Loading ...

Play interactive tourEdit tour

Windows Analysis Report CSxylfUJcL

Overview

General Information

Sample Name:CSxylfUJcL (renamed file extension from none to dll)
Analysis ID:553113
MD5:fa7ab814336d3ee4312c262457e01f01
SHA1:73e1844abe6d99a57345464f418279d596985202
SHA256:c89c49c3e8e37835ab53bfd9ff9ab97c80e037f0fdfe7e8df6a7d3d86fa62782
Tags:32dllexe
Infos:

Most interesting Screenshot:

Detection

Emotet
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Machine Learning detection for sample
Sigma detected: Suspicious Call by Ordinal
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
PE file contains strange resources
Tries to load missing DLLs
Contains functionality to read the PEB
Drops PE files to the windows directory (C:\Windows)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Connects to several IPs in different countries
Potential key logger detected (key state polling based)
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries disk information (often used to detect virtual machines)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • loaddll32.exe (PID: 7112 cmdline: loaddll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll" MD5: 7DEB5DB86C0AC789123DEC286286B938)
    • cmd.exe (PID: 7132 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 7160 cmdline: rundll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • rundll32.exe (PID: 6048 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • regsvr32.exe (PID: 7148 cmdline: regsvr32.exe /s C:\Users\user\Desktop\CSxylfUJcL.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
      • rundll32.exe (PID: 5820 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6172 cmdline: rundll32.exe C:\Users\user\Desktop\CSxylfUJcL.dll,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • rundll32.exe (PID: 5380 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Ovttmq\chwg.qvw",xKUTPckNvcwxvZR MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • rundll32.exe (PID: 5132 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Ovttmq\chwg.qvw",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • svchost.exe (PID: 5536 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5952 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 3452 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6400 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6980 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup

Malware Configuration

Threatname: Emotet

{"C2 list": ["45.138.98.34:80", "69.16.218.101:8080", "51.210.242.234:8080", "185.148.168.220:8080", "142.4.219.173:8080", "54.38.242.185:443", "191.252.103.16:80", "104.131.62.48:8080", "62.171.178.147:8080", "217.182.143.207:443", "168.197.250.14:80", "37.44.244.177:8080", "66.42.57.149:443", "210.57.209.142:8080", "159.69.237.188:443", "116.124.128.206:8080", "128.199.192.135:8080", "195.154.146.35:443", "185.148.168.15:8080", "195.77.239.39:8080", "207.148.81.119:8080", "85.214.67.203:8080", "190.90.233.66:443", "78.46.73.125:443", "78.47.204.80:443", "37.59.209.141:8080", "54.37.228.122:443"], "Public Key": ["RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW", "RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000005.00000002.353899484.00000000047F1000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000004.00000002.354941726.0000000005411000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000005.00000002.354039628.0000000004851000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000005.00000002.353678279.00000000046C1000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000004.00000002.354572676.0000000005220000.00000040.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 21 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            4.2.rundll32.exe.5280000.8.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              4.2.rundll32.exe.5110000.2.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                5.2.rundll32.exe.4690000.2.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  4.2.rundll32.exe.4b30000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    5.2.rundll32.exe.47c0000.4.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 34 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Suspicious Call by OrdinalShow sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: rundll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll",#1, CommandLine: rundll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll",#1, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll",#1, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7132, ProcessCommandLine: rundll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll",#1, ProcessId: 7160

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 4.2.rundll32.exe.5280000.8.raw.unpackMalware Configuration Extractor: Emotet {"C2 list": ["45.138.98.34:80", "69.16.218.101:8080", "51.210.242.234:8080", "185.148.168.220:8080", "142.4.219.173:8080", "54.38.242.185:443", "191.252.103.16:80", "104.131.62.48:8080", "62.171.178.147:8080", "217.182.143.207:443", "168.197.250.14:80", "37.44.244.177:8080", "66.42.57.149:443", "210.57.209.142:8080", "159.69.237.188:443", "116.124.128.206:8080", "128.199.192.135:8080", "195.154.146.35:443", "185.148.168.15:8080", "195.77.239.39:8080", "207.148.81.119:8080", "85.214.67.203:8080", "190.90.233.66:443", "78.46.73.125:443", "78.47.204.80:443", "37.59.209.141:8080", "54.37.228.122:443"], "Public Key": ["RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW", "RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0"]}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: CSxylfUJcL.dllVirustotal: Detection: 21%Perma Link
                      Source: CSxylfUJcL.dllReversingLabs: Detection: 32%
                      Machine Learning detection for sampleShow sources
                      Source: CSxylfUJcL.dllJoe Sandbox ML: detected
                      Source: CSxylfUJcL.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2404332 ET CNC Feodo Tracker Reported CnC Server TCP group 17 192.168.2.6:49766 -> 45.138.98.34:80
                      Source: TrafficSnort IDS: 2404338 ET CNC Feodo Tracker Reported CnC Server TCP group 20 192.168.2.6:49770 -> 69.16.218.101:8080
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 69.16.218.101 144
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 45.138.98.34 80
                      C2 URLs / IPs found in malware configurationShow sources
                      Source: Malware configuration extractorIPs: 45.138.98.34:80
                      Source: Malware configuration extractorIPs: 69.16.218.101:8080
                      Source: Malware configuration extractorIPs: 51.210.242.234:8080
                      Source: Malware configuration extractorIPs: 185.148.168.220:8080
                      Source: Malware configuration extractorIPs: 142.4.219.173:8080
                      Source: Malware configuration extractorIPs: 54.38.242.185:443
                      Source: Malware configuration extractorIPs: 191.252.103.16:80
                      Source: Malware configuration extractorIPs: 104.131.62.48:8080
                      Source: Malware configuration extractorIPs: 62.171.178.147:8080
                      Source: Malware configuration extractorIPs: 217.182.143.207:443
                      Source: Malware configuration extractorIPs: 168.197.250.14:80
                      Source: Malware configuration extractorIPs: 37.44.244.177:8080
                      Source: Malware configuration extractorIPs: 66.42.57.149:443
                      Source: Malware configuration extractorIPs: 210.57.209.142:8080
                      Source: Malware configuration extractorIPs: 159.69.237.188:443
                      Source: Malware configuration extractorIPs: 116.124.128.206:8080
                      Source: Malware configuration extractorIPs: 128.199.192.135:8080
                      Source: Malware configuration extractorIPs: 195.154.146.35:443
                      Source: Malware configuration extractorIPs: 185.148.168.15:8080
                      Source: Malware configuration extractorIPs: 195.77.239.39:8080
                      Source: Malware configuration extractorIPs: 207.148.81.119:8080
                      Source: Malware configuration extractorIPs: 85.214.67.203:8080
                      Source: Malware configuration extractorIPs: 190.90.233.66:443
                      Source: Malware configuration extractorIPs: 78.46.73.125:443
                      Source: Malware configuration extractorIPs: 78.47.204.80:443
                      Source: Malware configuration extractorIPs: 37.59.209.141:8080
                      Source: Malware configuration extractorIPs: 54.37.228.122:443
                      Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
                      Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                      Source: Joe Sandbox ViewIP Address: 207.148.81.119 207.148.81.119
                      Source: Joe Sandbox ViewIP Address: 104.131.62.48 104.131.62.48
                      Source: global trafficTCP traffic: 192.168.2.6:49770 -> 69.16.218.101:8080
                      Source: unknownNetwork traffic detected: IP country count 12
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: svchost.exe, 00000015.00000003.484179843.000002DCEFD9B000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 00000015.00000003.484179843.000002DCEFD9B000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: rundll32.exe, 0000000C.00000003.461140176.0000000004DBF000.00000004.00000001.sdmpString found in binary or memory: http://crl.globals
                      Source: svchost.exe, 00000015.00000002.501039542.000002DCEF4EA000.00000004.00000001.sdmp, svchost.exe, 00000018.00000002.863214782.000001B96A085000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: svchost.exe, 00000015.00000002.501039542.000002DCEF4EA000.00000004.00000001.sdmp, svchost.exe, 00000018.00000002.863099825.000001B96A013000.00000004.00000001.sdmpString found in binary or memory: http://crl.ver)
                      Source: 77EC63BDA74BD0D0E0426DC8F80085060.12.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: rundll32.exe, 0000000C.00000003.460557624.0000000004DF7000.00000004.00000001.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?ac3be1d532533
                      Source: svchost.exe, 00000015.00000003.480197283.000002DCEFD92000.00000004.00000001.sdmpString found in binary or memory: http://help.disneyplus.com.
                      Source: rundll32.exe, 0000000C.00000003.461301561.0000000004DED000.00000004.00000001.sdmp, rundll32.exe, 0000000C.00000003.460548550.0000000004DED000.00000004.00000001.sdmp, rundll32.exe, 0000000C.00000003.461164296.0000000004DED000.00000004.00000001.sdmpString found in binary or memory: https://69dl.windowsupdate.com/
                      Source: svchost.exe, 00000015.00000003.480197283.000002DCEFD92000.00000004.00000001.sdmpString found in binary or memory: https://disneyplus.com/legal.
                      Source: svchost.exe, 00000015.00000003.480197283.000002DCEFD92000.00000004.00000001.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                      Source: svchost.exe, 00000015.00000003.480197283.000002DCEFD92000.00000004.00000001.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                      Source: svchost.exe, 00000015.00000003.481145725.000002DCEFD82000.00000004.00000001.sdmp, svchost.exe, 00000015.00000003.481291827.000002DCF0202000.00000004.00000001.sdmp, svchost.exe, 00000015.00000003.481239356.000002DCEFDA4000.00000004.00000001.sdmp, svchost.exe, 00000015.00000003.481311470.000002DCEFD82000.00000004.00000001.sdmp, svchost.exe, 00000015.00000003.481252613.000002DCF0219000.00000004.00000001.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100012D0 recvfrom,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1000FF59 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000FF59 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,

                      E-Banking Fraud:

                      barindex
                      Yara detected EmotetShow sources
                      Source: Yara matchFile source: 4.2.rundll32.exe.5280000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5110000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4690000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4b30000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.47c0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4820000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4060000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4820000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4060000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.3230000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.52b0000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.47f0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4690000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5410000.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.4c00000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.2a80000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4190000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.47c0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4b30000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5220000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4850000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5250000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5280000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.53e0000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.4a40000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.46c0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4c70000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.51f0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.51c0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.2a80000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.4b80000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5110000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.2ad0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5140000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.51c0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.53e0000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5220000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.3230000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.4a40000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.353899484.00000000047F1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.354941726.0000000005411000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.354039628.0000000004851000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.353678279.00000000046C1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.354572676.0000000005220000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.397064444.0000000002A80000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.354868089.00000000053E0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.354398198.00000000051C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.354782751.00000000052B1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.396391037.0000000004B81000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.353971003.0000000004820000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.354142339.0000000005110000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.353601392.0000000004690000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.397100803.0000000002AD1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.353774398.0000000004C71000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.351221459.0000000004C01000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.350955081.0000000004A40000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.353804496.00000000047C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.354700642.0000000005280000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.354625308.0000000005251000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.354494384.00000000051F1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.352946917.0000000004060000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.354257894.0000000005141000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.353590253.0000000004B30000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.396217963.0000000003230000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.353110002.0000000004191000.00000020.00000001.sdmp, type: MEMORY

                      System Summary:

                      barindex
                      Source: CSxylfUJcL.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: C:\Windows\SysWOW64\rundll32.exeFile deleted: C:\Windows\SysWOW64\Ovttmq\chwg.qvw:Zone.IdentifierJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\SysWOW64\Ovttmq\Jump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10020011
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100181CA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1001929D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1002542D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100274AE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10026575
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1001869D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1001178A
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10016860
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1002596F
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10022A5C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10018A71
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1001AAB7
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1001CB16
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10018E7D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10025EB1
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B985FF
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B9EFDD
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B81CA1
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B9E4E5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B9CCD9
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B83431
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B9DC71
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B9A474
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B87442
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B8A445
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B93D85
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B855FF
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B99DF5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B8C5D8
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B9C5D5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B98D3D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B95515
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B9AD08
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B97D5B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04BA2D53
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B9654A
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B8C6B8
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B90EBC
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04BA46BD
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04BA36AA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B93EAA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B9BEFD
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04BA3EE9
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B88636
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B87E79
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B9567B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B8DE74
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B92E5D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B8E640
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B857B8
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B8BFBE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04BA17BD
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04BA07AA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B98FAE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B877A3
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B90F86
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B927F9
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B907F4
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B967E6
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B8E7DE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B81F38
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B8670B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B8EF0C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B95779
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B94F74
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B99774
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B9FF58
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B8F0E9
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04BA00EF
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B9D8DB
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B880C0
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B8B820
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04BA2009
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B98806
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B87078
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B8A871
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B9F840
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B9D1BC
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B82194
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B96187
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B9E1F8
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B9017B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B9E955
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B8D14C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B92142
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B90ABA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B8BAA9
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B9A2A5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B9CAD5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B97A0F
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B99A01
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04BA3263
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04BA0A64
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B94A66
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B9B257
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B94244
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B8238C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B8FB8E
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B84BFC
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B9FBDE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B95333
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04BA2B09
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B86B7A
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B9437A
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B8F369
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10020011
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100181CA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001929D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002542D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100274AE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10026575
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001869D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001178A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10016860
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002596F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10022A5C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10018A71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001AAB7
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001CB16
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10018E7D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10025EB1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C185FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C1EFDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C1CCD9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C1E4E5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C01CA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C07442
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C0A445
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C1DC71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C1A474
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C03431
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C1C5D5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C0C5D8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C19DF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C055FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C13D85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C1654A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C22D53
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C17D5B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C1AD08
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C15515
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C18D3D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C23EE9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C1BEFD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C236AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C13EAA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C0C6B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C10EBC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C246BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C0E640
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C12E5D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C0DE74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C07E79
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C1567B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C08636
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C0E7DE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C167E6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C107F4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C127F9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C10F86
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C077A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C207AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C18FAE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C057B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C0BFBE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C217BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C1FF58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C14F74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C19774
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C15779
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C0670B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C0EF0C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C01F38
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C080C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C1D8DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C0F0E9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C200EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C1F840
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C0A871
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C07078
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C18806
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C22009
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C0B820
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C1E1F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C16187
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C02194
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C1D1BC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C12142
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C0D14C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C1E955
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C1017B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C1CAD5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C1A2A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C0BAA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C10ABA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C14244
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C1B257
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C23263
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C20A64
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C14A66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C19A01
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C17A0F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C1FBDE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C04BFC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C0238C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C0FB8E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C0F369
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C06B7A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C1437A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C22B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C15333
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C8B257
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C84A66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C7DE74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C92009
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C87A0F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C78636
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C8EFDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C7C5D8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C885FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C917BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C8654A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C82142
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C8FF58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C8E955
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C8AD08
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C7670B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C780C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C8CCD9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C8D8DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C8CAD5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C93EE9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C900EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C8E4E5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C7F0E9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C8BEFD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C83EAA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C936AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C71CA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C8A2A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C7BAA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C80ABA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C946BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C80EBC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C7C6B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C7A445
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C77442
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C7E640
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C8F840
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C84244
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C82E5D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C93263
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C90A64
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C8567B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C7A871
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C8DC71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C8A474
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C77E79
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C77078
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C89A01
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C88806
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C7B820
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C73431
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C8FBDE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C7E7DE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C8C5D5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C867E6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C8E1F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C827F9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C755FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C74BFC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C807F4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C89DF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C7FB8E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C7238C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C83D85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C80F86
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C86187
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C72194
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C907AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C777A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C88FAE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C8D1BC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C7BFBE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C757B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C7D14C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C87D5B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C92D53
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C7F369
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C85779
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C8437A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C8017B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C84F74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C89774
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C76B7A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C92B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C7EF0C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C85515
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C88D3D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C85333
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C71F38
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041B2009
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A7A0F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04198636
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0419DE74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A4A66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0419670B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041AAD08
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041AFF58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A654A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A2142
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0419C5D8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041AEFDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A9A01
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A8806
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04193431
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0419B820
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A2E5D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041AB257
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0419E640
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041AF840
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04197442
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0419A445
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A4244
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04197E79
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04197078
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A567B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0419A871
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041ADC71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041AA474
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041B3263
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041B0A64
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A0ABA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0419C6B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041B46BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A0EBC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A3EAA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0419BAA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041B36AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04191CA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041AA2A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041AD8DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041ACCD9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041ACAD5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041980C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041ABEFD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0419F0E9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041B3EE9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041B00EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041AE4E5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A5515
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041B2B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0419EF0C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04191F38
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A8D3D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A5333
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A7D5B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041B2D53
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041AE955
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0419D14C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A437A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A017B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A5779
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04196B7A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A4F74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A9774
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0419F369
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04192194
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0419238C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0419FB8E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A0F86
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A6187
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A3D85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041957B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041AD1BC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041B17BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0419BFBE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041B07AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A8FAE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041977A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041AFBDE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0419E7DE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041AC5D5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041AE1F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A27F9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A85FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04194BFC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041955FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A07F4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A9DF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041A67E6
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: String function: 10017BC1 appears 68 times
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: String function: 1001984C appears 48 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10017BC1 appears 68 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 1001984C appears 48 times
                      Source: CSxylfUJcL.dllBinary or memory string: OriginalFilenameUDPTool.EXE: vs CSxylfUJcL.dll
                      Source: CSxylfUJcL.dllStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
                      Source: CSxylfUJcL.dllVirustotal: Detection: 21%
                      Source: CSxylfUJcL.dllReversingLabs: Detection: 32%
                      Source: CSxylfUJcL.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll"
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\CSxylfUJcL.dll
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\CSxylfUJcL.dll,DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Ovttmq\chwg.qvw",xKUTPckNvcwxvZR
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Ovttmq\chwg.qvw",DllRegisterServer
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\CSxylfUJcL.dll
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\CSxylfUJcL.dll,DllRegisterServer
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll",#1
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Ovttmq\chwg.qvw",xKUTPckNvcwxvZR
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Ovttmq\chwg.qvw",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
                      Source: classification engineClassification label: mal96.troj.evad.winDLL@22/7@0/29
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll",#1
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100126F9 FindResourceA,LoadResource,LockResource,FreeResource,
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: CSxylfUJcL.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: CSxylfUJcL.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: CSxylfUJcL.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: CSxylfUJcL.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: CSxylfUJcL.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10019891 push ecx; ret
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10017C60 push ecx; ret
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B81195 push cs; iretd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10019891 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10017C60 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C01195 push cs; iretd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C71195 push cs; iretd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04191195 push cs; iretd
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10023A79 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer,
                      Source: CSxylfUJcL.dllStatic PE information: real checksum: 0x66354 should be: 0x71965
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\CSxylfUJcL.dll
                      Source: C:\Windows\SysWOW64\rundll32.exePE file moved: C:\Windows\SysWOW64\Ovttmq\chwg.qvwJump to behavior

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\Ovttmq\chwg.qvw:Zone.Identifier read attributes | delete
                      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\Abljunuakaktiaef\sdkjkrifiykc.rkg:Zone.Identifier read attributes | delete
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1000D804 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10008B90 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000D804 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10008B90 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,
                      Source: C:\Windows\SysWOW64\rundll32.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exe TID: 4996Thread sleep time: -150000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 6896Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 7100Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\loaddll32.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                      Source: C:\Windows\SysWOW64\regsvr32.exeAPI coverage: 4.6 %
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 5.0 %
                      Source: C:\Windows\SysWOW64\regsvr32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\rundll32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: svchost.exe, 00000018.00000002.863191376.000001B96A062000.00000004.00000001.sdmpBinary or memory string: "@Hyper-V RAW
                      Source: svchost.exe, 00000015.00000002.501016331.000002DCEF4C6000.00000004.00000001.sdmp, svchost.exe, 00000015.00000002.500795053.000002DCEF470000.00000004.00000001.sdmp, svchost.exe, 00000015.00000002.501039542.000002DCEF4EA000.00000004.00000001.sdmp, svchost.exe, 00000018.00000002.862775563.000001B96482A000.00000004.00000001.sdmp, svchost.exe, 00000018.00000002.863177816.000001B96A055000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10023A79 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100178B6 GetProcessHeap,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__heap_term,__RTC_Initialize,GetCommandLineA,___crtGetEnvironmentStringsA,__ioinit,__mtterm,__setargv,__setenvp,__cinit,__ioterm,__ioterm,__mtterm,__heap_term,___set_flsgetvalue,__calloc_crt,__decode_pointer,__initptd,GetCurrentThreadId,__freeptd,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04B8F7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04C0F7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C7F7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0419F7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10021743 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100167D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1001FC21 SetUnhandledExceptionFilter,__encode_pointer,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1001FC43 __decode_pointer,SetUnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10021743 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100167D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001FC21 SetUnhandledExceptionFilter,__encode_pointer,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001FC43 __decode_pointer,SetUnhandledExceptionFilter,

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 69.16.218.101 144
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 45.138.98.34 80
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll",#1
                      Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10022853 cpuid
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1001F914 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100178B6 GetProcessHeap,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__heap_term,__RTC_Initialize,GetCommandLineA,___crtGetEnvironmentStringsA,__ioinit,__mtterm,__setargv,__setenvp,__cinit,__ioterm,__ioterm,__mtterm,__heap_term,___set_flsgetvalue,__calloc_crt,__decode_pointer,__initptd,GetCurrentThreadId,__freeptd,

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected EmotetShow sources
                      Source: Yara matchFile source: 4.2.rundll32.exe.5280000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5110000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4690000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4b30000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.47c0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4820000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4060000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4820000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4060000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.3230000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.52b0000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.47f0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4690000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5410000.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.4c00000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.2a80000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4190000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.47c0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4b30000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5220000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4850000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5250000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5280000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.53e0000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.4a40000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.46c0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4c70000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.51f0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.51c0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.2a80000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.4b80000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5110000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.2ad0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5140000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.51c0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.53e0000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5220000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.3230000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.4a40000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.353899484.00000000047F1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.354941726.0000000005411000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.354039628.0000000004851000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.353678279.00000000046C1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.354572676.0000000005220000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.397064444.0000000002A80000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.354868089.00000000053E0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.354398198.00000000051C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.354782751.00000000052B1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.396391037.0000000004B81000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.353971003.0000000004820000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.354142339.0000000005110000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.353601392.0000000004690000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.397100803.0000000002AD1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.353774398.0000000004C71000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.351221459.0000000004C01000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.350955081.0000000004A40000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.353804496.00000000047C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.354700642.0000000005280000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.354625308.0000000005251000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.354494384.00000000051F1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.352946917.0000000004060000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.354257894.0000000005141000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.353590253.0000000004B30000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.396217963.0000000003230000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.353110002.0000000004191000.00000020.00000001.sdmp, type: MEMORY
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100011C0 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100011C0 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt,

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsNative API1DLL Side-Loading1Process Injection111Masquerading2Input Capture1System Time Discovery1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsDLL Side-Loading1Virtualization/Sandbox Evasion3LSASS MemoryQuery Registry1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection111Security Account ManagerSecurity Software Discovery41SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Deobfuscate/Decode Files or Information1NTDSVirtualization/Sandbox Evasion3Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptHidden Files and Directories1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information2Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsRegsvr321DCSyncFile and Directory Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobRundll321Proc FilesystemSystem Information Discovery45Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)DLL Side-Loading1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)File Deletion1Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 553113 Sample: CSxylfUJcL Startdate: 14/01/2022 Architecture: WINDOWS Score: 96 37 210.57.209.142 UNAIR-AS-IDUniversitasAirlanggaID Indonesia 2->37 39 85.214.67.203 STRATOSTRATOAGDE Germany 2->39 41 23 other IPs or domains 2->41 57 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->57 59 Found malware configuration 2->59 61 Multi AV Scanner detection for submitted file 2->61 63 4 other signatures 2->63 9 loaddll32.exe 1 2->9         started        11 svchost.exe 9 1 2->11         started        14 svchost.exe 1 2->14         started        16 3 other processes 2->16 signatures3 process4 dnsIp5 18 rundll32.exe 2 9->18         started        21 cmd.exe 1 9->21         started        23 regsvr32.exe 9->23         started        43 127.0.0.1 unknown unknown 11->43 process6 signatures7 55 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->55 25 rundll32.exe 18->25         started        27 rundll32.exe 21->27         started        29 rundll32.exe 23->29         started        process8 process9 31 rundll32.exe 25->31         started        35 rundll32.exe 2 27->35         started        dnsIp10 45 45.138.98.34, 49766, 80 M247GB Germany 31->45 47 69.16.218.101, 49770, 8080 LIQUIDWEBUS United States 31->47 51 System process connects to network (likely due to code injection or exploit) 31->51 49 192.168.2.1 unknown unknown 35->49 53 Hides that the sample has been downloaded from the Internet (zone.identifier) 35->53 signatures11

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      CSxylfUJcL.dll21%VirustotalBrowse
                      CSxylfUJcL.dll33%ReversingLabsWin32.Trojan.Emotet
                      CSxylfUJcL.dll100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      5.2.rundll32.exe.4850000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      4.2.rundll32.exe.53e0000.10.unpack100%AviraHEUR/AGEN.1145233Download File
                      4.2.rundll32.exe.5280000.8.unpack100%AviraHEUR/AGEN.1145233Download File
                      5.2.rundll32.exe.4060000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      4.2.rundll32.exe.4b30000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      3.2.rundll32.exe.4a40000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      4.2.rundll32.exe.5410000.11.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.2.rundll32.exe.4690000.2.unpack100%AviraHEUR/AGEN.1145233Download File
                      2.2.regsvr32.exe.3230000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      5.2.rundll32.exe.4190000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.2.rundll32.exe.47c0000.4.unpack100%AviraHEUR/AGEN.1145233Download File
                      5.2.rundll32.exe.4820000.6.unpack100%AviraHEUR/AGEN.1145233Download File
                      4.2.rundll32.exe.52b0000.9.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.2.rundll32.exe.47f0000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      3.2.rundll32.exe.4c00000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      4.2.rundll32.exe.5250000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.2.rundll32.exe.46c0000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      4.2.rundll32.exe.4c70000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      4.2.rundll32.exe.51f0000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      6.2.rundll32.exe.2ad0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      4.2.rundll32.exe.51c0000.4.unpack100%AviraHEUR/AGEN.1145233Download File
                      2.2.regsvr32.exe.4b80000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      4.2.rundll32.exe.5110000.2.unpack100%AviraHEUR/AGEN.1145233Download File
                      6.2.rundll32.exe.2a80000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      4.2.rundll32.exe.5140000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      4.2.rundll32.exe.5220000.6.unpack100%AviraHEUR/AGEN.1145233Download File

                      Domains

                      SourceDetectionScannerLabelLink
                      windowsupdate.s.llnwi.net0%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                      http://crl.ver)0%Avira URL Cloudsafe
                      https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                      https://www.tiktok.com/legal/report/feedback0%URL Reputationsafe
                      http://help.disneyplus.com.0%URL Reputationsafe
                      http://crl.globals0%Avira URL Cloudsafe
                      https://disneyplus.com/legal.0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      windowsupdate.s.llnwi.net
                      41.63.96.128
                      truefalseunknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 00000015.00000003.480197283.000002DCEFD92000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://crl.ver)svchost.exe, 00000015.00000002.501039542.000002DCEF4EA000.00000004.00000001.sdmp, svchost.exe, 00000018.00000002.863099825.000001B96A013000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      https://www.disneyplus.com/legal/privacy-policysvchost.exe, 00000015.00000003.480197283.000002DCEFD92000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.tiktok.com/legal/report/feedbacksvchost.exe, 00000015.00000003.481145725.000002DCEFD82000.00000004.00000001.sdmp, svchost.exe, 00000015.00000003.481291827.000002DCF0202000.00000004.00000001.sdmp, svchost.exe, 00000015.00000003.481239356.000002DCEFDA4000.00000004.00000001.sdmp, svchost.exe, 00000015.00000003.481311470.000002DCEFD82000.00000004.00000001.sdmp, svchost.exe, 00000015.00000003.481252613.000002DCF0219000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://help.disneyplus.com.svchost.exe, 00000015.00000003.480197283.000002DCEFD92000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://crl.globalsrundll32.exe, 0000000C.00000003.461140176.0000000004DBF000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://disneyplus.com/legal.svchost.exe, 00000015.00000003.480197283.000002DCEFD92000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown

                      Contacted IPs

                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs

                      Public

                      IPDomainCountryFlagASNASN NameMalicious
                      207.148.81.119
                      unknownUnited States
                      20473AS-CHOOPAUStrue
                      104.131.62.48
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      85.214.67.203
                      unknownGermany
                      6724STRATOSTRATOAGDEtrue
                      191.252.103.16
                      unknownBrazil
                      27715LocawebServicosdeInternetSABRtrue
                      168.197.250.14
                      unknownArgentina
                      264776OmarAnselmoRipollTDCNETARtrue
                      66.42.57.149
                      unknownUnited States
                      20473AS-CHOOPAUStrue
                      185.148.168.15
                      unknownGermany
                      44780EVERSCALE-ASDEtrue
                      51.210.242.234
                      unknownFrance
                      16276OVHFRtrue
                      217.182.143.207
                      unknownFrance
                      16276OVHFRtrue
                      69.16.218.101
                      unknownUnited States
                      32244LIQUIDWEBUStrue
                      159.69.237.188
                      unknownGermany
                      24940HETZNER-ASDEtrue
                      45.138.98.34
                      unknownGermany
                      9009M247GBtrue
                      116.124.128.206
                      unknownKorea Republic of
                      9318SKB-ASSKBroadbandCoLtdKRtrue
                      78.46.73.125
                      unknownGermany
                      24940HETZNER-ASDEtrue
                      37.59.209.141
                      unknownFrance
                      16276OVHFRtrue
                      210.57.209.142
                      unknownIndonesia
                      38142UNAIR-AS-IDUniversitasAirlanggaIDtrue
                      185.148.168.220
                      unknownGermany
                      44780EVERSCALE-ASDEtrue
                      54.37.228.122
                      unknownFrance
                      16276OVHFRtrue
                      190.90.233.66
                      unknownColombia
                      18678INTERNEXASAESPCOtrue
                      142.4.219.173
                      unknownCanada
                      16276OVHFRtrue
                      54.38.242.185
                      unknownFrance
                      16276OVHFRtrue
                      195.154.146.35
                      unknownFrance
                      12876OnlineSASFRtrue
                      195.77.239.39
                      unknownSpain
                      60493FICOSA-ASEStrue
                      78.47.204.80
                      unknownGermany
                      24940HETZNER-ASDEtrue
                      37.44.244.177
                      unknownGermany
                      47583AS-HOSTINGERLTtrue
                      62.171.178.147
                      unknownUnited Kingdom
                      51167CONTABODEtrue
                      128.199.192.135
                      unknownUnited Kingdom
                      14061DIGITALOCEAN-ASNUStrue

                      Private

                      IP
                      192.168.2.1
                      127.0.0.1

                      General Information

                      Joe Sandbox Version:34.0.0 Boulder Opal
                      Analysis ID:553113
                      Start date:14.01.2022
                      Start time:10:36:05
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 14m 0s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:CSxylfUJcL (renamed file extension from none to dll)
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:27
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal96.troj.evad.winDLL@22/7@0/29
                      EGA Information:
                      • Successful, ratio: 80%
                      HDC Information:
                      • Successful, ratio: 32.6% (good quality ratio 31.7%)
                      • Quality average: 81.1%
                      • Quality standard deviation: 23.3%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      • Override analysis time to 240s for rundll32
                      Warnings:
                      Show All
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, wuapihost.exe
                      • Excluded IPs from analysis (whitelisted): 131.253.33.200, 13.107.22.200, 173.222.108.226, 173.222.108.210, 8.248.145.254, 8.248.137.254, 8.241.126.249, 8.253.190.120, 67.26.115.254, 20.54.110.249, 23.211.4.86
                      • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fg.download.windowsupdate.com.c.footprint.net, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, dual-a-0001.dc-msedge.net, a-0001.a-afdentry.net.trafficmanager.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, www-bing-com.dual-a-0001.a-msedge.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                      • Not all processes where analyzed, report is missing behavior information
                      • Report creation exceeded maximum time and may have missing disassembly code information.
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.

                      Simulations

                      Behavior and APIs

                      TimeTypeDescription
                      10:38:06API Interceptor10x Sleep call for process: svchost.exe modified

                      Joe Sandbox View / Context

                      IPs

                      No context

                      Domains

                      No context

                      ASN

                      No context

                      JA3 Fingerprints

                      No context

                      Dropped Files

                      No context

                      Created / dropped Files

                      C:\ProgramData\Microsoft\Network\Downloader\edb.chk
                      Process:C:\Windows\System32\svchost.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.3593198815979092
                      Encrypted:false
                      SSDEEP:12:SnaaD0JcaaD0JwQQU2naaD0JcaaD0JwQQU:4tgJctgJw/tgJctgJw
                      MD5:BF1DC7D5D8DAD7478F426DF8B3F8BAA6
                      SHA1:C6B0BDE788F553F865D65F773D8F6A3546887E42
                      SHA-256:BE47C764C38CA7A90A345BE183F5261E89B98743B5E35989E9A8BE0DA498C0F2
                      SHA-512:00F2412AA04E09EA19A8315D80BE66D2727C713FC0F5AE6A9334BABA539817F568A98CA3A45B2673282BDD325B8B0E2840A393A4DCFADCB16473F5EAF2AF3180
                      Malicious:false
                      Preview: .............*..........3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................*.............................................................................................................................................................................................................................................................................................................................................................
                      C:\ProgramData\Microsoft\Network\Downloader\edb.log
                      Process:C:\Windows\System32\svchost.exe
                      File Type:MPEG-4 LOAS
                      Category:dropped
                      Size (bytes):1310720
                      Entropy (8bit):0.2494702542656237
                      Encrypted:false
                      SSDEEP:1536:BJiRdfVzkZm3lyf49uyc0ga04PdHS9LrM/oVMUdSRU4P:BJiRdwfu2SRU4P
                      MD5:A3FA8500BDB67E46A9338612845024FC
                      SHA1:3A99BB312877830A9594D9DCE2AFC8C03F392F0F
                      SHA-256:85A48C90B97C5AC71284AE7855676A05D828CE50CD391C1E6628725675EBB415
                      SHA-512:E695F42F61A4C8173944CA6767DC9F73281FF8B4D9E867E6BCF6F48FA00E8D97719F50A54F66C2443020A5546D1ACE4A8B2A7D8399FB14EF28A9984EED21C70D
                      Malicious:false
                      Preview: V.d.........@..@.3...w...........................3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@.........................................d#.................................................................................................................................................................................................................................................................................................................................................
                      C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
                      Process:C:\Windows\System32\svchost.exe
                      File Type:Extensible storage user DataBase, version 0x620, checksum 0xf80f3fb9, page size 16384, Windows version 10.0
                      Category:dropped
                      Size (bytes):786432
                      Entropy (8bit):0.25069434296156595
                      Encrypted:false
                      SSDEEP:384:mH/+W0StseCJ48EApW0StseCJ48E2rTSjlK/ebmLerYSRSY1J2:mHUSB2nSB2RSjlK/+mLesOj1J2
                      MD5:501852577D4C609CC733CCC0B8ECE958
                      SHA1:CF7A843544A8AF61B9CB282000211C7E0D5DA22A
                      SHA-256:B3043C4785265F8ED659050B55E86420B6786D0D218B0E8FC4F627ACC9E5C70C
                      SHA-512:CBDD8C98813044387F7EC3BEBACAD60DA6120514910CDC2B23FC641C716FB395817105E34939E7954E7A3829E991B84C2A533F15407140ADDD38859D4A86F252
                      Malicious:false
                      Preview: ..?.... ................e.f.3...w........................).....!)...zc..&...z..h.(.....!)...zc...)..............3...w...........................................................................................................B...........@...................................................................................................... .......................................................................................................................................................................................................................................................!)...zc.................].5.!)...zc.........................................................................................................................................................................................................................................................................................................................................................................................
                      C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
                      Process:C:\Windows\System32\svchost.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):16384
                      Entropy (8bit):0.07678133055253546
                      Encrypted:false
                      SSDEEP:3:qR7vyDAWtjtlt9FXTItill3Vkttlmlnl:qRrysKh33
                      MD5:3C718CC240DCEEDF8BA59F9AA557C597
                      SHA1:9341B851572E15116C936EADBE41AF6639B32AC2
                      SHA-256:B660E6E298E466AA5BB2A99471E12220193D18B68EC883F3D7C420E1A9B739E7
                      SHA-512:30C63365B2CBAD08C48EAC73192479948D127CAB5AE96CA8CE1CB4C5257575C174C8FBE9C6A675B868ABE6775C7BAA76DE47A3705F4BD11975C36AC709A09FC9
                      Malicious:false
                      Preview: ..6#.....................................3...w...&...z..!)...zc.........!)...zc.!)...zc.e.., )...z.}................].5.!)...zc.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                      Process:C:\Windows\SysWOW64\rundll32.exe
                      File Type:Microsoft Cabinet archive data, 61414 bytes, 1 file
                      Category:dropped
                      Size (bytes):61414
                      Entropy (8bit):7.995245868798237
                      Encrypted:true
                      SSDEEP:1536:EysgU6qmzixT64jYMZ8HbVPGfVDwm/xLZ9rP:wF6qmeo4eH1m9wmLvrP
                      MD5:ACAEDA60C79C6BCAC925EEB3653F45E0
                      SHA1:2AAAE490BCDACCC6172240FF1697753B37AC5578
                      SHA-256:6B0CECCF0103AFD89844761417C1D23ACC41F8AEBF3B7230765209B61EEE5658
                      SHA-512:FEAA6E7ED7DDA1583739B3E531AB5C562A222EE6ECD042690AE7DCFF966717C6E968469A7797265A11F6E899479AE0F3031E8CF5BEBE1492D5205E9C59690900
                      Malicious:false
                      Preview: MSCF............,...................I.......;w........RSNj .authroot.stl..>.(.5..CK..8T....c_.d...A.K...+.d.H..*i.RJJ.IQIR..$t)Kd.-[..T\{..ne......<.w......A..B........c...wi......D....c.0D,L........fy....Rg...=........i,3.3..Z....~^ve<...TF.*...f.zy.,...m.@.0.0...m.3..I(..+..v#...(.2....e...L..*y..V.......~U...."<ke.....l.X:Dt..R<7.5\A7L0=..T.V...IDr..8<....r&...I-.^..b.b.".Af....E.._..r.>.`;,.Hob..S.....7'..\.R$.".g..+..64..@nP.....k3...B.`.G..@D.....L.....`^...#OpW.....!....`.....rf:.}.R.@....gR.#7....l..H.#...d.Qh..3..fCX....==#..M.l..~&....[.J9.\..Ww.....Tx.%....]..a4E...q.+...#.*a..x..O..V.t..Y1!.T..`U...-...< _@...|(.....0..3.`.LU...E0.Gu.4KN....5...?.....I.p..'..........N<.d.O..dH@c1t...[w/...T....cYK.X>.0..Z.....O>..9.3.#9X.%.b...5.YK.E.V.....`./.3.._..nN]..=..M.o.F.._..z....._...gY..!Z..?l....vp.l.:.d.Z..W.....~...N.._.k...&.....$......i.F.d.....D!e.....Y..,.E..m.;.1... $.F..O.F.o_}.uG....,.%.>,.Zx.......o....c../.;....g&.....
                      C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                      Process:C:\Windows\SysWOW64\rundll32.exe
                      File Type:data
                      Category:modified
                      Size (bytes):328
                      Entropy (8bit):3.101256677853478
                      Encrypted:false
                      SSDEEP:6:kK/LKk8SN+SkQlPlEGYRMY9z+4KlDA3RUeYlUmlUR/t:nG9kPlE99SNxAhUeYlUSA/t
                      MD5:1CA7AEE1BEBAA4827B91C7C5A352CA4D
                      SHA1:B464712365B6C9313A8A69AEB612287738C764A9
                      SHA-256:D85A58A7E2D34A2E618E12AD3B54FA1AC82D570A48A77211E45E105B202B2509
                      SHA-512:2012737BC1B8FEC2F54AB636CA25F0A7462FFAFF4636440A077F1615FC9DB4D7702A983D3DA022112DA2BE75CDE08A612F422697752358CE5BC4862405DA4006
                      Malicious:false
                      Preview: p...... ..........].u...(....................................................... ........q.\].......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.7.1.e.1.5.c.5.d.c.4.d.7.1.:.0."...
                      C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
                      Process:C:\Windows\System32\svchost.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):55
                      Entropy (8bit):4.306461250274409
                      Encrypted:false
                      SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                      MD5:DCA83F08D448911A14C22EBCACC5AD57
                      SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                      SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                      SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                      Malicious:false
                      Preview: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}

                      Static File Info

                      General

                      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.088004950406934
                      TrID:
                      • Win32 Dynamic Link Library (generic) (1002004/3) 95.65%
                      • Win32 EXE PECompact compressed (generic) (41571/9) 3.97%
                      • Generic Win/DOS Executable (2004/3) 0.19%
                      • DOS Executable Generic (2002/1) 0.19%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:CSxylfUJcL.dll
                      File size:417792
                      MD5:fa7ab814336d3ee4312c262457e01f01
                      SHA1:73e1844abe6d99a57345464f418279d596985202
                      SHA256:c89c49c3e8e37835ab53bfd9ff9ab97c80e037f0fdfe7e8df6a7d3d86fa62782
                      SHA512:088fabcbc8481b5967c5bcbdf002f1158856fe33119e5a6aa333c349ad2ffef5a60bc56760d2affaa68aff07a004fd5ce82eeeacee01e84fb1dc0ce66799249b
                      SSDEEP:6144:o1ju3jPam65ucnNgDoDUhuGGwKveuD4VKYjHyCAJOhrmBlDxqms9ujAJKedmL/:yMjcuDaUImtStJorohvsMjmKe
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Z'...F...F...F...I...F...I...F...F...D..9....F..9....F..9....F..9....F..9....F..9....F..Rich.F..................PE..L...k+.a...

                      File Icon

                      Icon Hash:71b018ccc6577131

                      Static PE Info

                      General

                      Entrypoint:0x10017b85
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x10000000
                      Subsystem:windows gui
                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      DLL Characteristics:
                      Time Stamp:0x61E02B6B [Thu Jan 13 13:38:51 2022 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:90add561a8bf6976696c056c199a41b8

                      Entrypoint Preview

                      Instruction
                      cmp dword ptr [esp+08h], 01h
                      jne 00007F5138716D87h
                      call 00007F513871EB08h
                      push dword ptr [esp+04h]
                      mov ecx, dword ptr [esp+10h]
                      mov edx, dword ptr [esp+0Ch]
                      call 00007F5138716C72h
                      pop ecx
                      retn 000Ch
                      push 00000000h
                      push dword ptr [esp+14h]
                      push dword ptr [esp+14h]
                      push dword ptr [esp+14h]
                      push dword ptr [esp+14h]
                      call 00007F513871EB70h
                      add esp, 14h
                      ret
                      push eax
                      push dword ptr fs:[00000000h]
                      lea eax, dword ptr [esp+0Ch]
                      sub esp, dword ptr [esp+0Ch]
                      push ebx
                      push esi
                      push edi
                      mov dword ptr [eax], ebp
                      mov ebp, eax
                      mov eax, dword ptr [10057A08h]
                      xor eax, ebp
                      push eax
                      push dword ptr [ebp-04h]
                      mov dword ptr [ebp-04h], FFFFFFFFh
                      lea eax, dword ptr [ebp-0Ch]
                      mov dword ptr fs:[00000000h], eax
                      ret
                      push eax
                      push dword ptr fs:[00000000h]
                      lea eax, dword ptr [esp+0Ch]
                      sub esp, dword ptr [esp+0Ch]
                      push ebx
                      push esi
                      push edi
                      mov dword ptr [eax], ebp
                      mov ebp, eax
                      mov eax, dword ptr [10057A08h]
                      xor eax, ebp
                      push eax
                      mov dword ptr [ebp-10h], esp
                      push dword ptr [ebp-04h]
                      mov dword ptr [ebp-04h], FFFFFFFFh
                      lea eax, dword ptr [ebp-0Ch]
                      mov dword ptr fs:[00000000h], eax
                      ret
                      push eax
                      push dword ptr fs:[00000000h]
                      lea eax, dword ptr [esp+0Ch]
                      sub esp, dword ptr [esp+0Ch]
                      push ebx
                      push esi
                      push edi
                      mov dword ptr [eax], ebp
                      mov ebp, eax
                      mov eax, dword ptr [10057A08h]
                      xor eax, ebp
                      push eax
                      mov dword ptr [ebp-10h], eax

                      Rich Headers

                      Programming Language:
                      • [RES] VS2005 build 50727
                      • [ C ] VS2005 build 50727
                      • [EXP] VS2005 build 50727
                      • [C++] VS2005 build 50727
                      • [ASM] VS2005 build 50727
                      • [LNK] VS2005 build 50727

                      Data Directories

                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x313c00x50.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x2fdcc0xb4.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x5d0000x3664.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x610000x3df4.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2cd600x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x290000x440.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x2fd440x40.rdata
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                      Sections

                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x27f5e0x28000False0.514996337891data6.66251942868IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      .rdata0x290000x84100x9000False0.308865017361data4.83069227563IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x320000x2a9a00x27000False0.963572966747data7.93281036967IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                      .rsrc0x5d0000x36640x4000False0.274780273438data4.49622273105IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x610000x82840x9000False0.33251953125data3.82081999119IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                      Resources

                      NameRVASizeTypeLanguageCountry
                      RT_CURSOR0x5db080x134dataChineseChina
                      RT_CURSOR0x5dc3c0xb4dataChineseChina
                      RT_CURSOR0x5dcf00x134AmigaOS bitmap fontChineseChina
                      RT_CURSOR0x5de240x134dataChineseChina
                      RT_CURSOR0x5df580x134dataChineseChina
                      RT_CURSOR0x5e08c0x134dataChineseChina
                      RT_CURSOR0x5e1c00x134dataChineseChina
                      RT_CURSOR0x5e2f40x134dataChineseChina
                      RT_CURSOR0x5e4280x134dataChineseChina
                      RT_CURSOR0x5e55c0x134dataChineseChina
                      RT_CURSOR0x5e6900x134dataChineseChina
                      RT_CURSOR0x5e7c40x134dataChineseChina
                      RT_CURSOR0x5e8f80x134AmigaOS bitmap fontChineseChina
                      RT_CURSOR0x5ea2c0x134dataChineseChina
                      RT_CURSOR0x5eb600x134dataChineseChina
                      RT_CURSOR0x5ec940x134dataChineseChina
                      RT_BITMAP0x5edc80xb8dataChineseChina
                      RT_BITMAP0x5ee800x144dataChineseChina
                      RT_ICON0x5efc40x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 67108992, next used block 3293332676ChineseChina
                      RT_ICON0x5f2ac0x128GLS_BINARY_LSB_FIRSTChineseChina
                      RT_DIALOG0x5f3d40x33cdataChineseChina
                      RT_DIALOG0x5f7100xe2dataChineseChina
                      RT_DIALOG0x5f7f40x34dataChineseChina
                      RT_STRING0x5f8280x54dataChineseChina
                      RT_STRING0x5f87c0x2cdataChineseChina
                      RT_STRING0x5f8a80x82dataChineseChina
                      RT_STRING0x5f92c0x1d0dataChineseChina
                      RT_STRING0x5fafc0x164dataChineseChina
                      RT_STRING0x5fc600x132dataChineseChina
                      RT_STRING0x5fd940x50dataChineseChina
                      RT_STRING0x5fde40x40dataChineseChina
                      RT_STRING0x5fe240x6adataChineseChina
                      RT_STRING0x5fe900x1d6dataChineseChina
                      RT_STRING0x600680x110dataChineseChina
                      RT_STRING0x601780x24dataChineseChina
                      RT_STRING0x6019c0x30dataChineseChina
                      RT_GROUP_CURSOR0x601cc0x22Lotus unknown worksheet or configuration, revision 0x2ChineseChina
                      RT_GROUP_CURSOR0x601f00x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602040x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602180x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x6022c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602400x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602540x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602680x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x6027c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602900x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602a40x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602b80x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602cc0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602e00x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602f40x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_ICON0x603080x22dataChineseChina
                      RT_VERSION0x6032c0x2e0dataChineseChina
                      RT_MANIFEST0x6060c0x56ASCII text, with CRLF line terminatorsEnglishUnited States

                      Imports

                      DLLImport
                      KERNEL32.dllCreateFileA, GetCPInfo, GetOEMCP, RtlUnwind, HeapReAlloc, GetCommandLineA, RaiseException, ExitProcess, HeapSize, HeapDestroy, HeapCreate, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetACP, LCMapStringW, GetStdHandle, SetHandleCount, GetFileType, GetStartupInfoA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetSystemTimeAsFileTime, GetConsoleCP, GetConsoleMode, GetStringTypeA, GetStringTypeW, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, GetCurrentProcess, GetThreadLocale, FlushFileBuffers, SetFilePointer, WriteFile, ReadFile, GlobalFlags, WritePrivateProfileStringA, TlsFree, DeleteCriticalSection, LocalReAlloc, TlsSetValue, TlsAlloc, InitializeCriticalSection, GlobalHandle, GlobalReAlloc, EnterCriticalSection, TlsGetValue, LeaveCriticalSection, LocalAlloc, InterlockedIncrement, GlobalGetAtomNameA, GlobalFindAtomA, lstrcmpW, GetVersionExA, InterlockedDecrement, FreeResource, GetCurrentProcessId, GlobalAddAtomA, GetCurrentThread, GetCurrentThreadId, ConvertDefaultLocale, GetModuleFileNameA, EnumResourceLanguagesA, GetLocaleInfoA, lstrcmpA, GlobalDeleteAtom, GetModuleHandleA, GlobalFree, GlobalAlloc, GlobalLock, GlobalUnlock, FormatMessageA, LocalFree, FindResourceA, LoadResource, LockResource, SizeofResource, MulDiv, CreateThread, CloseHandle, HeapFree, GetNativeSystemInfo, GetProcessHeap, HeapAlloc, FreeLibrary, GetProcAddress, LoadLibraryA, IsBadReadPtr, VirtualProtect, SetLastError, VirtualAlloc, VirtualFree, VirtualQuery, Sleep, GetLastError, lstrlenA, WideCharToMultiByte, CompareStringA, MultiByteToWideChar, GetVersion, LCMapStringA, InterlockedExchange
                      USER32.dllLoadCursorA, GetSysColorBrush, EndPaint, BeginPaint, ReleaseDC, GetDC, ClientToScreen, GrayStringA, DrawTextExA, DrawTextA, TabbedTextOutA, SetWindowTextA, IsDialogMessageA, SetDlgItemTextA, GetDlgItemTextA, RegisterWindowMessageA, SendDlgItemMessageA, WinHelpA, GetCapture, GetClassLongA, GetClassNameA, SetPropA, GetPropA, RemovePropA, SetFocus, GetWindowTextLengthA, GetWindowTextA, GetForegroundWindow, GetTopWindow, GetMessageTime, MapWindowPoints, SetForegroundWindow, UpdateWindow, GetMenu, CreateWindowExA, GetClassInfoExA, GetClassInfoA, RegisterClassA, GetSysColor, CopyRect, PtInRect, GetDlgCtrlID, DefWindowProcA, CallWindowProcA, SetWindowLongA, SetWindowPos, SystemParametersInfoA, GetWindowPlacement, GetWindowRect, GetWindow, UnhookWindowsHookEx, GetDesktopWindow, SetActiveWindow, CreateDialogIndirectParamA, DestroyWindow, IsWindow, GetDlgItem, GetNextDlgTabItem, EndDialog, GetWindowThreadProcessId, GetWindowLongA, GetLastActivePopup, IsWindowEnabled, MessageBoxA, SetCursor, SetWindowsHookExA, CallNextHookEx, GetMessageA, TranslateMessage, DispatchMessageA, GetActiveWindow, IsWindowVisible, GetKeyState, PeekMessageA, GetCursorPos, ValidateRect, SetMenuItemBitmaps, DestroyMenu, UnregisterClassA, GetMessagePos, GetMenuCheckMarkDimensions, LoadBitmapA, GetFocus, GetParent, ModifyMenuA, EnableMenuItem, CheckMenuItem, PostQuitMessage, GetMenuState, GetMenuItemID, GetMenuItemCount, GetSubMenu, SetTimer, KillTimer, IsIconic, GetSystemMetrics, GetClientRect, DrawIcon, SendMessageA, ShowWindow, EnableWindow, LoadIconA, PostMessageA, AdjustWindowRectEx
                      GDI32.dllSetWindowExtEx, ScaleWindowExtEx, DeleteDC, GetStockObject, ScaleViewportExtEx, SetViewportExtEx, OffsetViewportOrgEx, SetViewportOrgEx, SelectObject, Escape, ExtTextOutA, TextOutA, RectVisible, PtVisible, GetDeviceCaps, DeleteObject, SetMapMode, RestoreDC, SaveDC, GetObjectA, SetBkColor, SetTextColor, GetClipBox, CreateBitmap
                      WINSPOOL.DRVDocumentPropertiesA, ClosePrinter, OpenPrinterA
                      ADVAPI32.dllRegSetValueExA, RegCreateKeyExA, RegQueryValueA, RegEnumKeyA, RegDeleteKeyA, RegOpenKeyExA, RegQueryValueExA, RegOpenKeyA, RegCloseKey
                      SHLWAPI.dllPathFindExtensionA
                      OLEAUT32.dllVariantClear, VariantChangeType, VariantInit
                      WS2_32.dllsendto, recvfrom, WSAStartup, inet_addr, htons, socket, bind, setsockopt, WSACleanup, closesocket, htonl

                      Exports

                      NameOrdinalAddress
                      DllRegisterServer10x10008af0

                      Version Infos

                      DescriptionData
                      LegalCopyright (C) 2014
                      InternalNameUDPTool
                      FileVersion1, 0, 0, 1
                      CompanyName
                      LegalTrademarks
                      ProductNameUDPTool
                      ProductVersion1, 0, 0, 1
                      FileDescriptionUDPTool Microsoft
                      OriginalFilenameUDPTool.EXE
                      Translation0x0804 0x04b0

                      Possible Origin

                      Language of compilation systemCountry where language is spokenMap
                      ChineseChina
                      EnglishUnited States

                      Network Behavior

                      Snort IDS Alerts

                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      01/14/22-10:37:48.669419TCP2404332ET CNC Feodo Tracker Reported CnC Server TCP group 174976680192.168.2.645.138.98.34
                      01/14/22-10:37:49.746848TCP2404338ET CNC Feodo Tracker Reported CnC Server TCP group 20497708080192.168.2.669.16.218.101

                      Network Port Distribution

                      TCP Packets

                      TimestampSource PortDest PortSource IPDest IP
                      Jan 14, 2022 10:37:48.669419050 CET4976680192.168.2.645.138.98.34
                      Jan 14, 2022 10:37:48.686331987 CET804976645.138.98.34192.168.2.6
                      Jan 14, 2022 10:37:49.190272093 CET4976680192.168.2.645.138.98.34
                      Jan 14, 2022 10:37:49.207226038 CET804976645.138.98.34192.168.2.6
                      Jan 14, 2022 10:37:49.721563101 CET4976680192.168.2.645.138.98.34
                      Jan 14, 2022 10:37:49.738476038 CET804976645.138.98.34192.168.2.6
                      Jan 14, 2022 10:37:49.746848106 CET497708080192.168.2.669.16.218.101
                      Jan 14, 2022 10:37:49.875647068 CET80804977069.16.218.101192.168.2.6
                      Jan 14, 2022 10:37:49.877245903 CET497708080192.168.2.669.16.218.101
                      Jan 14, 2022 10:37:49.920694113 CET497708080192.168.2.669.16.218.101
                      Jan 14, 2022 10:37:50.049519062 CET80804977069.16.218.101192.168.2.6
                      Jan 14, 2022 10:37:50.062572956 CET80804977069.16.218.101192.168.2.6
                      Jan 14, 2022 10:37:50.062599897 CET80804977069.16.218.101192.168.2.6
                      Jan 14, 2022 10:37:50.062751055 CET497708080192.168.2.669.16.218.101
                      Jan 14, 2022 10:37:57.998666048 CET497708080192.168.2.669.16.218.101
                      Jan 14, 2022 10:37:58.128571033 CET80804977069.16.218.101192.168.2.6
                      Jan 14, 2022 10:37:58.129226923 CET80804977069.16.218.101192.168.2.6
                      Jan 14, 2022 10:37:58.129359961 CET497708080192.168.2.669.16.218.101
                      Jan 14, 2022 10:37:58.136384010 CET497708080192.168.2.669.16.218.101
                      Jan 14, 2022 10:37:58.265239954 CET80804977069.16.218.101192.168.2.6
                      Jan 14, 2022 10:37:58.791407108 CET80804977069.16.218.101192.168.2.6
                      Jan 14, 2022 10:37:58.791527987 CET497708080192.168.2.669.16.218.101
                      Jan 14, 2022 10:38:01.795819998 CET80804977069.16.218.101192.168.2.6
                      Jan 14, 2022 10:38:01.795852900 CET80804977069.16.218.101192.168.2.6
                      Jan 14, 2022 10:38:01.795960903 CET497708080192.168.2.669.16.218.101
                      Jan 14, 2022 10:39:38.577863932 CET497708080192.168.2.669.16.218.101
                      Jan 14, 2022 10:39:38.577919006 CET497708080192.168.2.669.16.218.101

                      DNS Answers

                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                      Jan 14, 2022 10:37:49.117140055 CET8.8.8.8192.168.2.60x3995No error (0)windowsupdate.s.llnwi.net41.63.96.128A (IP address)IN (0x0001)

                      Code Manipulations

                      Statistics

                      Behavior

                      Click to jump to process

                      System Behavior

                      General

                      Start time:10:37:00
                      Start date:14/01/2022
                      Path:C:\Windows\System32\loaddll32.exe
                      Wow64 process (32bit):true
                      Commandline:loaddll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll"
                      Imagebase:0x130000
                      File size:116736 bytes
                      MD5 hash:7DEB5DB86C0AC789123DEC286286B938
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate

                      General

                      Start time:10:37:01
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll",#1
                      Imagebase:0x2a0000
                      File size:232960 bytes
                      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:10:37:01
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\regsvr32.exe
                      Wow64 process (32bit):true
                      Commandline:regsvr32.exe /s C:\Users\user\Desktop\CSxylfUJcL.dll
                      Imagebase:0x830000
                      File size:20992 bytes
                      MD5 hash:426E7499F6A7346F0410DEAD0805586B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.396391037.0000000004B81000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.396217963.0000000003230000.00000040.00000001.sdmp, Author: Joe Security
                      Reputation:high

                      General

                      Start time:10:37:01
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll",#1
                      Imagebase:0x2d0000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.351221459.0000000004C01000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.350955081.0000000004A40000.00000040.00000001.sdmp, Author: Joe Security
                      Reputation:high

                      General

                      Start time:10:37:01
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe C:\Users\user\Desktop\CSxylfUJcL.dll,DllRegisterServer
                      Imagebase:0x2d0000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.354941726.0000000005411000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.354572676.0000000005220000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.354868089.00000000053E0000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.354398198.00000000051C0000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.354782751.00000000052B1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.354142339.0000000005110000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.353774398.0000000004C71000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.354700642.0000000005280000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.354625308.0000000005251000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.354494384.00000000051F1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.354257894.0000000005141000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.353590253.0000000004B30000.00000040.00000001.sdmp, Author: Joe Security
                      Reputation:high

                      General

                      Start time:10:37:02
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll",DllRegisterServer
                      Imagebase:0x2d0000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.353899484.00000000047F1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.354039628.0000000004851000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.353678279.00000000046C1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.353971003.0000000004820000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.353601392.0000000004690000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.353804496.00000000047C0000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.352946917.0000000004060000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.353110002.0000000004191000.00000020.00000001.sdmp, Author: Joe Security
                      Reputation:high

                      General

                      Start time:10:37:05
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Ovttmq\chwg.qvw",xKUTPckNvcwxvZR
                      Imagebase:0x2d0000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.397064444.0000000002A80000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.397100803.0000000002AD1000.00000020.00000001.sdmp, Author: Joe Security
                      Reputation:high

                      General

                      Start time:10:37:22
                      Start date:14/01/2022
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                      Imagebase:0x7ff6b7590000
                      File size:51288 bytes
                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:10:37:25
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\CSxylfUJcL.dll",DllRegisterServer
                      Imagebase:0x2d0000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      General

                      Start time:10:37:25
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Ovttmq\chwg.qvw",DllRegisterServer
                      Imagebase:0x2d0000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      General

                      Start time:10:37:29
                      Start date:14/01/2022
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                      Imagebase:0x7ff6b7590000
                      File size:51288 bytes
                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      General

                      Start time:10:37:45
                      Start date:14/01/2022
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                      Imagebase:0x7ff6b7590000
                      File size:51288 bytes
                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      General

                      Start time:10:38:03
                      Start date:14/01/2022
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                      Imagebase:0x7ff6b7590000
                      File size:51288 bytes
                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      General

                      Start time:10:38:22
                      Start date:14/01/2022
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                      Imagebase:0x7ff6b7590000
                      File size:51288 bytes
                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      Disassembly

                      Code Analysis

                      Reset < >