Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
drytex.dll

Overview

General Information

Sample Name:drytex.dll
Analysis ID:610526
MD5:b85405fc1d3a4473826d7ebd31111a50
SHA1:4b62c6e56be21a0dc8f285a23ca62a055a768956
SHA256:26af00a279ce082c2bb1db2cb50d2d590623e3f20e6c260d77ca77bf72b51797
Tags:dlldridexexe
Infos:

Detection

Dridex
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Dridex unpacked file
Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes memory attributes in foreign processes to executable or writable
Machine Learning detection for sample
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sigma detected: Suspicious Call by Ordinal
Uses schtasks.exe or at.exe to add and modify task schedules
Uses Atom Bombing / ProGate to inject into other processes
PE file contains section with special chars
Queries the volume information (name, serial number etc) of a device
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Queries the installation date of Windows
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Found dropped PE file which has not been started or loaded
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Entry point lies outside standard sections
PE file contains an invalid checksum
Drops PE files
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Found evasive API chain checking for process token information
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Binary contains a suspicious time stamp
Registers a DLL
PE file contains more sections than normal
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Sigma detected: Autorun Keys Modification
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7036 cmdline: loaddll64.exe "C:\Users\user\Desktop\drytex.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 7044 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\drytex.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 7064 cmdline: rundll32.exe "C:\Users\user\Desktop\drytex.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
        • conhost.exe (PID: 7112 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • regsvr32.exe (PID: 7052 cmdline: regsvr32.exe /s C:\Users\user\Desktop\drytex.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • explorer.exe (PID: 3968 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • phoneactivate.exe (PID: 6868 cmdline: C:\Windows\system32\phoneactivate.exe MD5: 09D1974A03068D4311F1CE94B765E817)
        • cmd.exe (PID: 7064 cmdline: "C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\V8Ka.cmd MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
        • phoneactivate.exe (PID: 1988 cmdline: "C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe" MD5: 09D1974A03068D4311F1CE94B765E817)
        • pwcreator.exe (PID: 1428 cmdline: C:\Windows\system32\pwcreator.exe MD5: BF33FA218E0B4F6AEC77616BE0F5DD9D)
        • SppExtComObj.Exe (PID: 6320 cmdline: C:\Windows\system32\SppExtComObj.Exe MD5: 809E11DECADAEBE2454EFEDD620C4769)
        • cmd.exe (PID: 6028 cmdline: "C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\33sSd.cmd MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 6832 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • phoneactivate.exe (PID: 1908 cmdline: "C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe" MD5: 09D1974A03068D4311F1CE94B765E817)
        • dllhost.exe (PID: 5520 cmdline: C:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E} MD5: 2528137C6745C4EADD87817A1909677E)
        • schtasks.exe (PID: 5872 cmdline: "C:\Windows\System32\schtasks.exe" /Create /F /TN "Uttpj" /TR C:\Windows\system32\xs2t3d\SppExtComObj.Exe /SC minute /MO 60 /RL highest MD5: 838D346D1D28F00783B7A6C6BD03A0DA)
          • conhost.exe (PID: 3176 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • phoneactivate.exe (PID: 2384 cmdline: "C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe" MD5: 09D1974A03068D4311F1CE94B765E817)
    • rundll32.exe (PID: 7072 cmdline: rundll32.exe C:\Users\user\Desktop\drytex.dll,DllCanUnloadNow MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 7132 cmdline: rundll32.exe C:\Users\user\Desktop\drytex.dll,DllGetClassObject MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 5168 cmdline: rundll32.exe C:\Users\user\Desktop\drytex.dll,DwmAttachMilContent MD5: 73C519F050C20580F8A62C849D49215A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000006.00000002.255992853.0000000140001000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
    0000002C.00000002.442591492.0000000140001000.00000020.00000001.01000000.0000000A.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
      00000017.00000002.454233782.0000000140001000.00000020.00000001.01000000.0000000A.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
        00000007.00000002.263687093.0000000140001000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
          00000024.00000002.425949324.0000000140001000.00000020.00000001.01000000.0000000A.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            7.2.rundll32.exe.140000000.0.unpackJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
              4.2.rundll32.exe.140000000.0.unpackJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
                2.2.regsvr32.exe.140000000.2.unpackJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
                  44.2.phoneactivate.exe.140000000.0.unpackJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
                    6.2.rundll32.exe.140000000.0.unpackJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
                      Click to see the 4 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth: Data: Command: rundll32.exe "C:\Users\user\Desktop\drytex.dll",#1, CommandLine: rundll32.exe "C:\Users\user\Desktop\drytex.dll",#1, CommandLine|base64offset|contains: , Image: C:\Windows\System32\rundll32.exe, NewProcessName: C:\Windows\System32\rundll32.exe, OriginalFileName: C:\Windows\System32\rundll32.exe, ParentCommandLine: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\drytex.dll",#1, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7044, ParentProcessName: cmd.exe, ProcessCommandLine: rundll32.exe "C:\Users\user\Desktop\drytex.dll",#1, ProcessId: 7064, ProcessName: rundll32.exe
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton: Data: Details: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\explorer.exe, ProcessId: 3968, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Conqxrew
                      Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\System32\cmd.exe, ProcessId: 7064, TargetFilename: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe
                      Source: Process startedAuthor: frack113: Data: Command: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, CommandLine: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, CommandLine|base64offset|contains: }}, Image: C:\Windows\System32\conhost.exe, NewProcessName: C:\Windows\System32\conhost.exe, OriginalFileName: C:\Windows\System32\conhost.exe, ParentCommandLine: rundll32.exe "C:\Users\user\Desktop\drytex.dll",#1, ParentImage: C:\Windows\System32\rundll32.exe, ParentProcessId: 7064, ParentProcessName: rundll32.exe, ProcessCommandLine: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, ProcessId: 7112, ProcessName: conhost.exe
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: drytex.dllVirustotal: Detection: 60%Perma Link
                      Source: drytex.dllReversingLabs: Detection: 76%
                      Source: drytex.dllAvira: detected
                      Source: C:\Users\user\AppData\Local\Temp\Y1C20.tmpAvira: detection malicious, Label: HEUR/AGEN.1207422
                      Source: C:\Users\user\AppData\Local\Temp\vmqDDCE.tmpAvira: detection malicious, Label: HEUR/AGEN.1207422
                      Source: drytex.dllJoe Sandbox ML: detected
                      Source: drytex.dllStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                      Source: Binary string: SppExtComObj.pdb source: SppExtComObj.Exe.30.dr
                      Source: Binary string: phoneactivate.pdb source: cmd.exe, 00000013.00000003.380184797.000001CC86274000.00000004.00000020.00020000.00000000.sdmp, phoneactivate.exe, 00000017.00000000.402663485.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe, 00000017.00000002.455042289.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe, 00000024.00000000.420584441.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe, 00000024.00000002.427114230.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe, 0000002C.00000000.439008775.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe, 0000002C.00000002.443535019.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe.19.dr
                      Source: Binary string: phoneactivate.pdbGCTL source: cmd.exe, 00000013.00000003.380184797.000001CC86274000.00000004.00000020.00020000.00000000.sdmp, phoneactivate.exe, 00000017.00000000.402663485.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe, 00000017.00000002.455042289.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe, 00000024.00000000.420584441.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe, 00000024.00000002.427114230.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe, 0000002C.00000000.439008775.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe, 0000002C.00000002.443535019.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe.19.dr
                      Source: Binary string: SppExtComObj.pdbUGP source: SppExtComObj.Exe.30.dr
                      Source: Binary string: sgI.pdb source: rundll32.exe, 00000003.00000003.248179831.000002639BD20000.00000004.00000020.00020000.00000000.sdmp, drytex.dll, Y1C20.tmp.5.dr, vmqDDCE.tmp.5.dr
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140049724 FindFirstFileExW,
                      Source: phoneactivate.exeString found in binary or memory: http://schemas.mic

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 7.2.rundll32.exe.140000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.140000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.140000000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 44.2.phoneactivate.exe.140000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.140000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.140000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.140000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 23.2.phoneactivate.exe.140000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 36.2.phoneactivate.exe.140000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.255992853.0000000140001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000002C.00000002.442591492.0000000140001000.00000020.00000001.01000000.0000000A.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000017.00000002.454233782.0000000140001000.00000020.00000001.01000000.0000000A.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.263687093.0000000140001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000024.00000002.425949324.0000000140001000.00000020.00000001.01000000.0000000A.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.269681895.0000000140001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.248898952.0000000140001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.337765155.0000000140001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.248725971.0000000140001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY

                      System Summary

                      barindex
                      Source: SppExtComObj.Exe.30.drStatic PE information: section name: ?g_Encry
                      Source: C:\Windows\System32\cmd.exeFile created: C:\Windows\system32\xs2t3dJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014005284C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140048A4C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140040370
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400343E8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140026C74
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014004F4D0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140049CE8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014004357C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014003DEEC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140036778
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140022004
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140060014
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140024028
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002782C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002E030
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014005582B
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140034044
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014000F848
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014003D878
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140020094
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002F8A4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400280AC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014004F0AC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400410B4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400150E4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140066100
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140025100
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014004D914
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140033124
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140032128
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140025930
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140005950
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014004E954
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140001158
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014003796C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140049980
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140039990
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002F198
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400389A4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400099AC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400659F0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002EA1C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140055A4D
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014005A24C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014001B250
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140001A78
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140007284
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140061283
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140061A90
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400642A0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002DAA4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140043AC0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140019AC4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400512E0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400162E0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002BAEC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140006AEC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140063324
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140013B64
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140055364
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140019378
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140060B8C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014001A394
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140008B94
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014004BBBC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140021BD8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400243E0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002B3F3
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140004C0C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002B429
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140012474
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014000AC74
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140038478
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014004FC74
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002747C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002A4A4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014001B4AC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014004A4B0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140063CB4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002F4B8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140003CC4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014000ECD0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140017CD4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140044CD8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014004ECF8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140042504
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140026534
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002AD38
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140022D50
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140029550
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140012D8C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140051D90
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140006D94
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400515A0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400285AC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140031DCC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400365D0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400205D8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140011DE4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014004D5EC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014003A60C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140021E1C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140023E1C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014004E628
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014004CE2C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140018638
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140004E38
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140014644
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002EE48
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014004A660
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140053670
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014003AE70
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140031670
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014002D694
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140036E98
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014000D69C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140050EA8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140053EC0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014001BEC8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400466C4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014004EF0C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140017F40
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014001CF40
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140041F3C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140032750
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014000578C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400137A0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400557A3
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014001C7CC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001400027DC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140030FE0
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF744385364
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF74438D570
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF744386920
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF7443891DC
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF744385998
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF74438B9B4
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF7443883BC
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF7443897D4
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF744388058
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF74438A094
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF74438D220
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF74438CE28
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF7443884DC
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF744385EE0
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF7443812F8
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF74438730C
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 36_2_00007FF744385364
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 36_2_00007FF74438D570
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 36_2_00007FF744386920
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 36_2_00007FF7443891DC
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 36_2_00007FF744385998
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 36_2_00007FF74438B9B4
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 36_2_00007FF7443883BC
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 36_2_00007FF7443897D4
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 36_2_00007FF744388058
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 36_2_00007FF74438A094
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 36_2_00007FF74438D220
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 36_2_00007FF74438CE28
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 36_2_00007FF7443884DC
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 36_2_00007FF744385EE0
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 36_2_00007FF7443812F8
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 36_2_00007FF74438730C
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: String function: 00007FF744386104 appears 52 times
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014005284C NtQuerySystemInformation,
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\explorer.exeSection loaded: pcacli.dll
                      Source: C:\Windows\explorer.exeSection loaded: mpr.dll
                      Source: C:\Windows\explorer.exeSection loaded: windows.globalization.dll
                      Source: C:\Windows\explorer.exeSection loaded: capabilityaccessmanagerclient.dll
                      Source: drytex.dllStatic PE information: Number of sections : 57 > 10
                      Source: Y1C20.tmp.5.drStatic PE information: Number of sections : 58 > 10
                      Source: vmqDDCE.tmp.5.drStatic PE information: Number of sections : 58 > 10
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe 5D4F713CFC98E7148B67D063193D93BFE29F8329705A03690590633FADE32EE5
                      Source: drytex.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: Y1C20.tmp.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: vmqDDCE.tmp.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: SppExtComObj.Exe.30.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: drytex.dllVirustotal: Detection: 60%
                      Source: drytex.dllReversingLabs: Detection: 76%
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\drytex.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\drytex.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\drytex.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\drytex.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\drytex.dll,DllCanUnloadNow
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\drytex.dll,DllGetClassObject
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\drytex.dll,DwmAttachMilContent
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\phoneactivate.exe C:\Windows\system32\phoneactivate.exe
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\V8Ka.cmd
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe "C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe"
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\pwcreator.exe C:\Windows\system32\pwcreator.exe
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\SppExtComObj.Exe C:\Windows\system32\SppExtComObj.Exe
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\33sSd.cmd
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe "C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe"
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E}
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /F /TN "Uttpj" /TR C:\Windows\system32\xs2t3d\SppExtComObj.Exe /SC minute /MO 60 /RL highest
                      Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe "C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\drytex.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\drytex.dll
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\drytex.dll,DllCanUnloadNow
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\drytex.dll,DllGetClassObject
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\drytex.dll,DwmAttachMilContent
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\drytex.dll",#1
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\phoneactivate.exe C:\Windows\system32\phoneactivate.exe
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\V8Ka.cmd
                      Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe "C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe"
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\pwcreator.exe C:\Windows\system32\pwcreator.exe
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\SppExtComObj.Exe C:\Windows\system32\SppExtComObj.Exe
                      Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe "C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe"
                      Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe "C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe"
                      Source: C:\Windows\explorer.exeProcess created: unknown unknown
                      Source: C:\Windows\explorer.exeProcess created: unknown unknown
                      Source: C:\Windows\explorer.exeProcess created: unknown unknown
                      Source: C:\Windows\explorer.exeProcess created: unknown unknown
                      Source: C:\Windows\explorer.exeProcess created: unknown unknown
                      Source: C:\Windows\explorer.exeProcess created: unknown unknown
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E}
                      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
                      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CryptoJump to behavior
                      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\vmqDDCE.tmpJump to behavior
                      Source: classification engineClassification label: mal100.troj.evad.winDLL@40/10@0/0
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF74438730C CoCreateInstance,GetProcessHeap,HeapAlloc,memset,memset,GetProcessHeap,HeapAlloc,memset,memset,GetProcessHeap,HeapAlloc,memset,memset,GetProcessHeap,HeapAlloc,memset,memset,
                      Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\drytex.dll",#1
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeMutant created: \Sessions\1\BaseNamedObjects\{1d67e0a9-ab25-2d3a-f358-7073a8bb1c60}
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3176:120:WilError_01
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6832:120:WilError_01
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeMutant created: \Sessions\1\BaseNamedObjects\{4ae5d0f4-7b10-3c35-b894-84b2027938b4}
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7112:120:WilError_01
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF744384794 FindResourceExW,GetLastError,LoadResource,LockResource,
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: drytex.dllStatic PE information: Image base 0x140000000 > 0x60000000
                      Source: drytex.dllStatic file information: File size 1253376 > 1048576
                      Source: drytex.dllStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                      Source: Binary string: SppExtComObj.pdb source: SppExtComObj.Exe.30.dr
                      Source: Binary string: phoneactivate.pdb source: cmd.exe, 00000013.00000003.380184797.000001CC86274000.00000004.00000020.00020000.00000000.sdmp, phoneactivate.exe, 00000017.00000000.402663485.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe, 00000017.00000002.455042289.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe, 00000024.00000000.420584441.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe, 00000024.00000002.427114230.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe, 0000002C.00000000.439008775.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe, 0000002C.00000002.443535019.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe.19.dr
                      Source: Binary string: phoneactivate.pdbGCTL source: cmd.exe, 00000013.00000003.380184797.000001CC86274000.00000004.00000020.00020000.00000000.sdmp, phoneactivate.exe, 00000017.00000000.402663485.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe, 00000017.00000002.455042289.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe, 00000024.00000000.420584441.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe, 00000024.00000002.427114230.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe, 0000002C.00000000.439008775.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe, 0000002C.00000002.443535019.00007FF744390000.00000002.00000001.01000000.00000009.sdmp, phoneactivate.exe.19.dr
                      Source: Binary string: SppExtComObj.pdbUGP source: SppExtComObj.Exe.30.dr
                      Source: Binary string: sgI.pdb source: rundll32.exe, 00000003.00000003.248179831.000002639BD20000.00000004.00000020.00020000.00000000.sdmp, drytex.dll, Y1C20.tmp.5.dr, vmqDDCE.tmp.5.dr
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000020ADDE83055 push rbx; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02873055 push rbx; retf
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000002639A343055 push rbx; retf
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001FFD9983055 push rbx; retf
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000001774A0A3055 push rbx; retf
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000001AC7B973055 push rbx; retf
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_000001C248203055 push rbx; retf
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 36_2_0000021222523055 push rbx; retf
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 44_2_0000025AA5963055 push rbx; retf
                      Source: drytex.dllStatic PE information: section name: .crt1
                      Source: drytex.dllStatic PE information: section name: qwTG
                      Source: drytex.dllStatic PE information: section name: .lqen
                      Source: drytex.dllStatic PE information: section name: .vqb
                      Source: drytex.dllStatic PE information: section name: .gjd
                      Source: drytex.dllStatic PE information: section name: .wqhqlp
                      Source: drytex.dllStatic PE information: section name: .nulizw
                      Source: drytex.dllStatic PE information: section name: .fgrum
                      Source: drytex.dllStatic PE information: section name: .mjabqc
                      Source: drytex.dllStatic PE information: section name: .ghh
                      Source: drytex.dllStatic PE information: section name: .vrqcr
                      Source: drytex.dllStatic PE information: section name: .siorvl
                      Source: drytex.dllStatic PE information: section name: .sqgym
                      Source: drytex.dllStatic PE information: section name: .kqhrq
                      Source: drytex.dllStatic PE information: section name: .rsntf
                      Source: drytex.dllStatic PE information: section name: .iqt
                      Source: drytex.dllStatic PE information: section name: .kpwiuc
                      Source: drytex.dllStatic PE information: section name: .yuzcn
                      Source: drytex.dllStatic PE information: section name: .jbsbuw
                      Source: drytex.dllStatic PE information: section name: .mdjtj
                      Source: drytex.dllStatic PE information: section name: .mbjeh
                      Source: drytex.dllStatic PE information: section name: .amb
                      Source: drytex.dllStatic PE information: section name: .lac
                      Source: drytex.dllStatic PE information: section name: .zro
                      Source: drytex.dllStatic PE information: section name: .vtq
                      Source: drytex.dllStatic PE information: section name: .kyhoy
                      Source: drytex.dllStatic PE information: section name: .wvi
                      Source: drytex.dllStatic PE information: section name: .alzw
                      Source: drytex.dllStatic PE information: section name: .vdsoxe
                      Source: drytex.dllStatic PE information: section name: .pus
                      Source: drytex.dllStatic PE information: section name: .oqnl
                      Source: drytex.dllStatic PE information: section name: .ohjt
                      Source: drytex.dllStatic PE information: section name: .ofjxx
                      Source: drytex.dllStatic PE information: section name: .ifw
                      Source: drytex.dllStatic PE information: section name: .zktgse
                      Source: drytex.dllStatic PE information: section name: .pmd
                      Source: drytex.dllStatic PE information: section name: .kexxpw
                      Source: drytex.dllStatic PE information: section name: .kiqzd
                      Source: drytex.dllStatic PE information: section name: .uslf
                      Source: drytex.dllStatic PE information: section name: .zkkgx
                      Source: drytex.dllStatic PE information: section name: .phhwk
                      Source: drytex.dllStatic PE information: section name: .klf
                      Source: drytex.dllStatic PE information: section name: .xme
                      Source: drytex.dllStatic PE information: section name: .fnxmzz
                      Source: drytex.dllStatic PE information: section name: .wpkbi
                      Source: drytex.dllStatic PE information: section name: .gzgei
                      Source: drytex.dllStatic PE information: section name: .zep
                      Source: drytex.dllStatic PE information: section name: .viz
                      Source: drytex.dllStatic PE information: section name: .xqen
                      Source: drytex.dllStatic PE information: section name: .ouhvqw
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .crt1
                      Source: Y1C20.tmp.5.drStatic PE information: section name: qwTG
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .lqen
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .vqb
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .gjd
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .wqhqlp
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .nulizw
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .fgrum
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .mjabqc
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .ghh
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .vrqcr
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .siorvl
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .sqgym
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .kqhrq
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .rsntf
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .iqt
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .kpwiuc
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .yuzcn
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .jbsbuw
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .mdjtj
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .mbjeh
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .amb
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .lac
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .zro
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .vtq
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .kyhoy
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .wvi
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .alzw
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .vdsoxe
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .pus
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .oqnl
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .ohjt
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .ofjxx
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .ifw
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .zktgse
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .pmd
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .kexxpw
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .kiqzd
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .uslf
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .zkkgx
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .phhwk
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .klf
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .xme
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .fnxmzz
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .wpkbi
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .gzgei
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .zep
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .viz
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .xqen
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .ouhvqw
                      Source: Y1C20.tmp.5.drStatic PE information: section name: .ivx
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .crt1
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: qwTG
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .lqen
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .vqb
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .gjd
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .wqhqlp
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .nulizw
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .fgrum
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .mjabqc
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .ghh
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .vrqcr
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .siorvl
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .sqgym
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .kqhrq
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .rsntf
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .iqt
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .kpwiuc
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .yuzcn
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .jbsbuw
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .mdjtj
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .mbjeh
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .amb
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .lac
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .zro
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .vtq
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .kyhoy
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .wvi
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .alzw
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .vdsoxe
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .pus
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .oqnl
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .ohjt
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .ofjxx
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .ifw
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .zktgse
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .pmd
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .kexxpw
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .kiqzd
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .uslf
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .zkkgx
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .phhwk
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .klf
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .xme
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .fnxmzz
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .wpkbi
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .gzgei
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .zep
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .viz
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .xqen
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .ouhvqw
                      Source: vmqDDCE.tmp.5.drStatic PE information: section name: .dlt
                      Source: phoneactivate.exe.19.drStatic PE information: section name: .imrsiv
                      Source: SppExtComObj.Exe.30.drStatic PE information: section name: ?g_Encry
                      Source: initial sampleStatic PE information: section where entry point is pointing to: .crt1
                      Source: drytex.dllStatic PE information: real checksum: 0xb3260629 should be: 0x136300
                      Source: Y1C20.tmp.5.drStatic PE information: real checksum: 0xb3260629 should be: 0x142b53
                      Source: vmqDDCE.tmp.5.drStatic PE information: real checksum: 0xb3260629 should be: 0x1816a3
                      Source: phoneactivate.exe.19.drStatic PE information: 0x9D5EA917 [Sun Aug 31 04:16:23 2053 UTC]
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\drytex.dll
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.8179817907
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.8179817907
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.8179817907
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.59477523886
                      Source: C:\Windows\System32\cmd.exeFile created: C:\Windows\System32\xs2t3d\SppExtComObj.ExeJump to dropped file
                      Source: C:\Windows\System32\cmd.exeFile created: C:\Windows\system32\xs2t3d\ACTIVEDS.dll (copy)Jump to dropped file
                      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\vmqDDCE.tmpJump to dropped file
                      Source: C:\Windows\System32\cmd.exeFile created: C:\Users\user\AppData\Roaming\ThotvT\DUI70.dll (copy)Jump to dropped file
                      Source: C:\Windows\System32\cmd.exeFile created: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeJump to dropped file
                      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\Y1C20.tmpJump to dropped file
                      Source: C:\Windows\System32\cmd.exeFile created: C:\Windows\System32\xs2t3d\SppExtComObj.ExeJump to dropped file
                      Source: C:\Windows\System32\cmd.exeFile created: C:\Windows\system32\xs2t3d\ACTIVEDS.dll (copy)Jump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /F /TN "Uttpj" /TR C:\Windows\system32\xs2t3d\SppExtComObj.Exe /SC minute /MO 60 /RL highest
                      Source: C:\Windows\explorer.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ConqxrewJump to behavior
                      Source: C:\Windows\explorer.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ConqxrewJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: explorer.exeUser mode code has changed: module: ntdll.dll function: ZwSetEvent new code: 0xE9 0x9B 0xBB 0xB5 0x5E 0xEF
                      Source: C:\Windows\explorer.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\cmd.exeDropped PE file which has not been started: C:\Windows\system32\xs2t3d\ACTIVEDS.dll (copy)Jump to dropped file
                      Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\vmqDDCE.tmpJump to dropped file
                      Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Y1C20.tmpJump to dropped file
                      Source: C:\Windows\System32\loaddll64.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeAPI coverage: 0.8 %
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeAPI coverage: 0.8 %
                      Source: C:\Windows\System32\loaddll64.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000014003EB14 GetSystemInfo,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140049724 FindFirstFileExW,
                      Source: explorer.exe, 00000005.00000000.270853419.00000000080ED000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                      Source: explorer.exe, 00000005.00000000.270853419.00000000080ED000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Prod_VMware_SATA
                      Source: explorer.exe, 00000005.00000000.271193257.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}m&ven_n
                      Source: explorer.exe, 00000005.00000000.263094565.0000000000680000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD00#5&280b647&
                      Source: explorer.exe, 00000005.00000000.263115567.000000000069D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: explorer.exe, 00000005.00000000.271193257.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
                      Source: explorer.exe, 00000005.00000000.303077563.00000000062C4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: explorer.exe, 00000005.00000000.271193257.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}+]e
                      Source: explorer.exe, 00000005.00000000.284568857.0000000004287000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}0
                      Source: explorer.exe, 00000005.00000000.271171855.000000000820E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                      Source: explorer.exe, 00000005.00000000.271193257.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}}^
                      Source: explorer.exe, 00000005.00000000.270853419.00000000080ED000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
                      Source: explorer.exe, 00000005.00000000.271193257.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00l
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF744385364 memmove,GetProcessHeap,HeapFree,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000140040370 LdrLoadDll,
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF74438DD68 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF74438E060 SetUnhandledExceptionFilter,
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 36_2_00007FF74438DD68 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 36_2_00007FF74438E060 SetUnhandledExceptionFilter,

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\explorer.exeFile created: Y1C20.tmp.5.drJump to dropped file
                      Source: C:\Windows\System32\regsvr32.exeMemory protected: C:\Windows\explorer.exe base: 7FFC866FEFE0 protect: page execute and read and write
                      Source: C:\Windows\System32\regsvr32.exeMemory protected: C:\Windows\explorer.exe base: 7FFC866FE000 protect: page execute read
                      Source: C:\Windows\System32\regsvr32.exeMemory protected: C:\Windows\explorer.exe base: 7FFC85C32A20 protect: page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeMemory protected: unknown base: 7FFC866FEFE0 protect: page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeMemory protected: unknown base: 7FFC866FE000 protect: page execute read
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeMemory protected: unknown base: 7FFC85C32A20 protect: page execute and read and write
                      Source: C:\Windows\System32\regsvr32.exeThread APC queued: target process: C:\Windows\explorer.exe
                      Source: C:\Windows\System32\regsvr32.exeAtom created: 53565741554156554881ECA8 0x00000000 push ebx 0x00000001 push esi 0x00000002 push edi 0x00000003 inc ecx 0x00000004 push ebp 0x00000005 inc ecx 0x00000006 push esi 0x00000007 push ebp 0x00000008 dec eax 0x00000009 sub esp, 000000A8h
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeAtom created: 53565741554156554881ECA8 0x00000000 push ebx 0x00000001 push esi 0x00000002 push edi 0x00000003 inc ecx 0x00000004 push ebp 0x00000005 inc ecx 0x00000006 push esi 0x00000007 push ebp 0x00000008 dec eax 0x00000009 sub esp, 000000A8h
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\drytex.dll",#1
                      Source: explorer.exe, 00000005.00000000.263102869.0000000000688000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.249591286.0000000000688000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.283030296.0000000000688000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmanEXE^
                      Source: explorer.exe, 00000005.00000000.302845333.0000000005920000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.263342877.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.299296787.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: explorer.exe, 00000005.00000000.263342877.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.299296787.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.250020483.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                      Source: explorer.exe, 00000005.00000000.263342877.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.299296787.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.250020483.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                      Source: explorer.exe, 00000005.00000000.298746734.000000000069D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.283087838.000000000069D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.249622086.000000000069D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd4
                      Source: explorer.exe, 00000005.00000000.263342877.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.299296787.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.250020483.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: WProgram Manager
                      Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDate
                      Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF7443891DC memset,GetSystemTime,SystemTimeToFileTime,GetLastError,memset,SLGetWindowsInformation,memset,LocalFree,GetProcessHeap,HeapFree,
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 23_2_00007FF744381E00 StrToID,?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z,?AddListener@Element@DirectUI@@QEAAJPEAUIElementListener@2@@Z,
                      Source: C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exeCode function: 36_2_00007FF744381E00 StrToID,?FindDescendent@Element@DirectUI@@QEAAPEAV12@G@Z,?AddListener@Element@DirectUI@@QEAAJPEAUIElementListener@2@@Z,
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts1
                      Scheduled Task/Job
                      1
                      Scheduled Task/Job
                      312
                      Process Injection
                      1
                      Rootkit
                      1
                      Credential API Hooking
                      1
                      System Time Discovery
                      Remote Services1
                      Credential API Hooking
                      Exfiltration Over Other Network Medium1
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default Accounts1
                      Native API
                      1
                      Registry Run Keys / Startup Folder
                      1
                      Scheduled Task/Job
                      21
                      Masquerading
                      LSASS Memory1
                      Query Registry
                      Remote Desktop Protocol1
                      Archive Collected Data
                      Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain Accounts1
                      Exploitation for Client Execution
                      1
                      DLL Side-Loading
                      1
                      Registry Run Keys / Startup Folder
                      312
                      Process Injection
                      Security Account Manager11
                      Security Software Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)1
                      DLL Side-Loading
                      1
                      Deobfuscate/Decode Files or Information
                      NTDS2
                      Process Discovery
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script3
                      Obfuscated Files or Information
                      LSA Secrets2
                      File and Directory Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common1
                      Regsvr32
                      Cached Domain Credentials24
                      System Information Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                      Rundll32
                      DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job2
                      Software Packing
                      Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      Timestomp
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                      DLL Side-Loading
                      Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 610526 Sample: drytex.dll Startdate: 18/04/2022 Architecture: WINDOWS Score: 100 54 Antivirus detection for dropped file 2->54 56 Antivirus / Scanner detection for submitted sample 2->56 58 Multi AV Scanner detection for submitted file 2->58 60 5 other signatures 2->60 9 loaddll64.exe 1 2->9         started        process3 process4 11 regsvr32.exe 9->11         started        14 cmd.exe 1 9->14         started        16 rundll32.exe 9->16         started        18 2 other processes 9->18 signatures5 70 Changes memory attributes in foreign processes to executable or writable 11->70 72 Uses Atom Bombing / ProGate to inject into other processes 11->72 74 Queues an APC in another process (thread injection) 11->74 20 explorer.exe 11 35 11->20 injected 24 rundll32.exe 14->24         started        process6 file7 42 C:\Users\user\AppData\Local\...\vmqDDCE.tmp, PE32+ 20->42 dropped 44 C:\Users\user\AppData\Local\Temp\Y1C20.tmp, PE32+ 20->44 dropped 62 Benign windows process drops PE files 20->62 64 Uses schtasks.exe or at.exe to add and modify task schedules 20->64 26 phoneactivate.exe 20->26         started        29 cmd.exe 3 20->29         started        32 cmd.exe 3 20->32         started        36 7 other processes 20->36 34 conhost.exe 24->34         started        signatures8 process9 file10 66 Changes memory attributes in foreign processes to executable or writable 26->66 68 Uses Atom Bombing / ProGate to inject into other processes 26->68 46 C:\Users\user\AppData\...\phoneactivate.exe, PE32+ 29->46 dropped 48 C:\Users\user\AppData\...\DUI70.dll (copy), PE32+ 29->48 dropped 50 C:\Windows\system32\...\ACTIVEDS.dll (copy), PE32+ 32->50 dropped 52 C:\Windows\System32\xs2t3d\SppExtComObj.Exe, PE32+ 32->52 dropped 38 conhost.exe 32->38         started        40 conhost.exe 36->40         started        signatures11 process12

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      drytex.dll61%VirustotalBrowse
                      drytex.dll76%ReversingLabsWin64.Worm.Cridex
                      drytex.dll100%AviraHEUR/AGEN.1207422
                      drytex.dll100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Temp\Y1C20.tmp100%AviraHEUR/AGEN.1207422
                      C:\Users\user\AppData\Local\Temp\vmqDDCE.tmp100%AviraHEUR/AGEN.1207422
                      C:\Users\user\AppData\Local\Temp\Y1C20.tmp100%Joe Sandbox ML
                      SourceDetectionScannerLabelLinkDownload
                      3.2.rundll32.exe.140000000.0.unpack100%AviraHEUR/AGEN.1207430Download File
                      7.2.rundll32.exe.140000000.0.unpack100%AviraHEUR/AGEN.1207430Download File
                      4.2.rundll32.exe.140000000.0.unpack100%AviraHEUR/AGEN.1207430Download File
                      2.2.regsvr32.exe.140000000.2.unpack100%AviraHEUR/AGEN.1207430Download File
                      44.2.phoneactivate.exe.140000000.0.unpack100%AviraHEUR/AGEN.1207430Download File
                      6.2.rundll32.exe.140000000.0.unpack100%AviraHEUR/AGEN.1207430Download File
                      0.2.loaddll64.exe.140000000.0.unpack100%AviraHEUR/AGEN.1207430Download File
                      23.2.phoneactivate.exe.140000000.0.unpack100%AviraHEUR/AGEN.1207430Download File
                      36.2.phoneactivate.exe.140000000.0.unpack100%AviraHEUR/AGEN.1207430Download File
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://schemas.mic0%URL Reputationsafe
                      No contacted domains info
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://schemas.micphoneactivate.exefalse
                      • URL Reputation: safe
                      unknown
                      No contacted IP infos
                      Joe Sandbox Version:34.0.0 Boulder Opal
                      Analysis ID:610526
                      Start date and time: 18/04/202207:33:072022-04-18 07:33:07 +02:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 12m 23s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:drytex.dll
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:45
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:2
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.troj.evad.winDLL@40/10@0/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:
                      • Successful, ratio: 30.7% (good quality ratio 25.6%)
                      • Quality average: 67.4%
                      • Quality standard deviation: 36.6%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .dll
                      • Adjust boot time
                      • Enable AMSI
                      • Override analysis time to 240s for rundll32
                      • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, dllhost.exe, consent.exe, SppExtComObj.Exe, backgroundTaskHost.exe, UsoClient.exe, BackgroundTransferHost.exe, UpdateNotificationMgr.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, go.microsoft.com, login.live.com, ctldl.windowsupdate.com, settings-win.data.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtEnumerateKey calls found.
                      TimeTypeDescription
                      07:35:13AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Conqxrew C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe
                      07:35:22AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Conqxrew C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe
                      07:35:30AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Conqxrew.lnk
                      07:35:34API Interceptor1x Sleep call for process: dllhost.exe modified
                      07:35:41Task SchedulerRun new task: Uttpj path: C:\Windows\system32\xs2t3d\SppExtComObj.Exe
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Windows\explorer.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:modified
                      Size (bytes):204
                      Entropy (8bit):4.992450793081024
                      Encrypted:false
                      SSDEEP:3:8Fo5TAI2eAIQUjV7AIBgIWXp5cViE2J5xAIhmXVLRIvmJAIUsMuoUQ:8u5TYeyiJHRWXp+N23fhmFlNqUQ
                      MD5:3EBEA66F3F22B719EEA0C1ED1882A87A
                      SHA1:D6AEAA23E30880AAD41C17E674D24CCFCCB6FED8
                      SHA-256:C266CA358FA49A556F80C1486C0E054B78080AC380318A619F6CE15A93C84166
                      SHA-512:94A81C7C0A4428408BCFED168C605CD4B2D7098C79BE8728E5B337F75D458508424041723623D6364802D9881EA6C23D8D2BD0CD75098247B627D7E1A483893A
                      Malicious:false
                      Preview:md C:\Windows\system32\xs2t3d..copy C:\Windows\system32\SppExtComObj.Exe C:\Windows\system32\xs2t3d..move C:\Users\user\AppData\Local\Temp\Y1C20.tmp C:\Windows\system32\xs2t3d\ACTIVEDS.dll..del %0 & exit
                      Process:C:\Windows\explorer.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):237
                      Entropy (8bit):4.913522860271459
                      Encrypted:false
                      SSDEEP:6:8u5PWXp+NaZ5AgHG+AdgmfNWXp+NaZ5AsWXp+N23fHHYIWXp+NaZ5A6ovxUQ:8u5+HDugo0HyAdHqvxUQ
                      MD5:20E4260BFC284D0F40AF7DAA705F22D0
                      SHA1:0599152423FADB2BB7BEC29BB6DC91052C52DF4F
                      SHA-256:1E7288DC642133C2B2D272F19899D27B7079BCD467BE6C07DAA9E5C96B2DC82E
                      SHA-512:FFA815C5B2FF13E4D24EF01B421EA70F1A37B99D9D684FA3C07C32289DCE764CA5360443FC77B05DF244EEE398B870B6EF6AF5F7CF561C58288BC657BB0E892C
                      Malicious:false
                      Preview:md C:\Users\user\AppData\Roaming\ThotvT..copy C:\Windows\system32\phoneactivate.exe C:\Users\user\AppData\Roaming\ThotvT..move C:\Users\user\AppData\Local\Temp\vmqDDCE.tmp C:\Users\user\AppData\Roaming\ThotvT\DUI70.dll..del %0 & exit
                      Process:C:\Windows\explorer.exe
                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):1257472
                      Entropy (8bit):4.869587549920812
                      Encrypted:false
                      SSDEEP:12288:habbKACcbDWwVedYHi4mrh+IyiPU0D88nTtgO9HvjA3RlkuRCYJRB7laUqdezDk5:saXcfWwgSKrhncQYlez5nGa84djgol
                      MD5:C770563E0C71B17EF44FF21185C63AD3
                      SHA1:6AA9A5A97217143DA9F7E7F6FAB2CE71E127D6F2
                      SHA-256:45EE8F805EBB6C92B215B7C559BB778F5AC5AC7A913EBC028CF70EBE426EB1FD
                      SHA-512:CD52CD910CDF19245BE808AF2398D57A361E8D0EE7B57D5B5382CE56C1AB4E0B3D2D74877E50F1389E5069C85D60A3659A21991BF43BBD4049D1234129310127
                      Malicious:true
                      Antivirus:
                      • Antivirus: Avira, Detection: 100%
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      Preview:MZ......................@.......................................x..j<.9<.9<.9?.t9I.9..8k.9S.49..9.ou9w.9..8M.9...82.9.7.9..91.I9u.9".:9..9'l590.9".=9/.9...8G.9R..8..9..8P.9S.39v.9?.u9i.9.7.9}.9..8..9".;9i.9..I9S.9Z.e9x.9?.w9..9A.v9,.9Rich<.9....................................................................................................................PE..d.:..\.T.........." .....f.....................@.............................0......).&...`.......................................... ..y...h...d................................(...................................................................................text....w.......................... ..`.rdata.............................. ..`.crt1............................... ..`.rdata..............................@..@.data............ ..................@....pdata..F...........................@..@qwTG................................@....rsrc...............................@..@.reloc...(.......0..........
                      Process:C:\Windows\explorer.exe
                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):1540096
                      Entropy (8bit):5.376397843442921
                      Encrypted:false
                      SSDEEP:12288:AabbKACcbDWwVedYHi4mrh+IyiPU0D88nTtgO9HvjA3RlkuRCYJRB7laUqdezDkW:7aXcfWwgSKrhncQYlez5nGa84djgol
                      MD5:FAB6B6A557FBE1C84AB38A331914817C
                      SHA1:21B8E6CA4B6826D05B9E630A884AB8C8E2EE6317
                      SHA-256:090BB796EC1FFD9B7C050F86BDAA8A1614985D8BEBE3965DB8F39A569603D24A
                      SHA-512:465A04D661CA6B454FA44FAF4143189F86B43D86060308409987B3162C30AE6DC9584AA2833A759DB9B71435FDF8AC583AE9034FF98204BEB6D91452D18D9BA3
                      Malicious:true
                      Antivirus:
                      • Antivirus: Avira, Detection: 100%
                      Preview:MZ......................@.......................................x..j<.9<.9<.9?.t9I.9..8k.9S.49..9.ou9w.9..8M.9...82.9.7.9..91.I9u.9".:9..9'l590.9".=9/.9...8G.9R..8..9..8P.9S.39v.9?.u9i.9.7.9}.9..8..9".;9i.9..I9S.9Z.e9x.9?.w9..9A.v9,.9Rich<.9....................................................................................................................PE..d.:..\.T.........." .....f.....................@....................................).&...`.......................................... ..dQ..h...d................................(...................................................................................text....w.......................... ..`.rdata.............................. ..`.crt1............................... ..`.rdata..............................@..@.data............ ..................@....pdata..F...........................@..@qwTG................................@....rsrc...............................@..@.reloc...(.......0..........
                      Process:C:\Windows\explorer.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1450
                      Entropy (8bit):7.346730158776579
                      Encrypted:false
                      SSDEEP:24:UX4NtP5Ucj5fMbfPOU/J0nfl75UETR72tnZQcBit1uak1:UX4NtP5UcybfPOU/qfl75n92kc+uak1
                      MD5:FA67A4DAB5AD8716BA08564C60E0ED05
                      SHA1:34493BE6B3D4D5A6E04B24B90B87D32F686D6D96
                      SHA-256:61B4971FB3394F314D0A5401E3B99A806CE15001B98A7112E46FBC92B3DFBC31
                      SHA-512:B497314198CBF476B7AD016856F5578212B1E176CD669959251C7829DA3C5FC87526834FA1E5C5E6BC9EEADAF9CC7DEB848BEE836FCCE14547A62007A7E669F5
                      Malicious:false
                      Preview:........................................user.....................RSA1.................!".F..K.?M}.]..l.......n...-.GE....<..rW..>.C.3.F.h..\9.....[...9_....=m^h........j.qb...o$V....abe;Rh.e.::...j.j}-........................z..O......w...L.aI....?E......,...C.r.y.p.t.o.A.P.I. .P.r.i.v.a.t.e. .K.e.y....f...... .....zZkW.<.6.{.86..O.fZ...%8<.o. ............ ...i......X?.~...G.{.........)..S....XE...d.o..)=_K..n}.....mE.C......|..=.....n..L...0W..W...v..].U2..sv..S5..T-..}.L.>>....`l.s.5.Lr.?hc.N.Z..x]R..Bc:.._.... Y.&1j..P....kL..A.j..!.u.8.. r7.....7...9....sy...3..k.t.$..i......D..DN...:.Y........y...Kk<kW.}.PW.Q........<.E.....Y*w....b._..$..'...0f.C...f.D.T......F..e..R.r....^..s....`W.H%..Y.....qtK~yJ..A.QA..v$.W7..4...4...$..."....9.Z&...d.i.J.0.3.u.w..1 i.9N.@.4.......j}.or..t_.4.,..`./c.%.La.atU.Z^.@.${.r.].h.GK7.E2....."7.....| ...d....?w.u..8[.....Ie.....r2A8m`..=..P....?x..5.m.[.Z..i..rF..'....A(X...VC.JC....5..f.&..rRH..J@.b..w..
                      Process:C:\Windows\explorer.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Apr 18 13:35:12 2022, mtime=Mon Apr 18 13:35:12 2022, atime=Wed Apr 11 22:34:36 2018, length=107504, window=hide
                      Category:dropped
                      Size (bytes):901
                      Entropy (8bit):5.0652880756211704
                      Encrypted:false
                      SSDEEP:12:8q43P84grl0KCqo//ZSL44gue7XQhwLDglvRgjAsHAnDSa7sd14P542Gm:8zVgrlH7oBssHLQGQlJ0ABDp7PEm
                      MD5:41C3A004B77DE5860657B1653FFC54F7
                      SHA1:D53C091CF6582B32EC5BAE408E5EE48059CD9F82
                      SHA-256:7C3BC8D56BF8466BF92012966C7720FB569BCD7AA36CF2E679E0B35F96FF6BFC
                      SHA-512:AB1710478E568CC467B670F85C53CDCAF144C23D3EAA394705D0E3FBAE93F00B135EA330DE029C65FB3DD3FA345A1AEAEF0D7455274CCF3247EA3D37F2586113
                      Malicious:false
                      Preview:L..................F.... ......1S..f_.1S..p+...............................:..DG..Yr?.D..U..k0.&...&...........-....)..3...P.1S......t...CFSF..1......Nz...AppData...t.Y^...H.g.3..(.....gVA.G..k...@.......Ny..TDt.....Y....................f.(.A.p.p.D.a.t.a...B.V.1......Tft..Roaming.@.......Ny..Tgt.....Y........................R.o.a.m.i.n.g.....T.1......Tgt..ThotvT..>......Tft.Tgt..........................7R..T.h.o.t.v.T.....p.2.....LS. .PHONEA~1.EXE..T......Tgt.Tgt................t..........O..p.h.o.n.e.a.c.t.i.v.a.t.e...e.x.e.......f...............-.......e...........7..e.....C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe..'.....\.....\.....\.....\.....\.T.h.o.t.v.T.\.p.h.o.n.e.a.c.t.i.v.a.t.e...e.x.e.`.......X.......computer..!a..%.H.VZAj................-..!a..%.H.VZAj................-.E.......9...1SPS..mD..pH.H@..=x.....h....H......K*..@.A..7sFJ............
                      Process:C:\Windows\System32\cmd.exe
                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):1540096
                      Entropy (8bit):5.376397843442921
                      Encrypted:false
                      SSDEEP:12288:AabbKACcbDWwVedYHi4mrh+IyiPU0D88nTtgO9HvjA3RlkuRCYJRB7laUqdezDkW:7aXcfWwgSKrhncQYlez5nGa84djgol
                      MD5:FAB6B6A557FBE1C84AB38A331914817C
                      SHA1:21B8E6CA4B6826D05B9E630A884AB8C8E2EE6317
                      SHA-256:090BB796EC1FFD9B7C050F86BDAA8A1614985D8BEBE3965DB8F39A569603D24A
                      SHA-512:465A04D661CA6B454FA44FAF4143189F86B43D86060308409987B3162C30AE6DC9584AA2833A759DB9B71435FDF8AC583AE9034FF98204BEB6D91452D18D9BA3
                      Malicious:false
                      Preview:MZ......................@.......................................x..j<.9<.9<.9?.t9I.9..8k.9S.49..9.ou9w.9..8M.9...82.9.7.9..91.I9u.9".:9..9'l590.9".=9/.9...8G.9R..8..9..8P.9S.39v.9?.u9i.9.7.9}.9..8..9".;9i.9..I9S.9Z.e9x.9?.w9..9A.v9,.9Rich<.9....................................................................................................................PE..d.:..\.T.........." .....f.....................@....................................).&...`.......................................... ..dQ..h...d................................(...................................................................................text....w.......................... ..`.rdata.............................. ..`.crt1............................... ..`.rdata..............................@..@.data............ ..................@....pdata..F...........................@..@qwTG................................@....rsrc...............................@..@.reloc...(.......0..........
                      Process:C:\Windows\System32\cmd.exe
                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):107504
                      Entropy (8bit):6.536585324272613
                      Encrypted:false
                      SSDEEP:1536:UhKYFAVrKO6PcIgpCaYov3ZKCZwaG70Ur/61cVtat/gLaoU0Sj09P0e:dmlPcNphvo0mtV1La8Lse
                      MD5:09D1974A03068D4311F1CE94B765E817
                      SHA1:7DD683571E4DCCAF181A5271BBCF15B3BC9D0155
                      SHA-256:5D4F713CFC98E7148B67D063193D93BFE29F8329705A03690590633FADE32EE5
                      SHA-512:07FD0700C8368485BEC91847C4B9721B059FEDB678C603A57FBD5DABCF110C80B0BD1D114384D4334F0412F3F4FD93C839A1B17F3A9F02C25CD59216692A8AC9
                      Malicious:true
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........i.......................................O.....................Rich............................PE..d.....^...........".................`..........@....................................;;............... .......................................0.......p.. J...`.......~...%..........`"..T.......................(....................................................text............................... ..`.imrsiv..................................rdata...I.......J..................@..@.data...8....P.......$..............@....pdata.......`.......&..............@..@.rsrc... J...p...L...0..............@..@.reloc...............|..............@..B................................................................................................................................................................................................................
                      Process:C:\Windows\System32\cmd.exe
                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):577024
                      Entropy (8bit):7.365924302927238
                      Encrypted:false
                      SSDEEP:12288:KEpKNOQ/1mgFgnHF+2ryqfut4iob3vBzx4PQpIQbwhsi:lpKbbFgl+2Oqfuqiob3JUFs
                      MD5:809E11DECADAEBE2454EFEDD620C4769
                      SHA1:A121B9FC2010247C65CE8975FE4D88F5E9AC953E
                      SHA-256:8906D8D8BCD7C8302A3E56EA2EBD0357748ACC9D3FDA91925609C742384B9CC2
                      SHA-512:F78F46437C011C102A9BCEC2A8565EDC75500C9448AC17457FF44D3C8DB1980F772C0D1546F1DEE0F8A6F2C7273A5A915860B768DE9BB24EBEFE2907CE18B0DF
                      Malicious:false
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......%.].a.3.a.3.a.3.h.u.3...6.`.3...7.t.3...2.n.3.a.2...3...=.r.3...0.e.3....`.3...1.`.3.Richa.3.........PE..d...b.............".................0..........@................CS P................3................ .......................................Y..h................J......................T............................S...............z..`............................text............................... ..`?g_Encry.-.......................... ..`.rdata..._.......`..................@..@.data........p.......V..............@....pdata...J.......L...d..............@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................
                      Process:C:\Windows\System32\cmd.exe
                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):1257472
                      Entropy (8bit):4.869587549920812
                      Encrypted:false
                      SSDEEP:12288:habbKACcbDWwVedYHi4mrh+IyiPU0D88nTtgO9HvjA3RlkuRCYJRB7laUqdezDk5:saXcfWwgSKrhncQYlez5nGa84djgol
                      MD5:C770563E0C71B17EF44FF21185C63AD3
                      SHA1:6AA9A5A97217143DA9F7E7F6FAB2CE71E127D6F2
                      SHA-256:45EE8F805EBB6C92B215B7C559BB778F5AC5AC7A913EBC028CF70EBE426EB1FD
                      SHA-512:CD52CD910CDF19245BE808AF2398D57A361E8D0EE7B57D5B5382CE56C1AB4E0B3D2D74877E50F1389E5069C85D60A3659A21991BF43BBD4049D1234129310127
                      Malicious:false
                      Preview:MZ......................@.......................................x..j<.9<.9<.9?.t9I.9..8k.9S.49..9.ou9w.9..8M.9...82.9.7.9..91.I9u.9".:9..9'l590.9".=9/.9...8G.9R..8..9..8P.9S.39v.9?.u9i.9.7.9}.9..8..9".;9i.9..I9S.9Z.e9x.9?.w9..9A.v9,.9Rich<.9....................................................................................................................PE..d.:..\.T.........." .....f.....................@.............................0......).&...`.......................................... ..y...h...d................................(...................................................................................text....w.......................... ..`.rdata.............................. ..`.crt1............................... ..`.rdata..............................@..@.data............ ..................@....pdata..F...........................@..@qwTG................................@....rsrc...............................@..@.reloc...(.......0..........
                      File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                      Entropy (8bit):4.887324738140095
                      TrID:
                      • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                      • Win64 Executable (generic) (12005/4) 10.17%
                      • Generic Win/DOS Executable (2004/3) 1.70%
                      • DOS Executable Generic (2002/1) 1.70%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                      File name:drytex.dll
                      File size:1253376
                      MD5:b85405fc1d3a4473826d7ebd31111a50
                      SHA1:4b62c6e56be21a0dc8f285a23ca62a055a768956
                      SHA256:26af00a279ce082c2bb1db2cb50d2d590623e3f20e6c260d77ca77bf72b51797
                      SHA512:1335ee999d69930805f41c2b177538ec21cfd7cf11af973caeb4e53bb9893708b4795b556d28bddd41982b360e4f428b17ec80feeb7beff40a095a3f9981cf0f
                      SSDEEP:12288:WabbKACcbDWwVedYHi4mrh+IyiPU0D88nTtgO9HvjA3RlkuRCYJRB7laUqdezDk5:ZaXcfWwgSKrhncQYlez5nGa84djgol
                      TLSH:0C45CF0D496F1AC8D6A550F26B3387F6296EF0940420DEBD36B67025ED8DE7D8CC291B
                      File Content Preview:MZ......................@.......................................x..j<..9<..9<..9?.t9I..9...8k..9S.49...9.ou9w..9...8M..9...82..9.7.9...91.I9u..9".:9...9'l590..9".=9/..9...8G..9R..8...9...8P..9S.39v..9?.u9i..9.7.9}..9...8...9".;9i..9..I9S..9Z.e9x..9?.w9...
                      Icon Hash:74f0e4ecccdce0e4
                      Entrypoint:0x14002a5b0
                      Entrypoint Section:.crt1
                      Digitally signed:false
                      Imagebase:0x140000000
                      Subsystem:windows cui
                      Image File Characteristics:EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
                      DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                      Time Stamp:0x54B45CFA [Mon Jan 12 23:47:06 2015 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:0
                      File Version Major:5
                      File Version Minor:0
                      Subsystem Version Major:5
                      Subsystem Version Minor:0
                      Import Hash:25c7ac00c91884fd2923a489ae9dfbca
                      Instruction
                      dec eax
                      mov dword ptr [00037CB9h], ecx
                      dec eax
                      mov dword ptr [00037CBAh], edx
                      dec eax
                      or dword ptr [00037CFBh], esi
                      dec eax
                      mov dword ptr [00037CFCh], edi
                      dec eax
                      mov dword ptr [00037CFDh], ebx
                      dec eax
                      mov dword ptr [00037CA6h], ebp
                      dec eax
                      mov dword ptr [00037CA7h], esp
                      dec esp
                      mov dword ptr [00037CA8h], eax
                      dec esp
                      mov dword ptr [00037CA9h], ecx
                      dec esp
                      mov dword ptr [00037CC2h], esp
                      dec esp
                      mov dword ptr [00037CB3h], ebp
                      dec esp
                      or dword ptr [00037CA4h], esi
                      dec esp
                      mov dword ptr [00037C95h], edi
                      dec eax
                      lea esi, dword ptr [FFFFD97Eh]
                      jmp esi
                      ud2
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x1310100x73a.ouhvqw
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x2ba680x64.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x9e0000xfc98.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xae0000x28bc.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x6100x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x2b0000x90.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x2779e0x28000False0.761749267578data7.8179817907IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      .rdata0x290000xfe00x1000False0.050537109375data0.497374256831IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      .crt10x2a0000x6fb0x1000False0.25634765625data2.77764805072IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      .rdata0x2b0000xcc00x1000False0.44921875data4.04304284558IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x2c0000x41e090x42000False0.577795780066data6.66561055311IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                      .pdata0x6e0000xb460x1000False0.0595703125data0.53656064431IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      qwTG0x6f0000x2e9a20x2f000False0.818348986037data7.87184991211IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                      .rsrc0x9e0000xfc980x10000False0.223709106445data4.08759024615IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0xae0000x28bc0x3000False0.105550130208data5.14379878517IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      .lqen0xb10000x451740x46000False0.0010498046875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .vqb0xf70000x14550x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .gjd0xf90000x128f0x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .wqhqlp0xfb0000x1f2a0x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .nulizw0xfd0000xbde0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .fgrum0xfe0000xbde0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .mjabqc0xff0000x12780x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .ghh0x1010000x1e660x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .vrqcr0x1030000x7060x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .siorvl0x1040000x11240x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .sqgym0x1060000xbde0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .kqhrq0x1070000x7360x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .rsntf0x1080000x8fe0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .iqt0x1090000x12780x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .kpwiuc0x10b0000x12780x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .yuzcn0x10d0000x5a70x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .jbsbuw0x10e0000xbde0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .mdjtj0x10f0000x23b0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .mbjeh0x1100000x23b0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .amb0x1110000x3ba0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .lac0x1120000x197d0x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .zro0x1140000x8fe0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .vtq0x1150000x8fe0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .kyhoy0x1160000x3ba0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .wvi0x1170000x197d0x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .alzw0x1190000x1af0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .vdsoxe0x11a0000xbde0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .pus0x11b0000x3890x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .oqnl0x11c0000x7360x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .ohjt0x11d0000x8fe0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .ofjxx0x11e0000x197d0x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .ifw0x1200000x8960x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .zktgse0x1210000x13e0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .pmd0x1220000x13e0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .kexxpw0x1230000x3ba0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .kiqzd0x1240000x13e0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .uslf0x1250000x1af0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .zkkgx0x1260000x2da0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .phhwk0x1270000x5430x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .klf0x1280000xb40x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .xme0x1290000x5430x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .fnxmzz0x12a0000x3fe0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .wpkbi0x12b0000x197d0x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .gzgei0x12d0000xb40x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .zep0x12e0000x8fe0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .viz0x12f0000x1f70x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .xqen0x1300000x23b0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .ouhvqw0x1310000x74a0x1000False0.2734375data3.18901859221IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountry
                      RT_STRING0x9ee400x14adataEnglishUnited States
                      RT_STRING0x9ef900x310dataEnglishUnited States
                      RT_STRING0x9f2a00x162dataEnglishUnited States
                      RT_STRING0x9f4080x286dataEnglishUnited States
                      RT_STRING0x9f6900x1ccAmigaOS bitmap fontEnglishUnited States
                      RT_STRING0x9f8600x272dataEnglishUnited States
                      RT_STRING0x9fad80xeedataEnglishUnited States
                      RT_STRING0x9fbc80x144dataEnglishUnited States
                      RT_STRING0x9fd100xdadataEnglishUnited States
                      RT_STRING0x9fdf00x20edataEnglishUnited States
                      RT_STRING0xa00000x326dataEnglishUnited States
                      RT_STRING0xa03280x33adataEnglishUnited States
                      RT_STRING0xa06680x58cdataEnglishUnited States
                      RT_STRING0xa0bf80x2cadataEnglishUnited States
                      RT_STRING0xa0ec80x2cedataEnglishUnited States
                      RT_STRING0xa11980x3c6dataEnglishUnited States
                      RT_STRING0xa15600x41cdataEnglishUnited States
                      RT_STRING0xa19800x380dataEnglishUnited States
                      RT_STRING0xa1d000x408dataEnglishUnited States
                      RT_STRING0xa21080x4ccdataEnglishUnited States
                      RT_STRING0xa25d80x206dataEnglishUnited States
                      RT_STRING0xa27e00x50adataEnglishUnited States
                      RT_STRING0xa2cf00x168dataEnglishUnited States
                      RT_STRING0xa2e580x12adataEnglishUnited States
                      RT_STRING0xa2f880x36cdataEnglishUnited States
                      RT_STRING0xa32f80x2a8dataEnglishUnited States
                      RT_STRING0xa35a00x1dedataEnglishUnited States
                      RT_STRING0xa37800x3ecdataEnglishUnited States
                      RT_STRING0xa3b700x354dataEnglishUnited States
                      RT_STRING0xa3ec80x19cdataEnglishUnited States
                      RT_STRING0xa40680x27edataEnglishUnited States
                      RT_STRING0xa42e80x3d8dataEnglishUnited States
                      RT_STRING0xa46c00x396dataEnglishUnited States
                      RT_STRING0xa4a580x336dataEnglishUnited States
                      RT_STRING0xa4d900x242dataEnglishUnited States
                      RT_STRING0xa4fd80x1acdataEnglishUnited States
                      RT_STRING0xa51880x2f4dataEnglishUnited States
                      RT_STRING0xa54800x3ecdataEnglishUnited States
                      RT_STRING0xa58700x570dataEnglishUnited States
                      RT_STRING0xa5de00x3b2Hitachi SH big-endian COFF object file, not stripped, 9472 sections, symbol offset=0x4b004200, 83895552 symbols, optional header size 12544EnglishUnited States
                      RT_STRING0xa61980x3aadataEnglishUnited States
                      RT_STRING0xa65480x2c0dataEnglishUnited States
                      RT_STRING0xa68080x226dataEnglishUnited States
                      RT_STRING0xa6a300x248dataEnglishUnited States
                      RT_STRING0xa6c780x8f0dataEnglishUnited States
                      RT_STRING0xa75680x6aadataEnglishUnited States
                      RT_STRING0xa7c180x456dataEnglishUnited States
                      RT_STRING0xa80700x522dataEnglishUnited States
                      RT_STRING0xa85980x51cdataEnglishUnited States
                      RT_STRING0xa8ab80x492dataEnglishUnited States
                      RT_STRING0xa8f500x432dataEnglishUnited States
                      RT_STRING0xa93880x6ecdataEnglishUnited States
                      RT_STRING0xa9a780x214dataEnglishUnited States
                      RT_STRING0xa9c900x472AmigaOS bitmap fontEnglishUnited States
                      RT_STRING0xaa1080x3a2dataEnglishUnited States
                      RT_STRING0xaa4b00xb4dataEnglishUnited States
                      RT_STRING0xaa5680x466dataEnglishUnited States
                      RT_STRING0xaa9d00x4b2dataEnglishUnited States
                      RT_STRING0xaae880x312dataEnglishUnited States
                      RT_STRING0xab1a00x106dataEnglishUnited States
                      RT_STRING0xab2a80x24edataEnglishUnited States
                      RT_STRING0xab4f80x2b0dataEnglishUnited States
                      RT_STRING0xab7a80x392dataEnglishUnited States
                      RT_STRING0xabb400x34adataEnglishUnited States
                      RT_STRING0xabe900x404dataEnglishUnited States
                      RT_STRING0xac2980x3fcdataEnglishUnited States
                      RT_STRING0xac6980x27adataEnglishUnited States
                      RT_STRING0xac9180xa8dataEnglishUnited States
                      RT_STRING0xac9c00xdadataEnglishUnited States
                      RT_STRING0xacaa00x2b2dataEnglishUnited States
                      RT_STRING0xacd580x274dataEnglishUnited States
                      RT_STRING0xacfd00x37cdataEnglishUnited States
                      RT_STRING0xad3500x3fedataEnglishUnited States
                      RT_STRING0xad7500x2c0dataEnglishUnited States
                      RT_STRING0xada100x284dataEnglishUnited States
                      DLLImport
                      KERNEL32.dllGetBinaryTypeW, GetModuleFileNameW, GetExitCodeProcess, GetModuleHandleW, GetCurrentProcess, GetCurrentProcessId, GetUserDefaultUILanguage
                      USER32.dllSetProcessDefaultLayout, IsProcessDPIAware, ChildWindowFromPointEx, GetThreadDesktop
                      GDI32.dllGetCharWidthW, FlattenPath
                      ADVAPI32.dllInitiateSystemShutdownExW
                      NameOrdinalAddress
                      DllCanUnloadNow1110x14000ffd0
                      DllGetClassObject1150x140002d30
                      DwmAttachMilContent1160x1400112ac
                      DwmDefWindowProc1170x14000b39c
                      DwmDetachMilContent1180x140002198
                      DwmEnableBlurBehindWindow1190x1400179cc
                      DwmEnableComposition1020x140026b64
                      DwmEnableMMCSS1200x140011870
                      DwmExtendFrameIntoClientArea1210x14001bdf0
                      DwmFlush1220x14000bf54
                      DwmGetColorizationColor1230x140022534
                      DwmGetCompositionTimingInfo1290x14000afa4
                      DwmGetGraphicsStreamClient1300x14001aef4
                      DwmGetGraphicsStreamTransformHint1490x140004d40
                      DwmGetTransportAttributes1830x140013134
                      DwmGetUnmetTabRequirements1840x14000a0ac
                      DwmGetWindowAttribute1850x14001a968
                      DwmInvalidateIconicBitmaps1860x140023a0c
                      DwmIsCompositionEnabled1870x14000e64c
                      DwmModifyPreviousDxFrameDuration1880x14001caa4
                      DwmQueryThumbnailSourceSize1890x14000ac9c
                      DwmRegisterThumbnail1910x140007828
                      DwmRenderGesture1920x14001dec4
                      DwmSetDxFrameDuration1930x14001e530
                      DwmSetIconicLivePreviewBitmap1940x14000f418
                      DwmSetIconicThumbnail1950x14001433c
                      DwmSetPresentParameters1960x140024ffc
                      DwmSetWindowAttribute1970x1400247c8
                      DwmShowContact1980x14001e4ac
                      DwmTetherContact1990x1400062e0
                      DwmTetherTextContact1560x140004a9c
                      DwmTransitionOwnedWindow2000x140010880
                      DwmUnregisterThumbnail2010x1400236f0
                      DwmUpdateThumbnailProperties2020x14001db58
                      DwmpAllocateSecurityDescriptor1360x14001bbd4
                      DwmpDxBindSwapChain1250x140027080
                      DwmpDxGetWindowSharedSurface1000x14001ace8
                      DwmpDxUnbindSwapChain1260x14000ab48
                      DwmpDxUpdateWindowRedirectionBltSurface1330x140001bec
                      DwmpDxUpdateWindowSharedSurface1010x14001ad00
                      DwmpDxgiIsThreadDesktopComposited1280x140019038
                      DwmpEnableDDASupport1430x140014360
                      DwmpFreeSecurityDescriptor1370x140014694
                      DwmpGetColorizationParameters1270x14001ef3c
                      DwmpRenderFlick1350x140008100
                      DwmpSetColorizationParameters1310x140017c40
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      No network behavior found

                      Code Manipulations

                      Function NameHook TypeActive in Processes
                      ZwSetEventINLINEexplorer.exe
                      RtlAllocateMemoryBlockLookasideINLINEexplorer.exe
                      RtlAllocateMemoryZoneINLINEexplorer.exe
                      NtSetEventINLINEexplorer.exe
                      Function NameHook TypeNew Data
                      ZwSetEventINLINE0xE9 0x9B 0xBB 0xB5 0x5E 0xEF
                      RtlAllocateMemoryBlockLookasideINLINE0x48 0x88 0x89 0x9E 0xE0 0x03
                      RtlAllocateMemoryZoneINLINE0x8D 0xDA 0xAC 0xC2 0x24 0x49
                      NtSetEventINLINE0xE9 0x9B 0xBB 0xB5 0x5E 0xEF

                      Click to jump to process

                      Target ID:0
                      Start time:07:34:08
                      Start date:18/04/2022
                      Path:C:\Windows\System32\loaddll64.exe
                      Wow64 process (32bit):false
                      Commandline:loaddll64.exe "C:\Users\user\Desktop\drytex.dll"
                      Imagebase:0x7ff6fc2f0000
                      File size:140288 bytes
                      MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000000.00000002.269681895.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                      Reputation:moderate

                      Target ID:1
                      Start time:07:34:08
                      Start date:18/04/2022
                      Path:C:\Windows\System32\cmd.exe
                      Wow64 process (32bit):false
                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\drytex.dll",#1
                      Imagebase:0x7ff62f630000
                      File size:273920 bytes
                      MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:2
                      Start time:07:34:09
                      Start date:18/04/2022
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:regsvr32.exe /s C:\Users\user\Desktop\drytex.dll
                      Imagebase:0x7ff750960000
                      File size:24064 bytes
                      MD5 hash:D78B75FC68247E8A63ACBA846182740E
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000002.00000002.337765155.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                      Reputation:high

                      Target ID:3
                      Start time:07:34:09
                      Start date:18/04/2022
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe "C:\Users\user\Desktop\drytex.dll",#1
                      Imagebase:0x7ff703c90000
                      File size:69632 bytes
                      MD5 hash:73C519F050C20580F8A62C849D49215A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000003.00000002.248725971.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                      Reputation:high

                      Target ID:4
                      Start time:07:34:09
                      Start date:18/04/2022
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe C:\Users\user\Desktop\drytex.dll,DllCanUnloadNow
                      Imagebase:0x7ff703c90000
                      File size:69632 bytes
                      MD5 hash:73C519F050C20580F8A62C849D49215A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000004.00000002.248898952.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                      Reputation:high

                      Target ID:5
                      Start time:07:34:11
                      Start date:18/04/2022
                      Path:C:\Windows\explorer.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\Explorer.EXE
                      Imagebase:0x7ff6b8cf0000
                      File size:3933184 bytes
                      MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:6
                      Start time:07:34:13
                      Start date:18/04/2022
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe C:\Users\user\Desktop\drytex.dll,DllGetClassObject
                      Imagebase:0x7ff703c90000
                      File size:69632 bytes
                      MD5 hash:73C519F050C20580F8A62C849D49215A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000006.00000002.255992853.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                      Reputation:high

                      Target ID:7
                      Start time:07:34:16
                      Start date:18/04/2022
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe C:\Users\user\Desktop\drytex.dll,DwmAttachMilContent
                      Imagebase:0x7ff703c90000
                      File size:69632 bytes
                      MD5 hash:73C519F050C20580F8A62C849D49215A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000007.00000002.263687093.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                      Reputation:high

                      Target ID:18
                      Start time:07:35:04
                      Start date:18/04/2022
                      Path:C:\Windows\System32\phoneactivate.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\phoneactivate.exe
                      Imagebase:0x7ff76d130000
                      File size:107504 bytes
                      MD5 hash:09D1974A03068D4311F1CE94B765E817
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:moderate

                      Target ID:19
                      Start time:07:35:10
                      Start date:18/04/2022
                      Path:C:\Windows\System32\cmd.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\V8Ka.cmd
                      Imagebase:0x7ff62f630000
                      File size:273920 bytes
                      MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:20
                      Start time:07:35:11
                      Start date:18/04/2022
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7c9170000
                      File size:625664 bytes
                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language

                      Target ID:23
                      Start time:07:35:22
                      Start date:18/04/2022
                      Path:C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe"
                      Imagebase:0x7ff744380000
                      File size:107504 bytes
                      MD5 hash:09D1974A03068D4311F1CE94B765E817
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000017.00000002.454233782.0000000140001000.00000020.00000001.01000000.0000000A.sdmp, Author: Joe Security

                      Target ID:24
                      Start time:07:35:23
                      Start date:18/04/2022
                      Path:C:\Windows\System32\pwcreator.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\pwcreator.exe
                      Imagebase:0x7ff6ef240000
                      File size:800768 bytes
                      MD5 hash:BF33FA218E0B4F6AEC77616BE0F5DD9D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language

                      Target ID:25
                      Start time:07:35:24
                      Start date:18/04/2022
                      Path:C:\Windows\System32\SppExtComObj.Exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\SppExtComObj.Exe
                      Imagebase:0x7ff6ca820000
                      File size:577024 bytes
                      MD5 hash:809E11DECADAEBE2454EFEDD620C4769
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language

                      Target ID:30
                      Start time:07:35:29
                      Start date:18/04/2022
                      Path:C:\Windows\System32\cmd.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\33sSd.cmd
                      Imagebase:0x7ff62f630000
                      File size:273920 bytes
                      MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      Target ID:34
                      Start time:07:35:29
                      Start date:18/04/2022
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7c9170000
                      File size:625664 bytes
                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      Target ID:36
                      Start time:07:35:30
                      Start date:18/04/2022
                      Path:C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe"
                      Imagebase:0x7ff744380000
                      File size:107504 bytes
                      MD5 hash:09D1974A03068D4311F1CE94B765E817
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000024.00000002.425949324.0000000140001000.00000020.00000001.01000000.0000000A.sdmp, Author: Joe Security

                      Target ID:38
                      Start time:07:35:33
                      Start date:18/04/2022
                      Path:C:\Windows\System32\dllhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E}
                      Imagebase:0x7ff7f1fd0000
                      File size:20888 bytes
                      MD5 hash:2528137C6745C4EADD87817A1909677E
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      Target ID:42
                      Start time:07:35:38
                      Start date:18/04/2022
                      Path:C:\Windows\System32\schtasks.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Windows\System32\schtasks.exe" /Create /F /TN "Uttpj" /TR C:\Windows\system32\xs2t3d\SppExtComObj.Exe /SC minute /MO 60 /RL highest
                      Imagebase:0x7ff77eda0000
                      File size:226816 bytes
                      MD5 hash:838D346D1D28F00783B7A6C6BD03A0DA
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      Target ID:43
                      Start time:07:35:38
                      Start date:18/04/2022
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7c9170000
                      File size:625664 bytes
                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      Target ID:44
                      Start time:07:35:39
                      Start date:18/04/2022
                      Path:C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Users\user\AppData\Roaming\ThotvT\phoneactivate.exe"
                      Imagebase:0x7ff744380000
                      File size:107504 bytes
                      MD5 hash:09D1974A03068D4311F1CE94B765E817
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 0000002C.00000002.442591492.0000000140001000.00000020.00000001.01000000.0000000A.sdmp, Author: Joe Security

                      No disassembly