Loading ...

Play interactive tourEdit tour

Windows Analysis Report mal.dll

Overview

General Information

Sample Name:mal.dll
Analysis ID:532106
MD5:9efbd03d5576686dd9f0678c09abe9fc
SHA1:0b821e78137018bbf3f9c67d3b049e33d5b36ae5
SHA256:972f9350219dcc2df463f923ec5b559f4ab69f083da9ccbd0976c51bc19f3f5b
Infos:

Most interesting Screenshot:

Detection

Emotet
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Emotet
Sigma detected: Emotet RunDLL32 Process Creation
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Deletes files inside the Windows folder
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Abnormal high CPU Usage
Creates a DirectInput object (often for capturing keystrokes)
AV process strings found (often used to terminate AV products)
Contains functionality to read the PEB
Drops PE files to the windows directory (C:\Windows)
Checks if the current process is being debugged
Connects to several IPs in different countries
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • loaddll32.exe (PID: 6880 cmdline: loaddll32.exe "C:\Users\user\Desktop\mal.dll" MD5: 72FCD8FB0ADC38ED9050569AD673650E)
    • cmd.exe (PID: 6896 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\mal.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 6932 cmdline: rundll32.exe "C:\Users\user\Desktop\mal.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • rundll32.exe (PID: 2600 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\mal.dll",Control_RunDLL MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6920 cmdline: rundll32.exe C:\Users\user\Desktop\mal.dll,Control_RunDLL MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • rundll32.exe (PID: 6464 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Lxelxho\ggoife.qjv",clLaoeKXf MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • rundll32.exe (PID: 5960 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Lxelxho\ggoife.qjv",Control_RunDLL MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 7016 cmdline: rundll32.exe C:\Users\user\Desktop\mal.dll,axamexdrqyrgb MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • rundll32.exe (PID: 4972 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\mal.dll",Control_RunDLL MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 7032 cmdline: rundll32.exe C:\Users\user\Desktop\mal.dll,bhramccfbdd MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • rundll32.exe (PID: 5532 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\mal.dll",Control_RunDLL MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • WerFault.exe (PID: 5528 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6880 -s 304 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • WerFault.exe (PID: 1744 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6880 -s 324 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • svchost.exe (PID: 5672 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • WerFault.exe (PID: 5648 cmdline: C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6880 -ip 6880 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • WerFault.exe (PID: 4588 cmdline: C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 6880 -ip 6880 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • svchost.exe (PID: 5400 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 7116 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup

Malware Configuration

Threatname: Emotet

{"C2 list": ["46.55.222.11:443", "104.245.52.73:8080", "41.76.108.46:8080", "103.8.26.103:8080", "185.184.25.237:8080", "103.8.26.102:8080", "203.114.109.124:443", "45.118.115.99:8080", "178.79.147.66:8080", "58.227.42.236:80", "45.118.135.203:7080", "103.75.201.2:443", "195.154.133.20:443", "45.142.114.231:8080", "212.237.5.209:443", "207.38.84.195:8080", "104.251.214.46:8080", "212.237.17.99:8080", "212.237.56.116:7080", "216.158.226.206:443", "110.232.117.186:8080", "158.69.222.101:443", "107.182.225.142:8080", "176.104.106.96:8080", "81.0.236.90:443", "50.116.54.215:443", "138.185.72.26:8080", "51.68.175.8:8080", "210.57.217.132:8080"], "Public Key": ["RUNLMSAAAADzozW1Di4r9DVWzQpMKT588RDdy7BPILP6AiDOTLYMHkSWvrQO5slbmr1OvZ2Pz+AQWzRMggQmAtO6rPH7nyx2", "RUNTMSAAAABAX3S2xNjcDD0fBno33Ln5t71eii+mofIPoXkNFOX1MeiwCh48iz97kB0mJjGGZXwardnDXKxI8GCHGNl0PFj5"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000000.1037130438.0000000000CF0000.00000040.00000010.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000008.00000002.1168490551.0000000002D7A000.00000004.00000020.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000000.00000000.1063275616.0000000000E8C000.00000004.00000020.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000000.00000000.1035699542.0000000000CF0000.00000040.00000010.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000002.00000002.1028366032.0000000000800000.00000040.00000010.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 15 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.0.loaddll32.exe.cf0000.6.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              5.2.rundll32.exe.4af0000.1.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                4.2.rundll32.exe.3070000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  3.2.rundll32.exe.2cc0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    0.2.loaddll32.exe.cf0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 33 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Emotet RunDLL32 Process CreationShow sources
                      Source: Process startedAuthor: FPT.EagleEye: Data: Command: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Lxelxho\ggoife.qjv",Control_RunDLL, CommandLine: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Lxelxho\ggoife.qjv",Control_RunDLL, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Lxelxho\ggoife.qjv",clLaoeKXf, ParentImage: C:\Windows\SysWOW64\rundll32.exe, ParentProcessId: 6464, ProcessCommandLine: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Lxelxho\ggoife.qjv",Control_RunDLL, ProcessId: 5960

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 0.0.loaddll32.exe.cf0000.0.unpackMalware Configuration Extractor: Emotet {"C2 list": ["46.55.222.11:443", "104.245.52.73:8080", "41.76.108.46:8080", "103.8.26.103:8080", "185.184.25.237:8080", "103.8.26.102:8080", "203.114.109.124:443", "45.118.115.99:8080", "178.79.147.66:8080", "58.227.42.236:80", "45.118.135.203:7080", "103.75.201.2:443", "195.154.133.20:443", "45.142.114.231:8080", "212.237.5.209:443", "207.38.84.195:8080", "104.251.214.46:8080", "212.237.17.99:8080", "212.237.56.116:7080", "216.158.226.206:443", "110.232.117.186:8080", "158.69.222.101:443", "107.182.225.142:8080", "176.104.106.96:8080", "81.0.236.90:443", "50.116.54.215:443", "138.185.72.26:8080", "51.68.175.8:8080", "210.57.217.132:8080"], "Public Key": ["RUNLMSAAAADzozW1Di4r9DVWzQpMKT588RDdy7BPILP6AiDOTLYMHkSWvrQO5slbmr1OvZ2Pz+AQWzRMggQmAtO6rPH7nyx2", "RUNTMSAAAABAX3S2xNjcDD0fBno33Ln5t71eii+mofIPoXkNFOX1MeiwCh48iz97kB0mJjGGZXwardnDXKxI8GCHGNl0PFj5"]}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: mal.dllReversingLabs: Detection: 24%
                      Source: mal.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
                      Source: mal.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: wgdi32full.pdb source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wkernel32.pdb source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1049802183.00000000047F5000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1049850870.0000000000D21000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1050065549.0000000000D21000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wkernelbase.pdb source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1050075392.0000000000D27000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1050252512.0000000000D27000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1049856280.0000000000D27000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wimm32.pdb source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 0000000D.00000003.1050075392.0000000000D27000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1050252512.0000000000D27000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1049856280.0000000000D27000.00000004.00000001.sdmp
                      Source: Binary string: wwin32u.pdb source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1049845754.0000000000D1B000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1050441546.0000000000D1B000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wkernel32.pdb( source: WerFault.exe, 0000000D.00000003.1049850870.0000000000D21000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1050065549.0000000000D21000.00000004.00000001.sdmp
                      Source: Binary string: apphelp.pdb source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: upwntdll.pdb source: WerFault.exe, 0000000F.00000003.1068429245.00000000005AC000.00000004.00000001.sdmp
                      Source: Binary string: wuser32.pdb source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdbk source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wgdi32.pdb source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: a`ojrcoCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 0000000D.00000002.1060706786.0000000000732000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb( source: WerFault.exe, 0000000D.00000003.1049845754.0000000000D1B000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1050441546.0000000000D1B000.00000004.00000001.sdmp
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E572FE7 FindFirstFileExW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E572FE7 FindFirstFileExW,

                      Networking:

                      barindex
                      C2 URLs / IPs found in malware configurationShow sources
                      Source: Malware configuration extractorIPs: 46.55.222.11:443
                      Source: Malware configuration extractorIPs: 104.245.52.73:8080
                      Source: Malware configuration extractorIPs: 41.76.108.46:8080
                      Source: Malware configuration extractorIPs: 103.8.26.103:8080
                      Source: Malware configuration extractorIPs: 185.184.25.237:8080
                      Source: Malware configuration extractorIPs: 103.8.26.102:8080
                      Source: Malware configuration extractorIPs: 203.114.109.124:443
                      Source: Malware configuration extractorIPs: 45.118.115.99:8080
                      Source: Malware configuration extractorIPs: 178.79.147.66:8080
                      Source: Malware configuration extractorIPs: 58.227.42.236:80
                      Source: Malware configuration extractorIPs: 45.118.135.203:7080
                      Source: Malware configuration extractorIPs: 103.75.201.2:443
                      Source: Malware configuration extractorIPs: 195.154.133.20:443
                      Source: Malware configuration extractorIPs: 45.142.114.231:8080
                      Source: Malware configuration extractorIPs: 212.237.5.209:443
                      Source: Malware configuration extractorIPs: 207.38.84.195:8080
                      Source: Malware configuration extractorIPs: 104.251.214.46:8080
                      Source: Malware configuration extractorIPs: 212.237.17.99:8080
                      Source: Malware configuration extractorIPs: 212.237.56.116:7080
                      Source: Malware configuration extractorIPs: 216.158.226.206:443
                      Source: Malware configuration extractorIPs: 110.232.117.186:8080
                      Source: Malware configuration extractorIPs: 158.69.222.101:443
                      Source: Malware configuration extractorIPs: 107.182.225.142:8080
                      Source: Malware configuration extractorIPs: 176.104.106.96:8080
                      Source: Malware configuration extractorIPs: 81.0.236.90:443
                      Source: Malware configuration extractorIPs: 50.116.54.215:443
                      Source: Malware configuration extractorIPs: 138.185.72.26:8080
                      Source: Malware configuration extractorIPs: 51.68.175.8:8080
                      Source: Malware configuration extractorIPs: 210.57.217.132:8080
                      Source: Joe Sandbox ViewASN Name: OnlineSASFR OnlineSASFR
                      Source: Joe Sandbox ViewASN Name: ARUBA-ASNIT ARUBA-ASNIT
                      Source: Joe Sandbox ViewIP Address: 195.154.133.20 195.154.133.20
                      Source: Joe Sandbox ViewIP Address: 212.237.17.99 212.237.17.99
                      Source: unknownNetwork traffic detected: IP country count 18
                      Source: WerFault.exe, 0000000F.00000002.1099269166.0000000000DEB000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1097471671.0000000000DDA000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1097559454.0000000000DEA000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: Amcache.hve.13.drString found in binary or memory: http://upx.sf.net
                      Source: loaddll32.exe, 00000000.00000000.1063245558.0000000000E7B000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                      E-Banking Fraud:

                      barindex
                      Yara detected EmotetShow sources
                      Source: Yara matchFile source: 0.0.loaddll32.exe.cf0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4af0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.3070000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.2cc0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.cf0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.a90000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.3070000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.cf0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.cf0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.2cc0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.cf0000.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.cf0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.800000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.3122140.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.2d93550.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.31935d0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.e947d0.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.e947d0.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.e947d0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.e947d0.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.a90000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.e947d0.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.cf0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.e947d0.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.800000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.3122140.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.e947d0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4af0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.31935d0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.e947d0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.2e634f0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.2d93550.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.cf0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.cf0000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.cf0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.e947d0.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.e947d0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.2e634f0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.1037130438.0000000000CF0000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.1168490551.0000000002D7A000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1063275616.0000000000E8C000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1035699542.0000000000CF0000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.1028366032.0000000000800000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1035861580.0000000004AF0000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1033480524.000000000310A000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000003.971608734.0000000002CD9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1063104639.0000000000CF0000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1031543020.0000000002E63000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1035947080.0000000000E8C000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1035732972.0000000003193000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1033332210.0000000003070000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.1167572272.0000000000A90000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1100911301.0000000000E8C000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1064906650.0000000000CF0000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1037359091.0000000000E8C000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1100727595.0000000000CF0000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1023539885.0000000002CC0000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1065208047.0000000000E8C000.00000004.00000020.sdmp, type: MEMORY

                      System Summary:

                      barindex
                      Source: mal.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6880 -ip 6880
                      Source: C:\Windows\SysWOW64\rundll32.exeFile deleted: C:\Windows\SysWOW64\Lxelxho\ggoife.qjv:Zone.IdentifierJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\SysWOW64\Lxelxho\Jump to behavior
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E55A6D0
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E55E6E0
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E5566E0
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E555EA0
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E560F10
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E551C10
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E559D50
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E5575F4
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E570A61
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E55D380
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E5538C0
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E5601D0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_008156A9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0080AEB9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_008206EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0081BA18
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0081604E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0081ED95
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0081E7DA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_008189DA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_008191F7
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00808112
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00805314
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00813130
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00808D59
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0080196D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00802B7C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00803085
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0080F699
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0080D899
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0080C69B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_008104A4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0080F4A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_008068AD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0081B0BA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00813ABE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_008054C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00820AD3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00817EDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0080A8E8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0080BEF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_008220F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0080E6FD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0080F20D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00811C12
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00822C16
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00810824
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00810A37
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00803E3B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0081CC3F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0081645F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00820C66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00821C71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0081E478
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0080F984
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00821987
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00807D87
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0080938F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00816B91
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0081BFA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_008177A7
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_008033A9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00805DC3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_008039C3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00814DC5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00810FC5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00802DC5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_008113DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_008235E3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0080B7EC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0080FBEF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00801DF9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00806BFE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0081D5FE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00823306
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0081D10B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0081710D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00804716
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00818518
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00806125
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0081CF2C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0080B12E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0080E336
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00807739
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0081473A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00804F42
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0081C145
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0082314A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00822D4F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0080635F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0081F561
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00822560
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00809565
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00805166
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0080DD66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0080996C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0081C772
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00802575
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00802176
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00815B7C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0080597D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E55A6D0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E55E6E0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E5566E0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E555EA0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E560F10
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E551C10
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E559D50
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E5575F4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E570A61
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E55D380
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E5538C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E5601D0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CE06EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CDED95
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC54C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CD7EDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CE0AD3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CCA8E8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CCE6FD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CE20F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CCBEF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC3085
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CCF699
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CCD899
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CCC69B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CD56A9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CD04A4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CCF4A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CD3ABE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CCAEB9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CDB0BA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CD604E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CD645F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CE0C66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CDE478
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CE1C71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CCF20D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CDBA18
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CE2C16
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CD1C12
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CD0824
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CDCC3F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC3E3B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CD0A37
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CD4DC5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CD0FC5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC2DC5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC5DC3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC39C3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CD13DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CDE7DA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CD89DA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CCB7EC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CCFBEF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CE35E3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC6BFE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CDD5FE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC1DF9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CD91F7
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC938F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CCF984
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CE1987
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC7D87
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CD6B91
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC33A9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CD77A7
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CDBFA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CE2D4F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CE314A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CDC145
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC4F42
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC635F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC8D59
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC996C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC196D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC9565
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC5166
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CCDD66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CDF561
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CE2560
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC2B7C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CD5B7C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC597D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC2575
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC2176
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CDC772
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CD710D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CDD10B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CE3306
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CD8518
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC5314
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC4716
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC8112
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CDCF2C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CCB12E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC6125
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC7739
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CD473A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CCE336
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CD3130
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B106EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B0ED95
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B0B0BA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AFF4A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B03ABE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B004A4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AFAEB9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B056A9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF3085
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AFC69B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AFF699
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AFD899
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AFA8E8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B120F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AFE6FD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AFBEF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B10AD3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B07EDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF54C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B00A37
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B0CC3F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B00824
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF3E3B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AFF20D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B01C12
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B12C16
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B0BA18
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B11C71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B0E478
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B10C66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B0645F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B0604E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF33A9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B0BFA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B077A7
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF938F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B06B91
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF7D87
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AFF984
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B11987
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AFFBEF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AFB7EC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B091F7
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B0D5FE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF6BFE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B135E3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF1DF9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B0E7DA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF2DC5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B089DA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B013DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF5DC3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF39C3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B04DC5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B00FC5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B03130
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AFB12E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B0473A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF6125
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF7739
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AFE336
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B0CF2C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B08518
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B13306
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF4716
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B0D10B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF5314
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF8112
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B0710D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B0C772
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF196D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF996C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF5166
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AFDD66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF9565
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B05B7C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B0F561
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B12560
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF597D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF2B7C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF2176
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF2575
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF4F42
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF635F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B0C145
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF8D59
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B1314A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B12D4F
                      Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6E551C10 appears 97 times
                      Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6E56D350 appears 33 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6E551C10 appears 97 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6E56D350 appears 33 times
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess Stats: CPU usage > 98%
                      Source: mal.dllReversingLabs: Detection: 24%
                      Source: mal.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\mal.dll"
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\mal.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mal.dll,Control_RunDLL
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\mal.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mal.dll,axamexdrqyrgb
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mal.dll,bhramccfbdd
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\mal.dll",Control_RunDLL
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Lxelxho\ggoife.qjv",clLaoeKXf
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\mal.dll",Control_RunDLL
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\mal.dll",Control_RunDLL
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6880 -ip 6880
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6880 -s 304
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 6880 -ip 6880
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6880 -s 324
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Lxelxho\ggoife.qjv",Control_RunDLL
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\mal.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mal.dll,Control_RunDLL
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mal.dll,axamexdrqyrgb
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mal.dll,bhramccfbdd
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\mal.dll",#1
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Lxelxho\ggoife.qjv",clLaoeKXf
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\mal.dll",Control_RunDLL
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\mal.dll",Control_RunDLL
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\mal.dll",Control_RunDLL
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Lxelxho\ggoife.qjv",Control_RunDLL
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6880 -ip 6880
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6880 -s 304
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 6880 -ip 6880
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6880 -s 324
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
                      Source: C:\Windows\System32\svchost.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER2338.tmpJump to behavior
                      Source: classification engineClassification label: mal80.troj.evad.winDLL@34/14@0/29
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\mal.dll,Control_RunDLL
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6880
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:4588:64:WilError_01
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:5648:64:WilError_01
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
                      Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
                      Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
                      Source: mal.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: mal.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: wgdi32full.pdb source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wkernel32.pdb source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1049802183.00000000047F5000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1049850870.0000000000D21000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1050065549.0000000000D21000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wkernelbase.pdb source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1050075392.0000000000D27000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1050252512.0000000000D27000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1049856280.0000000000D27000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wimm32.pdb source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 0000000D.00000003.1050075392.0000000000D27000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1050252512.0000000000D27000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1049856280.0000000000D27000.00000004.00000001.sdmp
                      Source: Binary string: wwin32u.pdb source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1049845754.0000000000D1B000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1050441546.0000000000D1B000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wkernel32.pdb( source: WerFault.exe, 0000000D.00000003.1049850870.0000000000D21000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1050065549.0000000000D21000.00000004.00000001.sdmp
                      Source: Binary string: apphelp.pdb source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: upwntdll.pdb source: WerFault.exe, 0000000F.00000003.1068429245.00000000005AC000.00000004.00000001.sdmp
                      Source: Binary string: wuser32.pdb source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdbk source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wgdi32.pdb source: WerFault.exe, 0000000D.00000003.1053120370.0000000004B71000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1073164228.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: a`ojrcoCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 0000000D.00000002.1060706786.0000000000732000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb( source: WerFault.exe, 0000000D.00000003.1049845754.0000000000D1B000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.1050441546.0000000000D1B000.00000004.00000001.sdmp
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E579153 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0080150F push ds; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_0080151C push ds; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E579153 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC150F push ds; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CC151C push ds; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF150F push ds; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04AF151C push ds; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E55E4E0 WaitForSingleObjectEx,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,CreateMutexA,CloseHandle,ReleaseMutex,
                      Source: C:\Windows\SysWOW64\rundll32.exePE file moved: C:\Windows\SysWOW64\Lxelxho\ggoife.qjvJump to behavior

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\Lxelxho\ggoife.qjv:Zone.Identifier read attributes | delete
                      Source: C:\Windows\SysWOW64\WerFault.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\loaddll32.exeAPI coverage: 6.4 %
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 9.8 %
                      Source: C:\Windows\System32\svchost.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E572FE7 FindFirstFileExW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E572FE7 FindFirstFileExW,
                      Source: C:\Windows\SysWOW64\rundll32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: Amcache.hve.13.drBinary or memory string: VMware
                      Source: Amcache.hve.13.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
                      Source: Amcache.hve.13.drBinary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
                      Source: Amcache.hve.13.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.13.drBinary or memory string: VMware-42 35 9c fb 73 fa 4e 1b-fb a4 60 e7 7b e5 4a ed
                      Source: Amcache.hve.13.drBinary or memory string: VMware, Inc.
                      Source: Amcache.hve.13.drBinary or memory string: VMware Virtual disk SCSI Disk Devicehbin
                      Source: Amcache.hve.13.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.13.drBinary or memory string: VMware7,1
                      Source: Amcache.hve.13.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.13.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: Amcache.hve.13.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.13989454.B64.1906190538,BiosReleaseDate:06/19/2019,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: WerFault.exe, 0000000F.00000003.1097517730.0000000000DAF000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000003.1097471671.0000000000DDA000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000002.1099244090.0000000000DDA000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000002.1099138817.0000000000DAF000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
                      Source: Amcache.hve.13.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.13.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.13.drBinary or memory string: VMware, Inc.me
                      Source: WerFault.exe, 0000000F.00000003.1097471671.0000000000DDA000.00000004.00000001.sdmp, WerFault.exe, 0000000F.00000002.1099244090.0000000000DDA000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW_
                      Source: Amcache.hve.13.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
                      Source: WerFault.exe, 0000000F.00000003.1095876016.0000000000DAF000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: Amcache.hve.13.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E56D1CC IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E55E4E0 WaitForSingleObjectEx,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,CreateMutexA,CloseHandle,ReleaseMutex,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E551290 GetProcessHeap,HeapAlloc,RtlAllocateHeap,HeapFree,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E56C050 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E56BFE0 mov esi, dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E56BFE0 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E5712CB mov ecx, dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E57298C mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00814315 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E56C050 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E56BFE0 mov esi, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E56BFE0 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E5712CB mov ecx, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E57298C mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02CD4315 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04B04315 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E56CB22 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E56D1CC IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E5729E6 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E56CB22 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E56D1CC IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6E5729E6 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\mal.dll",#1
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6880 -ip 6880
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6880 -s 304
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 6880 -ip 6880
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6880 -s 324
                      Source: loaddll32.exe, 00000000.00000000.1063412591.0000000001680000.00000002.00020000.sdmp, loaddll32.exe, 00000000.00000000.1065419464.0000000001680000.00000002.00020000.sdmp, loaddll32.exe, 00000000.00000000.1041457721.0000000001680000.00000002.00020000.sdmp, loaddll32.exe, 00000000.00000000.1036067345.0000000001680000.00000002.00020000.sdmp, rundll32.exe, 00000012.00000002.1193004056.0000000003800000.00000002.00020000.sdmpBinary or memory string: Program Manager
                      Source: loaddll32.exe, 00000000.00000000.1063412591.0000000001680000.00000002.00020000.sdmp, loaddll32.exe, 00000000.00000000.1065419464.0000000001680000.00000002.00020000.sdmp, loaddll32.exe, 00000000.00000000.1041457721.0000000001680000.00000002.00020000.sdmp, loaddll32.exe, 00000000.00000000.1036067345.0000000001680000.00000002.00020000.sdmp, rundll32.exe, 00000012.00000002.1193004056.0000000003800000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: loaddll32.exe, 00000000.00000000.1063412591.0000000001680000.00000002.00020000.sdmp, loaddll32.exe, 00000000.00000000.1065419464.0000000001680000.00000002.00020000.sdmp, loaddll32.exe, 00000000.00000000.1041457721.0000000001680000.00000002.00020000.sdmp, loaddll32.exe, 00000000.00000000.1036067345.0000000001680000.00000002.00020000.sdmp, rundll32.exe, 00000012.00000002.1193004056.0000000003800000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: loaddll32.exe, 00000000.00000000.1063412591.0000000001680000.00000002.00020000.sdmp, loaddll32.exe, 00000000.00000000.1065419464.0000000001680000.00000002.00020000.sdmp, loaddll32.exe, 00000000.00000000.1041457721.0000000001680000.00000002.00020000.sdmp, loaddll32.exe, 00000000.00000000.1036067345.0000000001680000.00000002.00020000.sdmp, rundll32.exe, 00000012.00000002.1193004056.0000000003800000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E56CC44 cpuid
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E56CE15 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
                      Source: Amcache.hve.13.drBinary or memory string: c:\program files\windows defender\msmpeng.exe

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected EmotetShow sources
                      Source: Yara matchFile source: 0.0.loaddll32.exe.cf0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4af0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.3070000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.2cc0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.cf0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.a90000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.3070000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.cf0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.cf0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.2cc0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.cf0000.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.cf0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.800000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.3122140.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.2d93550.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.31935d0.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.e947d0.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.e947d0.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.e947d0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.e947d0.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.a90000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.e947d0.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.cf0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.e947d0.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.800000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.3122140.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.e947d0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4af0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.31935d0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.e947d0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.2e634f0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.2d93550.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.cf0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.cf0000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.cf0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.e947d0.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.e947d0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.2e634f0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.1037130438.0000000000CF0000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.1168490551.0000000002D7A000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1063275616.0000000000E8C000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1035699542.0000000000CF0000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.1028366032.0000000000800000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1035861580.0000000004AF0000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1033480524.000000000310A000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000003.971608734.0000000002CD9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1063104639.0000000000CF0000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1031543020.0000000002E63000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1035947080.0000000000E8C000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1035732972.0000000003193000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1033332210.0000000003070000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.1167572272.0000000000A90000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1100911301.0000000000E8C000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1064906650.0000000000CF0000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1037359091.0000000000E8C000.00000004.00000020.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1100727595.0000000000CF0000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1023539885.0000000002CC0000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1065208047.0000000000E8C000.00000004.00000020.sdmp, type: MEMORY

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsNative API1Path InterceptionProcess Injection12Masquerading2Input Capture1System Time Discovery1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemoryQuery Registry1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection12Security Account ManagerSecurity Software Discovery41SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Deobfuscate/Decode Files or Information1NTDSVirtualization/Sandbox Evasion1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptHidden Files and Directories1LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information2Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsRundll321DCSyncFile and Directory Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobFile Deletion1Proc FilesystemSystem Information Discovery13Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 532106 Sample: mal.dll Startdate: 01/12/2021 Architecture: WINDOWS Score: 80 42 210.57.217.132 UNAIR-AS-IDUniversitasAirlanggaID Indonesia 2->42 44 203.114.109.124 TOT-LLI-AS-APTOTPublicCompanyLimitedTH Thailand 2->44 46 27 other IPs or domains 2->46 50 Sigma detected: Emotet RunDLL32 Process Creation 2->50 52 Found malware configuration 2->52 54 Multi AV Scanner detection for submitted file 2->54 56 2 other signatures 2->56 9 loaddll32.exe 1 2->9         started        11 svchost.exe 3 8 2->11         started        13 svchost.exe 1 2->13         started        15 svchost.exe 1 2->15         started        signatures3 process4 process5 17 rundll32.exe 2 9->17         started        20 cmd.exe 1 9->20         started        22 rundll32.exe 9->22         started        28 3 other processes 9->28 24 WerFault.exe 11->24         started        26 WerFault.exe 11->26         started        signatures6 48 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->48 30 rundll32.exe 17->30         started        32 rundll32.exe 20->32         started        34 rundll32.exe 22->34         started        36 rundll32.exe 28->36         started        process7 process8 38 rundll32.exe 30->38         started        40 rundll32.exe 32->40         started       

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      mal.dll24%ReversingLabsWin32.Trojan.Midie

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      0.0.loaddll32.exe.cf0000.0.unpack100%AviraHEUR/AGEN.1110387Download File
                      4.2.rundll32.exe.3070000.0.unpack100%AviraHEUR/AGEN.1110387Download File
                      0.0.loaddll32.exe.cf0000.3.unpack100%AviraHEUR/AGEN.1110387Download File
                      0.0.loaddll32.exe.cf0000.6.unpack100%AviraHEUR/AGEN.1110387Download File
                      3.2.rundll32.exe.2cc0000.0.unpack100%AviraHEUR/AGEN.1110387Download File
                      2.2.rundll32.exe.800000.0.unpack100%AviraHEUR/AGEN.1110387Download File
                      8.2.rundll32.exe.a90000.0.unpack100%AviraHEUR/AGEN.1110387Download File
                      0.2.loaddll32.exe.cf0000.0.unpack100%AviraHEUR/AGEN.1110387Download File
                      5.2.rundll32.exe.4af0000.1.unpack100%AviraHEUR/AGEN.1110387Download File
                      0.0.loaddll32.exe.cf0000.9.unpack100%AviraHEUR/AGEN.1110387Download File

                      Domains

                      No Antivirus matches

                      URLs

                      No Antivirus matches

                      Domains and IPs

                      Contacted Domains

                      No contacted domains info

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://upx.sf.netAmcache.hve.13.drfalse
                        high

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        195.154.133.20
                        unknownFrance
                        12876OnlineSASFRtrue
                        212.237.17.99
                        unknownItaly
                        31034ARUBA-ASNITtrue
                        110.232.117.186
                        unknownAustralia
                        56038RACKCORP-APRackCorpAUtrue
                        104.245.52.73
                        unknownUnited States
                        63251METRO-WIRELESSUStrue
                        138.185.72.26
                        unknownBrazil
                        264343EmpasoftLtdaMeBRtrue
                        81.0.236.90
                        unknownCzech Republic
                        15685CASABLANCA-ASInternetCollocationProviderCZtrue
                        45.118.115.99
                        unknownIndonesia
                        131717IDNIC-CIFO-AS-IDPTCitraJelajahInformatikaIDtrue
                        103.75.201.2
                        unknownThailand
                        133496CDNPLUSCOLTD-AS-APCDNPLUSCOLTDTHtrue
                        216.158.226.206
                        unknownUnited States
                        19318IS-AS-1UStrue
                        107.182.225.142
                        unknownUnited States
                        32780HOSTINGSERVICES-INCUStrue
                        45.118.135.203
                        unknownJapan63949LINODE-APLinodeLLCUStrue
                        50.116.54.215
                        unknownUnited States
                        63949LINODE-APLinodeLLCUStrue
                        51.68.175.8
                        unknownFrance
                        16276OVHFRtrue
                        103.8.26.102
                        unknownMalaysia
                        132241SKSATECH1-MYSKSATECHNOLOGYSDNBHDMYtrue
                        46.55.222.11
                        unknownBulgaria
                        34841BALCHIKNETBGtrue
                        41.76.108.46
                        unknownSouth Africa
                        327979DIAMATRIXZAtrue
                        103.8.26.103
                        unknownMalaysia
                        132241SKSATECH1-MYSKSATECHNOLOGYSDNBHDMYtrue
                        178.79.147.66
                        unknownUnited Kingdom
                        63949LINODE-APLinodeLLCUStrue
                        212.237.5.209
                        unknownItaly
                        31034ARUBA-ASNITtrue
                        176.104.106.96
                        unknownSerbia
                        198371NINETRStrue
                        207.38.84.195
                        unknownUnited States
                        30083AS-30083-GO-DADDY-COM-LLCUStrue
                        212.237.56.116
                        unknownItaly
                        31034ARUBA-ASNITtrue
                        45.142.114.231
                        unknownGermany
                        44066DE-FIRSTCOLOwwwfirst-colonetDEtrue
                        203.114.109.124
                        unknownThailand
                        131293TOT-LLI-AS-APTOTPublicCompanyLimitedTHtrue
                        210.57.217.132
                        unknownIndonesia
                        38142UNAIR-AS-IDUniversitasAirlanggaIDtrue
                        58.227.42.236
                        unknownKorea Republic of
                        9318SKB-ASSKBroadbandCoLtdKRtrue
                        185.184.25.237
                        unknownTurkey
                        209711MUVHOSTTRtrue
                        158.69.222.101
                        unknownCanada
                        16276OVHFRtrue
                        104.251.214.46
                        unknownUnited States
                        54540INCERO-HVVCUStrue

                        General Information

                        Joe Sandbox Version:34.0.0 Boulder Opal
                        Analysis ID:532106
                        Start date:01.12.2021
                        Start time:18:21:41
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 13m 24s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:mal.dll
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:21
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal80.troj.evad.winDLL@34/14@0/29
                        EGA Information:
                        • Successful, ratio: 100%
                        HDC Information:
                        • Successful, ratio: 18.7% (good quality ratio 17.9%)
                        • Quality average: 71.6%
                        • Quality standard deviation: 24.8%
                        HCA Information:
                        • Successful, ratio: 80%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Found application associated with file extension: .dll
                        • Override analysis time to 240s for rundll32
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe
                        • Excluded IPs from analysis (whitelisted): 52.182.143.212
                        • Excluded domains from analysis (whitelisted): onedsblobprdcus15.centralus.cloudapp.azure.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, watson.telemetry.microsoft.com, arc.msn.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: /opt/package/joesandbox/database/analysis/532106/sample/mal.dll

                        Simulations

                        Behavior and APIs

                        TimeTypeDescription
                        18:25:59API Interceptor1x Sleep call for process: WerFault.exe modified

                        Joe Sandbox View / Context

                        IPs

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        195.154.133.202gyA5uNl6VPQUA.dllGet hashmaliciousBrowse
                          2gyA5uNl6VPQUA.dllGet hashmaliciousBrowse
                            9sQccNfqAR.dllGet hashmaliciousBrowse
                              FILE_464863409880121918.xlsmGet hashmaliciousBrowse
                                9sQccNfqAR.dllGet hashmaliciousBrowse
                                  t3XtgyQEoe.dllGet hashmaliciousBrowse
                                    t3XtgyQEoe.dllGet hashmaliciousBrowse
                                      SCAN_35292280954166786.xlsmGet hashmaliciousBrowse
                                        U4pi8WRxNJ.dllGet hashmaliciousBrowse
                                          oERkAQeB4d.dllGet hashmaliciousBrowse
                                            FC9fpZrma1.dllGet hashmaliciousBrowse
                                              Z4HpRSQD6I.dllGet hashmaliciousBrowse
                                                uLCt7sc5se.dllGet hashmaliciousBrowse
                                                  rGF1Xgw9Il.dllGet hashmaliciousBrowse
                                                    nBtjFS1D08.dllGet hashmaliciousBrowse
                                                      q8HPR8Yypk.dllGet hashmaliciousBrowse
                                                        mZuFa05xCp.dllGet hashmaliciousBrowse
                                                          TEm3oBxeXS.dllGet hashmaliciousBrowse
                                                            ma9Kq24IDH.dllGet hashmaliciousBrowse
                                                              212.237.17.99mal2.dllGet hashmaliciousBrowse
                                                                2gyA5uNl6VPQUA.dllGet hashmaliciousBrowse
                                                                  2gyA5uNl6VPQUA.dllGet hashmaliciousBrowse
                                                                    9sQccNfqAR.dllGet hashmaliciousBrowse
                                                                      FILE_464863409880121918.xlsmGet hashmaliciousBrowse
                                                                        9sQccNfqAR.dllGet hashmaliciousBrowse
                                                                          t3XtgyQEoe.dllGet hashmaliciousBrowse
                                                                            t3XtgyQEoe.dllGet hashmaliciousBrowse
                                                                              SCAN_35292280954166786.xlsmGet hashmaliciousBrowse
                                                                                U4pi8WRxNJ.dllGet hashmaliciousBrowse
                                                                                  oERkAQeB4d.dllGet hashmaliciousBrowse
                                                                                    FC9fpZrma1.dllGet hashmaliciousBrowse
                                                                                      Z4HpRSQD6I.dllGet hashmaliciousBrowse
                                                                                        uLCt7sc5se.dllGet hashmaliciousBrowse
                                                                                          rGF1Xgw9Il.dllGet hashmaliciousBrowse
                                                                                            nBtjFS1D08.dllGet hashmaliciousBrowse
                                                                                              q8HPR8Yypk.dllGet hashmaliciousBrowse
                                                                                                mZuFa05xCp.dllGet hashmaliciousBrowse
                                                                                                  TEm3oBxeXS.dllGet hashmaliciousBrowse
                                                                                                    ma9Kq24IDH.dllGet hashmaliciousBrowse

                                                                                                      Domains

                                                                                                      No context

                                                                                                      ASN

                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                      ARUBA-ASNITGYRxsMXKtvwSwhoreniggagay.dllGet hashmaliciousBrowse
                                                                                                      • 94.177.217.88
                                                                                                      KsXtuXmxoZvgudVwhoreniggagay.dllGet hashmaliciousBrowse
                                                                                                      • 94.177.217.88
                                                                                                      xTpcaEZvwmHqwhoreniggagay.dllGet hashmaliciousBrowse
                                                                                                      • 94.177.217.88
                                                                                                      mal2.dllGet hashmaliciousBrowse
                                                                                                      • 212.237.56.116
                                                                                                      GYRxsMXKtvwSwhoreniggagay.dllGet hashmaliciousBrowse
                                                                                                      • 94.177.217.88
                                                                                                      KsXtuXmxoZvgudVwhoreniggagay.dllGet hashmaliciousBrowse
                                                                                                      • 94.177.217.88
                                                                                                      xTpcaEZvwmHqwhoreniggagay.dllGet hashmaliciousBrowse
                                                                                                      • 94.177.217.88
                                                                                                      invoice template 33142738819.docxGet hashmaliciousBrowse
                                                                                                      • 94.177.217.88
                                                                                                      2gyA5uNl6VPQUA.dllGet hashmaliciousBrowse
                                                                                                      • 212.237.56.116
                                                                                                      2gyA5uNl6VPQUA.dllGet hashmaliciousBrowse
                                                                                                      • 212.237.56.116
                                                                                                      9sQccNfqAR.dllGet hashmaliciousBrowse
                                                                                                      • 212.237.56.116
                                                                                                      FILE_464863409880121918.xlsmGet hashmaliciousBrowse
                                                                                                      • 212.237.56.116
                                                                                                      9sQccNfqAR.dllGet hashmaliciousBrowse
                                                                                                      • 212.237.56.116
                                                                                                      t3XtgyQEoe.dllGet hashmaliciousBrowse
                                                                                                      • 212.237.56.116
                                                                                                      t3XtgyQEoe.dllGet hashmaliciousBrowse
                                                                                                      • 212.237.56.116
                                                                                                      QUOTATION FORM.exeGet hashmaliciousBrowse
                                                                                                      • 62.149.128.45
                                                                                                      MA4UA3e5xeGet hashmaliciousBrowse
                                                                                                      • 46.37.10.252
                                                                                                      SCAN_35292280954166786.xlsmGet hashmaliciousBrowse
                                                                                                      • 212.237.56.116
                                                                                                      seL794VuEmGet hashmaliciousBrowse
                                                                                                      • 31.14.139.79
                                                                                                      b6GJG5t0kgGet hashmaliciousBrowse
                                                                                                      • 31.14.139.51
                                                                                                      OnlineSASFRmal2.dllGet hashmaliciousBrowse
                                                                                                      • 195.154.133.20
                                                                                                      2gyA5uNl6VPQUA.dllGet hashmaliciousBrowse
                                                                                                      • 195.154.133.20
                                                                                                      2gyA5uNl6VPQUA.dllGet hashmaliciousBrowse
                                                                                                      • 195.154.133.20
                                                                                                      spZRMihlrkFGqYq1f.dllGet hashmaliciousBrowse
                                                                                                      • 195.154.146.35
                                                                                                      spZRMihlrkFGqYq1f.dllGet hashmaliciousBrowse
                                                                                                      • 195.154.146.35
                                                                                                      AtlanticareINV25-67431254.htmGet hashmaliciousBrowse
                                                                                                      • 51.15.17.195
                                                                                                      9sQccNfqAR.dllGet hashmaliciousBrowse
                                                                                                      • 195.154.133.20
                                                                                                      FILE_464863409880121918.xlsmGet hashmaliciousBrowse
                                                                                                      • 195.154.133.20
                                                                                                      9sQccNfqAR.dllGet hashmaliciousBrowse
                                                                                                      • 195.154.133.20
                                                                                                      t3XtgyQEoe.dllGet hashmaliciousBrowse
                                                                                                      • 195.154.133.20
                                                                                                      t3XtgyQEoe.dllGet hashmaliciousBrowse
                                                                                                      • 195.154.133.20
                                                                                                      67MPsax8fd.exeGet hashmaliciousBrowse
                                                                                                      • 163.172.208.8
                                                                                                      Linux_x86Get hashmaliciousBrowse
                                                                                                      • 212.83.174.79
                                                                                                      184285013-044310-Factura pendiente (2).exeGet hashmaliciousBrowse
                                                                                                      • 212.83.130.20
                                                                                                      MTjXit7IJnGet hashmaliciousBrowse
                                                                                                      • 51.158.219.54
                                                                                                      SCAN_35292280954166786.xlsmGet hashmaliciousBrowse
                                                                                                      • 195.154.133.20
                                                                                                      gvtdsqavfej.dllGet hashmaliciousBrowse
                                                                                                      • 195.154.146.35
                                                                                                      mhOX6jll6x.dllGet hashmaliciousBrowse
                                                                                                      • 195.154.146.35
                                                                                                      dguQYT8p8j.dllGet hashmaliciousBrowse
                                                                                                      • 195.154.146.35
                                                                                                      jSxIzXfwc7.dllGet hashmaliciousBrowse
                                                                                                      • 195.154.146.35

                                                                                                      JA3 Fingerprints

                                                                                                      No context

                                                                                                      Dropped Files

                                                                                                      No context

                                                                                                      Created / dropped Files

                                                                                                      C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_88e9c9cb640b4f665f2020b110738337d7578_d70d8aa6_142e078f\Report.wer
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):65536
                                                                                                      Entropy (8bit):0.6740916034847534
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:96:BiarZqyfy9hkoyt7Jf0pXIQcQ5c6A2cE2cw33+a+z+HbHgOVG4rmMOyWZAXGng5p:1BAHnM28jjSq/u7sKS274ItW
                                                                                                      MD5:8B6CC0A8CD57C51E59BCC26286FE9080
                                                                                                      SHA1:C24D429F56E4F385E3069AC93DF2D778E2CE7DDF
                                                                                                      SHA-256:577C96830F420FD747CA70FDB590467989DDF046C194AF2E3C601061DF8DA0C5
                                                                                                      SHA-512:C84F43C71F18D660DA7903E3DF40A8A421A22156D658BF480B4D3CA54D1CEA6FED216E8737018F98236B5D760C805DDF1118555607EC9073CC28DBFAD6EAD8D4
                                                                                                      Malicious:false
                                                                                                      Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.8.2.8.5.3.1.3.8.0.2.7.7.6.0.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.8.e.3.9.8.9.7.-.4.3.8.0.-.4.b.3.9.-.9.7.b.c.-.f.a.8.0.f.7.6.7.e.d.e.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.0.6.9.5.f.7.c.-.e.b.d.0.-.4.d.a.6.-.b.3.5.7.-.6.4.6.2.3.8.d.5.8.e.f.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.l.o.a.d.d.l.l.3.2...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.e.0.-.0.0.0.1.-.0.0.1.b.-.a.3.4.7.-.7.a.0.9.d.8.e.6.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.l.o.a.d.d.l.l.3.2...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.1././.0.9././.2.8.:.1.1.:.5.3.:.0.5.!.0.!.l.o.a.d.d.l.l.3.2...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_d71d33d652a62c864cb684e881f783bcee8c2df7_d70d8aa6_0766c198\Report.wer
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):65536
                                                                                                      Entropy (8bit):0.6775010169886009
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:96:5jF3RarZqycy9hk1Dg3fWpXIQcQic6fcEKcw3KW+a+z+HbHgOVG4rmMOyWZAXGn5:d1MB0H8bQ5jSq/u7slS274ItW
                                                                                                      MD5:7AFCD1BD51040404605337C60BD472E9
                                                                                                      SHA1:03CA0F35512AF716A95BFB16660A2C6B4AB89D6C
                                                                                                      SHA-256:990AF6D85CF4CBCB31B1D8D5627CFBED274DF42808493348062AC58DFBF4C9EE
                                                                                                      SHA-512:CAD0A0A3F537F7D1D9D1162C95081D7161344B43355DD3A7B2B312899C860D04A1D2660F1B4F9D820D2FDFCCC3E63A5E85A2A4C9BABCD795C19C636432B30777
                                                                                                      Malicious:false
                                                                                                      Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.8.2.8.5.3.1.4.6.5.0.9.4.1.8.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.8.2.8.5.3.1.5.7.7.5.9.3.6.8.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.c.5.2.d.4.b.a.-.8.4.2.5.-.4.3.4.d.-.b.9.5.9.-.0.e.7.8.5.8.2.f.7.8.8.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.7.4.f.0.7.6.c.-.6.a.a.7.-.4.a.8.5.-.b.4.5.d.-.4.0.8.a.0.b.3.b.1.8.8.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.l.o.a.d.d.l.l.3.2...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.e.0.-.0.0.0.1.-.0.0.1.b.-.a.3.4.7.-.7.a.0.9.d.8.e.6.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.l.o.a.d.d.l.l.3.2...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER1952.tmp.dmp
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:Mini DuMP crash report, 15 streams, Wed Dec 1 17:25:47 2021, 0x1205a4 type
                                                                                                      Category:dropped
                                                                                                      Size (bytes):1058996
                                                                                                      Entropy (8bit):1.3712773239769518
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:1536:bxYD5OU5ERxUg6yTR+RDOYIawA30cvhDhjUlzxAINxmsRKNBnMGCaOsU:rRx7/R+MdawA30cvhDiNxm3vnfCaZU
                                                                                                      MD5:7A4E56B2558285ADD418A7A78AE6013F
                                                                                                      SHA1:BEA34760885B4B6F6E72E5DF7203C47F4B79425C
                                                                                                      SHA-256:58034C4613B0834F9A3C455D338201F3878DF04327E67AC512A325461A431A92
                                                                                                      SHA-512:4DFEEE02F3DC33302089C8BB232C598C51AAB90B800B11054EE168FCE673EEEA01D1415D39CBD32BFB8B76DB4CFA99DFD4E8FFF4EB7EE5D75A9401DE0A33BD73
                                                                                                      Malicious:false
                                                                                                      Preview: MDMP....... ..........a............4...............H.......$...........................`.......8...........T...........@...t............................................................................................U...........B......p.......GenuineIntelW...........T...........]..a;............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER2151.tmp.WERInternalMetadata.xml
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):8302
                                                                                                      Entropy (8bit):3.6954095323269565
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:Rrl7r3GLNi8X6OI6Yr3SUXy6gmfL8GSq+pD0/x89bULsfDcm:RrlsNiM656YLSUXy6gmfLrSxUQf9
                                                                                                      MD5:E3A11A63623CFEBFB66EB6BE4286B4AD
                                                                                                      SHA1:F7F64CC325FD71646673B03D6ED7D060CF455B6B
                                                                                                      SHA-256:32C311DBE17A4F7FD7E964151DA66BBBD707A42310650C91C3A653E147FFAFCF
                                                                                                      SHA-512:01A461E419779C1384874EDF910B36050564CB793712A86C597F255F57AA27D80D26C3FFEC957F6CEAF357A21277E2B7C7775F03ECB0298994926820FDDB35D5
                                                                                                      Malicious:false
                                                                                                      Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.8.8.0.<./.P.i.d.>.......
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER2338.tmp.csv
                                                                                                      Process:C:\Windows\System32\svchost.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):49514
                                                                                                      Entropy (8bit):3.046922393170869
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:1536:FUHA8ZHr/z7dqVKCK0awYNP2molncPX4BssI:FUHA8ZHr/z7dqVKCK0awYNP2molncP4q
                                                                                                      MD5:760C0C341E6D4AB6E90B4CF99ECB6B72
                                                                                                      SHA1:5F4BD5FA694532B332EEDA311AD7E4C28DE57C4A
                                                                                                      SHA-256:0A3139412B1E043F7423A4F2D75C5745EABBA5E9D74F8F7AD738E41E9EDD4694
                                                                                                      SHA-512:DB1C3A2FA38AA6B825D7AEBBFB2544BBBE285EA32D695AC5D3871D77BD7D8885987F146A4A919F32EB8D31535B5E67DBC2C83D0B0ABDB765923620530126A8B3
                                                                                                      Malicious:false
                                                                                                      Preview: I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER2440.tmp.xml
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):4558
                                                                                                      Entropy (8bit):4.430482411772029
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:48:cvIwSD8zsTJgtWI9Zj1WSC8B98fm8M4J2yGtFe+q84tjDKcQIcQwQhdd:uITftyESNEJEWxDKkwQhdd
                                                                                                      MD5:C44D5FCFA4C7968F2231DFF934C914C4
                                                                                                      SHA1:93FD6221DEC7251F05DF251E592E69996D3718E1
                                                                                                      SHA-256:B34488C435110C11B59626E8EC4017CFBD4B51FDE8CFA83024F6812AD76E4EF4
                                                                                                      SHA-512:C11EC26808E1AA6E10DEA8CAB9963700C09EE51D25974E1268993CAC34A9F9FFAFCBA0E31FF48351B476030ED6FBDA067BC4F3629A913636858FFE3362B73386
                                                                                                      Malicious:false
                                                                                                      Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1278876" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER277F.tmp.txt
                                                                                                      Process:C:\Windows\System32\svchost.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):13340
                                                                                                      Entropy (8bit):2.694366916894771
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:96:9GiZYWeU1eH4Y8EYHW4IH1YEZsvtk0iKEqI+NwqdNMpaGMSjizIdO3:9jZDe4SmrvAaGMSji8dO3
                                                                                                      MD5:D34028D15FCFB3E93CDDCDDEF534FE9C
                                                                                                      SHA1:ACFB14695F6CD566CE203DB0D8B551E50AB27D70
                                                                                                      SHA-256:68410881C59F5C019913F972562D5D03D0C0FCDC4AE9E8122AAB68368FBE3500
                                                                                                      SHA-512:CA156539250FC8DB276B2F3FF64FE97F59DD2DF03A7307C06B581884714BA480A6A6FF70E6FB6FF0DFD999BF3CA785FC06469C192DA2A8B8A861216DD32F7160
                                                                                                      Malicious:false
                                                                                                      Preview: B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.1.5.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER2E.tmp.xml
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):4598
                                                                                                      Entropy (8bit):4.477100128494388
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:48:cvIwSD8zsTJgtWI9Zj1WSC8BT8fm8M4J2yvZFL7+q84Wz/KcQIcQwQhdd:uITftyESN2JBTw/KkwQhdd
                                                                                                      MD5:BCA921FB2139CC9CBF9FA843E8E04CCE
                                                                                                      SHA1:09B6E777D80619083576F0073B5C141044DA816F
                                                                                                      SHA-256:5643B318FAAC21EEF41F479F2907F8CBBB2BA2B6394E1ABA182BF109CB73967D
                                                                                                      SHA-512:633BCB6560AFE7BA2194E29D8E8529E51BA6D3B60FC4E978A5708421BC15395EC359D69978201E2CBDBB6CD9E9C4D8EF9C5E13070BD61ADDBD7544AD22C87807
                                                                                                      Malicious:false
                                                                                                      Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1278876" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER475C.tmp.csv
                                                                                                      Process:C:\Windows\System32\svchost.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):49504
                                                                                                      Entropy (8bit):3.046214480484183
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:1536:fNHk8hA9rD9d3dqxACKLw2C9mo1nZahK8qs:fNHk8hA9rD9d3dqxACKLw2C9mo1nZaKu
                                                                                                      MD5:3A6B79A861C2498DC74B41C4C47AD1C2
                                                                                                      SHA1:C917A29F1AFCF3CD4484558A50540AEE9492712B
                                                                                                      SHA-256:E9EFA2B3CD17C1A8D96C4BAF257E272AB8612D6139CA638C6158DC93745F968F
                                                                                                      SHA-512:1638262533B220652B62B7ACEDE2360B5DB4C25A2B696F86E47D4C6625B33FEDF418EC0DAFD6BC79B95C292AC04ED303A40507A32B3292740D9756865B679E54
                                                                                                      Malicious:false
                                                                                                      Preview: I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER4AA9.tmp.txt
                                                                                                      Process:C:\Windows\System32\svchost.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):13340
                                                                                                      Entropy (8bit):2.693853769718937
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:96:9GiZYW7u9M4zb1Y1YKWA6yUHXYEZZatFiKyq7+Sw7aNXa0a4wZR6Izj3:9jZDy9ZizhQlma0a4kRtzj3
                                                                                                      MD5:815160F2FA14825C852FE6F40CB8334B
                                                                                                      SHA1:EA39BEB4C2958129BB3BA9797D4FE7814A600D5F
                                                                                                      SHA-256:77B2156C6621EE98C47304B22ED3B1985698E82C8C937061691D17731EF87297
                                                                                                      SHA-512:742A7C4E4237FFA10EC46D8529F262F387218B87EDA662584CCF901E722DA3A916A036400423E012F1028377550FD9BA38AE29409804AAED8C0CBD3C71EE8F4C
                                                                                                      Malicious:false
                                                                                                      Preview: B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.1.5.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WERF82D.tmp.dmp
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:Mini DuMP crash report, 15 streams, Wed Dec 1 17:25:38 2021, 0x1205a4 type
                                                                                                      Category:dropped
                                                                                                      Size (bytes):25940
                                                                                                      Entropy (8bit):2.552323813346806
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:WrlaMO5hgMhy/5kgJmgi0ilF6ZWUcHEjzU:15uh/5kgJmgvilF6ZWVj
                                                                                                      MD5:4DEE3193ADBBB8E856D847FA57D241A7
                                                                                                      SHA1:262B42363EBEC83706CDA0CB5FA0ED306B0139DD
                                                                                                      SHA-256:E13B0D3DBD6B6544ABA508382E0BF48A723E5D4601C590E71CE9552B12B1F936
                                                                                                      SHA-512:FE3D3E7EA25B407A6DAC1AE28C4EEE34887E645DE9D9780C19153A4DFF719320DD8047121C940C60BE9E1D45AD78BC29F0A08720F3D1929E0B36DD9B3093338E
                                                                                                      Malicious:false
                                                                                                      Preview: MDMP....... ..........a............4...............H.......$...........................`.......8...........T...........h....X...........................................................................................U...........B......p.......GenuineIntelW...........T...........]..a;............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WERFC74.tmp.WERInternalMetadata.xml
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):8342
                                                                                                      Entropy (8bit):3.7034129553024777
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:Rrl7r3GLNi8Y6WBXs6YrwSUByogmfOSzn+pB889bKLsf6Om:RrlsNiz6z6Y8SUByogmfOSzoKQfK
                                                                                                      MD5:D16931DDE458EACE169C4C614F5F04F3
                                                                                                      SHA1:2E01D79C131812A24342C537874F4E14BA1262FD
                                                                                                      SHA-256:9D1B2688A25E89A630F0E9D013611E6D86190697852CB3D07C9350A68B91245A
                                                                                                      SHA-512:25590A733DB4AC407C59A00A5AC2B1AFA2EF0AD8E874F8ABEA39C46B4431FE67C6C678EBBFDE0FD1F2BF59AEC2DCD5862A9F8BBAA3B5570E21029EE44FAD7E83
                                                                                                      Malicious:false
                                                                                                      Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.8.8.0.<./.P.i.d.>.......
                                                                                                      C:\Windows\appcompat\Programs\Amcache.hve
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:MS Windows registry file, NT/2000 or above
                                                                                                      Category:dropped
                                                                                                      Size (bytes):1572864
                                                                                                      Entropy (8bit):4.23561428467192
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:12288:j3rLo+MuY6hOQgWN8F9ZK5eeXAQEnHNi064cmgrUV9J99BzM:7rLo+MuY6hxgWNywX
                                                                                                      MD5:ACC34EDE4E06ED83933625F4CC7356DF
                                                                                                      SHA1:966066CEFF7348D96671527DE7402DA839AC3F1F
                                                                                                      SHA-256:399C9EF22BBEA528A7B8C6AAC0192A0A233490D8E2AF34935EA7240BFD400135
                                                                                                      SHA-512:E63F078C8C9DAC0BE90B4B0ED05E50D9A35B7640CEB51A42A122C7172C3C2FC875E2603CCF15D63AC8DCF2FA83380D190BBC1F2D1A18B7CFADDF142892CDD5A0
                                                                                                      Malicious:false
                                                                                                      Preview: regfI...I...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm.H.t.................................................................................................................................................................................................................................................................................................................................................]*)........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      C:\Windows\appcompat\Programs\Amcache.hve.LOG1
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:MS Windows registry file, NT/2000 or above
                                                                                                      Category:dropped
                                                                                                      Size (bytes):16384
                                                                                                      Entropy (8bit):3.7163846064597656
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:384:CM45K5hocv4KgnVVeeDzewo1NKZtjooT8GRFwonU:leKVg/eeDzejNYtjOGRFwo
                                                                                                      MD5:98B36B1143289161730CE1E931F90DD9
                                                                                                      SHA1:B00EB50471991DE35EE39B0CC23902448BD555D4
                                                                                                      SHA-256:31B386D7BFDF10A381CC92B9A24C011E34BC8224CD60A582B7D0A981C8A796DD
                                                                                                      SHA-512:93C2E48BD5C9C1A5C81F71380FFA0A23B05E7E9D643E0F8BF7D652B11A06569C4791765B57F8090D095F5F3A7705C708E008C4E5015A2675D80ECE4468A00ED3
                                                                                                      Malicious:false
                                                                                                      Preview: regfH...H...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm.H.t................................................................................................................................................................................................................................................................................................................................................(]*)HvLE.>......H............].gC..B...v............................hbin................p.\..,..........nk,...0t.................................... ...........................&...{ad79c032-a2ea-f756-e377-72fb9332c3ae}......nk ...0t........ ........................... .......Z.......................Root........lf......Root....nk ...0t.................................... ...............*...............DeviceCensus.......................vk..................WritePermissionsCheck.......p...

                                                                                                      Static File Info

                                                                                                      General

                                                                                                      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                      Entropy (8bit):6.970959661903669
                                                                                                      TrID:
                                                                                                      • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                                                                                      • Generic Win/DOS Executable (2004/3) 0.20%
                                                                                                      • DOS Executable Generic (2002/1) 0.20%
                                                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                      File name:mal.dll
                                                                                                      File size:387072
                                                                                                      MD5:9efbd03d5576686dd9f0678c09abe9fc
                                                                                                      SHA1:0b821e78137018bbf3f9c67d3b049e33d5b36ae5
                                                                                                      SHA256:972f9350219dcc2df463f923ec5b559f4ab69f083da9ccbd0976c51bc19f3f5b
                                                                                                      SHA512:fa2def2a793d79b63cf2c808c62e031544282bc3e01f97efa47b3114c702b004d767b818764f47c120007c680274ad9327587ac235186ee6e6d7bb168a19acc9
                                                                                                      SSDEEP:6144:zBYrPMTsY8GR3j4fubnY6Zs/Bv6yM6aSTsfA2qL6jpXNcc6CEteuQJPIgtlpZ5L:yhmT4GbnYks/BJNWo2LjpScDEteuOIoZ
                                                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........0...Q...Q...Q..E#...Q..E#...Q..E#...Q../$...Q...$...Q...$...Q...$...Q..E#...Q...Q...Q...Q...Q../$...Q../$...Q..Rich.Q.........

                                                                                                      File Icon

                                                                                                      Icon Hash:74f0e4ecccdce0e4

                                                                                                      Static PE Info

                                                                                                      General

                                                                                                      Entrypoint:0x1001cac1
                                                                                                      Entrypoint Section:.text
                                                                                                      Digitally signed:false
                                                                                                      Imagebase:0x10000000
                                                                                                      Subsystem:windows gui
                                                                                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
                                                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                                                                      Time Stamp:0x61A73B52 [Wed Dec 1 09:07:30 2021 UTC]
                                                                                                      TLS Callbacks:0x1000c340
                                                                                                      CLR (.Net) Version:
                                                                                                      OS Version Major:6
                                                                                                      OS Version Minor:0
                                                                                                      File Version Major:6
                                                                                                      File Version Minor:0
                                                                                                      Subsystem Version Major:6
                                                                                                      Subsystem Version Minor:0
                                                                                                      Import Hash:609402ef170a35cc0e660d7d95ac10ce

                                                                                                      Entrypoint Preview

                                                                                                      Instruction
                                                                                                      push ebp
                                                                                                      mov ebp, esp
                                                                                                      cmp dword ptr [ebp+0Ch], 01h
                                                                                                      jne 00007F4A08CCB807h
                                                                                                      call 00007F4A08CCBB98h
                                                                                                      push dword ptr [ebp+10h]
                                                                                                      push dword ptr [ebp+0Ch]
                                                                                                      push dword ptr [ebp+08h]
                                                                                                      call 00007F4A08CCB6B3h
                                                                                                      add esp, 0Ch
                                                                                                      pop ebp
                                                                                                      retn 000Ch
                                                                                                      push ebp
                                                                                                      mov ebp, esp
                                                                                                      push dword ptr [ebp+08h]
                                                                                                      call 00007F4A08CCC0AEh
                                                                                                      pop ecx
                                                                                                      pop ebp
                                                                                                      ret
                                                                                                      push ebp
                                                                                                      mov ebp, esp
                                                                                                      jmp 00007F4A08CCB80Fh
                                                                                                      push dword ptr [ebp+08h]
                                                                                                      call 00007F4A08CCFB94h
                                                                                                      pop ecx
                                                                                                      test eax, eax
                                                                                                      je 00007F4A08CCB811h
                                                                                                      push dword ptr [ebp+08h]
                                                                                                      call 00007F4A08CCFC10h
                                                                                                      pop ecx
                                                                                                      test eax, eax
                                                                                                      je 00007F4A08CCB7E8h
                                                                                                      pop ebp
                                                                                                      ret
                                                                                                      cmp dword ptr [ebp+08h], FFFFFFFFh
                                                                                                      je 00007F4A08CCC173h
                                                                                                      jmp 00007F4A08CCC150h
                                                                                                      push ebp
                                                                                                      mov ebp, esp
                                                                                                      push 00000000h
                                                                                                      call dword ptr [1002A08Ch]
                                                                                                      push dword ptr [ebp+08h]
                                                                                                      call dword ptr [1002A088h]
                                                                                                      push C0000409h
                                                                                                      call dword ptr [1002A040h]
                                                                                                      push eax
                                                                                                      call dword ptr [1002A090h]
                                                                                                      pop ebp
                                                                                                      ret
                                                                                                      push ebp
                                                                                                      mov ebp, esp
                                                                                                      sub esp, 00000324h
                                                                                                      push 00000017h
                                                                                                      call dword ptr [1002A094h]
                                                                                                      test eax, eax
                                                                                                      je 00007F4A08CCB807h
                                                                                                      push 00000002h
                                                                                                      pop ecx
                                                                                                      int 29h
                                                                                                      mov dword ptr [1005E278h], eax
                                                                                                      mov dword ptr [1005E274h], ecx
                                                                                                      mov dword ptr [1005E270h], edx
                                                                                                      mov dword ptr [1005E26Ch], ebx
                                                                                                      mov dword ptr [1005E268h], esi
                                                                                                      mov dword ptr [1005E264h], edi
                                                                                                      mov word ptr [eax], es

                                                                                                      Data Directories

                                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x5b5900x614.rdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x5bba40x3c.rdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x600000x1bc0.reloc
                                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x5a1dc0x54.rdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x5a3000x18.rdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x5a2300x40.rdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x2a0000x154.rdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                                      Sections

                                                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                      .text0x10000x28bb40x28c00False0.53924822661data6.1540438823IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                      .rdata0x2a0000x323620x32400False0.817800645211data7.40644078277IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                      .data0x5d0000x1ba40x1200False0.287109375data2.60484752417IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                                      .pdata0x5f0000x4c40x600False0.360677083333AmigaOS bitmap font2.17228109861IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                                      .reloc0x600000x1bc00x1c00False0.7880859375data6.62631718459IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                                      Imports

                                                                                                      DLLImport
                                                                                                      KERNEL32.dllHeapFree, HeapReAlloc, GetProcessHeap, HeapAlloc, GetModuleHandleA, GetProcAddress, TlsGetValue, TlsSetValue, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, AcquireSRWLockShared, ReleaseSRWLockShared, SetLastError, GetEnvironmentVariableW, GetLastError, GetCurrentDirectoryW, GetCurrentProcess, GetCurrentThread, RtlCaptureContext, ReleaseMutex, WaitForSingleObjectEx, LoadLibraryA, CreateMutexA, CloseHandle, GetStdHandle, GetConsoleMode, WriteFile, WriteConsoleW, TlsAlloc, GetCommandLineW, CreateFileA, GetTickCount64, CreateFileW, SetFilePointerEx, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RaiseException, RtlUnwind, InterlockedFlushSList, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsFree, FreeLibrary, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetModuleFileNameW, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, LCMapStringW, GetFileType, GetStringTypeW, HeapSize, SetStdHandle, FlushFileBuffers, GetConsoleOutputCP, DecodePointer
                                                                                                      USER32.dllGetDC, ReleaseDC, GetWindowRect

                                                                                                      Exports

                                                                                                      NameOrdinalAddress
                                                                                                      Control_RunDLL10x100010a0
                                                                                                      axamexdrqyrgb20x100017b0
                                                                                                      bhramccfbdd30x10001690
                                                                                                      bptyjtyr40x10001640
                                                                                                      bxoqrnuua50x100016c0
                                                                                                      cegjceivzmgdcffk60x100014e0
                                                                                                      cgxpyqfkocm70x10001480
                                                                                                      chjbtsnqmvl80x10001540
                                                                                                      crfsijq90x10001730
                                                                                                      empxfws100x10001590
                                                                                                      fbgcvvbrlowsjsj110x10001550
                                                                                                      fjhmprw120x10001660
                                                                                                      gfqdajfucnxrv130x10001850
                                                                                                      hcloldazhuvj140x10001790
                                                                                                      idcumrbybo150x10001500
                                                                                                      ihvpwdsfllpvrzy160x10001750
                                                                                                      iuzqizpdhxqkmf170x100014c0
                                                                                                      jaarlqsruhrwpipt180x100016e0
                                                                                                      jndshbhgxdkvvtj190x10001600
                                                                                                      jniijdleqsyajeis200x10001650
                                                                                                      jtjqgma210x100016f0
                                                                                                      kffxtbzhfgbqlu220x10001630
                                                                                                      kwxkzdhqe230x100016d0
                                                                                                      lidhnvsukgiuabh240x100016b0
                                                                                                      ltcrkednwfkup250x10001820
                                                                                                      lvrmqgtvhsegpbvmq260x10001770
                                                                                                      mxvwvnerswyylp270x10001520
                                                                                                      ndlmbjceavqdintmv280x100017d0
                                                                                                      nvnriipkwrmxwsu290x10001510
                                                                                                      oafxfavxmi300x10001570
                                                                                                      ocwutlohg310x100014b0
                                                                                                      olcklbdvo320x10001680
                                                                                                      pawvqfmiz330x100015e0
                                                                                                      pdmomnjmmryopqza340x10001560
                                                                                                      plzkvjcbz350x10001710
                                                                                                      poasqvltrkgvepng360x10001840
                                                                                                      psjoyjhsrkg370x100015b0
                                                                                                      qdimtzieldbl380x10001620
                                                                                                      qzvngjfyuxpjag390x10001580
                                                                                                      relsounb400x100016a0
                                                                                                      rykebhcisi410x10001670
                                                                                                      snrvgvzpjh420x100017c0
                                                                                                      sqnfcfmocgbg430x10001740
                                                                                                      sxgllzweihxqxi440x10001760
                                                                                                      tgagxhhcfj450x10001780
                                                                                                      thjyvtvttwpah460x10001830
                                                                                                      uvypobslemtipv470x10001640
                                                                                                      vgidwtjsbwpxkdxj480x100017a0
                                                                                                      wahhdker490x100014a0
                                                                                                      wamqmispvbxt500x100015f0
                                                                                                      witvsjavqyw510x10001720
                                                                                                      wopabadcwdizvwlgk520x10001490
                                                                                                      wpzyecljz530x10001800
                                                                                                      wukgfirfwilhu540x100015d0
                                                                                                      xntbmrrxs550x100017f0
                                                                                                      xsxwxreryufxwuhh560x10001700
                                                                                                      xvgdevijtw570x10001610
                                                                                                      ydvqidso580x100015c0
                                                                                                      yggdjrsewuw590x100015a0
                                                                                                      zaeqdmhaky600x100017e0
                                                                                                      zakvwkjnk610x10001700
                                                                                                      zqbggkzy620x100014f0
                                                                                                      zqtdpertk630x100014d0
                                                                                                      zshfybkvzv640x10001810
                                                                                                      zxxopqyvfoesyhmup650x10001530

                                                                                                      Network Behavior

                                                                                                      No network behavior found

                                                                                                      Code Manipulations

                                                                                                      Statistics

                                                                                                      Behavior

                                                                                                      Click to jump to process

                                                                                                      System Behavior

                                                                                                      General

                                                                                                      Start time:18:22:37
                                                                                                      Start date:01/12/2021
                                                                                                      Path:C:\Windows\System32\loaddll32.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:loaddll32.exe "C:\Users\user\Desktop\mal.dll"
                                                                                                      Imagebase:0x13c0000
                                                                                                      File size:893440 bytes
                                                                                                      MD5 hash:72FCD8FB0ADC38ED9050569AD673650E
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000000.00000000.1037130438.0000000000CF0000.00000040.00000010.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000000.00000000.1063275616.0000000000E8C000.00000004.00000020.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000000.00000000.1035699542.0000000000CF0000.00000040.00000010.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000000.00000000.1063104639.0000000000CF0000.00000040.00000010.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000000.00000000.1035947080.0000000000E8C000.00000004.00000020.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000000.00000002.1100911301.0000000000E8C000.00000004.00000020.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000000.00000000.1064906650.0000000000CF0000.00000040.00000010.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000000.00000000.1037359091.0000000000E8C000.00000004.00000020.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000000.00000002.1100727595.0000000000CF0000.00000040.00000010.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000000.00000000.1065208047.0000000000E8C000.00000004.00000020.sdmp, Author: Joe Security
                                                                                                      Reputation:high

                                                                                                      General

                                                                                                      Start time:18:22:38
                                                                                                      Start date:01/12/2021
                                                                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\mal.dll",#1
                                                                                                      Imagebase:0x11d0000
                                                                                                      File size:232960 bytes
                                                                                                      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high

                                                                                                      General

                                                                                                      Start time:18:22:38
                                                                                                      Start date:01/12/2021
                                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:rundll32.exe C:\Users\user\Desktop\mal.dll,Control_RunDLL
                                                                                                      Imagebase:0xb00000
                                                                                                      File size:61952 bytes
                                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.1028366032.0000000000800000.00000040.00000010.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000003.971608734.0000000002CD9000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                      Reputation:high

                                                                                                      General

                                                                                                      Start time:18:22:38
                                                                                                      Start date:01/12/2021
                                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:rundll32.exe "C:\Users\user\Desktop\mal.dll",#1
                                                                                                      Imagebase:0xb00000
                                                                                                      File size:61952 bytes
                                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.1031543020.0000000002E63000.00000004.00000020.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.1023539885.0000000002CC0000.00000040.00000010.sdmp, Author: Joe Security
                                                                                                      Reputation:high

                                                                                                      General

                                                                                                      Start time:18:22:42
                                                                                                      Start date:01/12/2021
                                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:rundll32.exe C:\Users\user\Desktop\mal.dll,axamexdrqyrgb
                                                                                                      Imagebase:0xb00000
                                                                                                      File size:61952 bytes
                                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.1033480524.000000000310A000.00000004.00000020.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.1033332210.0000000003070000.00000040.00000010.sdmp, Author: Joe Security
                                                                                                      Reputation:high

                                                                                                      General

                                                                                                      Start time:18:22:52
                                                                                                      Start date:01/12/2021
                                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:rundll32.exe C:\Users\user\Desktop\mal.dll,bhramccfbdd
                                                                                                      Imagebase:0xb00000
                                                                                                      File size:61952 bytes
                                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.1035861580.0000000004AF0000.00000040.00000010.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.1035732972.0000000003193000.00000004.00000020.sdmp, Author: Joe Security
                                                                                                      Reputation:high

                                                                                                      General

                                                                                                      Start time:18:25:02
                                                                                                      Start date:01/12/2021
                                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\mal.dll",Control_RunDLL
                                                                                                      Imagebase:0xb00000
                                                                                                      File size:61952 bytes
                                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high

                                                                                                      General

                                                                                                      Start time:18:25:05
                                                                                                      Start date:01/12/2021
                                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Lxelxho\ggoife.qjv",clLaoeKXf
                                                                                                      Imagebase:0xb00000
                                                                                                      File size:61952 bytes
                                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.1168490551.0000000002D7A000.00000004.00000020.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.1167572272.0000000000A90000.00000040.00000010.sdmp, Author: Joe Security
                                                                                                      Reputation:high

                                                                                                      General

                                                                                                      Start time:18:25:24
                                                                                                      Start date:01/12/2021
                                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\mal.dll",Control_RunDLL
                                                                                                      Imagebase:0xb00000
                                                                                                      File size:61952 bytes
                                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high

                                                                                                      General

                                                                                                      Start time:18:25:29
                                                                                                      Start date:01/12/2021
                                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\mal.dll",Control_RunDLL
                                                                                                      Imagebase:0xb00000
                                                                                                      File size:61952 bytes
                                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high

                                                                                                      General

                                                                                                      Start time:18:25:29
                                                                                                      Start date:01/12/2021
                                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                      Imagebase:0x7ff6eb840000
                                                                                                      File size:51288 bytes
                                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      General

                                                                                                      Start time:18:25:30
                                                                                                      Start date:01/12/2021
                                                                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6880 -ip 6880
                                                                                                      Imagebase:0xea0000
                                                                                                      File size:434592 bytes
                                                                                                      MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      General

                                                                                                      Start time:18:25:35
                                                                                                      Start date:01/12/2021
                                                                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6880 -s 304
                                                                                                      Imagebase:0xea0000
                                                                                                      File size:434592 bytes
                                                                                                      MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      General

                                                                                                      Start time:18:25:42
                                                                                                      Start date:01/12/2021
                                                                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 6880 -ip 6880
                                                                                                      Imagebase:0xea0000
                                                                                                      File size:434592 bytes
                                                                                                      MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      General

                                                                                                      Start time:18:25:45
                                                                                                      Start date:01/12/2021
                                                                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6880 -s 324
                                                                                                      Imagebase:0xea0000
                                                                                                      File size:434592 bytes
                                                                                                      MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      General

                                                                                                      Start time:18:26:06
                                                                                                      Start date:01/12/2021
                                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                      Imagebase:0x7ff6eb840000
                                                                                                      File size:51288 bytes
                                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      General

                                                                                                      Start time:18:26:28
                                                                                                      Start date:01/12/2021
                                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Lxelxho\ggoife.qjv",Control_RunDLL
                                                                                                      Imagebase:0xb00000
                                                                                                      File size:61952 bytes
                                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      General

                                                                                                      Start time:18:26:37
                                                                                                      Start date:01/12/2021
                                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                      Imagebase:0x7ff6eb840000
                                                                                                      File size:51288 bytes
                                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      Disassembly

                                                                                                      Code Analysis

                                                                                                      Reset < >