Windows Analysis Report pugKLanrj3

Overview

General Information

Sample Name: pugKLanrj3 (renamed file extension from none to dll)
Analysis ID: 553115
MD5: db9535477013554eb17c837e6bd92324
SHA1: ba4fa056de631759ffa5600dd1142a1280d2f051
SHA256: df234584db0c8aa194c6873b78c8ae0018f0c5f445c5c8a2e90c5e3131310ad0
Tags: 32dllexetrojan
Infos:

Most interesting Screenshot:

Detection

Emotet
Score: 96
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Machine Learning detection for sample
Sigma detected: Suspicious Call by Ordinal
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
PE file contains strange resources
Tries to load missing DLLs
Contains functionality to read the PEB
Drops PE files to the windows directory (C:\Windows)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Connects to several IPs in different countries
Potential key logger detected (key state polling based)
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

AV Detection:

barindex
Found malware configuration
Source: 10.2.rundll32.exe.4a90000.12.raw.unpack Malware Configuration Extractor: Emotet {"C2 list": ["45.138.98.34:80", "69.16.218.101:8080", "51.210.242.234:8080", "185.148.168.220:8080", "142.4.219.173:8080", "54.38.242.185:443", "191.252.103.16:80", "104.131.62.48:8080", "62.171.178.147:8080", "217.182.143.207:443", "168.197.250.14:80", "37.44.244.177:8080", "66.42.57.149:443", "210.57.209.142:8080", "159.69.237.188:443", "116.124.128.206:8080", "128.199.192.135:8080", "195.154.146.35:443", "185.148.168.15:8080", "195.77.239.39:8080", "207.148.81.119:8080", "85.214.67.203:8080", "190.90.233.66:443", "78.46.73.125:443", "78.47.204.80:443", "37.59.209.141:8080", "54.37.228.122:443"], "Public Key": ["RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW", "RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0"]}
Multi AV Scanner detection for submitted file
Source: pugKLanrj3.dll Virustotal: Detection: 26% Perma Link
Source: pugKLanrj3.dll ReversingLabs: Detection: 32%
Machine Learning detection for sample
Source: pugKLanrj3.dll Joe Sandbox ML: detected

Compliance:

barindex
Uses 32bit PE files
Source: pugKLanrj3.dll Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Source: Traffic Snort IDS: 2404332 ET CNC Feodo Tracker Reported CnC Server TCP group 17 192.168.2.3:49748 -> 45.138.98.34:80
Source: Traffic Snort IDS: 2404338 ET CNC Feodo Tracker Reported CnC Server TCP group 20 192.168.2.3:49749 -> 69.16.218.101:8080
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 69.16.218.101 144 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 45.138.98.34 80 Jump to behavior
C2 URLs / IPs found in malware configuration
Source: Malware configuration extractor IPs: 45.138.98.34:80
Source: Malware configuration extractor IPs: 69.16.218.101:8080
Source: Malware configuration extractor IPs: 51.210.242.234:8080
Source: Malware configuration extractor IPs: 185.148.168.220:8080
Source: Malware configuration extractor IPs: 142.4.219.173:8080
Source: Malware configuration extractor IPs: 54.38.242.185:443
Source: Malware configuration extractor IPs: 191.252.103.16:80
Source: Malware configuration extractor IPs: 104.131.62.48:8080
Source: Malware configuration extractor IPs: 62.171.178.147:8080
Source: Malware configuration extractor IPs: 217.182.143.207:443
Source: Malware configuration extractor IPs: 168.197.250.14:80
Source: Malware configuration extractor IPs: 37.44.244.177:8080
Source: Malware configuration extractor IPs: 66.42.57.149:443
Source: Malware configuration extractor IPs: 210.57.209.142:8080
Source: Malware configuration extractor IPs: 159.69.237.188:443
Source: Malware configuration extractor IPs: 116.124.128.206:8080
Source: Malware configuration extractor IPs: 128.199.192.135:8080
Source: Malware configuration extractor IPs: 195.154.146.35:443
Source: Malware configuration extractor IPs: 185.148.168.15:8080
Source: Malware configuration extractor IPs: 195.77.239.39:8080
Source: Malware configuration extractor IPs: 207.148.81.119:8080
Source: Malware configuration extractor IPs: 85.214.67.203:8080
Source: Malware configuration extractor IPs: 190.90.233.66:443
Source: Malware configuration extractor IPs: 78.46.73.125:443
Source: Malware configuration extractor IPs: 78.47.204.80:443
Source: Malware configuration extractor IPs: 37.59.209.141:8080
Source: Malware configuration extractor IPs: 54.37.228.122:443
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: AS-CHOOPAUS AS-CHOOPAUS
Source: Joe Sandbox View ASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 207.148.81.119 207.148.81.119
Source: Joe Sandbox View IP Address: 104.131.62.48 104.131.62.48
Detected TCP or UDP traffic on non-standard ports
Source: global traffic TCP traffic: 192.168.2.3:49749 -> 69.16.218.101:8080
Connects to several IPs in different countries
Source: unknown Network traffic detected: IP country count 12
Source: unknown TCP traffic detected without corresponding DNS query: 45.138.98.34
Source: unknown TCP traffic detected without corresponding DNS query: 45.138.98.34
Source: unknown TCP traffic detected without corresponding DNS query: 45.138.98.34
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: svchost.exe, 00000011.00000003.419352679.0000024AA7D88000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
Source: svchost.exe, 00000011.00000003.419352679.0000024AA7D88000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
Source: svchost.exe, 00000011.00000003.419425357.0000024AA7D8E000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.419352679.0000024AA7D88000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.419404673.0000024AA7D8E000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify - Music and Podcasts","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY equals www.facebook.com (Facebook)
Source: svchost.exe, 00000011.00000003.419425357.0000024AA7D8E000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.419352679.0000024AA7D88000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.419404673.0000024AA7D8E000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify - Music and Podcasts","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY equals www.twitter.com (Twitter)
Source: svchost.exe, 00000011.00000002.435821452.0000024AA7D00000.00000004.00000001.sdmp String found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: svchost.exe, 00000011.00000002.435659671.0000024AA74EF000.00000004.00000001.sdmp String found in binary or memory: http://crl.ver)
Source: 77EC63BDA74BD0D0E0426DC8F80085060.10.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: rundll32.exe, 0000000A.00000003.343075591.0000000004D31000.00000004.00000001.sdmp String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?e16bf69187751
Source: svchost.exe, 00000011.00000003.408016367.0000024AA7D92000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408127045.0000024AA7DB3000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408267129.0000024AA8202000.00000004.00000001.sdmp String found in binary or memory: http://help.disneyplus.com.
Source: svchost.exe, 00000011.00000003.408016367.0000024AA7D92000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408127045.0000024AA7DB3000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408267129.0000024AA8202000.00000004.00000001.sdmp String found in binary or memory: https://disneyplus.com/legal.
Source: svchost.exe, 00000011.00000003.408016367.0000024AA7D92000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408127045.0000024AA7DB3000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408267129.0000024AA8202000.00000004.00000001.sdmp String found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
Source: svchost.exe, 00000011.00000003.408016367.0000024AA7D92000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408127045.0000024AA7DB3000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408267129.0000024AA8202000.00000004.00000001.sdmp String found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
Source: svchost.exe, 00000011.00000003.411715639.0000024AA7DB3000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.411696063.0000024AA7D92000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.411749032.0000024AA8202000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.413775795.0000024AA7D8E000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.411646731.0000024AA7DCA000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.411611343.0000024AA7DCA000.00000004.00000001.sdmp String found in binary or memory: https://www.tiktok.com/legal/report/feedback
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_100012D0 recvfrom, 2_2_100012D0

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Creates a DirectInput object (often for capturing keystrokes)
Source: loaddll32.exe, 00000000.00000002.307427556.0000000000A4B000.00000004.00000020.sdmp Binary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
Potential key logger detected (key state polling based)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1000FF59 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA, 2_2_1000FF59
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1000FF59 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA, 3_2_1000FF59

E-Banking Fraud:

barindex
Yara detected Emotet
Source: Yara match File source: 7.2.rundll32.exe.4fb0000.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.6c0000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4660000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4fa0000.21.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4a90000.12.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4950000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.3090000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4a90000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.550000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.47a0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.2e50000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4710000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4630000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.2e50000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4fd0000.22.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.49b0000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4ed0000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.d20000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.2e30000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4d20000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4820000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4fe0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4540000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4ac0000.13.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4e70000.18.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.2e30000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.520000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4960000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4990000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.2e60000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.47f0000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4710000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4570000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4c70000.16.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5000000.23.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4b90000.14.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.720000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4980000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4ea0000.19.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4e70000.18.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.49e0000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4ea0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.ed0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4790000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4790000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4540000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4950000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4ea0000.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.5010000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.6c0000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4fb0000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.47a0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.47c0000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4f70000.20.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4f70000.20.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.47f0000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4fd0000.22.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.6c0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4740000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.690000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4bc0000.15.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4b90000.14.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4970000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4960000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.520000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4d20000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4820000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4ca0000.17.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.690000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.47f0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.d20000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4c70000.16.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.49b0000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4630000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.47f0000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000007.00000002.308556502.0000000004971000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.312426426.0000000004790000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.303864837.0000000002E50000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.308717246.0000000004ED1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.312591906.0000000002E30000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.310675126.00000000006C1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.308496197.00000000047A0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818600479.0000000004CA1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.816263427.0000000000551000.00000020.00000010.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.312707880.0000000004991000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818149949.0000000004821000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.312062487.0000000004571000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.303938818.0000000003091000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.312157578.0000000004630000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.308585132.0000000004D20000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.303434167.0000000000D20000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.310610436.0000000000690000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818434536.0000000004B90000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818253319.00000000049B0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.308691982.0000000004EA0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.312211500.0000000004661000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818342645.0000000004A90000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.816816895.00000000006C0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818930567.0000000004F70000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.308783720.0000000004FE1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.312650834.0000000004960000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818769110.0000000004E70000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818077767.0000000004741000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818990382.0000000004FA1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818118455.00000000047F0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.311999484.0000000004540000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.312633523.0000000002E61000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818553417.0000000004C70000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.312609575.0000000004821000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818862903.0000000004EA1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818277549.00000000049E1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.819036173.0000000004FD0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818224414.0000000004981000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818194001.0000000004950000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.819084555.0000000005001000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.312500126.00000000047C1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.303487631.0000000000ED1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.816889903.0000000000721000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.816215619.0000000000520000.00000040.00000010.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.308811399.0000000005011000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.308759081.0000000004FB0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818044267.0000000004710000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818377834.0000000004AC1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818471974.0000000004BC1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.312556159.00000000047F0000.00000040.00000001.sdmp, type: MEMORY

System Summary:

barindex
Uses 32bit PE files
Source: pugKLanrj3.dll Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Deletes files inside the Windows folder
Source: C:\Windows\SysWOW64\rundll32.exe File deleted: C:\Windows\SysWOW64\Ubjbeaftth\ufcmfnoys.ulp:Zone.Identifier Jump to behavior
Creates files inside the system directory
Source: C:\Windows\SysWOW64\rundll32.exe File created: C:\Windows\SysWOW64\Ubjbeaftth\ Jump to behavior
Detected potential crypto function
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10020011 2_2_10020011
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_100181CA 2_2_100181CA
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1001929D 2_2_1001929D
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1002542D 2_2_1002542D
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_100274AE 2_2_100274AE
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10026575 2_2_10026575
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1001869D 2_2_1001869D
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10016860 2_2_10016860
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1002596F 2_2_1002596F
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10022A5C 2_2_10022A5C
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10018A71 2_2_10018A71
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1001AAB7 2_2_1001AAB7
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1001CB16 2_2_1001CB16
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10018E7D 2_2_10018E7D
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10025EB1 2_2_10025EB1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_10020011 3_2_10020011
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1002542D 3_2_1002542D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_100274AE 3_2_100274AE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_10026575 3_2_10026575
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1001178A 3_2_1001178A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_10016860 3_2_10016860
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1002596F 3_2_1002596F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_10022A5C 3_2_10022A5C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1001AAB7 3_2_1001AAB7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1001CB16 3_2_1001CB16
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_10025EB1 3_2_10025EB1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030AEFDD 3_2_030AEFDD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A85FF 3_2_030A85FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030B2B09 3_2_030B2B09
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A5333 3_2_030A5333
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0309F369 3_2_0309F369
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_03096B7A 3_2_03096B7A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0309238C 3_2_0309238C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0309FB8E 3_2_0309FB8E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_03094BFC 3_2_03094BFC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A7A0F 3_2_030A7A0F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A9A01 3_2_030A9A01
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A4244 3_2_030A4244
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030AB257 3_2_030AB257
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030B3263 3_2_030B3263
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A4A66 3_2_030A4A66
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030B0A64 3_2_030B0A64
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0309BAA9 3_2_0309BAA9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030AA2A5 3_2_030AA2A5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A0ABA 3_2_030A0ABA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030ACAD5 3_2_030ACAD5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0309D14C 3_2_0309D14C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A2142 3_2_030A2142
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030AE955 3_2_030AE955
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A017B 3_2_030A017B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A6187 3_2_030A6187
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_03092194 3_2_03092194
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030AD1BC 3_2_030AD1BC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030AE1F8 3_2_030AE1F8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030B2009 3_2_030B2009
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A8806 3_2_030A8806
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0309B820 3_2_0309B820
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030AF840 3_2_030AF840
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_03097078 3_2_03097078
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0309A871 3_2_0309A871
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030980C0 3_2_030980C0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030AD8DB 3_2_030AD8DB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0309F0E9 3_2_0309F0E9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030B00EF 3_2_030B00EF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0309670B 3_2_0309670B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0309EF0C 3_2_0309EF0C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_03091F38 3_2_03091F38
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030AFF58 3_2_030AFF58
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A5779 3_2_030A5779
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A4F74 3_2_030A4F74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A9774 3_2_030A9774
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A0F86 3_2_030A0F86
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030B07AA 3_2_030B07AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A8FAE 3_2_030A8FAE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030977A3 3_2_030977A3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030957B8 3_2_030957B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030B17BD 3_2_030B17BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0309BFBE 3_2_0309BFBE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0309E7DE 3_2_0309E7DE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A67E6 3_2_030A67E6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_03098636 3_2_03098636
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0309E640 3_2_0309E640
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A2E5D 3_2_030A2E5D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_03097E79 3_2_03097E79
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A567B 3_2_030A567B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0309DE74 3_2_0309DE74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A3EAA 3_2_030A3EAA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030B36AA 3_2_030B36AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0309C6B8 3_2_0309C6B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A0EBC 3_2_030A0EBC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030B46BD 3_2_030B46BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030B3EE9 3_2_030B3EE9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030ABEFD 3_2_030ABEFD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030AAD08 3_2_030AAD08
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A5515 3_2_030A5515
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A8D3D 3_2_030A8D3D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A654A 3_2_030A654A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A7D5B 3_2_030A7D5B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030B2D53 3_2_030B2D53
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A3D85 3_2_030A3D85
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0309C5D8 3_2_0309C5D8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030AC5D5 3_2_030AC5D5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030955FF 3_2_030955FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A9DF5 3_2_030A9DF5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D4A66 4_2_006D4A66
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006CDE74 4_2_006CDE74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006DB257 4_2_006DB257
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006C8636 4_2_006C8636
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D7A0F 4_2_006D7A0F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006E2009 4_2_006E2009
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D654A 4_2_006D654A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D2142 4_2_006D2142
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006DFF58 4_2_006DFF58
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006DE955 4_2_006DE955
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006DAD08 4_2_006DAD08
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006C670B 4_2_006C670B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D85FF 4_2_006D85FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006DEFDD 4_2_006DEFDD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006CC5D8 4_2_006CC5D8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006E17BD 4_2_006E17BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006E0A64 4_2_006E0A64
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006E3263 4_2_006E3263
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006C7078 4_2_006C7078
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006C7E79 4_2_006C7E79
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D567B 4_2_006D567B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006DA474 4_2_006DA474
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006DDC71 4_2_006DDC71
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006CA871 4_2_006CA871
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006CA445 4_2_006CA445
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D4244 4_2_006D4244
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006CE640 4_2_006CE640
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006DF840 4_2_006DF840
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006C7442 4_2_006C7442
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D2E5D 4_2_006D2E5D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006CB820 4_2_006CB820
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006C3431 4_2_006C3431
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D8806 4_2_006D8806
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D9A01 4_2_006D9A01
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006E00EF 4_2_006E00EF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006CF0E9 4_2_006CF0E9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006E3EE9 4_2_006E3EE9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006DE4E5 4_2_006DE4E5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006DBEFD 4_2_006DBEFD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006C80C0 4_2_006C80C0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006DCCD9 4_2_006DCCD9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006DD8DB 4_2_006DD8DB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006DCAD5 4_2_006DCAD5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006E36AA 4_2_006E36AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006CBAA9 4_2_006CBAA9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D3EAA 4_2_006D3EAA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006DA2A5 4_2_006DA2A5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006C1CA1 4_2_006C1CA1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D0EBC 4_2_006D0EBC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006E46BD 4_2_006E46BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006CC6B8 4_2_006CC6B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D0ABA 4_2_006D0ABA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006CF369 4_2_006CF369
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D5779 4_2_006D5779
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006C6B7A 4_2_006C6B7A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D017B 4_2_006D017B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D437A 4_2_006D437A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D4F74 4_2_006D4F74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D9774 4_2_006D9774
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006CD14C 4_2_006CD14C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D7D5B 4_2_006D7D5B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006E2D53 4_2_006E2D53
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D8D3D 4_2_006D8D3D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006C1F38 4_2_006C1F38
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D5333 4_2_006D5333
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006CEF0C 4_2_006CEF0C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006E2B09 4_2_006E2B09
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D5515 4_2_006D5515
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D67E6 4_2_006D67E6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006C4BFC 4_2_006C4BFC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006C55FF 4_2_006C55FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D27F9 4_2_006D27F9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006DE1F8 4_2_006DE1F8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D9DF5 4_2_006D9DF5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D07F4 4_2_006D07F4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006CE7DE 4_2_006CE7DE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006DFBDE 4_2_006DFBDE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006DC5D5 4_2_006DC5D5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D8FAE 4_2_006D8FAE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006E07AA 4_2_006E07AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006C77A3 4_2_006C77A3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006DD1BC 4_2_006DD1BC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006CBFBE 4_2_006CBFBE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006C57B8 4_2_006C57B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006C238C 4_2_006C238C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006CFB8E 4_2_006CFB8E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D3D85 4_2_006D3D85
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D6187 4_2_006D6187
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006D0F86 4_2_006D0F86
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006C2194 4_2_006C2194
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04992009 7_2_04992009
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04987A0F 7_2_04987A0F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04978636 7_2_04978636
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0497A445 7_2_0497A445
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0497DE74 7_2_0497DE74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04984A66 7_2_04984A66
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0498EFDD 7_2_0498EFDD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0497C5D8 7_2_0497C5D8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0498AD08 7_2_0498AD08
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0497670B 7_2_0497670B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0498FF58 7_2_0498FF58
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0498654A 7_2_0498654A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04982142 7_2_04982142
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04980ABA 7_2_04980ABA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049946BD 7_2_049946BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04980EBC 7_2_04980EBC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0497C6B8 7_2_0497C6B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04983EAA 7_2_04983EAA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049936AA 7_2_049936AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04971CA1 7_2_04971CA1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0498A2A5 7_2_0498A2A5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0497BAA9 7_2_0497BAA9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0498CCD9 7_2_0498CCD9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0498D8DB 7_2_0498D8DB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0498CAD5 7_2_0498CAD5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049780C0 7_2_049780C0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0498BEFD 7_2_0498BEFD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04993EE9 7_2_04993EE9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049900EF 7_2_049900EF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0498E4E5 7_2_0498E4E5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0497F0E9 7_2_0497F0E9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04989A01 7_2_04989A01
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04988806 7_2_04988806
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04973431 7_2_04973431
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0497B820 7_2_0497B820
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04982E5D 7_2_04982E5D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0498B257 7_2_0498B257
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04977442 7_2_04977442
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0497E640 7_2_0497E640
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0498F840 7_2_0498F840
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04984244 7_2_04984244
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0498567B 7_2_0498567B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0497A871 7_2_0497A871
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0498DC71 7_2_0498DC71
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0498A474 7_2_0498A474
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04977E79 7_2_04977E79
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04977078 7_2_04977078
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04993263 7_2_04993263
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04990A64 7_2_04990A64
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04972194 7_2_04972194
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0497FB8E 7_2_0497FB8E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0497238C 7_2_0497238C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04983D85 7_2_04983D85
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04980F86 7_2_04980F86
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04986187 7_2_04986187
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0498D1BC 7_2_0498D1BC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049917BD 7_2_049917BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0497BFBE 7_2_0497BFBE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049757B8 7_2_049757B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049907AA 7_2_049907AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049777A3 7_2_049777A3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04988FAE 7_2_04988FAE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0498FBDE 7_2_0498FBDE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0497E7DE 7_2_0497E7DE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0498C5D5 7_2_0498C5D5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0498E1F8 7_2_0498E1F8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049827F9 7_2_049827F9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049885FF 7_2_049885FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049755FF 7_2_049755FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04974BFC 7_2_04974BFC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049807F4 7_2_049807F4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04989DF5 7_2_04989DF5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049867E6 7_2_049867E6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04985515 7_2_04985515
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04992B09 7_2_04992B09
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0497EF0C 7_2_0497EF0C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04988D3D 7_2_04988D3D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04985333 7_2_04985333
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04971F38 7_2_04971F38
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04987D5B 7_2_04987D5B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04992D53 7_2_04992D53
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0498E955 7_2_0498E955
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0497D14C 7_2_0497D14C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04985779 7_2_04985779
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0498437A 7_2_0498437A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0498017B 7_2_0498017B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04984F74 7_2_04984F74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04989774 7_2_04989774
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04976B7A 7_2_04976B7A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0497F369 7_2_0497F369
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E785FF 9_2_02E785FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E7EFDD 9_2_02E7EFDD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E83EE9 9_2_02E83EE9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E7E4E5 9_2_02E7E4E5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E800EF 9_2_02E800EF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E6F0E9 9_2_02E6F0E9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E7BEFD 9_2_02E7BEFD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E680C0 9_2_02E680C0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E7CAD5 9_2_02E7CAD5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E7D8DB 9_2_02E7D8DB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E7CCD9 9_2_02E7CCD9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E7A2A5 9_2_02E7A2A5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E836AA 9_2_02E836AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E61CA1 9_2_02E61CA1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E73EAA 9_2_02E73EAA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E6BAA9 9_2_02E6BAA9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E846BD 9_2_02E846BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E70EBC 9_2_02E70EBC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E70ABA 9_2_02E70ABA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E6C6B8 9_2_02E6C6B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E74A66 9_2_02E74A66
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E83263 9_2_02E83263
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E80A64 9_2_02E80A64
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E6DE74 9_2_02E6DE74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E7A474 9_2_02E7A474
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E7DC71 9_2_02E7DC71
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E6A871 9_2_02E6A871
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E7567B 9_2_02E7567B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E67078 9_2_02E67078
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E67E79 9_2_02E67E79
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E6A445 9_2_02E6A445
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E74244 9_2_02E74244
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E67442 9_2_02E67442
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E6E640 9_2_02E6E640
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E7F840 9_2_02E7F840
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E7B257 9_2_02E7B257
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E72E5D 9_2_02E72E5D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E6B820 9_2_02E6B820
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E68636 9_2_02E68636
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E63431 9_2_02E63431
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E82009 9_2_02E82009
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E78806 9_2_02E78806
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E79A01 9_2_02E79A01
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E77A0F 9_2_02E77A0F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E767E6 9_2_02E767E6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E79DF5 9_2_02E79DF5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E655FF 9_2_02E655FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E64BFC 9_2_02E64BFC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E7E1F8 9_2_02E7E1F8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E7C5D5 9_2_02E7C5D5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E6E7DE 9_2_02E6E7DE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E6C5D8 9_2_02E6C5D8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E807AA 9_2_02E807AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E677A3 9_2_02E677A3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E78FAE 9_2_02E78FAE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E817BD 9_2_02E817BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E6BFBE 9_2_02E6BFBE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E7D1BC 9_2_02E7D1BC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E657B8 9_2_02E657B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E76187 9_2_02E76187
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E70F86 9_2_02E70F86
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E73D85 9_2_02E73D85
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E6FB8E 9_2_02E6FB8E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E6238C 9_2_02E6238C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E62194 9_2_02E62194
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E6F369 9_2_02E6F369
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E74F74 9_2_02E74F74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E79774 9_2_02E79774
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E66B7A 9_2_02E66B7A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E7017B 9_2_02E7017B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E75779 9_2_02E75779
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E72142 9_2_02E72142
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E6D14C 9_2_02E6D14C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E7654A 9_2_02E7654A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E7E955 9_2_02E7E955
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E82D53 9_2_02E82D53
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E77D5B 9_2_02E77D5B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E7FF58 9_2_02E7FF58
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E75333 9_2_02E75333
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E78D3D 9_2_02E78D3D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E61F38 9_2_02E61F38
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E82B09 9_2_02E82B09
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E6EF0C 9_2_02E6EF0C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E6670B 9_2_02E6670B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E7AD08 9_2_02E7AD08
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E75515 9_2_02E75515
Found potential string decryption / allocating functions
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: String function: 10017BC1 appears 67 times
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: String function: 1001984C appears 48 times
Source: C:\Windows\SysWOW64\rundll32.exe Code function: String function: 10017BC1 appears 68 times
Source: C:\Windows\SysWOW64\rundll32.exe Code function: String function: 1001984C appears 48 times
Sample file is different than original file name gathered from version info
Source: pugKLanrj3.dll Binary or memory string: OriginalFilenameUDPTool.EXE: vs pugKLanrj3.dll
PE file contains strange resources
Source: pugKLanrj3.dll Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Tries to load missing DLLs
Source: C:\Windows\SysWOW64\regsvr32.exe Section loaded: sfc.dll Jump to behavior
Source: pugKLanrj3.dll Virustotal: Detection: 26%
Source: pugKLanrj3.dll ReversingLabs: Detection: 32%
Source: pugKLanrj3.dll Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: unknown Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll"
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",#1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\pugKLanrj3.dll
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",#1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\pugKLanrj3.dll,DllRegisterServer
Source: C:\Windows\SysWOW64\regsvr32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",DllRegisterServer
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",DllRegisterServer
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Ubjbeaftth\ufcmfnoys.ulp",EgkecrKVKe
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Ubjbeaftth\ufcmfnoys.ulp",DllRegisterServer
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\pugKLanrj3.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\pugKLanrj3.dll,DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",#1 Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Ubjbeaftth\ufcmfnoys.ulp",EgkecrKVKe Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Ubjbeaftth\ufcmfnoys.ulp",DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32 Jump to behavior
Source: classification engine Classification label: mal96.troj.evad.winDLL@21/2@0/28
Source: C:\Windows\SysWOW64\rundll32.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",#1
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_100126F9 FindResourceA,LoadResource,LockResource,FreeResource, 2_2_100126F9
Source: C:\Windows\SysWOW64\rundll32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\svchost.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\svchost.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: pugKLanrj3.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: pugKLanrj3.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: pugKLanrj3.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: pugKLanrj3.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: pugKLanrj3.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Data Obfuscation:

barindex
Uses code obfuscation techniques (call, push, ret)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10019891 push ecx; ret 2_2_100198A4
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10017C60 push ecx; ret 2_2_10017C73
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_10019891 push ecx; ret 3_2_100198A4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_10017C60 push ecx; ret 3_2_10017C73
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_03091195 push cs; iretd 3_2_03091197
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_030A08E0 push esp; iretd 3_2_030A08E3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006C1195 push cs; iretd 4_2_006C1197
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04971195 push cs; iretd 7_2_04971197
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E708E0 push esp; iretd 9_2_02E708E3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E61195 push cs; iretd 9_2_02E61197
Contains functionality to dynamically determine API calls
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10023A79 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer, 2_2_10023A79
PE file contains an invalid checksum
Source: pugKLanrj3.dll Static PE information: real checksum: 0x66354 should be: 0x68650
Registers a DLL
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\pugKLanrj3.dll

Persistence and Installation Behavior:

barindex
Drops PE files to the windows directory (C:\Windows)
Source: C:\Windows\SysWOW64\rundll32.exe PE file moved: C:\Windows\SysWOW64\Ubjbeaftth\ufcmfnoys.ulp Jump to behavior

Hooking and other Techniques for Hiding and Protection:

barindex
Hides that the sample has been downloaded from the Internet (zone.identifier)
Source: C:\Windows\SysWOW64\rundll32.exe File opened: C:\Windows\SysWOW64\Ubjbeaftth\ufcmfnoys.ulp:Zone.Identifier read attributes | delete Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe File opened: C:\Windows\SysWOW64\Xsanfz\urubdibogzamw.hym:Zone.Identifier read attributes | delete Jump to behavior
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1000D804 IsIconic,GetWindowPlacement,GetWindowRect, 2_2_1000D804
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10008B90 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon, 2_2_10008B90
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1000D804 IsIconic,GetWindowPlacement,GetWindowRect, 3_2_1000D804
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_10008B90 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon, 3_2_10008B90
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Source: C:\Windows\SysWOW64\rundll32.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Windows\System32\svchost.exe TID: 5380 Thread sleep time: -90000s >= -30000s Jump to behavior
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Windows\System32\loaddll32.exe Last function: Thread delayed
Found evasive API chain (may stop execution after checking a module file name)
Source: C:\Windows\SysWOW64\regsvr32.exe Evasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
Found large amount of non-executed APIs
Source: C:\Windows\SysWOW64\regsvr32.exe API coverage: 4.3 %
Source: C:\Windows\SysWOW64\rundll32.exe API coverage: 4.9 %
Source: C:\Windows\SysWOW64\regsvr32.exe API call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\rundll32.exe API call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\rundll32.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: svchost.exe, 00000011.00000002.435659671.0000024AA74EF000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW
Source: svchost.exe, 00000011.00000002.435533157.0000024AA7472000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW`

Anti Debugging:

barindex
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 2_2_1001C49A
Contains functionality to dynamically determine API calls
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10023A79 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer, 2_2_10023A79
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_100178B6 GetProcessHeap,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__heap_term,__RTC_Initialize,GetCommandLineA,___crtGetEnvironmentStringsA,__ioinit,__mtterm,__setargv,__setenvp,__cinit,__ioterm,__ioterm,__mtterm,__heap_term,___set_flsgetvalue,__calloc_crt,__decode_pointer,__initptd,GetCurrentThreadId,__freeptd, 2_2_100178B6
Contains functionality to read the PEB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0309F7F7 mov eax, dword ptr fs:[00000030h] 3_2_0309F7F7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_006CF7F7 mov eax, dword ptr fs:[00000030h] 4_2_006CF7F7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0497F7F7 mov eax, dword ptr fs:[00000030h] 7_2_0497F7F7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02E6F7F7 mov eax, dword ptr fs:[00000030h] 9_2_02E6F7F7
Checks if the current process is being debugged
Source: C:\Windows\System32\loaddll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 2_2_1001C49A
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10021743 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 2_2_10021743
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_100167D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 2_2_100167D5
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1001FC21 SetUnhandledExceptionFilter,__encode_pointer, 2_2_1001FC21
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1001FC43 __decode_pointer,SetUnhandledExceptionFilter, 2_2_1001FC43
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 3_2_1001C49A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_10021743 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 3_2_10021743
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_100167D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 3_2_100167D5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1001FC21 SetUnhandledExceptionFilter,__encode_pointer, 3_2_1001FC21
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1001FC43 __decode_pointer,SetUnhandledExceptionFilter, 3_2_1001FC43

HIPS / PFW / Operating System Protection Evasion:

barindex
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 69.16.218.101 144 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 45.138.98.34 80 Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",#1 Jump to behavior
Source: rundll32.exe, 0000000A.00000002.817760750.0000000002D70000.00000002.00020000.sdmp Binary or memory string: Program Manager
Source: rundll32.exe, 0000000A.00000002.817760750.0000000002D70000.00000002.00020000.sdmp Binary or memory string: Shell_TrayWnd
Source: rundll32.exe, 0000000A.00000002.817760750.0000000002D70000.00000002.00020000.sdmp Binary or memory string: Progman
Source: rundll32.exe, 0000000A.00000002.817760750.0000000002D70000.00000002.00020000.sdmp Binary or memory string: Progmanlock

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a device
Source: C:\Windows\SysWOW64\rundll32.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Contains functionality to query locales information (e.g. system language)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: GetThreadLocale,GetLocaleInfoA,GetACP, 2_2_10027704
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA, 2_2_1000A803
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: GetLocaleInfoA, 2_2_10023880
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetThreadLocale,GetLocaleInfoA,GetACP, 3_2_10027704
Source: C:\Windows\SysWOW64\rundll32.exe Code function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA, 3_2_1000A803
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetLocaleInfoA, 3_2_10023880
Contains functionality to query CPU information (cpuid)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10022853 cpuid 2_2_10022853
Source: C:\Windows\SysWOW64\rundll32.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1001F914 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter, 2_2_1001F914
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_100178B6 GetProcessHeap,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__heap_term,__RTC_Initialize,GetCommandLineA,___crtGetEnvironmentStringsA,__ioinit,__mtterm,__setargv,__setenvp,__cinit,__ioterm,__ioterm,__mtterm,__heap_term,___set_flsgetvalue,__calloc_crt,__decode_pointer,__initptd,GetCurrentThreadId,__freeptd, 2_2_100178B6

Stealing of Sensitive Information:

barindex
Yara detected Emotet
Source: Yara match File source: 7.2.rundll32.exe.4fb0000.5.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.6c0000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4660000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4fa0000.21.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4a90000.12.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4950000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.3090000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4a90000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.550000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.47a0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.2e50000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4710000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4630000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.2e50000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4fd0000.22.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.49b0000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4ed0000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.d20000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.2e30000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4d20000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4820000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4fe0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4540000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4ac0000.13.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4e70000.18.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.2e30000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.520000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4960000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4990000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.2e60000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.47f0000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4710000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4570000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4c70000.16.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5000000.23.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4b90000.14.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.720000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4980000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4ea0000.19.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4e70000.18.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.49e0000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4ea0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.ed0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4790000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4790000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4540000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4950000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4ea0000.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.5010000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.6c0000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4fb0000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.47a0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.47c0000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4f70000.20.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4f70000.20.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.47f0000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4fd0000.22.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.6c0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4740000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.690000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4bc0000.15.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4b90000.14.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4970000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4960000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.520000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4d20000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4820000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4ca0000.17.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.690000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.47f0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.d20000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4c70000.16.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.49b0000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4630000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.47f0000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000007.00000002.308556502.0000000004971000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.312426426.0000000004790000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.303864837.0000000002E50000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.308717246.0000000004ED1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.312591906.0000000002E30000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.310675126.00000000006C1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.308496197.00000000047A0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818600479.0000000004CA1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.816263427.0000000000551000.00000020.00000010.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.312707880.0000000004991000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818149949.0000000004821000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.312062487.0000000004571000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.303938818.0000000003091000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.312157578.0000000004630000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.308585132.0000000004D20000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.303434167.0000000000D20000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.310610436.0000000000690000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818434536.0000000004B90000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818253319.00000000049B0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.308691982.0000000004EA0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.312211500.0000000004661000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818342645.0000000004A90000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.816816895.00000000006C0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818930567.0000000004F70000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.308783720.0000000004FE1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.312650834.0000000004960000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818769110.0000000004E70000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818077767.0000000004741000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818990382.0000000004FA1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818118455.00000000047F0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.311999484.0000000004540000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.312633523.0000000002E61000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818553417.0000000004C70000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.312609575.0000000004821000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818862903.0000000004EA1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818277549.00000000049E1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.819036173.0000000004FD0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818224414.0000000004981000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818194001.0000000004950000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.819084555.0000000005001000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.312500126.00000000047C1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.303487631.0000000000ED1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.816889903.0000000000721000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.816215619.0000000000520000.00000040.00000010.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.308811399.0000000005011000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.308759081.0000000004FB0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818044267.0000000004710000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818377834.0000000004AC1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.818471974.0000000004BC1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.312556159.00000000047F0000.00000040.00000001.sdmp, type: MEMORY

Remote Access Functionality:

barindex
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_100011C0 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt, 2_2_100011C0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_100011C0 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt, 3_2_100011C0
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs