Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.FileRepPup.27878.13681.dll

Overview

General Information

Sample name:SecuriteInfo.com.FileRepPup.27878.13681.dll
(renamed file extension from exe to dll)
Original sample name:SecuriteInfo.com.FileRepPup.27878.13681.exe
Analysis ID:1532748
MD5:05fdda04525c97630c95e5095164cde3
SHA1:c77ee48196d6f0b59b92b2e8bd2d16b6a0a22884
SHA256:d80efa7ffc44b018e51f5528cf5b701e6c05c47108f2be98611f08591477b4ed
Tags:exe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Contains functionality for execution timing, often used to detect debuggers
Creates a process in suspended mode (likely to inject code)
Entry point lies outside standard sections
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 4908 cmdline: loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1156 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 4448 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 616 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll,Breakpad_SteamMiniDumpInit MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3124 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll,Breakpad_SteamSetAppID MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5628 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll,Breakpad_SteamSetSteamID MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.FileRepPup.27878.13681.dllReversingLabs: Detection: 36%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: loaddll64.exe, 00000000.00000002.1674763147.00007FF8E754C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_57ec9d83-3
Source: SecuriteInfo.com.FileRepPup.27878.13681.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: unknownDNS traffic detected: query: 18.31.95.13.in-addr.arpa replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 18.31.95.13.in-addr.arpa
Source: loaddll64.exe, 00000000.00000002.1674826458.00007FF8E75CE000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.1584474646.00007FF8E75CE000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1568058981.00007FF8E75CE000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.1614939315.00007FF8E75CE000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000002.1647536434.00007FF8E75CE000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.openssl.org/support/faq.html
Source: loaddll64.exe, 00000000.00000002.1674826458.00007FF8E75CE000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.1584474646.00007FF8E75CE000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1568058981.00007FF8E75CE000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.1614939315.00007FF8E75CE000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000002.1647536434.00007FF8E75CE000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.openssl.org/support/faq.html.
Source: loaddll64.exe, 00000000.00000002.1674763147.00007FF8E754C000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.1584411808.00007FF8E754C000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1568013379.00007FF8E754C000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.1614867632.00007FF8E754C000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000002.1647461495.00007FF8E754C000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: classification engineClassification label: mal56.evad.winDLL@12/0@1/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:828:120:WilError_03
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll,Breakpad_SteamMiniDumpInit
Source: SecuriteInfo.com.FileRepPup.27878.13681.dllReversingLabs: Detection: 36%
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll,Breakpad_SteamMiniDumpInit
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll,Breakpad_SteamSetAppID
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll,Breakpad_SteamSetSteamID
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll,Breakpad_SteamMiniDumpInitJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll,Breakpad_SteamSetAppIDJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll,Breakpad_SteamSetSteamIDJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.FileRepPup.27878.13681.dllStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.FileRepPup.27878.13681.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: SecuriteInfo.com.FileRepPup.27878.13681.dllStatic file information: File size 4791808 > 1048576
Source: SecuriteInfo.com.FileRepPup.27878.13681.dllStatic PE information: Raw size of .of2 is bigger than: 0x100000 < 0x490a00
Source: SecuriteInfo.com.FileRepPup.27878.13681.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: initial sampleStatic PE information: section where entry point is pointing to: .of2
Source: SecuriteInfo.com.FileRepPup.27878.13681.dllStatic PE information: section name: _RDATA
Source: SecuriteInfo.com.FileRepPup.27878.13681.dllStatic PE information: section name: .of0
Source: SecuriteInfo.com.FileRepPup.27878.13681.dllStatic PE information: section name: .of1
Source: SecuriteInfo.com.FileRepPup.27878.13681.dllStatic PE information: section name: .of2
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8E7B4BFBA rdtsc 0_2_00007FF8E7B4BFBA
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF8E7B4BFBA rdtsc 0_2_00007FF8E7B4BFBA

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x7FF8E7C4FFD9Jump to behavior
Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x7FF8E7C4FF35Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll",#1Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Rundll32
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
11
Process Injection
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1532748 Sample: SecuriteInfo.com.FileRepPup... Startdate: 13/10/2024 Architecture: WINDOWS Score: 56 21 18.31.95.13.in-addr.arpa 2->21 23 Multi AV Scanner detection for submitted file 2->23 25 AI detected suspicious sample 2->25 8 loaddll64.exe 1 2->8         started        signatures3 process4 signatures5 27 Found direct / indirect Syscall (likely to bypass EDR) 8->27 11 cmd.exe 1 8->11         started        13 rundll32.exe 8->13         started        15 rundll32.exe 8->15         started        17 2 other processes 8->17 process6 process7 19 rundll32.exe 11->19         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.FileRepPup.27878.13681.dll37%ReversingLabsWin64.Trojan.Crack
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.openssl.org/support/faq.html0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
18.31.95.13.in-addr.arpa
unknown
unknownfalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.openssl.org/support/faq.html.loaddll64.exe, 00000000.00000002.1674826458.00007FF8E75CE000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.1584474646.00007FF8E75CE000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1568058981.00007FF8E75CE000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.1614939315.00007FF8E75CE000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000002.1647536434.00007FF8E75CE000.00000004.00000001.01000000.00000003.sdmpfalse
      unknown
      https://curl.haxx.se/docs/http-cookies.htmlloaddll64.exe, 00000000.00000002.1674763147.00007FF8E754C000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.1584411808.00007FF8E754C000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1568013379.00007FF8E754C000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.1614867632.00007FF8E754C000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000002.1647461495.00007FF8E754C000.00000002.00000001.01000000.00000003.sdmpfalse
        unknown
        http://www.openssl.org/support/faq.htmlloaddll64.exe, 00000000.00000002.1674826458.00007FF8E75CE000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.1584474646.00007FF8E75CE000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1568058981.00007FF8E75CE000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.1614939315.00007FF8E75CE000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000002.1647536434.00007FF8E75CE000.00000004.00000001.01000000.00000003.sdmpfalse
        • URL Reputation: safe
        unknown
        No contacted IP infos
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1532748
        Start date and time:2024-10-13 21:33:26 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 5m 52s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:11
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:SecuriteInfo.com.FileRepPup.27878.13681.dll
        (renamed file extension from exe to dll)
        Original Sample Name:SecuriteInfo.com.FileRepPup.27878.13681.exe
        Detection:MAL
        Classification:mal56.evad.winDLL@12/0@1/0
        EGA Information:Failed
        HCA Information:Failed
        Cookbook Comments:
        • Stop behavior analysis, all processes terminated
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Execution Graph export aborted for target loaddll64.exe, PID 4908 because there are no executed function
        • Execution Graph export aborted for target rundll32.exe, PID 3124 because there are no executed function
        • Execution Graph export aborted for target rundll32.exe, PID 4448 because there are no executed function
        • Execution Graph export aborted for target rundll32.exe, PID 5628 because there are no executed function
        • Execution Graph export aborted for target rundll32.exe, PID 616 because there are no executed function
        • Not all processes where analyzed, report is missing behavior information
        • VT rate limit hit for: SecuriteInfo.com.FileRepPup.27878.13681.dll
        No simulations
        No context
        No context
        No context
        No context
        No context
        No created / dropped files found
        File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
        Entropy (8bit):7.863441997475971
        TrID:
        • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
        • Win64 Executable (generic) (12005/4) 10.17%
        • Generic Win/DOS Executable (2004/3) 1.70%
        • DOS Executable Generic (2002/1) 1.70%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
        File name:SecuriteInfo.com.FileRepPup.27878.13681.dll
        File size:4'791'808 bytes
        MD5:05fdda04525c97630c95e5095164cde3
        SHA1:c77ee48196d6f0b59b92b2e8bd2d16b6a0a22884
        SHA256:d80efa7ffc44b018e51f5528cf5b701e6c05c47108f2be98611f08591477b4ed
        SHA512:066a7d235c42b03479c8d4f499e59379f1e2a00c3cca73898da3928af3f2bb735486262173d5ea6a1a63aa27c2c11f603602af20ae0e8650f9be69e038c7a9ab
        SSDEEP:98304:J9DmmgLnJ9WnEw9pIDF6K0msUf49i9TgNKiEyG:JMmgLnJ9H5DEbUfQQi
        TLSH:E02612FDA19833A8C45F85348923ED0472F6911E9DF98AA978DBFEC07F97860D901B05
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....Ab.........." ..................C......................................`............`................................
        Icon Hash:7ae282899bbab082
        Entrypoint:0x180439e85
        Entrypoint Section:.of2
        Digitally signed:false
        Imagebase:0x180000000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
        Time Stamp:0x6241ADD5 [Mon Mar 28 12:45:09 2022 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:6
        OS Version Minor:0
        File Version Major:6
        File Version Minor:0
        Subsystem Version Major:6
        Subsystem Version Minor:0
        Import Hash:4b8e5391ed1e2ba024790d409b61ce13
        Instruction
        push E1DF0165h
        call 00007F95E8E84B60h
        dec esi
        jne 00007F95E8B22A85h
        jbe 00007F95E8B22A92h
        jne 00007F95E8B22AA5h
        pop esp
        pushad
        pop edi
        and al, FDh
        dec edx
        or dl, byte ptr [esi+ecx*4]
        lodsd
        pop es
        mov bh, C5h
        inc edx
        xor ecx, esi
        inc eax
        inc esi
        mov dx, ds
        sub eax, 96D3AFF9h
        jle 00007F95E8B22A94h
        push ebp
        mov esp, 177F6A13h
        dec ebp
        in eax, BAh
        jle 00007F95E8B22A77h
        out dx, eax
        fcomp qword ptr [eax+ebx*8-27A9CE1Ch]
        outsd
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x66fe180x792.of2
        IMAGE_DIRECTORY_ENTRY_IMPORT0x448da00xa0.of2
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x8b50000x294.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x8a01300x137dc.of2
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x8b40000xdc.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x4277680x28.of2
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x89fff00x138.of2
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x4220000xa0.of1
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x19a2900x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0x19c0000x8192e0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0x21e0000x4cc000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .pdata0x26b0000x133800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        _RDATA0x27f0000xf40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .of00x2800000x1a15b40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .of10x4220000x9a00xa00c10fda99ea4a5919b85004d8e1220529False0.03359375data0.17935490026417103IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .of20x4230000x49090c0x490a00b312245a909604dc399f9abe426feb8cunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .reloc0x8b40000xdc0x2005e6451a6039aa49c355a0d8231822485False0.345703125GLS_BINARY_LSB_FIRST2.122842594520572IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .rsrc0x8b50000x2940x400fc4969baf3c8feebca725168e0f3f75dFalse0.3271484375data2.2866108800725256IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_VERSION0x8b50580x23cdataRussianRussia0.513986013986014
        DLLImport
        KERNEL32.dllLoadLibraryA
        USER32.dllGetUserObjectInformationW
        SHELL32.dllSHGetSpecialFolderPathA
        WS2_32.dllioctlsocket
        WLDAP32.dll
        ADVAPI32.dllRegisterEventSourceW
        KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, ExitProcess, LoadLibraryA, GetModuleHandleA, GetProcAddress
        NameOrdinalAddress
        Breakpad_SteamMiniDumpInit10x180054650
        Breakpad_SteamSetAppID20x180054660
        Breakpad_SteamSetSteamID30x180054670
        Breakpad_SteamWriteMiniDumpSetComment40x180054680
        Breakpad_SteamWriteMiniDumpUsingExceptionInfoWithBuildId50x180054690
        CreateInterface60x180054520
        OnlineFix70x180054360
        ShellExecuteA80x180054370
        ShellExecuteW90x1800543d0
        Steam_BConnected100x1800547d0
        Steam_BGetCallback110x180054430
        Steam_BLoggedOn120x1800547e0
        Steam_BReleaseSteamPipe130x1800547f0
        Steam_ConnectToGlobalUser140x180054800
        Steam_CreateGlobalUser150x180054810
        Steam_CreateLocalUser160x180054820
        Steam_CreateSteamPipe170x180054830
        Steam_FreeLastCallback180x180054840
        Steam_GSBLoggedOn190x180054860
        Steam_GSBSecure200x180054870
        Steam_GSGetSteam2GetEncryptionKeyToSendToNewClient210x180054880
        Steam_GSGetSteamID220x180054890
        Steam_GSLogOff230x1800548a0
        Steam_GSLogOn240x1800548b0
        Steam_GSRemoveUserConnect250x1800548c0
        Steam_GSSendSteam2UserConnect260x1800548d0
        Steam_GSSendSteam3UserConnect270x1800548e0
        Steam_GSSendUserDisconnect280x1800548f0
        Steam_GSSendUserStatusResponse290x180054900
        Steam_GSSetServerType300x180054910
        Steam_GSSetSpawnCount310x180054920
        Steam_GSUpdateStatus320x180054930
        Steam_GetAPICallResult330x180054480
        Steam_GetGSHandle340x180054850
        Steam_InitiateGameConnection350x180054940
        Steam_LogOff360x180054950
        Steam_LogOn370x180054960
        Steam_ReleaseThreadLocalMemory380x180054970
        Steam_ReleaseUser390x180054980
        Steam_SetLocalIPBinding400x180054990
        Steam_TerminateGameConnection410x1800549a0
        hid_close420x1800546a0
        hid_enumerate430x1800546b0
        hid_error440x1800546c0
        hid_exit450x1800546d0
        hid_free_enumeration460x1800546e0
        hid_get_feature_report470x1800546f0
        hid_get_indexed_string480x180054700
        hid_get_manufacturer_string490x180054710
        hid_get_product_string500x180054720
        hid_get_serial_number_string510x180054730
        hid_init520x180054740
        hid_open530x180054750
        hid_open_path540x180054760
        hid_read550x180054770
        hid_read_timeout560x180054780
        hid_send_feature_report570x180054790
        hid_set_nonblocking580x1800547a0
        hid_write590x1800547b0
        hid_write_output_report600x1800547c0
        Language of compilation systemCountry where language is spokenMap
        RussianRussia
        TimestampSource PortDest PortSource IPDest IP
        Oct 13, 2024 21:35:11.030241013 CEST5357929162.159.36.2192.168.2.9
        Oct 13, 2024 21:35:11.526410103 CEST5491153192.168.2.91.1.1.1
        Oct 13, 2024 21:35:11.534178019 CEST53549111.1.1.1192.168.2.9
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Oct 13, 2024 21:35:11.526410103 CEST192.168.2.91.1.1.10x679dStandard query (0)18.31.95.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Oct 13, 2024 21:35:11.534178019 CEST1.1.1.1192.168.2.90x679dName error (3)18.31.95.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

        Click to jump to process

        Click to jump to process

        Click to jump to process

        Target ID:0
        Start time:15:34:39
        Start date:13/10/2024
        Path:C:\Windows\System32\loaddll64.exe
        Wow64 process (32bit):false
        Commandline:loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll"
        Imagebase:0x7ff79f240000
        File size:165'888 bytes
        MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:1
        Start time:15:34:39
        Start date:13/10/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff70f010000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:2
        Start time:15:34:39
        Start date:13/10/2024
        Path:C:\Windows\System32\cmd.exe
        Wow64 process (32bit):false
        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll",#1
        Imagebase:0x7ff7c1690000
        File size:289'792 bytes
        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:3
        Start time:15:34:39
        Start date:13/10/2024
        Path:C:\Windows\System32\rundll32.exe
        Wow64 process (32bit):false
        Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll,Breakpad_SteamMiniDumpInit
        Imagebase:0x7ff6c8ce0000
        File size:71'680 bytes
        MD5 hash:EF3179D498793BF4234F708D3BE28633
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:4
        Start time:15:34:39
        Start date:13/10/2024
        Path:C:\Windows\System32\rundll32.exe
        Wow64 process (32bit):false
        Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll",#1
        Imagebase:0x7ff6c8ce0000
        File size:71'680 bytes
        MD5 hash:EF3179D498793BF4234F708D3BE28633
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:6
        Start time:15:34:42
        Start date:13/10/2024
        Path:C:\Windows\System32\rundll32.exe
        Wow64 process (32bit):false
        Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll,Breakpad_SteamSetAppID
        Imagebase:0x7ff6c8ce0000
        File size:71'680 bytes
        MD5 hash:EF3179D498793BF4234F708D3BE28633
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:7
        Start time:15:34:45
        Start date:13/10/2024
        Path:C:\Windows\System32\rundll32.exe
        Wow64 process (32bit):false
        Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.FileRepPup.27878.13681.dll,Breakpad_SteamSetSteamID
        Imagebase:0x7ff6c8ce0000
        File size:71'680 bytes
        MD5 hash:EF3179D498793BF4234F708D3BE28633
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Reset < >
          Memory Dump Source
          • Source File: 00000000.00000002.1675132521.00007FF8E77D3000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8E73B0000, based on PE: true
          • Associated: 00000000.00000002.1674572085.00007FF8E73B0000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1674595079.00007FF8E73B1000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1674763147.00007FF8E754C000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1674826458.00007FF8E75CE000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1674883399.00007FF8E7619000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1674907964.00007FF8E761B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1674938495.00007FF8E7630000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1675106883.00007FF8E77D2000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1675564087.00007FF8E7C64000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff8e73b0000_loaddll64.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 7d34b488cdea0c4bb0ced233dcc540f2ac71771b4fc4871f8df63afcea2d8497
          • Instruction ID: eceb88e219606bafa5c078d479bc1e7ea06b1d51a10f284c08aa2d5b017facd7
          • Opcode Fuzzy Hash: 7d34b488cdea0c4bb0ced233dcc540f2ac71771b4fc4871f8df63afcea2d8497
          • Instruction Fuzzy Hash: 8021A091F14922AAE2205535AD58BFD2201E3047F4FAC0331FF7D637C5EA2DE11AD201