Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll

Overview

General Information

Sample name:SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll
(renamed file extension from exe to dll)
Original sample name:SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.exe
Analysis ID:1532737
MD5:15c9072909a72490eb1092bcc7c037e7
SHA1:da41f3fd32d982dfcad32b818baaf41eb7003330
SHA256:ef6f600e68f76e9526edb785f37d9f7d53edc717830ec40ff8cc2a8e84319b49
Tags:exe
Infos:

Detection

Score:22
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

AI detected suspicious sample
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7712 cmdline: loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 7720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7772 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 7812 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 87.4% probability
Source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: C:\Program Files\Epic Games\GTAV\d3d10.pdb11 source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll
Source: Binary string: C:\Program Files\Epic Games\GTAV\d3d10.pdb source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll
Source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllString found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFL
Source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllString found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLCopyright
Source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllString found in binary or memory: http://www.google.com/fontshttp://www.hubertfischer.comThis
Source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllString found in binary or memory: https://fontawesome.com
Source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllString found in binary or memory: https://fontawesome.comhttps://fontawesome.comFont
Source: classification engineClassification label: sus22.winDLL@6/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7720:120:WilError_03
Source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll",#1
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll",#1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll",#1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: d3dcompiler_43.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllStatic file information: File size 1104384 > 1048576
Source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Program Files\Epic Games\GTAV\d3d10.pdb11 source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll
Source: Binary string: C:\Program Files\Epic Games\GTAV\d3d10.pdb source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll
Source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll",#1Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Rundll32
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1532737 Sample: SecuriteInfo.com.PUA.RiskWa... Startdate: 13/10/2024 Architecture: WINDOWS Score: 22 15 AI detected suspicious sample 2->15 7 loaddll64.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 conhost.exe 7->11         started        process5 13 rundll32.exe 9->13         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll11%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://fontawesome.com0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://fontawesome.comSecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllfalse
  • URL Reputation: safe
unknown
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLSecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllfalse
    unknown
    http://www.google.com/fontshttp://www.hubertfischer.comThisSecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllfalse
      unknown
      https://fontawesome.comhttps://fontawesome.comFontSecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllfalse
        unknown
        http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLCopyrightSecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dllfalse
          unknown
          No contacted IP infos
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1532737
          Start date and time:2024-10-13 20:49:18 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 2m 1s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:5
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll
          (renamed file extension from exe to dll)
          Original Sample Name:SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.exe
          Detection:SUS
          Classification:sus22.winDLL@6/0@0/0
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Stop behavior analysis, all processes terminated
          • Exclude process from analysis (whitelisted): dllhost.exe
          • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, time.windows.com
          • Not all processes where analyzed, report is missing behavior information
          • VT rate limit hit for: SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll
          No simulations
          No context
          No context
          No context
          No context
          No context
          No created / dropped files found
          File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
          Entropy (8bit):6.792580062317296
          TrID:
          • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
          • Win64 Executable (generic) (12005/4) 10.17%
          • Generic Win/DOS Executable (2004/3) 1.70%
          • DOS Executable Generic (2002/1) 1.70%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
          File name:SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll
          File size:1'104'384 bytes
          MD5:15c9072909a72490eb1092bcc7c037e7
          SHA1:da41f3fd32d982dfcad32b818baaf41eb7003330
          SHA256:ef6f600e68f76e9526edb785f37d9f7d53edc717830ec40ff8cc2a8e84319b49
          SHA512:8bf968ec73956b0c63a00073fbebb6c96af456a245933f9c93cf39523bef593be4d864665507944f863cf3d8a724b3b6fd4df3d4b7c8951e53616cd63eb5f4d8
          SSDEEP:12288:iYiZWE1d+OXsNqK5sMnxFTSpkP2cUxCj2AqeMQmd6TnSEl1yt6zzng0Lq/6TnSEd:fiZWedTsNrfxFTSpkPJuGKFmRqoRan
          TLSH:C935C08EB3EE8BA6C057877CDEE1B62395F03D10266163C77B81542E5FB26C098E4716
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................<.....v.3.....................................w.........................P.............Rich...................
          Icon Hash:7ae282899bbab082
          Entrypoint:0x180051c90
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x180000000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
          Time Stamp:0x6384D64F [Mon Nov 28 15:39:59 2022 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:4f28e9d9ce05cb2af62079ae3e34c7ad
          Instruction
          dec eax
          mov dword ptr [esp+08h], ebx
          dec eax
          mov dword ptr [esp+10h], esi
          push edi
          dec eax
          sub esp, 20h
          dec ecx
          mov edi, eax
          mov ebx, edx
          dec eax
          mov esi, ecx
          cmp edx, 01h
          jne 00007F62E8B80A37h
          call 00007F62E8B80DA8h
          dec esp
          mov eax, edi
          mov edx, ebx
          dec eax
          mov ecx, esi
          dec eax
          mov ebx, dword ptr [esp+30h]
          dec eax
          mov esi, dword ptr [esp+38h]
          dec eax
          add esp, 20h
          pop edi
          jmp 00007F62E8B808C4h
          int3
          int3
          int3
          and dword ptr [000BB64Dh], 00000000h
          ret
          dec eax
          mov dword ptr [esp+08h], ebx
          push ebp
          dec eax
          lea ebp, dword ptr [esp-000004C0h]
          dec eax
          sub esp, 000005C0h
          mov ebx, ecx
          mov ecx, 00000017h
          call dword ptr [00001446h]
          test eax, eax
          je 00007F62E8B80A36h
          mov ecx, ebx
          int 29h
          mov ecx, 00000003h
          call 00007F62E8B809F9h
          xor edx, edx
          dec eax
          lea ecx, dword ptr [ebp-10h]
          inc ecx
          mov eax, 000004D0h
          call 00007F62E8B80EC6h
          dec eax
          lea ecx, dword ptr [ebp-10h]
          call dword ptr [00001449h]
          dec eax
          mov ebx, dword ptr [ebp+000000E8h]
          dec eax
          lea edx, dword ptr [ebp+000004D8h]
          dec eax
          mov ecx, ebx
          inc ebp
          xor eax, eax
          call dword ptr [00001427h]
          dec eax
          test eax, eax
          je 00007F62E8B80A6Eh
          dec eax
          and dword ptr [esp+38h], 00000000h
          dec eax
          lea ecx, dword ptr [ebp+000004E0h]
          dec eax
          mov edx, dword ptr [ebp+000004D8h]
          Programming Language:
          • [IMP] VS2008 SP1 build 30729
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x10939c0x154.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x1100000xf8.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x10e0000x1dc4.pdata
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1110000x378.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x1056600x70.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x1057000x28.rdata
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1055200x140.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x530000x728.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x51d5b0x51e004fe92c4f196ebad5e6351cb86f94e66eFalse0.5349475190839694data6.516227191518105IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x530000xb85c60xb8600740fe5ea92022280a4c9a448347623e6False0.548963188559322data6.547810039145649IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x10c0000x16e80xe001933138ccd354083d618a65e214d32e2False0.40848214285714285data4.863355621797907IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .pdata0x10e0000x1dc40x1e00a82eef863c1e479e483438f2850cff02False0.5134114583333333data5.6470424432597275IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .rsrc0x1100000xf80x200a284a44633c038deae3a3f41f4f0dc91False0.3359375data2.5119620156497993IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x1110000x3780x400714ffbd50af10f32466ac06566e45c6dFalse0.6162109375data4.954665140521014IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_MANIFEST0x1100600x91XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.8689655172413793
          DLLImport
          KERNEL32.dllWideCharToMultiByte, GlobalUnlock, LoadLibraryA, QueryPerformanceFrequency, QueryPerformanceCounter, VirtualFree, VirtualAlloc, GetSystemInfo, VirtualQuery, HeapCreate, VirtualProtect, HeapFree, GetCurrentProcess, Thread32Next, Thread32First, GetCurrentThreadId, SuspendThread, ResumeThread, CreateToolhelp32Snapshot, GetLastError, HeapReAlloc, CloseHandle, HeapAlloc, GetProcAddress, GlobalFree, GetCurrentProcessId, GetModuleHandleW, FlushInstructionCache, SetThreadContext, OpenThread, DisableThreadLibraryCalls, InitializeSListHead, GetSystemTimeAsFileTime, IsDebuggerPresent, IsProcessorFeaturePresent, TerminateProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, CreateEventW, WaitForSingleObjectEx, ResetEvent, SetEvent, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, LeaveCriticalSection, EnterCriticalSection, IsBadReadPtr, GetTickCount64, GlobalLock, GlobalAlloc, GetThreadContext, MultiByteToWideChar, Sleep, GetModuleHandleA
          USER32.dllLoadCursorA, ScreenToClient, GetCapture, ClientToScreen, IsChild, TrackMouseEvent, GetForegroundWindow, GetCursorPos, OpenClipboard, SetCapture, SetCursor, CloseClipboard, EmptyClipboard, GetClipboardData, SetClipboardData, DefWindowProcA, CreateWindowExA, GetWindowRect, GetSystemMetrics, CallWindowProcA, mouse_event, SetCursorPos, ReleaseCapture, GetClientRect
          SHELL32.dllSHGetSpecialFolderPathA
          MSVCP140.dll??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, _Query_perf_frequency, ??1_Lockit@std@@QEAA@XZ, ??0_Lockit@std@@QEAA@H@Z, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?_Xbad_alloc@std@@YAXXZ, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z, ?id@?$ctype@D@std@@2V0locale@2@A, ?_Xlength_error@std@@YAXPEBD@Z, _Thrd_sleep, _Query_perf_counter, _Xtime_get_ticks, ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ, ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ, ?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?gbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXH@Z, ?_Gndec@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ, ?pbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXH@Z, ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ, ?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?always_noconv@codecvt_base@std@@QEBA_NXZ, ??Bid@locale@std@@QEAA_KXZ, ?uncaught_exceptions@std@@YAHXZ, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
          IMM32.dllImmSetCompositionWindow, ImmGetContext, ImmReleaseContext
          D3DCOMPILER_43.dllD3DCompile
          VCRUNTIME140_1.dll__CxxFrameHandler4
          VCRUNTIME140.dllmemchr, __C_specific_handler, __std_type_info_destroy_list, __std_exception_destroy, __std_exception_copy, __std_terminate, strstr, _CxxThrowException, __current_exception, __current_exception_context, memmove, memcpy, memcmp, memset
          api-ms-win-crt-stdio-l1-1-0.dllfputc, fflush, __stdio_common_vsscanf, __stdio_common_vsprintf, _wfopen, fclose, fgetc, fwrite, fread, fgetpos, ftell, _get_stream_buffer_pointers, setvbuf, _fseeki64, fseek, fsetpos, ungetc
          api-ms-win-crt-heap-l1-1-0.dllfree, malloc, _callnewh, calloc
          api-ms-win-crt-filesystem-l1-1-0.dllremove, _lock_file, _unlock_file
          api-ms-win-crt-convert-l1-1-0.dllatof, strtoul
          api-ms-win-crt-runtime-l1-1-0.dllterminate, _initterm, _initterm_e, _invalid_parameter_noinfo_noreturn, _cexit, _crt_atexit, _wassert, _seh_filter_dll, _configure_narrow_argv, _execute_onexit_table, _register_onexit_function, _initialize_onexit_table, _initialize_narrow_environment
          api-ms-win-crt-string-l1-1-0.dllstrcmp, strncpy, strcpy_s
          api-ms-win-crt-utility-l1-1-0.dllqsort
          api-ms-win-crt-math-l1-1-0.dllacosf, atan2f, ceilf, fmodf, cosf, pow, powf, sinf, sqrtf
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          No network behavior found

          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:14:50:24
          Start date:13/10/2024
          Path:C:\Windows\System32\loaddll64.exe
          Wow64 process (32bit):false
          Commandline:loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll"
          Imagebase:0x7ff653660000
          File size:165'888 bytes
          MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:1
          Start time:14:50:24
          Start date:13/10/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff75da10000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:3
          Start time:14:50:24
          Start date:13/10/2024
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll",#1
          Imagebase:0x7ff684240000
          File size:289'792 bytes
          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:4
          Start time:14:50:24
          Start date:13/10/2024
          Path:C:\Windows\System32\rundll32.exe
          Wow64 process (32bit):false
          Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Hacktool.27928.4275.dll",#1
          Imagebase:0x7ff66bc50000
          File size:71'680 bytes
          MD5 hash:EF3179D498793BF4234F708D3BE28633
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          No disassembly