.2.5
            Sep 29, 2021 01:56:35.288681030 CEST6144653192.168.2.58.8.8.8
            Sep 29, 2021 01:56:35.305129051 CEST53614468.8.8.8192.168.2.5

            Code Manipulations

            Statistics

            Behavior

            Click to jump to process

            System Behavior

            General

            Start time:01:52:38
            Start date:29/09/2021
            Path:C:\Windows\System32\loaddll64.exe
            Wow64 process (32bit):false
            Commandline:loaddll64.exe 'C:\Users\user\Desktop\A1ogRC4R34.dll'
            Imagebase:0x7ff77a010000
            File size:1136128 bytes
            MD5 hash:E0CC9D126C39A9D2FA1CAD5027EBBD18
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000001.00000002.254502525.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
            Reputation:moderate

            General

            Start time:01:52:38
            Start date:29/09/2021
            Path:C:\Windows\System32\cmd.exe
            Wow64 process (32bit):false
            Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\A1ogRC4R34.dll',#1
            Imagebase:0x7ff7eef80000
            File size:273920 bytes
            MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:01:52:39
            Start date:29/09/2021
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe C:\Users\user\Desktop\A1ogRC4R34.dll,LogonIdFromWinStationNameA
            Imagebase:0x7ff608cf0000
            File size:69632 bytes
            MD5 hash:73C519F050C20580F8A62C849D49215A
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000003.00000002.327777249.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
            Reputation:high

            General

            Start time:01:52:39
            Start date:29/09/2021
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe 'C:\Users\user\Desktop\A1ogRC4R34.dll',#1
            Imagebase:0x7ff608cf0000
            File size:69632 bytes
            MD5 hash:73C519F050C20580F8A62C849D49215A
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000004.00000002.234114370.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
            Reputation:high

            General

            Start time:01:52:40
            Start date:29/09/2021
            Path:C:\Windows\explorer.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\Explorer.EXE
            Imagebase:0x7ff693d90000
            File size:3933184 bytes
            MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:01:52:42
            Start date:29/09/2021
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe C:\Users\user\Desktop\A1ogRC4R34.dll,LogonIdFromWinStationNameW
            Imagebase:0x7ff608cf0000
            File size:69632 bytes
            MD5 hash:73C519F050C20580F8A62C849D49215A
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000006.00000002.241053387.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
            Reputation:high

            General

            Start time:01:52:45
            Start date:29/09/2021
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe C:\Users\user\Desktop\A1ogRC4R34.dll,RemoteAssistancePrepareSystemRestore
            Imagebase:0x7ff608cf0000
            File size:69632 bytes
            MD5 hash:73C519F050C20580F8A62C849D49215A
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000007.00000002.248393203.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

            General

            Start time:01:53:25
            Start date:29/09/2021
            Path:C:\Windows\System32\rdpinit.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\rdpinit.exe
            Imagebase:0x7ff642f20000
            File size:327168 bytes
            MD5 hash:EF7C9CF6EA5B8B9C5C8320990714C35D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language

            General

            Start time:01:53:27
            Start date:29/09/2021
            Path:C:\Users\user\AppData\Local\fID\rdpinit.exe
            Wow64 process (32bit):false
            Commandline:C:\Users\user\AppData\Local\fID\rdpinit.exe
            Imagebase:0x7ff785a80000
            File size:327168 bytes
            MD5 hash:EF7C9CF6EA5B8B9C5C8320990714C35D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000018.00000002.356788011.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

            General

            Start time:01:53:38
            Start date:29/09/2021
            Path:C:\Windows\System32\DmNotificationBroker.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\DmNotificationBroker.exe
            Imagebase:0x7ff619e90000
            File size:32256 bytes
            MD5 hash:1643D5735213BC89C0012F0E48253765
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language

            General

            Start time:01:53:42
            Start date:29/09/2021
            Path:C:\Users\user\AppData\Local\uBsjD\DmNotificationBroker.exe
            Wow64 process (32bit):false
            Commandline:C:\Users\user\AppData\Local\uBsjD\DmNotificationBroker.exe
            Imagebase:0x7ff69e090000
            File size:32256 bytes
            MD5 hash:1643D5735213BC89C0012F0E48253765
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 0000001F.00000002.390772898.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

            Disassembly

            Code Analysis

            Reset < >