Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RasTls.dll

Overview

General Information

Sample name:RasTls.dll
Analysis ID:1561846
MD5:f1c9f093d5479560e83a0759201210b7
SHA1:9553567e231a172c69f0ef8800a927193b9cbd49
SHA256:1906e7d5a745a364c91f5e230e16e1566721ace1183a57e8d25ff437664c7d02
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
AI detected suspicious sample
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Creates a process in suspended mode (likely to inject code)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6616 cmdline: loaddll32.exe "C:\Users\user\Desktop\RasTls.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 5948 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1252 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 6548 cmdline: rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6348 cmdline: rundll32.exe C:\Users\user\Desktop\RasTls.dll,GetOfficeDatatal MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5284 cmdline: rundll32.exe "C:\Users\user\Desktop\RasTls.dll",GetOfficeDatatal MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: RasTls.dllAvira: detected
Source: RasTls.dllReversingLabs: Detection: 68%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: RasTls.dllJoe Sandbox ML: detected
Source: RasTls.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: RasTls.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT

Networking

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 65.20.90.139 443Jump to behavior
Source: Joe Sandbox ViewASN Name: CP-ASDE CP-ASDE
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: swiftandfast.net
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49887
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49986
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49985
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49989 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49894 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49986 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49990 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49992 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 49887 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49894
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49993
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49992
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49991
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49990
Source: unknownNetwork traffic detected: HTTP traffic on port 49988 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49985 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49987 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49991 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 49993 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49989
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49988
Source: unknownNetwork traffic detected: HTTP traffic on port 49888 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49888
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49987

System Summary

barindex
Source: RasTls.dllStatic PE information: section name: .X:T
Source: RasTls.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: classification engineClassification label: mal88.evad.winDLL@10/0@1/1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5948:120:WilError_03
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\RasTls.dll,GetOfficeDatatal
Source: RasTls.dllReversingLabs: Detection: 68%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\RasTls.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\RasTls.dll,GetOfficeDatatal
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RasTls.dll",GetOfficeDatatal
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\RasTls.dll,GetOfficeDatatalJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RasTls.dll",GetOfficeDatatalJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: RasTls.dllStatic file information: File size 6302208 > 1048576
Source: RasTls.dllStatic PE information: Raw size of .WFm is bigger than: 0x100000 < 0x601800
Source: RasTls.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: initial sampleStatic PE information: section where entry point is pointing to: .WFm
Source: RasTls.dllStatic PE information: section name: .X:T
Source: RasTls.dllStatic PE information: section name: .BXf
Source: RasTls.dllStatic PE information: section name: .WFm

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 6616 base: 1240005 value: E9 8B 2F CB 75 Jump to behavior
Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 6616 base: 76EF2F90 value: E9 7A D0 34 8A Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 6348 base: 2B80005 value: E9 8B 2F 37 74 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 6348 base: 76EF2F90 value: E9 7A D0 C8 8B Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 6548 base: 3220005 value: E9 8B 2F CD 73 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 6548 base: 76EF2F90 value: E9 7A D0 32 8C Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5284 base: 29F0005 value: E9 8B 2F 50 74 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5284 base: 76EF2F90 value: E9 7A D0 AF 8B Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6C86454B
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6C865B49
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6C72132F
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6C6B3714
Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 6C58745C second address: 6C587467 instructions: 0x00000000 rdtsc 0x00000002 pop esi 0x00000003 movsx dx, bh 0x00000007 mov bp, 091Bh 0x0000000b rdtsc
Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 6C58745C second address: 6C587467 instructions: 0x00000000 rdtsc 0x00000002 pop esi 0x00000003 movsx dx, bh 0x00000007 mov bp, 091Bh 0x0000000b rdtsc
Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 6C5C5B71 second address: 6C5C5B75 instructions: 0x00000000 rdtsc 0x00000002 pop ebx 0x00000003 cdq 0x00000004 rdtsc
Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 6C659216 second address: 6C65921A instructions: 0x00000000 rdtsc 0x00000002 pop ebx 0x00000003 cdq 0x00000004 rdtsc
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 5454Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 4535Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 5470Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 4519Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 9989Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6156Thread sleep count: 5454 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6156Thread sleep time: -5454000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6156Thread sleep count: 4535 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6156Thread sleep time: -4535000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6480Thread sleep count: 5470 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6480Thread sleep time: -5470000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6480Thread sleep count: 4519 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6480Thread sleep time: -4519000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5672Thread sleep count: 9989 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5672Thread sleep time: -9989000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: rundll32.exe, 00000003.00000002.4512491078.0000000002A8A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4512315310.000000000306A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.4512544852.0000000002A1A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\System32\loaddll32.exeProcess information queried: ProcessInformationJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 65.20.90.139 443Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
111
Process Injection
1
Rundll32
1
Credential API Hooking
21
Security Software Discovery
Remote Services1
Credential API Hooking
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Virtualization/Sandbox Evasion
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)111
Process Injection
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets21
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
RasTls.dll68%ReversingLabsWin32.Backdoor.Healquick
RasTls.dll100%AviraTR/Redcap.mvaff
RasTls.dll100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
swiftandfast.net
65.20.90.139
truetrue
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    65.20.90.139
    swiftandfast.netUnited States
    199592CP-ASDEtrue
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1561846
    Start date and time:2024-11-24 13:29:37 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 6m 5s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:9
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:RasTls.dll
    Detection:MAL
    Classification:mal88.evad.winDLL@10/0@1/1
    Cookbook Comments:
    • Found application associated with file extension: .dll
    • Override analysis time to 240s for rundll32
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: RasTls.dll
    TimeTypeDescription
    07:30:32API Interceptor1x Sleep call for process: loaddll32.exe modified
    07:31:01API Interceptor15331457x Sleep call for process: rundll32.exe modified
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    CP-ASDERFQ.scr.exeGet hashmaliciousDiscord Token StealerBrowse
    • 65.21.66.211
    hiss.arm7.elfGet hashmaliciousUnknownBrowse
    • 65.20.118.153
    Payload 94.75 (2).225.exeGet hashmaliciousUnknownBrowse
    • 65.21.172.133
    Payload 94.75.225.exeGet hashmaliciousUnknownBrowse
    • 65.21.98.72
    0438.pdf.exeGet hashmaliciousUnknownBrowse
    • 65.21.245.7
    0438.pdf.exeGet hashmaliciousUnknownBrowse
    • 65.21.245.7
    J4zGPhVRV3.exeGet hashmaliciousRMSRemoteAdminBrowse
    • 65.21.245.7
    J4zGPhVRV3.exeGet hashmaliciousRMSRemoteAdminBrowse
    • 65.21.245.7
    FPPhfkcDCh.exeGet hashmaliciousRemcosBrowse
    • 65.21.245.7
    gBYz86HSwI.msiGet hashmaliciousUnknownBrowse
    • 65.21.245.7
    No context
    No context
    No created / dropped files found
    File type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
    Entropy (8bit):7.965303809439106
    TrID:
    • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
    • Generic Win/DOS Executable (2004/3) 0.20%
    • DOS Executable Generic (2002/1) 0.20%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:RasTls.dll
    File size:6'302'208 bytes
    MD5:f1c9f093d5479560e83a0759201210b7
    SHA1:9553567e231a172c69f0ef8800a927193b9cbd49
    SHA256:1906e7d5a745a364c91f5e230e16e1566721ace1183a57e8d25ff437664c7d02
    SHA512:be63e2da1a550053d599e4369fe2e4a96bfed5bf0dc52bd4cba2a6ab0f8995c9953d4b703547e3bed45ce640c0eee4ebe3aef15849f126fff39b1f0178951201
    SSDEEP:196608:5y0OghWwkjhzqi5DOjUl2DGzNZZkuBm1W8xQVW:5JFEDj9qiloUl7Ux1W
    TLSH:E3562363216A0006E5F9883DC61F7D9831F742769B43E87CB1B6ADD52B269B1F203B53
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Ob...........!................0.=..............................................:`...@.............................N..
    Icon Hash:7ae282899bbab082
    Entrypoint:0x103dc030
    Entrypoint Section:.WFm
    Digitally signed:false
    Imagebase:0x10000000
    Subsystem:windows cui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
    Time Stamp:0x624FFDD6 [Fri Apr 8 09:18:14 2022 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:1
    File Version Major:5
    File Version Minor:1
    Subsystem Version Major:5
    Subsystem Version Minor:1
    Import Hash:1a39c9a6ecf0ca64fc5770962bbdc4e5
    Instruction
    push BFD4F858h
    call 00007F6D6509915Ch
    dec edx
    not edx
    jmp 00007F6D6513CC49h
    mov eax, dword ptr [ebp+00h]
    sub cx, 5642h
    shrd cx, dx, 00000081h
    mov cx, word ptr [ebp+04h]
    lea ebp, dword ptr [ebp+00000006h]
    jmp 00007F6D650D5143h
    bt ecx, esi
    mov ecx, dword ptr [ebp+00h]
    jmp 00007F6D6528CD45h
    add edi, eax
    jmp 00007F6D650FAC6Dh
    jne 00007F6D650E672Eh
    mov eax, dword ptr [ebp+00h]
    jmp 00007F6D6505A610h
    add esi, 00000004h
    test di, ax
    xor ecx, ebx
    jmp 00007F6D65087ECDh
    mov eax, dword ptr [esi]
    mov edx, esi
    bt edx, 1Ah
    btc edx, 14h
    mov edx, dword ptr [eax]
    cmc
    cmp sp, 55CAh
    mov dword ptr [esi], edx
    btc dx, di
    add edx, edx
    test ebp, 4118545Dh
    mov edx, dword ptr [ebp+00h]
    test cl, dh
    jmp 00007F6D651408AEh
    inc ecx
    not ecx
    xor ebx, ecx
    jmp 00007F6D650B4496h
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x9216d00x4e.WFm
    IMAGE_DIRECTORY_ENTRY_IMPORT0x5c5ac40x118.WFm
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x96a0000x1b2.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x9690000x5fc.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x9686700x40.WFm
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x3660000x90.BXf
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x1a59b0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x1c0000x462e0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x210000xa9000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .X:T0x2c0000x339eac0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .BXf0x3660000x5b00x6007ef56d7580a2e67cae4f7f89e6eafb55False0.07877604166666667data0.5089280985485166IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .WFm0x3670000x6018000x60180061ee4f262fb1277e667af5bfdf9afdabunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .reloc0x9690000x5fc0x60028b0624b163f2fd9b5e789a185b2c2dbFalse0.52734375data4.347436157519483IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x96a0000x1b20x2006a1cfcb854d8d3c8d4a13f0819166e2eFalse0.470703125data4.47450519324645IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_MANIFEST0x96a0580x15aASCII text, with CRLF line terminatorsEnglishUnited States0.5491329479768786
    DLLImport
    KERNEL32.dllGetVersionExW
    USER32.dllwsprintfA
    ADVAPI32.dllCredEnumerateA
    SHELL32.dllShellExecuteW
    WS2_32.dllWSAIoctl
    SHLWAPI.dllPathGetArgsW
    NETAPI32.dllNetUserGetInfo
    IPHLPAPI.DLLGetAdaptersInfo
    CRYPT32.dllCryptUnprotectData
    OLEAUT32.dllGetErrorInfo
    KERNEL32.dllGetSystemTimeAsFileTime
    USER32.dllCharUpperBuffW
    KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, LoadLibraryA, GetModuleHandleA, GetProcAddress
    NameOrdinalAddress
    GetOfficeDatatal10x100098d0
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    Nov 24, 2024 13:30:30.962975025 CET49704443192.168.2.565.20.90.139
    Nov 24, 2024 13:30:30.963006020 CET4434970465.20.90.139192.168.2.5
    Nov 24, 2024 13:30:30.963099957 CET49704443192.168.2.565.20.90.139
    Nov 24, 2024 13:30:30.963136911 CET49704443192.168.2.565.20.90.139
    Nov 24, 2024 13:30:30.963141918 CET4434970465.20.90.139192.168.2.5
    Nov 24, 2024 13:30:30.986747980 CET49705443192.168.2.565.20.90.139
    Nov 24, 2024 13:30:30.986825943 CET4434970565.20.90.139192.168.2.5
    Nov 24, 2024 13:30:30.986917973 CET49705443192.168.2.565.20.90.139
    Nov 24, 2024 13:30:30.986978054 CET49705443192.168.2.565.20.90.139
    Nov 24, 2024 13:30:30.986994028 CET4434970565.20.90.139192.168.2.5
    Nov 24, 2024 13:30:33.763658047 CET49706443192.168.2.565.20.90.139
    Nov 24, 2024 13:30:33.763705969 CET4434970665.20.90.139192.168.2.5
    Nov 24, 2024 13:30:33.763784885 CET49706443192.168.2.565.20.90.139
    Nov 24, 2024 13:30:33.763829947 CET49706443192.168.2.565.20.90.139
    Nov 24, 2024 13:30:33.763835907 CET4434970665.20.90.139192.168.2.5
    Nov 24, 2024 13:31:15.150484085 CET4434970565.20.90.139192.168.2.5
    Nov 24, 2024 13:31:15.150568962 CET49705443192.168.2.565.20.90.139
    Nov 24, 2024 13:31:15.150652885 CET49705443192.168.2.565.20.90.139
    Nov 24, 2024 13:31:15.150686979 CET4434970565.20.90.139192.168.2.5
    Nov 24, 2024 13:31:15.197293043 CET4434970465.20.90.139192.168.2.5
    Nov 24, 2024 13:31:15.197371006 CET49704443192.168.2.565.20.90.139
    Nov 24, 2024 13:31:15.197457075 CET49704443192.168.2.565.20.90.139
    Nov 24, 2024 13:31:15.197477102 CET4434970465.20.90.139192.168.2.5
    Nov 24, 2024 13:31:17.931536913 CET4434970665.20.90.139192.168.2.5
    Nov 24, 2024 13:31:17.931627989 CET49706443192.168.2.565.20.90.139
    Nov 24, 2024 13:31:17.931729078 CET49706443192.168.2.565.20.90.139
    Nov 24, 2024 13:31:17.931746960 CET4434970665.20.90.139192.168.2.5
    Nov 24, 2024 13:31:18.158365965 CET49778443192.168.2.565.20.90.139
    Nov 24, 2024 13:31:18.158411980 CET4434977865.20.90.139192.168.2.5
    Nov 24, 2024 13:31:18.158504009 CET49778443192.168.2.565.20.90.139
    Nov 24, 2024 13:31:18.158559084 CET49778443192.168.2.565.20.90.139
    Nov 24, 2024 13:31:18.158566952 CET4434977865.20.90.139192.168.2.5
    Nov 24, 2024 13:31:18.205172062 CET49779443192.168.2.565.20.90.139
    Nov 24, 2024 13:31:18.205246925 CET4434977965.20.90.139192.168.2.5
    Nov 24, 2024 13:31:18.205368996 CET49779443192.168.2.565.20.90.139
    Nov 24, 2024 13:31:18.205439091 CET49779443192.168.2.565.20.90.139
    Nov 24, 2024 13:31:18.205456972 CET4434977965.20.90.139192.168.2.5
    Nov 24, 2024 13:31:20.939543009 CET49785443192.168.2.565.20.90.139
    Nov 24, 2024 13:31:20.939625978 CET4434978565.20.90.139192.168.2.5
    Nov 24, 2024 13:31:20.939733982 CET49785443192.168.2.565.20.90.139
    Nov 24, 2024 13:31:20.939815998 CET49785443192.168.2.565.20.90.139
    Nov 24, 2024 13:31:20.939856052 CET4434978565.20.90.139192.168.2.5
    Nov 24, 2024 13:32:02.378051043 CET4434977865.20.90.139192.168.2.5
    Nov 24, 2024 13:32:02.378406048 CET49778443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:02.378432989 CET49778443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:02.378448009 CET4434977865.20.90.139192.168.2.5
    Nov 24, 2024 13:32:02.408528090 CET4434977965.20.90.139192.168.2.5
    Nov 24, 2024 13:32:02.408617973 CET49779443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:02.408698082 CET49779443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:02.408740044 CET4434977965.20.90.139192.168.2.5
    Nov 24, 2024 13:32:05.111037970 CET4434978565.20.90.139192.168.2.5
    Nov 24, 2024 13:32:05.111125946 CET49785443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:05.111212015 CET49785443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:05.111259937 CET4434978565.20.90.139192.168.2.5
    Nov 24, 2024 13:32:05.392849922 CET49887443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:05.392894030 CET4434988765.20.90.139192.168.2.5
    Nov 24, 2024 13:32:05.392967939 CET49887443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:05.393017054 CET49887443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:05.393027067 CET4434988765.20.90.139192.168.2.5
    Nov 24, 2024 13:32:05.424109936 CET49888443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:05.424149036 CET4434988865.20.90.139192.168.2.5
    Nov 24, 2024 13:32:05.424238920 CET49888443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:05.424946070 CET49888443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:05.424957991 CET4434988865.20.90.139192.168.2.5
    Nov 24, 2024 13:32:08.129369020 CET49894443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:08.129401922 CET4434989465.20.90.139192.168.2.5
    Nov 24, 2024 13:32:08.133399963 CET49894443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:08.133461952 CET49894443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:08.133467913 CET4434989465.20.90.139192.168.2.5
    Nov 24, 2024 13:32:49.524281979 CET4434988765.20.90.139192.168.2.5
    Nov 24, 2024 13:32:49.524518967 CET49887443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:49.524518967 CET49887443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:49.555542946 CET4434988865.20.90.139192.168.2.5
    Nov 24, 2024 13:32:49.555721045 CET49888443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:49.555844069 CET49888443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:49.555876017 CET4434988865.20.90.139192.168.2.5
    Nov 24, 2024 13:32:49.876773119 CET49887443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:49.876794100 CET4434988765.20.90.139192.168.2.5
    Nov 24, 2024 13:32:52.252123117 CET4434989465.20.90.139192.168.2.5
    Nov 24, 2024 13:32:52.252254963 CET49894443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:52.252334118 CET49894443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:52.252351046 CET4434989465.20.90.139192.168.2.5
    Nov 24, 2024 13:32:52.533334970 CET49985443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:52.533370972 CET4434998565.20.90.139192.168.2.5
    Nov 24, 2024 13:32:52.533435106 CET49985443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:52.533520937 CET49985443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:52.533530951 CET4434998565.20.90.139192.168.2.5
    Nov 24, 2024 13:32:52.564817905 CET49986443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:52.564858913 CET4434998665.20.90.139192.168.2.5
    Nov 24, 2024 13:32:52.564933062 CET49986443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:52.564992905 CET49986443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:52.565001011 CET4434998665.20.90.139192.168.2.5
    Nov 24, 2024 13:32:55.267700911 CET49987443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:55.267776966 CET4434998765.20.90.139192.168.2.5
    Nov 24, 2024 13:32:55.271517992 CET49987443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:55.271666050 CET49987443192.168.2.565.20.90.139
    Nov 24, 2024 13:32:55.271692991 CET4434998765.20.90.139192.168.2.5
    Nov 24, 2024 13:33:36.693067074 CET4434998565.20.90.139192.168.2.5
    Nov 24, 2024 13:33:36.693149090 CET49985443192.168.2.565.20.90.139
    Nov 24, 2024 13:33:36.693236113 CET49985443192.168.2.565.20.90.139
    Nov 24, 2024 13:33:36.693248987 CET4434998565.20.90.139192.168.2.5
    Nov 24, 2024 13:33:36.731028080 CET4434998665.20.90.139192.168.2.5
    Nov 24, 2024 13:33:36.731120110 CET49986443192.168.2.565.20.90.139
    Nov 24, 2024 13:33:36.731184959 CET49986443192.168.2.565.20.90.139
    Nov 24, 2024 13:33:36.731204033 CET4434998665.20.90.139192.168.2.5
    Nov 24, 2024 13:33:39.388725996 CET4434998765.20.90.139192.168.2.5
    Nov 24, 2024 13:33:39.388972044 CET49987443192.168.2.565.20.90.139
    Nov 24, 2024 13:33:39.389018059 CET49987443192.168.2.565.20.90.139
    Nov 24, 2024 13:33:39.389039993 CET4434998765.20.90.139192.168.2.5
    Nov 24, 2024 13:33:39.705185890 CET49988443192.168.2.565.20.90.139
    Nov 24, 2024 13:33:39.705220938 CET4434998865.20.90.139192.168.2.5
    Nov 24, 2024 13:33:39.705310106 CET49988443192.168.2.565.20.90.139
    Nov 24, 2024 13:33:39.705358982 CET49988443192.168.2.565.20.90.139
    Nov 24, 2024 13:33:39.705363035 CET4434998865.20.90.139192.168.2.5
    Nov 24, 2024 13:33:39.737416029 CET49989443192.168.2.565.20.90.139
    Nov 24, 2024 13:33:39.737447977 CET4434998965.20.90.139192.168.2.5
    Nov 24, 2024 13:33:39.740595102 CET49989443192.168.2.565.20.90.139
    Nov 24, 2024 13:33:39.740778923 CET49989443192.168.2.565.20.90.139
    Nov 24, 2024 13:33:39.740787029 CET4434998965.20.90.139192.168.2.5
    Nov 24, 2024 13:33:42.392714977 CET49990443192.168.2.565.20.90.139
    Nov 24, 2024 13:33:42.392749071 CET4434999065.20.90.139192.168.2.5
    Nov 24, 2024 13:33:42.392808914 CET49990443192.168.2.565.20.90.139
    Nov 24, 2024 13:33:42.392872095 CET49990443192.168.2.565.20.90.139
    Nov 24, 2024 13:33:42.392878056 CET4434999065.20.90.139192.168.2.5
    Nov 24, 2024 13:34:23.847861052 CET4434998865.20.90.139192.168.2.5
    Nov 24, 2024 13:34:23.851691008 CET49988443192.168.2.565.20.90.139
    Nov 24, 2024 13:34:23.851800919 CET49988443192.168.2.565.20.90.139
    Nov 24, 2024 13:34:23.851823092 CET4434998865.20.90.139192.168.2.5
    Nov 24, 2024 13:34:23.863003016 CET4434998965.20.90.139192.168.2.5
    Nov 24, 2024 13:34:23.863547087 CET49989443192.168.2.565.20.90.139
    Nov 24, 2024 13:34:23.863601923 CET49989443192.168.2.565.20.90.139
    Nov 24, 2024 13:34:23.863616943 CET4434998965.20.90.139192.168.2.5
    Nov 24, 2024 13:34:26.548851967 CET4434999065.20.90.139192.168.2.5
    Nov 24, 2024 13:34:26.548926115 CET49990443192.168.2.565.20.90.139
    Nov 24, 2024 13:34:26.549026966 CET49990443192.168.2.565.20.90.139
    Nov 24, 2024 13:34:26.549046040 CET4434999065.20.90.139192.168.2.5
    Nov 24, 2024 13:34:26.861453056 CET49991443192.168.2.565.20.90.139
    Nov 24, 2024 13:34:26.861514091 CET4434999165.20.90.139192.168.2.5
    Nov 24, 2024 13:34:26.861576080 CET49991443192.168.2.565.20.90.139
    Nov 24, 2024 13:34:26.861615896 CET49991443192.168.2.565.20.90.139
    Nov 24, 2024 13:34:26.861623049 CET4434999165.20.90.139192.168.2.5
    Nov 24, 2024 13:34:26.878180027 CET49992443192.168.2.565.20.90.139
    Nov 24, 2024 13:34:26.878237963 CET4434999265.20.90.139192.168.2.5
    Nov 24, 2024 13:34:26.878307104 CET49992443192.168.2.565.20.90.139
    Nov 24, 2024 13:34:26.878401995 CET49992443192.168.2.565.20.90.139
    Nov 24, 2024 13:34:26.878412962 CET4434999265.20.90.139192.168.2.5
    Nov 24, 2024 13:34:29.565471888 CET49993443192.168.2.565.20.90.139
    Nov 24, 2024 13:34:29.565526009 CET4434999365.20.90.139192.168.2.5
    Nov 24, 2024 13:34:29.569555998 CET49993443192.168.2.565.20.90.139
    Nov 24, 2024 13:34:29.569556952 CET49993443192.168.2.565.20.90.139
    Nov 24, 2024 13:34:29.569600105 CET4434999365.20.90.139192.168.2.5
    TimestampSource PortDest PortSource IPDest IP
    Nov 24, 2024 13:30:30.554168940 CET6044053192.168.2.51.1.1.1
    Nov 24, 2024 13:30:30.941832066 CET53604401.1.1.1192.168.2.5
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Nov 24, 2024 13:30:30.554168940 CET192.168.2.51.1.1.10xbf87Standard query (0)swiftandfast.netA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Nov 24, 2024 13:30:30.941832066 CET1.1.1.1192.168.2.50xbf87No error (0)swiftandfast.net65.20.90.139A (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:07:30:28
    Start date:24/11/2024
    Path:C:\Windows\System32\loaddll32.exe
    Wow64 process (32bit):true
    Commandline:loaddll32.exe "C:\Users\user\Desktop\RasTls.dll"
    Imagebase:0xce0000
    File size:126'464 bytes
    MD5 hash:51E6071F9CBA48E79F10C84515AAE618
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:1
    Start time:07:30:28
    Start date:24/11/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff6d64d0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:2
    Start time:07:30:28
    Start date:24/11/2024
    Path:C:\Windows\SysWOW64\cmd.exe
    Wow64 process (32bit):true
    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1
    Imagebase:0x790000
    File size:236'544 bytes
    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:3
    Start time:07:30:28
    Start date:24/11/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe C:\Users\user\Desktop\RasTls.dll,GetOfficeDatatal
    Imagebase:0x9d0000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:4
    Start time:07:30:28
    Start date:24/11/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1
    Imagebase:0x9d0000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:6
    Start time:07:30:31
    Start date:24/11/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\RasTls.dll",GetOfficeDatatal
    Imagebase:0x9d0000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    No disassembly