Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll
renamed because original name is a hash value
Original sample name:SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.exe
Analysis ID:1377997
MD5:283d9c455484f4da798129bbaf90c08e
SHA1:cc55e2a017281e57a3dfa61712cba0c6fcef33ae
SHA256:c071c27f628642437d24ef678ccfa72fe5b59972ade357851a16b58b68725c78
Tags:exe
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Creates a process in suspended mode (likely to inject code)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • loaddll64.exe (PID: 5608 cmdline: loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 5712 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6804 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 4220 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllVirustotal: Detection: 11%Perma Link
Source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: D:\Projects\CppProjects\BetterRenderDragon\Build\BetterRenderDragon.pdb99 source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll
Source: Binary string: D:\Projects\CppProjects\BetterRenderDragon\Build\BetterRenderDragon.pdb source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll
Source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllString found in binary or memory: https://github.com/ddf8196/BetterRenderDragon
Source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllString found in binary or memory: https://github.com/ddf8196/BetterRenderDragonBetterRenderDragon
Source: classification engineClassification label: mal48.winDLL@6/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5712:120:WilError_03
Source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll",#1
Source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllVirustotal: Detection: 11%
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll",#1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll",#1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll",#1Jump to behavior
Source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\Projects\CppProjects\BetterRenderDragon\Build\BetterRenderDragon.pdb99 source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll
Source: Binary string: D:\Projects\CppProjects\BetterRenderDragon\Build\BetterRenderDragon.pdb source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll
Source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllStatic PE information: section name: .detourc
Source: SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllStatic PE information: section name: .detourd
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\loaddll64.exe TID: 5456Thread sleep time: -120000s >= -30000sJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll",#1Jump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
Valid AccountsWindows Management InstrumentationPath Interception11
Process Injection
1
Rundll32
OS Credential Dumping11
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
Virtualization/Sandbox Evasion
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataSIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
Domain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyData Encrypted for ImpactDNS ServerEmail Addresses
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1377997 Sample: SecuriteInfo.com.Trojan.Win... Startdate: 20/01/2024 Architecture: WINDOWS Score: 48 15 Multi AV Scanner detection for submitted file 2->15 7 loaddll64.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 conhost.exe 7->11         started        process5 13 rundll32.exe 9->13         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll11%ReversingLabs
SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll12%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://github.com/ddf8196/BetterRenderDragonSecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllfalse
    high
    https://github.com/ddf8196/BetterRenderDragonBetterRenderDragonSecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dllfalse
      high
      No contacted IP infos
      Joe Sandbox version:38.0.0 Ammolite
      Analysis ID:1377997
      Start date and time:2024-01-20 16:27:41 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 3m 59s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Run name:Run with higher sleep bypass
      Number of analysed new started processes analysed:7
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll
      renamed because original name is a hash value
      Original Sample Name:SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.exe
      Detection:MAL
      Classification:mal48.winDLL@6/0@0/0
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .dll
      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
      • Stop behavior analysis, all processes terminated
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      No simulations
      No context
      No context
      No context
      No context
      No context
      No created / dropped files found
      File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
      Entropy (8bit):6.506776934978276
      TrID:
      • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
      • Win64 Executable (generic) (12005/4) 10.17%
      • Generic Win/DOS Executable (2004/3) 1.70%
      • DOS Executable Generic (2002/1) 1.70%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
      File name:SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll
      File size:504'320 bytes
      MD5:283d9c455484f4da798129bbaf90c08e
      SHA1:cc55e2a017281e57a3dfa61712cba0c6fcef33ae
      SHA256:c071c27f628642437d24ef678ccfa72fe5b59972ade357851a16b58b68725c78
      SHA512:40b9da72f8c2a8486822d33c69fd8c178b38e75c1ee68b42c3f1a9a1b072c63476f96b50204b7bf0be320216eb57b55459ecd4edfdbbb91341341b6cdce978e7
      SSDEEP:12288:EHbJ9gB/fN1YNMmvQGvyLsbbkCnODa8xa:4gB/fYhQJs0CnOu8Q
      TLSH:6CB48D86B5A440F9D4B7903C569BAB07F67634490310D7CB33E8A9382FA77E46E7A350
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............O...O...O..JO...O...N...O...N...O...N...O...N...O...N...O...N...O...O0..O.".N...O."&O...O.".N...ORich...O...............
      Icon Hash:7ae282899bbab082
      Entrypoint:0x18005867c
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x180000000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
      Time Stamp:0x65A01106 [Thu Jan 11 16:02:14 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:0
      File Version Major:6
      File Version Minor:0
      Subsystem Version Major:6
      Subsystem Version Minor:0
      Import Hash:d2b9cb530f587f7d88b38c1e87589631
      Instruction
      dec eax
      mov dword ptr [esp+08h], ebx
      dec eax
      mov dword ptr [esp+10h], esi
      push edi
      dec eax
      sub esp, 20h
      dec ecx
      mov edi, eax
      mov ebx, edx
      dec eax
      mov esi, ecx
      cmp edx, 01h
      jne 00007F5214D2EC77h
      call 00007F5214D2F064h
      dec esp
      mov eax, edi
      mov edx, ebx
      dec eax
      mov ecx, esi
      dec eax
      mov ebx, dword ptr [esp+30h]
      dec eax
      mov esi, dword ptr [esp+38h]
      dec eax
      add esp, 20h
      pop edi
      jmp 00007F5214D2EB04h
      int3
      int3
      int3
      dec eax
      sub esp, 28h
      dec ebp
      mov eax, dword ptr [ecx+38h]
      dec eax
      mov ecx, edx
      dec ecx
      mov edx, ecx
      call 00007F5214D2EC82h
      mov eax, 00000001h
      dec eax
      add esp, 28h
      ret
      int3
      int3
      int3
      inc eax
      push ebx
      inc ebp
      mov ebx, dword ptr [eax]
      dec eax
      mov ebx, edx
      inc ecx
      and ebx, FFFFFFF8h
      dec esp
      mov ecx, ecx
      inc ecx
      test byte ptr [eax], 00000004h
      dec esp
      mov edx, ecx
      je 00007F5214D2EC85h
      inc ecx
      mov eax, dword ptr [eax+08h]
      dec ebp
      arpl word ptr [eax+04h], dx
      neg eax
      dec esp
      add edx, ecx
      dec eax
      arpl ax, cx
      dec esp
      and edx, ecx
      dec ecx
      arpl bx, ax
      dec edx
      mov edx, dword ptr [eax+edx]
      dec eax
      mov eax, dword ptr [ebx+10h]
      mov ecx, dword ptr [eax+08h]
      dec eax
      mov eax, dword ptr [ebx+08h]
      test byte ptr [ecx+eax+03h], 0000000Fh
      je 00007F5214D2EC7Dh
      movzx eax, byte ptr [ecx+eax+03h]
      and eax, FFFFFFF0h
      dec esp
      add ecx, eax
      dec esp
      xor ecx, edx
      dec ecx
      mov ecx, ecx
      pop ebx
      jmp 00007F5214D2E0BEh
      int3
      dec eax
      mov dword ptr [esp+10h], ebx
      dec eax
      mov dword ptr [esp+18h], esi
      push edi
      Programming Language:
      • [IMP] VS2008 SP1 build 30729
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x6f7580x17c.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x7f0000xf8.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x760000x42e4.pdata
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x800000x7fc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x657b00x70.rdata
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x658800x28.rdata
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x656700x140.rdata
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x5b0000x650.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x59f8b0x5a000False0.5234483506944444data6.442755894983273IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x5b0000x1640a0x16600False0.46297791550279327data5.919007052450304IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x720000x3ce00x3600False0.09483506944444445data5.051328710511333IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .pdata0x760000x42e40x4400False0.4649011948529412data5.766772325875717IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .detourc0x7b0000x21f00x2200False0.046875data2.2861063689710943IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .detourd0x7e0000x180x200False0.037109375data0.11611507530476972IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x7f0000xf80x200False0.3359375data2.5312981004807127IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x800000x7fc0x800False0.5068359375data5.3526877041417125IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_MANIFEST0x7f0600x91XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.8689655172413793
      DLLImport
      KERNEL32.dllGlobalAlloc, GlobalFree, GlobalLock, WideCharToMultiByte, GlobalUnlock, VirtualProtect, InitializeCriticalSectionEx, GetLastError, GetCurrentThread, DeleteCriticalSection, GetModuleFileNameA, MultiByteToWideChar, RaiseException, QueryPerformanceCounter, GetCurrentProcess, K32GetModuleInformation, IsDebuggerPresent, IsProcessorFeaturePresent, TerminateProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, SleepConditionVariableSRW, GetProcAddress, CloseHandle, LoadLibraryA, CreateEventW, GetModuleHandleA, QueryPerformanceFrequency, WaitForSingleObject, WakeAllConditionVariable, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, SetLastError, VirtualQuery, VirtualFree, VirtualAlloc, FlushInstructionCache, SetThreadContext, GetThreadContext, ResumeThread, SuspendThread, GetCurrentThreadId, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeSListHead, OutputDebugStringW, LocalFree, FormatMessageA, GetLocaleInfoEx, CreateFileW, FindClose, FindFirstFileW, GetFileAttributesExW, AreFileApisANSI, GetFileInformationByHandleEx
      USER32.dllGetClientRect, SetClipboardData, GetClipboardData, EmptyClipboard, CloseClipboard, OpenClipboard
      D3DCOMPILER_47.dllD3DCompile
      IMM32.dllImmSetCandidateWindow, ImmSetCompositionWindow, ImmReleaseContext, ImmGetContext
      MSVCP140.dll?always_noconv@codecvt_base@std@@QEBA_NXZ, ??Bid@locale@std@@QEAA_KXZ, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?_Syserror_map@std@@YAPEBDH@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?_Xout_of_range@std@@YAXPEBD@Z, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ?_Xlength_error@std@@YAXPEBD@Z, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ??1_Lockit@std@@QEAA@XZ, ??0_Lockit@std@@QEAA@H@Z, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ?_Winerror_map@std@@YAHH@Z, ?_Xbad_function_call@std@@YAXXZ, ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
      api-ms-win-core-winrt-l1-1-0.dllRoInitialize, RoGetActivationFactory
      api-ms-win-core-winrt-string-l1-1-0.dllWindowsGetStringRawBuffer, WindowsCreateStringReference, WindowsDeleteString
      VCRUNTIME140_1.dll__CxxFrameHandler4
      VCRUNTIME140.dllmemchr, memcmp, __std_terminate, memmove, __std_type_info_destroy_list, _CxxThrowException, __current_exception_context, __current_exception, __C_specific_handler, memset, memcpy, __std_exception_copy, __std_exception_destroy, _purecall, strstr
      api-ms-win-crt-stdio-l1-1-0.dllftell, fclose, _get_stream_buffer_pointers, __acrt_iob_func, fsetpos, ungetc, setvbuf, fgetpos, _fseeki64, fgetc, fputc, fflush, __stdio_common_vfprintf, fwrite, __stdio_common_vsscanf, fread, __stdio_common_vsprintf, _wfopen, fseek
      api-ms-win-crt-utility-l1-1-0.dllqsort
      api-ms-win-crt-string-l1-1-0.dllstrncmp, strcmp
      api-ms-win-crt-heap-l1-1-0.dllfree, _callnewh, malloc
      api-ms-win-crt-convert-l1-1-0.dllwcstombs_s, strtoul, strtod, strtoll, strtoull
      api-ms-win-crt-runtime-l1-1-0.dll_errno, terminate, _seh_filter_dll, _configure_narrow_argv, _initterm_e, _initterm, _cexit, _crt_atexit, _execute_onexit_table, _register_onexit_function, _initialize_onexit_table, _initialize_narrow_environment, _invalid_parameter_noinfo_noreturn
      api-ms-win-crt-math-l1-1-0.dllacosf, sqrtf, ceilf, cosf, floorf, sinf, _dsign, _dclass
      api-ms-win-crt-filesystem-l1-1-0.dll_unlock_file, _lock_file
      api-ms-win-crt-locale-l1-1-0.dllsetlocale, localeconv, ___lc_codepage_func
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      No network behavior found

      Click to jump to process

      Click to jump to process

      Target ID:0
      Start time:16:28:26
      Start date:20/01/2024
      Path:C:\Windows\System32\loaddll64.exe
      Wow64 process (32bit):false
      Commandline:loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll"
      Imagebase:0x7ff6be130000
      File size:165'888 bytes
      MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:1
      Start time:16:28:26
      Start date:20/01/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:2
      Start time:16:28:26
      Start date:20/01/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll",#1
      Imagebase:0x7ff717520000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:16:28:27
      Start date:20/01/2024
      Path:C:\Windows\System32\rundll32.exe
      Wow64 process (32bit):false
      Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Generic.21737.11159.dll",#1
      Imagebase:0x7ff6c3bb0000
      File size:71'680 bytes
      MD5 hash:EF3179D498793BF4234F708D3BE28633
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      No disassembly