Windows Analysis Report MakbLShaqA.dll

Overview

General Information

Sample Name: MakbLShaqA.dll
Analysis ID: 528565
MD5: d8f093871cd90d160aa42b945f68e229
SHA1: bed9b13fc1caeab0d9ee69c7ee9a3fc7939c04d5
SHA256: 778db11e074622c21181ac26eaead6bb1c8e60d4aee8b7df810ffffbd03b2064
Tags: 32dllexe
Infos:

Most interesting Screenshot:

Detection

Emotet
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Sigma detected: Emotet RunDLL32 Process Creation
Multi AV Scanner detection for domain / URL
Changes security center settings (notifications, updates, antivirus, firewall)
Machine Learning detection for sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
HTTP GET or POST without a user agent
IP address seen in connection with other malware
AV process strings found (often used to terminate AV products)
PE file contains an invalid checksum
Tries to load missing DLLs
Contains functionality to read the PEB
Drops PE files to the windows directory (C:\Windows)
Checks if the current process is being debugged
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

AV Detection:

barindex
Found malware configuration
Source: 7.2.rundll32.exe.2730000.0.raw.unpack Malware Configuration Extractor: Emotet {"Public Key": ["RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW", "RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0"], "C2 list": ["51.178.61.60:443", "168.197.250.14:80", "45.79.33.48:8080", "196.44.98.190:8080", "177.72.80.14:7080", "51.210.242.234:8080", "185.148.169.10:8080", "142.4.219.173:8080", "78.47.204.80:443", "78.46.73.125:443", "37.44.244.177:8080", "37.59.209.141:8080", "191.252.103.16:80", "54.38.242.185:443", "85.214.67.203:8080", "54.37.228.122:443", "207.148.81.119:8080", "195.77.239.39:8080", "66.42.57.149:443", "195.154.146.35:443"]}
Multi AV Scanner detection for submitted file
Source: MakbLShaqA.dll Virustotal: Detection: 16% Perma Link
Multi AV Scanner detection for domain / URL
Source: https://51.178.61.60/ Virustotal: Detection: 9% Perma Link
Machine Learning detection for sample
Source: MakbLShaqA.dll Joe Sandbox ML: detected

Compliance:

barindex
Uses 32bit PE files
Source: MakbLShaqA.dll Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Source: unknown HTTPS traffic detected: 51.178.61.60:443 -> 192.168.2.5:49759 version: TLS 1.2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_100331CA __EH_prolog3_GS,GetFullPathNameA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA, 2_2_100331CA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04201A80 FindFirstFileW, 7_2_04201A80

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Source: Traffic Snort IDS: 2404336 ET CNC Feodo Tracker Reported CnC Server TCP group 19 192.168.2.4:49764 -> 51.178.61.60:443
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 51.178.61.60 187 Jump to behavior
C2 URLs / IPs found in malware configuration
Source: Malware configuration extractor IPs: 51.178.61.60:443
Source: Malware configuration extractor IPs: 168.197.250.14:80
Source: Malware configuration extractor IPs: 45.79.33.48:8080
Source: Malware configuration extractor IPs: 196.44.98.190:8080
Source: Malware configuration extractor IPs: 177.72.80.14:7080
Source: Malware configuration extractor IPs: 51.210.242.234:8080
Source: Malware configuration extractor IPs: 185.148.169.10:8080
Source: Malware configuration extractor IPs: 142.4.219.173:8080
Source: Malware configuration extractor IPs: 78.47.204.80:443
Source: Malware configuration extractor IPs: 78.46.73.125:443
Source: Malware configuration extractor IPs: 37.44.244.177:8080
Source: Malware configuration extractor IPs: 37.59.209.141:8080
Source: Malware configuration extractor IPs: 191.252.103.16:80
Source: Malware configuration extractor IPs: 54.38.242.185:443
Source: Malware configuration extractor IPs: 85.214.67.203:8080
Source: Malware configuration extractor IPs: 54.37.228.122:443
Source: Malware configuration extractor IPs: 207.148.81.119:8080
Source: Malware configuration extractor IPs: 195.77.239.39:8080
Source: Malware configuration extractor IPs: 66.42.57.149:443
Source: Malware configuration extractor IPs: 195.154.146.35:443
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: AS-CHOOPAUS AS-CHOOPAUS
Source: Joe Sandbox View ASN Name: EcobandGH EcobandGH
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: 51c64c77e60f3980eea90869b68c58a8
HTTP GET or POST without a user agent
Source: global traffic HTTP traffic detected: GET /mORDXFCTowJiEI HTTP/1.1Cookie: komdJdlT=TUmhOHjsq0jpdGYwwvuYW84t0VBz8jE3ieyufpTPSdsSjuFT9qN1vMRROT8XX34gAF8S6dpwUc+oH5xz0lXr75zGC35p3jlBRFBy5IujQdhnOqTtUqxCGNYrbZrmR2afdnZt5Wh/ofDgB2jcFQw6+VQQ2JIP7HCr+Pn9kzeVvkTqaBMsd4PXWCuDfSYazrGRqNltBGE0OeF7XD2oZRFmR54nZGCBwDANUxBVGwEA6yHtFefhr4En4Q==Host: 51.178.61.60Connection: Keep-AliveCache-Control: no-cache
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 207.148.81.119 207.148.81.119
Source: Joe Sandbox View IP Address: 196.44.98.190 196.44.98.190
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49759
Source: unknown Network traffic detected: HTTP traffic on port 49759 -> 443
Source: unknown TCP traffic detected without corresponding DNS query: 51.178.61.60
Source: unknown TCP traffic detected without corresponding DNS query: 51.178.61.60
Source: unknown TCP traffic detected without corresponding DNS query: 51.178.61.60
Source: unknown TCP traffic detected without corresponding DNS query: 51.178.61.60
Source: unknown TCP traffic detected without corresponding DNS query: 51.178.61.60
Source: unknown TCP traffic detected without corresponding DNS query: 51.178.61.60
Source: unknown TCP traffic detected without corresponding DNS query: 51.178.61.60
Source: unknown TCP traffic detected without corresponding DNS query: 51.178.61.60
Source: unknown TCP traffic detected without corresponding DNS query: 51.178.61.60
Source: unknown TCP traffic detected without corresponding DNS query: 51.178.61.60
Source: svchost.exe, 00000019.00000003.372781652.000002854CB83000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify Music","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"pandora","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","A equals www.facebook.com (Facebook)
Source: svchost.exe, 00000019.00000003.372781652.000002854CB83000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify Music","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"pandora","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","A equals www.twitter.com (Twitter)
Source: svchost.exe, 00000019.00000003.372781652.000002854CB83000.00000004.00000001.sdmp, svchost.exe, 00000019.00000003.372851993.000002854CB94000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify Music","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"pandora","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2021-11-23T19:02:05.3195648Z||.||797d024d-8c74-4faa-b6a6-08435801478b||1152921505694213184||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailabilities":[{"Sku"
Source: svchost.exe, 00000019.00000003.372781652.000002854CB83000.00000004.00000001.sdmp, svchost.exe, 00000019.00000003.372851993.000002854CB94000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify Music","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"pandora","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2021-11-23T19:02:05.3195648Z||.||797d024d-8c74-4faa-b6a6-08435801478b||1152921505694213184||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailabilities":[{"Sku"
Source: rundll32.exe, rundll32.exe, 00000002.00000002.251213292.0000000010056000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.248351593.0000000010056000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.252910239.0000000010056000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.646110148.0000000010056000.00000002.00020000.sdmp, MakbLShaqA.dll String found in binary or memory: http://www.yahoo.com equals www.yahoo.com (Yahoo)
Source: rundll32.exe, 00000007.00000002.643498078.000000000299A000.00000004.00000001.sdmp, rundll32.exe, 00000007.00000003.269041596.000000000299A000.00000004.00000001.sdmp, svchost.exe, 0000000A.00000002.539104380.00000275BC28C000.00000004.00000001.sdmp, svchost.exe, 00000019.00000002.388838675.000002854CB00000.00000004.00000001.sdmp String found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: svchost.exe, 0000000A.00000002.538995107.00000275BC212000.00000004.00000001.sdmp String found in binary or memory: http://crl.ver)
Source: svchost.exe, 00000019.00000003.368117861.000002854CB77000.00000004.00000001.sdmp, svchost.exe, 00000019.00000003.368199872.000002854D002000.00000004.00000001.sdmp, svchost.exe, 00000019.00000003.368168723.000002854CB98000.00000004.00000001.sdmp String found in binary or memory: http://help.disneyplus.com.
Source: svchost.exe, 00000019.00000002.388541947.000002854C23C000.00000004.00000001.sdmp String found in binary or memory: http://schemas.microft8
Source: svchost.exe, 0000000E.00000002.305947613.000002890D413000.00000004.00000001.sdmp String found in binary or memory: http://www.bingmapsportal.com
Source: rundll32.exe, rundll32.exe, 00000002.00000002.251213292.0000000010056000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.248351593.0000000010056000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.252910239.0000000010056000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.646110148.0000000010056000.00000002.00020000.sdmp, MakbLShaqA.dll String found in binary or memory: http://www.yahoo.com
Source: svchost.exe, 0000000C.00000002.642318002.000001E5D943E000.00000004.00000001.sdmp String found in binary or memory: https://%s.dnet.xboxlive.com
Source: svchost.exe, 0000000C.00000002.642318002.000001E5D943E000.00000004.00000001.sdmp String found in binary or memory: https://%s.xboxlive.com
Source: rundll32.exe, 00000007.00000002.643460255.0000000002979000.00000004.00000001.sdmp, rundll32.exe, 00000007.00000003.269137604.0000000002977000.00000004.00000001.sdmp String found in binary or memory: https://51.178.61.60/
Source: rundll32.exe, 00000007.00000002.643460255.0000000002979000.00000004.00000001.sdmp, rundll32.exe, 00000007.00000002.643350637.0000000002941000.00000004.00000020.sdmp, rundll32.exe, 00000007.00000003.269137604.0000000002977000.00000004.00000001.sdmp String found in binary or memory: https://51.178.61.60/mORDXFCTowJiEI
Source: rundll32.exe, 00000007.00000002.643350637.0000000002941000.00000004.00000020.sdmp String found in binary or memory: https://51.178.61.60/mORDXFCTowJiEI7L
Source: rundll32.exe, 00000007.00000002.643350637.0000000002941000.00000004.00000020.sdmp String found in binary or memory: https://51.178.61.60/mORDXFCTowJiEIIL
Source: svchost.exe, 0000000C.00000002.642318002.000001E5D943E000.00000004.00000001.sdmp String found in binary or memory: https://activity.windows.com
Source: svchost.exe, 0000000C.00000002.642318002.000001E5D943E000.00000004.00000001.sdmp String found in binary or memory: https://activity.windows.comt
Source: svchost.exe, 0000000E.00000003.305618783.000002890D461000.00000004.00000001.sdmp String found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
Source: svchost.exe, 0000000C.00000002.642318002.000001E5D943E000.00000004.00000001.sdmp String found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device
Source: svchost.exe, 0000000C.00000002.642318002.000001E5D943E000.00000004.00000001.sdmp String found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device
Source: svchost.exe, 0000000E.00000002.305963685.000002890D42A000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.305624378.000002890D45F000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
Source: svchost.exe, 0000000E.00000003.305631055.000002890D45A000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.306018853.000002890D45B000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
Source: svchost.exe, 0000000E.00000003.305618783.000002890D461000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
Source: svchost.exe, 0000000E.00000002.305987582.000002890D43E000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
Source: svchost.exe, 0000000E.00000003.305631055.000002890D45A000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.306018853.000002890D45B000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
Source: svchost.exe, 0000000E.00000003.305618783.000002890D461000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
Source: svchost.exe, 0000000E.00000002.306010313.000002890D44E000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.305602622.000002890D449000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
Source: svchost.exe, 0000000E.00000002.305963685.000002890D42A000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
Source: svchost.exe, 0000000E.00000003.305631055.000002890D45A000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.306018853.000002890D45B000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
Source: svchost.exe, 0000000E.00000003.305618783.000002890D461000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
Source: svchost.exe, 0000000E.00000002.305987582.000002890D43E000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
Source: svchost.exe, 0000000E.00000003.305618783.000002890D461000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
Source: svchost.exe, 0000000E.00000003.305618783.000002890D461000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
Source: svchost.exe, 0000000E.00000003.305618783.000002890D461000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
Source: svchost.exe, 0000000E.00000002.305963685.000002890D42A000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
Source: svchost.exe, 0000000E.00000002.305994082.000002890D443000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
Source: svchost.exe, 0000000E.00000003.305676490.000002890D442000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.305653202.000002890D441000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.305994082.000002890D443000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
Source: svchost.exe, 0000000E.00000003.305618783.000002890D461000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
Source: svchost.exe, 0000000E.00000003.305631055.000002890D45A000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.306018853.000002890D45B000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.305653202.000002890D441000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
Source: svchost.exe, 00000019.00000003.368117861.000002854CB77000.00000004.00000001.sdmp, svchost.exe, 00000019.00000003.368199872.000002854D002000.00000004.00000001.sdmp, svchost.exe, 00000019.00000003.368168723.000002854CB98000.00000004.00000001.sdmp String found in binary or memory: https://disneyplus.com/legal.
Source: svchost.exe, 0000000E.00000003.305624378.000002890D45F000.00000004.00000001.sdmp String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
Source: svchost.exe, 0000000E.00000003.305631055.000002890D45A000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.306018853.000002890D45B000.00000004.00000001.sdmp String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
Source: svchost.exe, 0000000E.00000002.306018853.000002890D45B000.00000004.00000001.sdmp String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
Source: svchost.exe, 0000000E.00000003.305602622.000002890D449000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.305994082.000002890D443000.00000004.00000001.sdmp String found in binary or memory: https://dynamic.t
Source: svchost.exe, 0000000E.00000003.305618783.000002890D461000.00000004.00000001.sdmp String found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
Source: svchost.exe, 0000000E.00000002.305987582.000002890D43E000.00000004.00000001.sdmp String found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
Source: svchost.exe, 0000000E.00000003.283947646.000002890D432000.00000004.00000001.sdmp String found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
Source: svchost.exe, 0000000E.00000002.305987582.000002890D43E000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
Source: svchost.exe, 0000000E.00000002.305947613.000002890D413000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.305987582.000002890D43E000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
Source: svchost.exe, 0000000E.00000003.305670274.000002890D457000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
Source: svchost.exe, 0000000E.00000003.305670274.000002890D457000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
Source: svchost.exe, 0000000E.00000003.305653202.000002890D441000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
Source: svchost.exe, 0000000E.00000003.283947646.000002890D432000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.305980684.000002890D43C000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
Source: svchost.exe, 0000000E.00000002.306010313.000002890D44E000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.305602622.000002890D449000.00000004.00000001.sdmp String found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen
Source: svchost.exe, 00000019.00000003.368117861.000002854CB77000.00000004.00000001.sdmp, svchost.exe, 00000019.00000003.368199872.000002854D002000.00000004.00000001.sdmp, svchost.exe, 00000019.00000003.368168723.000002854CB98000.00000004.00000001.sdmp String found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
Source: svchost.exe, 00000019.00000003.368117861.000002854CB77000.00000004.00000001.sdmp, svchost.exe, 00000019.00000003.368199872.000002854D002000.00000004.00000001.sdmp, svchost.exe, 00000019.00000003.368168723.000002854CB98000.00000004.00000001.sdmp String found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
Source: svchost.exe, 00000019.00000003.369209327.000002854CB7F000.00000004.00000001.sdmp String found in binary or memory: https://www.tiktok.com/legal/report/
Source: svchost.exe, 00000019.00000003.369220229.000002854CB90000.00000004.00000001.sdmp, svchost.exe, 00000019.00000003.369209327.000002854CB7F000.00000004.00000001.sdmp, svchost.exe, 00000019.00000003.369173793.000002854CBA7000.00000004.00000001.sdmp, svchost.exe, 00000019.00000003.369239661.000002854D002000.00000004.00000001.sdmp, svchost.exe, 00000019.00000003.369187106.000002854CBA7000.00000004.00000001.sdmp String found in binary or memory: https://www.tiktok.com/legal/report/feedback
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04211027 InternetReadFile, 7_2_04211027
Source: global traffic HTTP traffic detected: GET /mORDXFCTowJiEI HTTP/1.1Cookie: komdJdlT=TUmhOHjsq0jpdGYwwvuYW84t0VBz8jE3ieyufpTPSdsSjuFT9qN1vMRROT8XX34gAF8S6dpwUc+oH5xz0lXr75zGC35p3jlBRFBy5IujQdhnOqTtUqxCGNYrbZrmR2afdnZt5Wh/ofDgB2jcFQw6+VQQ2JIP7HCr+Pn9kzeVvkTqaBMsd4PXWCuDfSYazrGRqNltBGE0OeF7XD2oZRFmR54nZGCBwDANUxBVGwEA6yHtFefhr4En4Q==Host: 51.178.61.60Connection: Keep-AliveCache-Control: no-cache
Source: unknown HTTPS traffic detected: 51.178.61.60:443 -> 192.168.2.5:49759 version: TLS 1.2

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Potential key logger detected (key state polling based)
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_10013EC9 ScreenToClient,_memset,GetKeyState,GetKeyState,GetKeyState,KillTimer,IsWindow, 2_2_10013EC9

E-Banking Fraud:

barindex
Yara detected Emotet
Source: Yara match File source: 7.2.rundll32.exe.4eb0000.16.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.4bc0000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4bc0000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4900000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4eb0000.16.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4820000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.28a0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.2730000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.2b90000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.28a0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.2.rundll32.exe.3f50000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.4ae0000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.2de0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4da0000.14.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4900000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.4ec0000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.4e60000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.4e60000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4820000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4b60000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.4bc0000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4ca0000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.2730000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.2b90000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4da0000.14.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.5030000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4ca0000.12.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4b60000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.4ae0000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4bc0000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.4ec0000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.2.rundll32.exe.3f50000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.2de0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.5030000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000007.00000002.644665975.0000000004820000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.642932572.0000000002730000.00000040.00000010.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.645532661.0000000004CA0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.251093887.0000000005030000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.645241270.0000000004BC0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.248189238.00000000028A0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.250243016.0000000002DE0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.250730251.0000000004BC0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.645897262.0000000004EB0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.252637909.0000000003F50000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.250606997.0000000004AE0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.644831234.0000000004900000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.251012589.0000000004EC0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.643684713.0000000002B90000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.645743036.0000000004DA0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.250937948.0000000004E60000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.645105513.0000000004B60000.00000040.00000001.sdmp, type: MEMORY

System Summary:

barindex
Uses 32bit PE files
Source: MakbLShaqA.dll Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Deletes files inside the Windows folder
Source: C:\Windows\SysWOW64\rundll32.exe File deleted: C:\Windows\SysWOW64\Sxdbowjvh\qaursesh.cky:Zone.Identifier Jump to behavior
Creates files inside the system directory
Source: C:\Windows\SysWOW64\rundll32.exe File created: C:\Windows\SysWOW64\Sxdbowjvh\ Jump to behavior
Detected potential crypto function
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_10046A46 2_2_10046A46
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_10010E3B 2_2_10010E3B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_1003FFA2 2_2_1003FFA2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2CAA8 2_2_02E2CAA8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E12A46 2_2_02E12A46
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E27BB2 2_2_02E27BB2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E19384 2_2_02E19384
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E308D1 2_2_02E308D1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E290BA 2_2_02E290BA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E12043 2_2_02E12043
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E13845 2_2_02E13845
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2D99A 2_2_02E2D99A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2AEEB 2_2_02E2AEEB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2DEF4 2_2_02E2DEF4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2ECE3 2_2_02E2ECE3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E14C00 2_2_02E14C00
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E1F41F 2_2_02E1F41F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E1441E 2_2_02E1441E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2056A 2_2_02E2056A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E20ADE 2_2_02E20ADE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E1DAAE 2_2_02E1DAAE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E15AB2 2_2_02E15AB2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E17283 2_2_02E17283
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E19A57 2_2_02E19A57
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E25220 2_2_02E25220
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E1D223 2_2_02E1D223
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E31A3C 2_2_02E31A3C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E11A0A 2_2_02E11A0A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E1220A 2_2_02E1220A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E1E21C 2_2_02E1E21C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E303F1 2_2_02E303F1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E1A3DF 2_2_02E1A3DF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E24BAA 2_2_02E24BAA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E243B3 2_2_02E243B3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2B397 2_2_02E2B397
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E31343 2_2_02E31343
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E13345 2_2_02E13345
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E16B25 2_2_02E16B25
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E30B34 2_2_02E30B34
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E12309 2_2_02E12309
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2A8F0 2_2_02E2A8F0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E130F6 2_2_02E130F6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E278A5 2_2_02E278A5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E298BD 2_2_02E298BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2D091 2_2_02E2D091
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2406E 2_2_02E2406E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E1A048 2_2_02E1A048
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2F83F 2_2_02E2F83F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2B1B5 2_2_02E2B1B5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E31193 2_2_02E31193
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2F14D 2_2_02E2F14D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E1C158 2_2_02E1C158
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E15923 2_2_02E15923
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E3292B 2_2_02E3292B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2BEC9 2_2_02E2BEC9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E27ED1 2_2_02E27ED1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E1FEA0 2_2_02E1FEA0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2D6A7 2_2_02E2D6A7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E30687 2_2_02E30687
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E24E8A 2_2_02E24E8A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E12654 2_2_02E12654
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E19E22 2_2_02E19E22
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2BFE8 2_2_02E2BFE8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E16FC4 2_2_02E16FC4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E22FA2 2_2_02E22FA2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E1BFB6 2_2_02E1BFB6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E14F8E 2_2_02E14F8E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E21F6B 2_2_02E21F6B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2577E 2_2_02E2577E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E13F5C 2_2_02E13F5C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2CCD4 2_2_02E2CCD4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E244AA 2_2_02E244AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2748A 2_2_02E2748A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E1CC8D 2_2_02E1CC8D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E13C91 2_2_02E13C91
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E1AC95 2_2_02E1AC95
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2AC9B 2_2_02E2AC9B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E11C76 2_2_02E11C76
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2E441 2_2_02E2E441
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E1EC27 2_2_02E1EC27
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E18C09 2_2_02E18C09
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E21C10 2_2_02E21C10
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E155E8 2_2_02E155E8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E1C5FE 2_2_02E1C5FE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E325C3 2_2_02E325C3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E29DA1 2_2_02E29DA1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E1758F 2_2_02E1758F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E24D8D 2_2_02E24D8D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E1FD91 2_2_02E1FD91
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E13502 2_2_02E13502
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2FD10 2_2_02E2FD10
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E1251C 2_2_02E1251C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028ECAA8 3_2_028ECAA8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D441E 3_2_028D441E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028E43B3 3_2_028E43B3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028DCC8D 3_2_028DCC8D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028E4E8A 3_2_028E4E8A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028E748A 3_2_028E748A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028F0687 3_2_028F0687
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D7283 3_2_028D7283
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028EAC9B 3_2_028EAC9B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028DAC95 3_2_028DAC95
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D3C91 3_2_028D3C91
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028ED091 3_2_028ED091
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028DDAAE 3_2_028DDAAE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028E44AA 3_2_028E44AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028ED6A7 3_2_028ED6A7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028E78A5 3_2_028E78A5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028DFEA0 3_2_028DFEA0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028E98BD 3_2_028E98BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028E90BA 3_2_028E90BA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D5AB2 3_2_028D5AB2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028EBEC9 3_2_028EBEC9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028E0ADE 3_2_028E0ADE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028ECCD4 3_2_028ECCD4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028F08D1 3_2_028F08D1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028E7ED1 3_2_028E7ED1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028EAEEB 3_2_028EAEEB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028EECE3 3_2_028EECE3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028EDEF4 3_2_028EDEF4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D30F6 3_2_028D30F6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028EA8F0 3_2_028EA8F0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D8C09 3_2_028D8C09
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D1A0A 3_2_028D1A0A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D220A 3_2_028D220A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D4C00 3_2_028D4C00
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028DE21C 3_2_028DE21C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028DF41F 3_2_028DF41F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028E1C10 3_2_028E1C10
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028DEC27 3_2_028DEC27
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028E5220 3_2_028E5220
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028DD223 3_2_028DD223
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D9E22 3_2_028D9E22
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028EF83F 3_2_028EF83F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028F1A3C 3_2_028F1A3C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028DA048 3_2_028DA048
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D3845 3_2_028D3845
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D2A46 3_2_028D2A46
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D2043 3_2_028D2043
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028EE441 3_2_028EE441
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D2654 3_2_028D2654
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D9A57 3_2_028D9A57
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028E406E 3_2_028E406E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D1C76 3_2_028D1C76
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D758F 3_2_028D758F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028E4D8D 3_2_028E4D8D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D4F8E 3_2_028D4F8E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D9384 3_2_028D9384
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028ED99A 3_2_028ED99A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028EB397 3_2_028EB397
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028DFD91 3_2_028DFD91
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028F1193 3_2_028F1193
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028E4BAA 3_2_028E4BAA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028E2FA2 3_2_028E2FA2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028E9DA1 3_2_028E9DA1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028EB1B5 3_2_028EB1B5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028DBFB6 3_2_028DBFB6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028E7BB2 3_2_028E7BB2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D6FC4 3_2_028D6FC4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028F25C3 3_2_028F25C3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028DA3DF 3_2_028DA3DF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D55E8 3_2_028D55E8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028EBFE8 3_2_028EBFE8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028DC5FE 3_2_028DC5FE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028F03F1 3_2_028F03F1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D2309 3_2_028D2309
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D3502 3_2_028D3502
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D251C 3_2_028D251C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028EFD10 3_2_028EFD10
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028F292B 3_2_028F292B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D6B25 3_2_028D6B25
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D5923 3_2_028D5923
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028F0B34 3_2_028F0B34
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028EF14D 3_2_028EF14D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D3345 3_2_028D3345
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028F1343 3_2_028F1343
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D3F5C 3_2_028D3F5C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028DC158 3_2_028DC158
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028E056A 3_2_028E056A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028E1F6B 3_2_028E1F6B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028E577E 3_2_028E577E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F943B3 6_2_03F943B3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9CAA8 6_2_03F9CAA8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F8441E 6_2_03F8441E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F8C5FE 6_2_03F8C5FE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03FA03F1 6_2_03FA03F1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F855E8 6_2_03F855E8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9BFE8 6_2_03F9BFE8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F8A3DF 6_2_03F8A3DF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03FA25C3 6_2_03FA25C3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F86FC4 6_2_03F86FC4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F97BB2 6_2_03F97BB2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9B1B5 6_2_03F9B1B5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F8BFB6 6_2_03F8BFB6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F94BAA 6_2_03F94BAA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F99DA1 6_2_03F99DA1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F92FA2 6_2_03F92FA2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9D99A 6_2_03F9D99A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F8FD91 6_2_03F8FD91
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03FA1193 6_2_03FA1193
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9B397 6_2_03F9B397
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F94D8D 6_2_03F94D8D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F84F8E 6_2_03F84F8E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F8758F 6_2_03F8758F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F89384 6_2_03F89384
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9577E 6_2_03F9577E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F91F6B 6_2_03F91F6B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9056A 6_2_03F9056A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F8C158 6_2_03F8C158
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F83F5C 6_2_03F83F5C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9F14D 6_2_03F9F14D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03FA1343 6_2_03FA1343
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F83345 6_2_03F83345
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03FA0B34 6_2_03FA0B34
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03FA292B 6_2_03FA292B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F85923 6_2_03F85923
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F86B25 6_2_03F86B25
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F8251C 6_2_03F8251C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9FD10 6_2_03F9FD10
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F82309 6_2_03F82309
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F83502 6_2_03F83502
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9A8F0 6_2_03F9A8F0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9DEF4 6_2_03F9DEF4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F830F6 6_2_03F830F6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9AEEB 6_2_03F9AEEB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9ECE3 6_2_03F9ECE3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F90ADE 6_2_03F90ADE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F97ED1 6_2_03F97ED1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03FA08D1 6_2_03FA08D1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9CCD4 6_2_03F9CCD4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9BEC9 6_2_03F9BEC9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F990BA 6_2_03F990BA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F998BD 6_2_03F998BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F85AB2 6_2_03F85AB2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F944AA 6_2_03F944AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F8DAAE 6_2_03F8DAAE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F8FEA0 6_2_03F8FEA0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F978A5 6_2_03F978A5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9D6A7 6_2_03F9D6A7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9AC9B 6_2_03F9AC9B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9D091 6_2_03F9D091
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F83C91 6_2_03F83C91
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F8AC95 6_2_03F8AC95
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F94E8A 6_2_03F94E8A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9748A 6_2_03F9748A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F8CC8D 6_2_03F8CC8D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F87283 6_2_03F87283
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03FA0687 6_2_03FA0687
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F81C76 6_2_03F81C76
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9406E 6_2_03F9406E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F82654 6_2_03F82654
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F89A57 6_2_03F89A57
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F8A048 6_2_03F8A048
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9E441 6_2_03F9E441
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F82043 6_2_03F82043
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F83845 6_2_03F83845
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F82A46 6_2_03F82A46
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9F83F 6_2_03F9F83F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03FA1A3C 6_2_03FA1A3C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F95220 6_2_03F95220
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F89E22 6_2_03F89E22
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F8D223 6_2_03F8D223
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F8EC27 6_2_03F8EC27
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F8E21C 6_2_03F8E21C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F8F41F 6_2_03F8F41F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F91C10 6_2_03F91C10
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F88C09 6_2_03F88C09
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F81A0A 6_2_03F81A0A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F8220A 6_2_03F8220A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F84C00 6_2_03F84C00
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04205220 7_2_04205220
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F441E 7_2_041F441E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F220A 7_2_041F220A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420F83F 7_2_0420F83F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041FEC27 7_2_041FEC27
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F3845 7_2_041F3845
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F2043 7_2_041F2043
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_042078A5 7_2_042078A5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_042044AA 7_2_042044AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041FAC95 7_2_041FAC95
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420748A 7_2_0420748A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F5AB2 7_2_041F5AB2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420ECE3 7_2_0420ECE3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420DEF4 7_2_0420DEF4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F30F6 7_2_041F30F6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_042108D1 7_2_042108D1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04207ED1 7_2_04207ED1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04210B34 7_2_04210B34
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04202FA2 7_2_04202FA2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04204BAA 7_2_04204BAA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F758F 7_2_041F758F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F9384 7_2_041F9384
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041FBFB6 7_2_041FBFB6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F6FC4 7_2_041F6FC4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041FC5FE 7_2_041FC5FE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F55E8 7_2_041F55E8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041FF41F 7_2_041FF41F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041FE21C 7_2_041FE21C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F1A0A 7_2_041F1A0A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F8C09 7_2_041F8C09
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04211A3C 7_2_04211A3C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F4C00 7_2_041F4C00
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04201C10 7_2_04201C10
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041FD223 7_2_041FD223
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F9E22 7_2_041F9E22
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F9A57 7_2_041F9A57
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F2654 7_2_041F2654
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420406E 7_2_0420406E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041FA048 7_2_041FA048
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F2A46 7_2_041F2A46
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420E441 7_2_0420E441
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F1C76 7_2_041F1C76
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420D6A7 7_2_0420D6A7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420CAA8 7_2_0420CAA8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F3C91 7_2_041F3C91
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041FCC8D 7_2_041FCC8D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_042090BA 7_2_042090BA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F7283 7_2_041F7283
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_042098BD 7_2_042098BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04210687 7_2_04210687
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04204E8A 7_2_04204E8A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420D091 7_2_0420D091
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041FDAAE 7_2_041FDAAE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420AC9B 7_2_0420AC9B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041FFEA0 7_2_041FFEA0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420AEEB 7_2_0420AEEB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420A8F0 7_2_0420A8F0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420BEC9 7_2_0420BEC9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420CCD4 7_2_0420CCD4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04200ADE 7_2_04200ADE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F251C 7_2_041F251C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0421292B 7_2_0421292B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F2309 7_2_041F2309
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F3502 7_2_041F3502
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420FD10 7_2_0420FD10
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F6B25 7_2_041F6B25
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F5923 7_2_041F5923
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F3F5C 7_2_041F3F5C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041FC158 7_2_041FC158
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420056A 7_2_0420056A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04201F6B 7_2_04201F6B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F3345 7_2_041F3345
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420577E 7_2_0420577E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04211343 7_2_04211343
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420F14D 7_2_0420F14D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04209DA1 7_2_04209DA1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041FFD91 7_2_041FFD91
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F4F8E 7_2_041F4F8E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04207BB2 7_2_04207BB2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_042043B3 7_2_042043B3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420B1B5 7_2_0420B1B5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04204D8D 7_2_04204D8D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04211193 7_2_04211193
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420B397 7_2_0420B397
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420D99A 7_2_0420D99A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041FA3DF 7_2_041FA3DF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420BFE8 7_2_0420BFE8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_042103F1 7_2_042103F1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_042125C3 7_2_042125C3
Found potential string decryption / allocating functions
Source: C:\Windows\SysWOW64\rundll32.exe Code function: String function: 10041CAB appears 75 times
Source: C:\Windows\SysWOW64\rundll32.exe Code function: String function: 10041DB8 appears 35 times
Tries to load missing DLLs
Source: C:\Windows\System32\svchost.exe Section loaded: xboxlivetitleid.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: cdpsgshims.dll Jump to behavior
Source: MakbLShaqA.dll Virustotal: Detection: 16%
Source: MakbLShaqA.dll Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: unknown Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\MakbLShaqA.dll"
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\MakbLShaqA.dll",#1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\MakbLShaqA.dll,Control_RunDLL
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\MakbLShaqA.dll",#1
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\MakbLShaqA.dll",Control_RunDLL
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Sxdbowjvh\qaursesh.cky",UWJouFROYqkt
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Sxdbowjvh\qaursesh.cky",Control_RunDLL
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
Source: unknown Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
Source: unknown Process created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
Source: unknown Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: C:\Windows\System32\svchost.exe Process created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
Source: C:\Program Files\Windows Defender\MpCmdRun.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\MakbLShaqA.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\MakbLShaqA.dll,Control_RunDLL Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\MakbLShaqA.dll",#1 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Sxdbowjvh\qaursesh.cky",UWJouFROYqkt Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\MakbLShaqA.dll",Control_RunDLL Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Sxdbowjvh\qaursesh.cky",Control_RunDLL Jump to behavior
Source: C:\Windows\System32\svchost.exe Process created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32 Jump to behavior
Source: classification engine Classification label: mal100.troj.evad.winDLL@26/7@0/21
Source: C:\Windows\SysWOW64\rundll32.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04201B54 CreateToolhelp32Snapshot, 7_2_04201B54
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\MakbLShaqA.dll,Control_RunDLL
Source: C:\Windows\System32\conhost.exe Mutant created: \BaseNamedObjects\Local\SM0:6548:120:WilError_01
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_10016810 LockResource, 2_2_10016810
Source: C:\Windows\System32\svchost.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\svchost.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\svchost.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\svchost.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: MakbLShaqA.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: MakbLShaqA.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: MakbLShaqA.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: MakbLShaqA.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: MakbLShaqA.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Data Obfuscation:

barindex
Uses code obfuscation techniques (call, push, ret)
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_10041D83 push ecx; ret 2_2_10041D96
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_10041DFD push ecx; ret 2_2_10041E10
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E11229 push eax; retf 2_2_02E1129A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028D1229 push eax; retf 3_2_028D129A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F81229 push eax; retf 6_2_03F8129A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_041F1229 push eax; retf 7_2_041F129A
Contains functionality to dynamically determine API calls
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_1004D1EA LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer, 2_2_1004D1EA
PE file contains an invalid checksum
Source: MakbLShaqA.dll Static PE information: real checksum: 0xadad1 should be: 0xa7dab

Persistence and Installation Behavior:

barindex
Drops PE files to the windows directory (C:\Windows)
Source: C:\Windows\SysWOW64\rundll32.exe PE file moved: C:\Windows\SysWOW64\Sxdbowjvh\qaursesh.cky Jump to behavior

Hooking and other Techniques for Hiding and Protection:

barindex
Hides that the sample has been downloaded from the Internet (zone.identifier)
Source: C:\Windows\SysWOW64\rundll32.exe File opened: C:\Windows\SysWOW64\Sxdbowjvh\qaursesh.cky:Zone.Identifier read attributes | delete Jump to behavior
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_1000C188 IsIconic,GetWindowPlacement,GetWindowRect, 2_2_1000C188
Source: C:\Windows\SysWOW64\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Windows\System32\svchost.exe TID: 5680 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2908 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6180 Thread sleep time: -30000s >= -30000s Jump to behavior
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Windows\System32\loaddll32.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Queries disk information (often used to detect virtual machines)
Source: C:\Windows\System32\svchost.exe File opened: PhysicalDrive0 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_100331CA __EH_prolog3_GS,GetFullPathNameA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA, 2_2_100331CA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04201A80 FindFirstFileW, 7_2_04201A80
Source: C:\Windows\SysWOW64\rundll32.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: svchost.exe, 0000000A.00000002.539081571.00000275BC262000.00000004.00000001.sdmp Binary or memory string: @Hyper-V RAW
Source: rundll32.exe, 00000007.00000002.643460255.0000000002979000.00000004.00000001.sdmp, rundll32.exe, 00000007.00000003.269137604.0000000002977000.00000004.00000001.sdmp, svchost.exe, 0000000A.00000002.538766604.00000275B6A29000.00000004.00000001.sdmp, svchost.exe, 0000000A.00000002.539065871.00000275BC24C000.00000004.00000001.sdmp, svchost.exe, 00000019.00000002.388458543.000002854C213000.00000004.00000001.sdmp, svchost.exe, 00000019.00000003.386773119.000002854C27D000.00000004.00000001.sdmp, svchost.exe, 00000019.00000002.388692192.000002854C2ED000.00000004.00000001.sdmp, svchost.exe, 00000019.00000002.388621892.000002854C27D000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW
Source: rundll32.exe, 00000007.00000002.643375653.0000000002954000.00000004.00000020.sdmp Binary or memory string: Hyper-V RAW
Source: svchost.exe, 0000000C.00000002.642318002.000001E5D943E000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000002.642209081.0000026710C2A000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

Anti Debugging:

barindex
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_100441C0 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 2_2_100441C0
Contains functionality to dynamically determine API calls
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_1004D1EA LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer, 2_2_1004D1EA
Contains functionality to read the PEB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_02E2DE10 mov eax, dword ptr fs:[00000030h] 2_2_02E2DE10
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_028EDE10 mov eax, dword ptr fs:[00000030h] 3_2_028EDE10
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03F9DE10 mov eax, dword ptr fs:[00000030h] 6_2_03F9DE10
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0420DE10 mov eax, dword ptr fs:[00000030h] 7_2_0420DE10
Checks if the current process is being debugged
Source: C:\Windows\System32\loaddll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_100441C0 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 2_2_100441C0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_1004A1EC __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 2_2_1004A1EC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_1003F29E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 2_2_1003F29E

HIPS / PFW / Operating System Protection Evasion:

barindex
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 51.178.61.60 187 Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\MakbLShaqA.dll",#1 Jump to behavior
Source: rundll32.exe, 00000007.00000002.643780071.0000000002DE0000.00000002.00020000.sdmp Binary or memory string: Shell_TrayWnd
Source: rundll32.exe, 00000007.00000002.643780071.0000000002DE0000.00000002.00020000.sdmp Binary or memory string: Progman
Source: rundll32.exe, 00000007.00000002.643780071.0000000002DE0000.00000002.00020000.sdmp Binary or memory string: SProgram Managerl
Source: rundll32.exe, 00000007.00000002.643780071.0000000002DE0000.00000002.00020000.sdmp Binary or memory string: Shell_TrayWnd,
Source: rundll32.exe, 00000007.00000002.643780071.0000000002DE0000.00000002.00020000.sdmp Binary or memory string: Progmanlock

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a device
Source: C:\Windows\SysWOW64\rundll32.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Contains functionality to query locales information (e.g. system language)
Source: C:\Windows\SysWOW64\rundll32.exe Code function: _strcpy_s,GetLocaleInfoA,__snwprintf_s,LoadLibraryA, 2_2_100199B4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetLocaleInfoA, 2_2_1004DE0C
Source: C:\Windows\SysWOW64\rundll32.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_10048D61 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter, 2_2_10048D61
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_1000BFE6 _memset,GetVersionExA, 2_2_1000BFE6

Lowering of HIPS / PFW / Operating System Security Settings:

barindex
Changes security center settings (notifications, updates, antivirus, firewall)
Source: C:\Windows\System32\svchost.exe Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cval Jump to behavior
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Source: C:\Windows\System32\svchost.exe WMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
Source: C:\Windows\System32\svchost.exe WMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
Source: C:\Windows\System32\svchost.exe WMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
Source: C:\Windows\System32\svchost.exe WMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct
AV process strings found (often used to terminate AV products)
Source: svchost.exe, 00000010.00000002.642285823.0000026DDEC40000.00000004.00000001.sdmp Binary or memory string: ,@V%ProgramFiles%\Windows Defender\MsMpeng.exe
Source: svchost.exe, 00000010.00000002.642210089.0000026DDEC13000.00000004.00000001.sdmp, svchost.exe, 00000010.00000002.642388993.0000026DDED02000.00000004.00000001.sdmp, svchost.exe, 00000010.00000002.642236431.0000026DDEC29000.00000004.00000001.sdmp Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe

Stealing of Sensitive Information:

barindex
Yara detected Emotet
Source: Yara match File source: 7.2.rundll32.exe.4eb0000.16.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.4bc0000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4bc0000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4900000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4eb0000.16.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4820000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.28a0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.2730000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.2b90000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.28a0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.2.rundll32.exe.3f50000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.4ae0000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.2de0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4da0000.14.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4900000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.4ec0000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.4e60000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.4e60000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4820000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4b60000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.4bc0000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4ca0000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.2730000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.2b90000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4da0000.14.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.5030000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4ca0000.12.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4b60000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.4ae0000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4bc0000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.4ec0000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.2.rundll32.exe.3f50000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.2de0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.5030000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000007.00000002.644665975.0000000004820000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.642932572.0000000002730000.00000040.00000010.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.645532661.0000000004CA0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.251093887.0000000005030000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.645241270.0000000004BC0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.248189238.00000000028A0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.250243016.0000000002DE0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.250730251.0000000004BC0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.645897262.0000000004EB0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.252637909.0000000003F50000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.250606997.0000000004AE0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.644831234.0000000004900000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.251012589.0000000004EC0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.643684713.0000000002B90000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.645743036.0000000004DA0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.250937948.0000000004E60000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.645105513.0000000004B60000.00000040.00000001.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs