Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll

Overview

General Information

Sample name:rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll
(renamed file extension from com to dll)
Original sample name:rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.com
Analysis ID:1543717
MD5:c0aa0d26ea9c57aecb490ba6cd93fa8f
SHA1:dd2bd2a21665a4d5f5c8d9d46e1773c17f925130
SHA256:a78722c27a0a6b84c0e6c6f03b838514460af870833e2cf343538bcd17804fe5
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
AI detected suspicious sample
Machine Learning detection for sample
Creates a process in suspended mode (likely to inject code)
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6948 cmdline: loaddll32.exe "C:\Users\user\Desktop\rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 5812 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1480 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 3228 cmdline: rundll32.exe "C:\Users\user\Desktop\rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7128 cmdline: rundll32.exe C:\Users\user\Desktop\rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll,azsmqfepjdouodor MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 2788 cmdline: rundll32.exe "C:\Users\user\Desktop\rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll",azsmqfepjdouodor MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dllAvira: detected
Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.4% probability
Source: rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dllJoe Sandbox ML: detected
Source: rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: loaddll32.exe, 00000000.00000002.2077044741.000000006C6A2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: :j8.vbPkRNPe;FeJ^lR>\5$=I_,kCIKfOW
Source: loaddll32.exe, 00000000.00000002.2077044741.000000006C6A2000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.2048051005.000000006C412000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: eiUJ5%9VbTv0wKICMR^.VbP
Source: classification engineClassification label: mal56.winDLL@10/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5812:120:WilError_03
Source: rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll,azsmqfepjdouodor
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll,azsmqfepjdouodor
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll",azsmqfepjdouodor
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll,azsmqfepjdouodorJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll",azsmqfepjdouodorJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dllStatic file information: File size 21284864 > 1048576
Source: rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x143de00
Source: rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll",#1Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Rundll32
OS Credential Dumping1
System Information Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1543717 Sample: rnxijmmczrsxavguremdpeeqkyq... Startdate: 28/10/2024 Architecture: WINDOWS Score: 56 19 Antivirus / Scanner detection for submitted sample 2->19 21 Machine Learning detection for sample 2->21 23 AI detected suspicious sample 2->23 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 conhost.exe 7->11         started        13 rundll32.exe 7->13         started        15 rundll32.exe 7->15         started        process5 17 rundll32.exe 9->17         started       
SourceDetectionScannerLabelLink
rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll100%AviraWORM/Lodbak.Gen
rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1543717
Start date and time:2024-10-28 09:53:51 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 48s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll
(renamed file extension from com to dll)
Original Sample Name:rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.com
Detection:MAL
Classification:mal56.winDLL@10/0@0/0
Cookbook Comments:
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Entropy (8bit):5.8074300356781965
TrID:
  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
  • Generic Win/DOS Executable (2004/3) 0.20%
  • DOS Executable Generic (2002/1) 0.20%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll
File size:21'284'864 bytes
MD5:c0aa0d26ea9c57aecb490ba6cd93fa8f
SHA1:dd2bd2a21665a4d5f5c8d9d46e1773c17f925130
SHA256:a78722c27a0a6b84c0e6c6f03b838514460af870833e2cf343538bcd17804fe5
SHA512:cc2bbba63c981aded1d267ae2fb83df149e50c4e33c85013adff5900c85ac6b4a0a9ab435246c5081644b133a689ef9ac97f7a32a9be9d2cabb047cf9d9e5404
SSDEEP:196608:YkRpm3o2Y2hE2kpQ1jif19s8NVyVQaD51eAtH9LeY1ul0tmyD/YGZHuspPy5HXHb:bhlX2icuf1uiVGDTyYbv/YSOZBKX4OI
TLSH:64279A4562BF60B3FB71FB6B5AF7A847CB5E72A6F50BAA9F1110C28C54D45008C4B839
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ A-.A/~.A/~.A/~.7.~.A/~.7.~.A/~.7.~.A/~.9.~.A/~.A.~.A/~...~.A/~.7.~.A/~.7.~.A/~.7.~.A/~.7.~.A/~Rich.A/~................PE..L..
Icon Hash:92aaa2aaa2aa6222
Entrypoint:0x100055fe
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x10000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x55749F20 [Sun Jun 7 19:44:32 2015 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:73b6fd9cb7ce4fe7cff2ad5991ca0b27
Instruction
mov edi, edi
push ebp
mov ebp, esp
cmp dword ptr [ebp+0Ch], 01h
jne 00007FD1F46BB417h
call 00007FD1F46BCBD0h
push dword ptr [ebp+08h]
mov ecx, dword ptr [ebp+10h]
mov edx, dword ptr [ebp+0Ch]
call 00007FD1F46BB301h
pop ecx
pop ebp
retn 000Ch
mov edi, edi
push ebp
mov ebp, esp
sub esp, 00000328h
mov dword ptr [1000DCF0h], eax
mov dword ptr [1000DCECh], ecx
mov dword ptr [1000DCE8h], edx
mov dword ptr [1000DCE4h], ebx
mov dword ptr [1000DCE0h], esi
mov dword ptr [1000DCDCh], edi
mov word ptr [1000DD08h], ss
mov word ptr [1000DCFCh], cs
mov word ptr [1000DCD8h], ds
mov word ptr [1000DCD4h], es
mov word ptr [1000DCD0h], fs
mov word ptr [1000DCCCh], gs
pushfd
pop dword ptr [1000DD00h]
mov eax, dword ptr [ebp+00h]
mov dword ptr [1000DCF4h], eax
mov eax, dword ptr [ebp+04h]
mov dword ptr [1000DCF8h], eax
lea eax, dword ptr [ebp+08h]
mov dword ptr [1000DD04h], eax
mov eax, dword ptr [ebp-00000320h]
mov dword ptr [1000DC40h], 00010001h
mov eax, dword ptr [1000DCF8h]
mov dword ptr [1000DBF4h], eax
mov dword ptr [1000DBE8h], C0000409h
mov dword ptr [1000DBECh], 00000001h
Programming Language:
  • [C++] VS2010 build 30319
  • [ASM] VS2010 build 30319
  • [ C ] VS2010 build 30319
  • [IMP] VS2008 SP1 build 30729
  • [ASM] VS2010 SP1 build 40219
  • [EXP] VS2010 build 30319
  • [RES] VS2010 build 30319
  • [LNK] VS2010 build 30319
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0xc8900x55.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0xc3240x28.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xf0000x6e8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000xfe4.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0xa0000xf0.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x8d060x8e00c38bdb11aacdd6ce4855538603e505b5False0.595703125data6.367689948864467IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0xa0000x28e50x2a009a41f3796f5b9d70562fca33ac02dc05False0.33603050595238093data4.864727491085218IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0xd0000x1adc0xc00d42c5a51f17a7f428151ef418e61ca15False0.23893229166666666data2.6830421390528616IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0xf0000x6e80x800501dcb7c4f3208ebbce14b8d57204701False0.216796875data2.673963438473937IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x100000x18700x1a00f14f0bab05b2949e1da807e27863c7dcFalse0.5208834134615384data4.988463136766936IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
.rsrc0x120000x143dc200x143de00a960da7ce64b253e35929860f03da820unknownunknownunknownunknownIMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_CURSOR0xf1600x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.39285714285714285
RT_ICON0xf2b00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishUnited States0.3581081081081081
RT_ICON0xf3d80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512, 16 important colorsEnglishUnited States0.2056451612903226
RT_GROUP_CURSOR0xf2980x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
RT_GROUP_ICON0xf6c00x22dataEnglishUnited States1.0294117647058822
DLLImport
KERNEL32.dllHeapCreate, HeapAlloc, lstrlenA, HeapFree, Sleep, LoadLibraryA, GetProcAddress, GetModuleFileNameA, VirtualAlloc, CloseHandle, CreateThread, GetCurrentThreadId, GetCommandLineA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RaiseException, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, InterlockedIncrement, GetModuleHandleW, SetLastError, GetLastError, InterlockedDecrement, ExitProcess, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, GetStartupInfoW, DeleteCriticalSection, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, HeapDestroy, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, HeapSize, WriteFile, GetModuleFileNameW, LeaveCriticalSection, EnterCriticalSection, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, HeapReAlloc, LoadLibraryW, RtlUnwind, LCMapStringW, MultiByteToWideChar, GetStringTypeW, IsProcessorFeaturePresent
NameOrdinalAddress
azsmqfepjdouodor10x10002600
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:04:54:42
Start date:28/10/2024
Path:C:\Windows\System32\loaddll32.exe
Wow64 process (32bit):true
Commandline:loaddll32.exe "C:\Users\user\Desktop\rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll"
Imagebase:0x790000
File size:126'464 bytes
MD5 hash:51E6071F9CBA48E79F10C84515AAE618
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:1
Start time:04:54:42
Start date:28/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6d64d0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:2
Start time:04:54:42
Start date:28/10/2024
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll",#1
Imagebase:0x790000
File size:236'544 bytes
MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:3
Start time:04:54:42
Start date:28/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll,azsmqfepjdouodor
Imagebase:0xc30000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:4
Start time:04:54:42
Start date:28/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll",#1
Imagebase:0xc30000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:6
Start time:04:54:45
Start date:28/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\rnxijmmczrsxavguremdpeeqkyqdtlrasgollujkwkpc.dll",azsmqfepjdouodor
Imagebase:0xc30000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

No disassembly